168 points

In case anyone wondered how to potentially get around this…

  • Pay for a server in another country that gives you SSH access
  • Create SSH SOCKS tunnel: ssh -N -D 8008 your-server-ip
  • Open your browser and set the SOCKS server to localhost:8008 (in Chromium/Firefox you can search for this in Settings)
permalink
report
reply
28 points
*

So, that’s definitely better than nothing, but your browser isn’t the only thing – though these days, it is a very important thing – that talks to the Internet. If, for example, you’re using a lemmy client to read this, I’d bet that it’s good odds that it doesn’t have SOCKS support.

Though I wouldn’t be surprised if someone has made VPN software that intercepts connections and acts as a proxy SOCKS client, which would make it work more like a traditional VPN if you can reach a remote SOCKS server, though maybe with a performance hit.

googles

Yeah, okay, looks like stunnel can do this on Linux. So it’s a thing.

You don’t need a 100% solution, though, to have a pretty big impact on society. Combine technical barriers with it just being easier to not think about what’s going on outside, maybe some chilling effects from legally going after people who do start doing things that you don’t like (viewing websites, spreading information, etc), and you can control people’s information environment a lot. Make using circumvention solutions illegal – okay, maybe you can bypass their system if you don’t get caught, but do you want to risk it? Make creating or spreading circumvention solutions really illegal. Do you want to risk getting in a lot of trouble so that random other person can get unrestricted or unmonitored Internet access?

On that note, I was reading about the way North Korea does it in an article from someone who got out of North Korea. That is about as close as it gets to a 100% solution. Only a few thousand people are authorized to get Internet access. You need to apply to use the Internet with a couple of days lead time. Each pair of computers has a “librarian” monitoring what the Internet user on each side is doing, and every five minutes or so the computer will halt with whatever you were doing on the screen and require fingerprint re-authorization from the “librarian” to continue. Users are not allowed to view pages in Korean, just English and Chinese (I assume because most information out there that you’d have to go outside North Korea to get access to is likely available in either English or Chinese, and they definitely don’t want people seeing anything out of South Korea).

That pretty much screws North Korea in terms of access to information, is a costly solution, but if you place an absolute priority on control of the information environment, North Korea does prove that it’s possible to take a society there.

permalink
report
parent
reply
10 points

North Korea does prove that it’s possible to take a society there.

I don’t think NK took themselves there, they were already there when the internet was invented. Easier to limit access to few people when you have draconian measures in place when access becomes possible.

Having a society that already widely has access to one that has extremely limited access is a lot more difficult.

permalink
report
parent
reply
5 points

This is a good point that many don’t think about. Even if you could somehow drop hardware and free starlink into North Korea it wouldn’t even matter because the citizens never grew up on internet culture. No one would be able to figure out what to do with it by the time they got caught.

permalink
report
parent
reply
15 points
*

Unfortunately it would be trivial to block an SSH tunnel like this. I recall reading news 10 years ago (maybe even earlier) some foreign journalist tried this at a Beijing hotel room and got shut down in minutes. That was when people are still using PPTP and L2TP protocols to get around censorship, Wireguard and shadowsocks wouldn’t be born for another couple years.

permalink
report
parent
reply
14 points

trivial to block an ssh tunnel like this

Far from trivial unless you’re willing to brick ssh completely, or at least cripple a bunch of non-VPN uses for tunneling. Of course it’s trivial to just block ssh outright, or block tunneling above a certain bandwidth. But that would also block, as an example, most remote IDE sessions, loopback-only server management frontends, etc.

permalink
report
parent
reply
1 point

The Kremlin could maybe have something set up that looks for accesses to stuff inside Russia from outside Russia, then flag that IP as suspicious as being a VPN endpoint outside Russia.

So, okay, take this scenario:

  • IP A, user inside Russia.

  • IP B, VPS outside Russia.

  • IP C, service inside Russia that state can monitor.

User in Russia on IP A has an SSH tunnel to VPS on IP B with SOCKS that they control.

That’s fine as long as user is only browsing the Internet outside Russia. But if you’re routing all traffic through the VPS and you use any sites in Russia, the Great Russian Firewall can see the following:

  1. IP A has a long-running SSH connection to IP B.

  2. IP B is accessing stuff in Russia.

You could maybe also do heavier-weight traffic analsysis on top of that if you see 1 and 2, or gather data over a longer period of time, but seeing 1 and 2 alone are probably enough to block IP A to IP B connections.

That can be defeated by using two external VPSes, opening an SSH tunnel to the first one, and then talking to SOCKS on the second (maybe with another SSH connection linking the two). But that’s increasing complexity and cost.

permalink
report
parent
reply
12 points

This is actually pretty interesting, thanks for sharing. Although i live in a third world country that doesnt care about anything at all including piracy, but this tunneling thing looks pretty handy

permalink
report
parent
reply
6 points
*

Couldn’t you also just set the VPN to use port 443?

E: Apparently this isn’t enough. IE, for Wireguard, you would need to find a way to obfuscate the handshake.

permalink
report
parent
reply
2 points

I’m not 100%, but I think you could set this up for free with an Oracle AlwaysFree tier VM.

(Boo Oracle, yes I know. Still very handy.)

permalink
report
parent
reply
4 points

Just looked up Oracle Always Free… Good to know about, thanks!

permalink
report
parent
reply
121 points
Deleted by creator
permalink
report
reply
216 points

Blocking all encrypted traffic… fantastic suggestion comrade, I’ll forward this on to the Kremlin. Also, you’ve been drafted.

permalink
report
parent
reply
-49 points

I suppose with “comrade” you are hinting at Soviet customs, but Russia isn’t the USSR and couldn’t be further from being socialist

permalink
report
parent
reply
44 points

Settle down, it was a joke

permalink
report
parent
reply
3 points

what

permalink
report
parent
reply
1 point
*
Deleted by creator
permalink
report
parent
reply
-1 points

Russia isn’t the USSR but it is heading towards the USSR ways, and it’s already there in many aspects. It’s not just on a technical definition, a lot of pro-war and nationalist rhetoric is rooted in the old USSR culture.

The USSR wasn’t socialist, it was communist. And yes I know, it wasn’t real communism because real communism is a utopia.

permalink
report
parent
reply
-5 points

Oh please. In all the ways that matter, it is identical.

permalink
report
parent
reply
81 points
*

It’s a custom protocol that uses SSL/TLS for key exchange and such, so it can be detected. It’s actually causing huge problems for many large Russian companies, as it’s common to use those protocols for remote access, work, etc.

As mentioned in the article you need something like “Shadowsocks” to avoid protocl blocking, since it fully disguises the traffic as standard SSL/TLS. Which was created for, and is still used to circumvent this type of blocking in “the great firewall of china”.

permalink
report
parent
reply
34 points

https://security.stackexchange.com/questions/187649/is-it-possible-to-detect-vpn-in-the-network

tl;dr: You can infer that OpenVPN is used from the key exchange somehow.

permalink
report
parent
reply
6 points
*
Deleted by creator
permalink
report
parent
reply
2 points
*

Unless the whole of the inner IP packet is encrypted,

It is, because they’re inside an encrypted stream of data.

The way OpenVPN works is this:

  1. OpenVPN establishes a TLS connection to the OpenVPN server.

  2. Your computer’s kernel generates an IP packet.

  3. OpenVPN sucks that up, shoves it into the TLS connection. That connection is encrypted, so the network provider cannot see inside it, know whether the data is IP packets or anything else, though I suppose maybe traffic analysis might let one classify a connection as probably being a VPN.

  4. The data in that connection is broken up into IP packets, went to the OpenVPN server.

  5. The OpenVPN server decrypts the data in the TLS stream, pulls the original IP packets out.

So the original packets are always encrypted when the network sees them. Only the OpenVPN server can see the unencrypted packet you originally sent.

What @raltoid is saying sounds plausible, though I can’t confirm it myself off-the-cuff – that OpenVPN is detected by looking at somehing unique in the initial handshake.

permalink
report
parent
reply
2 points

VPN detection is simple: track new encrypted connections outside of Russia, connect to the same server, check if it replies as a VPN server. If it does, block the shit out of it. No need for packet inspection or any voodoo.

permalink
report
parent
reply
5 points

Yes there is a difference between https traffic.

permalink
report
parent
reply
4 points

There’s still headers and it’s fairly trivial to block using packet analysis. Using other protocols such as SSH tunneling may work (until they try to ban that I suppose). There’s always way around these kind of blocks, it’s a cat and mouse game.

permalink
report
parent
reply
3 points
*

Is OpenVPN not just SSL traffic?

It’s not, it’s an IPSec VPN by default which runs over UDP. You can run it via TCP and it operates over the same port as HTTPS (443), but it’s not the same protocol and can be differentiated that way.

A way around this would be to run an SSLVPN with a landing page where you log in instead of using an IPSec VPN or a dedicated SSLVPN client.

Another way around it would be to create a reverse SSH tunnel on a VM/VPC in another country/state and send all your traffic through that.

permalink
report
parent
reply
5 points
*

Is OpenVPN not just SSL traffic?

It’s not, it’s an IPSec VPN by default which runs over UDP. You can run it via TCP and it operates over the same port as HTTPS (443), but it’s not the same protocol and can be differentiated that way.

I think that either I’m misunderstanding what you’re aiming to say, or that this is incorrect.

OpenVPN can run over UDP or TCP, but it’s not IPSec, not even when running over UDP. IPSec is an entirely separate protocol.

permalink
report
parent
reply
110 points

Shithole country

permalink
report
reply
47 points

Worse: shithole country that turns everything they touch into shit too.

permalink
report
parent
reply
-5 points
*

Bootlicking simply comes naturally to the Russian culture.

Edit: my apologies to the Russian brothers and sisters still fighting the good fight by blowing up Putin’s shit.

permalink
report
parent
reply
10 points
*
Deleted by creator
permalink
report
parent
reply
-6 points

Racism comes naturally the Anglo brainpan.

Edit: My apologies to my Anglo brothers and sisters still fighting the good fight and blowing up US government property.

permalink
report
parent
reply
90 points
Removed by mod
permalink
report
reply
19 points

But also laws don’t really matter in Russia.

permalink
report
parent
reply
8 points

well 😅

permalink
report
parent
reply
8 points

I’d appreciate a source for that statement. :o

permalink
report
parent
reply
27 points
Removed by mod
permalink
report
parent
reply
5 points
*

IIRC Pakistan also do this (vpn is blocked by default and you’ll need to submit documentation to justify using VPN if you want to use VPN in your company), though their main reason is to reduce VoIP spammers.

permalink
report
parent
reply
2 points

I see! So, to quote the sources you provided:

“Despite widespread speculation, the law does not directly ban the operation of VPNs and anonymisers. However, it does restrict access to banned websites with the help of these tools.”

I.e. the VPN providers themselves are not illegal, though the VPN providers technically have to not allow users to access content listed by rospotrebnadzor. That’s responsibility on the side of the providers, not a ban on use. Practically speaking it still is attempting to censor content, but neither of the three sources claim that VPN use is illegal in Russia.

permalink
report
parent
reply
-8 points

This is not accurate information. VPN usage is not banned.

permalink
report
parent
reply
-13 points

Using is not illegal

permalink
report
parent
reply
27 points
*
Removed by mod
permalink
report
parent
reply
-7 points

Illegal to show how bypass bans, it is allowed to use VPNs

permalink
report
parent
reply
72 points

But how are their propaganda farms going to be able to pretend they are in your country now?

permalink
report
reply
34 points

They still get to operate don’t worry!!

permalink
report
parent
reply
15 points

official companies are still able to use vpn 😏

permalink
report
parent
reply
3 points

Exemptions that only apply rules to the common people. Maybe device registration with an exception using ipv6 address

permalink
report
parent
reply
-44 points

Maybe they don’t actually have all those propaganda farms that the dems were crying about, did that thought cross your mind?

permalink
report
parent
reply
24 points

Before it was widely reported, Twitter’s geocoding feature showed a ton of Russian-based accounts posing as “Americans” and only discussing politics. Would love to see lemmy be more transparent about accounts posting here too, tbh.

permalink
report
parent
reply
3 points
*

In all honesty, I would expect at least an organized troll farm to use VPNs ending outside Russia.

Random people in Russia might just act directly, but it’s a red flag that’s easy to pretty-inexpensively eliminate.

googles

It sounds like at least the Internet Research Agency troll farm used VPNs.

https://www.bbc.com/news/technology-43093390

According to court documents, the IRA took several measures to hide its tracks, duping the technology companies who were unaware, or unable, to stop what was filtering through their systems.

The key - and obvious - move was to hide the fact that these posts were coming from Russia. For that, the IRA is said to have used several Virtual Private Networks - VPNs - to route their operations through computers in the US. The operatives allegedly used stolen identities to set up PayPal accounts using real American names.

permalink
report
parent
reply
-7 points

I’d say you probably want to check my geolocation?

permalink
report
parent
reply
5 points
*

They exist. Inform yourself on the Internet Research Agency, one of Russia’s state sponsored troll farms. A handful of their activities are well documented in factual records. ‘Dems’ weren’t crying about it, every rational person who doesn’t want foreign interference and disinformation flooding our spaces is concerned about it. This should not be a partisan issue whatsoever.

permalink
report
parent
reply
3 points

Yeah, I don’t even really have a problem with RT, as long as it’s labeled so that people understand that it’s the Russian state speaking. But a lot of forums rely more-or-less on the idea that people are more-or-less good faith actors. Very large scale efforts to have people pretend to be someone else and make non-good-faith arguments is something that I think that a lot of our forums can’t today handle well.

Arguably, that’s a technical problem that needs to be fixed in some way.

permalink
report
parent
reply
1 point
*

Sadly, but we have. There is a big propaganda campaign have been raised for the last 2 years. It was here before but not in a such huge amount.

permalink
report
parent
reply
1 point

Maybe, but get fucking real.

permalink
report
parent
reply

Technology

!technology@lemmy.world

Create post

This is a most excellent place for technology news and articles.


Our Rules


  1. Follow the lemmy.world rules.
  2. Only tech related content.
  3. Be excellent to each another!
  4. Mod approved content bots can post up to 10 articles per day.
  5. Threads asking for personal tech support may be deleted.
  6. Politics threads may be removed.
  7. No memes allowed as posts, OK to post as comments.
  8. Only approved bots from the list below, to ask if your bot can be added please contact us.
  9. Check for duplicates before posting, duplicates may be removed

Approved Bots


Community stats

  • 16K

    Monthly active users

  • 12K

    Posts

  • 552K

    Comments