Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly regulated information control policies. Existing reports of filtering in Turkmenistan rely on a small number of vantage points or test a small number of websites. Yet, the country's poor Internet adoption rates and small population can make more comprehensive measurement challenging. With a population of only six million people and an Internet penetration rate of only 38%, it is challenging to either recruit in-country volunteers or obtain vantage points to conduct remote network measurements at scale. We present the largest measurement study to date of Turkmenistan's Web censorship. To do so, we developed TMC, which tests the blocking status of millions of domains across the three foundational protocols of the Web (DNS, HTTP, and HTTPS). Importantly, TMC does not require access to vantage points in the country. We apply TMC to 15.5M domains, our results reveal that Turkmenistan censors more than 122K domains, using different blocklists for each protocol. We also reverse-engineer these censored domains, identifying 6K over-blocking rules causing incidental filtering of more than 5.4M domains. Finally, we use Geneva, an open-source censorship evasion tool, to discover five new censorship evasion strategies that can defeat Turkmenistan's censorship at both transport and application layers. We will publicly release both the data collected by TMC and the code for censorship evasion.
翻译:自 2006 年以来,突库曼斯坦由于其广泛审查互联网和严格监管信息控制政策,已被无国界记者列为少数互联网敌人之一。现有的突库曼斯坦过滤报告依赖于少量的观察点或测试少量的网站。然而,该国的互联网普及率较低,人口数量不多,可能会使更全面的测量变得具有挑战性。由于人口只有六百万人,互联网普及率只有 38%,因此很难在国内招募志愿者或获得足够的观察点以进行远程网络测量。我们展示了突库曼斯坦 Web 审查最大的测量研究成果,开发了 TMC,测试数百万个该国 Web 的三个基本协议(DNS、HTTP 和 HTTPS)的阻断状态。重要的是,TMC 不需要获取国内的观察点。我们对 1550 万个域名应用 TMC,结果表明突库曼斯坦封锁了超过 12 万个域名,并为每个协议使用不同的封锁列表。我们还翻译了这些被审查的域名,并确定了超过 6K 的过度阻止规则,导致意外过滤 540 万个域名。最后,我们使用 Geneva,一个开源的审查逃避工具,发现了可以在传输和应用层上击败突库曼斯坦审查的五个新的审查逃避策略。我们将公开 TMC 收集的数据和规避审查的代码。