Since 2006, Turkmenistan has been listed as one of the few Internet enemies by Reporters without Borders due to its extensively censored Internet and strictly regulated information control policies. Existing reports of filtering in Turkmenistan rely on a small number of vantage points or test a small number of websites. Yet, the country's poor Internet adoption rates and small population can make more comprehensive measurement challenging. With a population of only six million people and an Internet penetration rate of only 38%, it is challenging to either recruit in-country volunteers or obtain vantage points to conduct remote network measurements at scale. We present the largest measurement study to date of Turkmenistan's Web censorship. To do so, we developed TMC, which tests the blocking status of millions of domains across the three foundational protocols of the Web (DNS, HTTP, and HTTPS). Importantly, TMC does not require access to vantage points in the country. We apply TMC to 15.5M domains, our results reveal that Turkmenistan censors more than 122K domains, using different blocklists for each protocol. We also reverse-engineer these censored domains, identifying 6K over-blocking rules causing incidental filtering of more than 5.4M domains. Finally, we use Geneva, an open-source censorship evasion tool, to discover five new censorship evasion strategies that can defeat Turkmenistan's censorship at both transport and application layers. We will publicly release both the data collected by TMC and the code for censorship evasion.
翻译:自2006年以来,由于其广泛审查互联网和严格的信息管制政策,土库曼斯坦被记者无国界罪名单列为少数互联网敌人之一。土库曼斯坦的过滤报告依赖于少数几个视角或测试少数网站。然而,该国的互联网采用率低,人口少,很难进行更全面的测量。由于该国只有600万人口和38%的互联网渗透率,招募国内志愿者或获得可大规模进行远程网络测量的视角具有挑战性。我们提出了迄今为止对土库曼斯坦网络审查的最大测量研究。为此,我们开发了TMC,该测试程序测试网络的三个基本协议(DNS、HTTP和HTTPS)上的数百万个域名的阻止状态。重要的是,TMC不需要访问该国的视角。我们将TMC应用于1550万个域,其结果显示土库曼斯坦审查了超过122K个域,使用每个协议的不同阻止列表。我们还反向工程这些审查域,识别出6K个过滤规则,导致意外过滤超过540万个域。最后,我们使用开放源代码的审查逃避工具Geneva,发现了五种新的审查逃避策略,可以在传输和应用层上打败土库曼斯坦的审查。我们将公开发布TMC收集的数据和规避审查的代码。