I'm curious. How does a state actor do actual DPI without pushing certs to end user devices?

The "inspection" part of DPI isn't limited to encrypted payloads. It's straightforward enough to look at application-level protocol headers and identify e.g. a Wireguard or OpenVPN or SSH connection, even if you can't decrypt the payload. That could be used as sufficient grounds to either block the traffic or punish the user.

I thought OpenVPN simply opens a TLS encrypted connection. How does it look different than HTTPS?

Network fingerprinting, like https://github.com/FoxIO-LLC/ja4

Pushing certs to end user devices is simple. First you create your own national CA. Then you make all government services use TLS certificates signed by the national CA. Then you make phone vendors preinstall the root cert of the national CA into the trust store if they want to sell them in your country. Then you make your ISPs buy and install MITM appliances.

We have different definitions of simple.

This is not that complicated for a state actor.

There are a couple of ways.

The main one is called an Eclipse Attack in cyber circles, and it can be done at any entity operating at the ASN layer so long as they can position themselves to relay your traffic.

The adversary can invisibly (to victim PoV) modify traffic if they have a cooperating rootPKI cert (anywhere in the ecosystem) that isn't the originating content provider, so long as they recognize the network signature (connection handshake); solely by terminating encryption early.

Without a cert, you can still listen in with traffic analysis, the fetched traffic that's already been encrypted with their key (bit for bit), as known plaintext the math quickly reduces. SNI and a few other artifacts referencing the resources/sites are not part of the encrypted payload.

Its more commonly known in a crypto context, but that kind of attack can happen anywhere. It even works against TOR. One of the first instances (afaik) was disclosed by Princeton researches in 2015, under the Raptor paper.

I've studied and worked in computer security for over a decade and have never heard of an "eclipse attack" before. Is this blockchain specific terminology? It seems like an adversarial network partition?

> It seems like an adversarial network partition

plus an MITM attack, if I understand correctly.

I've been a SA Generalist for a decade, primarily in biopharma. This is the terminology the people I worked alongside used which included both Network and Computer Engineers.

It was explained to me that its just another version of MITM, the only difference is the number of resilient paths that need to be compromised. Eclipse type of attacks focus on compromising multiple nodes and most deal with breaking consensus algorithmic based software, which is quite common of blockchain, but that isn't the only place.

TL;DR In a single path graph you have MITM, in a N-path graph of connectivity you have Eclipse. Two heads of the same coin.

Loosely I guess it would be considered an adversarial network partition at the ASN/BGP level. For active attacks you'd have to broadcast improperly, but for regional attacks at the ASN level you just have to be positioned correctly passively. That's why the whole AT&T room for the NSA back in the day was such a big deal. A lot of these attacks have been known about for a long time.

For instance, the same kind of attack could easily be done by compromising firmware within 1-step away from edge devices (Modems/Routers/ISP TFTP servers).

Quite a lot of what was in the nationstate war-chest 10 years ago has been leaked, and is actively being used by non-state actors at this point.

Its mad how sophisticated things are now. On some campuses, its not unheard of to see drones flying by to hack the radio logitech keyboards of campus computers; where they try to drop malware OTA through a powershell or tty keyboard spawned terminal prompt. Crazy stuff.

> Its mad how sophisticated things are now. On some campuses, its not unheard of to see drones flying by to hack the radio logitech keyboards of campus computers; where they try to drop malware OTA through a powershell or tty keyboard spawned terminal prompt. Crazy stuff.

This is actually crazy indeed. At least you can still use corded keyboards or BT ones (until the day there is some 0-day on BT pairing...)

> until the day there is some 0-day on BT pairing

Early versions of BT that's already true. AFAIK, 4.2, 5, 6 are still safe. Though there has been a lot of activity I haven't followed this year wrt 4.2, so that may be dated.

[deleted]

DPI refers to a broad class of products which attempt to find signals and categorize traffic according to a ruleset, either to block it or throttle the speeds, etc.

While access to plaintext is useful, it's not required for other rules which are eg looking at the timing and frequency of packets.

Because you are leaking information left and right with TCP / DNS and all these basic protocols that powering the internet today. When these were designed people were happy that it worked at all and nobody really tought that it should be state actor proof. Except maybe DJB. https://www.curvecp.org/

Patterns of data transmission (network behavioral analysis, I just made that term up), analyzing IP and ports, inspecting SSL handshakes for destination site. In short, metadata.