The word for today: cybersovereignty.
This is a largely a list of suggested references.
The plain firewall
- Internet Firewall Essentials
- What a simple IP firewall can use to filter
- Protocol — TCP, UDP, ....
- source and destination host
- source and destination port
- TCP codes — SYN and ACK
- What a complex IP firewall can use to filter
- TCP data segments
The Great Firewall of China
- Online Censorship In China
- ConceptDoppler: A Weather Tracker for Internet Censorship
- How the
great firewall works
- out-path searches of TCP streams
- injected RST packets to shut down TCP connections
- a lot of computers
- strong discouragement of HTTP Secure (https)
The Great Cannon of China
- GitHub battles “largest DDoS” in site’s history, targeted at anti-censorship tools
- Baidu’s traffic hijacked to DDoS GitHub.com
- Using Baidu to steer millions of computers to launch denial of service attacks
- How the
great cannon works
- in-path searches of TCP streams
- mostly looked for web references for Baidu JavaScript
- typically analytics JavaScript (cf., Google Analytics)
- HTTP hijacking returns substituted (and obfuscated) JavaScript code
- JavaScript cause DDOS attack on GitHub sites
- in-path searches of TCP streams