Collin Anderson Profile picture
Oct 5 8 tweets 6 min read
There has been significant attention to Iran's internet blackouts.

Time to dig into what's happening inside Iran, and whether outsiders can help. What I found was surprisingly chaotic, nightmarish.

An ongoing thread. #MahsaAmini #IranProtests2022 #مهسا_امینی #OpIran #KeepitOn
Overall, as many have noted, Iran has essentially been under an Internet curfew since September 21 (until possibly yesterday).

Every afternoon around 4pm local time until midnight, traffic from Iran would drop precipitously, across the board.

Image
The first finding: despite heavy investments in censorship, Iran still does not seem to have a central, single kill switch.

Instead, each ISP seems to have their own tactics for cutting off access. The Telecommunication Company of Iran (TCI) then is a fallback for censorship. ImageImageImageImage
For example, the mobile carrier Rightel, would every evening disappear half their IP addresses from the global Internet, making them unreachable (i.e. withdraw from BGP). From Rightel's descriptions, those are IPs for 3G/4G service.

Its competitors Irancell and MCI, do not. ImageImage
Instead, others are either blocking web traffic or using deep packet inspection to restrict access.

For example, DSL provider Asiatech appears to be interfering with DNS queries. Irancell seems to be both interfering with HTTP traffic, and sometimes dropping all traffic. ImageImageImageImage
One big caveat —

Actually, those millions of Rightel customers can still reach domestic websites.

That's because. while Rightel cut them off from the global internet, it was still announcing them to other Iranian networks. Other ISPs seem to exempting domestic traffic too. ImageImage
The longtime nightmare of Iran being able to cleanly/quickly disconnect from the global internet, while keeping the censored domestic internet online, appears to have true.

This appears across different ISPs, e.g. Irancell. Image
Appears TCI has stepped up its filtering at the international gateway. This is Iran's more sophisticated backstop.

On Sept 22nd, connections to Cloudflare using QUIC went to near zero instantaneously across ISPs. Probably only happens if TCI is doing it, probably based on DPI? Image

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Collin Anderson

Collin Anderson Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @CDA

Dec 21, 2017
(Thread) Never going to be able to do anything with this, so here's a free research lead: in 2016, when sinkholing the Infy malware, I noticed an IP prefix would repeat beacons from Iran a few days after. Someone was parroting Iranian malware infected communications.
This was interesting because the beacons came from a diverse set of ASs, which means the actor had a lot of records of Iranian Internet traffic.
The prefix was small and led to Sahab Pardaz Co., a networking service firm that seemed interested in big data and security.

(Archive Screenshots) ImageImage
Read 6 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(