Data

Kazakhstan’s HTTPS Interception Live (Again)

This page is updated with new data every 10 minutes.

Read Report

Data

Kazakhstan’s HTTPS Interception Live (Again)

This page is updated with new data every 10 minutes.

Read Report

In a repeat of its efforts from July-August 2019, Kazakhstan recently (starting from December 6, 2020) began using a new custom root CA (Information Security Certification Authority CA) to conduct man-in-the-middle (MitM) drills against HTTPS connections to websites including Facebook, Twitter, and Google. We have been tracking the interception, and in this page, we provide live results from our measurements of the Kazakh interception system.

Compared to the previous interception attempt in 2019, we observe through remote measurements that the scale of hosts inside Kazakhstan experiencing the interception has increased from ~7% in 2019 to ~11.5% in 2020. The list of domains targeted is similar to the one in 2019, consisting of Google, Facebook, Twitter, VK and mail.ru domains. Since major browser vendors blocked the use of the Qaznet Root certificate that was used in 2019, a new root CA has been established (ISCA), and the interception system has also seen updates.

Number of Vantages Observing MitM (Out of 7764 measured):

Domains Triggering MitM:

The following domains have triggered MitM in Kazakhstan in December 2020. The list is similar to the domains intercepted in July-August 2019.

google.com, youtube.com, facebook.com, vk.com, instagram.com, twitter.com, mail.ru, allo.google.com, android.com, cdninstagram.com, dns.google.com, docs.google.com, encrypted.google.com, goo.gl, mail.google.com, messages.android.com, messenger.com, news.google.com, ok.ru, picasa.google.com, plus.google.com, sites.google.com, tamtam.chat, translate.google.com, video.google.com, vk.me, www.youtube.com, www.messenger.com, www.google.com, www.facebook.com, www.instagram.com, groups.google.com, hangouts.google.com

Incrementing TTL Measurement: Hop before which response was received

The following table shows the Top 5 IPs at which injected responses were received. The Hop IPs are similar to the ones discovered in 2019.

Hop IP Number of Instances
95.56.243.92 133
95.59.170.57 50
95.59.170.53 42
95.59.172.89 6
91.185.1.86 6

© 2021 Censored Planet|Terms of Service