This document describes technical mechanisms employed in network censorship that regimes around the world use for blocking or impairing Internet traffic. It aims to make designers, implementers, and users of Internet protocols aware of the properties exploited and mechanisms used for censoring end-user access to information. This document makes no suggestions on individual protocol considerations, and is purely informational, intended as a reference. This document is a product of the Privacy Enhancement and Assessment Research Group (PEARG) in the IRTF.
A development library that allows the programmer to readily manipulate IP addresses, the ARP cache, the system routing table, and packet filtering rules. It also makes it easy to manipulate IP tables and construct and send IP packets and Ethernet frames.
Twelve simple truths (and a couple of corollaries) about networks, networking, and network protocols.