The paper proves that any network IDS operating without maintaining complete, OS-specific per-connection state cannot reliably reconstruct the byte stream seen by the end-system. TCP and IP reassembly ambiguities guarantee unavoidable blind spots unless the IDS performs full per-target OS emulation—a fundamental architectural limitation, not an implementation bug, that applies equally to any DPI-based censor.
From 1998-ptacek-insertion — Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection
· §5
· 1998
Implications
Design circumvention protocols to structurally trigger TCP/IP reassembly ambiguities (out-of-order delivery, overlapping fragments, TTL-limited decoys) as a baseline layer; no DPI censor can resolve these without full per-endpoint OS emulation.
Treat the censor's OS emulation strategy as an attackable assumption: probe to identify which reassembly model the censor implements, then target a different OS's divergent behavior.