FINDING · EVALUATION

Post-trigger blocking persisted for an average of ~20 minutes (observed range: a few minutes to nearly an hour) per source-IP/destination-IP pair, but was scoped to the 128 TCP port numbers sharing the same 7 most-significant bits as the triggering connection's ephemeral port. On pseudo-random ephemeral-port systems such as OpenBSD, the probability of a subsequent connection falling in the blocked port range is only ~1 in 500; on sequential-port systems such as Windows, an average of 64 further connections are blocked.

From 2006-clayton-ignoringIgnoring the Great Firewall of China · §6.1 · 2006 · Privacy Enhancing Technologies

Implications

Tags

censors
cn
techniques
rst-injectionport-blocking

Extracted by claude-sonnet-4-6 — review before relying.