China's censoring device is stateful: it inspects only the first HTTP GET request after a TCP handshake and ignores subsequent requests or those without a preceding handshake. After blocking a request, it records the (src IP, dst IP, port, protocol) tuple and denies all further communication between that machine pair for approximately 12 hours, even for traffic that would not independently trigger censorship.
From 2012-verkamp-inferring — Inferring Mechanics of Web Censorship Around the World
· §4.3
· 2012
· Free and Open Communications on the Internet
Implications
Rotate the client-side source address or establish a fresh transport connection immediately after any potential keyword exposure, since a single flagged request triggers a ~12-hour IP-pair blackout.
Ensure circumvention payloads never appear in the first HTTP GET of a raw TCP connection — subsequent requests in the same stream are not inspected by the Chinese stateful device.