Port-scanning 10,000 randomly selected non-China IPs found 1,213 (12.1%) acceptable as VoIP dummy hosts (SIP, RTP, RTCP ports not in 'closed' or 'host seems down' states). Of 100 sampled dummy hosts tracked over time, over 90% remained usable for more than 2 hours and over 80% for more than 6 hours; the total usable pool was stable across a 7-day measurement window (Feb. 9–16, 2012).
From 2012-wang-censorspoofer — CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
· §7.2.2
· 2012
· Computer and Communications Security
Implications
Maintain a pre-scanned, continuously refreshed dummy-host list using nmap port-state heuristics ('open' or 'filtered/open'); the 12.1% yield from random IPs provides an ample, stable supply.
Restrict dummy-host assignment to entries whose predicted AS path to the client is consistent with the spoofer's traceroute reference path, to preempt censor AS-path ingress-consistency checks.