GFW instantiates a TCB upon observing a bare SYN before any SYN-ACK (TCP1), enabling a split-connection evasion: a client sends a low-TTL SYN visible to GFW but not the server, then opens the real connection on the same 5-tuple with a different initial sequence number. GFW tracks the phantom TCB and fails to detect banned keywords on the real, desynchronized connection. This same behavior also renders GFW vulnerable to SYN-flooding-style memory exhaustion.
From 2013-khattak-towards — Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion
· §5, Table 1 (TCP1)
· 2013
· Free and Open Communications on the Internet
Implications
Implement a split-handshake: send a low-TTL SYN to anchor GFW to a phantom ISN, then open the real connection with a different ISN on the same 5-tuple — GFW's sequence-number tracking is permanently desynchronized for the session.
This primitive requires raw-socket capability (or a cooperating kernel shim) but no server-side changes, making it practical for client-only circumvention tools.