FINDING · DETECTION

GFW instantiates a TCB upon observing a bare SYN before any SYN-ACK (TCP1), enabling a split-connection evasion: a client sends a low-TTL SYN visible to GFW but not the server, then opens the real connection on the same 5-tuple with a different initial sequence number. GFW tracks the phantom TCB and fails to detect banned keywords on the real, desynchronized connection. This same behavior also renders GFW vulnerable to SYN-flooding-style memory exhaustion.

From 2013-khattak-towardsTowards Illuminating a Censorship Monitor's Model to Facilitate Evasion · §5, Table 1 (TCP1) · 2013 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
dpimiddlebox-interference
defenses
geneva

Extracted by claude-sonnet-4-6 — review before relying.