The GFW blocks Tor primarily via stateless SYN/ACK dropping based on the server's source IP address and port (server-to-client direction, 73.04% of CN,Tor-dir cases). Two specific Tor directory authorities account for 98.8% of client-to-server (null-routed) blocks and 72.7% of error cases, indicating selective deeper blocking of specific IP addresses beyond the common return-path filter.
From 2014-ensafi-detecting — Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels
· §5
· 2014
· Passive and Active Measurement Conference
Implications
Rotating server IP addresses or using IP addresses not yet in the GFW's null-route list exploits the asymmetry between the common stateless filter (easy to update) and the rarer null-route enforcement (applied to only a subset of IPs).
The server-to-client direction of most blocking means that techniques hiding the server's true source IP—such as domain fronting or decoy routing—can defeat the most prevalent GFW Tor-blocking mechanism.