FINDING · EVALUATION
Using TCP IPID side channels combined with SYN backlog state inference, the authors detect intentional packet drops between two arbitrary Internet hosts without controlling either host. The only requirements are a client with a globally incrementing IPID (~1% of IP space) and a server with an open port; an ARMA model handles autocorrelated noise.
From 2014-ensafi-detecting — Detecting Intentional Packet Drops on the Internet via TCP/IP Side Channels · §2 · 2014 · Passive and Active Measurement Conference
Implications
- Circumvention tool operators can use this technique to passively audit whether their server IPs are being blocked for specific client populations without deploying probes inside censored networks.
- The directional attribution (server-to-client vs. client-to-server) reveals which layer of the blocking stack to target: stateless return-path filters versus null-routed destination IPs.
Tags
Extracted by claude-sonnet-4-6 — review before relying.