FINDING · DETECTION

Both GFW and GC injected packets share a distinctive implementation side-channel: the IP TTL field progressively increments on successive packets injected into the same connection, paired with an incrementing TCP window size. Using this compound fingerprint, the authors identified GC activity in 8 months of Lawrence Berkeley National Laboratory enterprise border traces with only a single false-positive source IP, and used per-hop TTL probing to localize both the GFW and GC to the same network link on China Telecom (hop 12–13, 144.232.12.211→202.97.33.37) and China Unicom (hop 17–18, 219.158.101.61→219.158.101.49).

From 2015-marczak-analysisAn Analysis of China's ``Great Cannon'' · §3.1, §4, §6 · 2015 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
packet-injectionrst-injection

Extracted by claude-sonnet-4-6 — review before relying.