Among the 44 non-DNS filters, 11 did not reassemble TCP segments and 7 did not reassemble IP fragments before inspection, meaning a censored URL split across segment or fragment boundaries evaded detection. Five filters applied fragment/segment reassembly timeouts of under 2 seconds despite maintaining HTTP request state for more than 8.5 seconds, creating a window where a deliberately fragmented flow with artificial delay avoids inspection entirely.
From 2017-jermyn-autosonda — Autosonda: Discovering Rules and Triggers of Censorship Devices
· §4.1 Mechanism
· 2017
· Free and Open Communications on the Internet
Implications
Circumvention tools operating at the TCP layer can split the censored portion of an HTTP request (e.g., the Host value) across TCP segments or IP fragments to defeat filters lacking reassembly — this is especially effective against ~25% of commercial filters that perform no reassembly at all.
Injecting a brief delay (>2 s but under the HTTP session timeout) between IP fragments carrying the sensitive URL causes an additional 11% of filters to time out and clear reassembly state, allowing the fragments through unchecked.