FINDING · DETECTION
All 76 filters inspected only TCP traffic: sending the identical HTTP request over UDP bypassed censorship 100% of the time. Additionally, 17 of the 49 filters that censored requests to EC2 servers only inspected traffic on port 80 and passed through the same requests sent to port 9900 without modification. No filter triggered on URI query strings, so appending query parameters to any censored URL bypassed every tested filter.
From 2017-jermyn-autosonda — Autosonda: Discovering Rules and Triggers of Censorship Devices · §4.1 Mechanism · 2017 · Free and Open Communications on the Internet
Implications
- Circumvention transports that carry HTTP-like traffic over non-standard ports or non-TCP transports (e.g., QUIC/UDP) will evade a significant fraction of commercial web filters that only inspect TCP port 80.
- Appending a query string to any blocked URL is a trivially effective bypass against all tested blacklist-based filters — circumvention tools serving as transparent proxies should append dummy query parameters before forwarding requests.
Tags
Extracted by claude-sonnet-4-6 — review before relying.