TCP segment splitting and out-of-order delivery evades DPI classification in the testbed, T-Mobile, and Iran, but fails against the GFC—which performs extensive packet validation and correctly reassembles reordered streams—and AT&T, which uses a transparent HTTP proxy that normalizes all traffic before inspection. Payload splitting to one byte in the first packet is sufficient to defeat packet-count-limited classifiers.
From 2017-li-lib-cdot-erate — lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
· §4.3, Table 3
· 2017
· Internet Measurement Conference
Implications
TCP segment fragmentation is a viable unilateral evasion technique for Iran and most commercial ISP middleboxes but must be combined with other mechanisms against the GFW, whose packet-validation completeness defeats reordering attacks.
Do not rely on segment-reordering alone as a GFW bypass; layer TTL-limited inert insertion or classification flushing on top, since the GFW's reassembly correctness is the documented differentiator.