lib·erate's TTL-limited inert packet insertion—sending a decoy packet with TTL set to expire at the middlebox but carrying a misclassifying payload—successfully evades classification in a carrier-grade testbed DPI device, T-Mobile's Binge On, and the Great Firewall of China, but fails against Iran's censor and AT&T (Table 3). When bilateral server support is available, inserting a single dummy packet at flow start evades classification in all four deployments.
From 2017-li-lib-cdot-erate — lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently
· §4.3, Table 3
· 2017
· Internet Measurement Conference
Implications
Insert a TTL-limited decoy packet carrying benign application-layer content before the identifying payload to exploit match-and-forget middleboxes that cannot distinguish packets expiring in-path from those reaching the server.
Design proxy handshakes to send one innocuous leading packet that causes match-and-forget classifiers to mis-classify the flow before real protocol bytes appear; overhead is O(1) extra packets.