FINDING · DETECTION

The paper identifies three distinct GFW resynchronization-state triggers with protocol-specific behavior: (1) a server payload on any non-SYN+ACK packet causes resync on the next SYN+ACK or client ACK-flagged packet for all protocols; (2) a server RST causes resync on the next client packet for all protocols except HTTPS; (3) a SYN+ACK with a corrupted acknowledgment number triggers resync only for FTP. Strategy 1's 50% per-attempt success rate for HTTP is confirmed to result from the 50% probability of the GFW entering the resynchronization state on an injected RST, consistent with Wang et al. [36].

From 2020-bock-comeCome as You Are: Helping Unmodified Clients Bypass Censorship with Server-side Evasion · §5.1 · 2020 · SIGCOMM

Implications

Tags

censors
cn
techniques
dpirst-injectionmiddlebox-interference

Extracted by claude-sonnet-4-6 — review before relying.