FINDING · DEFENSE

Using Geneva's genetic algorithm trained against Iran's live protocol filter, four evasion strategies achieving 100% success were discovered in under two hours: (1) injecting a fingerprint-matching PSH/ACK with a corrupt checksum before the real data; (2) sending two FIN packets before the SYN; (3) sending nine non-data-carrying packets (any flags, any seq/ack) during the handshake to exhaust the filter's per-flow packet limit; (4) a server-side variant that sends nine corrupted SYN+ACKs, inducing nine client RSTs before the real ACK, enabling fully unmodified clients to benefit.

From 2020-bock-detectingDetecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter · §5.2–§5.3 · 2020 · Free and Open Communications on the Internet

Implications

Tags

censors
ir
techniques
dpimiddlebox-interference
defenses
genevapluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.