FINDING · DETECTION

Iran's protocol filter monitors only the first two data-carrying packets of a TCP connection on ports 53, 80, and 443, permitting only DNS, HTTP, and HTTPS. Once tripped, it drops all subsequent client-side packets for 60 seconds, with the timer resetting on each TCP retransmit. The filter is unidirectional (client-inside-Iran only), cannot reassemble TCP segments, and does not verify checksums.

From 2020-bock-detectingDetecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter · §4.1 · 2020 · Free and Open Communications on the Internet

Implications

Tags

censors
ir
techniques
dpiport-blocking

Extracted by claude-sonnet-4-6 — review before relying.