In Iran in 2013, censors dropped or throttled certain TCP connections after 60 seconds, severely disrupting circumvention protocols like obfs4 that fuse session state with a single long-lived TCP connection, while short-lived HTTP connections were largely unaffected. obfs4 has no session concept independent of the underlying TCP connection; when that connection is terminated, all end-to-end state is lost and a new session must restart from scratch.
From 2020-fifield-turbo — Turbo Tunnel, a good way to design censorship circumvention protocols
· §1
· 2020
· Free and Open Communications on the Internet
Implications
Protocols that rely on a single long-lived TCP connection are acutely vulnerable to connection-duration-based throttling; a session layer that reconnects and retransmits transparently is the direct countermeasure.
Include fixed-duration TCP termination (e.g., after 60 s) as a standard evaluation case when testing circumvention tools, not only full blocking.