FINDING · EVALUATION

A low-bandwidth attacker can sustain indefinite availability attacks by periodically re-triggering residual censorship: China's 3-tuple HTTP system requires only 4 spoofed packets every 3 minutes. For 4-tuple systems requiring full source-port coverage (65,535 ports), Kazakhstan needs 1,093 packets/sec (~634 kbps HTTP) and Iran needs 729 packets/sec (~422 kbps HTTP)—achievable with commodity hardware. Iran achieved 100% attack success against all 17 geographically disparate victim vantage points tested.

From 2021-bock-yourYour Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks · §V.B, §VI · 2021 · Workshop on Offensive Technologies

Implications

Tags

censors
cnirkz
techniques
ip-blockingrst-injection

Extracted by claude-sonnet-4-6 — review before relying.