FINDING · DEFENSE

Switching source IP via VPN, Tor, or HTTP proxy is the primary victim-side mitigation because residual censorship is tuple-keyed; however, if the proxy entry node's path also crosses the censor, the attacker can redirect the attack at the proxy itself. On the censor side, null-routing middleboxes could eliminate the vulnerability by validating TCP sequence/acknowledgment numbers before dropping traffic, or by replacing null routing with an explicit block-page response.

From 2021-bock-yourYour Censor is My Censor: Weaponizing Censorship Infrastructure for Availability Attacks · §VII · 2021 · Workshop on Offensive Technologies

Implications

Tags

censors
cnirkz
techniques
ip-blockingrst-injection
defenses
tortunnelingbridges

Extracted by claude-sonnet-4-6 — review before relying.