Post-handshake tampering signatures (⟨SYN;ACK→RST⟩ and ⟨SYN;ACK→RST+ACK⟩) constitute 34.4% of tampered connections from Iranian networks, but over 70% from Sri Lanka networks and over 81% from Turkmenistan networks, suggesting that censors in the latter two countries disproportionately block at the IP/TCP-handshake level before any application-layer content is visible — consistent with IP-list-based blocking rather than SNI-based DPI.
From 2023-raman-global — Global, Passive Detection of Connection Tampering
· §4.1
· 2023
· SIGCOMM
Implications
In high-IP-blocking environments (Turkmenistan-style), domain-fronting or CDN-based transports do not help if the CDN's IP range is itself blocked; decoy routing or refraction networking that uses widely-allowed IP prefixes is a better fit.
Fingerprinting censors by their post-handshake vs. post-PSH signature distribution lets circumvention tools adaptively select transport: SNI-hiding techniques are sufficient where post-PSH signatures dominate, but IP-diverse strategies are needed where post-SYN/post-ACK signatures dominate.