Censoring middleboxes predominantly use RST injection rather than in-path packet dropping because injecting forged RST/RST+ACK packets does not require the middlebox to sit in the data path — off-path copies of packets suffice. The GFW specifically injects both RST and RST+ACK packets simultaneously after an offending PSH, a known idiosyncratic signature, while Iran's censor uses post-handshake RST injection (⟨SYN;ACK→RST⟩) and packet drops at the same stage.
From 2023-raman-global — Global, Passive Detection of Connection Tampering
· §2.1, §4.1
· 2023
· SIGCOMM
Implications
UDP-based transports (QUIC, Hysteria 2, WireGuard variants) are immune to TCP RST injection by construction; where latency permits, this is one of the strongest structural evasions available.
For TCP-based transports, using TLS with ECH eliminates the plaintext SNI that triggers most Post-PSH RST signatures; without a cleartext trigger the censor falls back to IP blocking or active probing.