FINDING · DETECTION

The GFW's fully-encrypted detector (deployed Nov 2021) operates by exempting likely-benign traffic and blocking the rest. Five inferred exemption rules applied to the first TCP payload (pkt): Ex1 — popcount(pkt)/len(pkt) ≤ 3.4 or ≥ 4.6 (bits/byte); Ex2 — first 6+ bytes are printable ASCII [0x20–0x7e]; Ex3 — more than 50% of bytes are printable ASCII; Ex4 — more than 20 contiguous printable ASCII bytes; Ex5 — first bytes match TLS or HTTP fingerprint. Traffic failing all five exemptions is blocked. Experiments confirmed all rules still held as of February 2023.

From 2023-wu-fully-encrypted-detectHow the Great Firewall of China detects and blocks fully encrypted traffic · §4, Algorithm 1 · 2023 · USENIX Security

Implications

Tags

censors
cn
techniques
fully-encrypted-detectdpirandom-payload-detect
defenses
shadowsocksvmessvlessobfs4

Extracted by claude-sonnet-4-6 — review before relying.