FINDING · DETECTION

The GFW applies the fully-encrypted detector probabilistically and only to a targeted subset of IP address space. Each qualifying connection is blocked with probability p = 26.3% (geometric distribution fit over 109,489 affected IPs in a 10% IPv4 scan); residual censorship then blocks the same 3-tuple (client IP, server IP, server port) for 180 seconds after a first block. The detector only monitors ~26% of connections and targets specific IP ranges of popular data centers (VPS providers such as Alibaba US, Constant, DigitalOcean, Linode); large CDNs (Akamai, Cloudflare) and most residential/enterprise IPs are unaffected. 98% of scanned IPs were unaffected. Simulated on live university traffic, the rules would block ~0.6% of normal connections as collateral damage.

From 2023-wu-fully-encrypted-detectHow the Great Firewall of China detects and blocks fully encrypted traffic · §6, §6.3 · 2023 · USENIX Security

Implications

Tags

censors
cn
techniques
fully-encrypted-detectrandom-payload-detect

Extracted by claude-sonnet-4-6 — review before relying.