China's Great Firewall showed anomalous inconsistency: 13 test vectors produced mixed outcomes—TCP RST injection on some executions and a clean server response on others—with circumvention rates between 10% and 35% across 100 executions per vector. The authors attribute this to heterogeneous GFW infrastructure components applying different HTTP parsing logic, a departure from the GFW's usual consistency.
From 2024-m-ller-turning — Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
· §5.2
· 2024
· Free and Open Communications on the Internet
Implications
Circumvention tools targeting China should not assume uniform GFW behavior across all network paths; retry logic or multi-path probing is warranted since the same vector may work ~10–35% of the time even when it is not universally effective.
CL*/TE vectors with trailing line-feed injections (\0a) in the Content-Length value are the primary candidates that achieved partial GFW bypass and should be prioritized in further fuzzing against China.