FINDING · DEFENSE

HTTP Request Smuggling—a web-security vulnerability that exploits CL/TE header parsing ambiguities between a front-end (censor) and back-end (web server)—can be systematically repurposed as a censorship circumvention technique. By hiding a censored Host in the body of a benign outer request, the censor parses only the uncensored outer request while the destination server processes both, successfully bypassing HTTP censorship in China (19 vectors), Iran (254 vectors), and Russia (all 2,015 vectors) from the evaluated vantage points.

From 2024-m-ller-turningTurning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling · §3 / §8 · 2024 · Free and Open Communications on the Internet

Implications

Tags

censors
cnirru
techniques
dpikeyword-filteringpacket-injection
defenses
genevapluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.