Evasion attacks generated against one firewall-deployment combination do not transfer well to other settings: a deployment-agnostic approach (used by censorship circumvention tools) fails to generate effective attacks across diverse victim stacks and attacker capabilities. Pryde's deployment-aware, modular workflow finds successful attacks across configurations with and without insider threats, and against multiple attacker success criteria (data delivery vs. victim ACK vs. attacker receipt of ACK).
From 2024-moon-pryde — Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
· §1 Introduction (Finding 7), §3.2
· 2024
· Symposium on Security \& Privacy
Implications
Circumvention protocols must be validated against the specific firewall + OS-stack combination a target censor deploys — strategies that work against one ISP's infrastructure may fail at another using a different vendor even with identical blocking rules.
Model the full deployment topology (including weakly-trusted internal hosts that can spoof packets) when reasoning about censor evasion; insider-threat-style packet injection paths exist in segmented networks and are missed by client-only evasion tools.