TCP-compliant packet alphabets are insufficient for modeling stateful firewall evasion. Including non-TCP-compliant traffic — specifically flipped-direction SYNs, out-of-window seq/ack numbers, and packets that form a parallel TCP connection in the reverse direction — is what unlocks discovery of deep attack paths. Prior model-inference work (Alembic) that restricted itself to compliant sequences produced models incapable of generating any of the 6,000+ attacks Pryde found.
From 2024-moon-pryde — Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments
· §4.1–§4.2
· 2024
· Symposium on Security \& Privacy
Implications
Sending TCP packets with flipped directions or out-of-window sequence numbers can punch holes in censor stateful firewalls; circumvention protocols should test whether their handshake setup packets inadvertently exploit or are blocked by these censor states.
Any threat model of censor blocking behavior that assumes TCP compliance will miss large classes of exploitable middlebox states — treat non-compliant sequences as first-class evasion primitives.