FINDING · DETECTION

Iran's censor injects an HTTP block page consistently but contains an implementation bug: it fails to parse the TE header when a CL header with an invalid (non-integer) value is present, causing it to pass subsequent traffic. 254 of the evaluated test vectors circumvented Iran's censor; the 'Wrapping' CL*/TE strategy (e.g., 'Content-Length: <len>\u00FF\x0aX: X') was especially effective, exploiting this graceful-degradation fault.

From 2024-niere-http-smugglingTurning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling · §5.3 (Wrapping strategy, Iran discussion) · 2024 · FOCI 2024 (Free and Open Communications on the Internet)

Implications

Tags

censors
ir
techniques
dpipacket-injectionkeyword-filtering

Extracted by claude-sonnet-4-6 — review before relying.