The Russian censor at the tested Moscow vantage point (ASN 50867, China Unicom-equivalent private ISP) inspects only the first HTTP packet of the first TCP segment in a TCP stream and never blocks a second HTTP request, whether coalesced in the same TCP packet or sent in a subsequent one. All 2,015 web-server-accepted test vectors evaded Russian censorship, including standard-compliant whitespace-injection vectors (e.g., 'Content-Length\x20: <len>\x20').
From 2024-niere-http-smuggling — Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling
· §5.2 (Russia paragraph)
· 2024
· FOCI 2024 (Free and Open Communications on the Internet)
Implications
Coalescing multiple HTTP requests into a single TCP segment is a standard-compliant evasion against Russia's censor — no header invalidation needed, making this robust against future server-side HRS patches.
Russia's stateful assumption that the Host header does not change within a TCP connection can be exploited by sending a benign first request followed by a censored second request in the same TCP stream.