FINDING · DETECTION

Two Iranian ASes apply a protocol allowlist that drops traffic not matching known application-layer protocol patterns (after ~6 packets), independently of the destination IP. Experiments with fresh /26 phantom subnets showed that prefixing Conjure connections with a plain HTTP GET payload evaded this blocking for four weeks, while TLS Client Hello-prefixed and SSH-prefixed connections were blocked within 72 hours (TLS) or 72 hours after port rotation (SSH). HTTP GET on port 80 was the only tested prefix that survived the full experiment window.

From 2025-alaraj-iran-refractionMeasuring Censorship in Iran Using Refraction-based Proxies · §4.4, §5 · 2025 · ACM ASIA Conference on Computer and Communications Security

Implications

Tags

censors
ir
techniques
dpifully-encrypted-detect
defenses
decoy-routingconjuremimicry

Extracted by claude-sonnet-4-6 — review before relying.