FINDING · DETECTION

On August 20, 2025 from approximately 00:34 to 01:48 Beijing Time (74 minutes), the GFW unconditionally injected TCP RST+ACK packets on all port 443 traffic, regardless of payload content, disrupting all TCP/443 connections between China and the rest of the world. The injected packets came in triples with incrementally increasing TTL and window size fields — a fingerprint that does not match any previously catalogued GFW device — indicating either a new device or a known device in a novel or misconfigured state. The blocking was port-443-specific: ports 22, 80, 8443, and others were unaffected during the same window.

From 2025-gfw-port443-rstAnalysis of the GFW's Unconditional Port 443 Block on August 20, 2025 · §1, §2.3, §3 · 2025 · gfw.report

Implications

Tags

censors
cn
techniques
rst-injectionport-blocking

Extracted by claude-sonnet-4-6 — review before relying.