FINDING · DETECTION

The GFI's HTTP and HTTPS filters are now stateful (requiring initial SYN packet with matching sequence numbers) and have been activated on all TCP ports—not only standard ports 80 and 443 as reported by prior studies. This is a significant departure from previous work that found stateless HTTP/HTTPS blocking limited to standard ports. The HTTP filter injects a 403 Forbidden blockpage (not RST packets as used by the GFW), while HTTPS injects a single RST+ACK packet. The GFI also exhibits TCP non-compliance (not requiring a full three-way handshake to trigger filtering), enabling outside-in measurement without in-country servers.

From 2025-tai-irblockIRBlock: A Large-Scale Measurement Study of the Great Firewall of Iran · §2.1, §3.2 · 2025 · USENIX Security Symposium

Implications

Tags

censors
ir
techniques
dpirst-injectionpacket-injectionmiddlebox-interference

Extracted by claude-sonnet-4-6 — review before relying.