FINDING · DEFENSE

The Henan Firewall is stateless in two exploitable ways: (1) it requires the TCP header to be exactly 20 bytes—enabling any TCP option (e.g., TCP Timestamps, which Windows disables by default) to bypass it entirely; (2) it does not perform TCP reassembly, so splitting a TLS ClientHello across two TCP segments such that the SNI extension straddles the boundary bypasses the censor. Both bypasses require only client-side changes and have already been implemented in Xray, GoodbyeDPI, and Shadowrocket. TLS record fragmentation (splitting the ClientHello across multiple TLS records within one TCP segment) also defeats both the Henan Firewall and the GFW, since neither performs TLS reassembly.

From 2025-wu-regional-censorshipA Wall Behind A Wall: Emerging Regional Censorship in China · §4.3 / §6 · 2025 · IEEE S&P

Implications

Tags

censors
cn
techniques
sni-blockingdpimiddlebox-interference
defenses
format-transformpluggable-transportprotocol-versioning

Extracted by claude-sonnet-4-6 — review before relying.