FINDING · DETECTION

Since April 7, 2024, the GFW decrypts every QUIC client Initial packet at China's national border and blocks connections whose TLS ClientHello SNI matches a QUIC-specific blocklist. Blocking takes the form of dropping all subsequent UDP packets sharing the same (src-IP, dst-IP, dst-port) 3-tuple for 180 seconds—with no RST injection. The GFW applies a source-port heuristic: packets with src-port ≤ dst-port are not inspected, capturing >92% of real QUIC client Initials while processing only ~30% of all UDP traffic. The QUIC blocklist contains 58,207 unique FQDNs (Tranco, Oct 2024– Jan 2025), approximately 60% of the DNS blocklist in size; 33% of blocked FQDNs do not actually support QUIC, suggesting the list was derived from an existing domain-name blocklist rather than live QUIC service discovery.

From 2025-zohaib-quic-sniExposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China · §3 / §3.1 / §3.3 / §4 · 2025 · USENIX Security

Implications

Tags

censors
cn
techniques
http3-quic-blockdpisni-blocking

Extracted by claude-sonnet-4-6 — review before relying.