FINDING · DEFENSE

The GFW's QUIC censor does not reassemble QUIC client Initial packets that are split across multiple UDP datagrams, nor does it reassemble QUIC CRYPTO frames split within a single datagram. Three practical bypasses follow: (1) send any UDP datagram with a random payload before the QUIC Initial—the GFW uses 60-second UDP flow state and won't inspect a mid-flow packet; (2) fragment the TLS ClientHello SNI across multiple QUIC CRYPTO frames; (3) use an unknown QUIC version number in the first packet (Version Negotiation bypass, payload undecryptable). Chrome independently exploits (2) through its Chaos Protection feature (since 2021) and post-quantum Kyber key-agreement (since v124, Sep 2024), whose larger key sizes force fragmentation across UDP datagrams. As of January 2025, the GFW also does not block ECH-containing QUIC payloads unless the outer (cleartext) SNI is on the blocklist.

From 2025-zohaib-quic-sniExposing and Circumventing SNI-based QUIC Censorship of the Great Firewall of China · §3.2 / §7 · 2025 · USENIX Security

Implications

Tags

censors
cn
techniques
http3-quic-blockdpi
defenses
randomizationech-esniprotocol-versioningformat-transform

Extracted by claude-sonnet-4-6 — review before relying.