2024-niere-http-smuggling

Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling

Abstract

Many countries limit residents' access to various websites. As a substantial number of these websites do not support TLS encryption, censorship of unencrypted HTTP requests remains prevalent. The authors infer novel circumvention techniques on the HTTP layer from a web-security vulnerability — HTTP request smuggling (HRS) — and evaluate them on popular web servers and censors in China, Russia, and Iran. They show HRS can be successfully employed as a censorship-circumvention technique against multiple censors and web servers, discover a standard-compliant circumvention technique in Russia, unusually inconsistent censorship in China, and an implementation bug in Iran. The implication: censorship-circumvention techniques can successfully be constructed from existing vulnerabilities.

Team notes

Same group, same posture: re-purpose a "vulnerability" into a circumvention primitive. HTTP request smuggling — a parser- divergence between front-end and back-end — turns out to be a reliable evasion technique against in-line HTTP censors that parse only one of the two ways. Demonstrates that censor parsers are themselves attack surface, not just neutral observers. General methodological lesson worth quoting: "censorship- circumvention techniques can successfully be constructed from existing vulnerabilities."

Tags

censors
cnirru
techniques
dpikeyword-filteringhttp3-quic-block
defenses
format-transform
method
measurement-studycontrolled-deployment

findings extracted from this paper