FINDING · DEFENSE
A hybrid two-stage blocking system (IP-redirect first stage, URL-proxy second stage) can be exploited as an oracle to enumerate blocked IP addresses by sending TCP packets with a TTL sufficient to reach the first-stage redirector but insufficient to reach the destination. Non-redirected IPs return ICMP TTL-expired from an intermediate router, while redirected IPs return a SYN/ACK from the web proxy impersonating the destination. A live scan of a /24 subnet confirmed 17 redirected IP addresses, yielding 91 associated hostnames across 9 of those IPs.
From 2006-clayton-failures — Failures in a Hybrid Content Blocking System · §5.2 · 2006 · Privacy Enhancing Technologies
Implications
- Any blocking architecture that treats different traffic differently (redirect vs. pass-through) creates a detectable side-channel; ensure traffic toward blocked and non-blocked destinations is indistinguishable at the client-observable level.
- Treat the IP blocklist itself as a sensitive secret — a scannable blocklist leaks the censor's full knowledge to adversaries who can enumerate it passively.
Tags
Extracted by claude-sonnet-4-6 — review before relying.