FINDING · EVALUATION
In measurements conducted over 10 days in early February 2006, the GFW scanned approximately two-thirds of packets from a 256-address block per hourly probe, with address selection following a structured (non-random) pattern consistent with simple modular assignment to a limited pool of IDS devices. After several days, the inspected fraction rose to nearly all addresses, suggesting a configuration change to expand capacity.
From 2006-clayton-ignoring — Ignoring the Great Firewall of China · §6.1 · 2006 · Privacy Enhancing Technologies
Implications
- Circumvention deployments should not assume uniform inspection coverage across all source IPs — probing with sentinel payloads can identify transiently under-inspected address ranges or IDS load windows.
- Rapid rotation of client source addresses (e.g., via NAT pool or residential IP diversity) exploits the structural gaps in IDS capacity allocation without requiring any protocol-layer changes.
Tags
Extracted by claude-sonnet-4-6 — review before relying.