FINDING · EVALUATION
lib·erate's TTL-limited inert packet insertion—sending a decoy packet with TTL set to expire at the middlebox but carrying a misclassifying payload—successfully evades classification in a carrier-grade testbed DPI device, T-Mobile's Binge On, and the Great Firewall of China, but fails against Iran's censor and AT&T (Table 3). When bilateral server support is available, inserting a single dummy packet at flow start evades classification in all four deployments.
From 2017-li-lib-cdot-erate — lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently · §4.3, Table 3 · 2017 · Internet Measurement Conference
Implications
- Insert a TTL-limited decoy packet carrying benign application-layer content before the identifying payload to exploit match-and-forget middleboxes that cannot distinguish packets expiring in-path from those reaching the server.
- Design proxy handshakes to send one innocuous leading packet that causes match-and-forget classifiers to mis-classify the flow before real protocol bytes appear; overhead is O(1) extra packets.
Tags
Extracted by claude-sonnet-4-6 — review before relying.