FINDING · DETECTION
None of the operational networks tested—T-Mobile, AT&T, the Great Firewall of China, and Iran—classify UDP traffic; the authors describe this as 'a surprisingly easy way to evade their policies.' Iran's censor inspects the entire TCP flow but leaves UDP flows untouched across all tested applications.
From 2017-li-lib-cdot-erate — lib$\cdot$erate, (n): A library for exposing (traffic-classification) rules and avoiding them efficiently · §1 (key findings), §6 · 2017 · Internet Measurement Conference
Implications
- QUIC- or UDP-based transports (e.g., Hysteria 2) offer a structural evasion advantage wherever DPI infrastructure is TCP-focused; prefer UDP tunneling without additional obfuscation as a first-pass strategy.
- Probe whether a target network classifies UDP before adding obfuscation overhead; the asymmetry documented here suggests UDP may be exploitable without any payload transformation.
Tags
Extracted by claude-sonnet-4-6 — review before relying.