FINDING · EVALUATION
Of 2,134 tested sites, 229 (10.7%) were invalid for inbound blocking detection due to ingress filtering or network-origin discrimination; 431 additional sites were invalid for outbound blocking detection, of which 75% were Cloudflare-hosted and 7% Fastly-hosted because anycast topology prevents RST packets from returning to the originating anycast node.
From 2017-pearce-augur — Augur: Internet-Wide Detection of Connectivity Disruptions · §V-E · 2017 · Symposium on Security \& Privacy
Implications
- Circumvention tools relying on CDN fronting (Cloudflare, Fastly) cannot be tested for outbound blocking via IP ID side-channel methods — use direct probing or OONI-style in-country tests for CDN-fronted endpoints instead.
- Proxy IPs that apply per-origin ingress filtering will appear blocked in side-channel measurements even when reachable; operators must verify that reflector-to-proxy paths are free of asymmetric ingress filtering before interpreting Augur-style signals as censor action.
Tags
Extracted by claude-sonnet-4-6 — review before relying.