FINDING · DETECTION
Iran's protocol filter monitors only the first two data-carrying packets of a TCP connection on ports 53, 80, and 443, permitting only DNS, HTTP, and HTTPS. Once tripped, it drops all subsequent client-side packets for 60 seconds, with the timer resetting on each TCP retransmit. The filter is unidirectional (client-inside-Iran only), cannot reassemble TCP segments, and does not verify checksums.
From 2020-bock-detecting — Detecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter · §4.1 · 2020 · Free and Open Communications on the Internet
Implications
- Send a compliant fingerprint-matching packet as the first data-carrying packet; only the first two packets matter, so arbitrary protocol data can follow unimpeded.
- Server-side evasion is viable: the filter's unidirectional nature means a server can manipulate the handshake to exhaust filter state before the client sends forbidden data.
Tags
Extracted by claude-sonnet-4-6 — review before relying.