FINDING · DETECTION
In Iran in 2013, censors dropped or throttled certain TCP connections after 60 seconds, severely disrupting circumvention protocols like obfs4 that fuse session state with a single long-lived TCP connection, while short-lived HTTP connections were largely unaffected. obfs4 has no session concept independent of the underlying TCP connection; when that connection is terminated, all end-to-end state is lost and a new session must restart from scratch.
From 2020-fifield-turbo — Turbo Tunnel, a good way to design censorship circumvention protocols · §1 · 2020 · Free and Open Communications on the Internet
Implications
- Protocols that rely on a single long-lived TCP connection are acutely vulnerable to connection-duration-based throttling; a session layer that reconnects and retransmits transparently is the direct countermeasure.
- Include fixed-duration TCP termination (e.g., after 60 s) as a standard evaluation case when testing circumvention tools, not only full blocking.
Tags
Extracted by claude-sonnet-4-6 — review before relying.