FINDING · DETECTION

The GFW blocks ESNI by dropping client-to-server packets whenever a TLS ClientHello containing the `0xffce` encrypted_server_name extension is sent over a completed TCP handshake. Unlike GFW censorship of SNI and HTTP (which uses RST injection to both endpoints), ESNI censorship uses unidirectional packet dropping with no injected packets. The blocking applies on all ports from 1 to 65535.

From 2020-gfw-esni-blockingExposing and Circumventing China's Censorship of ESNI · Details About the Blocking · 2020 · gfw.report

Implications

Tags

censors
cn
techniques
esni-eh-blockingdpitls-fingerprint

Extracted by claude-sonnet-4-6 — review before relying.