FINDING · DETECTION
Manual analysis of 700+ unique packet groupings from possibly tampered connections yielded 19 high-confidence tampering signatures — up from 6 in prior work — covering 86.9% of all possibly tampered connections. Post-SYN signatures account for 43.2% of possibly tampered connections (99.5% matching a known signature), post-ACK for 16.1% (98.7%), and post-first-data-packet (PSH+ACK) for 5.3% (97.9%), with 19 signatures described as flag-sequence patterns of the form ⟨X→Y⟩ in Table 1.
From 2023-raman-global — Global, Passive Detection of Connection Tampering · §4.1, Table 1 · 2023 · SIGCOMM
Implications
- Circumvention traffic that avoids triggering RST injection (e.g., QUIC/UDP-based transports that have no TCP RST semantics, or TLS-mimicking transports that don't carry cleartext SNI in ClientHello) sidesteps the dominant detection signal entirely.
- Post-PSH signatures fire on the first data packet containing a TLS ClientHello SNI or HTTP Host header; designs that use Encrypted ClientHello (ECH) or domain fronting eliminate the cleartext trigger, forcing the censor to rely on less reliable IP or timing signals.
Tags
Extracted by claude-sonnet-4-6 — review before relying.