FINDING · DETECTION
Russia's censor (at the Moscow/ASN-50867 vantage point) inspects only the first HTTP packet of the first TCP segment per TCP stream and never analyzes subsequent HTTP requests—whether in the same TCP packet or a later one. This caused all 2,015 accepted test vectors to successfully evade censorship, and the bypass is achievable with standard-compliant HTTP (e.g., whitespace or case variations in header names, which HTTP/1.1 explicitly permits).
From 2024-m-ller-turning — Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling · §5.2 / §5.3 · 2024 · Free and Open Communications on the Internet
Implications
- Design HTTP-layer proxies to bundle the censored request as a second smuggled request inside a benign-Host first request sent within the same TCP segment—Russia's censor will clear on the first request and never inspect the second.
- Implement standard-compliant header mutations (tab/space injection, mixed case) as a lightweight, no-privilege bypass layer for Russian HTTP censorship before falling back to heavier obfuscation.
Tags
Extracted by claude-sonnet-4-6 — review before relying.