FINDING · DETECTION
Stateful firewalls used as censorship middleboxes exhibit counter-intuitive implementation behaviors: FW-3 forwards ACK packets before a TCP handshake is initiated, and FW-1 actively spoofs RST packets in response to unsolicited traffic to thwart evasion attempts. These vendor-specific quirks create or close evasion opportunities that are invisible to rule-verification tools and not predictable from policy documentation alone.
From 2024-moon-pryde — Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments · §1 Introduction, Findings 3–4 · 2024 · Symposium on Security \& Privacy
Implications
- Fingerprint the specific firewall vendor and version deployed by a censor before designing an evasion strategy — pre-handshake ACK forwarding or RST-spoofing behavior varies dramatically across implementations and invalidates generic assumptions.
- Probe for RST-injection behavior early in protocol negotiation; a censor that actively spoofs RSTs will neutralize many evasion sequences that rely on out-of-order or pre-handshake packets.
Tags
Extracted by claude-sonnet-4-6 — review before relying.