FINDING · EVALUATION
Evasion attacks generated against one firewall-deployment combination do not transfer well to other settings: a deployment-agnostic approach (used by censorship circumvention tools) fails to generate effective attacks across diverse victim stacks and attacker capabilities. Pryde's deployment-aware, modular workflow finds successful attacks across configurations with and without insider threats, and against multiple attacker success criteria (data delivery vs. victim ACK vs. attacker receipt of ACK).
From 2024-moon-pryde — Pryde: A Modular Generalizable Workflow for Uncovering Evasion Attacks Against Stateful Firewall Deployments · §1 Introduction (Finding 7), §3.2 · 2024 · Symposium on Security \& Privacy
Implications
- Circumvention protocols must be validated against the specific firewall + OS-stack combination a target censor deploys — strategies that work against one ISP's infrastructure may fail at another using a different vendor even with identical blocking rules.
- Model the full deployment topology (including weakly-trusted internal hosts that can spoof packets) when reasoning about censor evasion; insider-threat-style packet injection paths exist in segmented networks and are missed by client-only evasion tools.
Tags
Extracted by claude-sonnet-4-6 — review before relying.