Ignoring the Great Firewall of China. Clayton, R., Murdoch, S. J., & Watson, R. N. M. In Danezis, G. & Golle, P., editors, Privacy Enhancing Technologies, of Lecture Notes in Computer Science, pages 20–35. Springer Berlin Heidelberg, January, 2006.
Ignoring the Great Firewall of China [link]Paper  abstract   bibtex   
The so-called “Great Firewall of China” operates, in part, by inspecting TCP packets for keywords that are to be blocked. If the keyword is present, TCP reset packets (viz: with the RST flag set) are sent to both endpoints of the connection, which then close. However, because the original packets are passed through the firewall unscathed, if the endpoints completely ignore the firewall’s resets, then the connection will proceed unhindered. Once one connection has been blocked, the firewall makes further easy-to-evade attempts to block further connections from the same machine. This latter behaviour can be leveraged into a denial-of-service attack on third-party machines.
@incollection{clayton_ignoring_2006,
	series = {Lecture {Notes} in {Computer} {Science}},
	title = {Ignoring the {Great} {Firewall} of {China}},
	copyright = {©2006 Springer-Verlag Berlin Heidelberg},
	isbn = {978-3-540-68790-0, 978-3-540-68793-1},
	url = {http://link.springer.com/chapter/10.1007/11957454_2},
	abstract = {The so-called “Great Firewall of China” operates, in part, by inspecting TCP packets for keywords that are to be blocked. If the keyword is present, TCP reset packets (viz: with the RST flag set) are sent to both endpoints of the connection, which then close. However, because the original packets are passed through the firewall unscathed, if the endpoints completely ignore the firewall’s resets, then the connection will proceed unhindered. Once one connection has been blocked, the firewall makes further easy-to-evade attempts to block further connections from the same machine. This latter behaviour can be leveraged into a denial-of-service attack on third-party machines.},
	language = {en},
	number = {4258},
	urldate = {2014-11-15},
	booktitle = {Privacy {Enhancing} {Technologies}},
	publisher = {Springer Berlin Heidelberg},
	author = {Clayton, Richard and Murdoch, Steven J. and Watson, Robert N. M.},
	editor = {Danezis, George and Golle, Philippe},
	month = jan,
	year = {2006},
	keywords = {Computer Communication Networks, Computers and Society, Data Encryption, Information Storage and Retrieval, Management of Computing and Information Systems, Systems and Data Security},
	pages = {20--35},
}

Downloads: 0