Using An Alternative To TCP To Avoid Packet Injection?
According to https://www.cs.tufts.edu/comp/116/archive/fall2016/ctang.pdf , the GFW only injects packets, mostly TCP RST signals. What if TOR has bridges/servers that do not respond to TCP RST? This would render the connection interfering part of GFW useless. Here, a connection ends only when both sides send a "END" signal to the other side with their private key for the connection only that is shared through the connection. We don't even need to obfuscate TOR traffic anymore as the packets are not blocked. With the DNS inspection, we could have IPs for bridges/servers, which do the DNS queries on non censored DNS servers.
Trac:
Username: Aphrodites1995