Turning Attacks into Advantages: Evading HTTP Censorship with HTTP Request Smuggling

Authors: Philipp Müller (Paderborn University), Niklas Niere (Paderborn University), Felix Lange (Paderborn University), Juraj Somorovsky (Paderborn University)

Year: 2024
Issue: 2
Pages: 42–53

Download PDF

Abstract: Many countries limit their residents’ access to various websites. As a substantial number of these websites do not support TLS encryption, censorship of unencrypted HTTP requests remains prevalent. Accordingly, circumvention techniques can and have been found for the HTTP protocol. In this paper, we infer novel circumvention techniques on the HTTP layer from a web security vulnerability by utilizing HTTP request smuggling (HRS). To demonstrate the viability of our techniques, we collected various test vectors from previous work about HRS and evaluated them on popular web servers and censors in China, Russia, and Iran. Our findings show that HRS can be successfully employed as a censorship circumvention technique against multiple censors and web servers. We also discover a standard-compliant circumvention technique in Russia, unusually inconsistent censorship in China, and an implementation bug in Iran. The results of this work imply that censorship circumvention techniques can successfully be constructed from existing vulnerabilities. We conjecture that this implication provides insights to the censorship circumvention community beyond the viability of specific techniques presented in this work.

Copyright in FOCI articles are held by their authors. This article is published under a Creative Commons Attribution 4.0 license.