{"id":169998,"date":"2025-08-23T20:36:53","date_gmt":"2025-08-23T20:36:53","guid":{"rendered":"https:\/\/www.europesays.com\/us\/169998\/"},"modified":"2025-08-23T20:36:53","modified_gmt":"2025-08-23T20:36:53","slug":"mystery-outage-severs-chinas-internet-links-to-the-outside-world","status":"publish","type":"post","link":"https:\/\/www.europesays.com\/us\/169998\/","title":{"rendered":"Mystery outage severs China\u2019s internet links to the outside world"},"content":{"rendered":"<p>On Wednesday, China went through what seemed like a digital blackout that lasted about an hour. <\/p>\n<p>Internet connections between China and the rest of the world were disrupted, and millions of users found themselves unable to reach websites and services outside the country.<\/p>\n<p>According to a new analysis published by the Great Firewall Report, a monitoring group that tracks internet censorship in China, the outage was linked to unusual activity targeting HTTPS traffic. <\/p>\n<p>What happened during the outage<\/p>\n<p>The disruption began at 12:34 AM Beijing time and lasted until 1:48 AM, according to the Great Firewall Report. During this window, researchers observed a large-scale technical interference aimed at TCP port 443, which is the standard port used for HTTPS traffic.<\/p>\n<p>\u201cSomeone was observed unconditionally injecting forged TCP RST+ACK packets to disrupt all connections on TCP port 443,\u201d the report <a href=\"https:\/\/gfw.report\/blog\/gfw_unconditional_rst_20250820\/en\/\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">explained<\/a>. \u201cThis incident caused massive disruption of the Internet connections between China and the rest of the world.\u201d<\/p>\n<p>As a result, users inside China were cut off from most websites hosted abroad. Even domestic services that relied on outside servers could not function properly. In effect, the outage temporarily sealed the country\u2019s <a href=\"https:\/\/interestingengineering.com\/innovation\/china-10g-broadband-smart-city\" target=\"_blank\" rel=\"dofollow noopener\">internet<\/a> off from external communication.<\/p>\n<p>Why Port 443 was targeted<\/p>\n<p>The Great Firewall has blocked HTTPS communication before, but this case stood out. HTTPS is the protocol that secures communication between devices and web servers, making it harder for outside parties to track or intercept information.<\/p>\n<p>Usually, when China restricts HTTPS, the ban extends beyond a single port. In previous cases, other ports like 22, 80, and 8443 were also blocked. For example, in 2020, HTTPS was restricted across every port from 1 to 65535, a far broader measure.<\/p>\n<p>This time, the interference focused only on port 443, the most commonly used port for secure web traffic. Analysts noted that this was unusual because it effectively cut access to the majority of secure connections while leaving other less common ports untouched. The decision raised speculation about whether this was a deliberate test or a misconfigured block.<\/p>\n<p>The mystery behind the device<\/p>\n<p>Adding to the intrigue, the device responsible for the interference did not match the fingerprints of any known Great Firewall systems. The analysis <a href=\"https:\/\/gizmodo.com\/china-firewall-2000646312\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">stated<\/a> that the behavior \u201csuggests that the incident was caused by either a new GFW device or a known device operating in a novel or misconfigured state.\u201d<\/p>\n<p>This finding points to the possibility of China experimenting with new censorship technology or updating its infrastructure. The decentralized nature of the Great Firewall makes it even harder to pinpoint the exact cause. <\/p>\n<p>Unlike a single central system, the firewall is made up of multiple entities that have the ability to block access. That complexity can result in inconsistencies or errors.<\/p>\n<p>Some observers suggested the disruption could have been a trial run for future controls. China has a history of temporarily limiting internet access during politically sensitive events. <\/p>\n<p>However, no such event was taking place at the time of this incident. Others have speculated that it might have been a simple misconfiguration rather than an intentional move.<\/p>\n<p>Unanswered questions remain<\/p>\n<p>For now, the real reason behind the outage remains uncertain. The timing and scope of the disruption left experts puzzled, especially since it affected such a critical part of global internet traffic.<\/p>\n<p>The Great Firewall Report <a href=\"https:\/\/www.tomshardware.com\/tech-industry\/cyber-security\/chinas-great-firewall-blocked-all-traffic-to-a-common-https-port-for-over-an-hour-with-no-hint-as-to-its-intention\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">noted<\/a> the odd timing, writing that \u201cthere is no obvious political or social event that would explain why this capability was deployed.\u201d That makes it difficult to determine whether the outage was a deliberate stress test, a technical failure, or even an accidental mistake.<\/p>\n<p>China\u2019s <a href=\"https:\/\/interestingengineering.com\/innovation\/19-core-optical-fiber-for-faster-internet\" target=\"_blank\" rel=\"dofollow noopener\">internet<\/a> controls have long been a subject of global scrutiny, with authorities balancing censorship, national security, and control over information flow. What happened on Wednesday shows that even with advanced infrastructure, disruptions can still occur, and when they do, they have massive consequences for communication with the outside world.<\/p>\n","protected":false},"excerpt":{"rendered":"On Wednesday, China went through what seemed like a digital blackout that lasted about an hour. Internet connections&hellip;\n","protected":false},"author":3,"featured_media":169999,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[799,74,712,97255,23822,97256,158,67,132,68],"class_list":{"0":"post-169998","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-internet","8":"tag-blackout","9":"tag-china","10":"tag-internet","11":"tag-internet-blackout","12":"tag-internet-connectivity","13":"tag-network-blackout","14":"tag-technology","15":"tag-united-states","16":"tag-unitedstates","17":"tag-us"},"share_on_mastodon":{"url":"https:\/\/pubeurope.com\/@us\/115080006392620985","error":""},"_links":{"self":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/169998","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/comments?post=169998"}],"version-history":[{"count":0,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/posts\/169998\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media\/169999"}],"wp:attachment":[{"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/media?parent=169998"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/categories?post=169998"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.europesays.com\/us\/wp-json\/wp\/v2\/tags?post=169998"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}