Particle.news

Download on the App Store

China’s Hour-Long Port 443 Disruption Severed Most HTTPS Links to the World

Researchers say the forged resets came from equipment unlike known Great Firewall systems.

Overview

  • Monitoring group Great Firewall Report logged forged TCP RST+ACK injections between 00:34 and 01:48 Beijing time on August 20, cutting most China–global HTTPS connections.
  • The interference targeted only TCP port 443, leaving ports such as 22, 80, and 8443 largely unaffected, which analysts called atypical compared with past broad HTTPS blocks.
  • The device fingerprint did not match known Great Firewall gear, leading researchers to consider a new platform or a misconfigured system as plausible explanations.
  • Access to most overseas websites failed and services dependent on offshore servers—cited examples include Apple iCloud and Tesla connectivity—were disrupted during the outage.
  • No official explanation has been issued, and while NetBlocks noted a sharp traffic drop in Pakistan hours earlier, any connection to the China incident remains unproven.