OONI just published a report on Signal blocking that has a section on Uzbekistan. There were not many Signal measurements from Uzbekistan, but all measurements showed blocking.
When attempting to perform a TLS handshake to all Signal backend services, the connection constantly times out after writing the first data packet to the network, as illustrated through OONI data below.
{
"operation": "connect",
"address": "173.194.220.121:443",
"proto": "tcp",
"t": 0.474921823,
"failure": null
},
{
"operation": "tls_handshake_start",
"t": 0.47523901,
"failure": null
},
{
"operation": "write",
"num_bytes": 288,
"t": 0.478659219,
"failure": null
},
{
"operation": "read",
"t": 10.477152913,
"failure": "generic_timeout_error"
},
{
"operation": "tls_handshake_done",
"t": 10.47733385,
"failure": "generic_timeout_error"
},
What do you think? Are these timeouts an instance of your 1. Shaping the traffic for Internet censorship? I found another measurement that has some successful "read" events before it starts timing out. (Expand the test_keys.network_events array in the JSON.) The fact that some reads were possible seems to match your observation about rate limiting, rather than complete blocking.
{
"operation": "connect",
"address": "76.223.92.165:443",
"proto": "tcp",
"t": 0.259690886,
"failure": null
},
{
"operation": "tls_handshake_start",
"t": 0.259772552,
"failure": null
},
{
"operation": "write",
"num_bytes": 307,
"t": 0.262190208,
"failure": null
},
{
"operation": "read",
"num_bytes": 517,
"t": 3.775013176,
"failure": null
},
{
"operation": "read",
"num_bytes": 831,
"t": 3.77526703,
"failure": null
},
{
"operation": "read",
"t": 10.28804083,
"failure": "generic_timeout_error"
},
{
"operation": "tls_handshake_done",
"t": 10.288115725,
"failure": "generic_timeout_error"
},