FINDING · DEFENSE

If bridges run on predictable ports and any TCP connection to a bridge port reveals it as a Tor bridge, a censor can scan the entire address space of residential ISP ranges to enumerate and block all bridges. The paper proposes 'scanning resistance': bridges require a nonced hash of a pre-shared password before revealing Tor behavior, and respond to unauthenticated connections by impersonating an ordinary HTTPS server (e.g., default Apache page or a random legitimate website).

From 2006-dingledine-designDesign of a blocking-resistant anonymity system · §9.3 · 2006 · The Tor Project

Implications

Tags

censors
cngeneric
techniques
active-probingip-blocking
defenses
bridgesmimicry

Extracted by claude-sonnet-4-6 — review before relying.