FINDING · DETECTION

Tor's 2006 TLS handshake contained multiple identifying fingerprints exploitable by censors: the X.509 organizationName field was set to 'Tor', the relay nickname appeared in the commonName field, clients always presented certificates (unlike browsers), and Tor used two-certificate chains (identity cert + per-session TLS cert) while most consumer HTTPS services use a single certificate. The paper flags these as sufficient for a censor to identify Tor traffic without deep payload inspection.

From 2006-dingledine-designDesign of a blocking-resistant anonymity system · §6 · 2006 · The Tor Project

Implications

Tags

censors
cngeneric
techniques
tls-fingerprintdpi
defenses
mimicrybridges

Extracted by claude-sonnet-4-6 — review before relying.