FINDING · DETECTION

A preplay attack defeats the TLS-sentinel covert channel: the adversary intercepts each ClientHello, immediately sends a copy to the decoy destination before the client's copy arrives, causing the sentinel to be consumed and poisoned. The client can never establish a decoy routing session while ordinary TLS to the decoy destination continues to work normally, giving the adversary both blocking capability and forensic confirmation that decoy routing was attempted. The paper notes this vulnerability is specific to the TLS sentinel and that alternatives such as port-knocking sentinels may not share it.

From 2011-karlin-decoyDecoy Routing: Toward Unblockable Internet Communication · §4.1 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
active-probingdpi
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.