FINDING · DEFENSE

Clients embed HMAC-derived, time-varying sentinels into the 28-byte random field of the TLS ClientHello message, which decoy routers can scan at line rate. Sentinels are keyed to the current hour and a per-hour sequence number, providing freshness. This covert channel requires no out-of-band signaling and is invisible to passive observers who see only a normal TLS handshake toward the decoy destination.

From 2011-karlin-decoyDecoy Routing: Toward Unblockable Internet Communication · §3.2 · 2011 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
tls-fingerprintdpi
defenses
decoy-routingmimicry

Extracted by claude-sonnet-4-6 — review before relying.