FINDING · DEFENSE

A passive observer of BridgeSPA traffic sees only a TCP connection timeout on failed authorization or a successful TLS connection on success—exactly what they would observe with an unmodified Tor bridge. The ConnectionTag is indistinguishable from the normally-random ISN and timestamp fields in Linux 2.6, so no new observable artifact is introduced. However, BridgeSPA does not address the separate problem that Tor traffic itself remains fingerprint-distinguishable from HTTPS; this is an orthogonal concern.

From 2011-smits-bridgespaBridgeSPA: Improving Tor Bridges with Single Packet Authorization · §4, §6.2.1 · 2011 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
dpitraffic-shapetls-fingerprint
defenses
bridgestor

Extracted by claude-sonnet-4-6 — review before relying.