FINDING · DEFENSE

BridgeSPA encodes a 32-bit SHA256-HMAC ConnectionTag derived from a time-limited MACKey into the TCP SYN packet's ISN (lower 3 bytes) and TCP timestamp (lower 1 byte) fields—values that are uniformly random in Linux 2.6 and therefore carry the tag innocuously. Bridges silently drop unauthorized SYN packets without returning any response, preventing aliveness queries. MACKeys rotate every 1–7 days (bridge-configured), so hoarded descriptors become stale within the epoch.

From 2011-smits-bridgespaBridgeSPA: Improving Tor Bridges with Single Packet Authorization · §4, §5 · 2011 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
active-probing
defenses
bridgestorpluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.