FINDING · DETECTION

An active man-in-the-middle adversary can hijack a live BridgeSPA TCP SYN by intercepting the ConnectionTag-bearing packet and racing to complete the bridge connection before the client's timestamp rounds to a new minute. Mitigating this requires the client to re-send the full (non-truncated) ConnectionTag after TLS is established, causing the bridge to act as a cover service (e.g., IMAP over TLS) until validated—but this mitigation is undermined by the fact that Tor bridge TLS certificates are currently distinguishable from other service certificates.

From 2011-smits-bridgespaBridgeSPA: Improving Tor Bridges with Single Packet Authorization · §6.2.2, §7.5 · 2011 · Workshop on Privacy in the Electronic Society

Implications

Tags

censors
generic
techniques
active-probingtls-fingerprint
defenses
bridgestormimicry

Extracted by claude-sonnet-4-6 — review before relying.