FINDING · DETECTION

Encrypted protocols such as SSL/TLS remain fully fingerprint-able through their unencrypted handshakes: DPI can apply static string matching, packet-length comparison, and timing profiling to the cleartext cipher-negotiation and key-exchange phase to identify and block the protocol even though the payload is encrypted.

From 2011-wiley-dustDust: A Blocking-Resistant Internet Transport Protocol · §1.1 · 2011 · University of Texas at Austin

Implications

Tags

censors
generic
techniques
dpitls-fingerprint

Extracted by claude-sonnet-4-6 — review before relying.