FINDING · DETECTION

The obfuscated-openssh handshake encrypts SSH with a key derived from an iterated-hash PBKDF whose slowness was intended to prevent real-time censor analysis; Wiley argues this defense fails because modern censors use statistical packet sampling with offline processing, and the slow key generation itself introduces a timing side-channel detectable from the inter-packet delay between the first and second packets.

From 2011-wiley-dustDust: A Blocking-Resistant Internet Transport Protocol · §2.2 · 2011 · University of Texas at Austin

Implications

Tags

censors
generic
techniques
dpitraffic-shape

Extracted by claude-sonnet-4-6 — review before relying.