FINDING · DEFENSE

Telex prevents tag replay attacks by seeding the client's TLS key exchange randomness (e.g., the Diffie-Hellman exponent) with the shared secret ksh derived from the steganographic tag. The TLS Finished message must then be freshly encrypted with the newly negotiated master secret, implicitly proving knowledge of ksh. An adversary replaying a captured ClientHello nonce without knowing ksh cannot produce a valid Finished message, causing the server to terminate the connection.

From 2011-wustrow-telexTelex: Anticensorship in the Network Infrastructure · §6.2 · 2011 · USENIX Security Symposium

Implications

Tags

techniques
active-probing
defenses
telexdecoy-routing

Extracted by claude-sonnet-4-6 — review before relying.