FINDING · DETECTION

The paper identifies two unresolved fingerprinting surfaces: (1) traffic-shape analysis of packet sizes and inter-arrival times could distinguish Telex flows from normal TLS, and (2) the prototype exhibits detectable deviations from real servers at the IP layer (stale IP ID fields), TCP layer (incorrect congestion windows detectable by early acknowledgements), and TLS layer (different compression methods and cipher-suite extensions). Convincingly mimicking a diverse population of TCP/TLS server implementations is flagged as requiring substantial engineering effort.

From 2011-wustrow-telexTelex: Anticensorship in the Network Infrastructure · §9 · 2011 · USENIX Security Symposium

Implications

Tags

techniques
traffic-shapetls-fingerprintmiddlebox-interference
defenses
telexmimicry

Extracted by claude-sonnet-4-6 — review before relying.