FINDING · DETECTION

The Chinese Great Firewall was observed conducting two follow-up probes for each outbound TCP/443 connection: the first with garbage binary data (target unknown) and the second specifically performing an SSL negotiation, an SSL renegotiation, and successfully building a one-hop Tor circuit to confirm the bridge. This reactive probing renders unpublished Tor entry points discoverable even when not listed in any directory.

From 2012-lincoln-bootstrappingBootstrapping Communications into an Anti-Censorship System · §1 · 2012 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
active-probingtls-fingerprint

Extracted by claude-sonnet-4-6 — review before relying.