FINDING · DETECTION

After a Tor client inside China connected to a US-based bridge, that bridge subsequently received a series of Tor connection-initiation messages from different Chinese hosts — consistent with GFW active probing triggered by the initial client connection. The probe burst was followed by loss of the original client connection, demonstrating a two-phase detect-then-block pattern: passive identification of suspicious traffic triggers active re-probing to confirm the protocol before blocking.

From 2012-moghaddam-skypemorphSkypeMorph: Protocol Obfuscation for Tor Bridges · §1 · 2012 · Computer and Communications Security

Implications

Tags

censors
cn
techniques
active-probingip-blocking
defenses
pluggable-transportbridges

Extracted by claude-sonnet-4-6 — review before relying.