FINDING · DETECTION
The paper explicitly flags that BTP's fixed-size b-byte connection tag creates an active-probing oracle: a censor that sends b−1 bytes and observes no close, then sends one more byte and observes a close, can confirm the endpoint is running BTP. Preventing such active-probing attacks is identified as future work.
From 2012-rogers-secure — Secure Communication over Diverse Transports · §8 · 2012 · Workshop on Privacy in the Electronic Society
Implications
- Do not use a fixed-length connection opener as the sole identifier; either randomize the tag-recognition window length or implement a decoy handler that accepts partial probes without closing.
- This is the same oracle-style weakness that broke early Tor bridge detection—any fixed-size boundary that triggers a state transition is a fingerprinting surface.
Tags
Extracted by claude-sonnet-4-6 — review before relying.