FINDING · DETECTION

Tor's fixed 512-byte cells packed into TLS 1.0 records produce a characteristic TCP payload of 586 bytes (512 + 74 bytes of TLS overhead). A perimeter filter running a simple exponential moving average (τ ← ατ + (1−α)1ₗ₌₅₈₆, α=0.1, T=0.4) identifies Tor flows within a few dozen packets; this attack succeeds at backbone rates of ~540,000 packets/second on commodity hardware. Obfsproxy does not alter packet sizes or timings and therefore does not defeat this classifier.

From 2012-weinberg-stegotorusStegoTorus: A Camouflage Proxy for the Tor Anonymity System · §5.1, Figure 3 · 2012 · Computer and Communications Security

Implications

Tags

censors
cnir
techniques
traffic-shapedpi
defenses
pluggable-transportobfs4

Extracted by claude-sonnet-4-6 — review before relying.