FINDING · DETECTION

The GFC identifies Tor connections via a unique TLS ClientHello cipher list sent by the Tor client. Once DPI boxes detect this fingerprint on outbound traffic, active scanning is initiated within minutes: scanners connect to the suspected bridge, attempt to build a Tor circuit, and if successful the IP:port tuple is blocked. This two-stage pipeline (fingerprint → confirm → block) allows dynamic bridge blocking without pre-enumeration.

From 2012-winter-greatHow the Great Firewall of China is Blocking Tor · §2, §4.1 · 2012 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
tls-fingerprintactive-probingdpi
defenses
torbridges

Extracted by claude-sonnet-4-6 — review before relying.