The GFC identifies Tor connections via a unique TLS ClientHello cipher list sent by the Tor client. Once DPI boxes detect this fingerprint on outbound traffic, active scanning is initiated within minutes: scanners connect to the suspected bridge, attempt to build a Tor circuit, and if successful the IP:port tuple is blocked. This two-stage pipeline (fingerprint → confirm → block) allows dynamic bridge blocking without pre-enumeration.
From 2012-winter-great — How the Great Firewall of China is Blocking Tor
· §2, §4.1
· 2012
· Free and Open Communications on the Internet
Implications
Rotate or randomize the TLS ClientHello cipher list so it is indistinguishable from a legitimate browser (e.g., match Firefox or Chrome JA3/JA4 exactly) to prevent the initial DPI trigger.
Deploy active-probing resistance at the server: reject or timeout connections that do not supply a valid shared secret before presenting any Tor-identifiable behavior.