FINDING · DETECTION
Comprehensive Internet-wide scanning enables cross-IP tracking of users and devices by correlating stable cryptographic identifiers — TLS certificates or SSH host keys presented by home routers and cable modems — with public geolocation data across DHCP lease changes, defeating the anonymity assumption behind dynamic IP addresses.
From 2013-durumeric-zmap — ZMap: Fast Internet-wide Scanning and its Security Applications · §4.6 · 2013 · USENIX Security Symposium
Implications
- Circumvention relays and bridges that reuse TLS certificates or SSH host keys across IP address changes are trackable by adversarial scanners; rotate cryptographic identifiers on each IP change or use ephemeral server keys.
- Circumvention clients must not expose stable fingerprints (static public keys, predictable cert serial numbers) to unauthenticated scanners; challenge-based or session-ticket-only key exchange limits adversarial fingerprinting surface.
Tags
Extracted by claude-sonnet-4-6 — review before relying.