By scanning ports 443 and 9001 and fingerprinting responses with Tor's TLS v1 cipher-suite handshake pattern, ZMap identified 79–86% of all allocated Tor bridge fingerprints in a single scan, demonstrating that bridges whose protocol is distinguishable are largely discoverable through comprehensive Internet-wide scanning even though their addresses are not publicly listed.
From 2013-durumeric-zmap — ZMap: Fast Internet-wide Scanning and its Security Applications
· §4.4
· 2013
· USENIX Security Symposium
Implications
Bridges that speak an identifiable protocol on well-known ports (443, 9001) are enumerable by any censor with a gigabit uplink; bridges must combine address secrecy with full protocol indistinguishability to resist this attack.
Tor's TLS v1 cipher-suite ordering is the fingerprint exploited here — circumvention transports must randomize TLS parameters (cipher suites, extensions, GREASE) to defeat heuristic-based active enumeration.