Default Tor connections to a private bridge inside China were detected by the Great Firewall via active probing: an initial connection succeeded, followed by a probe from a Chinese IP address approximately 15 minutes later that performed a TLS handshake and then blacklisted the (IP, port) combination. Subsequent connection attempts resulted in a successful SYN followed by spoofed TCP RSTs terminating both the client and bridge connections.
From 2013-dyer-protocol — Protocol Misidentification Made Easy with Format-Transforming Encryption
· §6
· 2013
· Computer and Communications Security
Implications
Bridges must not respond to unauthenticated probe handshakes in any way that confirms they are Tor nodes; the probe-response behavior is the signal the GFW uses to blacklist the (IP, port) tuple.
Encapsulating Tor traffic in FTE (port 80, HTTP format) bypassed this probing path entirely in the authors' tests, suggesting protocol misclassification disrupts the active-probing decision pipeline before blacklisting is triggered.