Tor's TLS handshake exhibited multiple distinguishing fingerprints — including the client cipher list, server certificates, and randomly generated SNIs — that were used for TLS-based filtering in Ethiopia, China, and Iran. Inferring the exact byte-level pattern matched by DPI boxes required manual analysis and remains a difficult open problem as of 2013.
From 2013-winter-towards — Towards a Censorship Analyser for Tor
· §3.1.5, §5
· 2013
· Free and Open Communications on the Internet
Implications
Any proxy that reuses a consistent TLS cipher suite ordering, certificate structure, or SNI pattern is vulnerable to fingerprint-based blocking; transports must randomize or mimic legitimate TLS profiles (e.g., REALITY, Cloak) to survive.
Automated DPI pattern inference via grammatical inference would enable targeted countermeasures; tool designers should invest in or integrate with tools that can reverse-engineer censor DPI signatures rather than guessing at them.