FINDING · DETECTION
Winter and Lindskog [157] (2012) documented that the GFW used TLS SNI inspection in combination with IP/port filtering and TCP disruption to block Tor, as recorded in the survey's Table 1. This is one of the earliest published accounts of the GFW applying SNI-based blocking specifically to a circumvention protocol, demonstrating that the GFW correlated multiple detection signals rather than relying on any single technique.
From 2015-aceto-internet — Internet Censorship detection: A survey · Table 1 · 2015 · Computer Networks
Implications
- Tor-like circumvention protocols must not assume that IP/port rotation alone defeats the GFW — SNI inspection provides an independent identification signal that persists even as IP addresses rotate.
- Deploy bridges with valid TLS certificates covering legitimate-looking SNI values, and treat SNI hiding (ECH) as a required feature rather than an optional enhancement.
Tags
Extracted by claude-sonnet-4-6 — review before relying.