FINDING · DETECTION

The GFW sends protocol-specific probe payloads tailored to each circumvention tool: Tor bridges receive a TLS ClientHello mimicking Tor's own; obfs2/obfs3 servers receive random-looking payloads; Shadowsocks servers receive random bytes. A server that responds differently to these crafted probes versus innocent traffic (e.g., by sending a valid protocol handshake in response to a probe) reveals itself and is subsequently blocked.

From 2015-ensafi-active-probingExamining how the Great Firewall discovers hidden circumvention servers · §5 · 2015 · IMC

Implications

Tags

censors
cn
techniques
active-probingdpi
defenses
obfs4shadowsockstorbridges

Extracted by claude-sonnet-4-6 — review before relying.