FINDING · DETECTION

Frolov and Wustrow show that every major TLS-based circumvention tool (Tor Browser, Lantern, OpenVPN, Psiphon, etc.) produces a TLS ClientHello fingerprint that is statistically distinguishable from real Chrome or Firefox: differences include cipher-suite ordering, extension set, extension ordering, ALPN values, and curve preferences. A passive observer with a classifier over ClientHello fields can identify the tool with high precision without decrypting any traffic.

From 2015-frolov-the-use-of-tlsThe use of TLS in censorship circumvention · §3–4 · 2019 · NDSS

Implications

Tags

censors
cnirru
techniques
tls-fingerprintdpiml-classifier
defenses
mimicrymeekobfs4shadowsockstunneling

Extracted by claude-sonnet-4-6 — review before relying.