FINDING · DETECTION

Beyond the ClientHello, circumvention tools diverge from real browsers in TLS record-layer behavior: Go's crypto/tls splits the first application-data write differently than NSS or BoringSSL, and Go does not send a TLS ChangeCipherSpec in the same byte sequence as Chrome. These post-handshake divergences are detectable even when the ClientHello has been patched with uTLS, requiring record-layer mimicry in addition to hello-field mimicry for full fingerprint resistance.

From 2015-frolov-the-use-of-tlsThe use of TLS in censorship circumvention · §4.3 · 2019 · NDSS

Implications

Tags

censors
cnirru
techniques
tls-fingerprintdpitraffic-shape
defenses
mimicry

Extracted by claude-sonnet-4-6 — review before relying.