FINDING · DEFENSE
A naive active-probing resistance scheme that embeds a fixed-length token in the initial request is vulnerable to flow fingerprinting because the censor can detect connections that always begin with a fixed byte count; pseudo-random padding removes this length-based signature. Separately, obfuscating-service schemes that reveal server aliveness by completing TCP expose the server IP to enumeration even before the application-layer challenge fires.
From 2016-khattak-sok — SoK: Making Sense of Censorship Resistance Systems · §5.5 · 2016 · Privacy Enhancing Technologies
Implications
- Combine active-probing resistance with pseudo-random packet padding from the very first byte of the handshake to eliminate fixed-length flow fingerprints that betray the protocol.
- Prefer obfuscating-aliveness over obfuscating-service: servers that silently drop unauthenticated TCP SYNs leak nothing, whereas servers that complete TCP before withholding the CRS protocol still reveal their IP as live and connectable.
Tags
Extracted by claude-sonnet-4-6 — review before relying.