FINDING · DETECTION
The Great Firewall detects Tor bridges through a two-stage active-probing pipeline: GFW DPI first flags a flow as a potential Tor connection, then random Chinese IP addresses initiate Tor handshakes to the suspected bridge; if the handshake succeeds, the bridge IP:port combination is blocked.
From 2016-khattak-sok — SoK: Making Sense of Censorship Resistance Systems · §2.4.1 · 2016 · Privacy Enhancing Technologies
Implications
- Proxy servers must not respond to any recognizable CRS handshake from unauthenticated probers — require a valid shared secret or ticket before speaking the protocol.
- Use obfuscating-aliveness schemes so probes from unknown IPs receive no TCP-level response, preventing the censor from confirming the server is live.
Tags
Extracted by claude-sonnet-4-6 — review before relying.