FINDING · DETECTION

Real-world CDN HTTPS deployments leak the identity of visited websites through three distinct channels — TLS certificate contents (A2, B1, B2 deployments), the plaintext SNI field (B1), and dedicated IP address mappings (B2) — enabling censors to block CDNBrowsing connections via standard DPI or IP filtering without collateral damage to non-forbidden CDN content. Each leakage channel requires inspecting only a single packet from an HTTPS connection, making the attack low-cost and deployable on off-the-shelf censorship boxes.

From 2016-zolfaghari-practicalPractical Censorship Evasion Leveraging Content Delivery Networks · §3.1 · 2016 · Computer and Communications Security

Implications

Tags

censors
cnir
techniques
dpisni-blockingtls-fingerprintip-blocking

Extracted by claude-sonnet-4-6 — review before relying.