Decoy routing systems that re-encrypt TLS application data across the relay station (Slitheen, Rebound, Waterfall) are vulnerable to nonce-reuse attacks: an adversary capable of observing traffic on both sides of the relay can exploit reused GCM nonces to decrypt or modify covert traffic. Although this falls outside the standard decoy routing threat model, it poses a concrete risk to users already under heightened surveillance who face adversaries with broad network visibility.
From 2018-bocovich-secure — Secure asymmetry and deployability for decoy routing systems
· §5.2
· 2018
· Privacy Enhancing Technologies
Implications
Wrap covert data in a superencryption layer before re-encryption at the relay station so that any nonce reuse in the outer TLS layer does not expose covert channel contents.
Never reuse TLS session keys or nonces across the relay station boundary; generate fresh key material for each covert data segment to eliminate the cross-side correlation attack surface.