FINDING · DEFENSE
MultiFlow's tunnel operates as a virtual message board: the client and decoy router never exchange covert data within the same TCP connection. The decoy router uploads responses to a URI or email address specified by the client; the client downloads independently on a separate connection. This design eliminates the forged-packet and rewritten-traffic vectors that make TapDance and Rebound vulnerable to traffic analysis and decoy-host probing.
From 2018-manfredi-multiflow — MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption · §3.2 · 2018 · Free and Open Communications on the Internet
Implications
- Decouple the upload and download legs of a covert channel across different connections and time windows to remove tight timing correlations that traffic-analysis attacks exploit.
- Prefer asynchronous message-board channels (HTTP POST to private URI, email) over synchronous injection to avoid leaving TCP state mismatches that adversaries can probe.
Tags
Extracted by claude-sonnet-4-6 — review before relying.