FINDING · DEFENSE

MultiFlow mitigates TLS termination attacks—where an adversary drops a connection after one data exchange—by having the client exfiltrate TLS session resumption information (219 bytes: 208-byte psk identity plus ticket metadata) to the decoy router. The decoy router can then resume a session with a different decoy host, establishing a new covert channel even if the original connection is severed, and amortizing per-session setup cost across multiple connections.

From 2018-manfredi-multiflowMultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption · §3.3 · 2018 · Free and Open Communications on the Internet

Implications

Tags

techniques
middlebox-interference
defenses
decoy-routing

Extracted by claude-sonnet-4-6 — review before relying.