MultiFlow mitigates TLS termination attacks—where an adversary drops a connection after one data exchange—by having the client exfiltrate TLS session resumption information (219 bytes: 208-byte psk identity plus ticket metadata) to the decoy router. The decoy router can then resume a session with a different decoy host, establishing a new covert channel even if the original connection is severed, and amortizing per-session setup cost across multiple connections.
From 2018-manfredi-multiflow — MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption
· §3.3
· 2018
· Free and Open Communications on the Internet
Implications
Design covert channels to be resumable across multiple distinct server connections so that connection termination by a censor does not kill the circumvention session.
Pre-provision session resumption credentials during the initial handshake so that cross-server failover incurs no additional user-visible latency.