FINDING · DEFENSE
MultiFlow enables a tap-based decoy router to authenticate clients without inline traffic blocking by having the decoy router resume the client's TLS 1.3 session with the decoy host. The client embeds 112-byte sentinel values in the ClientRandom and key-share fields; the decoy router uses the exfiltrated 219-byte NewSessionTicket to perform the resumption. If the decoy host accepts the resumed session rather than falling back to a full handshake, the client is confirmed live.
From 2018-manfredi-multiflow — MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption · §3.1 · 2018 · Free and Open Communications on the Internet
Implications
- Implement tap-based liveness checking via session resumption rather than inline RST injection to preserve ISP deployability and eliminate connection-probing exposure.
- Embed authentication material in TLS fields that an on-path adversary cannot modify without breaking the protocol (ClientRandom, key-share), rather than in application-layer signals that can be stripped.
Tags
Extracted by claude-sonnet-4-6 — review before relying.