FINDING · DEFENSE

MultiFlow enables a tap-based decoy router to authenticate clients without inline traffic blocking by having the decoy router resume the client's TLS 1.3 session with the decoy host. The client embeds 112-byte sentinel values in the ClientRandom and key-share fields; the decoy router uses the exfiltrated 219-byte NewSessionTicket to perform the resumption. If the decoy host accepts the resumed session rather than falling back to a full handshake, the client is confirmed live.

From 2018-manfredi-multiflowMultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption · §3.1 · 2018 · Free and Open Communications on the Internet

Implications

Tags

techniques
active-probing
defenses
decoy-routingtapdance

Extracted by claude-sonnet-4-6 — review before relying.