FINDING · DEFENSE

For IPv4, Conjure derives both the phantom host IP and TCP port from the client's registration seed, making exhaustive scanning infeasible: a censor enumerating from a /10 of potential client source IPs (4 million addresses) against a /16 of phantom IPs (65K addresses) across all 65K ports would require approximately 50 years at 10 Gbps with ZMap. Phantom hosts are additionally firewalled to respond only to the registering client IP, defeating single-vantage-point ZMap scans.

From 2019-frolov-conjureConjure: Summoning Proxies from Unused Address Space · §6.2.1 · 2019 · Computer and Communications Security

Implications

Tags

censors
cngeneric
techniques
ip-blockingactive-probing
defenses
conjuredecoy-routing

Extracted by claude-sonnet-4-6 — review before relying.