FINDING · DEFENSE

Conjure phantom hosts resist active probing by requiring knowledge of a per-client registration seed secret before the station responds. A ZMap scan of over 1 billion random IP/port combinations found that 99.4% of responding servers returned no data after a random OSSH-style probe and 7.42% closed with TCP RST — behavior indistinguishable from Conjure's OSSH transport — meaning censors face steep false-positive rates when attempting to identify phantom proxies via active probing.

From 2019-frolov-conjureConjure: Summoning Proxies from Unused Address Space · §7.1 · 2019 · Computer and Communications Security

Implications

Tags

censors
cn
techniques
active-probing
defenses
conjuredecoy-routingobfs4

Extracted by claude-sonnet-4-6 — review before relying.