FINDING · DETECTION

The GFW's passive classifier uses two features of the first data packet to flag probable Shadowsocks traffic: (1) high Shannon entropy (per-byte entropy > ~7 bits strongly correlates with replay probability, which is nearly 4x higher at entropy 7.2 than at 3.0) and (2) packet length in the range 160–700 bytes with specific remainders mod 16. A single data packet after the TCP handshake is sufficient to trigger the downstream active-probing pipeline.

From 2020-alice-shadowsocks-detectionHow China Detects and Blocks Shadowsocks · §4.2 · 2020 · IMC

Implications

Tags

censors
cn
techniques
dpirandom-payload-detecttraffic-shape
defenses
shadowsocks

Extracted by claude-sonnet-4-6 — review before relying.