FINDING · DEFENSE

The protocol filter's HTTPS fingerprint requires only that the first 5 bytes match a TLS header (type 0x16, version 0x03 0x01–0x03, correct length field); all subsequent bytes of the Client Hello are unchecked. Any TLS-based circumvention tool naturally satisfies this fingerprint and will bypass the filter by default. Furthermore, any one of the three permitted fingerprints (DNS, HTTP, HTTPS) can be used on any of the three monitored ports to whitelist an entire flow.

From 2020-bock-detectingDetecting and Evading Censorship-in-Depth: A Case Study of Iran's Protocol Filter · §4.3 · 2020 · Free and Open Communications on the Internet

Implications

Tags

censors
ir
techniques
dpitls-fingerprint
defenses
mimicrytrojanshadowsocks

Extracted by claude-sonnet-4-6 — review before relying.