FINDING · DEFENSE

Frolov et al. (2020) found that obfs4, Shadowsocks Outline, Psiphon's OSSH, and Lantern's Lampshade are all identifiable by TCP flag and timing patterns when servers close connections on error, because each tool's timeout value and FIN/ACK behavior are distinct. Their recommended mitigation—'forever read' on errors so the prober always closes first—forces the server to terminate with FIN/ACK consistently across all code paths.

From 2020-v2ray-weaknessesSummary on Recently Discovered V2Ray Weaknesses · §Our comments · 2020 · gfw.report

Implications

Tags

censors
cn
techniques
active-probing
defenses
obfs4shadowsockspluggable-transport

Extracted by claude-sonnet-4-6 — review before relying.