FINDING · DETECTION

V2Ray clients emitted TLS ClientHello messages with a hardcoded, rarely-seen ciphersuite (fingerprint ID 8c48b95f67260663 on tlsfingerprint.io) that allowed a machine-learning classifier to identify V2Ray TLS traffic with 0.9999 accuracy; the same classifier could not accurately identify the traffic after the fingerprint was changed. The blocking rule based on the unique ciphersuite could be expressed in a single iptables line.

From 2020-v2ray-weaknessesSummary on Recently Discovered V2Ray Weaknesses · §Unique TLS ClientHello Fingerprints · 2020 · gfw.report

Implications

Tags

censors
cn
techniques
tls-fingerprintml-classifier
defenses
vmessvless

Extracted by claude-sonnet-4-6 — review before relying.