FINDING · DETECTION

V2Ray's HTTP obfuscation mode prepends an HTTP header only to the first TCP payload per connection and uses a hardcoded HTTP 500 response for all failure cases, making the mimicry trivially detectable: legitimate HTTP servers send headers on every response, and do not return 500 for protocol errors a real HTTP server would never encounter.

From 2020-v2ray-weaknessesSummary on Recently Discovered V2Ray Weaknesses · §Failed to Mimic the HTTP Server · 2020 · gfw.report

Implications

Tags

censors
cn
techniques
active-probingdpi
defenses
mimicry

Extracted by claude-sonnet-4-6 — review before relying.