FINDING · DETECTION

VMess authentication uses a timestamp-based credential with a maximum 120-second (average ~60-second) expiration window, allowing an attacker to replay a captured legitimate request within that window. By making 16 connections with altered Encryption Key bytes that enumerate all 16 possible Margin P padding-length values, a prober can confirm a VMess server by observing a non-repeated set of connection-close byte counts spanning a delta of 15.

From 2020-v2ray-weaknessesSummary on Recently Discovered V2Ray Weaknesses · §Replay Attacks against the VMess Protocol · 2020 · gfw.report

Implications

Tags

censors
cn
techniques
active-probingdpi
defenses
vmess

Extracted by claude-sonnet-4-6 — review before relying.