Balboa's covert signaling protocol derives per-connection keys as KDF(TLS_master_secret ∥ pre_shared_secret) and signals by XOR-ing the MAC of a TLS Application Data record with this derived key. Because the master secret is ephemeral, the scheme inherits TLS forward secrecy—unlike Telex-based signaling (Client Random modification), future server compromise cannot retroactively identify which historical connections used Balboa, and a censor mimicking a client has negligible probability of guessing the modified MAC without the pre-shared secret.
From 2021-rosen-balboa — Balboa: Bobbing and Weaving around Network Censorship
· §2.6.3
· 2021
· USENIX Security Symposium
Implications
Tie covert signaling to ephemeral TLS session keys rather than long-term server keys; this prevents a compromised server from serving as a retrospective oracle for past connection metadata.
Ensure the server enters full pass-through mode (behaving as a normal server) on signaling failure, so active probers receive only legitimate application responses and cannot confirm the server is circumvention-capable.