FINDING · DEFENSE

By extracting TLS session keys through library debugging hooks (SSLKEYLOGFILE for GnuTLS/NSS/Rustls; an injected SSL_new() callback for OpenSSL) rather than reimplementing the TLS handshake, Balboa leaves the ClientHello entirely untouched. This prevents the class of fingerprinting attacks documented by Frolov and Wustrow that identified meek and similar tools via observable differences in cipher-suite ordering and TLS extension patterns, while remaining compatible with OpenSSL, GnuTLS, NSS, and Rustls without requiring application source-code modifications.

From 2021-rosen-balboaBalboa: Bobbing and Weaving around Network Censorship · §2.4, §7 · 2021 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
tls-fingerprint
defenses
tunneling

Extracted by claude-sonnet-4-6 — review before relying.