FINDING · DEFENSE
Domain shadowing makes all three traffic indicators — connecting URL, SNI, and Host header — appear to belong to an allowed shadow domain while fetching content from a blocked back-end domain via CDN. Unlike domain fronting, it exploits a legitimate CDN feature (arbitrary back-end binding) rather than a SNI/Host mismatch quirk, so CDNs cannot disable it by enforcing header consistency without breaking legitimate use cases such as third-party service outsourcing via CNAME. The technique was demonstrated successfully accessing www.facebook.com from a heavily censored country.
From 2021-wei-domain — Domain Shadowing: Leveraging Content Delivery Networks for Robust Blocking-Resistant Communications · §3.3, §6.2 · 2021 · USENIX Security Symposium
Implications
- Prefer CDN back-end binding (domain shadowing) over SNI/Host header manipulation (domain fronting) — it uses a legitimate CDN API that providers cannot revoke without business damage, unlike domain fronting which Google and AWS disabled by 2021.
- Implement the DfDs++ variant: claim an unclaimed or non-existent domain as the CDN front-end so the shadow domain never appears in public DNS and cannot be enumerated or blocked by the censor.
Tags
Extracted by claude-sonnet-4-6 — review before relying.