FINDING · DEFENSE

No existing fully encrypted protocol — including Obfs4, Shadowsocks, VMess, and Obfuscated OpenSSH — simultaneously satisfies passive indistinguishability (FEP-CPFA), active-manipulation resistance (FEP-CCFA), and output-length shaping. The paper presents a novel stream-based construction that provably satisfies all three using AEAD-authenticated length blocks, an output buffer supporting arbitrary fragmentation, and a padding mechanism allowing the sender to emit exactly p output bytes on demand.

From 2023-fenske-securitySecurity Notions for Fully Encrypted Protocols · §2–3 · 2023 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
fully-encrypted-detecttraffic-shapeactive-probing
defenses
obfs4shadowsocksrandomization

Extracted by claude-sonnet-4-6 — review before relying.