FINDING · DETECTION

Obfs4's data-transport phase encrypts per-record length fields with an unauthenticated stream cipher. An active adversary can overwrite this field to force a predictable TCP connection termination at a calculable byte offset; the authors experimentally confirmed that Tor-over-Obfs4 connections can be reliably distinguished from other FEPs because client initiation messages have consistent lengths.

From 2023-fenske-securitySecurity Notions for Fully Encrypted Protocols · §2.3 · 2023 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
active-probingfully-encrypted-detect
defenses
obfs4

Extracted by claude-sonnet-4-6 — review before relying.