FINDING · EVALUATION
Despite fully encrypted protocols existing since obfs2 in 2012, the first documented evidence of the GFW passively detecting them purely by randomness appeared only in 2021 — approximately a decade later — and was limited to certain foreign IP address ranges and a subsampled fraction of traffic. Meanwhile, the GFW had been discovering obfs2/obfs3 servers via active probing as early as 2013, indicating censors found active-probing-based address discovery cheaper and more reliable than passive statistical classifiers for this protocol family.
From 2023-fifield-comments — Comments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols · §5 · 2023
Implications
- Active-probing resistance is empirically more urgent than perfect statistical indistinguishability from random bytes: the GFW used active probing against obfs2/3 within a year, but took a decade to deploy passive randomness-based classifiers.
- Fully encrypted protocols without active-probing resistance (e.g., Shadowsocks without a replay filter) are vulnerable on a much shorter timescale than those with active-probing resistance, regardless of per-packet byte statistics.
Tags
Extracted by claude-sonnet-4-6 — review before relying.