FINDING · DETECTION

Shadowsocks 'stream cipher' methods lacked integrity protection on ciphertexts, enabling a decryption oracle: an attacker who can guess as few as 4 bytes of plaintext prefix (5 bytes without controlling a /24) can replay a recorded session with a modified 7-byte target header, causing the server to send the decryption of the entire recorded stream to an attacker-controlled host. This provides an efficient active test for identifying Shadowsocks servers; once identified, a censor can block by IP address.

From 2023-fifield-commentsComments on certain past cryptographic flaws affecting fully encrypted censorship circumvention protocols · §2 · 2023

Implications

Tags

censors
generic
techniques
active-probing
defenses
shadowsocks

Extracted by claude-sonnet-4-6 — review before relying.