FINDING · DEFENSE

The root vulnerability in ShadowTLS is that the relay cannot authenticate post-handshake data from the real mask site, causing it to silently absorb censor probes. The fix — deployed in ShadowTLS v0.2.3 — has the client re-derive the Application Data encryption key from the server random and the client-relay shared secret; unrecognized records (lacking the shared secret) are transparently forwarded to the mask site, so all censor-visible responses come from the real mask server.

From 2023-wang-chasingChasing Shadows: A security analysis of the ShadowTLS proxy · §4 · 2023 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
active-probing
defenses
mimicryreverse-tls

Extracted by claude-sonnet-4-6 — review before relying.