FINDING · DETECTION

ShadowTLS relays are detectable via three active probing techniques exploiting behavioral discrepancies from the mask sites they mimic: (1) responding to plaintext HTTP on port 443 with FIN-ACK rather than an error (only 17% of TLS servers share this behavior), (2) silently ignoring non-TLS record data post-handshake rather than sending a fatal alert (only 0.14% of 30M hosts behaved this way), and (3) silently ignoring corrupted TLS Application Data records rather than sending a bad_record_mac alert (only 0.12% of hosts silent).

From 2023-wang-chasingChasing Shadows: A security analysis of the ShadowTLS proxy · §3.2 · 2023 · Free and Open Communications on the Internet

Implications

Tags

censors
cn
techniques
active-probingtls-fingerprintdpi
defenses
mimicry

Extracted by claude-sonnet-4-6 — review before relying.