FINDING · DETECTION
ShadowTLS's TLS ClientHello fingerprint (JA3 hash ebaa863800590426) was not observed in the TLSFingerprint.io dataset collected from a university network tap, making the client fingerprint unique to the tool and trivially blockable by censors maintaining a TLS fingerprint blocklist.
From 2023-wang-chasing — Chasing Shadows: A security analysis of the ShadowTLS proxy · §3.2 · 2023 · Free and Open Communications on the Internet
Implications
- Any new circumvention tool must mimic a high-prevalence TLS fingerprint from day one — use uTLS or equivalent to clone a browser's exact ClientHello cipher-suite ordering and extensions before deployment.
- Validate new fingerprints against a live fingerprint corpus (e.g., TLSFingerprint.io) before release; a fingerprint absent from that corpus is a blocking signal regardless of other mimicry properties.
Tags
Extracted by claude-sonnet-4-6 — review before relying.