FINDING · DEFENSE

Because Oscur0 starts with 0-RTT data lacking a full handshake, the station-side connection establishment is vulnerable to replay attacks. Oscur0 mitigates this by including a random 10-byte nonce in the encrypted application data of the first packet; the station checks each arriving nonce against a bloom filter of recently-seen IDs and drops duplicate connections, preventing replay without requiring a full round-trip handshake.

From 2024-chen-extendedExtended Abstract: Oscur0: One-shot Circumvention without Registration · §3 Design · 2024 · Free and Open Communications on the Internet

Implications

Tags

censors
generic
techniques
active-probing
defenses
decoy-routingconjure

Extracted by claude-sonnet-4-6 — review before relying.