FINDING · EVALUATION
TLS-Attacker implements more than 330 cipher suites, including uncommon GOST and SM cipher suites specified by the Russian and Chinese authorities, covering SSL 3.0 through TLS 1.3 as well as DTLS 1.0 and DTLS 1.2. This breadth lets researchers test whether authority-mandated or jurisdiction-specific cipher suite selections alter TLS fingerprint classification by censors in those countries.
From 2024-niere-tls-attacker — TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations · §2 Development · 2024 · ACSAC 2024 (2nd Place Impact Award)
Implications
- Test whether advertising GOST or SM cipher suites in a ClientHello — suites the GFW or TSPU may treat as 'domestic' traffic — reduces active-probe or fingerprint-based blocking rates for circumvention proxies in CN or RU.
- Audit circumvention server TLS configurations against TLS-Attacker's full cipher-suite corpus to detect unintentionally narrow support that could fingerprint the proxy.
Tags
Extracted by claude-sonnet-4-6 — review before relying.