FINDING · DETECTION

Obfuscated proxy traffic (including Shadowsocks, VMess, VLESS, Trojan, obfs4, and REALITY) can be reliably fingerprinted by detecting encapsulated TLS handshakes — the inner TLS ClientHello that appears inside an outer encrypted tunnel. This fingerprint is protocol-agnostic: any proxy that wraps TLS-bearing application traffic will produce it. The authors deployed a similarity-based classifier within a mid-size ISP serving over one million users and demonstrated detection with minimal collateral damage.

From 2024-xue-fingerprintingFingerprinting Obfuscated Proxy Traffic with Encapsulated TLS Handshakes · Abstract, §5, §7 · 2024 · USENIX Security Symposium

Implications

Tags

censors
generic
techniques
dpitls-fingerprintml-classifier
defenses
shadowsocksvmessvlesstrojanobfs4reality

Extracted by claude-sonnet-4-6 — review before relying.