FINDING · DETECTION
The DTLS ClientHello extensions field is the most prominent feature for fingerprinting Snowflake's Pion WebRTC stack. A passive DPI tool (dfind) validated against the MacMillan et al. dataset of 6,500 DTLS handshakes reliably identifies Pion-based implementations via unique extension byte patterns. Chrome randomized its extension list order starting with version 129.0.6668.58 (September 2024), yielding 6! = 720 unique permutations and hardening it against deterministic matching. Firefox adopted DTLS 1.3 by default from version 127 (May 2024), which changes the extension structure entirely and renders DTLS 1.2 mimicry obsolete for Firefox traffic.
From 2025-midtlien-fingerprint-resistant — Fingerprint-resistant DTLS for usage in Snowflake · §3, §4.1 · 2025 · Free and Open Communications on the Internet
Implications
- Snowflake fingerprint-resistance work must target the proxy (DTLS client role) not the user client; RFC 5763 / SDP semantics cause the proxy to initiate DTLS handshakes.
- Mimicking specific browser DTLS fingerprints must be continuously updated as browsers silently change their DTLS stacks; a CD pipeline that captures daily browser handshakes is necessary to maintain up-to-date mimicry.
Tags
Extracted by claude-sonnet-4-6 — review before relying.