FINDING · DEFENSE
Firefox adopted DTLS 1.3 by default for WebRTC in May 2024 (version 127); Chrome has implemented DTLS 1.3 in BoringSSL but not yet enabled it by default. DTLS 1.3's Encrypted Client Hello (ECH) extension would encrypt extension lists and make passive field-based fingerprinting of those extensions obsolete — but censors may choose to block DTLS 1.3 ECH unless browsers adopt it widely enough that blocking causes unacceptable collateral damage. The Pion library (used by Snowflake standalone proxies) has no concrete roadmap for DTLS 1.3 support, creating a growing gap.
From 2025-midtlien-fingerprint-resistant — Fingerprint-resistant DTLS for usage in Snowflake · §4.1, §5, §7 · 2025 · Free and Open Communications on the Internet
Implications
- Snowflake and other Pion-based transports should prioritize DTLS 1.3 implementation as a prerequisite for ECH support; until then, mimicry of DTLS 1.2 browser handshakes is the best available countermeasure.
- If browser DTLS 1.3 + ECH reaches sufficient adoption, censors blocking ECH in DTLS would face the same collateral-damage constraint that makes blocking TLS ECH costly — protocol designers should track browser DTLS 1.3 rollout.
Tags
Extracted by claude-sonnet-4-6 — review before relying.