Cross-layer RTT discrepancy (RTTdiff) is a protocol-agnostic fingerprint that exploits an inherent architectural property of all proxy setups: transport-layer sessions terminate at the proxy while application-layer sessions remain end-to-end. Evaluation across 10 proxy protocols—including VMess, Shadowsocks, VLESS, Trojan, XTLS-Vision, and obfs4-wrapped SOCKS—shows near-identical detection rates for all except obfs4, confirming the fingerprint is not tied to any specific obfuscation scheme. At FPR=0.01, per-website detection rates exceed 70% across all tested client and proxy location combinations.
From 2025-xue-discriminative — The Discriminative Power of Cross-layer RTTs in Fingerprinting Proxy Traffic
· §I, §VI-C
· 2025
· Network and Distributed System Security
Implications
Any circumvention proxy that forwards traffic without modifying packet timing is fundamentally vulnerable regardless of payload obfuscation; designers must address transport/application-layer session misalignment directly, not just payload entropy.
Evaluate RTTdiff exposure as a first-class threat model criterion when selecting or designing proxy architectures—particularly single-hop forwarding designs.