FINDING · DEFENSE
Clients embed HMAC-derived, time-varying sentinels into the 28-byte random field of the TLS ClientHello message, which decoy routers can scan at line rate. Sentinels are keyed to the current hour and a per-hour sequence number, providing freshness. This covert channel requires no out-of-band signaling and is invisible to passive observers who see only a normal TLS handshake toward the decoy destination.
From 2011-karlin-decoy — Decoy Routing: Toward Unblockable Internet Communication · §3.2 · 2011 · Free and Open Communications on the Internet
Implications
- Embed covert signals in fixed-offset, high-entropy fields of legitimate handshakes (e.g., TLS random) so line-rate routers can detect them without full payload parsing.
- Use time-keyed HMACs rather than static shared secrets to limit replay and preplay windows; rotate keys at least hourly.
Tags
Extracted by claude-sonnet-4-6 — review before relying.