FINDING · DETECTION
Encrypted protocols such as SSL/TLS remain fully fingerprint-able through their unencrypted handshakes: DPI can apply static string matching, packet-length comparison, and timing profiling to the cleartext cipher-negotiation and key-exchange phase to identify and block the protocol even though the payload is encrypted.
From 2011-wiley-dust — Dust: A Blocking-Resistant Internet Transport Protocol · §1.1 · 2011 · University of Texas at Austin
Implications
- Any circumvention protocol that begins with a recognizable cleartext negotiation (even partial) is trivially blockable via DPI — the entire handshake must be encrypted or randomized from byte zero.
- Existing TLS-mimicking transports that preserve the ClientHello structure inherit this fingerprint surface and require additional handshake obfuscation.
Tags
Extracted by claude-sonnet-4-6 — review before relying.