FINDING · DEFENSE
Obfsproxy (predecessor to obfs4) listens on randomized ports as an explicit defense against discovery by comprehensive Internet-wide scanning, because an adversary must scan all 65,535 ports to locate bridges rather than a single known port — multiplying scan cost by roughly 65,000× relative to a single-port sweep.
From 2013-durumeric-zmap — ZMap: Fast Internet-wide Scanning and its Security Applications · §4.4 · 2013 · USENIX Security Symposium
Implications
- Randomize bridge listening ports per deployment or per client to multiply the adversary's scan cost; combine with protocol obfuscation so that a port hit still yields no usable fingerprint.
- Document the port-randomization assumption explicitly in bridge deployment guides — operators who fix bridges to common ports (80, 443) negate this defense and make their nodes trivially enumerable.
Tags
Extracted by claude-sonnet-4-6 — review before relying.