FINDING · DETECTION
Default Tor connections to a private bridge inside China were detected by the Great Firewall via active probing: an initial connection succeeded, followed by a probe from a Chinese IP address approximately 15 minutes later that performed a TLS handshake and then blacklisted the (IP, port) combination. Subsequent connection attempts resulted in a successful SYN followed by spoofed TCP RSTs terminating both the client and bridge connections.
From 2013-dyer-protocol — Protocol Misidentification Made Easy with Format-Transforming Encryption · §6 · 2013 · Computer and Communications Security
Implications
- Bridges must not respond to unauthenticated probe handshakes in any way that confirms they are Tor nodes; the probe-response behavior is the signal the GFW uses to blacklist the (IP, port) tuple.
- Encapsulating Tor traffic in FTE (port 80, HTTP format) bypassed this probing path entirely in the authors' tests, suggesting protocol misclassification disrupts the active-probing decision pipeline before blacklisting is triggered.
Tags
Extracted by claude-sonnet-4-6 — review before relying.