FINDING · DETECTION
Randomization-based obfuscation systems (obfs2/3, obfs4, ScrambleSuit, Dust) resist blacklist DPI but fail entirely under protocol-whitelist filtering, as explicitly demonstrated during the Iranian elections where censors permitted only known-good protocols. Pure randomization provides no signal of being a permitted protocol, making it trivially blockable under any whitelist regime.
From 2015-dyer-marionette — Marionette: A Programmable Network-Traffic Obfuscation System · §1, §2 · 2015 · USENIX Security Symposium
Implications
- Deploy protocol-mimicry or tunneling-based transports rather than pure randomization in any environment where censors may apply whitelist-style filtering — detect whitelist conditions in-band and switch strategies accordingly.
- Treat randomization as a blacklist-only defense; always pair it with a mimicry fallback for deployments in Iran or other environments with known whitelist enforcement.
Tags
Extracted by claude-sonnet-4-6 — review before relying.