FINDING · DETECTION
STUN and TURN packets carry a SOFTWARE attribute that explicitly names the server implementation (e.g., 'Citrix-3.2.5.1 Marshal West' for OpenTokRTC), and the choice of STUN servers, forced-TURN usage, and STUN message-type sequence (Binding-only vs. Allocate+CreatePermission vs. send-indication) differ across applications, providing a passive censor with reliable application-level fingerprints orthogonal to the DTLS layer.
From 2016-fifield-fingerprintability — Fingerprintability of WebRTC · §2, §4.1–§4.5 · 2016 · University of California, Berkeley
Implications
- Strip or randomize the STUN SOFTWARE attribute in Snowflake's ICE agent to prevent server-side identification; scrub all implementation-identifying strings from STUN/TURN attributes.
- Match the STUN server selection and message-type sequence of a high-traffic application such as Facebook Messenger to blend Snowflake's ICE negotiation into a plausible cover profile.
Tags
Extracted by claude-sonnet-4-6 — review before relying.