FINDING · DEFENSE
MultiFlow mitigates TLS termination attacks—where an adversary drops a connection after one data exchange—by having the client exfiltrate TLS session resumption information (219 bytes: 208-byte psk identity plus ticket metadata) to the decoy router. The decoy router can then resume a session with a different decoy host, establishing a new covert channel even if the original connection is severed, and amortizing per-session setup cost across multiple connections.
From 2018-manfredi-multiflow — MultiFlow: Cross-Connection Decoy Routing using TLS 1.3 Session Resumption · §3.3 · 2018 · Free and Open Communications on the Internet
Implications
- Design covert channels to be resumable across multiple distinct server connections so that connection termination by a censor does not kill the circumvention session.
- Pre-provision session resumption credentials during the initial handshake so that cross-server failover incurs no additional user-visible latency.
Tags
Extracted by claude-sonnet-4-6 — review before relying.