FINDING · DETECTION
The GFW's passive classifier uses two features of the first data packet to flag probable Shadowsocks traffic: (1) high Shannon entropy (per-byte entropy > ~7 bits strongly correlates with replay probability, which is nearly 4x higher at entropy 7.2 than at 3.0) and (2) packet length in the range 160–700 bytes with specific remainders mod 16. A single data packet after the TCP handshake is sufficient to trigger the downstream active-probing pipeline.
From 2020-alice-shadowsocks-detection — How China Detects and Blocks Shadowsocks · §4.2 · 2020 · IMC
Implications
- Pad or shape first-packet lengths to avoid the high-entropy 160–700 byte range, or ensure length remainders mod 16 do not fall into GFW replay-triggering buckets.
- Consider that any fully-random first packet of plausible proxy length will trigger active probing within seconds; server-side probe-deflection is required, not just traffic shaping.
Tags
Extracted by claude-sonnet-4-6 — review before relying.