FINDING · DETECTION

The Kazakhstan interception system connected back to the origin TLS server before issuing a fake certificate, and in doing so exposed a unique TLS fingerprint (hash f09427b5aaf9304b): it used TLS record-layer version 1.0, ClientHello version 1.2, and offered only 13 cipher suites — a fingerprint virtually unseen in normal HTTPS traffic — allowing content providers to detect when a connection was being intercepted.

From 2020-raman-investigatingInvestigating Large Scale HTTPS Interception in Kazakhstan · §4.2.4 · 2020 · Internet Measurement Conference

Implications

Tags

censors
kz
techniques
tls-fingerprintdpi

Extracted by claude-sonnet-4-6 — review before relying.