FINDING · EVALUATION
TLS-Scanner, a subproject of the TLS-Attacker suite, automates handshake probes across deployed TLS hosts and has been used in published IPv4-wide scanning studies. It surfaces supported protocol versions, enabled extensions, and known vulnerabilities, providing a ready-made audit tool for circumvention infrastructure operators.
From 2024-niere-tls-attacker — TLS-Attacker: A Dynamic Framework for Analyzing TLS Implementations · §2 Impact (Academic Perspective) · 2024 · ACSAC 2024 (2nd Place Impact Award)
Implications
- Run TLS-Scanner against circumvention proxy endpoints before deployment to detect TLS configuration anomalies (unusual extension sets, legacy version support, weak cipher suites) that censors could use as stable fingerprint signals.
- Integrate TLS-Scanner into CI/CD pipelines for circumvention infrastructure so that any library upgrade that alters the ClientHello fingerprint is caught before it reaches production.
Tags
Extracted by claude-sonnet-4-6 — review before relying.