Eric Wustrow and myself have been collecting various tls clienthello fingerprints lately.
You can see some of our intermediate work here: http://tlsfingerprint.io/top/ - list of top fingerprints.
And we can confirm that at least some tls clienthellos that Signal generates on Android are unique. Which means that it's easily blocked.
We are currently working to get iOS tls clienthello fingerprints, I will be back with more info.
Is anyone in touch with Moxie?
On Monday, October 30, 2017 at 11:56:00 AM UTC-6, David Fifield wrote:
--
You received this message because you are subscribed to the Google Groups "Network Traffic Obfuscation" group.
To unsubscribe from this group and stop receiving emails from it, send an email to traffic-obf+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.
Signal (v. 2.17.1 latest from appstore) on iOS appears to use the standard iOS Client Hello fingerprint seen frequently on the wire (https://tlsfingerprint.io/nid/-1841910333254509671) both when fronting via google(e.g. google.ae), and when connecting directly. This was tested on an iPhone 6S Plus running iOS 11.
Signal on Android defines 3 different TLS "specs" for domain fronting when in certain (censored) countries (https://github.com/WhisperSystems/Signal-Android/blob/master/src/org/thoughtcrime/securesms/push/SignalServiceNetworkAccess.java#L28) via Google Maps, Mail and Play, so I expected to see 3 different fingerprints. When tested on Android 6.0.1 Samsung G900V with Signal 4.11.5, some fingerprints were never seen in Colorado (e.g. https://tlsfingerprint.io/nid/-940400682138463693), while other fingerprints were seen before (e.g. https://tlsfingerprint.io/nid/-2920019152659185851), but none of them appear to be extremely popular (as one would expect genuine google tls fingerprint be). We also have captured a lot of different fingerprints from the Android emulator (at least 5), but this may not reflect any real clients.
Given that people in GitHub iOS issue thread report this happening at multiple countries at once, it seems less likely to be related to TLS client hello fingerprinting.
However, it does appear that the Android version may be in jeopardy, but users don't seem to report any issues. There is one: https://github.com/WhisperSystems/Signal-Android/issues/7107 but it's about Domain Fronting simply not getting enabled when US phone number owner goes into UAE.
--
You received this message because you are subscribed to the Google Groups "Network Traffic Obfuscation" group.
To unsubscribe from this group and stop receiving emails from it, send an email to traffic-obf+unsubscribe@googlegroups.com.
For more options, visit https://groups.google.com/d/optout.