Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

traffic analysis on TLS packets #162

Closed
hannesm opened this issue Jul 14, 2014 · 1 comment
Closed

traffic analysis on TLS packets #162

hannesm opened this issue Jul 14, 2014 · 1 comment

Comments

@hannesm
Copy link
Member

hannesm commented Jul 14, 2014

(from http://tools.ietf.org/html/draft-pironti-tls-length-hiding-02):
When using CBC block ciphers, the TLS protocol provides means to frustrate attacks based on analysis of the length of exchanged messages, by adding extra pad to TLS records. However, the TLS specification does not define a length hiding method for applications that require it. In fact, current implementations of eager fragmentation strategies or random padding strategies have been showed to be ineffective against this kind of traffic analysis.

Solution: implement length hiding policy http://tools.ietf.org/html/draft-pironti-tls-length-hiding-02

@hannesm
Copy link
Member Author

hannesm commented Nov 16, 2023

closing this, nearly 10 years later there hasn't been a fruitful discussion what to do.

@hannesm hannesm closed this as completed Nov 16, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Development

No branches or pull requests

1 participant