[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: DEFCON Presentations



That is fairly true, within a margin of error. Symmetric encryption has one bit of output for every bit of input (with padding), so the size will be reasonably close. If you know all of the pages on a specific host (and they are either static or don't change much dynamically), you could guess at them assuming they differ significantly. Problems would include keepalive connections (you can't tell where one page ends and the next begins if pipelining is used), accounting for response headers, etc. Also, depending on the SSL implementation and TCP state, padding may be significant or insignificant - so you can't really account for that either.

It'd be of very limited use unless static files of very differing sizes were being served and the indirect knowledge of what file a given user was requesting was useful to you. It would not hurt the anonymity of tor, of course, because any node that knows you will not know where you are going.

That's all original opinions - I don't recall seeing anything detailing this specifically. You might be able to find a more in-depth paper on the concept, but it is of fairly limited use.

- John Brooks


On Sun, Aug 17, 2008 at 10:23 PM, Peter Thoenen <eol1@xxxxxxxxx> wrote:
Was reading Rodger's slides and anybody have a link with more info on slide 41 ... "If you can see an SSL-encrypted link, you can guess what web page is inside based on length"

First I am hearing of this one and genuinely curious.

-Peter