On Thu, 2004-10-21 at 00:49, Pekka Savola wrote:
> > "However, note that an attacker, who is on path, may be able to
> >  perform significant correlation based on the payloads of the packets
> >  on the wire. Use of temporary addresses will not prevent such payload
> >  based correlation"
> > 
> > This clearly indicates that the correlation is done using data present 
> > in the payload. Is this text acceptable to you?
> That's fine.

I would also mention packet sizes and timing in addition to payload
content.  My understanding is that you can recover a surprising amount
of useful information without even looking at the payloads. 





--------------------------------------------------------------------
IETF IPv6 working group mailing list
[EMAIL PROTECTED]
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to