Hi Bill, I have added the following text to include packet sizes and timing
"Please note that an attacker, who is on path, may be able to perform significant correlation based on o The payload contents of the packets on the wire o The characteristics of the packets such as packet size and timing Use of temporary addresses will not prevent such payload based correlation" Hope that resolves your issue. Thanks Suresh On Thu, 21 Oct 2004, Bill Sommerfeld wrote: >On Thu, 2004-10-21 at 00:49, Pekka Savola wrote: >> > "However, note that an attacker, who is on path, may be able to >> > perform significant correlation based on the payloads of the packets >> > on the wire. Use of temporary addresses will not prevent such payload >> > based correlation" >> > >> > This clearly indicates that the correlation is done using data present >> > in the payload. Is this text acceptable to you? >> That's fine. > >I would also mention packet sizes and timing in addition to payload >content. My understanding is that you can recover a surprising amount >of useful information without even looking at the payloads. > > > > -------------------------------------------------------------------- IETF IPv6 working group mailing list [EMAIL PROTECTED] Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------
