On 28 October 2013 06:37, Christian Huitema <[email protected]> wrote:
> A few weeks ago, we had a brief exchange on this list about traffic > analysis, specifically the collection and analysis of IP packet headers. I > wanted to write a draft describing the issue and proposing solutions, but > the day job interfered and I was delayed. With that, I missed the cutoff > date by many days. But the good news is that I finally wrote a first cut of > this draft, and put it on a personal web server: > > > > Passive Traffic Analysis Threats and Defense > draft-huitema-perpass-analthreat-00.txt > > Abstract > > Traffic analysis is used by various entities to derive "meta data" > about Internet communications, such as who communicates with whom or > what, and when. We analyze how meta-data can be extracted by > monitoring IP headers, DNS traffic, and clear-text headers of > commonly used protocols. We then propose a series of actions that > would make traffic analysis more difficult. > > Available for now at: > http://huitema.net/papers/draft-huitema-perpass-analthreat-00.txt > > I am sure that this draft could be much improved with feedback from this > list! You might want to look at the cleartext portions of the TLS handshake.
_______________________________________________ perpass mailing list [email protected] https://www.ietf.org/mailman/listinfo/perpass
