On 28 October 2013 06:37, Christian Huitema <[email protected]> wrote:

> A few weeks ago, we had a brief exchange on this list about traffic
> analysis, specifically the collection and analysis of IP packet headers. I
> wanted to write a draft describing the issue and proposing solutions, but
> the day job interfered and I was delayed. With that, I missed the cutoff
> date by many days. But the good news is that I finally wrote a first cut of
> this draft, and put it on a personal web server:
>
>
>
>               Passive Traffic Analysis Threats and Defense
>                 draft-huitema-perpass-analthreat-00.txt
>
> Abstract
>
>    Traffic analysis is used by various entities to derive "meta data"
>    about Internet communications, such as who communicates with whom or
>    what, and when.  We analyze how meta-data can be extracted by
>    monitoring IP headers, DNS traffic, and clear-text headers of
>    commonly used protocols.  We then propose a series of actions that
>    would make traffic analysis more difficult.
>
> Available for now at:
> http://huitema.net/papers/draft-huitema-perpass-analthreat-00.txt
>
> I am sure that this draft could be much improved with feedback from this
> list!


You might want to look at the cleartext portions of the TLS handshake.
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to