Hi,
Stephen Farrell <[email protected]> commented:
#Now that we seem to be getting a bit of a handle on the TLS
#related crypto parts of all this, (which are maybe easier
#or more tractable), I think it'd be timely to see some list
#discussion on traffic analysis before Vancouver.
#
#I'd be interested in any less obvious ways in which IETF
#protocols might be making traffic analysis easier than it
#ought be. And of course in countermeasures, but those are
#maybe quite difficult.
Just to quickly summarize a few traffic analytic approaches
(e.g., analyses that do not consider the contents of traffic)
at the 10,000 ft level:
-- Sometimes merely knowing that a communication is happening
between two particular parties conveys significant
information.
A classic example: a government official in a sensitive
role begins exchanging non-official messages with a known
agent of a foreign power (or an investigative journalist).
If that was noted, a big red flag might well go up.
-- Sometimes the frequency/volume of communications conveys
information that may signal something's afoot.
For instance, normal traffic volume might be sporadic and
brief, but in a crisis period, message count and total
message volume might ramp up dramatically. (this is the
classic "increased volume of chatter" comment sometimes
mentioned in the press)
Conversely, if "radio silence" suddenly descends, and
communications that normally take place suddenly cease,
that may also be a signal that something's happening.
-- Sequencing can also sometimes be important. Imagine a
situation where a report from party A is received by "HQ."
Shortly thereafter, communications fan out from "HQ" to
parties B through Z, perhaps coincidentally, perhaps not.
If that pattern repeats itself multiple times, we might
infer that party A is at least somehow "related to" the
activities of parties B through Z, in an extreme case,
perhaps going so far as to direct the activities of those
entities.
How might we hypothetically counter those traffic analytic approaches?
At a very simple level:
-- If the worry is that person-to-person messages unduly
expose relationships or contacts that might be red flags:
-- avoid phone calls, emails, IM, and other person-to-person
communication channels,
-- use one-to-many communications instead (post to Usenet
News, comment on a web page, send a twitter message, etc.)
-- If communication volume ("chatter") is the issue, send a
constant stream of traffic, regardless of whether things
are sleepy and routine or the exact opposite.
(FWIW, obviously most IETF protocols are NOT designed to send
a constant stream of traffic...)
-- If sequencing is the issue, decouple cause and effect in
time or space. If "A" contacts "HQ" and "HQ" then normally
contacts "B" through "Z", maybe always have HQ send messages
to B through Z (and AA-ZZ!) regardless of whether or not A
sends a message to HQ or not
Is that the sort of thing you wanted to begin discussing?
Regards,
Joe
_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass