El 01/02/11 16:37, cmeclax-sazri escribió:
Currently Tor traffic is sent in packets of 512 bytes (which "setevents bw" shows as 586), which makes it easy to recognize even though it's all TLS encrypted. I propose implementing the following on each connection from one Tor node to another: 1. Allocate a 2048-byte buffer. 2. When the relay has a packet to send, it puts it in the buffer, then picks a random number from 1 to the number of bytes in the buffer or 1426, whichever is less, and sends out that many bytes. 3. If the number of bytes remaining in the buffer is more than 1536, repeat step 2. 4. If no packet is ready to go out for a second, send out whatever is in the buffer. 1536=2048-512; 1426=1500+512-586. cmeclax *********************************************************************** To unsubscribe, send an e-mail to majordomo@xxxxxxxxxxxxxx with unsubscribe or-talk in the body. http://archives.seul.org/or/talk/
Is it really so infrequent to send SSL chunks of size 512B? -- ----------------------------------- Daniel Franganillo Corrales ----------------------------------- e-mail: danielf@xxxxxxxxxxxxxxxxxxx ----------------------------------- CriptoLab. Despacho 6305. Facultad de Informática. Campus de Montegancedo S/N Universidad Politécnica de Madrid. Boadilla del Monte. Madrid (Spain) Teléfono - 91 336 (3673) -----------------------------------
Attachment:
smime.p7s
Description: S/MIME Cryptographic Signature