On Mon, 2015-10-26 at 00:15 +0100, Steffan Karger wrote:
> On Mon, Oct 26, 2015 at 12:09 AM, Steffan Karger <stef...@karger.me> wrote:
> > For
> > covert channels, it means 23 possible values per 1500-byte packet, or
> > ~5 bits for BF, and 12 possible values (~4 bits) for AES-CBC. That is
> > still less than the 8 bits QoS/ToS.
> 
> Grmbl, at the moment I hit send I realize I messed up bytes and bits
> in this back-of-the-envelope calculation.  For 1500-bytes packets,
> there are 187 possible lengths (~8 bits) for BF-CBC, and 93 possible
> lengths (~7 bits) for AES-CBC.  So just barely less than QoS/ToS, but
> --passtos would still double the bandwidth.

To be honest, you'd lost me a little before that anyway. The design
goals of a VPN deployment typically *don't* include blocking that kind
of covert channel anyway — and if it did, then we should all pack up
and go home, because we've failed.

It's not so much "I'll just disable the brakes", but more "there's this
burned-out wreck by the side of the road and three of its wheels are
missing; they probably won't notice if I take the fourth".

I'm actually *more* interested in the potential for incompatibilities
if we start setting the TOS bits — as we saw with stupid firewalls
dropping packets when ECN was in use. That sounds like a much more
reasonable argument for not doing --passtos by default, although even
that is somewhat diminished these days — I think most such firewalls
have been fixed now.

-- 
dwmw2


Attachment: smime.p7s
Description: S/MIME cryptographic signature

Reply via email to