OK, I'll move this out of the "if you can do a lot of replays" section

On Mon, Jun 26, 2017 at 10:25 AM, Colm MacCárthaigh <c...@allcosts.net>
wrote:

>
>
> On Sun, Jun 25, 2017 at 11:43 PM, Ilari Liusvaara <
> ilariliusva...@welho.com> wrote:
>
>> I understood that the cache probing attack requires much less replays
>> than the other side-channel ones. And furthermore, distributing the
>> replays among zones makes the attack easier (because replay with the
>> cached data hot doesn't tell that much).
>>
>
> In practice with real world HTTP caches, one replay is often sufficient.
> That's because in addition to the faster load time you can look at the
> cache headers (like max-age) to pinpoint that it was the replay that put
> the item in the cache. This would work with DNS too, where TTL or RRSET
> cycling leaks more information in the same way.
>
> Using more zones does help, and if the attacker were targeting a busy
> cache, then it can certainly help to weed out the noise and increase the
> likelihood of finding a zone/node where the cache is empty to begin with.
>
> --
> Colm
>
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to