On 6/8/2018 7:35 AM, David Benjamin wrote:

> On Fri, Jun 8, 2018 at 10:07 AM R duToit <r@nerd.ninja> wrote:
>
>     > GREASE values should not make their way into code. The whole
>     point is to get code used to the fact that unknown values exist.
>
>     The GREASE mechanism is useful, but it will definitely make its
>     way into code and become ossified itself.  
>     Example:  https://github.com/salesforce/ja3
>
>
> Indeed. GREASE was targeting normal sensible endpoint implementations...

... and maybe we need a different mechanism to defeat fingerprinting
tools like this JA3 project. Maybe applications need to somehow
randomize their signatures, so that they are not so easy to recognize.
For example, it should be possible to use randomize the order of
extensions. And it should also be possible to throw some grease in these
sets.

Of course, the first ones to develop and use these randomization
techniques will most likely be the malware authors that the tools are
allegedly trying to track.

-- Christian Huitema
_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to