On 10/22/2019 10:49 AM, Stephen Farrell wrote:
>
> On 22/10/2019 17:44, Salz, Rich wrote:
>> I think varying padding to some fixed multiple is a good trade-off.
> Me too. I'd go for multiples of 32 octets, with a SHOULD
> to add an extra block or two randomly, but anything of
> that kind should work.

Stephen, do you have some statistical analysis to back your "should
work" assertion?

I say that because DKG performed that analysis for the padding of DNS
messages
(https://dns.cmrg.net/ndss2017-dprive-empirical-DNS-traffic-size.pdf).
The results were non trivial. In particular, the analysis showed that
random padding was not a good way to achieve privacy. If there is only
little randomness, the attacker that observes multiple transactions
transactions can see through the randomness. If there is a lot of
randomness, then the padding policy causes a lot of overhead, which made
that policy less efficient than padding to fixed size blocks. That study
was the basis for the recommended encrypted DNS padding strategy in RFC
8467. 

I do not claim that statistics on the DNS directly inform ESNI padding
strategies, but I would say that in the absence of better analysis we
should heed DKG's recommendations for now -- and the recommendation of
padding to 260 does that. I would of course be happy to change my
opinion once we have an ESNI specific study.

-- Christian Huitema


Attachment: signature.asc
Description: OpenPGP digital signature

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to