On 8/10/2020 11:49 PM, Christian Huitema wrote:

> On 8/10/2020 11:14 PM, Rob Sayre wrote:
>> On Mon, Aug 10, 2020 at 10:58 PM Peter Gutmann
>> <pgut...@cs.auckland.ac.nz <mailto:pgut...@cs.auckland.ac.nz>> wrote:
>>
>>     Rob Sayre <say...@gmail.com <mailto:say...@gmail.com>> writes:
>>
>>     >Do you think this fingerprinting will work with the newer ECH
>>     design, if the
>>     >client can add arbitrary content to the encrypted payload?
>>
>>     ECH doesn't have any effect on web site fingerprinting so unless I've
>>     misunderstood your question the answer would be "N/A".
>>
>>
>> Assuming the definition here:
>> https://tools.ietf.org/html/draft-wood-pearg-website-fingerprinting-00
>>
>> it does seem like ECH would make this more difficult, at least for
>> pages in a large anonymity set. (agree that it won't matter much for
>> Twitter, Google, et al)
>
>
> Defeating fingerprinting is really hard. It has been tried in the
> past, as in "make me look like Skype" or "make me look like
> wikipedia". The idea is to build a target model, then inject enough
> noise and padding in your traffic to match the target model. But that
> way easier to say than to do!
>

There is also the question of what the anonymity set is. I just did a
little experiment of resolving 25000 domain names and looking at how
many resolved to the same IP address
(https://huitema.wordpress.com/2020/08/09/can-internet-services-hide-in-crowds/).
And then I redid the stats with 50000 domain names. Did not find a lot
of crowds. 75% of domain names in my sample resolve to their very own
address, not shared with anybody. Only 8% resolved by addresses shared
by 10 sites or more, and 1.3% resolved to addresses shared by 100 sites
or more.  Of course, 1% of the Internet is already something big. But
still, not quite the whole world...

-- Christian Huitema

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to