Proposal for making Tor TLS stand out less

Daniel Franganillo danielf at dilmun.ls.fi.upm.es
Tue Feb 1 17:25:00 UTC 2011


El 01/02/11 16:37, cmeclax-sazri escribió:
> Currently Tor traffic is sent in packets of 512 bytes (which "setevents bw"
> shows as 586), which makes it easy to recognize even though it's all TLS
> encrypted. I propose implementing the following on each connection from one
> Tor node to another:
> 1. Allocate a 2048-byte buffer.
> 2. When the relay has a packet to send, it puts it in the buffer, then picks a
> random number from 1 to the number of bytes in the buffer or 1426, whichever
> is less, and sends out that many bytes.
> 3. If the number of bytes remaining in the buffer is more than 1536, repeat
> step 2.
> 4. If no packet is ready to go out for a second, send out whatever is in the
> buffer.
> 1536=2048-512; 1426=1500+512-586.
>
> cmeclax
> ***********************************************************************
> To unsubscribe, send an e-mail to majordomo at torproject.org with
> unsubscribe or-talk    in the body. http://archives.seul.org/or/talk/

Is it really so infrequent to send SSL chunks of size 512B?

-- 
-----------------------------------
    Daniel Franganillo Corrales
-----------------------------------
e-mail: danielf at dilmun.ls.fi.upm.es
-----------------------------------
CriptoLab. Despacho 6305.
Facultad de Informática.
Campus de Montegancedo S/N
Universidad Politécnica de Madrid.
Boadilla del Monte. Madrid (Spain)
Teléfono - 91 336 (3673)
-----------------------------------


-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4096 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.torproject.org/pipermail/tor-talk/attachments/20110201/172f4cc0/attachment.bin>


More information about the tor-talk mailing list