Skip to content

GitLab

  • Projects
  • Groups
  • Snippets
  • Help
    • Loading...
  • Help
    • Help
    • Support
    • Community forum
    • Submit feedback
    • Contribute to GitLab
  • Sign in
H
HTTPS Everywhere EFF
  • Project overview
    • Project overview
    • Details
    • Activity
  • Issues 253
    • Issues 253
    • List
    • Boards
    • Labels
    • Service Desk
    • Milestones
  • Operations
    • Operations
    • Incidents
  • Analytics
    • Analytics
    • Value Stream
  • Members
    • Members
  • Activity
  • Create a new issue
  • Issue Boards
Collapse sidebar

GitLab is used only for code review, issue tracking and project management. Canonical locations for source code are still https://gitweb.torproject.org/ https://git.torproject.org/ and git-rw.torproject.org.

  • The Tor Project
  • Applications
  • HTTPS Everywhere EFF
  • Issues
  • #9493

Closed
Open
Opened Aug 15, 2013 by Peter Eckersley@pde

Implement an option to pad HTTPS requests against traffic analysis

One of the tools that dragnet surveillance actors have against both HTTPS and Tor is message length analysis. In general message lengths can be used to determine which paths on a give HTTPS domain a browser might be requesting (summed, but probably extractably so, with the lengths of messages the client might be POSTing to the server), and to perform end-to-end traffic analysis of Tor circuits.

HTTPS Everywhere is in a position to pad requests to servers to some round number of bytes (N byte blocks, powers of two, floors of powers of some number lower than two). We could do this by sticking in a new X-Padding: HTTP header. We could also write an RFC specifying that servers should pad their responses in a similar way if they see the X-Padding header. Perhaps we could persuade some servers to respect this.

Would this be valuable? What padding scheme would we want? Powers of two seems too costly for long messages, maybe we could have a hybrid that used 512 byte blocks for short messages and powers of 1.3 (15% overhead) or something for long messages. Perhaps we could even collaborate with some academics to figure out a good padding scheme based on message length spectra for gmail, wikipedia, or other major sites.

To upload designs, you'll need to enable LFS and have an admin enable hashed storage. More information
Assignee
Assign to
None
Milestone
None
Assign milestone
Time tracking
None
Due date
None
Reference: tpo/applications/https-everywhere-eff#9493