Universit Università à di Roma di Roma “ “Tor Tor Vergata Vergata” ”
Giuseppe Bianchi, Csaba Kiraly, Renato LoCigno, Simone Teofili simone.teofili@uniroma2.it
Traffic Flow Flow Confidentiality Confidentiality in in IPsec - - PowerPoint PPT Presentation
Universit di Roma di Roma Tor Tor Vergata Vergata Universit Traffic Flow Flow Confidentiality Confidentiality in in IPsec IPsec: : Traffic Protocol and and Implementation Implementation Protocol Giuseppe Bianchi,
Giuseppe Bianchi, Csaba Kiraly, Renato LoCigno, Simone Teofili simone.teofili@uniroma2.it
12/07/2007
Length
Arrival time
Packets direction
Bob Bob 192.168.2.3 192.168.2.3 Alice Alice 192.168.2.5 192.168.2.5
12/07/2007
12/07/2007
E.g. sample size profile for www.amazon.com Bissias, Liberatore, Levine “Privacy Vulnerabilities in Encrypted HTTP Streams”
Canvel, Hiltgen, Vaudenay, Vuagnoux, “timing-based attack to Intercept passwords in a SSL/TLS Channel”
Different log-in error are characterized by different server’s answer times http://www.brice.info/crypto
12/07/2007
"Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,"
Employs a “network” of mixes to avoid the need of a single trusted one
Messages:
packs
lexicographical order
hidden by mix
12/07/2007
Dummy traffic Packets padding Traffic re-shaping
IPsec
Supporting different kind of traffic
12/07/2007
12/07/2007
12/07/2007
8 BIT 8 BIT
Security Parameter Index (SPI) Protocol transported Size of the data
IP HDR ESP HDR TFC HDR PAYLOAD TFC PADDING ESP TRAILER ESP AUTH NEXT HDR PAYLOAD SIZE
TFC Header IP packet
TOCT
16 BIT
Security Parameter Index
32 BIT
12/07/2007
– carry information about the type of treatment the packet may be subjected to – used in a multi-hop fashion, and especially for building IPsec-based Mix Networks.
12/07/2007
IP HDR ESP HDR
TFC Fragment 2
TFC HDR FRAG HDR PAYLOAD TFC PADDING ESP TRL ESP AUTH
TFC Fragment 1
IP HDR ESP HDR NEXT HDR ID OFFSET
FRAG Header IP packet
TFC HDR FRAG HDR
8 BIT 8 BIT 16 BIT
PAYLOAD PAYLOAD ESP TRL ESP AUTH
12/07/2007
12/07/2007
12/07/2007
batching, CBR (Continuous Bit rate), random padding, random delay algorithms Queue congestion Reactive algorithm (still experimental)
Able to take into account the status of the queues and/or the congestion level
12/07/2007
Delay Algorithm
Dummy
Padding
Fragmentation
Packets Length
Bit Rate
12/07/2007
12/07/2007
12/07/2007
Length (L. Bernaille, R. Teixeira, and K. Salamatian, “Early Application Identification”,
Proceedings of The 2nd ADETTI/ISCTE CoNEXT Conference, Portugal, 2006)
Inter-arrival time (M. Crotti, F. Gringoli, P. Pelosato, L. Salgarelli, “A statistical approach
to IP-level classification of network traffic”, IEEE ICC 2006, 11-15 Jun. 2006)
Packets are padded Delay algorithms modify packets inter-arrival time Different application flows can be multiplied on the same TFC SA.
12/07/2007
12/07/2007
12/07/2007
12/07/2007
12/07/2007
12/07/2007
tunnel m
transp
tunnel m
transportm
tunnel m
transp
tunnel m
transportm
12/07/2007
12/07/2007