Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Use of HTTP compression potentially exposes chaff response #2

Open
anthturner opened this issue Jul 28, 2020 · 0 comments
Open

Use of HTTP compression potentially exposes chaff response #2

anthturner opened this issue Jul 28, 2020 · 0 comments

Comments

@anthturner
Copy link

If HTTP compression is enabled on the server, it might be possible that the use of chaff could be detected by observing the compression potential of valid vs chaff responses.

For example, if a valid response is 64 bytes of JSON text, that will likely compress to a significantly smaller size than 64 bytes of data with a higher degree of entropy. So, if the tracker is recording the response payload size prior to the application of compression by the server, the corresponding implications from data compression will not be accounted for when generating the chaff response size.

I wanted to toss this out there as a possible idea just in case it was overlooked. Happy to talk it through further if you'd like. :)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant