On Tue, Aug 29, 2000 at 05:22:03PM +1100, Zem wrote:
> Travis Bemann wrote:
> 
> > > Currently, all you see is:
> > >
> > > <-random MPI
> > > ->random MPI
> > > -><encrypted data>
> > > <-<encrypted data>
> > 
> > Good.  This shouldn't be very distinguishable from white noise.  That
> > will put a major dent in anyone's plans to packet sniff for Freenet
> > nodes.
> 
> The first 16 bits each way are the MPI-encoded lengths of the DH keys,
> so they'll tend to lie within a typical range.
> 
> That could be enough for some marketing-led firewall company to include
> a new "Freenet-proof" feature in their next release.

The question is how would you determine that the data is a Freenet key
exchange followed by encrypted data without knowing beforehand what
the data is?  There would be no way to tell that the data isn't just a
compressed video-audio stream designed by an idiot who didn't bother
to put any indicators of the protocol in use in the stream (in Freenet
this would be after encryption is started).

-- 
Travis Bemann
Sendmail is still screwed up on my box.
My email address is really bemann at execpc.com.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/pgp-signature
Size: 1292 bytes
Desc: not available
URL: 
<https://emu.freenetproject.org/pipermail/devl/attachments/20000829/20a7a791/attachment.pgp>

Reply via email to