On Tue, Aug 29, 2000 at 05:22:03PM +1100, Zem wrote: > Travis Bemann wrote: > > > > Currently, all you see is: > > > > > > <-random MPI > > > ->random MPI > > > -><encrypted data> > > > <-<encrypted data> > > > > Good. This shouldn't be very distinguishable from white noise. That > > will put a major dent in anyone's plans to packet sniff for Freenet > > nodes. > > The first 16 bits each way are the MPI-encoded lengths of the DH keys, > so they'll tend to lie within a typical range. > > That could be enough for some marketing-led firewall company to include > a new "Freenet-proof" feature in their next release.
The question is how would you determine that the data is a Freenet key exchange followed by encrypted data without knowing beforehand what the data is? There would be no way to tell that the data isn't just a compressed video-audio stream designed by an idiot who didn't bother to put any indicators of the protocol in use in the stream (in Freenet this would be after encryption is started). -- Travis Bemann Sendmail is still screwed up on my box. My email address is really bemann at execpc.com. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/pgp-signature Size: 1292 bytes Desc: not available URL: <https://emu.freenetproject.org/pipermail/devl/attachments/20000829/20a7a791/attachment.pgp>
