On 8/10/2020 9:26 PM, Peter Gutmann wrote:
> Christopher Wood <c...@heapingbits.net> writes:
>
>> For the benefit of the list, would you mind sharing these references?
> I handwaved this one because I don't catalogue these things and didn't want to
> try and re-locate every preprint, paper, and report that's drifted across my
> desk in the last 6-12 months to try and find the relevant stuff... a recent
> one that I remember because it was published just a few days ago at Usenix
> Security after existing as an arXiv preprint for over a year, that's not ESNI
> but eDNS so almost the same thing, was "Padding Ain't Enough: Assessing the
> Privacy Guarantees of Encrypted DNS" which reports, and references other
> papers which report, an 80-90% success rate in de-anonymising encrypted DNS.
> The ESNI de-anonymisation is the standard web-site fingerprinting that's been
> used in the past to e.g. find people's incomes based on their encrypted
> traffic to tax filing sites.  In other words it doesn't care whether ESNI is
> used or not since it doesn't use it.

Fingerprinting is a real issue but from the reports, this is not what is
happening here. The researcher's experiments isolate a simple pattern
matching technique applied to the first client flight.

-- Christian Huitema

_______________________________________________
TLS mailing list
TLS@ietf.org
https://www.ietf.org/mailman/listinfo/tls

Reply via email to