From: Martin Willi <martin@strongswan.org>
To: Herbert Xu <herbert@gondor.apana.org.au>
Cc: linux-crypto@vger.kernel.org, netdev@vger.kernel.org
Subject: Re: [PATCH 3/5] xfrm: Traffic Flow Confidentiality for IPv4 ESP
Date: Fri, 03 Dec 2010 09:32:55 +0100 [thread overview]
Message-ID: <1291365175.1997.34.camel@martin> (raw)
In-Reply-To: <20101203073403.GA2292@gondor.apana.org.au>
> What is the basis of this random length padding?
Let assume a peer does not support ESPv3 padding, but we have to pad a
small packet with more than 255 bytes. We can't, the ESP padding length
field is limited to 255.
We could add 255 fixed bytes, but an eavesdropper could just subtract
the 255 bytes from all packets smaller than the boundary, rendering our
TFC efforts useless.
By inserting a random length padding in the range possible, the
eavesdropper knows that the packet has a length between "length" and
"length - 255", but can't estimated its exact size. I'm aware that this
is not optimal, but probably the best we can do(?).
> Also, what happens when padto exceeds the MTU? Doesn't this
> effectively disable PMTU-discovery?
Yes. An administrator setting a padto value larger than PMTU can
currently break PMTU discovery.
> I know that your last patch allows the padto to be set by PMTU.
> But why would we ever want to use a padto that isn't clamped by
> PMTU?
Probably never, valid point.
I'll add PMTU clamping to the next revision. We probably can drop the
PMTU flag then and just use USHRT_MAX instead.
Thanks!
Martin
next prev parent reply other threads:[~2010-12-03 8:32 UTC|newest]
Thread overview: 11+ messages / expand[flat|nested] mbox.gz Atom feed top
2010-11-30 15:49 [PATCH 0/5] xfrm: ESP Traffic Flow Confidentiality padding Martin Willi
2010-11-30 15:49 ` [PATCH 1/5] xfrm: Add Traffic Flow Confidentiality padding XFRM attribute Martin Willi
2010-11-30 15:49 ` [PATCH 2/5] xfrm: Remove unused ESP padlen field Martin Willi
2010-11-30 15:49 ` [PATCH 3/5] xfrm: Traffic Flow Confidentiality for IPv4 ESP Martin Willi
2010-12-03 7:34 ` Herbert Xu
2010-12-03 8:32 ` Martin Willi [this message]
2010-12-03 8:39 ` Herbert Xu
2010-12-06 15:10 ` Martin Willi
2010-12-06 15:22 ` Herbert Xu
2010-11-30 15:49 ` [PATCH 4/5] xfrm: Traffic Flow Confidentiality for IPv6 ESP Martin Willi
2010-11-30 15:49 ` [PATCH 5/5] xfrm: Add TFC padding option to automatically pad to PMTU Martin Willi
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1291365175.1997.34.camel@martin \
--to=martin@strongswan.org \
--cc=herbert@gondor.apana.org.au \
--cc=linux-crypto@vger.kernel.org \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).