TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Website Fingerprinting on Early QUIC Traffic

338 pointsby pueblitoover 4 years ago

9 comments

tialaramexover 4 years ago
At least some of this document is based on much older versions of QUIC. In particular it mentions RST_STREAM which went away by the end of 2018 in favour of RESET_STREAM.<p>In fact it&#x27;s possible it isn&#x27;t even talking about the proposed IETF protocol QUIC at all, but instead Google&#x27;s QUIC (&quot;gQUIC&quot; in modern parlance) in which case this might as well be a paper saying the iPhone is vulnerable to an attack but it turns out it means a 1980s device named &quot;iPhone&quot; not the Apple product.<p>It certainly references a bunch of gQUIC papers, which could mean that&#x27;s blind references from a hasty Google search by researchers who don&#x27;t read their own references - but equally could mean they really did do this work on gQUIC.
评论 #25972638 未加载
评论 #25972303 未加载
tyingqover 4 years ago
<i>&quot;allowing adversaries to infer the users&#x27; visited websites by eavesdropping on the transmission channel.&quot;</i><p>Ah, ok, that kind of fingerprinting. I suppose then this might be where our local ISP&#x27;s find a way to replace their now threatened DNS query sniffing. Assuming 95.4% accuracy means what I think it does, that&#x27;s pretty impressive.
评论 #25971268 未加载
评论 #25970784 未加载
评论 #25973336 未加载
mdaleover 4 years ago
It&#x27;s odd state of the world where we will have to add significant amounts of noise to prevent browsers from revealing what site they are visiting because of traffic request protocols getting too efficient and browsers trying to be efficient in predictable ways.
评论 #25973092 未加载
评论 #25970751 未加载
jamescunover 4 years ago
What are the proposed benefits of QUIC?<p>May be misguided, but I feel a little uneasy about bundling TCP functionality, TLS and HTTP into a single protocol over UDP.
评论 #25970509 未加载
评论 #25970298 未加载
评论 #25970309 未加载
评论 #25970317 未加载
评论 #25970293 未加载
评论 #25970541 未加载
评论 #25971032 未加载
quotemstrover 4 years ago
Anything other than a pipenet will be fingerprintable at some level. A pipenet is a network in which all links run at constant utilization, with dummy traffic (indistinguishable from useful traffic) sent over the links during idle periods. Pipenets are of course inefficient, but everything else is going to reveal <i>some</i> kind of signal distinguishable from noise at <i>some</i> level.
评论 #25971218 未加载
1vuio0pswjnm7over 4 years ago
Pipelining, HTTP&#x2F;1.1-style, not necessarily SPDY, HTTP&#x2F;2 or QUIC-style, can effectively counter this sort of fingerprinting that relies on analysis of request-response sizes.^1 I have used HTTP&#x2F;1.1 pipelining outside the browser for bulk data retrieval for decades. Although I do not normally randomise requests, the UNIX-style filters I wrote to do pipelining could easily be used for this purpose.<p>1. <a href="https:&#x2F;&#x2F;blog.torproject.org&#x2F;experimental-defense-website-traffic-fingerprinting" rel="nofollow">https:&#x2F;&#x2F;blog.torproject.org&#x2F;experimental-defense-website-tra...</a>
jpcsmithover 4 years ago
We had also investigated the differences in fingerprintability between HTTP&#x2F;QUIC and HTTPS (WF in the Age of QUIC, PETS&#x27;21). We had found equivalent fingerprintability with deep-learning classifiers when eavesdropping on the traffic through Wireguard. It&#x27;s interesting though to see the stark difference they found between fingerprinting HTTP&#x2F;QUIC and HTTPS when using only the first ~40 packets. The trends in those early packets had also allowed us to easily differentiate between the two types of traffic over the VPN.<p>Our paper, in case you want to read more on this area: <a href="https:&#x2F;&#x2F;petsymposium.org&#x2F;2021&#x2F;files&#x2F;papers&#x2F;issue2&#x2F;popets-2021-0017.pdf" rel="nofollow">https:&#x2F;&#x2F;petsymposium.org&#x2F;2021&#x2F;files&#x2F;papers&#x2F;issue2&#x2F;popets-202...</a>
zerononeover 4 years ago
I assume most websites have a unique public IP, once you know the destination address, isn&#x27;t it easy to infer the visited website.
评论 #25975879 未加载
bluedinoover 4 years ago
Is it still true that QUIC avoids inspection&#x2F;filtering, so it&#x27;s blocked by a lot of corporate firewalls?
评论 #25971198 未加载
评论 #25970943 未加载