FINDING · DEFENSE
Slitheen++ embeds covert upstream data by applying HTTP/2-like header field compression to overt HTTP requests, using the recovered space for covert data placement. This ensures that neither timing information nor observable changes to packet sizes or delays can reveal decoy routing use to an omni-scientist passive censor. GZIP compression was explicitly avoided to prevent the CRIME side-channel attack.
From 2020-birtel-slitheen — Slitheen++: Stealth TLS-based Decoy Routing · §4 · 2020 · Free and Open Communications on the Internet
Implications
- Stealth upload channels should compress or substitute existing protocol overhead (e.g., redundant HTTP headers) rather than append bytes, so upstream packet sizes remain unchanged.
- Avoid payload-level compression algorithms (e.g., GZIP) that introduce compression-ratio side-channels; operate at the header-field level outside TLS record payload.
Tags
Extracted by claude-sonnet-4-6 — review before relying.