←back to thread

176 points saikatsg | 3 comments | | HN request time: 0s | source
1. marcus_holmes ◴[] No.42210400[source]
I'm curious that he appears to completely ignore the network latency/jitter on the return path. How does this work?
replies(1): >>42212208 #
2. albinowax_ ◴[] No.42212208[source]
With the single-packet attack, you look at the order that the responses arrive in, instead of the time they take to arrive. Since the responses are on a single TLS stream, they always arrive at the client in the order that the server issued them in. Hope that makes sense!
replies(1): >>42216898 #
3. tptacek ◴[] No.42216898[source]
I take them to be asking why jitter on the return path doesn't confound the results, regardless of the trick used to ensure they arrive concurrently (and cancel out the jitter on the ingress path). The responses to single-packet H2 attacks are not themselves single packets.