Comment Confused (Score 0) 20
One of the main principals of a crypto message is that it can't be reversed, and no part of the enciphered message should be able to be able to be guessed without the secret key. As shown in this (https://appliance.cloudshark.org/blog/packet-capture-of-heartbleed-in-action/) post about heartbleed, we can tell what heartbeat message type was chosen, but we can't identify how many bytes the payload was unless we decrypt the data.
So my question is, without having man in the middled all the sessions, or had the decryption keys. How are these researchers making this statement?
The issue line was:
buffer = OPENSSL_malloc(1 + 2 + payload + padding);
How can they differentiate between payload/padding after it's been sent across the wire?