It seems that in a MITM attack, hackers may know the whole HTTPS packet size sent through the network (i.e. size of HTTP headers + HTTP body + overhead). Besides that, does the HTTPS protocol also allow the hacker to recover the length of the HTTP body (either compressed or not)?
I ask because this is related to whether or not "adding a string of random length to the HTTP header" can hide the compressed HTTP body's length, to mitigate (but I know cannot totally prevent) a BREACH attack.
If the answer is no, does anyone know other risks in placing the random-length string in the HTTP header, instead of in HTTP body, to mitigate a BREACH attack?
Content Type: Application Data (23)Here 23 is 23 bytes. Then further it shall give the information regarding the length of Application data. This length excludes the protocol header and including the MAC and padding trailers. http://en.wikipedia.org/wiki/Transport_Layer_Security#Application_protocol – ρss Jun 09 '15 at 08:40designed the Incompatible Timesharing System[where]there was no security breaking, because there was no security to break. For a hacker 'security' is an obstacle hindering playfulness. For an attacker/cracker, 'security' is part the target. – n611x007 Sep 07 '15 at 11:22