Hi Hannes,
At 11:13 24-02-2013, Hannes Tschofenig wrote:
In order to address this comment we could either

To keep matters easy I'll say that my comments have been addressed.


a) change the meaning of the sentence. For example, we could come to the conclusion that privacy is not that complicated after all.
b) we could delete the sentence, or
c) explain a bit more why it is complicated.

I just googled for "privacy complicated concept" and found this link from Stanford: http://plato.stanford.edu/entries/privacy/
There it says:
'
Discussion of the concept is complicated by the fact that privacy appears to be something we value to provide a sphere within which we can be free from interference by others, and yet it also appears to function negatively, as the cloak under which one can hide domination, degradation, or physical harm to women and others.
"
When I look at the Google search results it seems that it is also a complicated concept for others. One additional reason why it is even more complicated for us is since there is not such a rich experience in the technical community with designing privacy into protocols. That does not mean that I think other disciplines are easy.

I agree that it is complicated. As you mentioned above, there isn't a rich experience in the technical community. Another reason why it is complicated for us is that we don't usually deal with social issues.

I get the written version of "blank stares" when I ask whether a draft raises privacy concerns. Frankly, it is unfair to ask an author to address such concerns when there is very little material to work from. How can "we" make that easier? Well, there is this IAB document. The problem (as I see it) is that if I tell people that it is a complicated concept, they will gloss over the concerns. I am not telling them that it is easy. What I can say is that the topic has been made accessible through an IAB document (the draft).

Why is this structure a problem?

I'll use RFC 6574 as an example. The document is easy to read. In my opinion it should be accessible to the average reader. The design considerations are clearly laid out. I read RFC 5218 and I came to the same conclusion.

It's somewhat difficult for me to follow the flow of ideas. I would not have noticed that if I didn't step back from the previous revisions before reading the latest revision. It's not that the draft is bad; it can be improved. Three of the authors are familiar with the IAB style. I suggest using that style. It's better than the IETF style. :-)

These are core concept in privacy and they have to be explained somewhere. For example, whether something is personal data or not determines whether the guidelines apply. Not all protocols deal with personal data. You can essentially stop reading if you find out that your protocol has nothing to do with personal data.

When we talk about personal data then the concept of identifiability is certainly something that jumps into a discussion next.

Yes.

I don't want the reader to stop reading as he/she will ignore stuff. I don't want the reader to jump to the guidelines section without understanding the explanations in the draft. I cannot stop anyone from doing that. However, if I make it easier, some people might not do that.

Now, the problem is that the core concept has to be explained. The linkage with the protocol aspect has to be crisp and clear.

In general, the threat model is an extension of RFC 3552.
The list of threats we have added after feedback from others that we need to be a bit more specific about the threats in the Internet protocol context. The available literature often talks about privacy threats without making the distinction between the real of Internet protocol engineering and what deployments impact.

So, what threats should be skipped in your opinion?

Difficult question. :-)

Thinking aloud, there isn't a compelling reason for privacy to be an extension of RFC 3552. Maybe that's what making the work more complicated. If there is a concern about confidentiality (protocol-wise) it is up to the security folks to resolve that. The privacy angle is different. Data minimalization, for example, is applied even if there isn't an adversary to intercept the information.

I'll react quickly to the question. Surveillance, for example, is something for the security folks to resolve. :-) The IETF already has a policy about wiretapping. Stored data compromise is out of scope.

From the Misattribution Section:

  "This threat can be mitigated by using identity management mechanisms
   with proper forms of authentication (ideally with cryptographic
   properties) so that actions can be attributed uniquely to an
   individual to provide the basis for accountability without generating
   false-positives."

You end up having to reconcile accountability and anonymity. From a security point of view, you want to fingerprint everybody so that you can identify the person you dislike and send him/her to jail. From a privacy point of view, you want a person to be able to communicate freely.

I'll use NEA as an example. RFC 5209 has some material about privacy. There is even an implementer considerations section. In the IETF "we" talk about end-points. The user aspect (privacy) is one step after that. It's not a technological issue.


It is not that simple. Just because we do not standardize user interfaces does not mean they are not important.

Yes.

I guess we both agree that the interaction of the user with the system is important (not only for privacy reasons). Just as an example from an IETF working group charter:

"
7. Descriptions of usability and user-interface concerns related to this
work (informational).
"
The reason it is there is because of the subtle impact of the AAA architecture on the user interaction. If you, for example, use a Web SSO mechanism then you get a permission dialog presented from the IdP before you release your personal data to the relying party. The AAA architecture is, however, different in the type of communication interaction and therefore such interaction between the IdP and the user is relayed through the RP only through a standardized protocol (EAP; not HTTP/HTML/JavaScript).

Ok, you'll need the user interface angle then.

While we cannot present super-long stories for every aspect in the document we are still planning to write a few long example documents (IPv6, for example, is one of them).

Ok.

I believe there is value in outlining what is typically part of the work in the IETF and what isn't. Not everyone who reads our document is familiar with the detailed scope of our work (which btw changes over time).

The problem is that there is value in keeping most, if not all, of the draft. And that takes us back to complicated concept.

I do believe it is important to say where the boundaries of the IETF work are and to state them because otherwise the next person shows up and says that you have forgotten X, Y, and Z just because we deleted it earlier due to your comments.

This is interesting. Maybe you could have the X, Y, and Z together in a section.

Regards,
-sm

_______________________________________________
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy

Reply via email to