Hi Med,
At 04:56 17-09-2013, [email protected] wrote:
One comment I have when reading this reco from your draft:
It is recommended that an identifier be used at the layer at which
its functionality is necessary for communication to be
established.
is, from a privacy perspective, there is no justification for it. If
the information is present in the packet, does it really matter if
it is used in other layers? Why reusing that info will impact the
privacy? Take the example of TCP that use the IP address for the
pseudo header checksum, SIP, SDP, etc. If you have in mind
particular identifiers, it would be valuable to explicit them rather
than having a generic statement.
The problem is secondary use (see RFC 6973 Section 5.2.3) and consent
[1]. The draft argues that consent is implicit if the information is
necessary for communication. If it is necessary to send out the IP
address in the TCP session, that does not mean that the protocol at a
higher layer can take it and put it in a header field. As an
example, please see Section 8.2 and 8.2 of
draft-ietf-appsawg-http-forwarded-10.
From a privacy perspective I can find out your approximate location
the source IP address used for your SIP call. There are times when
that can be embarrassing, e.g. you told your manager that you are
calling from work while the source IP address points to another
location. Let's say that we have to document the privacy
implications in our document. The reuse cases will be more work for
us as we have to think of more possibilities. The way to avoid that
is apply some form of layering when we tackle privacy.
The examples in Section 4 (of the draft) were chosen as the related
specifications explain what these identifiers are above. There isn't
any explanation in plain English for identifiers used in other
specifications. I could take the RFC 6973 approach and write a long
document. My guess is that people won't read it. :-) The approach I
adopted was to keep it simple. A generic statement can be argued
both ways. For example, you can argue that the identifier is
necessary at the higher layer without having to ask the user for
consent. I used "recommendation" instead of "requirement" so as not
to impose constraints.
If we take the example of an IP address as an identifier, even if it
is revealed in various layers, this does not mean that one single
individual/user is associated with that identifier. Take the example
of multiple machines behind the same CPE, or multiple subscribers
behind the same CGN, etc. Nevertheless:
* the configuration of a browser may be used easily to track user
(e.g., https://panopticlick.eff.org/)
* some application headers (e.g., referer) may contribute to ease
the correlation between many pieces of information (e.g., a web
email account and a social networking account for instance)
Discussing issues related to correlating information leaked by
applications would be useful to record in this document.
I commented about a draft recently (see
http://www.ietf.org/mail-archive/web/homenet/current/msg03100.html
). In a NAT scenario we cannot say that there is only one person
behind the CPE. The same applies to CGN. In an IPv6 scenario we can
narrow down (or might assume) that it is one person or device using
the IPv6 address. When the legislator writes the law the questions
that he or she will ask is:
(a) Does the IP address identify one person?
(b) Does the IP address identify the location from which the call was made?
Note that there is some ambiguity in the questions. The legislator
would like to have easy answers. This is where someone explains that
the IP address can be used to identify the person. For (b) the
explanation might be that the IP address can be used to identify the
location. It can be lead to events such as
http://www.tmz.com/2013/04/05/selena-gomez-swatted/
The browser sends a lot of information (re. the link you
provided). There are already some good questions in RFC 6973. I
chose not to discuss it in the draft to keep the discussion
simple. What I would like to see, for example, is what you did. You
mentioned that correlation can be a problem and you thought about
some other problems. I don't have the answers. However, it is a
step forward if you and I can talk about privacy and try and
understand how the identifiers can be used.
Regards,
S. Moonesamy
1.
http://www.cnil.fr/les-themes/internet-telephonie/fiche-pratique/article/ce-que-le-paquet-telecom-change-pour-les-cookies/
_______________________________________________
ietf-privacy mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/ietf-privacy