Hello,

Thanks much for all good questions. Please see below:


Selon "Manfredi, Albert E" <[EMAIL PROTECTED]>:

> > -----Original Message-----
> > From: Pars Mutaf [mailto:[EMAIL PROTECTED]
> > Dear all,
> >
> > Quick reminder: the problem that I'm bringing to your
> > attention is:
> >
> > http://www.ietf.org/internet-drafts/draft-mutaf-piqproblem-00.txt
>
> Pars, it seems to me that the reason cell phone numbers are hard to get
> is that cell phone users have long preferred it to remain that way.


I don't agree with you here. Cell phone users had no choice. They were and
still are subject to a fundamental trade-off between privacy and
reachability.

I have seen users, with broken cell phones, or who have lost their phone.
They are simply in trouble. They have hard time recovering the cell phone
numbers of their friends, colleagues, family members etc.

I have seen users (including myself) exchanging phone numbers in
ridiculous ways. The first number is read to the other user, and the other
user returns his/her number via the cellular network. It should be noted
that this also requires short distance user contact. If the other user is
100 meters away, you see each other but you are in a crowded place and you
can't reach each other, you simply cannot communicate. You have cellular
phones but are unable to communicate.

Or, just after a tsunami, someone that I know is lost. But I don't have
a cell phone (or lost it). I can borrow a phone from someone else but I
don't have the phone number.

Or simply, you need another user's phone number but you don't have it yet.
You know each other but you have not exchanged your phone numbers yet.

etc etc...


> For
> that matter, with sales people completely abusing the regular land line
> phone system, I believe the majority of land line telephone subscribers
> would have preferred that other phone system to be equally made
> difficult to abuse.


This is an excellent point. Please see below.


>
> So I don't think that making it easier to distribute cell phone
> telephone numbers is something that technology is preventing.



The main requirement is that if you need private information about Alice,
you should ask Alice. Alice will decide in *real-time* (real-time is
really the keyword here). The decision belongs to Alice.

We have Bluetooth, IrDA etc, but they require user contact. Surprisingly
we cannot exchange private information via a cellular network (i.e. over
very large distances). I suspect that this is simply because we don't have
multicast name resolution or name-based IPv6 addresses currently (in
cellular context). Please take my last sentence seriously. I mean it.
These are the only solutions for learning someone's IP address from
his/her human name. And if you don't know Alice's device's IP address,
you cannot reach her phone and request her phone number.

I think this also answers a good question like: "If this protocol is that
important why we don't have it today?"... I think the answer is above.


> In your proposal, for example, the problem will happen when obnoxious,
> over the top sales critters (as they have proven themselves to be)
> figure out how to pretend they are alicecollins making the request for
> your phone number. Your will reply "yes," and then you're screwed.
>
> Or, alternatively, an alicecollins is making this request, but the one
> you really know is called alicejcollins. Now this unknown person has
> your cell number.


These are very sane and important concerns. This protocol must be designed
carefully. My point is that, *today*, we *have* well-known security
solutions to achieve that. A serious threat analysis must be made and the
protocol must be designed accordingly. Some of the potential threats and
defenses (I'm not expert on details):

     1. For example, as you have very well identified, the requesting
        user's identity must be verifiable. If not, the responder user
        must be notified. Again, the decision belongs to the user.

     2. There will be Denial-of-Service threats if we use public key
        cryptography. Same problem with IKE. In our case, we have an
        advantage: the requestor is necessarily a *human*. Consequently,
        CAPTCHAs (Turing test) may be used. All we need to do is to define
        a CAPTCHA option in our exchanges. Work is needed of course.

        URL: http://en.wikipedia.org/wiki/Captcha

     3. The last threat that you identified above looks like "phishing"
        to me. We have this problem on the web. I suspect that there is
        ongoing work on that. But anyway, I don't think this is a
        compelling enough reason to STOP this project.

Also,
some users may augment their own level of security by using a pseudonym
instead of their real name, etc etc.

If phone number information leaks (not because of the proposed protocol),
some users may periodically change their phone number (i.e. recovation).
But again, in this case, they will need the proposed protocol to
redistribute their new phone number more easily.

These decisions belong to the user.


>
> In short, I don't think it is technology that is needed here.


I think technology is needed, and we *have* this technology and the
necessary expertise. All we need to do is to put the pieces together.


Regards,

pars mutaf


>
> Bert
>



----------------------------------------------------------------
This message was sent using IMP, the Internet Messaging Program.

--------------------------------------------------------------------
IETF IPv6 working group mailing list
ipv6@ietf.org
Administrative Requests: https://www1.ietf.org/mailman/listinfo/ipv6
--------------------------------------------------------------------

Reply via email to