Re: [ietf-privacy] New Webiquette RFC

2022-04-17 Thread Christian Huitema
This submission raises an interesting question for the IETF: how to 
treat anonymous (or pseudonymous) submissions?


On one hand, there are lots of classic reasons for hiding behind a 
pseudonym when participating in public discussions. On the other hand, 
the IETF has to be protected against intellectual property issues and 
against sabotage by external groups.


Before submissions are accepted for publication, their authors have to 
disclose whether they, or their employer, own intellectual property 
rights on the technologies described in the draft. Failure to disclose 
would influence the prosecution of intellectual property disputes that 
might arise when third parties implement the technology. This provides 
some degree of protection to implementers. But when the submission 
cannot be traced to a specific company, these protections disappear, and 
we might have a problem. So this is one source of tension between 
standards and anonymity.


The other source of tension is the risk of sabotage. Various groups have 
tried to sabotage the standard process in the past, for example to delay 
the deployment of encryption, or to introduce exploitable bugs in 
security standards -- some of these tactics were exposed in the Snowden 
revelations. Anonymous participation could allow these groups to perform 
such sabotage in untraceable ways, which is obviously not desirable.


I think this issue of anonymous participation is worth discussing.

-- Christian Huitema


On 4/17/2022 11:35 AM, kate_9023+...@systemli.org wrote:

Dear all,

I'm quite new at creating RFCs. I have recently submitted a draft for 
a new webiquette and I am still searching a group which will take care 
of it. It would fit into privacy as this new webiquette is dealing 
with new internet technology such as deepfakes, sharing photos of 3rd 
parties and so on and also deleting old information on a regular basis 
good behavior. It's also quite short with only 9 pages and also covers 
cancel culture and mobbing. I think a document like this is needed and 
important. Anyone here who'd like to take care or helping me making an 
RFC out of it? Or guide me in the right direction?


The draft can be found here: 
https://www.ietf.org/archive/id/draft-rfcxml-general-the-new-webiquette-00.txt


Best Regards,

Kate

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] Fwd: draft-huitema-dnssd-privacy-01.txt

2016-06-23 Thread Christian Huitema
(Moving this conversation to DNS-SD mailing list)

On Thursday, June 23, 2016 2:53 AM, S Moonesamy wrote:
> 
> Hi Tim,
> At 05:18 22-06-2016, Tim Chown wrote:
> >We're encouraging discussion of privacy considerations in the WG. As a
> >result, we now have a draft (see below), including an initial proposal
> >for a solution, for which we'd welcome wider review. The draft also
> >addresses mDNS/DNS-SD privacy within single subnet scenarios.
> 
> One of the privacy issue identified in the draft (Section 2.4) is device
> fingerprinting.  In Section 3.1, it is proposed to solve the privacy
issues
> described in Section 2.1 by obfuscating instance names.  If I had to pick
one
> privacy threat for that I would choose "correlation".  Obfuscating service
names
> would not address that.

Section 3 describes an initial design that was then abandoned. I guess that
in the next revision we could just remove that section entirely.

On the other hand, the proposal was indeed to use different obfuscated names
at different locations.


> If I understood the draft correctly, the solution "to prevent tracking
over time
> and location, different string values would be used at different
locations, or at
> different times".  QR-codes are used to generate a shared secret and
establish
> trust between two or more "friends".

The private discovery service relies on pre-existing pairings. The pairing
solutions are only drafted in very vague terms in the draft. I really wonder
whether we should go define a complete pairing protocol. Is that in-charter
for DNS-SD? What about competing with existing solutions over Bluetooth,
Wi-Fi, and certainly many more?

-- Christian Huitema



___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] Is there an official working definition for Privacy Online?

2015-04-17 Thread Christian Huitema
On Friday, April 17, 2015, at 9:14 AM, Dave Crocker wrote
 ...
 This translates into privacy relates to controlling disclosure of
 information about a person or organization.  Then add the
 scope-of-control portion.

There is indeed some fuzziness in the definition of privacy. I like the
analysis in this Pew Research Center study on Public Perceptions of Privacy
and Security in the Post-Snowden Era:
http://www.pewinternet.org/2014/11/12/public-privacy-perceptions/. I think
they do a good job relating threats to privacy and threats to personal
security. To quote: Beyond the frequency of individual words, when
responses are grouped into themes, the largest block of answers ties to
concepts of security, safety, and protection. For many others, notions of
secrecy and keeping things 'hidden' are top of mind when thinking about
privacy.

-- Christian Huitema





___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


[ietf-privacy] PPM Review of RFC 1108

2014-05-22 Thread Christian Huitema
This RFC defines an IP header option for security options. The options enable 
hosts to mark their traffic as belonging to a particular security level. 
Presumably, secure routers will ensure that traffic marked with a specific 
security option is contained within a network that meets the corresponding 
security requirements.

The RFC was written in 1988, before we started writing security considerations 
in RFC. A security consideration section would probably have listed the two 
major issues with the option, use by unauthorized hosts and use in unsecure 
networks.

If a network allows for traffic from both secure and unsecure sources, unsecure 
sources can easily insert spoof IP addresses and insert options in the IP 
header. This could be used for sending attack packets to secure system, despite 
attempts at compartmenting the network. Ping of death and variants come to mind.

A mobile host that is allowed to send secure traffic may inadvertently visit an 
insecure network. In that case, using the option provides for easy 
identification of the host as a potential target. Mobile hosts were not common 
in 1988, and this threat was not envisaged in the RFC.

This was then. By now, IP options are very rarely used. The RFC should probably 
be reclassified as historic.
___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] PPM Review of RFC 1108

2014-05-21 Thread Christian Huitema
That was my attempt at using the random lottery. I like using the issue page
better for input. Also, I prefer reading the html version of the RFC from
the IETF tools page. Maybe the lottery should just give you a suggestion of
an RFC number…

 

From: ietf-privacy [mailto:ietf-privacy-boun...@ietf.org] On Behalf Of
Christian Huitema
Sent: Wednesday, May 21, 2014 9:10 PM
To: ietf-privacy@ietf.org
Subject: [ietf-privacy] PPM Review of RFC 1108

 

This RFC defines an IP header option for security options. The options
enable hosts to mark their traffic as belonging to a particular security
level. Presumably, secure routers will ensure that traffic marked with a
specific security option is contained within a network that meets the
corresponding security requirements.

The RFC was written in 1988, before we started writing security
considerations in RFC. A security consideration section would probably have
listed the two major issues with the option, use by unauthorized hosts and
use in unsecure networks.

If a network allows for traffic from both secure and unsecure sources,
unsecure sources can easily insert spoof IP addresses and insert options in
the IP header. This could be used for sending attack packets to secure
system, despite attempts at compartmenting the network. Ping of death and
variants come to mind.

A mobile host that is allowed to send secure traffic may inadvertently visit
an insecure network. In that case, using the option provides for easy
identification of the host as a potential target. Mobile hosts were not
common in 1988, and this threat was not envisaged in the RFC.

This was then. By now, IP options are very rarely used. The RFC should
probably be reclassified as historic. 

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy


Re: [ietf-privacy] Wiki for managing PPM reviews of existing RFCs

2014-03-23 Thread Christian Huitema
 If you were at the Monday lunch and announced an intention to working
 on a particular set of RFCs, now there's a home for your reviews. If
 you couldn't commit to doing reviews but want to do some, here is your
 chance! (If you don't have a login on the wiki, it's easy to
 register.) In both cases, please add a ticket when you _start_ your
 review -- don't wait until you finish, people will want to know all
 about it from the start.

I added a couple of tickets for the various DHCP RFC that I reviewed when
writing the DHCP draft. What is the process for picking new RFC to review?
Just pick one at random and write a provisional ticket in
https://trac.tools.ietf.org/group/ppm-legacy-review/wiki ?

-- Christian Huitema

 

___
ietf-privacy mailing list
ietf-privacy@ietf.org
https://www.ietf.org/mailman/listinfo/ietf-privacy