Re: [ietf-privacy] anonymity definition in"draft-hansen-privacy-terminology-03"

"Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com> Thu, 09 February 2012 07:17 UTC

Return-Path: <hannes.tschofenig@nsn.com>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61AC521F8534 for <ietf-privacy@ietfa.amsl.com>; Wed, 8 Feb 2012 23:17:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.433
X-Spam-Level:
X-Spam-Status: No, score=-106.433 tagged_above=-999 required=5 tests=[AWL=0.166, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kA70rc0zdQwb for <ietf-privacy@ietfa.amsl.com>; Wed, 8 Feb 2012 23:17:31 -0800 (PST)
Received: from demumfd001.nsn-inter.net (demumfd001.nsn-inter.net [93.183.12.32]) by ietfa.amsl.com (Postfix) with ESMTP id 5FD8B21F852A for <ietf-privacy@ietf.org>; Wed, 8 Feb 2012 23:17:30 -0800 (PST)
Received: from demuprx017.emea.nsn-intra.net ([10.150.129.56]) by demumfd001.nsn-inter.net (8.12.11.20060308/8.12.11) with ESMTP id q197HQNd029250 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 9 Feb 2012 08:17:26 +0100
Received: from DEMUEXC048.nsn-intra.net ([10.159.32.94]) by demuprx017.emea.nsn-intra.net (8.12.11.20060308/8.12.11) with ESMTP id q197H72e010387; Thu, 9 Feb 2012 08:17:26 +0100
Received: from FIESEXC035.nsn-intra.net ([10.159.0.25]) by DEMUEXC048.nsn-intra.net with Microsoft SMTPSVC(6.0.3790.4675); Thu, 9 Feb 2012 08:17:17 +0100
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Date: Thu, 09 Feb 2012 09:17:16 +0200
Message-ID: <999913AB42CC9341B05A99BBF358718D0115994F@FIESEXC035.nsn-intra.net>
In-Reply-To: <OFCB4FE8AD.BBD4A5AE-ON4825799F.000C7A03-4825799F.000FB1CC@zte.com.cn>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [ietf-privacy] anonymity definition in"draft-hansen-privacy-terminology-03"
Thread-Index: Aczm1dtyzc/sZkXuQbmfGkNKE32jhwAIpSBQ
References: <OFCB4FE8AD.BBD4A5AE-ON4825799F.000C7A03-4825799F.000FB1CC@zte.com.cn>
From: "Tschofenig, Hannes (NSN - FI/Espoo)" <hannes.tschofenig@nsn.com>
To: zhou.sujing@zte.com.cn, ietf-privacy@ietf.org
X-OriginalArrivalTime: 09 Feb 2012 07:17:17.0429 (UTC) FILETIME=[DAD1B250:01CCE6FA]
X-purgate-type: clean
X-purgate-Ad: Categorized by eleven eXpurgate (R) http://www.eleven.de
X-purgate: clean
X-purgate: This mail is considered clean (visit http://www.eleven.de for further information)
X-purgate-size: 2798
X-purgate-ID: 151667::1328771846-00007EDF-A8658DA8/0-0/0-0
Subject: Re: [ietf-privacy] anonymity definition in"draft-hansen-privacy-terminology-03"
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 Feb 2012 07:17:32 -0000

Hi Zhou, 

Thank you for your questions. 

I guess you are looking at the terminology document from the point of view of writing draft-zhang-hip-privacy-protection-04. You are trying to find the right words to describe the properties of the solution you have been working on. 

When you look at the privacy consideration draft (see http://tools.ietf.org/html/draft-iab-privacy-considerations-01) then the first thing is to think about a threat model. In your communication protocol you may consider the following adversaries:
(Note that I am saying this without having followed HIP for a long time and so I might be missing something here.)

* responders who get to see identity information,
* eavesdroppers who observe the exchanges and may want to learn about the communication relationships and the identities of the initiator and / or the responders, and 
* HIP-based intermediaries (e.g., these HIP-based firewalls).  

Could you explain me what the focus of your draft is with respect to hiding identities? 

I believe you are not trying to provide a mechanism to prevent disclosing the identity of the HIP initiator to the HIP responder. I think you care about eavesdroppers in the middle. Is this correct?

Ciao
Hannes


From: ietf-privacy-bounces@ietf.org [mailto:ietf-privacy-bounces@ietf.org] On Behalf Of ext zhou.sujing@zte.com.cn
Sent: Thursday, February 09, 2012 4:51 AM
To: ietf-privacy@ietf.org
Subject: [ietf-privacy] anonymity definition in"draft-hansen-privacy-terminology-03"


Hi,all 

the definition of anonymity 
"Definition:  Anonymity of a subject from an attacker's perspective
     means that the attacker cannot sufficiently identify the subject
     within a set of subjects, the anonymity set.
" 
1) is not clear about the content of anonymity set, will the real identities of candidate subjects be included? 
2) has too much variance when evaluating a scheme's anonymity. 

For example, draft-zhang-hip-privacy-protection-04 gives a privacy protection scheme by  hashing the real identity: 
B-HIT-I=SHA-1(HIT-T,N) 

and send B-HIT-I along with N (chosen for each session). 

if suppose the attacker has no knowledge of HIT-I, or  a set of HIT-I, the scheme has a certain anonymity; 
if suppose the attacker has knowledge of HIT-I, or a set of HIT-I(which is not difficult to collect), the scheme has no anonymity because he can try each HIT-I he knowes by 
recalculating SHA-1. 
  
The scheme has anonymity at first and has less anonymity with time went on and users have collected more HITs? 

I think as a character of system, it should be stable. 
  

Regards~~~

-Sujing Zhou