Re: [ietf-privacy] [perpass] New Version Notification for draft-cooper-ietf-privacy-requirements-00.txt

Stephen Farrell <stephen.farrell@cs.tcd.ie> Mon, 23 September 2013 12:25 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: ietf-privacy@ietfa.amsl.com
Delivered-To: ietf-privacy@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 58FD021F9DD6; Mon, 23 Sep 2013 05:25:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.926
X-Spam-Level:
X-Spam-Status: No, score=-102.926 tagged_above=-999 required=5 tests=[AWL=-0.327, BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mX9B3YFI+26h; Mon, 23 Sep 2013 05:24:55 -0700 (PDT)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) by ietfa.amsl.com (Postfix) with ESMTP id 7811421F9F08; Mon, 23 Sep 2013 05:24:37 -0700 (PDT)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 9747ABE56; Mon, 23 Sep 2013 13:24:24 +0100 (IST)
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IS2NufMMeTDF; Mon, 23 Sep 2013 13:24:24 +0100 (IST)
Received: from [134.226.36.180] (stephen-think.dsg.cs.tcd.ie [134.226.36.180]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 759A3BE39; Mon, 23 Sep 2013 13:24:24 +0100 (IST)
Message-ID: <524032F9.2060302@cs.tcd.ie>
Date: Mon, 23 Sep 2013 13:24:25 +0100
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:17.0) Gecko/20130803 Thunderbird/17.0.8
MIME-Version: 1.0
To: Brian Trammell <trammell@tik.ee.ethz.ch>
References: <20130920162352.23295.48024.idtracker@ietfa.amsl.com> <523C79A8.5050902@cs.tcd.ie> <8E31A51D-6452-4A82-9FA6-3EBA26628416@tik.ee.ethz.ch>
In-Reply-To: <8E31A51D-6452-4A82-9FA6-3EBA26628416@tik.ee.ethz.ch>
X-Enigmail-Version: 1.5.2
Content-Type: text/plain; charset="ISO-8859-1"
Content-Transfer-Encoding: 7bit
Cc: ietf-privacy@ietf.org, perpass <perpass@ietf.org>
Subject: Re: [ietf-privacy] [perpass] New Version Notification for draft-cooper-ietf-privacy-requirements-00.txt
X-BeenThere: ietf-privacy@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Internet Privacy Discussion List <ietf-privacy.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ietf-privacy>
List-Post: <mailto:ietf-privacy@ietf.org>
List-Help: <mailto:ietf-privacy-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ietf-privacy>, <mailto:ietf-privacy-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 23 Sep 2013 12:25:34 -0000

Hi Brian,

On 09/23/2013 08:40 AM, Brian Trammell wrote:
> hi Stephen, all,
> 
> (copying ietf-privacy as requested in the draft)
> I've read the draft; it's a very good and welcome start at extending
> 6973 to a set of concrete recommendations for protocol design. I've
> got one comment on opportunistic encryption, though:
> 
> In section 3, halfway down the page: "...at minimum, opportunistic
> encryption needs to be well-defined for almost all new IETF standards
> track protocols."
> 
> I understand the rationale behind that "almost", but the lines around
> it will need to be very clearly drawn. 

Yep. And that's tricky. Better wording is very welcome.

> On brief consideration, I
> cannot think of a single _new_ protocol for which opportunistic
> encryption shouldn't be the default, for reasons other than
> interoperability with an existing protocol that has a significant
> installed base. 

Well, we don't say that *use* of OE should be the default.
That is, we do not say "OE or better SHOULD be used."

I would like it if we did say that, but I don't think we'd
get IETF consensus for it. The current draft says only that
OE (or better) must be well-defined and leaves it to those
deploying as to whether that's turned on or not. (We could
probably make that clearer I guess, e.g. by saying that OE
or better is mandatory to implement.)

If there are folks who think that we should go further, (and
think that we could get IETF consensus for that,) then please
propose text. I do know there are folks who don't want us to
go that far on the basis that that'd mean the IETF would be
specifying policy and not just protocol. There are also folks
who do middleboxes of various kinds that'd probably be upset
too:-)

Cheers,
S.

> Even in such cases, I think it would be useful to be
> very clear that communication in the clear for interoperability is an
> exception, a "legacy" mode, "to be deprecated", or other
> not-very-happy-sounding words that mean "we realize we're stuck with
> it in this case but that's really no excuse."
> 
> The information radiated even from protocols which have no obvious
> connection with personal data can be correlated with other
> information which can paint a very rich behavioral picture, that only
> takes one unprotected link in the chain to associate with an
> identity. Opportunistic encryption everywhere reduces the content of
> this radiated information, as well as reducing the risk of
> unprotected links holding some associable identifier. So exceptions
> will have to be very well justified if an aim of this work is
> protection of privacy against pervasive surveillance.
> 
> Cheers,
> 
> Brian
> 
> On Sep 20, 2013, at 6:36 PM, Stephen Farrell
> <stephen.farrell@cs.tcd.ie> wrote:
> 
>> 
>> FYI. Comments welcome.
>> 
>> S.
>> 
>> 
>> -------- Original Message -------- Subject: New Version
>> Notification for draft-cooper-ietf-privacy-requirements-00.txt 
>> Date: Fri, 20 Sep 2013 09:23:52 -0700 From:
>> internet-drafts@ietf.org To: Alissa Cooper <acooper@cdt.org>, Sean
>> Turner <turners@ieca.com>, Stephen Farrell
>> <stephen.farrell@cs.tcd.ie>
>> 
>> 
>> A new version of I-D,
>> draft-cooper-ietf-privacy-requirements-00.txt has been successfully
>> submitted by Alissa Cooper and posted to the IETF repository.
>> 
>> Filename:	 draft-cooper-ietf-privacy-requirements Revision:	 00 
>> Title:		 Privacy Requirements for IETF Protocols Creation date:
>> 2013-09-20 Group:		 Individual Submission Number of pages: 11 URL: 
>> http://www.ietf.org/internet-drafts/draft-cooper-ietf-privacy-requirements-00.txt
>>
>> 
Status:
>> http://datatracker.ietf.org/doc/draft-cooper-ietf-privacy-requirements
>>
>> 
Htmlized:
>> http://tools.ietf.org/html/draft-cooper-ietf-privacy-requirements-00
>>
>>
>>
>> 
Abstract:
>> It is the consensus of the IETF that IETF protocols be designed to 
>> avoid privacy violations to the extent possible.  This document 
>> establishes a number of protocol design choices as Best Current 
>> Practices for the purpose of avoiding such violations.
>> 
>> 
>> 
>> 
>> 
>> Please note that it may take a couple of minutes from the time of
>> submission until the htmlized version and diff are available at
>> tools.ietf.org.
>> 
>> The IETF Secretariat
>> 
>> 
>> 
>> _______________________________________________ perpass mailing
>> list perpass@ietf.org 
>> https://www.ietf.org/mailman/listinfo/perpass
> 
> 
> 
> _______________________________________________ ietf-privacy mailing
> list ietf-privacy@ietf.org 
> https://www.ietf.org/mailman/listinfo/ietf-privacy
>