Re: [Ila] [5gangip] PS draft: New Version Notification for draft-hspab-5gangip-atticps-00.txt

Tom Herbert <tom@herbertland.com> Wed, 31 January 2018 22:03 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ila@ietfa.amsl.com
Delivered-To: ila@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5EE9012FAE7 for <ila@ietfa.amsl.com>; Wed, 31 Jan 2018 14:03:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.589
X-Spam-Level:
X-Spam-Status: No, score=-2.589 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, T_KAM_HTML_FONT_INVALID=0.01] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Lv5JDbYZaSYX for <ila@ietfa.amsl.com>; Wed, 31 Jan 2018 14:02:56 -0800 (PST)
Received: from mail-qk0-x230.google.com (mail-qk0-x230.google.com [IPv6:2607:f8b0:400d:c09::230]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 41D6D12FAE9 for <ila@ietf.org>; Wed, 31 Jan 2018 14:02:56 -0800 (PST)
Received: by mail-qk0-x230.google.com with SMTP id d21so16829852qkj.3 for <ila@ietf.org>; Wed, 31 Jan 2018 14:02:56 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=XKYLV19rAcoUoK100gv+GzzChTZHGr9gxlljgvpZb8Y=; b=yGelJ+BhPb5oIso2AquWedWF5G++YuEjYTv/2ok3ZCmd4/EXwDyMU8iNeKlLLodZHE xM1jMR9MHsxcc0muLjOMl3Byz9MPl0+5IqF8ITlLsTCIPPLvQZ48fWNZA9C0ADHjw+Az C6Gfno9F2PeALC2sHeO6BAuXQjVTVzMG+3EY3F1pejgoECkEow/zfjkJqHegTf9AlH6Z uS1rRDktHdCVyeKQsSYaY6vicUk+cWdDw05GSRxwYQIpJCW7eP52OVVTB48P05xnRNt0 K/SFJOx6t6wcOwCFHoOP5DHw9nPiK2xM6mzjehIYY3suVL32+cYXXdadupQ9n/lfZTCH rHaw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=XKYLV19rAcoUoK100gv+GzzChTZHGr9gxlljgvpZb8Y=; b=IUIGWM9NMK6m7l8oPFS3xnNrU4uMOF6dMDQyJupev+YfnRURZaavEb/NN2Wb8njsBM FEJ69ZVPpYOTJRt1YH5WyYu48Z4sJqtuDMunyhN+2OnbDx/ZXDKOblQE8MvqkMrhkTl6 2QWbrAHkxFCKJeDSY4KGdYDpU4d81+1l340TT6LpTU0FxA7OyGs9AeVbV1Iuo/G3ZQhZ HMXPpQu5Yq7dBYLA7gJN2LDfhOZcQjWc/CRW2ewvF3/f66QdscPkUqaM/xoKEhSAIqtN mt8jLHVWgzsRjAhZoNPgFx8cAwJaCqD7WhclZ8+YF8RuZtzD+wSvPc9A+G43yS8YhzfT 4Nfw==
X-Gm-Message-State: AKwxytc3sRYuPVkGI20AOUSjUJTPMvTiXknfy0cWKjgAjpEuTvE9MIk0 rRv4wM2z4w3YvIbdAisD9UX90PilEKlcVcX6sTKGTw==
X-Google-Smtp-Source: AH8x227A1g8aT/rgxyHpNul0uHcGKVW+V2CYOz+8DoPwjP/J4WS/uDUevGJZ6Fc9b3ROLcWQjFqrje8xBr+WP1fJRdo=
X-Received: by 10.55.103.88 with SMTP id b85mr52637272qkc.182.1517436175175; Wed, 31 Jan 2018 14:02:55 -0800 (PST)
MIME-Version: 1.0
Received: by 10.200.56.229 with HTTP; Wed, 31 Jan 2018 14:02:54 -0800 (PST)
In-Reply-To: <CAC8QAccoZ9mcweHc-pqNqtsR7PRamVFaTL2_G4fJ1YTZ6gu=zw@mail.gmail.com>
References: <CAC8QAceokC+Fv5AV5KG7fB1CamstqOomOyFrNeKRQ5+sgb3T4Q@mail.gmail.com> <CALx6S34GoMbt=HqHRjt_N7ZUqk=L6YNjK8qChL9oHLoFTO2hfw@mail.gmail.com> <CAC8QAccoZ9mcweHc-pqNqtsR7PRamVFaTL2_G4fJ1YTZ6gu=zw@mail.gmail.com>
From: Tom Herbert <tom@herbertland.com>
Date: Wed, 31 Jan 2018 14:02:54 -0800
Message-ID: <CALx6S34gEVLKzxvf08-JfvSCtptPXXi-4Qkew19JeO8fcu0+HQ@mail.gmail.com>
To: Behcet Sarikaya <sarikaya@ieee.org>
Cc: 5GANGIP <5gangip@ietf.org>, ila@ietf.org
Content-Type: multipart/alternative; boundary="94eb2c05796e30e8a1056419a437"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ila/x8uO0Jc9lSyHkoxTdsxkNQkd1nY>
Subject: Re: [Ila] [5gangip] PS draft: New Version Notification for draft-hspab-5gangip-atticps-00.txt
X-BeenThere: ila@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Identifier Locator Addressing <ila.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ila>, <mailto:ila-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ila/>
List-Post: <mailto:ila@ietf.org>
List-Help: <mailto:ila-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ila>, <mailto:ila-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 31 Jan 2018 22:03:00 -0000

>
>
>> This is true today when devices have address or assigned a single /64.
>> One alternative is gives users thousands or millions of addresses
>> (identifier). Identifier/locator split should facilitate that.
>
>
> Please suggest some text.
>
>

Here is my postulated privacy exploit that defeats periodic address
rotation [RFC4951]  and would be solved by single use addresses (a
different address per connection).


   -

   The attacker creates an “always connected” app that provides some
   seemingly benign service and users download the app.
   -

   The app includes some sort of persistent identity. For instance, this
   could be a login to account.
   -

   The backend server for the app logs the user identity and IP address
   they are using each time they connect.
   -

   When an address change happens, existing connections on the user device
   are disconnected. The app will receive a notification and immediately
   attempt to reconnect using the new source address.
   -

   The backend server will see the new connection and log the new IP
   address as being used by the user.
   -

   Thus, the server has a real-time record of users and the IP address they
   are using.
   -

   The attacker gains access to packet traces taken at some point in the
   Internet. The addresses in the captured packets can be time correlated with
   the server database to deduce the identity of the source of packets for
   flows communications unrelated to the app.



> Note
>> that this effect is already provided by NAT since every connection
>> through a NAT is translated to non-trackable address/port. NAT has
>> some law enforcement agencies freaking out because of its strong
>> (inadvertent) privacy!
>>
>> This reminds me some people say ILA is a NAT.
>
>
Mark Smith provided the best explanation as to why ILA is not NAT:

"The process ILA performs is a perfect transform, once at ingress to the
ILA domain, into the ILA domain's address space, and a perfect
transformation back at ILA egress. If the transformation isn't perfect,
then a fault has occurred.

The other reason I'd avoid "translate" is that it in the IETF it carries
with it the association with IPv4 NAT and its drawbacks. ILA doesn't suffer
from these issues because of the full reversal of the address changes upon
egress from the ILA domain.

(So how come I don't like NAT at all, yet am ok with what ILA is doing? The
full reversal of the address charges at ILA egress is the first reason.
Secondly, within the ILA domain, the ingress ILA device is a host, that is
in effect originating the packet within the ILA domain it is sending to the
egress ILA device, which is also a host or end-point within the ILA domain.

The ILA domain is effectively a virtual link layer or an underlay network
for the traffic being carried between hosts outside of the ILA domain. As
long as the ILA domain is perfectly transparent to the overlay network and
its hosts, then what ever happens within the ILA domain doesn't matter,
similar to how link layer compression, as long as fully and perfectly
reversed, also doesn't matter.)"


> "Privacy of identifiers is especially an issue for a UE communication
>
> with a server like Google, Facebook, LinkedIn, etc."
>>
>> You might want to mention that simple identifier rotation [RFC4914] is
>> not enough these days..
>>
>> Sure.
>
>
>> "Privacy issue can be mitigated only if Id-Loc system has proxy mode
>> of operation.  In proxy mode, user traffic is intercepted by a proxy.
>> Proxy node which could be placed at the subnet router or site border
>> router.  The router tunnels the traffic to the server.  In the process
>> UE identifier becomes hidden and this hopefully removes privacy
>> issues."
>>
>>
>
>> I'm not sure what this means. Multiple identifiers per deivce should
>> address the privacy issue, Maybe a proxy would have the same effect?
>>
>> Again please provide some text.
>
>
As I said, I don't know what this proxy mode of operation is in an idloc
system.


> "5G specific identifiers can also used to deal with privacy issues.
>> IMSI is known to be 64 bit and unique for each UE.  IMSI should not be
>> exposed to any entities.  It is like 64-identifier.  Instead
>> identifiers like 5G-GUTI can be used"
>>
>> I think this is two levels. An identifier in IP identifies a node for
>> the purpose of being the endpoint of the communication. Something like
>> IMSI identifies a specific device (and hence user). In the best case
>> scenario, IP identifiers don't reveal the identity of users and they
>> can be made externally visible.
>
>
> How?
>

The mapping of an identifier to a user of device is only known by the local
network. Outside of the local trusted network a third party should not be
able to infer identity of geo-location of a user solely based on IP
addresses. For that, something like IMSI can't be used to make addresses
without some sort of mapping or obfuscation.


>
>
>> IMSI is by its nature sensitive
>> information and only visible in a trusted domain. A mapping system
>> will need to map identifiers to identities (like an IMSI) so the
>> system needs to be secured.
>>
>>
> When do you need to access the mapping system is the issue I think.
> We did not want to get into this a lot in the draft it is more control
> plane.
>
>
IMO, it's going to be hard not to include the control plane in discussions.
That's where most of the major issues of idloc are, particularly in scaling
and securing the mapping database.


> A big item missing in this section is locator security. Fine grained
>> locators used in cellular system could be used to infer the
>> geo-location of devices and hence users, thus enabling stalkers
>> everywhere.  So locators need restricted visibility somehow..
>>
>>
> Good point. But how? Again, some text please.
>
>
Here is my postulated stalker exploit that illustrates the dangers of
exposed locators to the users:


   -

   Suppose that a user device participates in an identifier/locator
   protocol such that they cache locators and use locators to directly send to
   peer devices.
   -

   A hacker might tap all packets sent or received on the network
   interfaces which makes locators visible to them.
   -

   In order to be able to tap packets a user needs root access to the
   device. There are instructions on the web to root an Android device.
   Similarly, jailbreaking can be done to circumvent restrictions on an
   iPhone to gain the equivalent of root access.
   -

   Once root access has been obtained, packets can be tapped using tcpdump
   or similar packet sniffer application.
   -

   With the tap running and packet addresses being captured, the hacker
   just needs to drive around send traffic between two devices in their car.
   They can observe the locators that are assigned to the their device, and
   from this can create a geo map of locators.
   -

   Given that one hacker can do this, then thousands will do it and web
   sites will spring up that provide locator geo maps.
   -

   Efforts to obfuscate or rotate identifiers does not help much here.
   Obfuscation complicates routing in the network such that more
   transformations need to happen there. Locator rotation is defeated if there
   are enough devices to keep the maps up to date in a mashup.
   -

   The net effect is that this enables a stalker attack. An individual
   simply initiates a communication with their target. For instance, this
   could be a chat or phone call. If in doing this the locators for the device
   belonging to the target are made visible to the hacker, then the physical
   location of the target can be deduced using the locator geo maps described
   above.


Tom