Re: [Int-area] Where/How is the features innovation, happening? Re: 202112301817.AYC

"Abraham Y. Chen" <aychen@avinta.com> Fri, 31 December 2021 16:58 UTC

Return-Path: <aychen@avinta.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F36A3A09A6 for <int-area@ietfa.amsl.com>; Fri, 31 Dec 2021 08:58:30 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.94
X-Spam-Level:
X-Spam-Status: No, score=-3.94 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, NICE_REPLY_A=-1.852, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_FILL_THIS_FORM_SHORT=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=avinta.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K7lhQxJSlCqa for <int-area@ietfa.amsl.com>; Fri, 31 Dec 2021 08:58:24 -0800 (PST)
Received: from mx22-1.lowesthosting.com (cp22.lowesthosting.com [23.111.133.162]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CBEC3A09A4 for <int-area@ietf.org>; Fri, 31 Dec 2021 08:58:23 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=avinta.com; s=default; h=In-Reply-To:References:Cc:To:Subject:From:MIME-Version:Date: Message-ID:Content-Type:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=GHU3cIR5ITpPVMZWaKpWaML77iwW0P5w2zS+B4qx1bM=; b=f07HPM1l8HKLBoLcZRpY486afD BMV0FiIgds2L5g+cjxkloerYLySM90esWYu3ytAwluHhqmgLf5JlVrowsS+UhIolo95Y0Ffn01PCV 6FQu8weTpTvf9qUKouVVTyF5ExWc7FKx/iUtOtkvb3UxRMUDO8WeK2DSZ5GRbYXIURiXMU1ZKd/Ct iriwQMJOYdUtd6lSv+rEV9mk4OBdXKwCpg3x4xiSxO/RZBjbeAYbyEOs+xsElJowT4XeARXxhYXSC DHAYQOIK86C3f/H45nakgc58EZVrtmEZCou5WB+ZHulSmYCQlDzOQ31fWEX0G6vCASUor4gAAVuX1 hxCm23zw==;
Received: from cpe-24-193-166-56.nyc.res.rr.com ([24.193.166.56]:53661 helo=[192.168.1.142]) by mx22-1.lowesthosting.com with esmtpa (Exim 4.94.2) (envelope-from <aychen@avinta.com>) id 1n3LEI-0002yI-NL; Fri, 31 Dec 2021 11:58:18 -0500
Content-Type: multipart/alternative; boundary="------------kZ0z4HkpGZej4UoT8N7P6qmL"
Message-ID: <0dd628bc-d779-46d0-ada3-601295e21c12@avinta.com>
Date: Fri, 31 Dec 2021 11:58:05 -0500
MIME-Version: 1.0
User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:91.0) Gecko/20100101 Thunderbird/91.4.1
From: "Abraham Y. Chen" <aychen@avinta.com>
To: Tom Herbert <tom@herbertland.com>
Cc: Jiayihao <jiayihao@huawei.com>, "int-area@ietf.org" <int-area@ietf.org>
References: <7c509337-31b5-c0d2-020e-aca6fc9d344e@avinta.com> <ce16122f3387479ca4456325a6fb0a6b@huawei.com> <0a3711b9-0969-2eb1-15e6-3aa8354901d0@avinta.com> <CALx6S37zAk-hdk-a5PGnFYaow9mhb1XmC=4PpqMkdVredq8Zhg@mail.gmail.com>
Content-Language: en-US
X-Priority: 1 (Highest)
In-Reply-To: <CALx6S37zAk-hdk-a5PGnFYaow9mhb1XmC=4PpqMkdVredq8Zhg@mail.gmail.com>
X-Antivirus: Avast (VPS 211231-2, 12/31/2021), Outbound message
X-Antivirus-Status: Clean
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - mx22-1.lowesthosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - avinta.com
X-Get-Message-Sender-Via: mx22-1.lowesthosting.com: authenticated_id: aychen@avinta.com
X-Authenticated-Sender: mx22-1.lowesthosting.com: aychen@avinta.com
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/wNZB7TYSCHG8_yLEyeVCR06QSV4>
Subject: Re: [Int-area] Where/How is the features innovation, happening? Re: 202112301817.AYC
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Internet Area WG Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 Dec 2021 16:58:30 -0000

Hi, Tom:

1)    "Your argument seems to be that we shouldn't bother with things 
like security or encryption at all :-) ...    ":    My apologies for 
getting you to an unexpected conclusion. Perhaps I failed to make an 
explicit statement because I thought that I was following a thread about 
the IPv4 or IPv6 addresses "scrambling" schemes for protecting the 
privacy of or increasing the security to users. That is, we should look 
at this subject by the "Divide & Conquer" concept. In other words, I was 
saying that encrypting the "Content" part as much as the sender / 
receiver pair agrees to. But, keep the "Address" part mostly clear. This 
way, the LE parties will not have the excuse of performing "mass 
surveillance" by scooping up everything, then take time to digest and 
regurgitate the "Content" for hidden treasures. (Remember the report 
that the German Chancellor's telephone calls were picked up by spy 
agencies?) Rumors have been, that high performance computer and large 
capacity storage device manufacturers are having a field day supplying 
equipment to LE organizations such as NSA because the current Internet 
trend.

2)    Since my engineering training started from RF (Radio Frequency or 
Wireless -- actually all bands from audio all the way to 60+ GHz), then 
telephony, and cellular phone before getting involved with the Internet, 
allow me to briefly describe my understanding of the characteristics of 
each with respect to our current discussion. Hopefully, the below can 
thread different fields together to clarify my point:

     A.    In the RF field, any signal that is transmitted (sent) into 
the "ether" is a fair game for everyone. So, there is no "Address" in 
the basic RF signal transmission. Most RF equipment does not transmit 
its identification by itself unless the user does so as part of the 
"Content" on purpose. For example, acommercial (AM, FM, TV) station 
announces its station ID, or call-sign (Address) as part of the 
broadcast (Content) according to FCC Rules. So, in RF communication, we 
concentrate only on encrypting the "Content" (such as scrambled / encode 
speech) for proprietary applications.

     B.    For traditional land-line telephony services, the caller's 
phone number (Address) is fixed by wiring (nailed up) upon subscription. 
Only the called party's phone number (Addressee) is dialed once to tell 
the switching system who is the destination party, so that the switches 
can make the connection. Once the called party answers, the actual 
session consists of only "Content" exchanges, no more "Address" 
information necessary. Speech scramblers may be used on either end as a 
pair, for private conversation (Content).

     C.   RF signals from cellular mobile phone do carry the handset 
(and the cell tower) identifications (Addresses) on both ends without 
the user's knowledge to facilitate establishing and maintaining a 
connection, while the user constantly crosses the boundaries between 
cells. Similarly, speech scramblers may be used on either end as a pair 
for private conversation (Content). Note that since VoIP is behind the 
scene these days, cellular mobile service is supported by a mixture of 
both the traditional telephony and the Internet infrastructures.

     D.   If we look at the Internet environment itself, it is kind like 
the cellular mobile phone service. It is inherently wide open like RF 
because packets are forwarded by unstructured mesh routers allowing 
everyone to listen in. Yet, each IP packet header carries the Addresses 
of both ends for directing routers to deliver the packet, as well as for 
the return packet. So, how much can a sender "hide" the identities of 
either or both ends for privacy while still enables the routers to 
deliver the packet to its intended destination effectively is a real 
challenge. Whatever the scheme chosen, it can not be too sophisticated 
to over-burden the routers which means that it is probably mot much a 
challenge for a perpetrator intentionally trying to crack the scheme.

3)    My sense from the above analysis is that attempting to make the 
"Address" part of an IP packet "cryptic" for improving the privacy / 
security properties of the "Content" is probably futile. The more we 
attempt doing it, the stronger the LEs' argument for mass surveillance, 
even though they probably already knew the solution.

4)    On the other hand, if we push too hard on strengthening the 
encryption of the "Content" without a back door, we essentially are 
helping the perpetrators. This is because if this part worked, the LEs 
will not be able to monitor and catch the criminals!

5)    So, we need to review the pros and cons of the end results, before 
jumping into a scheme.


Happy New Year!



Abe (2021-12-31 11:57 EST)



On 2021-12-30 13:29, Tom Herbert wrote:
>
>
> On Mon, Dec 27, 2021 at 7:00 PM Abraham Y. Chen <aychen@avinta.com> wrote:
>
>     Hi, YiHao:
>
>     0)    Hope you had a Merry Christmas as well!
>
>     1)    Re: Ur. Pts 1) & 2): Allow me to modify and expand your
>     definitions of the abbreviations, ICP & ISP, a bit to streamline
>     our discussion, then focusing on related meanings of the two
>     keyword prefixes, "C" and "A" in the middle of them:
>
>         A.    ICP (Internet Content Provider):    This is the same as
>     you are using.
>
>         B.    IAP (Internet Access Provider):    This will represent
>     the ISP that you are referring to.
>
>         C.    ISP (Internet Service Provider):    This will be used as
>     the general expression that covers both ICP and IAP above.
>
>         With these, I agree in general with your analysis.
>
>     2)    From the above, there is a simpler (layman's instead of
>     engineer's) way to look at this riddle. Let's consider the old
>     fashioned postal service. A letter itself is the "Content". The
>     envelop has the "Address". The postal service cares only what is
>     on the envelop. In fact, it is commonly practiced without
>     explicitly identified that one letter may have multiple layers of
>     envelops that each is opened by the "Addressee" who then forward
>     the next "Addressee" according to the "Address" on the inside
>     envelop, accordingly. To a larger scale, postal services put
>     envelops destined to the same city in one bag. Then, bags destined
>     to the same country in one container, etc. This process is refined
>     to multiple levels depending on the volume of the mail and the
>     facility (routes) available for delivery. Then, the containers are
>     opened progressively along the destination route. No wonder that
>     the US Postal Service claimed (during the early days of the
>     Internet) that the mail system was the fist "packet switching"
>     system.
>
>     3)    So, in this analogy, the "Address" on each and every envelop
>     has to be in the clear (not coded or encrypted in any sense) for
>     the mail handlers to work with. It is only the most inner
>     "Content", the letter itself, can have Confidential information
>     (or encrypted if the sender wishes). Under this scenario, the LE
>     (Law Enforcement) is allowed only to track suspected mail by the
>     "Addresses". And, any specific surveillance is only authorized by
>     court, case by case. While no one can prevent LE bypassing this
>     procedure, cases built by violating this requirement would be the
>     ground for being thrown out of the court.
>
>     4)    However, in the Internet environment, largely, if not most,
>     Addresses are dynamic. There is no way to specify an IP Address
>     for surveillance of a suspect. This gives the LE the perfect
>     excuse to scoop up everything and then analyze offline. This gives
>     them plenty of time to try various ways to decrypt the encoded
>     messages and the opportunity to sift through everything for
>     incidental "surprise bonus finds". The result is that practically
>     no privacy is left for anyone. is means that all of the schemes of
>     scrambling IP Addresses are useless at the end. So, why do we
>     bother with doing so, at all?
>
>
> Abe,
>
> Happy New Year!
>
> Your argument seems to be that we shouldn't bother with things like 
> security or encryption at all :-) While it's true that anything sent 
> into the Internet can be intercepted and analyzed offline, it's 
> clearly the intent of security and privacy mechanisms to make offline 
> analysis of data ineffective or at least cost prohibitive. For 
> encryption the calculation is pretty straightforward, the complexity 
> and cost and breaking a cipher is generally correlated to the key 
> size. So for any given key size, it can be determined what sort of 
> resources are required to break the code. This is a continuous 
> escalation as attackers gain access for more computational resources 
> and there are breakthroughs like in quantum computing that require 
> rethinking encryption.  But regardless, the effectiveness of 
> encryption at any given point of time is quantifiable.
>
> For security and privacy in IP addresses I believe we should be 
> similarly taking a quantitative approach. This is where RFC7721 fails. 
> The recommendation of RFC7721 is that for better security, use 
> temporary addresses with shorter lifetimes. But the RFC doesn't 
> attempt to quantify the relationship between address lifetime and the 
> security that's offered or even say what specific lifetime is 
> recommended for optimal security. For instance, if the user changes 
> their interface address twice a day instead of once a day does that 
> halve the chances that some may breach their security by correlating 
> two different flows that they source from the user? Probably not. But, 
> what if they change their address every five minutes? How much better 
> is that than changing the address once a day? It's intuitive that it 
> should be better security, but is it _really_ better? And if it is 
> better, are the benefits worth the aggravation of changing the 
> address. This is quite similar to some companies that have a policy 
> that everyone needs to change their passwords periodically. Studies 
> have shown that there is little quantitative value in doing this and 
> in fact the net effect is likely less security and increased user 
> aggravation-- even so, companies will continue to do this because it's 
> easier to stick with the inertia of intuition.
>
> The fix for the password problem is one time passwords (OTP) and IMO 
> that hints at the fix for the address security problems described in 
> RFC7712, essentially we need single use source addresses per each 
> connection.  The security effects of single use addresses are 
> quantifiable, i.e. given sample packets from independent two flows 
> generated by the same user, without additional information it isn't 
> possible for a third party to correlate that they are sourced by the 
> same user.
>
> Tom
>
>
>
>     Happy New Year!
>
>
>     Abe (2021-12-27 21:59)
>
>
>
>
>
>     On 2021-12-23 22:26, Jiayihao wrote:
>>
>>     Hello Abe,
>>
>>     Users are unwilling to be watched by any parties(ISP, and ICP
>>     also) excepts users themselves. Actually I would like to divide
>>     the arguments into 2 case: network layers and below (not
>>     completely but mostly controlled by ISP); transport layers and
>>     above (not completely but mostly controlled by ICP).
>>
>>     1) For transport layers and above, Encryption Everywhere (like
>>     TLS) is a good tool to provide user privacy. However, it is only
>>     a tool against ISPs, while ICPs survive and keep gaining revenue
>>     (even by selling data like the negative news of Facebook, or
>>     Meta, whatever you call it). As discussed, it is not networks
>>     faults because IP provides peer-to-peer already. You may blame
>>     CGNAT in ISP increasingly contributes to a C/S mode in replacing
>>     P2P, like in China where IPv4 addresses are scare and CGNAT is
>>     almost everywhere. However, I don’t find the situation any better
>>     in U.S. where most of IPv4 address are located. It is a business
>>     choice to overwrite the mode to be peer-ICP-peer(C/S mode) at
>>     application layer, other than utilize the P2P mode that natively
>>     provided by IP.
>>
>>     In this case, there are trust points and they are ICPs.
>>
>>     2) For network layers and below, ISP and IP still provide a pure
>>     P2P network, and Encryption in TLS do not blind ISP in IP layer
>>     since IP header is still in plaintext and almost controlled by
>>     ISP. That is to say, in an access network scenario, the access
>>     network provide can see every trace of every user at network
>>     layer level (although exclude the encrypted payload). To against
>>     this, one can use Proxy(i.e., VPN, Tor) to bypass the trace
>>     analysis just like the CGNAT does. The only difference is that
>>     detour points (Proxies) belong to a third party, not ISP.
>>
>>     In this case, there are trust points and they are third party
>>     proxies.
>>
>>     The bottom line is that trust points are everywhere explicitly or
>>     implicitly, and privacy can be leaked from every (trust) point
>>     that you trust (or have business with). No matter what network
>>     system you have, no matter it is PSTN or ATM, these trust points
>>     are just the weak points for your privacy, and the only things
>>     users can beg is that **ALL** trust points are 1) well
>>     behave/don’t be evil; 2)system is advanced enough that can’t be
>>     hacked by any others; 3) protected by law.
>>
>>     I would say pretty challenging and also expecting to reach that.
>>
>>     Network itself just cannot be bypassed in reaching that.
>>
>>     Merry Christmas,
>>
>>     Yihao
>>
>>     *From:* Abraham Y. Chen <aychen@avinta.com>
>>     <mailto:aychen@avinta.com>
>>     *Sent:* 2021年12月23日 10:01
>>     *To:* Jiayihao <jiayihao@huawei.com> <mailto:jiayihao@huawei.com>
>>     *Cc:* tom@herbertland.com; int-area@ietf.org
>>     *Subject:* Re: [Int-area] Where/How is the features innovation,
>>     happening? Re: 202112221726.AYC
>>     *Importance:* High
>>
>>     Hi, YiHao:
>>
>>     0)    I am glad that you distilled the complex and elusive
>>     privacy / security tradeoff issues to a very unique and concise
>>     perspective.
>>
>>     1)    Yes, the IPv4 CG-NAT and IPv6 Temporary address may seem to
>>     provide some privacy protection. However, with the availability
>>     of the computing power, these (and others such as VPN) approaches
>>     may be just ostrich mentality.  On the other hand, they provide
>>     the perfect excuse for the government (at least US) to justify
>>     for "mass surveillance". For example, the following is a recent
>>     news report which practically defeats all current "privacy
>>     protection" attempts.
>>
>>     https://www.usatoday.com/story/news/2021/12/08/federal-court-upholds-terrorism-conviction-mass-surveillance-case/6440325001/
>>
>>     */[jiayihao] there is no doubt./*
>>
>>     2)    Rather than contradicting efforts, it is time to review
>>     whether any of these schemes such as mapping techniques really is
>>     effective for the perceived "protection". As much of the current
>>     science fiction type crime scene detective novel / movie / TV
>>     program hinted, the government probably has more capability to
>>     zero-in on anyone than an ordinary citizen can imagine, anyway.
>>     And, businesses have gathered more information about us than they
>>     will ever admit. Perhaps we should "think out of the box" by
>>     going back to the PSTN days of definitive subscriber
>>     identification systems, so that accordingly we will behave
>>     appropriately on the Internet, and the government will be allowed
>>     to only monitor suspected criminals by filing explicit (although
>>     in secret) requests, case by case, to the court for approval?
>>
>>     Happy Holidays!
>>
>>     Abe (2021-12-22 21:00 EST)
>>
>>     Hello Tom,
>>       
>>     The privacy countermeasure for IPv4/IPv6 is interestingly different.
>>     IPv4 usually utilize CGNAT, i.e., M(hosts)-to-N(IPs), where M >> N so that the host could remain anonymous
>>     IPv6 usually utilize Temporary address, i.e., 1(host)-to-M(IPs[at least suffix level]), where M >> 1 so that the host could remain anonymous.
>>       
>>     HOWEVER, I don't feel any approach reaches privacy perfectly, because access network have a global perspective on M-to-N or 1-to-M mapping.
>>     For this, it is hard to be convinced that IPv4/6 itself can reach a perfect privacy.
>>       
>>     Thanks,
>>     Yihao Jia
>>       
>>     -----------
>>       
>>     I believe CGNAT is better than IPv6 in terms of privacy in addressing.
>>     In fact one might argue that IPv4 provides better privacy and security
>>     than IPv6 in this regard. Temporary addresses are not single use which
>>     means the attacker can correlate addresses from a user between
>>     unrelated flows during the quantum the temporary address is used. When
>>     a user changes their address, the attacker can continue monitoring if
>>     it is signaled that the address changed. Here is a fairly simple
>>     exploit I derived to do that (from
>>     draft-herbert-ipv6-prefix-address-privacy-00).
>>       
>>     The exploit is:
>>            o An attacker creates an "always connected" app that provides some
>>              seemingly benign service and users download the app.
>>            o The app includes some sort of persistent identity. For instance,
>>              this could be an account login.
>>            o The backend server for the app logs the identity and IP address
>>              of a user each time they connect
>>            o When an address change happens, existing connections on the user
>>              device are disconnected. The app will receive a notification and
>>              immediately attempt to reconnect using the new source address.
>>            o The backend server will see the new connection and log the new
>>              IP address as being associated with the specific user. Thus,
>>     the server has
>>              a real-time record of users and the IP address they are using.
>>            o The attacker intercepts packets at some point in the Internet.
>>              The addresses in the captured packets can be time correlated
>>              with the server database to deduce identities of parties in
>>              communications that are unrelated to the app.
>>       
>>     The only way I see to mitigate this sort of surveillance is single use
>>     addresses. That is effectively what  CGNAT can provide.
>>       
>>     Tom
>>
>>     Image removed by sender.
>>     <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=icon>
>>
>>     	
>>
>>     Virus-free. www.avast.com
>>     <https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=link>
>>
>>
>


-- 
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus