Re: [Int-area] draft-daveor-slaac-privacy-logging-00

Dave O'Reilly <rfc@daveor.com> Wed, 30 May 2018 20:35 UTC

Return-Path: <rfc@daveor.com>
X-Original-To: int-area@ietfa.amsl.com
Delivered-To: int-area@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6A36E12D878 for <int-area@ietfa.amsl.com>; Wed, 30 May 2018 13:35:07 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.601
X-Spam-Level:
X-Spam-Status: No, score=-0.601 tagged_above=-999 required=5 tests=[BAYES_05=-0.5, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=daveor.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XaS8TkxvtzIj for <int-area@ietfa.amsl.com>; Wed, 30 May 2018 13:35:04 -0700 (PDT)
Received: from vps.ftrsolutions.com (vps.ftrsolutions.com [5.77.39.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 74E7412D7E5 for <int-area@ietf.org>; Wed, 30 May 2018 13:35:04 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=daveor.com; s=default; h=To:References:Message-Id:Content-Transfer-Encoding:Cc:Date: In-Reply-To:From:Subject:Mime-Version:Content-Type:Sender:Reply-To:Content-ID :Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To: Resent-Cc:Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe :List-Post:List-Owner:List-Archive; bh=mzS2p40fGm/rSTblR9wO/0sQ6Gh+HbW452e0DxFTn/s=; b=AEp12JvI9fnYISz+1jO0wCi1RF pNIc2yqSYYYcMJrf94lsICiGCW+2M3284WjCdZR2HnEFcpKQefUVL0aZvRSU6TwGFFm4ogZnh5HhL /A+39gNJSkcB5NWi3PeneWBCWPlXRJ0VUYeY+8kOGaw49JYI6bM/Cv+0S4/5c0pZcdSU=;
Received: from [89.101.194.202] (port=60645 helo=[192.168.82.77]) by vps.ftrsolutions.com with esmtpsa (TLSv1:ECDHE-RSA-AES256-SHA:256) (Exim 4.91) (envelope-from <rfc@daveor.com>) id 1fO7oD-000D4A-AE; Wed, 30 May 2018 21:35:01 +0100
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Dave O'Reilly <rfc@daveor.com>
In-Reply-To: <733a9dc1-a91a-239e-8aa8-af19a805b8b8@huitema.net>
Date: Wed, 30 May 2018 21:35:00 +0100
Cc: Alexandre Petrescu <alexandre.petrescu@gmail.com>, int-area@ietf.org
Content-Transfer-Encoding: quoted-printable
Message-Id: <BD44146E-785D-447F-BB2E-87100887FF02@daveor.com>
References: <24C20997-65E5-4FA4-B435-EA3438245D0D@daveor.com> <52a54590-182f-64e3-91d9-5e1f99215831@gmail.com> <0FF3C748-2132-4F9E-9FE8-4818D3766D14@daveor.com> <733a9dc1-a91a-239e-8aa8-af19a805b8b8@huitema.net>
To: Christian Huitema <huitema@huitema.net>
X-Mailer: Apple Mail (2.3124)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - vps.ftrsolutions.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - daveor.com
X-Get-Message-Sender-Via: vps.ftrsolutions.com: authenticated_id: dave@daveor.com
X-Authenticated-Sender: vps.ftrsolutions.com: dave@daveor.com
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/int-area/xzpJyW-ka3yrI_AzTFi-3eSQcoA>
Subject: Re: [Int-area] draft-daveor-slaac-privacy-logging-00
X-BeenThere: int-area@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: IETF Internet Area Mailing List <int-area.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/int-area>, <mailto:int-area-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/int-area/>
List-Post: <mailto:int-area@ietf.org>
List-Help: <mailto:int-area-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/int-area>, <mailto:int-area-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 30 May 2018 20:35:08 -0000

Christian,
> 
> I like the general tone of your draft, but I am a bit concerned that it
> mixes requirements and a very specific solution.
> 

It’s not published with the intention of being a solution to any specific problem. There are several reasons why I published this document:

1. Technical design and societal consequences of the technical design cannot be neatly separated. It is not necessarily the case that societal consequences can be effectively addressed after technology design is finished and a technology has been widely deployed.
2. It is important and appropriate, in my opinion at least, for the IETF to consider the consequences of technical decisions made in this forum on law enforcement. This is the reason why I chose temporary addresses in SLAAC as the basis of my document - it is a good example of a technology that /by design/ eliminates crime attribution evidence and its use will therefore have significant negative impact on law enforcement effectiveness. This is a very different thing to logs not being available - it is a technological design choice.
3. I am trying to make the point that there are solutions to be found that can help to address the challenges being faced by law enforcement without compromising on privacy, if there is a willingness to recognise those challenges, recognise the legitimate needs of law enforcement and to think creatively about the problem(s).

> You are trying to strike a balance between your requirements and
> privacy,

I object to this characterisation of my position. 

Firstly there is no such thing as MY requirements. Secondly I’m not trying to strike a balance between anything and anything - I have stated the reasons why I published this paper in my comment above. 

I do, however, acknowledge that there is a balance to be struck (not by me, but in a broader sense) between individual right to privacy and other rights such as the rights of victims to have an effective criminal justice system to support them. However, privacy appears to trump all other considerations in this forum. 

As I mentioned to someone in a private discussion recently on a related topic, there is a need not only to recognise that such a balance is necessary but also to make sure that (a) the balance between the two is right (for some definition of right) and (b) that to the greatest extent possible - within the balance defined by (a) - the requirements of both are met and (c) that the trajectory of Internet engineering effort is towards maintenance of balance rather than veering towards one extreme or the other.

I am of the opinion that the IETF is zero out of three on these criteria.


> and the part I like is the attempt to engineer a logging system
> that narrowly meets your requirements while preventing widespread
> exploitation of logs for another usage.

Not MY requirements!!!

> This is going to be a widespread
> problem. Keeping too much data in the log invites abuse, and may be a
> violation of privacy regulations. But some data is obviously useful, be
> it for debugging purposes, security analysis, or in your example a
> desire to provide data for legitimate law enforcement purposes.
> 
> There are efforts to achieve something similar with DNS logs, e.g.:
> https://datatracker.ietf.org/doc/draft-dickinson-bcp-op/. They end up
> using the same bag of tricks, combinations of encryption, hashing and
> indexing. This is a difficult engineering problem, with know pitfalls
> like de-anonymization. The first part of solving a problem like that is
> to understand the requirements, and specifically understand the
> envelope, delineate what "narrowly meeting the requirements" would mean.
> Your draft is a great contribution to that.
> 

Thank you. Perhaps an interesting discussion can be had on this point - see some thoughts below. 

> On the other hand, I am far less enthusiastic with proposed solutions
> such as using IP addresses as keys. It comes close to another known
> issue in the field, "designing your own crypto”.

I’m not designing any crypto - the paper suggests the use of AES. 

> I am also not convinced
> at all by your section 6.1, cryptographic strength. Contrary to your
> assertion, 64 bit keys are not considered strong today, and would be a
> mere speed-bump to a determined adversary.

I understand that 64 bit keys are not considered strong. Again, you’re missing the point(s) I was trying to make which I have outlined above - this is not a serious proposal for a technical standard of any sort - it is supposed to indicate that there are possibilities available to address challenges in a privacy sensitive way. If, on the other hand, people take the technical proposal seriously, maybe there’s someone out there who can think of a way of expanding the key space. 

> How about we first gather the
> requirements, and then have some kind of study of the best solutions?
> 

I’m not optimistic that this will lead anywhere useful but why not have a try…

Here are some preliminary thoughts on the requirements question:

1. The aim of law enforcement is to enforce the law. What does this mean - amongst other things identification, and investigation, of breaches of criminal legislation (within some jurisdiction). 
2. Investigation of criminal activity must be done with the expectation that the investigation will be scrutinised in a court in due course. 
3. Therefore the findings of the investigation must be supported by appropriately collected and managed evidence (as laid out in the criminal procedure code or equivalent in some jurisdiction).
4. Some or all of this evidence may be technical in nature. 

So, the principle requirement of law enforcement in this context is for admissible evidence that will have some probative value in an investigation. 

There are lots of peripheral issues that could be considered and I’m happy to discuss them if people want, such as:

- the role of judicial oversight in investigations
- international treaties that govern transfer of evidence between jurisdictions
- the rights and wrongs of the laws in different jurisdictions
- definitions of different types of crimes
- different types of law enforcement agencies
- rule of law
- evidence control and chain of custody, as it applies to electronic evidence
- different definitions of the word “evidence” - I have given a general definition here

but generally speaking the point remains that the principle requirement of law enforcement is for admissible evidence that will have some probative value in an investigation. 

What next?

daveor