Re: Address privacy

Fernando Gont <fgont@si6networks.com> Wed, 29 January 2020 00:43 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4A4431200EF for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 16:43:57 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level:
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HuELYR_NYMbQ for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 16:43:55 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 30F221200B3 for <ipv6@ietf.org>; Tue, 28 Jan 2020 16:43:55 -0800 (PST)
Received: from [192.168.100.103] (unknown [186.183.48.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 0885686522; Wed, 29 Jan 2020 01:43:50 +0100 (CET)
Subject: Re: Address privacy
To: Tom Herbert <tom@herbertland.com>
Cc: Nick Hilliard <nick@foobar.org>, 6man WG <ipv6@ietf.org>
References: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org> <CBB23ABE-A7A3-4208-873C-E47EE063E34B@fugue.com> <11855.1579980079@localhost> <CALx6S36V_VjaxhELYcsgDYLWsCkj20p6gtiY9T9Q=9-9Oibyjw@mail.gmail.com> <32626.1580060558@localhost> <CALx6S37prWACD0jv9c-XHD-JtPqZAcgeT2Ax0EZHkiQaDR4t=g@mail.gmail.com> <419b7c7a-e364-7951-5a44-6c39e1da65fb@joelhalpern.com> <CALx6S36802oDaEgojAPq2c6hM_s1BayidXPh1Sc6RZmZa9UHpQ@mail.gmail.com> <6c5ba72d-9289-90ba-a1c9-2307ed29a4da@foobar.org> <a98bf2ab-32e7-459b-14d2-5e0e1c65a229@si6networks.com> <CALx6S36J5TPnXJQyMW2NUbQV6KL_oqUQ01m+BEzBJ+xcHpmQWw@mail.gmail.com> <bc0d1eb8-2301-224d-dc33-19f6a60e593e@si6networks.com> <CALx6S34i67ivt8t1P3omRVzsj9NfxY2t41JLjmjT6X0vtBQHKQ@mail.gmail.com> <1fc7816e-6179-28d6-7b11-be2027561a54@si6networks.com> <CALx6S37KXfLE22uHMZTD41+jR7fdZd9PZGqO-r4SE2LehtN=Gg@mail.gmail.com> <2d312ecf-e037-5c24-28d7-2a2c3dc06363@si6networks.com> <CALx6S37A1QzR0PhDUzujXGiB+a-9c1qG4g8TE8KOcxOLKP18TQ@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Message-ID: <c5b19a7b-3986-eca8-df8f-5d0971bbe952@si6networks.com>
Date: Tue, 28 Jan 2020 21:36:02 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CALx6S37A1QzR0PhDUzujXGiB+a-9c1qG4g8TE8KOcxOLKP18TQ@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/5A9e6vsN2L36zQ-FbAQ_eum8DSU>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 Jan 2020 00:43:57 -0000

On 28/1/20 21:17, Tom Herbert wrote:
> On Tue, Jan 28, 2020 at 3:45 PM Fernando Gont <fgont@si6networks.com> wrote:
>>
>> On 28/1/20 19:45, Tom Herbert wrote:
>> [...]
>>>> I don't think you can quantify privacy. What would be the units for that?
>>>>
>>>> There's secrecy and not-secrecy. But with these things, you simply
>>>> mitigate (to some extent) the ability to correlate network activity.
>>>>
>>> Fernando,
>>>
>>> In the case of single use addresses, that is each flow gets its own
>>> addresses, the privacy effects are quantifiable. Since each flow has a
>>> different source address, no two flows or communications can be
>>> correlated to being sourced from the same user. In this case, the
>>> identifiers are not reused is used in multiple contexts, so it isn't
>>> possible to correlate seemingly unrelated activity using an
>>> identifier. When an identifier is reused for the same node, even once,
>>> then the possibility of correlations exists.
>>
>> You are not quantifying privacy: that's still qualitative description.
>>
> It is quantified. If a flow uses a unique address then the risk of
> using the address of packets in the flow to correlate to other flows
> is zero.

What are the units? And what would "1" (or for instance "100") of such 
units mean?


(for the sake of exercise, even if you were "quantifying" this in terms 
of probability, 0 would be "impossible", 1 would mean 100% chance, and 
the rest would be impossible to specify, given factors such as network 
activity patterns, different kinds of applications, etc.)


[...]
>>> It's a false sense of security. Here's a good analysis:
>>> https://www.ftc.gov/news-events/blogs/techftc/2016/03/time-rethink-mandatory-password-changes
>>
>> Forcing password changes exacerbate some human aspects, and at times
>> leads to trouble. That doesn't say it doesn't have a place.
>>
>> Folks also argue that firewalls are a false sense of security. Some
>> argue the same about resistance to address-scan -- even when the #1 task
>> to hack a system is normally to find it. IMO, whatever makes the
>> attacker's life harder has a place and a use.
> 
> For things like address-scan and breaking a key, the risk of attack
> can be quantified based on existing processing capabilities needed for
> brute force attack.

I was noting that different people have different views regarding what 
is useful, and what is not. Some discourage address-scan resistance as a 
technique of "security through obscurity".



> Regardless, I still haven't seen a reasonable answer to user's obvious
> question regarding temporary address: "What should my frequency of
> address change be to ensure my privacy?"

If what you want is inability of correlation (and assuming you cannot 
correlate based on the prefix), then it's not a matter of time. It's a 
matter of addresses being bound to flows.

Any other measures depend on so many factors (network activity patterns, 
etc.) that it's virtually impossible to specify.

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492