Re: Address privacy

Tom Herbert <tom@herbertland.com> Tue, 28 January 2020 17:03 UTC

Return-Path: <tom@herbertland.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 77ADE1200D5 for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 09:03:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=herbertland-com.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id L-TW5_3Lu5NU for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 09:03:43 -0800 (PST)
Received: from mail-ed1-x52a.google.com (mail-ed1-x52a.google.com [IPv6:2a00:1450:4864:20::52a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2CF71120077 for <ipv6@ietf.org>; Tue, 28 Jan 2020 09:03:32 -0800 (PST)
Received: by mail-ed1-x52a.google.com with SMTP id e10so15420788edv.9 for <ipv6@ietf.org>; Tue, 28 Jan 2020 09:03:32 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=herbertland-com.20150623.gappssmtp.com; s=20150623; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=DqNKwIyr000WQFF8X4f7YrnxFdBgCBHT49Bjq7YWX94=; b=Fzb6LLRb2ZQ2DX/Apvca5pIL2eFWLhtOLhxTMS+2+VTqJzwbq9hSmYko6cC7l6EHUx RLg1m05qhbcT8W/9a4scKEDWa4+S7nNrVAxPghhvt56tGPbugEubPhZcRURcBct57N/Q ZlULUyMTxgxn/vEJP0XrvgMA8TlQ0NrYKQ7b9uysUosyN0xVAicdJABBydAeHZAzZRLr eoKGLwOKvoAcMUOG3KIrVEXoR6MJttax184GuaFzj/WFLQoZdy0Orkj1foOhdCo/iSb+ wTUy92+WxcTJcqWeXNRD+tGstqYCEHdLtUzLP8v3fjFUFy8+LJrs1NeOyJh6W7qexTs7 iwgw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=DqNKwIyr000WQFF8X4f7YrnxFdBgCBHT49Bjq7YWX94=; b=o9eyHT70kU5C6eFGGQHfMZnBakfz3Kxcgv8kF1LxVFsDORiNQMVoIr7Okvoze5ViGB MTcV+iYggTNfZwGrBhBQigueCVZqVBbT79Sz+Fagqnimf6OXkQAjU3Yd77SAZlv7LCTB WSiKUV+wXoFqu1n9EZvw7ZXRifvSeC5YKORm4dFzH5OoEDKQA581Z0Mp4/EfsRGexAeT bJuBWt0oSvkSk3beKOMzng5YhNZi6a9XU/YMJ5aLLCswW+ye55/lGyYaKepgSn3/cY6B 7J7DnDhhQPe7dIly1YJkDPuKrvujioG0tJ+G4gjvJCP8qWSzgXqQUYeCqTKn0nokB5Q1 bh1A==
X-Gm-Message-State: APjAAAXFzOkk653k/vVtjSZY0H67HgqiEC6GpZY9+um1sKFaU0bl1CTH xccJePtguTGVMZ9QNBpxwo/aVkGNw1geShM2nA4oZbJR
X-Google-Smtp-Source: APXvYqx7Hwu1X7QQ7M8NM8gHu17rOXN7YFeALq0pbx4I0Japk618Iyw6Vqo22CyUy67C5dt0HcqCETay4BfxoKDX+aY=
X-Received: by 2002:a17:906:7fc9:: with SMTP id r9mr3918340ejs.197.1580231010484; Tue, 28 Jan 2020 09:03:30 -0800 (PST)
MIME-Version: 1.0
References: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org> <MN2PR11MB3565330989D411525D30B90DD80F0@MN2PR11MB3565.namprd11.prod.outlook.com> <80207E17-AE8E-4D19-B516-D2E6AB70721E@employees.org> <8D5610EA-49D3-483E-BB7A-67D67BC89346@jisc.ac.uk> <DE7B0688-230F-4A5C-8E24-9EAED9FD9FEB@puck.nether.net> <CAO42Z2zXwVnzemRqyqy78czpHjZm0nhkCJgVrx=-fmt+C6MnSA@mail.gmail.com> <1962.1579823388@localhost> <f83ab037-9125-bb74-dbac-68850aeb1020@huitema.net> <CBB23ABE-A7A3-4208-873C-E47EE063E34B@fugue.com> <11855.1579980079@localhost> <CALx6S36V_VjaxhELYcsgDYLWsCkj20p6gtiY9T9Q=9-9Oibyjw@mail.gmail.com> <32626.1580060558@localhost> <CALx6S37prWACD0jv9c-XHD-JtPqZAcgeT2Ax0EZHkiQaDR4t=g@mail.gmail.com> <419b7c7a-e364-7951-5a44-6c39e1da65fb@joelhalpern.com> <CALx6S36802oDaEgojAPq2c6hM_s1BayidXPh1Sc6RZmZa9UHpQ@mail.gmail.com> <6c5ba72d-9289-90ba-a1c9-2307ed29a4da@foobar.org> <a98bf2ab-32e7-459b-14d2-5e0e1c65a229@si6networks.com> <CALx6S36J5TPnXJQyMW2NUbQV6KL_oqUQ01m+BEzBJ+xcHpmQWw@mail.gmail.com> <d763dc26-57bb-c67d-f727-617a6b52d813@foobar.org>
In-Reply-To: <d763dc26-57bb-c67d-f727-617a6b52d813@foobar.org>
From: Tom Herbert <tom@herbertland.com>
Date: Tue, 28 Jan 2020 09:03:19 -0800
Message-ID: <CALx6S36DsttXx-7UWL=iZkGuKG_yNKdADFB5zo87wu2coz8HcQ@mail.gmail.com>
Subject: Re: Address privacy
To: Nick Hilliard <nick@foobar.org>
Cc: Fernando Gont <fgont@si6networks.com>, 6man WG <ipv6@ietf.org>
Content-Type: text/plain; charset="UTF-8"
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/pkhcFIqtL1RMOjN_Xa2Lqr7TeGE>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jan 2020 17:03:46 -0000

On Tue, Jan 28, 2020 at 8:51 AM Nick Hilliard <nick@foobar.org> wrote:
>
> Tom Herbert wrote on 28/01/2020 03:10:
> > Yes, that's the "always on" network application that would allow
> > address tracking and identification at even high frequency of address
> > change. An exploit based on that is described in section 4.4 of
> > draft-herbert-ipv6-prefix-address-privacy-00. I believe the only way
> > to defeat this exploit would be single use (per flow), uncorrelated
> > address.
>
> persistent identification for apps (browser / mobile / etc) is handled
> using a variety of mechanisms, primarily client fingerprinting.  The
> best known example of client fingerprinting would be application
> cookies.  IP addressing information is only one input source and
> probably one of the less important ones because of the poor correlation
> between ip addresses and end users (e.g. large 1:n nats), and ip address
> changes (office to train wifi, to in-car cellular to home broadband, to
> coffee shop, etc).

Nick,

The problem isn't in identification for apps, it's that the fact that
the logs created by the app correlate user identity with an IP
address. Given that correlation, the log could conceivably be used to
identify participants in completely unrelated communications. Using IP
addresses to identify individuals involved in communications does
happen, there are a number of instances noted on the web particularly
in law enforcement.

Tom

>
> Overall privacy addresses fall into the category of things that seemed
> like a good idea at the time but in retrospect their usefulness fell
> away as people worked out other, more accurate ways to track end users
> and end user devices.
>
> Nick
>