Re: Address privacy

Fernando Gont <fgont@si6networks.com> Tue, 28 January 2020 22:18 UTC

Return-Path: <fgont@si6networks.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 71282120018 for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 14:18:02 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level:
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id q2lSjHok33wH for <ipv6@ietfa.amsl.com>; Tue, 28 Jan 2020 14:18:00 -0800 (PST)
Received: from fgont.go6lab.si (fgont.go6lab.si [91.239.96.14]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A8F612004D for <ipv6@ietf.org>; Tue, 28 Jan 2020 14:18:00 -0800 (PST)
Received: from [192.168.100.103] (unknown [186.183.48.23]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by fgont.go6lab.si (Postfix) with ESMTPSA id 7DAB886B7A; Tue, 28 Jan 2020 23:09:13 +0100 (CET)
Subject: Re: Address privacy
To: Tom Herbert <tom@herbertland.com>, Mark Smith <markzzzsmith@gmail.com>
Cc: 6man WG <ipv6@ietf.org>
References: <03C832CE-7282-4320-BF1B-4CB7167FE6BE@employees.org> <1962.1579823388@localhost> <f83ab037-9125-bb74-dbac-68850aeb1020@huitema.net> <CBB23ABE-A7A3-4208-873C-E47EE063E34B@fugue.com> <11855.1579980079@localhost> <CALx6S36V_VjaxhELYcsgDYLWsCkj20p6gtiY9T9Q=9-9Oibyjw@mail.gmail.com> <32626.1580060558@localhost> <CALx6S37prWACD0jv9c-XHD-JtPqZAcgeT2Ax0EZHkiQaDR4t=g@mail.gmail.com> <419b7c7a-e364-7951-5a44-6c39e1da65fb@joelhalpern.com> <CALx6S36802oDaEgojAPq2c6hM_s1BayidXPh1Sc6RZmZa9UHpQ@mail.gmail.com> <6c5ba72d-9289-90ba-a1c9-2307ed29a4da@foobar.org> <a98bf2ab-32e7-459b-14d2-5e0e1c65a229@si6networks.com> <CALx6S36J5TPnXJQyMW2NUbQV6KL_oqUQ01m+BEzBJ+xcHpmQWw@mail.gmail.com> <bc0d1eb8-2301-224d-dc33-19f6a60e593e@si6networks.com> <CALx6S34i67ivt8t1P3omRVzsj9NfxY2t41JLjmjT6X0vtBQHKQ@mail.gmail.com> <CAO42Z2x079xurzjoRkX6kVa6Cc3SkJJH3_RvaTgVyB-sYO6yWg@mail.gmail.com> <CALx6S36ZMH+kBFsMjowQCaYH9YarhmDv_jKieuZ55BtZV_pZmg@mail.gmail.com>
From: Fernando Gont <fgont@si6networks.com>
Message-ID: <54c8f47c-28e3-42c7-96a6-ceb618e5765b@si6networks.com>
Date: Tue, 28 Jan 2020 19:07:47 -0300
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <CALx6S36ZMH+kBFsMjowQCaYH9YarhmDv_jKieuZ55BtZV_pZmg@mail.gmail.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/sVqCiYccWvw5nT8O4GSQSvfjPaA>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 Jan 2020 22:18:02 -0000

On 28/1/20 17:57, Tom Herbert wrote:
> On Tue, Jan 28, 2020 at 12:38 PM Mark Smith <markzzzsmith@gmail.com> wrote:
>>
>>
>>
>> On Wed, 29 Jan 2020, 08:51 Tom Herbert, <tom@herbertland.com> wrote:
>>>
>>>
>>>
>>> On Mon, Jan 27, 2020, 7:57 PM Fernando Gont <fgont@si6networks.com> wrote:
>>>>
>>>> On 28/1/20 00:10, Tom Herbert wrote:
>>>>> On Mon, Jan 27, 2020 at 5:36 PM Fernando Gont <fgont@si6networks.com> wrote:
>>>>>>
>>>>>> On 26/1/20 18:37, Nick Hilliard wrote:
>>>>>>> Tom Herbert wrote on 26/01/2020 20:16:
>>>>>>>> It's intuitive
>>>>>>>> that a higher frequency of address rotation yields more privacy
>>>>>>>
>>>>>>> intuitive, but probably inaccurate because of the a priori assumption
>>>>>>> that privacy is strongly associated with the endpoint identifier.
>>>>>>
>>>>>> In many cases, it is: you log in to fb with a given address, and reuse
>>>>>> that address to do other stuf
>>>>>>
>>>>> Yes, that's the "always on" network application that would allow
>>>>> address tracking and identification at even high frequency of address
>>>>> change. An exploit based on that is described in section 4.4 of
>>>>> draft-herbert-ipv6-prefix-address-privacy-00. I believe the only way
>>>>> to defeat this exploit would be single use (per flow), uncorrelated
>>>>> address.
>>>>
>>>> Agreed. That said, temporary addresses, for obvious reasons mitigates
>>>> activity correlation over time -- certainly not to the same extent that
>>>> the paranoid "one address per flow" would.
>>>
>>>
>>> Fernando,
>>>
>>> The rationale for temporary addresses may be obvious, but I don't believe anyone has yet quantified the effects. For instance, RFC4941 is thirteen years old, is there any evidence that it has materially improved anyone's privacy? (I'm not being cynical, but I think it's a fair question).
>>
>>
>> It depends. What were the privacy goals RFC3041/4241 designed to achieve and does it achieve them?
>>
>> It isn't reasonable to come up with a different set of privacy goals that RFC3041/4241 weren't designed to satisfy and then declare 3041/4241 is a privacy failure because it doesn't satisfy them.
>>
>> Privacy isn't binary, there are different privacy threats and different parties to be private from. That means needing different privacy mechanisms to suit the different privacy threat models.
>>
> Ole,
> 
> I think the privacy goals of RFC4941 are clearly articulated as
> addressing the problem of correlations that can be made on
> identifiers. From the draft:
> 
> "
> Anytime a fixed identifier is used in multiple contexts, it becomes
> possible to correlate seemingly unrelated activity using this
> identifier.
> 
>     The correlation can be performed by
> 
>     o  An attacker who is in the path between the node in question and
>        the peer(s) to which it is communicating, and who can view the
>        IPv6 addresses present in the datagrams.
> 
>     o  An attacker who can access the communication logs of the peers
>        with which the node has communicated.
> "
> 
> I think this should read "Anytime an identifier is used in multiple
> contexts", that is drop the "fixed".
> 
> The proposed solution is temporary addresses. But then the question
> quickly becomes how temporary do those addresses need to be to address
> the problem of correlations? The draft only says "Temporary addresses
> are used for a short period of time (typically hours to days) and are
> subsequently deprecated.". That's pretty vague. 

The timer definition is pretty specific, on the other hand.


> For instance, suppose
> a specifically user asks "How often do I need to change addresses to
> ensure my privacy?".  Section 3.5 tries to address the question, but,
> again is non-committal and makes no normative recommendation. 

The answer is obviously: the more you reuse an address, the more you 
allow the window/ability of correlation. Only the app knows the specific 
needs.

Temporary addresses are a middle-ground: even the app being unaware 
about the underlying mechanisms, you get some mitigation. Obviously, 
temporary addresses are time-bound as opposed to flow-bound, since that 
leads to fewer addresses in use, at the expense of allowing some 
correlation.

RFC4941 is a "default" mechanism that improves things a bit. If we were 
also to stress that they shouldn't be used for receiving connections, 
and hint OSes that they are free to drop e.g. incoming SYNs on them, 
then you get a lot more of value.

And yes, if you want to improve things even better, you need an API for 
the addressing capabilities. Shame on us that have produced so many 
different address properties without a way for apps to properly leverage 
them.



> I'd also
> note that the text in RFC4941 is pretty much unchanged from RFC4941,
> however the sophistication and data collection capabilities of would
> be attackers surely have changed since 2013 so it seems like this
> section should be revisited in light of that.

Please flag the text.

(One thing that did change is people's awareness... not necessarily the 
capabilities)

Thanks,
-- 
Fernando Gont
SI6 Networks
e-mail: fgont@si6networks.com
PGP Fingerprint: 6666 31C6 D484 63B2 8FB1 E3C4 AE25 0D55 1D4E 7492