Re: Address privacy

Brian E Carpenter <brian.e.carpenter@gmail.com> Sun, 26 January 2020 20:53 UTC

Return-Path: <brian.e.carpenter@gmail.com>
X-Original-To: ipv6@ietfa.amsl.com
Delivered-To: ipv6@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4B54C120052 for <ipv6@ietfa.amsl.com>; Sun, 26 Jan 2020 12:53:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id z7_DOvApGFPU for <ipv6@ietfa.amsl.com>; Sun, 26 Jan 2020 12:53:39 -0800 (PST)
Received: from mail-pj1-x102e.google.com (mail-pj1-x102e.google.com [IPv6:2607:f8b0:4864:20::102e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E3B29120043 for <ipv6@ietf.org>; Sun, 26 Jan 2020 12:53:38 -0800 (PST)
Received: by mail-pj1-x102e.google.com with SMTP id n96so2144281pjc.3 for <ipv6@ietf.org>; Sun, 26 Jan 2020 12:53:38 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=subject:to:references:from:message-id:date:user-agent:mime-version :in-reply-to:content-language:content-transfer-encoding; bh=n5wqpHH9ToNOeurd6MZ/dqIas7F5sQxd0cp+rkT6S9w=; b=Gid74K4/HweaHbjIFSmE47oyLie5b9agAJCKZHGdwnmROCXI4uWmHqyteV2da1XbNO tepXyvbg05C/L7H62Y0uwdp3GZuVxZdMk3+lRADynwpAXgUWFmsRc9hl7V9HTPuZ4sQi YdlHFG6ffNJgmgyylLNwBueQ5OoQI8m7ne8r6AgzyP/TtkNub8KWTS7rX3QcEMMSIZts gq0aPmL0dgkXU1pnmk2ar05aFKH+mc5Q3I4uL+/QRFb4GaAdP5DQ7il3Bho2xvFtgJNK GYW8JFHZ2L/BbxOhLcHtGXkE0KmX7te2F62WGafjxzw7wyohJq120W3pLGWGkgXm4nMZ lB0Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:subject:to:references:from:message-id:date :user-agent:mime-version:in-reply-to:content-language :content-transfer-encoding; bh=n5wqpHH9ToNOeurd6MZ/dqIas7F5sQxd0cp+rkT6S9w=; b=ib3scqtQvP03APsFel7w/7R2LHR1jHwCGotHmXwc6ERKQ48HdtNN58MHH2oZyZSl4i NYIfFm8WbOv2qft2uatU7aTr2X/DpNogvqBWoxExVHdl4XgEJjAosKPaFSrRNfDDnPwu C4soYNda1cKLXNqcHAeqZKe/PW0bU2wXtIFnIP8ghS3v8QRwy5L96VCzSM1eW9jNHpPd M969QBkr0wJffNoZAVNK3Il3EfzPqm9DdeGPCw3fVoIaE2M8AtdFTcn+fXDF7AIQRh6D pa+ZMNstJMH0wgvUt8YP1eXd4MpIusNzp0VqZCFkAscQHAg3FoGgAcwzhZD+HOY9D7nR aZaQ==
X-Gm-Message-State: APjAAAX3OyT9gNr5u8+c4WKbpVWRr0QedfJxxrpYXcRvzX4G5gLJ11M9 nQQ3OcZ7dFbYL94NudoFEOJ1JZrS
X-Google-Smtp-Source: APXvYqwQFM6DKWtPDenznPlBmZiefJEvi+KU0hKVViSIZqfiynZxsI+qDo7cw4G2akHEeCBYS7EZSQ==
X-Received: by 2002:a17:902:8213:: with SMTP id x19mr14298297pln.161.1580072018010; Sun, 26 Jan 2020 12:53:38 -0800 (PST)
Received: from [192.168.178.30] (88.161.69.111.dynamic.snap.net.nz. [111.69.161.88]) by smtp.gmail.com with ESMTPSA id u11sm12933768pjn.2.2020.01.26.12.53.36 for <ipv6@ietf.org> (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Sun, 26 Jan 2020 12:53:37 -0800 (PST)
Subject: Re: Address privacy
To: ipv6@ietf.org
References: <CALx6S36802oDaEgojAPq2c6hM_s1BayidXPh1Sc6RZmZa9UHpQ@mail.gmail.com> <89CDA9FE-6C41-4A5E-B6CD-ECC367DFDABA@employees.org>
From: Brian E Carpenter <brian.e.carpenter@gmail.com>
Message-ID: <1220b074-c7f5-bbc8-2991-a9af66caf8b7@gmail.com>
Date: Mon, 27 Jan 2020 09:53:34 +1300
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:60.0) Gecko/20100101 Thunderbird/60.9.1
MIME-Version: 1.0
In-Reply-To: <89CDA9FE-6C41-4A5E-B6CD-ECC367DFDABA@employees.org>
Content-Type: text/plain; charset="utf-8"
Content-Language: en-US
Content-Transfer-Encoding: quoted-printable
Archived-At: <https://mailarchive.ietf.org/arch/msg/ipv6/zI5AeQdaBtQyRMaKEVtoC09-HYY>
X-BeenThere: ipv6@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: "IPv6 Maintenance Working Group \(6man\)" <ipv6.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipv6>, <mailto:ipv6-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ipv6/>
List-Post: <mailto:ipv6@ietf.org>
List-Help: <mailto:ipv6-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipv6>, <mailto:ipv6-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 Jan 2020 20:53:41 -0000

On 27-Jan-20 09:20, Ole Troan wrote:
> The obvious answer is to put the source address in the encrypted payload. It does not have to be in the core header. 
> There’s a paper on it somewhere, although I am not sure if that’s where the idea originated.

Google "SNA: Sourceless Network Architecture" and "IPv6 source addresses considered harmful"

   Brian
 
> 
> Cheers 
> Ole
> 
>> On 26 Jan 2020, at 21:16, Tom Herbert <tom@herbertland.com> wrote:
>>
>> On Sun, Jan 26, 2020 at 11:59 AM Joel M. Halpern <jmh@joelhalpern.com> wrote:
>>>
>>> Tom, your description is somewhat misleading.
>>>
>>> On the one hand, LISP replies on per-flow state only in the mapping
>>> entity.  Not at arbitrary places in the network.
>>>
>>> Secondly, if hosts work in terms of identifiers, and the network works
>>> in temrs of locators, someone has to map them.  You can cache (including
>>> caching the whole thing), you can ask the host to hold the cache itself.
>>>  There are other tradeoffs you can make, moving things around.  But you
>>> can't just magically make the problem disappear.
>>
>> Joel,
>>
>> It comes down to how many addresses need to be mapped. It's intuitive
>> that a higher frequency of address rotation yields more privacy. But
>> higher frequency of address rotation means more active addresses in
>> the network. This degenerates to the greatest frequency of change
>> which would be to give each flow it's own unique address, and this is
>> also the one case of temporary addresses where we can quantify the
>> privacy characteristics.
>>
>> However, giving each flow its own address quickly becomes a scaling
>> and management problem-- we're talking several billions of active
>> addresses in some provider networks. Hence, I believe we need mapping
>> functions that are more N:1 than 1:1 (the latter doesn't scale).
>> Similar, the ability of the network to delegate and map bundles of
>> uncorrelated addresses to devices would be useful.
>>
>> Tom
>>
>>>
>>> Yours,
>>> Joel
>>>
>>>> On 1/26/2020 2:51 PM, Tom Herbert wrote:
>>>> On Sun, Jan 26, 2020 at 9:42 AM Michael Richardson
>>>> <mcr+ietf@sandelman.ca> wrote:
>>>>>
>>>>>
>>>>> Tom Herbert <tom@herbertland.com> wrote:
>>>>>>> Except that instead of doing it at layer 4, you do it with IPsec, and extrude
>>>>>>> that /128 to your machine.  This is already a thing :-)
>>>>>>>
>>>>>>>> Another solution I’ve considered is to have a giant anonymity mesh,
>>>>>>>> with every ISP’s user participating, and forward flows through this
>>>>>>>> mesh, treating each customer as an anonymity server.   I think this is
>>>>>>>
>>>>>>> This is also a thing called Tor.
>>>>>>>
>>>>>> Michael,
>>>>>
>>>>>> Doesn't that require that the users must explicitly configure when
>>>>>> they want privacy? I think a general solution should be transparent to
>>>>>
>>>>> Yes, I agree, it requires explicit configuration.
>>>>> I agree that this is not a good thing.
>>>>>
>>>>>> the user and "just works" to ensure their privacy. That in fact is one
>>>>>> of the arguments for NAT. If there is a significantly large enough
>>>>>> pool of users behind a NAT device, then the obfuscation is transparent
>>>>>> to the use and seems to be pretty good privacy (good enough that law
>>>>>> enforcement is concerned about NAT). I suppose a similar effect could
>>>>>> be achieved with a transparent proxy.
>>>>>
>>>>> Yes, and I think that more and more LEA will grow ever concerned about this
>>>>> situation, and it *is* pushing IPv6 adoption.  So, how can we find a happy medium?
>>>>>
>>>>>> You might want to take a look at draft-herbert-ipv6-prefix-address-privacy-00.
>>>>>
>>>>> An interesting read. I'm not sure where it goes.
>>>>>
>>>>> I would like Locator/Identifier separation.
>>>>> I wanted SHIM6. LISP would work, I think.
>>>>> Then privacy needs don't need to screw up efficient routing at the edge.
>>>>>
>>>> Hi Michael,
>>>>
>>>> The problem of LISP is that it potentially includes a cache in the
>>>> operator network that can be driven by downstream untrusted users--
>>>> hence there is possibility of DOS attack on the cache (this is the
>>>> primary reason why LISP hasn't been accepted into Linux).
>>>>
>>>> What we really want is Identifier/Locator routing that neither
>>>> requires per flow state to be maintained in the network nor relies on
>>>> caches to get reasonable performance.
>>>> draft-herbert-ipv6-prefix-address-privacy suggests crypto functions to
>>>> map identifiers to locators at the edge.
>>>>
>>>> Tom
>>>>
>>>>
>>>>>
>>>>> --
>>>>> Michael Richardson <mcr+IETF@sandelman.ca>, Sandelman Software Works
>>>>>  -= IPv6 IoT consulting =-
>>>>>
>>>>>
>>>>>
>>>>> --------------------------------------------------------------------
>>>>> IETF IPv6 working group mailing list
>>>>> ipv6@ietf.org
>>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>>> --------------------------------------------------------------------
>>>>
>>>> --------------------------------------------------------------------
>>>> IETF IPv6 working group mailing list
>>>> ipv6@ietf.org
>>>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>>>> --------------------------------------------------------------------
>>>>
>>
>> --------------------------------------------------------------------
>> IETF IPv6 working group mailing list
>> ipv6@ietf.org
>> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
>> --------------------------------------------------------------------
> 
> --------------------------------------------------------------------
> IETF IPv6 working group mailing list
> ipv6@ietf.org
> Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6
> --------------------------------------------------------------------
>