Re: [Pearg] Proposed virtual interim on IP address privacy

Stephen Farrell <stephen.farrell@cs.tcd.ie> Tue, 17 November 2020 08:17 UTC

Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A3A883A074B for <pearg@ietfa.amsl.com>; Tue, 17 Nov 2020 00:17:50 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.989
X-Spam-Level:
X-Spam-Status: No, score=-1.989 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, NICE_REPLY_A=-0.001, SPF_HELO_NONE=0.001, T_SPF_TEMPERROR=0.01, URIBL_BLOCKED=0.001] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cs.tcd.ie
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t0xoNM7Jjjd6 for <pearg@ietfa.amsl.com>; Tue, 17 Nov 2020 00:17:46 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E0ECD3A074E for <pearg@irtf.org>; Tue, 17 Nov 2020 00:17:45 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 28357BE6F; Tue, 17 Nov 2020 08:17:42 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3R9a-PNow5Sg; Tue, 17 Nov 2020 08:17:40 +0000 (GMT)
Received: from [10.244.2.119] (95-45-153-252-dynamic.agg2.phb.bdt-fng.eircom.net [95.45.153.252]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 5AC53BE5D; Tue, 17 Nov 2020 08:17:40 +0000 (GMT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cs.tcd.ie; s=mail; t=1605601060; bh=bwkMLEZo+lFg5x7QKTGftrfVqAbMkJ0opYslLdBgSXs=; h=Subject:To:Cc:References:From:Date:In-Reply-To:From; b=Xavzm4pbKZCpQGTNuomU2G0Al8Cafg6hRaspnTqMdKU6WSJrcRDMl1910JSEmsOfP TUgf99JqxNbkSXKSNa9/h1/3+qHu5J+rv6lt42xqAI1GdE0iSdGdH39RXYRH0jLPEV aF6zEUbs1IBrVdLOP3tSnK2JS1P1k9byJaBUjWdc=
To: Eliot Lear <lear=40cisco.com@dmarc.ietf.org>
Cc: pearg@irtf.org, Christopher Wood <caw@heapingbits.net>
References: <30bff6c4-fca5-480e-93fb-c6d0b5510148@www.fastmail.com> <ff309673-23c9-0cdb-e960-cc34db735e9a@cs.tcd.ie> <0876C3DE-62F4-410B-9F68-9A5FBFC5CA7B@cisco.com>
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
Message-ID: <6aaac899-1a0a-ac18-c5c3-f6572ef7887c@cs.tcd.ie>
Date: Tue, 17 Nov 2020 08:17:39 +0000
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:78.0) Gecko/20100101 Thunderbird/78.3.2
MIME-Version: 1.0
In-Reply-To: <0876C3DE-62F4-410B-9F68-9A5FBFC5CA7B@cisco.com>
Content-Type: multipart/signed; micalg="pgp-sha256"; protocol="application/pgp-signature"; boundary="0Xe1CogtjmpgebpbtWsZsJ2tYuJYekFPj"
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/Npp_80b-C_G0kzb7uZLpe1t4peM>
Subject: Re: [Pearg] Proposed virtual interim on IP address privacy
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Tue, 17 Nov 2020 08:17:52 -0000

Hiya,

On 17/11/2020 07:47, Eliot Lear wrote:
> 
> 
>> On 16 Nov 2020, at 21:16, Stephen Farrell
>> <stephen.farrell@cs.tcd.ie> wrote:
>> 
>> One topic I'd like to see covered is: when is one person's use-case
>> another person's abuse-case? ISTM the exact same behaviour can be
>> judged as fine or abusive depending on the circumstances and actors
>> involved. I think it'd be good to try be more explicitly aware of
>> that and to maybe consider if there's a preponderance of evidence
>> for one view or the other in some cases.
> 
> Another way of putting this is that there are legitimate reasons to
> want to know who is it that is DOSing me, and who do I contact?

So yes, to the extent that the text above presents a use-case
without ack'ing that there could be related abuse-case(s),
e.g., there are probably many illegitimate reasons to want to
know who is it that is using an address.

Cheers,
S.


> Early work on take downs and Pharma spam has shown that sometimes
> time is of the essence in order to kill economic incentives for poor
> behavior.  So what does this mean in terms of privacy?  I can talk a
> little about this, but the experts are really in Cambridge and at
> UCSD.
> 
> Eliot
> 
>