[Pearg] Thoughts on privacy-preserving techniques used at the network layer

Adrian Farrel <adrian@olddog.co.uk> Fri, 12 November 2021 23:08 UTC

Return-Path: <adrian@olddog.co.uk>
X-Original-To: pearg@ietfa.amsl.com
Delivered-To: pearg@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 059853A0940 for <pearg@ietfa.amsl.com>; Fri, 12 Nov 2021 15:08:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.917
X-Spam-Level:
X-Spam-Status: No, score=-1.917 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hWqBdyRxVbcg for <pearg@ietfa.amsl.com>; Fri, 12 Nov 2021 15:08:43 -0800 (PST)
Received: from mta6.iomartmail.com (mta6.iomartmail.com [62.128.193.156]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 840873A0934 for <pearg@irtf.org>; Fri, 12 Nov 2021 15:08:42 -0800 (PST)
Received: from vs4.iomartmail.com (vs4.iomartmail.com [10.12.10.122]) by mta6.iomartmail.com (8.14.4/8.14.4) with ESMTP id 1ACN8aD3028299 for <pearg@irtf.org>; Fri, 12 Nov 2021 23:08:36 GMT
Received: from vs4.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id BE61D4604A for <pearg@irtf.org>; Fri, 12 Nov 2021 23:08:35 +0000 (GMT)
Received: from vs4.iomartmail.com (unknown [127.0.0.1]) by IMSVA (Postfix) with ESMTP id 640B746043 for <pearg@irtf.org>; Fri, 12 Nov 2021 23:08:35 +0000 (GMT)
Received: from asmtp2.iomartmail.com (unknown [10.12.10.249]) by vs4.iomartmail.com (Postfix) with ESMTPS for <pearg@irtf.org>; Fri, 12 Nov 2021 23:08:35 +0000 (GMT)
Received: from LAPTOPK7AS653V ([84.93.2.7]) (authenticated bits=0) by asmtp2.iomartmail.com (8.14.4/8.14.4) with ESMTP id 1ACN8YI5000555 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO) for <pearg@irtf.org>; Fri, 12 Nov 2021 23:08:35 GMT
Reply-To: <adrian@olddog.co.uk>
From: "Adrian Farrel" <adrian@olddog.co.uk>
To: <pearg@irtf.org>
Date: Fri, 12 Nov 2021 23:08:33 -0000
Organization: Old Dog Consulting
Message-ID: <04a401d7d81a$37b691a0$a723b4e0$@olddog.co.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AdfYGaw+SrXnBTuBQw+O2dImvb6qmw==
Content-Language: en-gb
X-Originating-IP: 84.93.2.7
X-Thinkmail-Auth: adrian@olddog.co.uk
X-TM-AS-GCONF: 00
X-TM-AS-Product-Ver: IMSVA-9.1.0.2034-8.6.0.1018-26526.003
X-TM-AS-Result: No--3.707-10.0-31-10
X-imss-scan-details: No--3.707-10.0-31-10
X-TMASE-Version: IMSVA-9.1.0.2034-8.6.1018-26526.003
X-TMASE-Result: 10--3.706900-10.000000
X-TMASE-MatchedRID: LYTtUOuqSve1c72nJ9kiInFPUrVDm6jtqUdpDBnLMO3e6dEbvIyrxYnz gHWN7u0mhDeIW0M6MdQs4CyDGzNwzd5PpICuz1OoB0c2kG7Gs6hwm7Nn/lGhVkSVpnjjB2vkIyc cKU/UgpsjSmW2ycHZeFFpo5lqLwOaSE6rUh/Ulkn+xRIVoKNMvFNYbkWQyPvqVrY35bCIQ/Dzu4 4fXHEJA36CEut/SXAw0+pR+Ea5cIKfLOcdKC+T+MBGxZsDItczwdaE5TU9NVhq1f1VsCMcYUOcZ vtoHDbz3OM0iXrlbkPRCpAkQjgFOxeBe23N6xDN3nHtGkYl/VqlAfiiC1VA/SmU8d3LRk3ohnJR dUQZv0CKgOJodSAlpI+d0AOaU1YBpmXAhk8FvLiBUOq95bUaSthQO8CvZj/XWODklytCVf9H5fh +PjKkyVXbxZ/fQGAqR5CxKwPlFfzlRxm3A2wKujl/1fD/GopdusMnb+6RSEmw7M6dyuYKg46HM5 rqDwqt62mHDomFaXYUbmBbzy8MvHMR0k4M/hd5RG77O8owkA02BBrRSgtO4rWyM9+HmjouKUYn1 jYjb13n9Utgr5VUKhKNE/+DmUCRr2OAW6CLOu6x4TAPWg6bof1siDYOTKnanrKcvPhN+muk9czS WhuGspRMZUCEHkRt
X-TMASE-SNAP-Result: 1.821001.0001-0-1-22:0,33:0,34:0-0
Archived-At: <https://mailarchive.ietf.org/arch/msg/pearg/b6fkqK11s9AbNOfwPH1tgebzekw>
Subject: [Pearg] Thoughts on privacy-preserving techniques used at the network layer
X-BeenThere: pearg@irtf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Privacy Enhancements and Assessment Proposed RG <pearg.irtf.org>
List-Unsubscribe: <https://www.irtf.org/mailman/options/pearg>, <mailto:pearg-request@irtf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/pearg/>
List-Post: <mailto:pearg@irtf.org>
List-Help: <mailto:pearg-request@irtf.org?subject=help>
List-Subscribe: <https://www.irtf.org/mailman/listinfo/pearg>, <mailto:pearg-request@irtf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Nov 2021 23:08:48 -0000

Hi PEARG,

I didn't make it to your meeting on Thursday, but I see you had a
presentation on "State of the art on privacy-preserving techniques used at
the network layer".

I had a quick look through the slides and I think this is an interested and
somewhat neglected topic.

Two things to bring to your attention in the context of this network-layer
work.

We had a presentation at a side meeting mid-week on "End-to-End Privacy for
Identity & Location with IP" from Gregor Haywood of St Andrews University
based on a paper at NIPAA-21
You can see the slides at
https://github.com/danielkinguk/sarah/blob/main/conferences/ietf-112/materia
ls/haywood-nipaa21-irtf.pdf
We'll have the recording of the meeting posted at
https://github.com/danielkinguk/sarah/tree/main/conferences/ietf-112 in a
couple of days.
The essence of the work is to use ILNP to enable random variation in the low
order part of an address based (the NID).

There is an old draft abandoned by the MPLS working group on "Opportunistic
Security in MPLS Networks"
See it at
https://datatracker.ietf.org/doc/draft-ietf-mpls-opportunistic-encrypt/
This was an experimental approach to providing opportunistic encryption on
LSPs where the end points were both capable.
The draft was abandoned when our plans for experimental implementation fell
through.
We do believe that the protocol work is robust, and we would welcome
assistance with further research.

Happy to entertain questions.

Best,
Adrian