Re: [Privacy-pass] Updated WG charter text

Christopher Wood <caw@heapingbits.net> Thu, 23 April 2020 16:53 UTC

Return-Path: <caw@heapingbits.net>
X-Original-To: privacy-pass@ietfa.amsl.com
Delivered-To: privacy-pass@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4230F3A0CBE for <privacy-pass@ietfa.amsl.com>; Thu, 23 Apr 2020 09:53:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.1
X-Spam-Level:
X-Spam-Status: No, score=-2.1 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=heapingbits.net header.b=N74i3hzK; dkim=pass (2048-bit key) header.d=messagingengine.com header.b=DTU35Kr2
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id layFgfHv-wdH for <privacy-pass@ietfa.amsl.com>; Thu, 23 Apr 2020 09:53:12 -0700 (PDT)
Received: from wout5-smtp.messagingengine.com (wout5-smtp.messagingengine.com [64.147.123.21]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9A6603A0C9F for <privacy-pass@ietf.org>; Thu, 23 Apr 2020 09:53:08 -0700 (PDT)
Received: from compute1.internal (compute1.nyi.internal [10.202.2.41]) by mailout.west.internal (Postfix) with ESMTP id 0B2BD472 for <privacy-pass@ietf.org>; Thu, 23 Apr 2020 12:53:06 -0400 (EDT)
Received: from imap7 ([10.202.2.57]) by compute1.internal (MEProxy); Thu, 23 Apr 2020 12:53:07 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=heapingbits.net; h=mime-version:message-id:in-reply-to:references:date:from:to :subject:content-type; s=fm1; bh=WCftDZlqd6bouaZtkWwSsLZcOxm4FPI MU9ygS+mK42E=; b=N74i3hzKvdz47oKve8LNnBzduRH4vn1l7JWSqcvh4p+BXu8 /OdegsQPH5pyEJUPYgZvUyKOadkRasfrFPzyosF+nitK1JJtBH3/8iPxbfyTQC6z fGWBkRjm7pqR7shToyJE2QgmMvmFoqslmPZW30ktWZ6ZrVlRe3mrwYcGqiHRRJKG OLvYz7n/9RnqrS4jhJOLh93j10Z5HHs2t1uI/eophRoNkpoGLx4/syWvhLWKTSjz qi7OBzvOVvmBDPMeCVEHP8d/oLlWg8xC94adUYWeouBLwVdpcLw4+0HV4SOySqFy DIu95wh/3dlwsEPd/LnWIWxnsPPLwKJO+vNVYHg==
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d= messagingengine.com; h=content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to:x-me-proxy :x-me-proxy:x-me-sender:x-me-sender:x-sasl-enc; s=fm2; bh=WCftDZ lqd6bouaZtkWwSsLZcOxm4FPIMU9ygS+mK42E=; b=DTU35Kr2OLCIZ4njnZx6NY 2FuK9xWOC+Di9NykhVEotonSWmqOJtktALvDK4wxV7lZNv24AVKfL3OMxsT4f2Ir BqqZ3+7TNTumcBtnwG3yQhgKkNrZE3pmHIPA5u651D/ii0Tli7rB/banhVeIXapD AnVvonyYVDfVEmEz70XYIl1ohJO+1Byl19W1+VKmiWgAAJ3H+bLsJUdfJUcWcQGm /ZZ6Le3sKRGsZSUx+rjnSJb68ZytTa5bJrQjFIEuaFP2OEbz1cPjdDJR75w1UoYR RgYtPmD+aLgW5oTzu+wDVa9f9oXLPeycoFmfpyo43yMMdZDeGqIxw5MxP7PA4cRA ==
X-ME-Sender: <xms:8sehXv8MIoaXK_RTQ-d1LBVjo7xXgMsub2MLhhHL3gO43--1zDtuGQ>
X-ME-Proxy-Cause: gggruggvucftvghtrhhoucdtuddrgeduhedrgeelgdektdcutefuodetggdotefrodftvf curfhrohhfihhlvgemucfhrghsthforghilhdpqfgfvfdpuffrtefokffrpgfnqfghnecu uegrihhlohhuthemuceftddtnecunecujfgurhepofgfggfkjghffffhvffutgesthdtre dtreertdenucfhrhhomhepfdevhhhrihhsthhophhhvghrucghohhougdfuceotggrfies hhgvrghpihhnghgsihhtshdrnhgvtheqnecuvehluhhsthgvrhfuihiivgeptdenucfrrg hrrghmpehmrghilhhfrhhomheptggrfieshhgvrghpihhnghgsihhtshdrnhgvth
X-ME-Proxy: <xmx:8sehXqPM1V6wqBbeRkbxeTjOaQdIUrChuRoJ0VfFd6H8EYvWRQQpOw> <xmx:8sehXn26lnqc45XnaUNf72yGPMYE2Oxp-1Fx_ehnnws2klszQx3Hkw> <xmx:8sehXhpBbNR5-OErHrAOVm1STUdtvafMcGS5BwUY5XehEAElRhcadA> <xmx:8sehXrrnmPjGvNvSICQXoztaWePPNiw4x6OBxBhMEs-k1WWASbzC2w>
Received: by mailuser.nyi.internal (Postfix, from userid 501) id 3CD72180091; Thu, 23 Apr 2020 12:53:06 -0400 (EDT)
X-Mailer: MessagingEngine.com Webmail Interface
User-Agent: Cyrus-JMAP/3.3.0-dev0-351-g9981f4f-fmstable-20200421v1
Mime-Version: 1.0
Message-Id: <a469cd36-dcae-4d15-8b7b-a86071ea6d3d@www.fastmail.com>
In-Reply-To: <4239f287-9a96-4700-ac32-8583ca451115@www.fastmail.com>
References: <40600024-A6F1-41D7-B7A8-4B4D7D48201B@cloudflare.com> <4239f287-9a96-4700-ac32-8583ca451115@www.fastmail.com>
Date: Thu, 23 Apr 2020 09:52:15 -0700
From: Christopher Wood <caw@heapingbits.net>
To: privacy-pass@ietf.org
Content-Type: text/plain
Archived-At: <https://mailarchive.ietf.org/arch/msg/privacy-pass/zCOGWM277p-tkHwYraWGY_KmPFQ>
Subject: Re: [Privacy-pass] Updated WG charter text
X-BeenThere: privacy-pass@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: <privacy-pass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/privacy-pass/>
List-Post: <mailto:privacy-pass@ietf.org>
List-Help: <mailto:privacy-pass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/privacy-pass>, <mailto:privacy-pass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 Apr 2020 16:53:23 -0000

On Wed, Apr 22, 2020, at 5:32 PM, Martin Thomson wrote:
> A few inline comments, before I think about this some more...
> 
> On Wed, Apr 22, 2020, at 01:00, Alex Davidson wrote:
> > The primary purpose of the Privacy Pass Working Group is to develop and
> > standardize a protocol that meets these requirements, influenced by
> > applications that have arisen from the wider community. The aims of the
> > Working Group can be split into three distinct goals:
> > 
> > First, specify an extensible protocol for creating and redeeming
> > anonymous and transferrable tokens. The protocol should permit suitable
> > cryptographic ciphersuites and security parameterization for
> > cryptographic agility. Negotiation of cryptographic parameters is an
> > application-specific property and thus out of scope for the Working
> > Group. Specification of the underlying cryptographic algorithms or
> 
> This bit about choosing parameters seems to be in tension with the 
> previous sentence.  One of the problems with a system like this is 
> coordinating algorithm changes.  I think that we need a plan, not a big 
> punt.

I'm thinking about this more like the DoH effort, which focused first and foremost on the protocol itself and punted other concerns such as discovery and whatnot. 

> > protocols is also out of scope. The Working Group will specify a
> > preliminary set of extensions, including Issuer-supplied metadata and
> > public verifiability, as well as any additional extensions that may
> 
> What does "public verifiability" mean here?

I think it means that someone beyond the party which issued the token (and holds the OPRF private key) can verify the authenticity of a token. As an example, blind signatures have this property. 

> > 1. Describing use cases and interfaces that allow the protocol to be
> >  used for those use cases.
> > 2. Defining the privacy goals for each Client during protocol execution,
> >  along with expectations placed on the Issuers and the ecosystem at
> >  large.
> > 3. Describing parameterizations that control the Client privacy budget
> >  and Issuer security parameters.
> 
> What is a "privacy budget"?  To be clear, I think that I know, and my 
> opinion is that it is not a good framing for this.  I also think that 
> it is not a good reference model to use in general.
> 
> > 4. Describing verification mechanisms for sanctioning or trusting
> >  Issuers and their corresponding keying material.
> 
> Sanctioning implies punishment, which we can't write a protocol for.

That's a good point. Maybe we should just say, "Describing verification mechanisms for trusting Issuers and their corresponding keying material"?

> If this is about providing technical safeguards against the potential 
> for issuers to abuse key management for a covert channel, then say that.
> 
> > 5. Describing where key material is stored and how it is accessed.
> 
> I don't think that we need this in a charter.
> 
> > 6. Specifying mechanisms for ensuring that Issuers are not acting
> >  maliciously.
> 
> This seems a bit open-ended.  Will this extend to audits of their 
> processes?  I don't think we have a protocol for that either.

Maybe we could refine this by specifying particular attacks we're concerned about, such as key tagging?

> > 7. Describing the procedure for including small amounts of metadata with
> >  Issued tokens, as well as the associated impacts on privacy.
> > 8. Describing the risk and possible ramifications of Issuer
> >  centralization, and exploring possible mechanisms to mitigate these
> >  risks.

Best,
Chris