Re: [Rats] should Evidence containers be explicit about Personally Identiable Information?

Laurence Lundblade <lgl@island-resort.com> Wed, 08 July 2020 19:38 UTC

Return-Path: <lgl@island-resort.com>
X-Original-To: rats@ietfa.amsl.com
Delivered-To: rats@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D6A73A03EA for <rats@ietfa.amsl.com>; Wed, 8 Jul 2020 12:38:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.895
X-Spam-Level:
X-Spam-Status: No, score=-1.895 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EsgiZ1jUozok for <rats@ietfa.amsl.com>; Wed, 8 Jul 2020 12:38:45 -0700 (PDT)
Received: from p3plsmtpa09-08.prod.phx3.secureserver.net (p3plsmtpa09-08.prod.phx3.secureserver.net [173.201.193.237]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 307173A0365 for <rats@ietf.org>; Wed, 8 Jul 2020 12:38:45 -0700 (PDT)
Received: from [192.168.1.78] ([76.167.193.86]) by :SMTPAUTH: with ESMTPA id tFtzj6zM4id6rtFtzjiviI; Wed, 08 Jul 2020 12:38:43 -0700
X-CMAE-Analysis: v=2.3 cv=QL8WuTDL c=1 sm=1 tr=0 a=t2DvPg6iSvRzsOFYbaV4uQ==:117 a=t2DvPg6iSvRzsOFYbaV4uQ==:17 a=S4RO9u3ZW3cs01sbkI0A:9 a=7Zwj6sZBwVKJAoWSPKxL6X1jA+E=:19 a=05UD6f_8G6DqRGz2:21 a=BZCsUGtRWJ61rL3L:21 a=QEXdDO2ut3YA:10 a=C334w0EozUeeVKyQ:21 a=_W_S_7VecoQA:10
X-SECURESERVER-ACCT: lgl@island-resort.com
From: Laurence Lundblade <lgl@island-resort.com>
Message-Id: <B45484F4-5B5F-49D3-BF2F-9AAADE496863@island-resort.com>
Content-Type: multipart/alternative; boundary="Apple-Mail=_E9C70140-818A-4CC6-86E0-D14668E9F711"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 08 Jul 2020 12:38:43 -0700
In-Reply-To: <0269E694-F006-4BC3-B8E6-13038C41FFD4@arm.com>
Cc: Michael Richardson <mcr+ietf@sandelman.ca>, "rats@ietf.org" <rats@ietf.org>, Kathleen Moriarty <kathleen.moriarty.ietf@gmail.com>
To: Thomas Fossati <Thomas.Fossati@arm.com>
References: <ietf-rats-wg/architecture/issues/116@github.com> <28098.1593568476@localhost> <8AA2FB69-6E91-431A-BD57-354C65DAEE76@arm.com> <22564.1593904278@localhost> <74C3C9C3-F4A7-4577-B758-2FEAC06173E0@arm.com> <16696.1594054310@localhost> <0269E694-F006-4BC3-B8E6-13038C41FFD4@arm.com>
X-Mailer: Apple Mail (2.3445.104.11)
X-CMAE-Envelope: MS4wfM5kOAJNuD2cDBSa775LPvdprwSYJ2jSOmBNUFoe94XE3em6mMzT8DQPEvhwAWDzGO0JBSRFHDVQ+7tQaRbpzrCVlWAxYw9HbOvHL0bILqpGxY8u2qlm LdB3cblP7vFIJ0OdwqZjNC51ygEEHIf7kb+b2P9QqJghL/sIj8QypRgZaedHuqk6Rw0zN3JGw3a2gzDD6YkEKuwA6XZpTU5D82Lr3dZl4R+5SEntu8MAjKBJ 7dVv6MEV5SMuznQAbc7Sl6u2ZT5UuLAFiXFcAy0VdwE62VcxUNwthpF90XOTd20X
Archived-At: <https://mailarchive.ietf.org/arch/msg/rats/B15ndOFMEsFib35ohEtnhywaYLg>
Subject: Re: [Rats] should Evidence containers be explicit about Personally Identiable Information?
X-BeenThere: rats@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Remote ATtestation procedureS <rats.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rats>, <mailto:rats-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/rats/>
List-Post: <mailto:rats@ietf.org>
List-Help: <mailto:rats-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rats>, <mailto:rats-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 Jul 2020 19:38:47 -0000

What is PII and what is not PII is almost entirely dependent on the end-end use case and who the relying party is.

Illustrative example: The UEID (serial number) of a device is definitely PII when using a web browser to access multiple web sites, but it is not when a router is attesting to the network management center. Even the web browser case is not clear cut. The UEID (serial number) might not be considered PII when accessing a banks web site, because you’ve told the bank to “remember this device” (and the bank knows everything about you anyway).

I don’t think we can have a flag indicating which data is PII in Attestation Evidence/Results. I don’t think we can say that this particular EAT claim is PII and that one is not in any absolute sense.

We can’t assume that the Verifier will always be trusted with PII, because sometimes it is run by the relying party.  

On the other hand, sometimes the Verifier will be a highly trusted privacy proxy. It will receive claims that are not privacy-preserving and strip them out or otherwise anonymize them before sending on to the relying party.

I think at both the architecture and EAT levels, the best we can do is write privacy considerations — things that should be considered for particular deployments. Maybe future IETF standards that are very specific to use cases will be able to be more specific, but that’s for later.

Most of the text in section 11 of the -04 draft seems OK, but I think additional text like this is needed and hopefully addresses Kathleen’s comments.

Every claim in Attestation Evidence and Attestation Results is potentially PII (Personally Identifying Information) depending on the end-end use case of the attestation. Each deployment of attestation must take into account how each claim may or may not be used in a privacy violating manner by the relying parties receiving the attestation.

In cases where the device sending attestation is owned by the relying party, little to no consideration for privacy is needed. In other cases, such as when a mobile phone is used to access a large number of web sites, apps and services, privacy must be considered very thoroughly.

These are some strategies that can be used to address the privacy issue:

* Determine that a particular claim is not privacy violating in the limited context of use. For example, a router sending its serial number to the network management center that owns the router violates no one’s privacy.

* Simply omit the claim. For example, omit the serial number from attestations sent by a phone to web sites it connects to.

* Prompt the user. For example, ask the user if it is OK for a particular web site to access location data.

* Use a privacy proxy service between the device and the relying party to remove or anonymize the privacy violating claims.

Other strategies than these may be used. The selection of strategy is highly dependent on the relying party, end use case and governmental regulation (e.g., GDPR). The selection of strategy may also vary claim-by-claim in a single attestation.


LL