Re: [VIPR] VIPR privacy issue

Marc Petit-Huguenin <petithug@acm.org> Fri, 27 January 2012 15:19 UTC

Return-Path: <petithug@acm.org>
X-Original-To: vipr@ietfa.amsl.com
Delivered-To: vipr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 418F721F8601 for <vipr@ietfa.amsl.com>; Fri, 27 Jan 2012 07:19:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.235
X-Spam-Level:
X-Spam-Status: No, score=-102.235 tagged_above=-999 required=5 tests=[AWL=0.365, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c+TD1XPe8V0O for <vipr@ietfa.amsl.com>; Fri, 27 Jan 2012 07:19:31 -0800 (PST)
Received: from implementers.org (implementers.org [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with ESMTP id 1E6E021F85E0 for <vipr@ietf.org>; Fri, 27 Jan 2012 07:19:31 -0800 (PST)
Received: from [IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08] (shalmaneser.org [IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org" (verified OK)) by implementers.org (Postfix) with ESMTPS id 1CBB320143; Fri, 27 Jan 2012 15:05:05 +0000 (UTC)
Message-ID: <4F22C07D.2090809@acm.org>
Date: Fri, 27 Jan 2012 07:19:25 -0800
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:8.0) Gecko/20120104 Icedove/8.0
MIME-Version: 1.0
To: "Richard L. Barnes" <rbarnes@bbn.com>
References: <4F1F1A42.1030201@acm.org> <9734F726-C0A8-42D6-87A4-65535D5F3E80@bbn.com> <4F217CC9.4080802@acm.org> <50D0BC87-EC6C-401E-A2F9-A05AC60D5EF0@bbn.com> <4F2183D0.3070809@acm.org> <373FB643-AE7A-473C-A7AB-09F9A9E7093B@bbn.com> <4F21A121.10403@acm.org> <5466D9E6-3859-41A7-9A54-D23DC6D775C6@iii.ca> <E9DCDEA3-5BDC-41E6-B2BE-606E4CCE4F1B@bbn.com>
In-Reply-To: <E9DCDEA3-5BDC-41E6-B2BE-606E4CCE4F1B@bbn.com>
X-Enigmail-Version: 1.3.4
X-Enigmail-Draft-Status: 513
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: 7bit
Cc: "vipr@ietf.org" <vipr@ietf.org>, Cullen Jennings <fluffy@iii.ca>
Subject: Re: [VIPR] VIPR privacy issue
X-BeenThere: vipr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Verification Involving PSTN Reachability working group <vipr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vipr>, <mailto:vipr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vipr>
List-Post: <mailto:vipr@ietf.org>
List-Help: <mailto:vipr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vipr>, <mailto:vipr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 27 Jan 2012 15:19:32 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

On 01/27/2012 07:08 AM, Richard L. Barnes wrote:
> <hat type="geopriv"/>
> 
> Could we please distinguish between "location privacy" and "IP address 
> privacy"?  They are related, but distinct concepts.

Yeah, my mistake.  I thought that Cullen was responding to my concern about IP
address privacy in his email to p2psip.

This said, I think that adding one hop to hide the IP address is not enough,
and I believe that onion routing is the way to go to solve the IP address
privacy - which may or may not also solve the location privacy problem.

The interesting part is that business goals are, in this particular case,
aligned with privacy advocates.

In any case, even if Cullen was talking about something different, I do not
think that the dates he provided are wrong.

> 
> 
> 
> On Jan 26, 2012, at 7:28 PM, Cullen Jennings wrote:
> 
>> 
>> On Jan 26, 2012, at 11:53 AM, Marc Petit-Huguenin wrote:
>> 
>>> Cullen's email in P2PSIP was unambiguous in saying that doing this
>>> will push VIPR to 2015/2020.
>> 
>> That is not at all what I said. The 2020 was a date where I think we
>> might be possible to have a location privacy solution. As folks may
>> recall from the BOFs when P2PSIP was formed, Cisco had expressed that one
>> of these cases it was interested in was when the communications were not
>> at all anonymous but the location needed to be. The example used as Vice
>> President of the US during an emergency may be moved to a location that
>> is kept very secret but they need to communicate security and with
>> authentication to a large number of people. Todays internet protocols
>> don't offer much in the form of location privacy - with the possible
>> exception of TOR. Some person with General in their title even showed up
>> at Vancouver and Prague IETFs. When P2PSIP got chartered, location
>> privacy got drooped out because it was viewed as it would just be too
>> much to solve. I think I argued for doing location privacy at the time
>> but I was wrong - it clearly would have been too much to do in the first
>> version.
>> 
>> However, I still hope that we might have a standards based location
>> privacy system by 2020 but others think it is better to do this type of
>> thing just a a proprietary system so who knows.



- -- 
Marc Petit-Huguenin
Personal email: marc@petit-huguenin.org
Professional email: petithug@acm.org
Blog: http://blog.marc.petit-huguenin.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)
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=YLG2
-----END PGP SIGNATURE-----