
From nobody Fri Jan  9 13:19:21 2015
Return-Path: <ted.ietf@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 672681A1A6F for <perpass@ietfa.amsl.com>; Fri,  9 Jan 2015 13:19:19 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 4ub1yydoNAVp for <perpass@ietfa.amsl.com>; Fri,  9 Jan 2015 13:19:17 -0800 (PST)
Received: from mail-ie0-x233.google.com (mail-ie0-x233.google.com [IPv6:2607:f8b0:4001:c03::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9D6D71A0097 for <perpass@ietf.org>; Fri,  9 Jan 2015 13:19:17 -0800 (PST)
Received: by mail-ie0-f179.google.com with SMTP id rp18so17186661iec.10 for <perpass@ietf.org>; Fri, 09 Jan 2015 13:19:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=wqxwyBZwhYDYgTp4g/Zqvf6zsqMv6do5LgncWvMpsyU=; b=UsxnZislNt1LGwiZ+hNP9YEtpk2N4ywelyoJ3wL6Aeozyok/2CF9zS8cD7odqMYus3 9Ivz7JYpnVQoZMo0yxrndNbheKlChVQ8hBr23DFLJWikmbo0oRy51YOfLfZ2qJ8HiPLU kLWlMplUoYvhxmCP/tDiPB38CEfMpmJ+YeJT7+D0Uja/VIqUHR10DVAwgKfrerhHxTAp L02qTu922pQA+XXxOO8CtF3mVZ6w9KtTUDb0luO7+pZzfyZUCNJ1RdvzcFyUl4BapH1c +FrgMA8k7zEhBR1srIY6BAkd/SOFa9fVWp/kpGd03Gs2sh2GqqD51js5Hd4Vg2Ts1MHM U34A==
MIME-Version: 1.0
X-Received: by 10.50.138.226 with SMTP id qt2mr4732235igb.1.1420838356865; Fri, 09 Jan 2015 13:19:16 -0800 (PST)
Received: by 10.42.107.145 with HTTP; Fri, 9 Jan 2015 13:19:16 -0800 (PST)
Date: Fri, 9 Jan 2015 13:19:16 -0800
Message-ID: <CA+9kkMC2F5E1gAD5=7QjiYRq3u9bvUtCV65dnegh9oq4TrYzVA@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: "<perpass@ietf.org>" <perpass@ietf.org>
Content-Type: multipart/alternative; boundary=089e0122a2088b589e050c3eb5c2
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/0_bCuqV6HhYfjqImXo7ueBURy4c>
Subject: [perpass] Review request: draft-iab-privsec-confidentiality-threat-01.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 09 Jan 2015 21:19:19 -0000

--089e0122a2088b589e050c3eb5c2
Content-Type: text/plain; charset=UTF-8

The program and authors would appreciate review of
draft-iab-privsec-confidentiality-threat-01.txt (
http://www.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt).
Note that the text on mitigations to these threats has been split into a
second document which is forthcoming.  Reviews can be sent to this list or
the authors.

Thanks,

Ted Hardie

--089e0122a2088b589e050c3eb5c2
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif;font-size:small">The program and authors would appreciate review =
of draft-iab-privsec-confidentiality-threat-01.txt (<a href=3D"http://www.i=
etf.org/id/draft-iab-privsec-confidentiality-threat-01.txt">http://www.ietf=
.org/id/draft-iab-privsec-confidentiality-threat-01.txt</a>).=C2=A0 Note th=
at the text on mitigations to these threats has been split into a second do=
cument which is forthcoming.=C2=A0 Reviews can be sent to this list or the =
authors.<br><br></div><div class=3D"gmail_default" style=3D"font-family:tah=
oma,sans-serif;font-size:small">Thanks,<br><br></div><div class=3D"gmail_de=
fault" style=3D"font-family:tahoma,sans-serif;font-size:small">Ted Hardie <=
br></div></div>

--089e0122a2088b589e050c3eb5c2--


From nobody Fri Jan  9 17:08:59 2015
Return-Path: <derhoermi@gmx.net>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 713F31A1B67 for <perpass@ietfa.amsl.com>; Fri,  9 Jan 2015 17:08:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, FREEMAIL_FROM=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VfrPQSXJj0y8 for <perpass@ietfa.amsl.com>; Fri,  9 Jan 2015 17:08:56 -0800 (PST)
Received: from mout.gmx.net (mout.gmx.net [212.227.17.20]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A9B1E1A1B5F for <perpass@ietf.org>; Fri,  9 Jan 2015 17:08:55 -0800 (PST)
Received: from netb ([82.113.121.97]) by mail.gmx.com (mrgmx102) with ESMTPSA (Nemesis) id 0MP1PX-1Y7G6u3ehb-006RT8; Sat, 10 Jan 2015 02:08:54 +0100
From: Bjoern Hoehrmann <derhoermi@gmx.net>
To: Ted Hardie <ted.ietf@gmail.com>
Date: Sat, 10 Jan 2015 02:08:52 +0100
Message-ID: <vmk0bal411ak2e1n24lv77luoafjitkg7u@hive.bjoern.hoehrmann.de>
References: <CA+9kkMC2F5E1gAD5=7QjiYRq3u9bvUtCV65dnegh9oq4TrYzVA@mail.gmail.com>
In-Reply-To: <CA+9kkMC2F5E1gAD5=7QjiYRq3u9bvUtCV65dnegh9oq4TrYzVA@mail.gmail.com>
X-Mailer: Forte Agent 3.3/32.846
MIME-Version: 1.0
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 8bit
X-Provags-ID: V03:K0:dW/al9zApxQML2QdKxXQXurPI8mefROpunE+Jn9tF1aWDDyz+is U9H0Xk8ssaeyBskQzfiWVkjrNnkKUDaudLOZS2HG6YEokHQrDuZQOK0gFPXU3z0EJqbGXrz p/NOBBTqhfDcJRrC5fSJ7VamXeybPDlzVotjSMJ0sNZ7KLl5VfSnjLUzrxLQ0YvKTXeOdqy 8An10zZxmxrykNvqda0hA==
X-UI-Out-Filterresults: notjunk:1;
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/my_rU1iL6KyAINDcTgyYntX19mo>
Cc: "<perpass@ietf.org>" <perpass@ietf.org>
Subject: Re: [perpass] Review request: draft-iab-privsec-confidentiality-threat-01.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 10 Jan 2015 01:08:58 -0000

* Ted Hardie wrote:
>The program and authors would appreciate review of
>draft-iab-privsec-confidentiality-threat-01.txt (
>http://www.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt).
>Note that the text on mitigations to these threats has been split into a
>second document which is forthcoming.  Reviews can be sent to this list or
>the authors.

Mostly editorial things on sections 1-3:

Typo in Section 1 "attacket".

In Section 2 I think the example for "Infererence" should be replaced by
a much simpler one.

I am not happy with using "Observation" with the specified meaning in
this context. The word usually refers to the act, not the data, and here
it may be easy to confuse it with, say, targeted surveillance as part of
a justice system, perhaps especially for non-native readers. I encourage
trying to find an alternative term.

The definition for "Collaborator" seems to lack "deliberately". It might
be a good idea to strike "(keys or data)" since it does not seem to
clarify anything, and invites misinterpretations (say, keys and data are
bad, but "meta data" is okay).

The definition for "Unwitting Collaborator" as though an "Unwitting
Collaborator" is a "Collaborator". That seems incorrect to me.

I do not think "Key Exfiltration" depends on the presence of a
"collaborator". Same for "Content Exfiltration".

I think Section 3 would benefit from a short preface that explains, as
the section title suggest, this is an "idealised" description, and
explains how this is useful. Right now the section jumps right into
describing something that is extremely implausible without qualifiers,
and many readers might be unfamiliar with such descriptions.

The claim that "The use of encryption to protect confidentiality is
generally enough to prevent direct observation" seems incorrect or at
least misleading to me (it might prevent direct observation of the
unencrypted plaintext, but not all direct observation; that should be
explicit).

Typo "privascy" in 3.2.

Putting "We note with some alarm ..." at the end of a long paragraph
is probably not a good idea as it may easily be missed.

In section 3.3 it's not immediately clear whether in "To illustrate how
capable the attacker is even given its limitations" 'the attacker' is
the idealised attacker introduced at the beginning, or some other one.
The two "even"s make the first (very long) sentence hard to read for me.

In section 3.3.2, given that the document already noted geoip databases,
the reverse-dns example seems more harmful than useful.

Section 3.3.7 should probably note that Wifi MACs have already been
extensively mapped to locations, and I assume similar databases that
map ethernet MACs to user identities also exist.
-- 
Björn Höhrmann · mailto:bjoern@hoehrmann.de · http://bjoern.hoehrmann.de
D-10243 Berlin · PGP Pub. KeyID: 0xA4357E78 · http://www.bjoernsworld.de
 Available for hire in Berlin (early 2015)  · http://www.websitedev.de/ 


From nobody Mon Jan 12 08:51:27 2015
Return-Path: <ted.ietf@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1C01ACD15 for <perpass@ietfa.amsl.com>; Mon, 12 Jan 2015 08:51:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jkFAB7reUCaK for <perpass@ietfa.amsl.com>; Mon, 12 Jan 2015 08:51:13 -0800 (PST)
Received: from mail-ie0-x233.google.com (mail-ie0-x233.google.com [IPv6:2607:f8b0:4001:c03::233]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 026491ACD29 for <perpass@ietf.org>; Mon, 12 Jan 2015 08:49:35 -0800 (PST)
Received: by mail-ie0-f179.google.com with SMTP id rp18so26178864iec.10 for <perpass@ietf.org>; Mon, 12 Jan 2015 08:49:34 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=rUsNVNkyWx7rKMARBjQhThfG8021kCuET/e01e0dyuw=; b=neotL4K1IIYL4GlsWja/s98hZc2PAGT95mmYO6qw+UPJAKHtLiJ3ogLE36wUj+kqGW E+WHqOtqJBa3rvDqerQJQOyipG3JUtInVF5khkRMdoijP1VaWnQX9uyZfd2r1cPVCOvE T77COL8UY/X/nq2u5npcwbRHqLOA8cAB/jMl7lIEdc+OdGO1+360G/x4uSc4xWupJsvT BdkkFh3um7xyGTfBfDhA/0YeiHgWqjNFHYxG7FtkPm6FUrbJzSDoTj343nPEaDowtYb1 ft/jTvRx53NOVrjgAL1gPtBuFS0kopqbvxuNRyv7Y69s8qGwxJ6KSmhcw79tG2T2o7lI eJHg==
MIME-Version: 1.0
X-Received: by 10.50.103.41 with SMTP id ft9mr15882998igb.6.1421081374078; Mon, 12 Jan 2015 08:49:34 -0800 (PST)
Received: by 10.42.107.145 with HTTP; Mon, 12 Jan 2015 08:49:34 -0800 (PST)
In-Reply-To: <vmk0bal411ak2e1n24lv77luoafjitkg7u@hive.bjoern.hoehrmann.de>
References: <CA+9kkMC2F5E1gAD5=7QjiYRq3u9bvUtCV65dnegh9oq4TrYzVA@mail.gmail.com> <vmk0bal411ak2e1n24lv77luoafjitkg7u@hive.bjoern.hoehrmann.de>
Date: Mon, 12 Jan 2015 08:49:34 -0800
Message-ID: <CA+9kkMBsqZC8LdJ6exKFp4dBmOx_XfxnrFJfJGNPieZFEPyJpg@mail.gmail.com>
From: Ted Hardie <ted.ietf@gmail.com>
To: Bjoern Hoehrmann <derhoermi@gmx.net>
Content-Type: multipart/alternative; boundary=047d7b2e127f7fc153050c774a00
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/snmRYQtmxYTkLxHT8Zlj2XUGU7E>
Cc: "<perpass@ietf.org>" <perpass@ietf.org>
Subject: Re: [perpass] Review request: draft-iab-privsec-confidentiality-threat-01.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jan 2015 16:51:20 -0000

--047d7b2e127f7fc153050c774a00
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

Thanks for the review, Bjoern.

Ted

On Fri, Jan 9, 2015 at 5:08 PM, Bjoern Hoehrmann <derhoermi@gmx.net> wrote:

> * Ted Hardie wrote:
> >The program and authors would appreciate review of
> >draft-iab-privsec-confidentiality-threat-01.txt (
> >http://www.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt).
> >Note that the text on mitigations to these threats has been split into a
> >second document which is forthcoming.  Reviews can be sent to this list =
or
> >the authors.
>
> Mostly editorial things on sections 1-3:
>
> Typo in Section 1 "attacket".
>
> In Section 2 I think the example for "Infererence" should be replaced by
> a much simpler one.
>
> I am not happy with using "Observation" with the specified meaning in
> this context. The word usually refers to the act, not the data, and here
> it may be easy to confuse it with, say, targeted surveillance as part of
> a justice system, perhaps especially for non-native readers. I encourage
> trying to find an alternative term.
>
> The definition for "Collaborator" seems to lack "deliberately". It might
> be a good idea to strike "(keys or data)" since it does not seem to
> clarify anything, and invites misinterpretations (say, keys and data are
> bad, but "meta data" is okay).
>
> The definition for "Unwitting Collaborator" as though an "Unwitting
> Collaborator" is a "Collaborator". That seems incorrect to me.
>
> I do not think "Key Exfiltration" depends on the presence of a
> "collaborator". Same for "Content Exfiltration".
>
> I think Section 3 would benefit from a short preface that explains, as
> the section title suggest, this is an "idealised" description, and
> explains how this is useful. Right now the section jumps right into
> describing something that is extremely implausible without qualifiers,
> and many readers might be unfamiliar with such descriptions.
>
> The claim that "The use of encryption to protect confidentiality is
> generally enough to prevent direct observation" seems incorrect or at
> least misleading to me (it might prevent direct observation of the
> unencrypted plaintext, but not all direct observation; that should be
> explicit).
>
> Typo "privascy" in 3.2.
>
> Putting "We note with some alarm ..." at the end of a long paragraph
> is probably not a good idea as it may easily be missed.
>
> In section 3.3 it's not immediately clear whether in "To illustrate how
> capable the attacker is even given its limitations" 'the attacker' is
> the idealised attacker introduced at the beginning, or some other one.
> The two "even"s make the first (very long) sentence hard to read for me.
>
> In section 3.3.2, given that the document already noted geoip databases,
> the reverse-dns example seems more harmful than useful.
>
> Section 3.3.7 should probably note that Wifi MACs have already been
> extensively mapped to locations, and I assume similar databases that
> map ethernet MACs to user identities also exist.
> --
> Bj=C3=B6rn H=C3=B6hrmann =C2=B7 mailto:bjoern@hoehrmann.de =C2=B7 http://=
bjoern.hoehrmann.de
> D-10243 Berlin =C2=B7 PGP Pub. KeyID: 0xA4357E78 =C2=B7 http://www.bjoern=
sworld.de
>  Available for hire in Berlin (early 2015)  =C2=B7 http://www.websitedev.=
de/
>

--047d7b2e127f7fc153050c774a00
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div class=3D"gmail_default" style=3D"font-family:tahoma,s=
ans-serif;font-size:small">Thanks for the review, Bjoern.<br><br>Ted<br></d=
iv></div><div class=3D"gmail_extra"><br><div class=3D"gmail_quote">On Fri, =
Jan 9, 2015 at 5:08 PM, Bjoern Hoehrmann <span dir=3D"ltr">&lt;<a href=3D"m=
ailto:derhoermi@gmx.net" target=3D"_blank">derhoermi@gmx.net</a>&gt;</span>=
 wrote:<br><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex;bor=
der-left:1px #ccc solid;padding-left:1ex"><div class=3D"HOEnZb"><div class=
=3D"h5">* Ted Hardie wrote:<br>
&gt;The program and authors would appreciate review of<br>
&gt;draft-iab-privsec-confidentiality-threat-01.txt (<br>
&gt;<a href=3D"http://www.ietf.org/id/draft-iab-privsec-confidentiality-thr=
eat-01.txt" target=3D"_blank">http://www.ietf.org/id/draft-iab-privsec-conf=
identiality-threat-01.txt</a>).<br>
&gt;Note that the text on mitigations to these threats has been split into =
a<br>
&gt;second document which is forthcoming.=C2=A0 Reviews can be sent to this=
 list or<br>
&gt;the authors.<br>
<br>
</div></div>Mostly editorial things on sections 1-3:<br>
<br>
Typo in Section 1 &quot;attacket&quot;.<br>
<br>
In Section 2 I think the example for &quot;Infererence&quot; should be repl=
aced by<br>
a much simpler one.<br>
<br>
I am not happy with using &quot;Observation&quot; with the specified meanin=
g in<br>
this context. The word usually refers to the act, not the data, and here<br=
>
it may be easy to confuse it with, say, targeted surveillance as part of<br=
>
a justice system, perhaps especially for non-native readers. I encourage<br=
>
trying to find an alternative term.<br>
<br>
The definition for &quot;Collaborator&quot; seems to lack &quot;deliberatel=
y&quot;. It might<br>
be a good idea to strike &quot;(keys or data)&quot; since it does not seem =
to<br>
clarify anything, and invites misinterpretations (say, keys and data are<br=
>
bad, but &quot;meta data&quot; is okay).<br>
<br>
The definition for &quot;Unwitting Collaborator&quot; as though an &quot;Un=
witting<br>
Collaborator&quot; is a &quot;Collaborator&quot;. That seems incorrect to m=
e.<br>
<br>
I do not think &quot;Key Exfiltration&quot; depends on the presence of a<br=
>
&quot;collaborator&quot;. Same for &quot;Content Exfiltration&quot;.<br>
<br>
I think Section 3 would benefit from a short preface that explains, as<br>
the section title suggest, this is an &quot;idealised&quot; description, an=
d<br>
explains how this is useful. Right now the section jumps right into<br>
describing something that is extremely implausible without qualifiers,<br>
and many readers might be unfamiliar with such descriptions.<br>
<br>
The claim that &quot;The use of encryption to protect confidentiality is<br=
>
generally enough to prevent direct observation&quot; seems incorrect or at<=
br>
least misleading to me (it might prevent direct observation of the<br>
unencrypted plaintext, but not all direct observation; that should be<br>
explicit).<br>
<br>
Typo &quot;privascy&quot; in 3.2.<br>
<br>
Putting &quot;We note with some alarm ...&quot; at the end of a long paragr=
aph<br>
is probably not a good idea as it may easily be missed.<br>
<br>
In section 3.3 it&#39;s not immediately clear whether in &quot;To illustrat=
e how<br>
capable the attacker is even given its limitations&quot; &#39;the attacker&=
#39; is<br>
the idealised attacker introduced at the beginning, or some other one.<br>
The two &quot;even&quot;s make the first (very long) sentence hard to read =
for me.<br>
<br>
In section 3.3.2, given that the document already noted geoip databases,<br=
>
the reverse-dns example seems more harmful than useful.<br>
<br>
Section 3.3.7 should probably note that Wifi MACs have already been<br>
extensively mapped to locations, and I assume similar databases that<br>
map ethernet MACs to user identities also exist.<br>
<span class=3D"HOEnZb"><font color=3D"#888888">--<br>
Bj=C3=B6rn H=C3=B6hrmann =C2=B7 mailto:<a href=3D"mailto:bjoern@hoehrmann.d=
e">bjoern@hoehrmann.de</a> =C2=B7 <a href=3D"http://bjoern.hoehrmann.de" ta=
rget=3D"_blank">http://bjoern.hoehrmann.de</a><br>
D-10243 Berlin =C2=B7 PGP Pub. KeyID: 0xA4357E78 =C2=B7 <a href=3D"http://w=
ww.bjoernsworld.de" target=3D"_blank">http://www.bjoernsworld.de</a><br>
=C2=A0Available for hire in Berlin (early 2015)=C2=A0 =C2=B7 <a href=3D"htt=
p://www.websitedev.de/" target=3D"_blank">http://www.websitedev.de/</a><br>
</font></span></blockquote></div><br></div>

--047d7b2e127f7fc153050c774a00--


From nobody Mon Jan 12 13:59:48 2015
Return-Path: <stephen.farrell@cs.tcd.ie>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2866C1A87E6 for <perpass@ietfa.amsl.com>; Mon, 12 Jan 2015 13:59:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.91
X-Spam-Level: 
X-Spam-Status: No, score=-1.91 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oXC_bInqRzj9 for <perpass@ietfa.amsl.com>; Mon, 12 Jan 2015 13:59:43 -0800 (PST)
Received: from mercury.scss.tcd.ie (mercury.scss.tcd.ie [134.226.56.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6A9B1A6F0A for <perpass@ietf.org>; Mon, 12 Jan 2015 13:59:42 -0800 (PST)
Received: from localhost (localhost [127.0.0.1]) by mercury.scss.tcd.ie (Postfix) with ESMTP id 7F140BEDF for <perpass@ietf.org>; Mon, 12 Jan 2015 21:59:40 +0000 (GMT)
X-Virus-Scanned: Debian amavisd-new at scss.tcd.ie
Received: from mercury.scss.tcd.ie ([127.0.0.1]) by localhost (mercury.scss.tcd.ie [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id psc9i5-4dWus for <perpass@ietf.org>; Mon, 12 Jan 2015 21:59:38 +0000 (GMT)
Received: from [10.87.48.73] (unknown [86.41.61.73]) by mercury.scss.tcd.ie (Postfix) with ESMTPSA id 4958ABEDC for <perpass@ietf.org>; Mon, 12 Jan 2015 21:59:38 +0000 (GMT)
Message-ID: <54B443CA.4020505@cs.tcd.ie>
Date: Mon, 12 Jan 2015 21:59:38 +0000
From: Stephen Farrell <stephen.farrell@cs.tcd.ie>
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:31.0) Gecko/20100101 Thunderbird/31.3.0
MIME-Version: 1.0
To: perpass <perpass@ietf.org>
References: <20150112214918.14918.60258.idtracker@ietfa.amsl.com>
In-Reply-To: <20150112214918.14918.60258.idtracker@ietfa.amsl.com>
X-Forwarded-Message-Id: <20150112214918.14918.60258.idtracker@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/yUmL4EOY-Zr9A1m09PRt91IxjRM>
Subject: [perpass] Fwd: [lisp] I-D Action: draft-ietf-lisp-crypto-00.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 12 Jan 2015 21:59:47 -0000

FYI, for those of you interested in LISP and security, I'm
sure Dino would welcome comments

Cheers,
S.

-------- Forwarded Message --------
Subject: [lisp] I-D Action: draft-ietf-lisp-crypto-00.txt
Date: Mon, 12 Jan 2015 13:49:18 -0800
From: internet-drafts@ietf.org
To: i-d-announce@ietf.org
CC: lisp@ietf.org


A New Internet-Draft is available from the on-line Internet-Drafts
directories.
 This draft is a work item of the Locator/ID Separation Protocol Working
Group of the IETF.

        Title           : LISP Data-Plane Confidentiality
        Author          : Dino Farinacci
	Filename        : draft-ietf-lisp-crypto-00.txt
	Pages           : 11
	Date            : 2015-01-12

Abstract:
   This document describes a mechanism for encrypting LISP encapsulated
   traffic.  The design describes how key exchange is achieved using
   existing LISP control-plane mechanisms as well as how to secure the
   LISP data-plane from third-party surveillance attacks.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-lisp-crypto/

There's also a htmlized version available at:
http://tools.ietf.org/html/draft-ietf-lisp-crypto-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/

_______________________________________________
lisp mailing list
lisp@ietf.org
https://www.ietf.org/mailman/listinfo/lisp





From a.mohaisen@gmail.com  Tue Jan 13 10:41:35 2015
Return-Path: <a.mohaisen@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 071F11A90BC for <perpass@ietfa.amsl.com>; Tue, 13 Jan 2015 10:41:35 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id U5bopDZ7uIwm for <perpass@ietfa.amsl.com>; Tue, 13 Jan 2015 10:41:31 -0800 (PST)
Received: from mail-ie0-x234.google.com (mail-ie0-x234.google.com [IPv6:2607:f8b0:4001:c03::234]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 667471A90A5 for <perpass@ietf.org>; Tue, 13 Jan 2015 10:41:31 -0800 (PST)
Received: by mail-ie0-f180.google.com with SMTP id rp18so4434874iec.11 for <perpass@ietf.org>; Tue, 13 Jan 2015 10:41:30 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:cc:content-type;  bh=EKjb6A3JDWVhArBqHjR35x6Lg4Aio6e2Rb5tyYV1wic=; b=OmQKOy6oaaVAw50TXPAzms53mSAly1qcPHOfpW88LJexbiXOZv+1v6/75sLz4u2hE2 dRW1PnI5ZSujos9KwLgHTlgfwfSBI9g+0dOGdxtmONXd+AGCX7CXlccBABG0HwwoQFUq /xasdanrABdaLFpzVrWbH+0Xeifkzf9vNkuBJzYrkvF2YtTLV+QzmLw6veRSkCCj3Tuc VUl/xDHty/yBISEbu/OOfbxa881u65Y9GXI5/DCXDfnj5NPR7JtZJHmYL7cSwlINYKLN knhCmp2M0hBn+NF+RGTVpJYo9kvpQNenF5lIvlVF0+4DybqY8IMOntjBEOouWgLeKjcI 75iQ==
MIME-Version: 1.0
X-Received: by 10.50.6.104 with SMTP id z8mr1000960igz.42.1421174490599; Tue, 13 Jan 2015 10:41:30 -0800 (PST)
Received: by 10.50.51.196 with HTTP; Tue, 13 Jan 2015 10:41:30 -0800 (PST)
Date: Tue, 13 Jan 2015 13:41:30 -0500
Message-ID: <CAMjhxSfZQRs0+LSqmTnF+G7ng0iYwBSoEkowX_WXUE6HHvi+mQ@mail.gmail.com>
From: Aziz Mohaisen <a.mohaisen@gmail.com>
To: ted.ietf@gmail.com
Content-Type: multipart/alternative; boundary=047d7bdca448ad183d050c8cf879
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/TsY39KFMoSdFF-cO2Mvx_RZiGkI>
X-Mailman-Approved-At: Tue, 13 Jan 2015 10:52:14 -0800
Cc: perpass@ietf.org
Subject: Re: [perpass] Review request: draft-iab-privsec-confidentiality-threat-01.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jan 2015 18:42:20 -0000

--047d7bdca448ad183d050c8cf879
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

The document provides an interesting view of the threat posed by pervasive
monitoring and tries to formalize a threat model around the problem.
However, the model still lacks rigor, and examples mentioned to highlight
the idealized pervasive passive adversary (as defined in the document) seem
to share some elements of an active attack, suggesting that this perhaps
should be called a =E2=80=9Chybrid adversary=E2=80=9D. Most of my comments =
in the feedback
below are on this point, and cite parts of the document where this issue is
clear. This feedback also provides some typos that need be fixed (towards
the end of the feedback).

I hope these comments/suggestions help.

Aziz


page 2:
Inference should be specified to be indirect, and not just any information
obtained through analysis (e.g., summary)

Page3:
- The first paragraph in section 3.1 does not take into account the effort
in DPRIVE WG, and its charter that provides a requirement of DNS
confidentiality, with multiple suggested techniques. While mentioned later
in the document, the attack on the said example of DNS when such efforts
are utilized is only limited in the given settings.

- (Page 2-3) The word passive is somewhat misleading. Capabilities listed
under the passive pervasive attack include elements where a system is
compromised; surely compromising a system is an active act and not passive.
The description of the =E2=80=9CIdealized Pervasive Passive Attacker=E2=80=
=9D is a bit
confusing; on the one hand, it is understood that the attacker does not
actively seek to gain access to users data =E2=80=94 by the virtue of being
passive. On the other hand, at the same time the attacker can observe data
in intermediaries by compromising those intermediaries =E2=80=94 e.g., stat=
ed in
the last paragraph on page 3. Even when a vulnerability exists in such
intermediaries, the adversary would have to actively use the vulnerability
=E2=80=94 by compromise, as stated towards the end of page 3 =E2=80=94 in o=
rder to be able
to observe contents in the intermediary. To this end, the definition seems
to mix both active and passive attackers.

Page 6:
- The last point in section 3.3.2. does not seem to follow the
aforementioned attacker model. [In many jurisdictions, Internet Service
Providers (ISPs) are required to provide identification on a case by case
basis of the "owner" of a specific IP address for law enforcement
purposes]  -> this does not seem (to me) to imply a passive monitoring
attack. If you get the cooperation of an ISP, that is no longer a passive
attack.

Page 9:
- Most of those attacks include a flavor of active attacks. Perhaps,
instead of creating a confusion around the concept of pervasive (passive)
attacks, naming them as such (active, hybrid, etc) would be a better idea.
The explanation towards the end of the page concerning passive attacks is
ad-hoc, and misses the point that the main feature of passive attacks is
that they are non-evasive.


Page 12:
- [These attacks all rely on a collaborator providing the attacker with
some information, either keys or data.  These attacks have not
traditionally been considered in security analyses of protocols, since they
happen outside of the protocol.] -> I am not sure if you mean those attacks
aren=E2=80=99t traditionally considered in the IETF community or the commun=
ity at
large. This statement should be removed if it means the community at large
(including academic), since they are widely studied in the analysis of
protocols. Related terms covering some of those attacks include:

    - partial key exposure
    - related key attacks
    - active corruption (related to secure multiparty computation; e.g.,
Hirt and Maurer from Crypto 2001)

These are heavily studied in the context of side-channel and timing attacks
(e.g., RSA crypto-analysis). Maybe the IETF community needs to have more
exposure to those attacks, but they are already studied previously.

A secondary point: while the attacks mentioned on page 12 concern a
mechanism, what matters from a security/privacy analysis point of view is
the state of the matter upon the exposure of the keys/data/etc. (or parts
of them), and how that can be used to launch an attack on the security of a
system/protocol or the privacy of a user.


Typos and editorial:
page 1:
- attacket -> attacker
page 2:
- To build a thread model -> threat model
page 4:
- developed map IP addresses ->  developed to map IP addresses
- privascy reasons ->  privacy reasons

page 5:
- a good sampling -> a good sample?

page 8:
- thorugh -> through?

page 10:
- his analysis sometimes -> This analysis sometimes

page 14:
- receiving it -> receive it?
- as an transmitter .. -> as a transmitter as well as [a] receiver
- require processing hardware to that can operate at line speed -> require
processing hardware that can operate at line speed
- the attacker need only interact -? the attacker needs only to interact

page 15:
- interactions may real -> interactions are may be real



From: Ted Hardie <ted.ietf@gmail.com>
Date: 9 January 2015 at 16:19
Subject: [perpass] Review request:
draft-iab-privsec-confidentiality-threat-01.txt
To: "<perpass@ietf.org>" <perpass@ietf.org>


The program and authors would appreciate review of
draft-iab-privsec-confidentiality-threat-01.txt (
http://www.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt).
Note that the text on mitigations to these threats has been split into a
second document which is forthcoming.  Reviews can be sent to this list or
the authors.

Thanks,

Ted Hardie

--047d7bdca448ad183d050c8cf879
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div><div>The document provides an interesting view of the=
 threat posed by pervasive monitoring and tries to formalize a threat model=
 around the problem. However, the model still lacks rigor, and examples men=
tioned to highlight the idealized pervasive passive adversary (as defined i=
n the document) seem to share some elements of an active attack, suggesting=
 that this perhaps should be called a =E2=80=9Chybrid adversary=E2=80=9D. M=
ost of my comments in the feedback below are on this point, and cite parts =
of the document where this issue is clear. This feedback also provides some=
 typos that need be fixed (towards the end of the feedback). <br><br>I hope=
 these comments/suggestions help.<br></div><br></div>Aziz<br><br><div><div>=
<br>page 2: <br>Inference should be specified to be indirect, and not just =
any information obtained through analysis (e.g., summary)<br><br>Page3:<br>=
- The first paragraph in section 3.1 does not take into account the effort =
in DPRIVE WG, and its charter that provides a requirement of DNS confidenti=
ality, with multiple suggested techniques. While mentioned later in the doc=
ument, the attack on the said example of DNS when such efforts are utilized=
 is only limited in the given settings. <br><br>- (Page 2-3) The word passi=
ve is somewhat misleading. Capabilities listed under the passive pervasive =
attack include elements where a system is compromised; surely compromising =
a system is an active act and not passive. The description of the =E2=80=9C=
Idealized Pervasive Passive Attacker=E2=80=9D is a bit confusing; on the on=
e hand, it is understood that the attacker does not actively seek to gain a=
ccess to users data =E2=80=94 by the virtue of being passive. On the other =
hand, at the same time the attacker can observe data in intermediaries by c=
ompromising those intermediaries =E2=80=94 e.g., stated in the last paragra=
ph on page 3. Even when a vulnerability exists in such intermediaries, the =
adversary would have to actively use the vulnerability =E2=80=94 by comprom=
ise, as stated towards the end of page 3 =E2=80=94 in order to be able to o=
bserve contents in the intermediary. To this end, the definition seems to m=
ix both active and passive attackers. <br><br>Page 6: <br>- The last point =
in section 3.3.2. does not seem to follow the aforementioned attacker model=
. [In many jurisdictions, Internet Service Providers (ISPs) are required to=
 provide identification on a case by case basis of the &quot;owner&quot; of=
 a specific IP address for law enforcement purposes]=C2=A0 -&gt; this does =
not seem (to me) to imply a passive monitoring attack. If you get the coope=
ration of an ISP, that is no longer a passive attack. <br><br>Page 9:<br>- =
Most of those attacks include a flavor of active attacks. Perhaps, instead =
of creating a confusion around the concept of pervasive (passive) attacks, =
naming them as such (active, hybrid, etc) would be a better idea. The expla=
nation towards the end of the page concerning passive attacks is ad-hoc, an=
d misses the point that the main feature of passive attacks is that they ar=
e non-evasive. <br><br><br>Page 12:<br>- [These attacks all rely on a colla=
borator providing the attacker with some information, either keys or data.=
=C2=A0 These attacks have not traditionally been considered in security ana=
lyses of protocols, since they happen outside of the protocol.] -&gt; I am =
not sure if you mean those attacks aren=E2=80=99t traditionally considered =
in the IETF community or the community at large. This statement should be r=
emoved if it means the community at large (including academic), since they =
are widely studied in the analysis of protocols. Related terms covering som=
e of those attacks include: <br><br>=C2=A0=C2=A0 =C2=A0- partial key exposu=
re<br>=C2=A0=C2=A0 =C2=A0- related key attacks<br>=C2=A0=C2=A0 =C2=A0- acti=
ve corruption (related to secure multiparty computation; e.g., Hirt and Mau=
rer from Crypto 2001)<br><br>These are heavily studied in the context of si=
de-channel and timing attacks (e.g., RSA crypto-analysis). Maybe the IETF c=
ommunity needs to have more exposure to those attacks, but they are already=
 studied previously. <br><br>A secondary point: while the attacks mentioned=
 on page 12 concern a mechanism, what matters from a security/privacy analy=
sis point of view is the state of the matter upon the exposure of the keys/=
data/etc. (or parts of them), and how that can be used to launch an attack =
on the security of a system/protocol or the privacy of a user.<br><br><br>T=
ypos and editorial:<br>page 1: <br>- attacket -&gt; attacker<br>page 2: <br=
>- To build a thread model -&gt; threat model<br>page 4: =C2=A0<br>- develo=
ped map IP addresses -&gt;=C2=A0 developed to map IP addresses<br>- privasc=
y reasons -&gt;=C2=A0 privacy reasons<br><br>page 5: <br>- a good sampling =
-&gt; a good sample?<br><br>page 8:<br>- thorugh -&gt; through?<br><br>page=
 10:<br>- his analysis sometimes -&gt; This analysis sometimes<br><br>page =
14:<br>- receiving it -&gt; receive it?<br>- as an transmitter .. -&gt; as =
a transmitter as well as [a] receiver<br>- require processing hardware to t=
hat can operate at line speed -&gt; require processing hardware that can op=
erate at line speed<br>- the attacker need only interact -? the attacker ne=
eds only to interact<br><br>page 15:<br>- interactions may real -&gt; inter=
actions are may be real<br><br><br><br>From: Ted Hardie &lt;<a href=3D"mail=
to:ted.ietf@gmail.com">ted.ietf@gmail.com</a>&gt;<br>Date: 9 January 2015 a=
t 16:19<br>Subject: [perpass] Review request: draft-iab-privsec-confidentia=
lity-threat-01.txt<br>To: &quot;&lt;<a href=3D"mailto:perpass@ietf.org">per=
pass@ietf.org</a>&gt;&quot; &lt;<a href=3D"mailto:perpass@ietf.org">perpass=
@ietf.org</a>&gt;<br><br><br>The program and authors would appreciate revie=
w of draft-iab-privsec-confidentiality-threat-01.txt (<a href=3D"http://www=
.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt">http://www.ie=
tf.org/id/draft-iab-privsec-confidentiality-threat-01.txt</a>).=C2=A0 Note =
that the text on mitigations to these threats has been split into a second =
document which is forthcoming.=C2=A0 Reviews can be sent to this list or th=
e authors.<br><br>Thanks,<br><br>Ted Hardie <br><br><br></div></div></div>

--047d7bdca448ad183d050c8cf879--


From nobody Tue Jan 13 12:47:33 2015
Return-Path: <a.mohaisen@gmail.com>
X-Original-To: perpass@ietfa.amsl.com
Delivered-To: perpass@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B1AA51ACF03 for <perpass@ietfa.amsl.com>; Tue, 13 Jan 2015 12:47:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dWGZtGqSyfTR for <perpass@ietfa.amsl.com>; Tue, 13 Jan 2015 12:47:25 -0800 (PST)
Received: from mail-ig0-x231.google.com (mail-ig0-x231.google.com [IPv6:2607:f8b0:4001:c05::231]) (using TLSv1 with cipher ECDHE-RSA-RC4-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 532161ACEF9 for <perpass@ietf.org>; Tue, 13 Jan 2015 12:47:25 -0800 (PST)
Received: by mail-ig0-f177.google.com with SMTP id z20so5358444igj.4 for <perpass@ietf.org>; Tue, 13 Jan 2015 12:47:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20120113;  h=mime-version:date:message-id:subject:from:to:content-type; bh=hWOOtu0sXn75ugEdhQKBXWEblBk1PCWRJb/l9bFzfis=; b=qsF4MgjFfOiyEtWeZMzyDTUpUssBnmBFFnTOiZt8bKcfOkej8jV+5RL+SW3lh+wFhD W1CisciKsjuFs0y3KgXRxK+1TwLhY+E5Wt988yUyYJTwXvRbPYLj7GfA6ZkjJYHHQT3t BQfWK1PFbjCaSF3otcSwNBYr7icm/QXHJh1b5wGI7fKEk6Db+G8ai8tPhH/bBPZrHGeQ kZ++cANbbya3QLXby4hELytEHIkNnqhuAPIDm/1ALrdrk+sbe1mQ1M5WZVWuCAIqg9Rg C8JJUSemeOR1vVIJUD2wYLTVdKAGaN2sV1LOhsVYqW/ABi/JCUEqtmoeE+omFZFBZTOc 7RLA==
MIME-Version: 1.0
X-Received: by 10.107.160.135 with SMTP id j129mr255316ioe.91.1421182043616; Tue, 13 Jan 2015 12:47:23 -0800 (PST)
Received: by 10.50.51.196 with HTTP; Tue, 13 Jan 2015 12:47:23 -0800 (PST)
Date: Tue, 13 Jan 2015 15:47:23 -0500
Message-ID: <CAMjhxSeZBysO7dkiuwqJWaDeJRfx3G2Rs1mjpUsdANhdt9r9eA@mail.gmail.com>
From: Aziz Mohaisen <a.mohaisen@gmail.com>
To: Ted Hardie <ted.ietf@gmail.com>, perpass@ietf.org
Content-Type: multipart/alternative; boundary=001a1140ef02defcf6050c8ebaee
Archived-At: <http://mailarchive.ietf.org/arch/msg/perpass/fUS4K7rmTMC0dfAixH-C0KYc4lU>
Subject: Re: [perpass] Review request: draft-iab-privsec-confidentiality-threat-01.txt
X-BeenThere: perpass@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: "The perpass list is for IETF discussion of pervasive monitoring. " <perpass.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/perpass>, <mailto:perpass-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/perpass/>
List-Post: <mailto:perpass@ietf.org>
List-Help: <mailto:perpass-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/perpass>, <mailto:perpass-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jan 2015 20:47:31 -0000

--001a1140ef02defcf6050c8ebaee
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

The document provides an interesting view of the threat posed by pervasive
monitoring and tries to formalize a threat model around the problem.
However, the model still lacks rigor, and examples mentioned to highlight
the idealized pervasive passive adversary (as defined in the document) seem
to share some elements of an active attack, suggesting that this perhaps
should be called a =E2=80=9Chybrid adversary=E2=80=9D. Most of my comments =
in the feedback
below are on this point, and cite parts of the document where this issue is
clear. This feedback also provides some typos that need be fixed (towards
the end of the feedback).

I hope these comments/suggestions help.

Aziz


page 2:
Inference should be specified to be indirect, and not just any information
obtained through analysis (e.g., summary)

Page3:
- The first paragraph in section 3.1 does not take into account the effort
in DPRIVE WG, and its charter that provides a requirement of DNS
confidentiality, with multiple suggested techniques. While mentioned later
in the document, the attack on the said example of DNS when such efforts
are utilized is only limited in the given settings.

- (Page 2-3) The word passive is somewhat misleading. Capabilities listed
under the passive pervasive attack include elements where a system is
compromised; surely compromising a system is an active act and not passive.
The description of the =E2=80=9CIdealized Pervasive Passive Attacker=E2=80=
=9D is a bit
confusing; on the one hand, it is understood that the attacker does not
actively seek to gain access to users data =E2=80=94 by the virtue of being
passive. On the other hand, at the same time the attacker can observe data
in intermediaries by compromising those intermediaries =E2=80=94 e.g., stat=
ed in
the last paragraph on page 3. Even when a vulnerability exists in such
intermediaries, the adversary would have to actively use the vulnerability
=E2=80=94 by compromise, as stated towards the end of page 3 =E2=80=94 in o=
rder to be able
to observe contents in the intermediary. To this end, the definition seems
to mix both active and passive attackers.

Page 6:
- The last point in section 3.3.2. does not seem to follow the
aforementioned attacker model. [In many jurisdictions, Internet Service
Providers (ISPs) are required to provide identification on a case by case
basis of the "owner" of a specific IP address for law enforcement
purposes]  -> this does not seem (to me) to imply a passive monitoring
attack. If you get the cooperation of an ISP, that is no longer a passive
attack.

Page 9:
- Most of those attacks include a flavor of active attacks. Perhaps,
instead of creating a confusion around the concept of pervasive (passive)
attacks, naming them as such (active, hybrid, etc) would be a better idea.
The explanation towards the end of the page concerning passive attacks is
ad-hoc, and misses the point that the main feature of passive attacks is
that they are non-evasive.


Page 12:
- [These attacks all rely on a collaborator providing the attacker with
some information, either keys or data.  These attacks have not
traditionally been considered in security analyses of protocols, since they
happen outside of the protocol.] -> I am not sure if you mean those attacks
aren=E2=80=99t traditionally considered in the IETF community or the commun=
ity at
large. This statement should be removed if it means the community at large
(including academic), since they are widely studied in the analysis of
protocols. Related terms covering some of those attacks include:

    - partial key exposure
    - related key attacks
    - active corruption (related to secure multiparty computation; e.g.,
Hirt and Maurer from Crypto 2001)

These are heavily studied in the context of side-channel and timing attacks
(e.g., RSA crypto-analysis). Maybe the IETF community needs to have more
exposure to those attacks, but they are already studied previously.

A secondary point: while the attacks mentioned on page 12 concern a
mechanism, what matters from a security/privacy analysis point of view is
the state of the matter upon the exposure of the keys/data/etc. (or parts
of them), and how that can be used to launch an attack on the security of a
system/protocol or the privacy of a user.


Typos and editorial:
page 1:
- attacket -> attacker
page 2:
- To build a thread model -> threat model
page 4:
- developed map IP addresses ->  developed to map IP addresses
- privascy reasons ->  privacy reasons

page 5:
- a good sampling -> a good sample?

page 8:
- thorugh -> through?

page 10:
- his analysis sometimes -> This analysis sometimes

page 14:
- receiving it -> receive it?
- as an transmitter .. -> as a transmitter as well as [a] receiver
- require processing hardware to that can operate at line speed -> require
processing hardware that can operate at line speed
- the attacker need only interact -? the attacker needs only to interact

page 15:
- interactions may real -> interactions are may be real



From: Ted Hardie <ted.ietf@gmail.com>
Date: 9 January 2015 at 16:19
Subject: [perpass] Review request:
draft-iab-privsec-confidentiality-threat-01.txt
To: "<perpass@ietf.org>" <perpass@ietf.org>


The program and authors would appreciate review of
draft-iab-privsec-confidentiality-threat-01.txt (
http://www.ietf.org/id/draft-iab-privsec-confidentiality-threat-01.txt).
Note that the text on mitigations to these threats has been split into a
second document which is forthcoming.  Reviews can be sent to this list or
the authors.

Thanks,

Ted Hardie

--001a1140ef02defcf6050c8ebaee
Content-Type: text/html; charset=UTF-8
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><br><div class=3D"gmail_quote"><div dir=3D"ltr"><div><div>=
The document provides an interesting view of the threat posed by pervasive =
monitoring and tries to formalize a threat model around the problem. Howeve=
r, the model still lacks rigor, and examples mentioned to highlight the ide=
alized pervasive passive adversary (as defined in the document) seem to sha=
re some elements of an active attack, suggesting that this perhaps should b=
e called a =E2=80=9Chybrid adversary=E2=80=9D. Most of my comments in the f=
eedback below are on this point, and cite parts of the document where this =
issue is clear. This feedback also provides some typos that need be fixed (=
towards the end of the feedback). <br><br>I hope these comments/suggestions=
 help.<br></div><br></div>Aziz<br><br><div><div><br>page 2: <br>Inference s=
hould be specified to be indirect, and not just any information obtained th=
rough analysis (e.g., summary)<br><br>Page3:<br>- The first paragraph in se=
ction 3.1 does not take into account the effort in DPRIVE WG, and its chart=
er that provides a requirement of DNS confidentiality, with multiple sugges=
ted techniques. While mentioned later in the document, the attack on the sa=
id example of DNS when such efforts are utilized is only limited in the giv=
en settings. <br><br>- (Page 2-3) The word passive is somewhat misleading. =
Capabilities listed under the passive pervasive attack include elements whe=
re a system is compromised; surely compromising a system is an active act a=
nd not passive. The description of the =E2=80=9CIdealized Pervasive Passive=
 Attacker=E2=80=9D is a bit confusing; on the one hand, it is understood th=
at the attacker does not actively seek to gain access to users data =E2=80=
=94 by the virtue of being passive. On the other hand, at the same time the=
 attacker can observe data in intermediaries by compromising those intermed=
iaries =E2=80=94 e.g., stated in the last paragraph on page 3. Even when a =
vulnerability exists in such intermediaries, the adversary would have to ac=
tively use the vulnerability =E2=80=94 by compromise, as stated towards the=
 end of page 3 =E2=80=94 in order to be able to observe contents in the int=
ermediary. To this end, the definition seems to mix both active and passive=
 attackers. <br><br>Page 6: <br>- The last point in section 3.3.2. does not=
 seem to follow the aforementioned attacker model. [In many jurisdictions, =
Internet Service Providers (ISPs) are required to provide identification on=
 a case by case basis of the &quot;owner&quot; of a specific IP address for=
 law enforcement purposes]=C2=A0 -&gt; this does not seem (to me) to imply =
a passive monitoring attack. If you get the cooperation of an ISP, that is =
no longer a passive attack. <br><br>Page 9:<br>- Most of those attacks incl=
ude a flavor of active attacks. Perhaps, instead of creating a confusion ar=
ound the concept of pervasive (passive) attacks, naming them as such (activ=
e, hybrid, etc) would be a better idea. The explanation towards the end of =
the page concerning passive attacks is ad-hoc, and misses the point that th=
e main feature of passive attacks is that they are non-evasive. <br><br><br=
>Page 12:<br>- [These attacks all rely on a collaborator providing the atta=
cker with some information, either keys or data.=C2=A0 These attacks have n=
ot traditionally been considered in security analyses of protocols, since t=
hey happen outside of the protocol.] -&gt; I am not sure if you mean those =
attacks aren=E2=80=99t traditionally considered in the IETF community or th=
e community at large. This statement should be removed if it means the comm=
unity at large (including academic), since they are widely studied in the a=
nalysis of protocols. Related terms covering some of those attacks include:=
 <br><br>=C2=A0=C2=A0 =C2=A0- partial key exposure<br>=C2=A0=C2=A0 =C2=A0- =
related key attacks<br>=C2=A0=C2=A0 =C2=A0- active corruption (related to s=
ecure multiparty computation; e.g., Hirt and Maurer from Crypto 2001)<br><b=
r>These are heavily studied in the context of side-channel and timing attac=
ks (e.g., RSA crypto-analysis). Maybe the IETF community needs to have more=
 exposure to those attacks, but they are already studied previously. <br><b=
r>A secondary point: while the attacks mentioned on page 12 concern a mecha=
nism, what matters from a security/privacy analysis point of view is the st=
ate of the matter upon the exposure of the keys/data/etc. (or parts of them=
), and how that can be used to launch an attack on the security of a system=
/protocol or the privacy of a user.<br><br><br>Typos and editorial:<br>page=
 1: <br>- attacket -&gt; attacker<br>page 2: <br>- To build a thread model =
-&gt; threat model<br>page 4: =C2=A0<br>- developed map IP addresses -&gt;=
=C2=A0 developed to map IP addresses<br>- privascy reasons -&gt;=C2=A0 priv=
acy reasons<br><br>page 5: <br>- a good sampling -&gt; a good sample?<br><b=
r>page 8:<br>- thorugh -&gt; through?<br><br>page 10:<br>- his analysis som=
etimes -&gt; This analysis sometimes<br><br>page 14:<br>- receiving it -&gt=
; receive it?<br>- as an transmitter .. -&gt; as a transmitter as well as [=
a] receiver<br>- require processing hardware to that can operate at line sp=
eed -&gt; require processing hardware that can operate at line speed<br>- t=
he attacker need only interact -? the attacker needs only to interact<br><b=
r>page 15:<br>- interactions may real -&gt; interactions are may be real<br=
><br><br><br>From: Ted Hardie &lt;<a href=3D"mailto:ted.ietf@gmail.com" tar=
get=3D"_blank">ted.ietf@gmail.com</a>&gt;<br>Date: 9 January 2015 at 16:19<=
br>Subject: [perpass] Review request: draft-iab-privsec-confidentiality-thr=
eat-01.txt<br>To: &quot;&lt;<a href=3D"mailto:perpass@ietf.org" target=3D"_=
blank">perpass@ietf.org</a>&gt;&quot; &lt;<a href=3D"mailto:perpass@ietf.or=
g" target=3D"_blank">perpass@ietf.org</a>&gt;<br><br><br>The program and au=
thors would appreciate review of draft-iab-privsec-confidentiality-threat-0=
1.txt (<a href=3D"http://www.ietf.org/id/draft-iab-privsec-confidentiality-=
threat-01.txt" target=3D"_blank">http://www.ietf.org/id/draft-iab-privsec-c=
onfidentiality-threat-01.txt</a>).=C2=A0 Note that the text on mitigations =
to these threats has been split into a second document which is forthcoming=
.=C2=A0 Reviews can be sent to this list or the authors.<br><br>Thanks,<br>=
<br>Ted Hardie <br><br><br></div></div></div>
</div><br></div>

--001a1140ef02defcf6050c8ebaee--

