+ All Categories
Home > Documents > Designing Privacy into Internet Protocols IAB Privacy Program

Designing Privacy into Internet Protocols IAB Privacy Program

Date post: 24-Feb-2016
Category:
Upload: truly
View: 24 times
Download: 0 times
Share this document with a friend
Description:
Designing Privacy into Internet Protocols IAB Privacy Program. Why are we here?. Security as an IETF design consideration (RFC 1543, 2223, 3552, 3365, …) - PowerPoint PPT Presentation
Popular Tags:
28
Designing Privacy into Internet Protocols IAB Privacy Program
Transcript
Page 1: Designing Privacy into  Internet Protocols IAB Privacy Program

Designing Privacy into Internet ProtocolsIAB Privacy Program

Page 2: Designing Privacy into  Internet Protocols IAB Privacy Program

2

Why are we here?• Security as an IETF design consideration

(RFC 1543, 2223, 3552, 3365, …)– Realistically cannot design and standardize a

new protocol without confidentiality, authentication, integrity, etc. protections or strong story for why not.

• RFC 6973 extends these considerations to privacy and formalizes them.

• Today’s goal:– Walk out with some idea of how to incorporation

privacy considerations into protocol design and motivation to learn more.

Page 3: Designing Privacy into  Internet Protocols IAB Privacy Program

3

Scope• Narrow: focused on individuals.• Broad: any information relating to an individual

who can be identified, directly or indirectly, may be relevant.

• Limits to what can be addressed in protocol design (vs. deployment and operation).

• No explicit prohibitions or requirements.• Distinction between (negative) defending against

exploits and (positive) building privacy tools.• Discussion without reference to any particular

legal framework.

Page 4: Designing Privacy into  Internet Protocols IAB Privacy Program

4

Disclaimers• Nature of communicating is that you reveal

some data. Communicating without revealing anything at all is very difficult.

• Adding privacy or security protections in one area can reduce privacy in others.

• Remember that very few perfect solutions exist.

Page 5: Designing Privacy into  Internet Protocols IAB Privacy Program

5

Agenda

ThreatsThreatMitigation

GuidelinesComm.Model

Page 6: Designing Privacy into  Internet Protocols IAB Privacy Program

6

Communication Models

Initiator RecipientIntermediaries

Enablers

SIP UA SIP Proxy SIP UAExample:

Observer Observer Observer

Page 7: Designing Privacy into  Internet Protocols IAB Privacy Program

7

ThreatsThreatMitigation

GuidelinesComm.Model

Page 8: Designing Privacy into  Internet Protocols IAB Privacy Program

8

Privacy Threats• Correlation• Identification• Secondary use• Disclosure• Exclusion• Surveillance• Stored data compromise• Intrusion• Misattribution

} Should be familiar from

security

Page 9: Designing Privacy into  Internet Protocols IAB Privacy Program

9

Privacy Threats (today’s sample)• Correlation• Identification• Secondary use• Disclosure• Exclusion• Surveillance• Stored data compromise• Intrusion• Misattribution

Page 10: Designing Privacy into  Internet Protocols IAB Privacy Program

10

Correlation• The combination of various pieces of

information related to an individual or that obtain that characteristic when combined.

Example:TLS

sessionresumption

Page 11: Designing Privacy into  Internet Protocols IAB Privacy Program

11

Identification• The linking of information to a particular

individual to infer an individual's identity or to allow the inference of an individual's identity.

• Sometimes a threat, sometimes not.• Lots of protocols support direct

identification (e.g., SIP, XMPP) or validation of claims that entities are who they say they are.

Page 12: Designing Privacy into  Internet Protocols IAB Privacy Program

12

Surveillance• The observation or monitoring of an

individual's communications or activities.• Includes traffic analysis and observation of

encrypted communications.

Page 13: Designing Privacy into  Internet Protocols IAB Privacy Program

13

Stored Data Compromise• Failure to prevent unauthorized or

inappropriate access to stored data.• Typically outside of IETF scope, but

consider key management, access control, operational logging.– E.g., RFC 6302 recommends that servers log

(forever?) source/dest ports, timestamp, transport protocol in addition to IPv4 address – implications of compromise?

Page 14: Designing Privacy into  Internet Protocols IAB Privacy Program

14

ThreatsThreatMitigation

GuidelinesComm.Model

Page 15: Designing Privacy into  Internet Protocols IAB Privacy Program

15

Threat Mitigations• Data minimization

– See next slide• Security

– Confidentiality– Authentication– Access control– Authorization mechanisms

• User participation– Control over which personal data is shared– Signaling user preferences

Page 16: Designing Privacy into  Internet Protocols IAB Privacy Program

16

Data Minimization• Collection

– E.g., why send IP addresses in mail headers?• Disclosure

– What data is (unnecessarily) exposed to proxies, relays, other intermediaries?

• Identifiability– See next slide

• Sensitivity– E.g., send precise geo or a geo region?

• Retention• Use

Page 17: Designing Privacy into  Internet Protocols IAB Privacy Program

17

Identifiability• Anonymity: individual cannot be identified

within a group– Really hard in practice – E.g., RFC 3325 SIP ‘From: Anonymous’

• Pseudonymity: individual is identified by some identity-shielding name– Very common in Internet protocols– Can still yield high identifiability (and facilitate

correlation) depending on construction, persistence, use

• E.g., IPv6 SLAAC using MAC address vs. RFC 4941 temporary address

Page 18: Designing Privacy into  Internet Protocols IAB Privacy Program

18

Identifiability• Identity confidentiality: any party other than

the recipient cannot sufficiently identify the sender

• Further examples: Extensible Authentication Protocol (EAP) and EAP methods.

Client Server

ClientHello w/Diffie Hellman

ServerHello w/Diffie Hellman

…encrypted

TLS 1.3 Example (work in progress).

Page 19: Designing Privacy into  Internet Protocols IAB Privacy Program

19

Identifiability• Minimization within identity management

• Example: OAuth

Page 20: Designing Privacy into  Internet Protocols IAB Privacy Program

20

ThreatsThreatMitigation

GuidelinesComm.Model

Page 21: Designing Privacy into  Internet Protocols IAB Privacy Program

21

Guidelines: Questions to ask yourself about protocol being designed

Four categories:1. Data minimization2. Security3. User participation4. General

Page 22: Designing Privacy into  Internet Protocols IAB Privacy Program

22

Data Minimization Guidelines (sample)

• Identifiers– Does the protocol use identifiers that allow different

protocol interactions to be correlated? – What identifiers could be omitted or be made less

identifying while still fulfilling the protocol's goals?

• Persistence of identifiers – Does the protocol allow implementers or users to

delete or replace identifiers? – How often does the specification recommend replacing

identifiers (by default)? – Can the identifiers, along with other state information,

be set to automatically expire?

Page 23: Designing Privacy into  Internet Protocols IAB Privacy Program

23

Data Minimization Guidelines• Identifiers• Persistence of identifiers• Data (and personal data)• Observers – controls on exposure• Fingerprinting• Correlation – expected data combinations• Retention – implications of protocol design

Page 24: Designing Privacy into  Internet Protocols IAB Privacy Program

24

Security Guidelines (sample)• Surveillance

– Does the protocol leak information that can be observed through traffic analysis, such as packet sizes or timing that allow observers to determine characteristics of the traffic (e.g., which protocol is in use or whether the traffic is part of a real-time flow)?

– Section 2 of 3552 provides further info. • Stored data compromise

– How do the protocol's security considerations prevent or mitigate stored data compromise?

Page 25: Designing Privacy into  Internet Protocols IAB Privacy Program

25

Security Guidelines• Surveillance• Stored data compromise• Intrusion• Misattribution

Page 26: Designing Privacy into  Internet Protocols IAB Privacy Program

26

User Participation Guidelines• User control• Control over sharing with recipients• Control over sharing with intermediaries• Preference expression

Page 27: Designing Privacy into  Internet Protocols IAB Privacy Program

27

General Guidelines• Trade-offs

– Does the protocol make trade-offs between privacy and usability, privacy and efficiency, privacy and implementability, or privacy and other design goals?

• Defaults – If the protocol can be operated in multiple modes or

with multiple configurable options, does the default mode or option minimize the amount, identifiability, and persistence of the data and identifiers exposed by the protocol?

– Does it provide the strictest security features of all the modes/options?

Page 28: Designing Privacy into  Internet Protocols IAB Privacy Program

28

Resources• RFC 6973

– https://tools.ietf.org/html/rfc6973

• Questions, requests for help & reviews:– Mail to [email protected]


Recommended