draft-arkko-iab-data-minimization-principle-02.txt | draft-arkko-iab-data-minimization-principle.txt | |||
---|---|---|---|---|
Network Working Group J. Arkko | Network Working Group J. Arkko | |||
Internet-Draft Ericsson | Internet-Draft Ericsson | |||
Intended status: Informational July 12, 2022 | Intended status: Informational October 25, 2022 | |||
Expires: January 13, 2023 | Expires: April 28, 2023 | |||
Data minimization | Data minimization | |||
draft-arkko-iab-data-minimization-principle-02 | draft-arkko-iab-data-minimization-principle | |||
Abstract | Abstract | |||
Communications security has been at the center of many security | Communications security has been at the center of many security | |||
improvements in the Internet. The goal has been to ensure that | improvements in the Internet. The goal has been to ensure that | |||
communications are protected against outside observers and attackers. | communications are protected against outside observers and attackers. | |||
This document recommends that this is no longer alone sufficient to | Privacy has also been a key focus area, and understanding the privacy | |||
cater for the security and privacy issues seen on the Internet today. | implications of new Internet technology is an important factor when | |||
For instance, it is often also necessary to protect against endpoints | IETF works on such technologies. | |||
that are compromised, malicious, or whose interests simply do not | ||||
align with the interests of users. While such protection is | This document highlights the need for a particular focus with respect | |||
difficult, there are some measures that can be taken. It is | to privacy. It is necessary to protect against endpoints that are | |||
important to consider the role of data passed to various parties - | compromised, malicious, or whose interests simply do not align with | |||
including the primary protocol participants - and balance the | the interests of users. It is important to consider the role of data | |||
information given to them considering their roles and possible | passed to various parties - including the primary protocol | |||
compromise of the information. | participants - and balance the information given to them considering | |||
their roles and possible compromise of the information. | ||||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on January 13, 2023. | This Internet-Draft will expire on April 28, 2023. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2022 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 2.1. Types of information . . . . . . . . . . . . . . . . . . 4 | |||
3.1. Dealing with compromise . . . . . . . . . . . . . . . . . 4 | 2.2. Dealing with compromise . . . . . . . . . . . . . . . . . 4 | |||
3.2. Related work . . . . . . . . . . . . . . . . . . . . . . 5 | 2.3. Related work . . . . . . . . . . . . . . . . . . . . . . 5 | |||
4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6 | 3. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6 | |||
5. Informative References . . . . . . . . . . . . . . . . . . . 6 | 4. Informative References . . . . . . . . . . . . . . . . . . . 7 | |||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 8 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
1. Introduction | 1. Introduction | |||
Communications security has been at the center of many security | Communications security has been at the center of many security | |||
improvements on the Internet. The goal has been to ensure that | improvements on the Internet. The goal has been to ensure that | |||
communications are protected against outside observers and attackers. | communications are protected against outside observers and attackers. | |||
This has been exemplified in many aspects of IETF efforts, in the | This has been exemplified in many aspects of IETF efforts, in the | |||
threat models [RFC3552], concerns about surveillance [RFC7258], IAB | threat models [RFC3552], concerns about surveillance [RFC7258], IAB | |||
statements [Confidentiality], and the introduction of encryption in | statements [Confidentiality], and the introduction of encryption in | |||
many protocols [RFC9000], [RFC7858], [RFC8484]. This has been very | many protocols [RFC9000], [RFC7858], [RFC8484]. This has been very | |||
successful. Advances in protecting most of our communications with | successful. Advances in protecting most of our communications with | |||
strong cryptographic has resulted in much improved security. Work on | strong cryptographic has resulted in much improved security. Work on | |||
these advances continues to be a key part of IETF's security effort. | these advances continues to be a key part of IETF's security effort. | |||
This document recommends that further action is needed, however. For | Privacy has also been at the center of many activities in the IETF. | |||
instance, the possibility that endpoints are compromised, malicious, | Improvements in communications security obviously have improved | |||
or have interests that do not align with the interests of users. | privacy as well, but the concept is broader. Privacy and its impact | |||
Given the advances in communication seceurity, adversaries have had | on protocol development activities at IETF is discussed in [RFC6973], | |||
to increase their pressure against new avenues of attack. New | covering a number of topics, from understanding privacy threats to | |||
adversaries and risks have also arisen, e.g., due to increasing | threat mitigation, including data minimization. | |||
amount of information stored in various Internet services. | ||||
While such protection is difficult, there are some measures that can | This document highlights the need for a particular focus with respect | |||
be taken. This document focuses on the specific question of data | to privacy, on data collection, particularly when it comes to the | |||
passed to various parties - including the primary protocol | primary protocol participants (and not just observers/attackers). As | |||
participants. What information is given to any other party should | RFC 6973 states: | |||
depend on the role of that party. And the possibility of a | ||||
compromised entity sharing the information beyond the users' | "Limiting the data collected by protocol elements to | |||
expectations should be kept in mind. | only what is necessary (collection limitation) is | |||
the most straightforward way to help reduce privacy | ||||
risks associated with the use of the protocol." | ||||
This document offers some further discussion and motivation for this. | ||||
This document suggests that limiting the sharing of data to the | ||||
protocol participants is a key technique in limiting the data | ||||
collection mentioned above. This document also suggests that what | ||||
information is given to any other participant should depend on the | ||||
role of that participant. | ||||
The reason why this is important is that it is possible that | ||||
endpoints are compromised, malicious, or have interests that do not | ||||
align with the interests of users. Even closed, managed networks may | ||||
have compromised nodes, justifying careful consideration of what | ||||
information is provided to different nodes in the network. And in | ||||
all networks, increased use of communication security means | ||||
adversaries may resort to new avenues of attack. New adversaries and | ||||
risks have also arisen, e.g., due to increasing amount of information | ||||
stored in various Internet services. And in situations where | ||||
interests do not align across the protocol participants, limiting | ||||
data collection by a protocol participant itself - who is interested | ||||
in data collection - may not be sufficient. | ||||
Careful control of information is also useful for technology | Careful control of information is also useful for technology | |||
evolution. For instance, allowing a party to unnecessarily collect | evolution. For instance, allowing a party to unnecessarily collect | |||
or receive information may lead to a similar effect as described in | or receive information may lead to a similar effect as described in | |||
[RFC8546] for protocols: regardless of initial expectations, over | [RFC8546] for protocols: regardless of initial expectations, over | |||
time unnecessary information will get used, leading to, for instance, | time unnecessary information will get used, leading to, for instance, | |||
ossification. Systems end up depend on having access to exactly the | ossification. Systems end up depend on having access to exactly the | |||
same information as they had access to previously. This makes it | same information as they had access to previously. This makes it | |||
hard to change what information is provided or how it is provided. | hard to change what information is provided or how it is provided. | |||
2. Recommendations | 2. Recommendations | |||
The Principle of Least Privilege [PoLP] is applicable: | The Principle of Least Privilege [PoLP] is applicable: | |||
"Every program and every user of the system should operate | "Every program and every user of the system should operate | |||
using the least set of privileges necessary to complete the | using the least set of privileges necessary to complete the | |||
job." | job." | |||
In this context, it is recommended that the protocol participants | In this context, it is recommended that the protocol participants | |||
minimize the information they share. I.e., they should provide only | minimize the information they share. I.e., they should provide only | |||
the information to each other that is necessary for the function that | the information to each other that is necessary for the function that | |||
is expected to be performed by the other party. | is expected to be performed by the other party. | |||
This recommendation is of course very similar to the current approach | Information sharing may relate to different types of protocol | |||
to communications security. As with communication security, we try | exchanges, e.g., interaction of an endpoint with the network or with | |||
to avoid providing too much information as it may be misused or leak | intermediaries. Other documents address aspects related to networks | |||
through attacks. The same principle applies not just to routers and | ([RFC8546], [RFC8558], [I-D.iab-path-signals-collaboration]). | |||
potential attackers on path, but also many other services in the | Thomson [I-D.thomson-tmi] discusses the role intermediaries. | |||
Internet, including servers that provide some function. | Communications security largely addresses observers and outsider | |||
adversaries, and [RFC6973] discusses associated traffic analysis | ||||
threats. The focus in this document is on the primary protocol | ||||
participants, such as a server in a client-server architecture or a | ||||
service enables some kind of interaction among groups of users. | ||||
As with communication security, we try to avoid providing too much | ||||
information as it may be misused or leak through attacks. The same | ||||
principle applies not just to routers and potential attackers on | ||||
path, but also many other services in the Internet, including servers | ||||
that provide some function. | ||||
Of course, participants may provide more information to each after | Of course, participants may provide more information to each after | |||
careful consideration, e.g., information provided in exchange of some | careful consideration, e.g., information provided in exchange of some | |||
benefit, or to parties that are trusted by the participant. | benefit, or to parties that are trusted by the participant. | |||
3. Discussion | 2.1. Types of information | |||
Information sharing may relate to different types of protocol | ||||
exchanges: | ||||
o The interaction of an endpoint with the network, e.g., information | ||||
they provide in any network attachment process or the wire images | ||||
of the packets sent via the network. | ||||
o The interaction of an endpoint with intermediaries such as group | ||||
messaging servers or NAT traversal relays. | ||||
o The interaction of an endpoint with a service, such as a website, | ||||
social networking function, or a telemetry collection point. | ||||
o End-to-end interactions between users, represented by applications | ||||
running on their computers. | ||||
Information sharing need not be explicitly carried information, e.g., | The use of identifiers has been extensively discussed in [RFC6973], | |||
a data item in a message sent to a protocol participant. Indirectly | ||||
inferred information can also end up being shared, such as message | ||||
arrival times or patterns in the traffic flow. Information may also | ||||
be obtained from fingerprinting the protocol participants, in an | ||||
effort to identify unique endpoints or users. | ||||
Information may also be combined from multiple sources, e.g., | Note that indirectly inferred information can also end up being | |||
websites and social media systems collaborating to identify visiting | shared, such as message arrival times or patterns in the traffic flow | |||
users [WP2021]. | ([RFC6973]). Information may also be obtained from fingerprinting | |||
the protocol participants, in an effort to identify unique endpoints | ||||
or users ([RFC6973]). Information may also be combined from multiple | ||||
sources, e.g., websites and social media systems collaborating to | ||||
identify visiting users [WP2021]. | ||||
3.1. Dealing with compromise | 2.2. Dealing with compromise | |||
Even with careful exposure of information, compromises may occur. It | Even with careful exposure of information, compromises may occur. It | |||
is important to build defenses to protect information, even when some | is important to build defenses to protect information, even when some | |||
component in a system becomes compromised. This may involve designs | component in a system becomes compromised. This may involve designs | |||
where no single party has all information such as with Oblivious DNS | where no single party has all information such as with Oblivious DNS | |||
[I-D.annee-dprive-oblivious-dns], [I-D.pauly-dprive-oblivious-doh] or | [I-D.annee-dprive-oblivious-dns], [I-D.pauly-dprive-oblivious-doh] or | |||
HTTP [I-D.ietf-ohai-ohttp], cryptographic designs where a service | HTTP [I-D.ietf-ohai-ohttp], cryptographic designs where a service | |||
such as with the recent IETF PPM effort [I-D.ietf-ppm-dap], service | such as with the recent IETF PPM effort [I-D.ietf-ppm-dap], service | |||
side encryption of data at rest, confidential computing, and other | side encryption of data at rest, confidential computing, and other | |||
mechanisms. | mechanisms. | |||
skipping to change at page 5, line 13 | skipping to change at page 5, line 29 | |||
those components. For instance, just because an e-mail server can | those components. For instance, just because an e-mail server can | |||
read the contents of an e-mail message do not make it a legitimate | read the contents of an e-mail message do not make it a legitimate | |||
recipient of the e-mail. | recipient of the e-mail. | |||
The general topic of ensuring that protocol mechanisms stays | The general topic of ensuring that protocol mechanisms stays | |||
evolvable and workable is covered in [I-D.iab-use-it-or-lose-it]. | evolvable and workable is covered in [I-D.iab-use-it-or-lose-it]. | |||
But the associated methods for reducing fingerprinting possibilities | But the associated methods for reducing fingerprinting possibilities | |||
probably deserve further study [Fingerprinting] [AmIUnique]. | probably deserve further study [Fingerprinting] [AmIUnique]. | |||
[I-D.wood-pearg-website-fingerprinting] discusses one aspect of this. | [I-D.wood-pearg-website-fingerprinting] discusses one aspect of this. | |||
3.2. Related work | 2.3. Related work | |||
Cooper et al. [RFC6973] discuss the general concept of privacy, | ||||
including data minimization. They provide the general statement | ||||
quoted in Section 1, which is exactly about what this document is | ||||
about. However, this document attempts to go further than the | ||||
general statement, suggesting that information should not even be | ||||
shared with a participant if it is not necessary for the expected | ||||
role of that participant. | ||||
[RFC6973] further discuss identifiability, i.e., the use of various | ||||
types of identifiers. [RFC6973] also provides a questionnaire that | ||||
protocol designers can use to further analyse the impact of their | ||||
design. For data minimization the questions relate to identifiers, | ||||
data, observers, and fingerprinting. This includes, for instance, | ||||
asking what information is exposed to which protocol entities, and if | ||||
there are ways to limit such exposure. These questions are in line | ||||
with avoiding sharing information to a protocol participant unless it | ||||
is needed for its role. | ||||
Hardie [RFC8558] discusses path signals, i.e., messages to or from | Hardie [RFC8558] discusses path signals, i.e., messages to or from | |||
on-path elements to endpoints. In the past, path signals were often | on-path elements to endpoints. In the past, path signals were often | |||
implicit, e.g., network nodes interpreting in a particular way | implicit, e.g., network nodes interpreting in a particular way | |||
transport protocol headers originally intended for end-to-end | transport protocol headers originally intended for end-to-end | |||
consumption. The document recommends a principle that implicit | consumption. The document recommends a principle that implicit | |||
signals should be avoided and that explicit signals be used instead, | signals should be avoided and that explicit signals be used instead, | |||
and only when the signal's originator intends that it be used by the | and only when the signal's originator intends that it be used by the | |||
network elements on the path. | network elements on the path. | |||
skipping to change at page 6, line 5 | skipping to change at page 6, line 34 | |||
Trammel and Kuehlewind [RFC8546] discuss the concept of a "wire | Trammel and Kuehlewind [RFC8546] discuss the concept of a "wire | |||
image" of a protocol. This is an abstraction of the information | image" of a protocol. This is an abstraction of the information | |||
available to an on-path non-participant in a networking protocol. It | available to an on-path non-participant in a networking protocol. It | |||
relates to the topic of non-participants interpreting information | relates to the topic of non-participants interpreting information | |||
that is available to them in the "wire image" (or associated timing | that is available to them in the "wire image" (or associated timing | |||
and other indirect information). The issues are largely the same | and other indirect information). The issues are largely the same | |||
even for participants. Even proper protocol participants may start | even for participants. Even proper protocol participants may start | |||
to use information available to them, regardless of whether it was | to use information available to them, regardless of whether it was | |||
intended to that participant or simply relayed through them. | intended to that participant or simply relayed through them. | |||
4. Acknowledgements | 3. Acknowledgements | |||
The author would like to thank the members of the IAB, and the | The author would like to thank the participants of various IAB | |||
participants of IETF SAAG WG, Model-T IAB program, and the 2019 IAB | workshops and programs, and IETF discussion list contributors for | |||
DEDR workshop that all discussed some aspects of these issues. The | interesting discussions in this area. The author would in particular | |||
author would like to acknowledge the significant contributions of | like to acknowledge the significant contributions of Martin Thomson, | |||
Martin Thomson, Stephen Farrell, Mark McFadden, John Mattsson, Chris | Nick Doty, Stephen Farrell, Mark McFadden, John Mattsson, Chris Wood, | |||
Wood, Dominique Lazanski, Eric Rescorla, Russ Housley, Robin Wilton, | Dominique Lazanski, Eric Rescorla, Russ Housley, Robin Wilton, Mirja | |||
Mirja Kuehlewind, Tommy Pauly, Jaime Jimenez and Christian Huitema in | Kuehlewind, Tommy Pauly, Jaime Jimenez and Christian Huitema. | |||
discussions around this general problem area. | ||||
This work has been influenced greatly by discussions about trends in | This work has been influenced by [RFC6973], [RFC8980], | |||
attacks, for instance, in [RFC8980], [I-D.farrell-etm] | [I-D.farrell-etm] [I-D.arkko-arch-internet-threat-model-guidance], | |||
[I-D.arkko-arch-internet-threat-model-guidance], | [I-D.lazanski-smart-users-internet], | |||
[I-D.lazanski-smart-users-internet], and others. | ||||
5. Informative References | 4. Informative References | |||
[AmIUnique] | [AmIUnique] | |||
INRIA, ., "Am I Unique?", https://amiunique.org , 2020. | INRIA, ., "Am I Unique?", https://amiunique.org , 2020. | |||
[Confidentiality] | [Confidentiality] | |||
The Internet Architecture Board, ., "IAB Statement on | The Internet Architecture Board, ., "IAB Statement on | |||
Internet Confidentiality", https://www.iab.org/2014/11/14/ | Internet Confidentiality", https://www.iab.org/2014/11/14/ | |||
iab-statement-on-internet-confidentiality/ , November | iab-statement-on-internet-confidentiality/ , November | |||
2014. | 2014. | |||
[Fingerprinting] | [Fingerprinting] | |||
Laperdrix, P., Bielova, N., Baudry, B., and G. Avoine, | Laperdrix, P., Bielova, N., Baudry, B., and G. Avoine, | |||
"Browser Fingerprinting: A survey", arXiv:1905.01051v2 | "Browser Fingerprinting: A survey", arXiv:1905.01051v2 | |||
[cs.CR] 4 Nov 2019 , November 2019. | [cs.CR] 4 Nov 2019 , November 2019. | |||
[I-D.annee-dprive-oblivious-dns] | [I-D.annee-dprive-oblivious-dns] | |||
Princeton University, Princeton University, Princeton | Annie Edmundson, , Paul Schmitt, , Nick Feamster, , and | |||
University, and Salesforce, "Oblivious DNS - Strong | Allison Mankin, "Oblivious DNS - Strong Privacy for DNS | |||
Privacy for DNS Queries", draft-annee-dprive-oblivious- | Queries", draft-annee-dprive-oblivious-dns-00 (work in | |||
dns-00 (work in progress), July 2018. | progress), July 2018, <https://www.ietf.org/archive/id/ | |||
draft-annee-dprive-oblivious-dns-00.txt>. | ||||
[I-D.arkko-arch-internet-threat-model-guidance] | [I-D.arkko-arch-internet-threat-model-guidance] | |||
Ericsson and Trinity College Dublin, "Internet Threat | Jari Arkko, and Stephen Farrell, "Internet Threat Model | |||
Model Guidance", draft-arkko-arch-internet-threat-model- | Guidance", draft-arkko-arch-internet-threat-model- | |||
guidance-00 (work in progress), July 2021. | guidance-00 (work in progress), July 2021, | |||
<https://www.ietf.org/archive/id/draft-arkko-arch- | ||||
internet-threat-model-guidance-00.txt>. | ||||
[I-D.farrell-etm] | [I-D.farrell-etm] | |||
Trinity College Dublin, "We're gonna need a bigger threat | Stephen Farrell, , "We're gonna need a bigger threat | |||
model", draft-farrell-etm-03 (work in progress), July | model", draft-farrell-etm-03 (work in progress), July | |||
2019. | 2019, <https://www.ietf.org/archive/id/draft-farrell-etm- | |||
03.txt>. | ||||
[I-D.iab-path-signals-collaboration] | [I-D.iab-path-signals-collaboration] | |||
Ericsson, Cisco, Apple, and Ericsson, "Considerations on | Arkko, J., Hardie, T., Pauly, T., and M. Kuehlewind, | |||
Application - Network Collaboration Using Path Signals", | "Considerations on Application - Network Collaboration | |||
draft-iab-path-signals-collaboration-01 (work in | Using Path Signals", draft-iab-path-signals- | |||
progress), July 2022. | collaboration-02 (work in progress), October 2022, | |||
<https://www.ietf.org/archive/id/draft-iab-path-signals- | ||||
collaboration-02.txt>. | ||||
[I-D.iab-use-it-or-lose-it] | [I-D.iab-use-it-or-lose-it] | |||
Mozilla and Apple, "Long-Term Viability of Protocol | Martin Thomson, and Tommy Pauly, "Long-Term Viability of | |||
Extension Mechanisms", draft-iab-use-it-or-lose-it-04 | Protocol Extension Mechanisms", draft-iab-use-it-or-lose- | |||
(work in progress), October 2021. | it-04 (work in progress), October 2021, | |||
<https://www.ietf.org/archive/id/draft-iab-use-it-or-lose- | ||||
it-04.txt>. | ||||
[I-D.ietf-ohai-ohttp] | [I-D.ietf-ohai-ohttp] | |||
Mozilla and Cloudflare, "Oblivious HTTP", draft-ietf-ohai- | Thomson, M. and C. Wood, "Oblivious HTTP", draft-ietf- | |||
ohttp-02 (work in progress), July 2022. | ohai-ohttp-05 (work in progress), September 2022, | |||
<https://www.ietf.org/archive/id/draft-ietf-ohai-ohttp- | ||||
05.txt>. | ||||
[I-D.ietf-ppm-dap] | [I-D.ietf-ppm-dap] | |||
ISRG, Cloudflare, Mozilla, and Cloudflare, "Distributed | Geoghegan, T., Patton, C., Rescorla, E., and C. Wood, | |||
Aggregation Protocol for Privacy Preserving Measurement", | "Distributed Aggregation Protocol for Privacy Preserving | |||
draft-ietf-ppm-dap-01 (work in progress), July 2022. | Measurement", draft-ietf-ppm-dap-02 (work in progress), | |||
September 2022, <https://www.ietf.org/archive/id/draft- | ||||
ietf-ppm-dap-02.txt>. | ||||
[I-D.lazanski-smart-users-internet] | [I-D.lazanski-smart-users-internet] | |||
Last Press Label, "An Internet for Users Again", draft- | Dominique Lazanski, , "An Internet for Users Again", | |||
lazanski-smart-users-internet-00 (work in progress), July | draft-lazanski-smart-users-internet-00 (work in progress), | |||
2019. | July 2019, <https://www.ietf.org/archive/id/draft- | |||
lazanski-smart-users-internet-00.txt>. | ||||
[I-D.pauly-dprive-oblivious-doh] | [I-D.pauly-dprive-oblivious-doh] | |||
Apple Inc., Fastly, Apple Inc., Cloudflare, and | Eric Kinnear, , Patrick McManus, , Tommy Pauly, , Tanya | |||
Cloudflare, "Oblivious DNS over HTTPS", draft-pauly- | Verma, , and A. Christopher Wood, "Oblivious DNS Over | |||
dprive-oblivious-doh-11 (work in progress), February 2022. | HTTPS", draft-pauly-dprive-oblivious-doh-11 (work in | |||
progress), February 2022, | ||||
<https://www.ietf.org/archive/id/draft-pauly-dprive- | ||||
oblivious-doh-11.txt>. | ||||
[I-D.thomson-tmi] | [I-D.thomson-tmi] | |||
Mozilla, "Principles for the Involvement of Intermediaries | Martin Thomson, , "Principles for the Involvement of | |||
in Internet Protocols", draft-thomson-tmi-03 (work in | Intermediaries in Internet Protocols", draft-thomson- | |||
progress), March 2022. | tmi-04 (work in progress), September 2022, | |||
<https://www.ietf.org/archive/id/draft-thomson-tmi- | ||||
04.txt>. | ||||
[I-D.wood-pearg-website-fingerprinting] | [I-D.wood-pearg-website-fingerprinting] | |||
University of Waterloo, HK University of Science and | Ian Goldberg, , Tao Wang, , and A. Christopher Wood, | |||
Technology, and Apple, Inc., "Network-Based Website | "Network-Based Website Fingerprinting", draft-wood-pearg- | |||
Fingerprinting", draft-wood-pearg-website- | website-fingerprinting-00 (work in progress), November | |||
fingerprinting-00 (work in progress), November 2019. | 2019, <https://www.ietf.org/archive/id/draft-wood-pearg- | |||
website-fingerprinting-00.txt>. | ||||
[PoLP] Saltzer, J. and M. Schroader, "The Protection of | [PoLP] Saltzer, J. and M. Schroader, "The Protection of | |||
Information in Computer Systems", Fourth ACM Symposium on | Information in Computer Systems", Fourth ACM Symposium on | |||
Operating System Principles , October 1975. | Operating System Principles , October 1975. | |||
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC | [RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC | |||
Text on Security Considerations", BCP 72, RFC 3552, | Text on Security Considerations", BCP 72, RFC 3552, | |||
DOI 10.17487/RFC3552, July 2003, <https://www.rfc- | DOI 10.17487/RFC3552, July 2003, <https://www.rfc- | |||
editor.org/info/rfc3552>. | editor.org/info/rfc3552>. | |||
[RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., | ||||
Morris, J., Hansen, M., and R. Smith, "Privacy | ||||
Considerations for Internet Protocols", RFC 6973, | ||||
DOI 10.17487/RFC6973, July 2013, <https://www.rfc- | ||||
editor.org/info/rfc6973>. | ||||
[RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | |||
Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | |||
2014, <https://www.rfc-editor.org/info/rfc7258>. | 2014, <https://www.rfc-editor.org/info/rfc7258>. | |||
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | |||
and P. Hoffman, "Specification for DNS over Transport | and P. Hoffman, "Specification for DNS over Transport | |||
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | |||
2016, <https://www.rfc-editor.org/info/rfc7858>. | 2016, <https://www.rfc-editor.org/info/rfc7858>. | |||
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | |||
End of changes. 31 change blocks. | ||||
119 lines changed or deleted | 175 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |