draft-arkko-iab-data-minimization-principle-03.txt | draft-arkko-iab-data-minimization-principle.txt | |||
---|---|---|---|---|
Network Working Group J. Arkko | Network Working Group J. Arkko | |||
Internet-Draft Ericsson | Internet-Draft Ericsson | |||
Intended status: Informational October 25, 2022 | Intended status: Informational March 2023 | |||
Expires: April 28, 2023 | Expires: September 2, 2023 | |||
Data minimization | Emphasizing Data minimization among protocol participants | |||
draft-arkko-iab-data-minimization-principle-03 | draft-arkko-iab-data-minimization-principle | |||
Abstract | Abstract | |||
Communications security has been at the center of many security | Data minimization is an important privacy technique, as it can reduce | |||
improvements in the Internet. The goal has been to ensure that | the amount information exposed about a user. This document | |||
communications are protected against outside observers and attackers. | emphasizes the need for data minimization among primary protocol | |||
Privacy has also been a key focus area, and understanding the privacy | participants, such as between clients and servers. Avoiding data | |||
implications of new Internet technology is an important factor when | leakage to outside parties is of course very important as well, but | |||
IETF works on such technologies. | both need to be considered in minimization. | |||
This document highlights the need for a particular focus with respect | This is because is necessary to protect against endpoints that are | |||
to privacy. It is necessary to protect against endpoints that are | ||||
compromised, malicious, or whose interests simply do not align with | compromised, malicious, or whose interests simply do not align with | |||
the interests of users. It is important to consider the role of data | the interests of users. It is important to consider the role of a | |||
passed to various parties - including the primary protocol | participant and limit any data provided to it according to that role. | |||
participants - and balance the information given to them considering | ||||
their roles and possible compromise of the information. | ||||
Status of This Memo | Status of This Memo | |||
This Internet-Draft is submitted in full conformance with the | This Internet-Draft is submitted in full conformance with the | |||
provisions of BCP 78 and BCP 79. | provisions of BCP 78 and BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
This Internet-Draft will expire on April 28, 2023. | This Internet-Draft will expire on September 2, 2023. | |||
Copyright Notice | Copyright Notice | |||
Copyright (c) 2022 IETF Trust and the persons identified as the | Copyright (c) 2023 IETF Trust and the persons identified as the | |||
document authors. All rights reserved. | document authors. All rights reserved. | |||
This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
(http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
publication of this document. Please review these documents | publication of this document. Please review these documents | |||
carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
described in the Simplified BSD License. | described in the Simplified BSD License. | |||
Table of Contents | Table of Contents | |||
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 | |||
2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 3 | 2. Recommendations . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
2.1. Types of information . . . . . . . . . . . . . . . . . . 4 | 3. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
2.2. Dealing with compromise . . . . . . . . . . . . . . . . . 4 | 3.1. Types of Protocol Exchanges . . . . . . . . . . . . . . . 3 | |||
2.3. Related work . . . . . . . . . . . . . . . . . . . . . . 5 | 3.2. Types of information . . . . . . . . . . . . . . . . . . 4 | |||
3. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 6 | 3.3. Different Ways of Avoiding Information Sharing . . . . . 4 | |||
4. Informative References . . . . . . . . . . . . . . . . . . . 7 | 3.4. Role of Trust . . . . . . . . . . . . . . . . . . . . . . 5 | |||
3.5. Evolvability and Fingerprinting . . . . . . . . . . . . . 5 | ||||
3.6. Related work . . . . . . . . . . . . . . . . . . . . . . 5 | ||||
4. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 7 | ||||
5. Informative References . . . . . . . . . . . . . . . . . . . 7 | ||||
Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 | Author's Address . . . . . . . . . . . . . . . . . . . . . . . . 10 | |||
1. Introduction | 1. Introduction | |||
Communications security has been at the center of many security | Privacy been at the center of many activities in the IETF. Privacy | |||
improvements on the Internet. The goal has been to ensure that | and its impact on protocol development activities at IETF is | |||
communications are protected against outside observers and attackers. | discussed in [RFC6973], covering a number of topics, from | |||
understanding privacy threats to threat mitigation, including data | ||||
This has been exemplified in many aspects of IETF efforts, in the | minimization. | |||
threat models [RFC3552], concerns about surveillance [RFC7258], IAB | ||||
statements [Confidentiality], and the introduction of encryption in | ||||
many protocols [RFC9000], [RFC7858], [RFC8484]. This has been very | ||||
successful. Advances in protecting most of our communications with | ||||
strong cryptographic has resulted in much improved security. Work on | ||||
these advances continues to be a key part of IETF's security effort. | ||||
Privacy has also been at the center of many activities in the IETF. | This document emphasizes the need for data minimization among primary | |||
Improvements in communications security obviously have improved | protocol participants, such as between clients and servers. Avoiding | |||
privacy as well, but the concept is broader. Privacy and its impact | data leakage to outside parties such as observers or attackers is of | |||
on protocol development activities at IETF is discussed in [RFC6973], | course very important as well, but minimization needs to consider | |||
covering a number of topics, from understanding privacy threats to | both. | |||
threat mitigation, including data minimization. | ||||
This document highlights the need for a particular focus with respect | As RFC 6973 states: | |||
to privacy, on data collection, particularly when it comes to the | ||||
primary protocol participants (and not just observers/attackers). As | ||||
RFC 6973 states: | ||||
"Limiting the data collected by protocol elements to | "Limiting the data collected by protocol elements to | |||
only what is necessary (collection limitation) is | only what is necessary (collection limitation) is | |||
the most straightforward way to help reduce privacy | the most straightforward way to help reduce privacy | |||
risks associated with the use of the protocol." | risks associated with the use of the protocol." | |||
This document offers some further discussion and motivation for this. | This document offers some further discussion, motivation, and | |||
This document suggests that limiting the sharing of data to the | clarification for this. This document suggests that limiting the | |||
protocol participants is a key technique in limiting the data | sharing of data to the protocol participants is a key technique in | |||
collection mentioned above. This document also suggests that what | limiting the data collection mentioned above. It is important that | |||
information is given to any other participant should depend on the | minimization happens prior to disclosing information to another | |||
role of that participant. | party, rather than relying on the good will of the other party to | |||
avoid storing the information. | ||||
The reason why this is important is that it is possible that | This is because is necessary to protect against endpoints that are | |||
endpoints are compromised, malicious, or have interests that do not | compromised, malicious, or whose interests simply do not align with | |||
align with the interests of users. Even closed, managed networks may | the interests of users. It is important to consider the role of a | |||
have compromised nodes, justifying careful consideration of what | participant and limit any data provided to it according to that role. | |||
information is provided to different nodes in the network. And in | ||||
all networks, increased use of communication security means | Even closed, managed networks may have compromised nodes, justifying | |||
adversaries may resort to new avenues of attack. New adversaries and | careful consideration of what information is provided to different | |||
risks have also arisen, e.g., due to increasing amount of information | nodes in the network. And in all networks, increased use of | |||
stored in various Internet services. And in situations where | communication security means adversaries may resort to new avenues of | |||
interests do not align across the protocol participants, limiting | attack. New adversaries and risks have also arisen, e.g., due to | |||
data collection by a protocol participant itself - who is interested | increasing amount of information stored in various Internet services. | |||
in data collection - may not be sufficient. | And in situations where interests do not align across the protocol | |||
participants, limiting data collection by a protocol participant | ||||
itself - who is interested in data collection - may not be | ||||
sufficient. | ||||
Careful control of information is also useful for technology | Careful control of information is also useful for technology | |||
evolution. For instance, allowing a party to unnecessarily collect | evolution. For instance, allowing a party to unnecessarily collect | |||
or receive information may lead to a similar effect as described in | or receive information may lead to a similar effect as described in | |||
[RFC8546] for protocols: regardless of initial expectations, over | [RFC8546] for protocols: regardless of initial expectations, over | |||
time unnecessary information will get used, leading to, for instance, | time unnecessary information will get used, leading to, for instance, | |||
ossification. Systems end up depend on having access to exactly the | ossification. Systems end up depend on having access to exactly the | |||
same information as they had access to previously. This makes it | same information as they had access to previously. This makes it | |||
hard to change what information is provided or how it is provided. | hard to change what information is provided or how it is provided. | |||
skipping to change at page 4, line 5 | skipping to change at page 3, line 45 | |||
"Every program and every user of the system should operate | "Every program and every user of the system should operate | |||
using the least set of privileges necessary to complete the | using the least set of privileges necessary to complete the | |||
job." | job." | |||
In this context, it is recommended that the protocol participants | In this context, it is recommended that the protocol participants | |||
minimize the information they share. I.e., they should provide only | minimize the information they share. I.e., they should provide only | |||
the information to each other that is necessary for the function that | the information to each other that is necessary for the function that | |||
is expected to be performed by the other party. | is expected to be performed by the other party. | |||
3. Discussion | ||||
3.1. Types of Protocol Exchanges | ||||
Information sharing may relate to different types of protocol | Information sharing may relate to different types of protocol | |||
exchanges, e.g., interaction of an endpoint with the network or with | exchanges, e.g., interaction of an endpoint with outsiders, the | |||
intermediaries. Other documents address aspects related to networks | network, or intermediaries. | |||
([RFC8546], [RFC8558], [I-D.iab-path-signals-collaboration]). | ||||
Thomson [I-D.thomson-tmi] discusses the role intermediaries. | Other documents address aspects related to networks ([RFC8546], | |||
Communications security largely addresses observers and outsider | [RFC8558], [I-D.iab-path-signals-collaboration]). Thomson | |||
adversaries, and [RFC6973] discusses associated traffic analysis | [I-D.thomson-tmi] discusses the role intermediaries. Communications | |||
security largely addresses observers and outsider adversaries, see | ||||
for instance [Confidentiality], [RFC7858], [RFC8446], [RFC8484], | ||||
[RFC9000]. And [RFC6973] discusses associated traffic analysis | ||||
threats. The focus in this document is on the primary protocol | threats. The focus in this document is on the primary protocol | |||
participants, such as a server in a client-server architecture or a | participants, such as a server in a client-server architecture or a | |||
service enables some kind of interaction among groups of users. | service enables some kind of interaction among groups of users. | |||
As with communication security, we try to avoid providing too much | As with communication security, we try to avoid providing too much | |||
information as it may be misused or leak through attacks. The same | information as it may be misused or leak through attacks. The same | |||
principle applies not just to routers and potential attackers on | principle applies not just to routers and potential attackers on | |||
path, but also many other services in the Internet, including servers | path, but also many other services in the Internet, including servers | |||
that provide some function. | that provide some function. | |||
Of course, participants may provide more information to each after | 3.2. Types of information | |||
careful consideration, e.g., information provided in exchange of some | ||||
benefit, or to parties that are trusted by the participant. | ||||
2.1. Types of information | ||||
The use of identifiers has been extensively discussed in [RFC6973], | The use of identifiers has been extensively discussed in [RFC6973], | |||
Note that indirectly inferred information can also end up being | Note that indirectly inferred information can also end up being | |||
shared, such as message arrival times or patterns in the traffic flow | shared, such as message arrival times or patterns in the traffic flow | |||
([RFC6973]). Information may also be obtained from fingerprinting | ([RFC6973]). Information may also be obtained from fingerprinting | |||
the protocol participants, in an effort to identify unique endpoints | the protocol participants, in an effort to identify unique endpoints | |||
or users ([RFC6973]). Information may also be combined from multiple | or users. Information may also be combined from multiple sources, | |||
sources, e.g., websites and social media systems collaborating to | e.g., websites and social media systems collaborating to identify | |||
identify visiting users [WP2021]. | visiting users [WP2021]. | |||
2.2. Dealing with compromise | 3.3. Different Ways of Avoiding Information Sharing | |||
Even with careful exposure of information, compromises may occur. It | The most straightforward approach is of course to avoid sending a | |||
is important to build defenses to protect information, even when some | particular piece of information at all. | |||
component in a system becomes compromised. This may involve designs | ||||
where no single party has all information such as with Oblivious DNS | Or the information needs to be encrypted to very specific recipients, | |||
even if the encrypted message is shared with a broader set of | ||||
protocol participants. For instance, a client can encrypt a message | ||||
only to the actual final recipient, even if the server holds the | ||||
message before it is delivered. | ||||
Architectural note: A transport connection between | ||||
two components of a system is not an end-to-end | ||||
connection even if it encompasses all the protocol | ||||
layers up to the application layer. It is not | ||||
end-to-end, if the information or control function | ||||
it carries extends beyond those components. Just | ||||
because an e-mail server can read the contents of | ||||
an e-mail message do not make it a legitimate | ||||
recipient of the e-mail. | ||||
This document recommends that information should not be disclosed, | ||||
stored, or routed in cleartext through services that do not need to | ||||
have that information for the function they perform. | ||||
Where the above methods are not possihle due to the information being | ||||
necessary for a function that the user wishes to be performed, there | ||||
are still methods to set limits on the information sharing. | ||||
Kuehlewind et al discuss the concept of Privacy Partititioning | ||||
[I-D.iab-privacy-partitioning]. This may involve designs where no | ||||
single party has all information such as with Oblivious DNS | ||||
[I-D.annee-dprive-oblivious-dns], [I-D.pauly-dprive-oblivious-doh] or | [I-D.annee-dprive-oblivious-dns], [I-D.pauly-dprive-oblivious-doh] or | |||
HTTP [I-D.ietf-ohai-ohttp], cryptographic designs where a service | HTTP [I-D.ietf-ohai-ohttp], cryptographic designs where a service | |||
such as with the recent IETF PPM effort [I-D.ietf-ppm-dap], service | such as with the recent IETF PPM effort [I-D.ietf-ppm-dap], and so | |||
side encryption of data at rest, confidential computing, and other | on. | |||
mechanisms. | ||||
Protocols can ensure that forward secrecy is provided, so that the | ||||
damage resulting from a compromise of keying material has limited | ||||
impact. | ||||
On the client side, the client may trust that another party handles | 3.4. Role of Trust | |||
information appropriately, but take steps to ensure or verify that | ||||
this is the case. For instance, as discussed above, the client can | ||||
encrypt a message only to the actual final recipient, even if the | ||||
server holds the message before it is delivered. | ||||
A corollary of the recommendation is that information should not be | Of course, participants may provide more information to each other | |||
disclosed, stored, or routed in cleartext through services that do | after careful consideration, e.g., information provided in exchange | |||
not need to have that information for the function they perform. | of some benefit, or to parties that are trusted by the participant. | |||
For instance, a transport connection between two components of a | 3.5. Evolvability and Fingerprinting | |||
system is not an end-to-end connection even if it encompasses all the | ||||
protocol layers up to the application layer. It is not end-to-end, | ||||
if the information or control function it carries extends beyond | ||||
those components. For instance, just because an e-mail server can | ||||
read the contents of an e-mail message do not make it a legitimate | ||||
recipient of the e-mail. | ||||
The general topic of ensuring that protocol mechanisms stays | The general topic of ensuring that protocol mechanisms stays | |||
evolvable and workable is covered in [I-D.iab-use-it-or-lose-it]. | evolvable and workable is covered in [I-D.iab-use-it-or-lose-it]. | |||
But the associated methods for reducing fingerprinting possibilities | But the associated methods for reducing fingerprinting possibilities | |||
probably deserve further study [Fingerprinting] [AmIUnique]. | probably deserve further study [Fingerprinting] [AmIUnique]. | |||
[I-D.wood-pearg-website-fingerprinting] discusses one aspect of this. | [I-D.wood-pearg-website-fingerprinting] discusses one aspect of this. | |||
2.3. Related work | 3.6. Related work | |||
Cooper et al. [RFC6973] discuss the general concept of privacy, | Cooper et al. [RFC6973] discuss the general concept of privacy, | |||
including data minimization. They provide the general statement | including data minimization. Among other things, it provides the | |||
quoted in Section 1, which is exactly about what this document is | general statement quoted in Section 1. It also provides guidelines | |||
about. However, this document attempts to go further than the | to authors of specifications, a number of questions that protocol | |||
general statement, suggesting that information should not even be | designers can use to further analyse the impact of their design. For | |||
shared with a participant if it is not necessary for the expected | data minimization the questions relate to identifiers, data, | |||
role of that participant. | observers, and fingerprinting. This includes, for instance, asking | |||
what information is exposed to which protocol entities, and if there | ||||
are ways to limit such exposure: | ||||
[RFC6973] further discuss identifiability, i.e., the use of various | Observers. Which information discussed in (a) and (b) | |||
types of identifiers. [RFC6973] also provides a questionnaire that | is exposed to each other protocol entity (i.e., recipients, | |||
protocol designers can use to further analyse the impact of their | intermediaries, and enablers)? Are there ways for protocol | |||
design. For data minimization the questions relate to identifiers, | implementers to choose to limit the information shared with | |||
data, observers, and fingerprinting. This includes, for instance, | each entity? Are there operational controls available to | |||
asking what information is exposed to which protocol entities, and if | limit the information shared with each entity? | |||
there are ways to limit such exposure. These questions are in line | ||||
with avoiding sharing information to a protocol participant unless it | ||||
is needed for its role. | ||||
Hardie [RFC8558] discusses path signals, i.e., messages to or from | This is is very much in line with this document, although it would be | |||
on-path elements to endpoints. In the past, path signals were often | desirable to have recommendation as well as questions, e.g., | |||
implicit, e.g., network nodes interpreting in a particular way | recommending against sharing information with a participant if it is | |||
transport protocol headers originally intended for end-to-end | not necessary for the expected role of that participant. And, as | |||
consumption. The document recommends a principle that implicit | discussed earlier, it is important to distinguish between the choices | |||
signals should be avoided and that explicit signals be used instead, | of a sender not sharing information and a receiver choosing to not | |||
and only when the signal's originator intends that it be used by the | collect information. Trusting an entity to not collect is not | |||
network elements on the path. | sufficient. | |||
Arkko, Kuhlewind, Pauly, and Hardie | There has also been a number of documents that address data | |||
[I-D.iab-path-signals-collaboration] discuss the same topic, and | minimization for specific situations, such as one DNS Query Name | |||
extend the RFC 8558 principles with recommendations to ensure minimum | Minimization [RFC7816], general DNS privacy advice including data | |||
set of parties, minimum information, and consent. | minimization [RFC9076], advice for DHCP clients for minimizing | |||
information in requests they send to DHCP servers [RFC7844] (along | ||||
with general privacy considerations of DHCP [RFC7819] [RFC7824]). | ||||
These are on the topic of limiting information sent by one primary | ||||
protocol particiant (client) to another (server). | ||||
Hardie [RFC8558] and Arkko et al. | ||||
[I-D.iab-path-signals-collaboration] discuss path signals, i.e., | ||||
messages to or from on-path elements to endpoints. In the past, path | ||||
signals were often implicit, e.g., network nodes interpreting in a | ||||
particular way transport protocol headers originally intended for | ||||
end-to-end consumption. Implicit signals should be avoided and that | ||||
explicit signals be used instead. | ||||
Kuehlewind, Pauly, and Wood [I-D.iab-privacy-partitioning] discuss | ||||
the concept of privacy partitioning: how information can be split and | ||||
carefully shared in ways where no individual party beyond the client | ||||
requesting a service has full picture of who is asking and what is | ||||
being asked. | ||||
Thomson [I-D.thomson-tmi] discusses the role intermediaries in the | Thomson [I-D.thomson-tmi] discusses the role intermediaries in the | |||
Internet architecture, at different layers of the stack. For | Internet architecture, at different layers of the stack. For | |||
instance, a router is an intermediary, some parts of DNS | instance, a router is an intermediary, some parts of DNS | |||
infrastructure can be intermediaries, messaging gateways are | infrastructure can be intermediaries, messaging gateways are | |||
intermediaries. Thomson discusses when intermediaries are or are not | intermediaries. Thomson discusses when intermediaries are or are not | |||
an appropriate tool, and presents a number of principles relating to | an appropriate tool, and presents a number of principles relating to | |||
the use of intermediaries, e.g., deliberate selection of protocol | the use of intermediaries. | |||
participants or limiting the capabilities or information exposure | ||||
related to the intermediaries. | ||||
Trammel and Kuehlewind [RFC8546] discuss the concept of a "wire | Trammel and Kuehlewind [RFC8546] discuss the concept of a "wire | |||
image" of a protocol. This is an abstraction of the information | image" of a protocol, and how network elements may start to rely on | |||
available to an on-path non-participant in a networking protocol. It | information in the image, even if it was not originally intended for | |||
relates to the topic of non-participants interpreting information | them. The issues are largely the same even for participants. | |||
that is available to them in the "wire image" (or associated timing | ||||
and other indirect information). The issues are largely the same | ||||
even for participants. Even proper protocol participants may start | ||||
to use information available to them, regardless of whether it was | ||||
intended to that participant or simply relayed through them. | ||||
3. Acknowledgements | 4. Acknowledgements | |||
The author would like to thank the participants of various IAB | The author would like to thank the participants of various IAB | |||
workshops and programs, and IETF discussion list contributors for | workshops and programs, and IETF discussion list contributors for | |||
interesting discussions in this area. The author would in particular | interesting discussions in this area. The author would in particular | |||
like to acknowledge the significant contributions of Martin Thomson, | like to acknowledge the significant contributions of Martin Thomson, | |||
Nick Doty, Stephen Farrell, Mark McFadden, John Mattsson, Chris Wood, | Nick Doty, Alissa Cooper, Stephen Farrell, Mark McFadden, John | |||
Dominique Lazanski, Eric Rescorla, Russ Housley, Robin Wilton, Mirja | Mattsson, Chris Wood, Dominique Lazanski, Eric Rescorla, Russ | |||
Kuehlewind, Tommy Pauly, Jaime Jimenez and Christian Huitema. | Housley, Robin Wilton, Mirja Kuehlewind, Tommy Pauly, Jaime Jimenez | |||
and Christian Huitema. | ||||
This work has been influenced by [RFC6973], [RFC8980], | This work has been influenced by [RFC6973], [RFC8980], | |||
[I-D.farrell-etm] [I-D.arkko-arch-internet-threat-model-guidance], | [I-D.farrell-etm] [I-D.arkko-arch-internet-threat-model-guidance], | |||
[I-D.lazanski-smart-users-internet], | [I-D.lazanski-smart-users-internet], | |||
4. Informative References | 5. Informative References | |||
[AmIUnique] | [AmIUnique] | |||
INRIA, ., "Am I Unique?", https://amiunique.org , 2020. | INRIA, ., "Am I Unique?", https://amiunique.org , 2020. | |||
[Confidentiality] | [Confidentiality] | |||
The Internet Architecture Board, ., "IAB Statement on | The Internet Architecture Board, ., "IAB Statement on | |||
Internet Confidentiality", https://www.iab.org/2014/11/14/ | Internet Confidentiality", https://www.iab.org/2014/11/14/ | |||
iab-statement-on-internet-confidentiality/ , November | iab-statement-on-internet-confidentiality/ , November | |||
2014. | 2014. | |||
[Fingerprinting] | [Fingerprinting] | |||
Laperdrix, P., Bielova, N., Baudry, B., and G. Avoine, | Laperdrix, P., Bielova, N., Baudry, B., and G. Avoine, | |||
"Browser Fingerprinting: A survey", arXiv:1905.01051v2 | "Browser Fingerprinting: A survey", arXiv:1905.01051v2 | |||
[cs.CR] 4 Nov 2019 , November 2019. | [cs.CR] 4 Nov 2019 , November 2019. | |||
[I-D.annee-dprive-oblivious-dns] | [I-D.annee-dprive-oblivious-dns] | |||
Annie Edmundson, , Paul Schmitt, , Nick Feamster, , and | Edmundson, A., Schmitt, P., Feamster, N., and A. Mankin, | |||
Allison Mankin, "Oblivious DNS - Strong Privacy for DNS | "Oblivious DNS - Strong Privacy for DNS Queries", draft- | |||
Queries", draft-annee-dprive-oblivious-dns-00 (work in | annee-dprive-oblivious-dns-00 (work in progress), July | |||
progress), July 2018, <https://www.ietf.org/archive/id/ | 2018, <https://datatracker.ietf.org/doc/html/draft-annee- | |||
draft-annee-dprive-oblivious-dns-00.txt>. | dprive-oblivious-dns-00>. | |||
[I-D.arkko-arch-internet-threat-model-guidance] | [I-D.arkko-arch-internet-threat-model-guidance] | |||
Jari Arkko, and Stephen Farrell, "Internet Threat Model | Arkko, J. and S. Farrell, "Internet Threat Model | |||
Guidance", draft-arkko-arch-internet-threat-model- | Guidance", draft-arkko-arch-internet-threat-model- | |||
guidance-00 (work in progress), July 2021, | guidance-00 (work in progress), July 2021, | |||
<https://www.ietf.org/archive/id/draft-arkko-arch- | <https://datatracker.ietf.org/doc/html/draft-arkko-arch- | |||
internet-threat-model-guidance-00.txt>. | internet-threat-model-guidance-00>. | |||
[I-D.farrell-etm] | [I-D.farrell-etm] | |||
Stephen Farrell, , "We're gonna need a bigger threat | Farrell, S., "We're gonna need a bigger threat model", | |||
model", draft-farrell-etm-03 (work in progress), July | draft-farrell-etm-03 (work in progress), July 2019, | |||
2019, <https://www.ietf.org/archive/id/draft-farrell-etm- | <https://datatracker.ietf.org/doc/html/draft-farrell-etm- | |||
03.txt>. | 03>. | |||
[I-D.iab-path-signals-collaboration] | [I-D.iab-path-signals-collaboration] | |||
Arkko, J., Hardie, T., Pauly, T., and M. Kuehlewind, | Arkko, J., Hardie, T., Pauly, T., and M. Kuehlewind, | |||
"Considerations on Application - Network Collaboration | "Considerations on Application - Network Collaboration | |||
Using Path Signals", draft-iab-path-signals- | Using Path Signals", draft-iab-path-signals- | |||
collaboration-02 (work in progress), October 2022, | collaboration-03 (work in progress), February 2023, | |||
<https://www.ietf.org/archive/id/draft-iab-path-signals- | <https://datatracker.ietf.org/doc/html/draft-iab-path- | |||
collaboration-02.txt>. | signals-collaboration-03>. | |||
[I-D.iab-privacy-partitioning] | ||||
Kuehlewind, M., Pauly, T., and C. Wood, "Partitioning as | ||||
an Architecture for Privacy", draft-iab-privacy- | ||||
partitioning-01 (work in progress), March 2023, | ||||
<https://datatracker.ietf.org/doc/html/draft-iab-privacy- | ||||
partitioning-01>. | ||||
[I-D.iab-use-it-or-lose-it] | [I-D.iab-use-it-or-lose-it] | |||
Martin Thomson, and Tommy Pauly, "Long-Term Viability of | Thomson, M. and T. Pauly, "Long-Term Viability of Protocol | |||
Protocol Extension Mechanisms", draft-iab-use-it-or-lose- | Extension Mechanisms", draft-iab-use-it-or-lose-it-04 | |||
it-04 (work in progress), October 2021, | (work in progress), October 2021, | |||
<https://www.ietf.org/archive/id/draft-iab-use-it-or-lose- | <https://datatracker.ietf.org/doc/html/draft-iab-use-it- | |||
it-04.txt>. | or-lose-it-04>. | |||
[I-D.ietf-ohai-ohttp] | [I-D.ietf-ohai-ohttp] | |||
Thomson, M. and C. Wood, "Oblivious HTTP", draft-ietf- | Thomson, M. and C. Wood, "Oblivious HTTP", draft-ietf- | |||
ohai-ohttp-05 (work in progress), September 2022, | ohai-ohttp-08 (work in progress), March 2023, | |||
<https://www.ietf.org/archive/id/draft-ietf-ohai-ohttp- | <https://datatracker.ietf.org/doc/html/draft-ietf-ohai- | |||
05.txt>. | ohttp-08>. | |||
[I-D.ietf-ppm-dap] | [I-D.ietf-ppm-dap] | |||
Geoghegan, T., Patton, C., Rescorla, E., and C. Wood, | , , , and , "Distributed Aggregation Protocol for Privacy | |||
"Distributed Aggregation Protocol for Privacy Preserving | Preserving Measurement", draft-ietf-ppm-dap-05 (work in | |||
Measurement", draft-ietf-ppm-dap-02 (work in progress), | progress), July 2023, | |||
September 2022, <https://www.ietf.org/archive/id/draft- | <https://datatracker.ietf.org/api/v1/doc/document/draft- | |||
ietf-ppm-dap-02.txt>. | ietf-ppm-dap/>. | |||
[I-D.lazanski-smart-users-internet] | [I-D.lazanski-smart-users-internet] | |||
Dominique Lazanski, , "An Internet for Users Again", | Lazanski, D., "An Internet for Users Again", draft- | |||
draft-lazanski-smart-users-internet-00 (work in progress), | lazanski-smart-users-internet-00 (work in progress), July | |||
July 2019, <https://www.ietf.org/archive/id/draft- | 2019, <https://datatracker.ietf.org/doc/html/draft- | |||
lazanski-smart-users-internet-00.txt>. | lazanski-smart-users-internet-00>. | |||
[I-D.pauly-dprive-oblivious-doh] | [I-D.pauly-dprive-oblivious-doh] | |||
Eric Kinnear, , Patrick McManus, , Tommy Pauly, , Tanya | Kinnear, E., McManus, P., Pauly, T., Verma, T., and C. | |||
Verma, , and A. Christopher Wood, "Oblivious DNS Over | Wood, "Oblivious DNS over HTTPS", draft-pauly-dprive- | |||
HTTPS", draft-pauly-dprive-oblivious-doh-11 (work in | oblivious-doh-11 (work in progress), February 2022, | |||
progress), February 2022, | <https://datatracker.ietf.org/doc/html/draft-pauly-dprive- | |||
<https://www.ietf.org/archive/id/draft-pauly-dprive- | oblivious-doh-11>. | |||
oblivious-doh-11.txt>. | ||||
[I-D.thomson-tmi] | [I-D.thomson-tmi] | |||
Martin Thomson, , "Principles for the Involvement of | Thomson, M., "Principles for the Involvement of | |||
Intermediaries in Internet Protocols", draft-thomson- | Intermediaries in Internet Protocols", draft-thomson- | |||
tmi-04 (work in progress), September 2022, | tmi-04 (work in progress), September 2022, | |||
<https://www.ietf.org/archive/id/draft-thomson-tmi- | <https://datatracker.ietf.org/doc/html/draft-thomson-tmi- | |||
04.txt>. | 04>. | |||
[I-D.wood-pearg-website-fingerprinting] | [I-D.wood-pearg-website-fingerprinting] | |||
Ian Goldberg, , Tao Wang, , and A. Christopher Wood, | Goldberg, I., Wang, T., and C. Wood, "Network-Based | |||
"Network-Based Website Fingerprinting", draft-wood-pearg- | Website Fingerprinting", draft-wood-pearg-website- | |||
website-fingerprinting-00 (work in progress), November | fingerprinting-00 (work in progress), November 2019, | |||
2019, <https://www.ietf.org/archive/id/draft-wood-pearg- | <https://datatracker.ietf.org/doc/html/draft-wood-pearg- | |||
website-fingerprinting-00.txt>. | website-fingerprinting-00>. | |||
[PoLP] Saltzer, J. and M. Schroader, "The Protection of | [PoLP] Saltzer, J. and M. Schroader, "The Protection of | |||
Information in Computer Systems", Fourth ACM Symposium on | Information in Computer Systems", Fourth ACM Symposium on | |||
Operating System Principles , October 1975. | Operating System Principles , October 1975. | |||
[RFC3552] Rescorla, E. and B. Korver, "Guidelines for Writing RFC | ||||
Text on Security Considerations", BCP 72, RFC 3552, | ||||
DOI 10.17487/RFC3552, July 2003, <https://www.rfc- | ||||
editor.org/info/rfc3552>. | ||||
[RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., | [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., | |||
Morris, J., Hansen, M., and R. Smith, "Privacy | Morris, J., Hansen, M., and R. Smith, "Privacy | |||
Considerations for Internet Protocols", RFC 6973, | Considerations for Internet Protocols", RFC 6973, | |||
DOI 10.17487/RFC6973, July 2013, <https://www.rfc- | DOI 10.17487/RFC6973, July 2013, <https://www.rfc- | |||
editor.org/info/rfc6973>. | editor.org/info/rfc6973>. | |||
[RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an | [RFC7816] Bortzmeyer, S., "DNS Query Name Minimisation to Improve | |||
Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May | Privacy", RFC 7816, DOI 10.17487/RFC7816, March 2016, | |||
2014, <https://www.rfc-editor.org/info/rfc7258>. | <https://www.rfc-editor.org/info/rfc7816>. | |||
[RFC7819] Jiang, S., Krishnan, S., and T. Mrugalski, "Privacy | ||||
Considerations for DHCP", RFC 7819, DOI 10.17487/RFC7819, | ||||
April 2016, <https://www.rfc-editor.org/info/rfc7819>. | ||||
[RFC7824] Krishnan, S., Mrugalski, T., and S. Jiang, "Privacy | ||||
Considerations for DHCPv6", RFC 7824, | ||||
DOI 10.17487/RFC7824, May 2016, <https://www.rfc- | ||||
editor.org/info/rfc7824>. | ||||
[RFC7844] Huitema, C., Mrugalski, T., and S. Krishnan, "Anonymity | ||||
Profiles for DHCP Clients", RFC 7844, | ||||
DOI 10.17487/RFC7844, May 2016, <https://www.rfc- | ||||
editor.org/info/rfc7844>. | ||||
[RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | [RFC7858] Hu, Z., Zhu, L., Heidemann, J., Mankin, A., Wessels, D., | |||
and P. Hoffman, "Specification for DNS over Transport | and P. Hoffman, "Specification for DNS over Transport | |||
Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | Layer Security (TLS)", RFC 7858, DOI 10.17487/RFC7858, May | |||
2016, <https://www.rfc-editor.org/info/rfc7858>. | 2016, <https://www.rfc-editor.org/info/rfc7858>. | |||
[RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol | ||||
Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, | ||||
<https://www.rfc-editor.org/info/rfc8446>. | ||||
[RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | [RFC8484] Hoffman, P. and P. McManus, "DNS Queries over HTTPS | |||
(DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, | (DoH)", RFC 8484, DOI 10.17487/RFC8484, October 2018, | |||
<https://www.rfc-editor.org/info/rfc8484>. | <https://www.rfc-editor.org/info/rfc8484>. | |||
[RFC8546] Trammell, B. and M. Kuehlewind, "The Wire Image of a | [RFC8546] Trammell, B. and M. Kuehlewind, "The Wire Image of a | |||
Network Protocol", RFC 8546, DOI 10.17487/RFC8546, April | Network Protocol", RFC 8546, DOI 10.17487/RFC8546, April | |||
2019, <https://www.rfc-editor.org/info/rfc8546>. | 2019, <https://www.rfc-editor.org/info/rfc8546>. | |||
[RFC8558] Hardie, T., Ed., "Transport Protocol Path Signals", | [RFC8558] Hardie, T., Ed., "Transport Protocol Path Signals", | |||
RFC 8558, DOI 10.17487/RFC8558, April 2019, | RFC 8558, DOI 10.17487/RFC8558, April 2019, | |||
skipping to change at page 9, line 51 | skipping to change at page 10, line 36 | |||
[RFC8980] Arkko, J. and T. Hardie, "Report from the IAB Workshop on | [RFC8980] Arkko, J. and T. Hardie, "Report from the IAB Workshop on | |||
Design Expectations vs. Deployment Reality in Protocol | Design Expectations vs. Deployment Reality in Protocol | |||
Development", RFC 8980, DOI 10.17487/RFC8980, February | Development", RFC 8980, DOI 10.17487/RFC8980, February | |||
2021, <https://www.rfc-editor.org/info/rfc8980>. | 2021, <https://www.rfc-editor.org/info/rfc8980>. | |||
[RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | [RFC9000] Iyengar, J., Ed. and M. Thomson, Ed., "QUIC: A UDP-Based | |||
Multiplexed and Secure Transport", RFC 9000, | Multiplexed and Secure Transport", RFC 9000, | |||
DOI 10.17487/RFC9000, May 2021, <https://www.rfc- | DOI 10.17487/RFC9000, May 2021, <https://www.rfc- | |||
editor.org/info/rfc9000>. | editor.org/info/rfc9000>. | |||
[RFC9076] Wicinski, T., Ed., "DNS Privacy Considerations", RFC 9076, | ||||
DOI 10.17487/RFC9076, July 2021, <https://www.rfc- | ||||
editor.org/info/rfc9076>. | ||||
[WP2021] Fowler, Geoffrey., "There's no escape from Facebook, even | [WP2021] Fowler, Geoffrey., "There's no escape from Facebook, even | |||
if you don't use it", Washington Post , August 2021. | if you don't use it", Washington Post , August 2021. | |||
Author's Address | Author's Address | |||
Jari Arkko | Jari Arkko | |||
Ericsson | Ericsson | |||
Valitie 1B | Valitie 1B | |||
Kauniainen | Kauniainen | |||
Finland | Finland | |||
End of changes. 50 change blocks. | ||||
201 lines changed or deleted | 244 lines changed or added | |||
This html diff was produced by rfcdiff 1.42. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ |