draft-ietf-mip6-location-privacy-ps-04.txt | draft-ietf-mip6-location-privacy-ps-05.txt | |||
---|---|---|---|---|
MIP6 Working Group Rajeev Koodli | MIP6 Working Group Rajeev Koodli | |||
INTERNET DRAFT Nokia Research Center | INTERNET DRAFT Nokia Research Center | |||
Informational | Informational | |||
23 October 2006 | 2 February 2007 | |||
IP Address Location Privacy and Mobile IPv6: Problem Statement | IP Address Location Privacy and Mobile IPv6: Problem Statement | |||
draft-ietf-mip6-location-privacy-ps-04.txt | draft-ietf-mip6-location-privacy-ps-05.txt | |||
By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
Task Force (IETF), its areas, and its working groups. Note | Task Force (IETF), its areas, and its working groups. Note | |||
that other groups may also distribute working documents as | that other groups may also distribute working documents as | |||
Internet-Drafts. | Internet-Drafts. | |||
Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of | |||
and may be updated, replaced, or obsoleted by other documents at | six months and may be updated, replaced, or obsoleted by other | |||
any time. It is inappropriate to use Internet-Drafts as reference | documents at any time. It is inappropriate to use Internet-Drafts | |||
material or to cite them other than as "work in progress." | as reference material or to cite them other than as "work in | |||
progress." | ||||
The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
This document is a submission of the IETF MIP6 WG. Comments should be | This document is a submission of the IETF MIP6 WG. Comments should | |||
directed to the MIP6 WG mailing list, mip6@ietf.org. | be directed to the MIP6 WG mailing list, mip6@ietf.org. | |||
Abstract | Abstract | |||
In this document, we discuss Location Privacy as applicable to | In this document, we discuss Location Privacy as applicable to | |||
Mobile IPv6. We document the concerns arising from revealing Home | Mobile IPv6. We document the concerns arising from revealing Home | |||
Address to an on-looker and from disclosing Care of Address to a | Address to an on-looker and from disclosing Care of Address to a | |||
correspondent. | correspondent. | |||
Contents | Contents | |||
Abstract i | Abstract i | |||
1. Introduction 1 | 1. Introduction 1 | |||
2. Problem Definition 2 | 2. Definitions 3 | |||
2.1. Disclosing the Care of Address to the Correspondent Node 2 | ||||
2.2. Revealing the Home Address to On-lookers . . . . . . . . 3 | ||||
2.3. Problem Scope . . . . . . . . . . . . . . . . . . . . . . 3 | ||||
3. Problem Illustration 3 | 3. Problem Definition 4 | |||
3.1. Disclosing the Care-of Address to the Correspondent Node 4 | ||||
3.2. Revealing the Home Address to On-lookers . . . . . . . 4 | ||||
3.3. Problem Scope . . . . . . . . . . . . . . . . . 4 | ||||
4. Conclusion 5 | 4. Problem Illustration 5 | |||
5. IANA Considerations 6 | 5. Conclusion 8 | |||
6. Security Considerations 6 | 6. IANA Considerations 8 | |||
7. Acknowledgment 6 | 7. Security Considerations 8 | |||
8. Author's Address 6 | 8. Acknowledgment 9 | |||
A. Background 7 | 9. References 9 | |||
9.1. Normative References . . . . . . . . . . . . . . 9 | ||||
9.2. Informative References . . . . . . . . . . . . . 9 | ||||
Intellectual Property Statement 7 | 10. Author's Address 10 | |||
Disclaimer of Validity 8 | A. Background 11 | |||
Copyright Statement 8 | Intellectual Property Statement 12 | |||
Acknowledgment 8 | Disclaimer of Validity 12 | |||
Copyright Statement 13 | ||||
Acknowledgment 13 | ||||
1. Introduction | 1. Introduction | |||
The problems of location privacy, and privacy when using IP for | The problems of location privacy, and privacy when using IP | |||
communication have become important. IP privacy is broadly concerned | for communication have become important. IP privacy is broadly | |||
with protecting user communication from unwittingly revealing | concerned with protecting user communication from unwittingly | |||
information that could be used to analyze and gather sensitive user | revealing information that could be used to analyze and gather | |||
data. Examples include gathering data at certain vantage points, | sensitive user data. Examples include gathering data at certain | |||
collecting information related to specific traffic, and monitoring | vantage points, collecting information related to specific traffic, | |||
(perhaps) certain populations of users for activity during specific | and monitoring (perhaps) certain populations of users for activity | |||
times of the day, etc. In this document, we refer to this as the | during specific times of the day, etc. In this document, we refer | |||
"profiling" problem. | to this as the "profiling" problem. | |||
Location privacy is concerned with the problem of revealing roaming, | Location privacy is concerned with the problem of revealing | |||
which we define here as the process of a Mobile Node moving from one | roaming, which we define here as the process of a Mobile Node | |||
network to another with or without on-going sessions. A constant | (MN) moving from one network to another with or without on-going | |||
identifier with global scope can reveal roaming. Such a global scope | sessions. A constant identifier with global scope can reveal | |||
identifier could be a device identifier or a user identifier. Often, | roaming. Examples are a device identifier such as an IP address, | |||
a binding between these two identifiers is also available, e.g., | and a user identifier such as a SIP [9] URI [2]. Often, a binding | |||
through DNS. The location privacy problem is particularly applicable | between these two identifiers is available, e.g., through DNS [5]. | |||
to Mobile IP where the Home Address on a visited network can reveal | Traffic analysis of such IP and Upper Layer Protocol identifiers | |||
device roaming and, together with a user identifier (such as a SIP | on single network can indicate device and user roaming. Roaming | |||
URI), can reveal user roaming. Even when the binding between a user | could also be inferred by means of profiling constant fields in IP | |||
identifier and the Home Address is unavailable, freely available | communication across multiple network movements. For example, an | |||
tools on the Internet can map the Home Address to the owner of the | Interface Identifier (IID) [10 ] in the IPv6 address that remains | |||
Home Prefix, which can reveal that a user from a particular ISP | unchanged across networks could suggest roaming. The SPI in the | |||
has roamed. So, the location privacy problem is a subset of the | IPsec [4] header is another field that may be subject to such | |||
profiling problem in which revealing a globally visible identifier | profiling and inference. Inferring roaming in this way typically | |||
compromises a user's location privacy. When location privacy is | requires traffic analysis across multiple networks, or colluding | |||
compromised, it could lead to more targetted profiling. | attackers, or both. When location privacy is compromised, it could | |||
lead to more targetted profiling of user communication. | ||||
Furthermore, a user may not wish to reveal roaming to | As can be seen, the location privacy problem spans multiple | |||
correspondent(s). In Mobile IP, this translates to the use | protocol layers. Nevertheless, it is important to understand and | |||
of Care of Address. As with Home Address, the Care of Address can | specify the problem as applicable to concerned protocols in order | |||
also reveal the topological location of the Mobile Node. | to at least mitigate the effects of the problem. In this context, | |||
it is particularly important to Mobile IP, which defines a global | ||||
identifier (Home Address) that can reveal device roaming, and in | ||||
conjunction with a corresponding user identifier (such as a SIP | ||||
URI), can also reveal user roaming. Furthermore, a user may not | ||||
wish to reveal roaming to correspondent(s), which translates to the | ||||
use of Care-of Address. As with Home Address, the Care-of Address | ||||
can also reveal the topological location of the Mobile Node. | ||||
In this document, the concerns arising from the use of a globally | This document describes the concerns arising from the use of Home | |||
visible identifier, such as a Home Address, when roaming are | Address from a visited network. This document also outlines the | |||
described. Similarly, the concerns from revealing a Care of Address | considerations in disclosing a Care-of Address. This document | |||
to a correspondent are also outlined. The solutions to these | is primarily concerned with the vulnerabilities arising from | |||
problems are meant to be specified in a separate document. | possible traffic analysis along the MN - CN path and the MN - HA | |||
path, where the disclosure of Mobile IP addresses is sufficient to | ||||
reveal roaming. This document does not consider inferring roaming | ||||
from profiling fields such as an IID or an SPI for the following | ||||
reasons: First, such inference could be done independently, so the | ||||
problem is not specific to Mobile IP. Second, with Mobile IP, it | ||||
is sufficient to simply monitor the usage of Home Address from a | ||||
single visited network in order to deduce roaming. In other words, | ||||
the attackers need not conduct traffic profiling across multiple | ||||
networks, or collude with each other, or do both in order to infer | ||||
roaming when Mobile IP is used. Hence, we limit the scope of this | ||||
document to revealing the Mobile IP addresses. | ||||
This document is only concerned with IP Address Location Privacy in | This document is only concerned with IP Address Location Privacy | |||
the context of Mobile IPv6. It does not address the overall privacy | in the context of Mobile IPv6. It does not address the overall | |||
problem. For instance, it does not address privacy issues related to | privacy problem. For instance, it does not address privacy | |||
MAC addresses or the relationship of IP and MAC addresses [1]. | issues related to MAC addresses or the relationship of IP and MAC | |||
addresses [3], or the Upper Layer Protocol addresses. Solution | ||||
to the problem specified here should provide protection against | ||||
roaming disclosure due to using Mobile IPv6 addresses from a | ||||
visited network. | ||||
2. Problem Definition | This document assumes that the reader is familiar with the basic | |||
operation of Mobile IPv6 [1] and the associated terminology defined | ||||
therein. For convenience, we provide some definitions below. | ||||
2.1. Disclosing the Care of Address to the Correspondent Node | 2. Definitions | |||
When a Mobile IP MN roams from its home network to a visited network | - Mobile Node (MN): A Mobile IPv6 Mobile Node that freely roams | |||
or from one visited network to another, use of Care of Address in | around networks | |||
communication with a correspondent reveals that the MN has roamed. | ||||
This assumes that the correspondent is able to associate the CoA to | ||||
HoA, for instance by inspecting the Binding Cache Entry. The HoA | ||||
itself is assumed to have been obtained by whatever means (e.g., | ||||
through DNS lookup). | ||||
2.2. Revealing the Home Address to On-lookers | - Correspondent Node (CN): A Mobile IPv6 that node corresponds | |||
with a MN | ||||
When a Mobile IP MN roams from its home network to a visited network | - Home Network: The network where the MN is normally present | |||
or from one visited network to another, use of Home Address in | when it is not roaming | |||
communication reveals to an on-looker that the MN has roamed. When | ||||
a binding of Home Address to a user identifier (such as a SIP | ||||
URI or NAI) is available, the Home Address can be used to also | ||||
determine that the user has roamed. This problem is independent of | ||||
whether the MN uses Care of Address to communicate directly with the | ||||
correspondent (i.e., uses route optimization), or the MN communicates | ||||
via the Home Agent (i.e., uses reverse tunneling). | ||||
Location privacy may be compromised if an on-looker is present on | - Visited Network: A network which a MN uses to access Internet | |||
the MN - HA path (when bidirectional tunneling is used), or when the | when it is roaming | |||
on-looker is present on the MN and CN path (when route optimization | ||||
is used). | ||||
2.3. Problem Scope | - Home Agent: A router on the MN's home network which provides | |||
forwarding support when the MN is roaming | ||||
With existing Mobile IPv6 solutions, there is some protection against | - Home Address (HoA): The MN's unicast IP address valid on its | |||
location privacy. If a Mobile Node uses reverse tunneling with ESP | home network | |||
encryption, then the HoA is not revealed on the MN - HA path. So, | ||||
eavesdroppers on the MN - HA path cannot determine roaming. They | - Care-of Address (CoA): The MN's unicast IP address valid on the | |||
could, however, still profile fields in the ESP header; however, this | visited network | |||
problem is not specific to Mobile IPv6 location privacy. | ||||
- Reverse Tunneling or Bidirectional Tunneling: A mechanism used | ||||
for packet forwarding between the MN and its Home Agent | ||||
- Route Optimization: A mechanism which allows direct routing | ||||
of packets between a roaming MN and its CN, without having to | ||||
traverse the home network. | ||||
3. Problem Definition | ||||
3.1. Disclosing the Care-of Address to the Correspondent Node | ||||
When a Mobile IP MN roams from its home network to a visited | ||||
network or from one visited network to another, use of Care-of | ||||
Address in communication with a correspondent reveals that the | ||||
MN has roamed. This assumes that the correspondent is able to | ||||
associate the Care-of Address to Home Address, for instance by | ||||
inspecting the Binding Cache Entry. The Home Address itself is | ||||
assumed to have been obtained by whatever means (e.g., through DNS | ||||
lookup). | ||||
3.2. Revealing the Home Address to On-lookers | ||||
When a Mobile IP MN roams from its home network to a visited | ||||
network or from one visited network to another, use of Home Address | ||||
in communication reveals to an on-looker that the MN has roamed. | ||||
When a binding of Home Address to a user identifier (such as | ||||
a SIP URI) is available, the Home Address can be used to also | ||||
determine that the user has roamed. This problem is independent | ||||
of whether the MN uses Care-of Address to communicate directly | ||||
with the correspondent (i.e., uses route optimization), or the MN | ||||
communicates via the Home Agent (i.e., uses reverse tunneling). | ||||
Location privacy may be compromised if an on-looker is present | ||||
on the MN - HA path (when bidirectional tunneling is used), or | ||||
when the on-looker is present on the MN and CN path (when route | ||||
optimization is used). | ||||
3.3. Problem Scope | ||||
With existing Mobile IPv6 solutions, there is some protection | ||||
against location privacy. If a Mobile Node uses reverse tunneling | ||||
with ESP encryption, then the Home Address is not revealed on | ||||
the MN - HA path. So, eavesdroppers on the MN - HA path cannot | ||||
determine roaming. They could, however, still profile fields in | ||||
the ESP header; however, this problem is not specific to Mobile | ||||
IPv6 location privacy. | ||||
When a MN uses reverse tunneling (regardless of ESP encryption), | When a MN uses reverse tunneling (regardless of ESP encryption), | |||
the correspondent does not have access to the CoA. Hence, it cannot | the correspondent does not have access to the Care-of Address. | |||
determine that the MN has roamed. | Hence, it cannot determine that the MN has roamed. | |||
Hence, the location privacy problem is particularly applicable when | Hence, the location privacy problem is particularly applicable when | |||
Mobile IPv6 route optimization is used or when reverse tunneling is | Mobile IPv6 route optimization is used or when reverse tunneling | |||
used without protecting the inner IP packet containing the HoA. | is used without protecting the inner IP packet containing the Home | |||
Address. | ||||
3. Problem Illustration | 4. Problem Illustration | |||
This section is intended to provide an illustration of the problem | This section is intended to provide an illustration of the problem | |||
defined in the previous section. | defined in the previous section. | |||
Consider a Mobile Node at its home network. Whenever it is involved | Consider a Mobile Node at its home network. Whenever it is | |||
in IP communication, its correspondents can see an IP address valid | involved in IP communication, its correspondents can see an | |||
on the home network. Elaborating further, the users involved in peer | IP address valid on the home network. Elaborating further, | |||
- peer communication are likely to see a user-friendly identifier | the users involved in peer - peer communication are likely | |||
such as a SIP URI, and the communication end-points in the IP | to see a user-friendly identifier such as a SIP URI, and the | |||
stack will see IP addresses. Users uninterested in or unaware of | communication end-points in the IP stack will see IP addresses. | |||
IP communication details will not see any difference when the MN | Users uninterested in or unaware of IP communication details will | |||
acquires a new IP address. Of course any user can ``tcpdump'' or | not see any difference when the MN acquires a new IP address. | |||
``ethereal'' a session, capture IP packets and map the MN's IP | Of course any user can ``tcpdump'' or ``ethereal'' a session, | |||
address to an approximate geo-location. This mapping may reveal | capture IP packets and map the MN's IP address to an approximate | |||
the "home location" of a user, but a correspondent cannot ascertain | geo-location. This mapping may reveal the home location of a | |||
whether the user has actually roamed or not. Assessing the physical | user, but a correspondent cannot ascertain whether the user has | |||
location based on IP addresses has some similarities to assessing the | actually roamed or not. Assessing the physical location based on | |||
geographical location based on the area-code of a telephone number. | IP addresses has some similarities to assessing the geographical | |||
The granularity of the physical area corresponding to an IP address | location based on the area-code of a telephone number. The | |||
can vary depending on how sophisticated the available tools are, how | granularity of the physical area corresponding to an IP address | |||
often an ISP conducts its network re-numbering, etc. And, an IP | can vary depending on how sophisticated the available tools are, | |||
address cannot also guarantee that a peer is at a certain geographic | how often an ISP conducts its network re-numbering, etc. And, | |||
area due to technologies such as VPN and tunneling. | an IP address cannot also guarantee that a peer is at a certain | |||
geographic area due to technologies such as VPN and tunneling. | ||||
When the MN roams to another network, the location privacy problem | When the MN roams to another network, the location privacy problem | |||
consists of two parts: revealing information to its correspondents | consists of two parts: revealing information to its correspondents | |||
and to on-lookers. | and to on-lookers. | |||
With its correspondents, the MN can either communicate directly or | With its correspondents, the MN can either communicate directly | |||
reverse tunnel its packets through the Home Agent. Using reverse | or reverse tunnel its packets through the Home Agent. Using | |||
tunneling does not reveal the new IP address of the MN, although | reverse tunneling does not reveal Care-of Address of the MN, | |||
end-to-end delay may vary depending on the particular scenario. With | although end-to-end delay may vary depending on the particular | |||
those correspondents with which it can disclose its new IP address | scenario. With those correspondents with which it can disclose its | |||
``on the wire'', the MN has the option of using route-optimized | Care-of Address ``on the wire'', the MN has the option of using | |||
communication. The transport protocol still sees the Home Address | route-optimized communication. The transport protocol still sees | |||
with route optimization. Unless the correspondent runs some | the Home Address with route optimization. Unless the correspondent | |||
packet capturing utility, the user cannot see which mode (reverse | runs some packet capturing utility, the user cannot see which mode | |||
tunneling or route optimization) is being used, but knows that it is | (reverse tunneling or route optimization) is being used, but knows | |||
communicating with the same peer whose URI it knows. This is similar | that it is communicating with the same peer whose URI it knows. | |||
to conversing with a roaming cellphone user whose phone number, like | This is similar to conversing with a roaming cellphone user whose | |||
the URI, remains unchanged. | phone number, like the URI, remains unchanged. | |||
Regardless of whether the MN uses route optimization or reverse | Regardless of whether the MN uses route optimization or reverse | |||
tunneling (without ESP encryption), its Home Address is revealed in | tunneling (without ESP encryption), its Home Address is revealed | |||
data packets. When equipped with an ability to inspect packets ``on | in data packets. When equipped with an ability to inspect packets | |||
the wire'', an on-looker on the MN - HA path can determine that the | ``on the wire'', an on-looker on the MN - HA path can determine | |||
MN has roamed and could possibly also determine that the user has | that the MN has roamed and could possibly also determine that | |||
roamed. This could compromise the location privacy even if the MN | the user has roamed. This could compromise the location privacy | |||
took steps to hide its roaming information from a correspondent. | even if the MN took steps to hide its roaming information from a | |||
correspondent. | ||||
The above description is valid regardless of whether a Home Address | The above description is valid regardless of whether a Home Address | |||
is statically allocated or is dynamically allocated. In either | is statically allocated or is dynamically allocated. In either | |||
case, the mapping of IP address to geo-location will most likely | case, the mapping of IP address to geo-location will most likely | |||
yield results with the same level of granularity. With the freely | yield results with the same level of granularity. With the freely | |||
available tools on the Internet, this granularity is the physical | available tools on the Internet, this granularity is the physical | |||
address of the ISP or the organization which registers ownership of | address of the ISP or the organization which registers ownership of | |||
a prefix chunk. Since an ISP or an organization is not, rightly, | a prefix chunk. Since an ISP or an organization is not, rightly, | |||
required to provide a blue-print of its subnets, the granularity | required to provide a blue-print of its subnets, the granularity | |||
remains fairly coarse for a mobile wireless network. However, | remains fairly coarse for a mobile wireless network. However, | |||
sophisticated attackers might be able to conduct site mapping and | sophisticated attackers might be able to conduct site mapping and | |||
obtain more fine-grained subnet information. | obtain more fine-grained subnet information. | |||
A compromise in location privacy could lead to more targetted | A compromise in location privacy could lead to more targetted | |||
profiling of user data. An eavesdropper may specifically track the | profiling of user data. An eavesdropper may specifically track | |||
traffic containing the Home Address, and monitor the movement of the | the traffic containing the Home Address, and monitor the movement | |||
Mobile Node with changing Care of Address. The profiling problem is | of the Mobile Node with changing Care-of Address. The profiling | |||
not specific to Mobile IPv6, but could be triggered by a compromise | problem is not specific to Mobile IPv6, but could be triggered | |||
in location privacy due to revealing the Home Address. | by a compromise in location privacy due to revealing the Home | |||
A correspondent may take advantage of the knowledge that a user | Address. A correspondent may take advantage of the knowledge that | |||
has roamed when Care of Address is revealed, and modulate actions | a user has roamed when Care-of Address is revealed, and modulate | |||
based on such a knowledge. Such an information could cause concern | actions based on such a knowledge. Such an information could cause | |||
to a mobile user especially when the correspondent turns out be | concern to a mobile user especially when the correspondent turns | |||
untrustworthy. | out be untrustworthy. For these reasons, appropriate management | |||
interfaces on the MN to guard against the misuse of location | ||||
information should be considered. | ||||
Applying existing techniques to thwart profiling may have | Applying existing techniques to thwart profiling may have | |||
implications to Mobile IPv6 signaling performance. For instance, | implications to Mobile IPv6 signaling performance. For instance, | |||
changing the Care of Address often would cause additional Return | changing the Care-of Address often would cause additional Return | |||
Routability and binding management signaling. And, changing the | Routability [1] and binding management signaling. And, changing | |||
Home Address often has implications on IPsec security association | the Home Address often has implications on IPsec security | |||
management. Solutions should be careful in considering the cost of | association management. Solutions should be careful in considering | |||
change of either CoA or HoA on signaling. For instance, changing the | the cost of change of either Care-of Address or Home Address on | |||
Care of Address often would cause additional Return Routability and | signaling. | |||
binding management signaling. And, changing the Home Address often | ||||
has implications on IPsec security association management. These | ||||
issues need to be addressed in the solutions These issues should be | ||||
addressed in the solutions. | ||||
When roaming, a MN may treat its home network nodes as any other | When roaming, a MN may treat its home network nodes as any other | |||
correspondents. Reverse tunneling is perhaps sufficient for home | correspondents. Reverse tunneling is perhaps sufficient for home | |||
network communication, since route-optimized communication will | network communication, since route-optimized communication will | |||
traverse the identical path. Hence, a MN can avoid revealing its | traverse the identical path. Hence, a MN can avoid revealing its | |||
Care of Address to its home network correspondents simply by using | Care-of Address to its home network correspondents simply by using | |||
reverse tunneling. The Proxy Neighbor Advertisements from the Home | reverse tunneling. The Proxy Neighbor Advertisements [7] from the | |||
Agent could serve as hints to the home network nodes that the Mobile | Home Agent could serve as hints to the home network nodes that the | |||
Node is away. However, they won't be able to know the Mobile Node's | Mobile Node is away. However, they will not be able to know the | |||
current point of attachment unless the MN uses route optimization | Mobile Node's current point of attachment unless the MN uses route | |||
with them. | optimization with them. | |||
4. Conclusion | 5. Conclusion | |||
In this document, we have discussed the location privacy problem | In this document, we have discussed the location privacy problem | |||
as applicable to Mobile IPv6. The problem can be summarized as | as applicable to Mobile IPv6. The problem can be summarized | |||
follows: disclosing Care of Address to a correspondent and revealing | as follows: disclosing Care-of Address to a correspondent and | |||
Home Address to an on-looker can compromise the location privacy | revealing Home Address to an on-looker can compromise the location | |||
of a Mobile Node, and hence that of a user. We have seen that | privacy of a Mobile Node, and hence that of a user. We have seen | |||
bidirectional tunneling allows a MN to protect its CoA to the CN. | that bidirectional tunneling allows a MN to protect its Care-of | |||
And, ESP encryption of inner IP packet allows the MN to protect its | Address to the CN. And, ESP encryption of inner IP packet allows | |||
HoA from the on-lookers on the MN - HA path. | the MN to protect its Home Address from the on-lookers on the MN - | |||
HA path. However, with route optimization, the MN will reveal its | ||||
However, with route optimization, the MN will reveal its CoA to the | Care-of Address to the CN. Moreover, route optimization causes the | |||
CN. Moreover, route optimization causes the HoA to be revealed to | Home Address to be revealed to on-lookers in the data packets as | |||
on-lookers in the data packets as well as in Mobile IPv6 signaling | well as in Mobile IPv6 signaling messages. The solutions to this | |||
messages. The solutions to this problem are expected to be protocol | problem are expected to be protocol specifications assuming the | |||
specifications assuming the existing Mobile IPv6 functional entities, | existing Mobile IPv6 functional entities, namely, the Mobile Node, | |||
namely, the Mobile Node, its Home Agent and the Correspondent Node. | its Home Agent and the Correspondent Node. | |||
5. IANA Considerations | 6. IANA Considerations | |||
There are no IANA considerations introduced by this draft. | There are no IANA considerations introduced by this draft. | |||
6. Security Considerations | 7. Security Considerations | |||
This document discusses location privacy because of IP mobility. | This document discusses the location privacy problem specific to | |||
Solutions to provide location privacy, especially any signaling over | Mobile IPv6. Any solution must be able to protect (e.g., using | |||
the Internet, must be secure in order to be effective. Individual | encryption) the Home Address from disclosure to on-lookers in | |||
solutions must describe the security implications. | data packets when using route optimization or reverse tunneling. | |||
In addition, solutions must consider protecting the Mobile IPv6 | ||||
signaling messages from disclosing the Home Address along the MN - | ||||
HA and MN - CN paths. | ||||
7. Acknowledgment | Disclosing the Care-of Address is inevitable if a MN wishes to | |||
use route optimization. Regardless of whether Care-of Address | ||||
is an on-link address of the MN on the visited link or that of | ||||
a co-operating proxy, mere presence of Binding Cache entry is | ||||
sufficient for a CN to ascertain roaming. Hence, a MN concerned | ||||
with location privacy should exercise prudence in determining | ||||
whether to use route optimization with, especially previously | ||||
unacquainted, correspondents. | ||||
Thanks to James Kempf, Qiu Ying and Sam Xia for the review and | The solutions should also consider the use of temporary addresses | |||
feedback. Thanks to Jari Arkko and Kilian Weniger for the last call | and their implications on Mobile IPv6 signaling as discussed in | |||
review and for suggesting improvements and text. | Section 4. Use of IP addresses with privacy extensions [6] could | |||
be especially useful for Care-of Addresses if appropriate tradeoffs | ||||
with Return Routability signaling are taken into account. | ||||
Informative References | 8. Acknowledgment | |||
[1] W. Haddad and et al. Privacy for Mobile and Multi-homed Nodes: | Thanks to James Kempf, Qiu Ying, Sam Xia and Lakshminath Dondeti | |||
MoMiPriv Problem Statement (work in progress). Internet Draft, | for the review and feedback. Thanks to Jari Arkko and Kilian | |||
Internet Engineering Task Force, October 2004. | Weniger for the last call review and for suggesting improvements | |||
and text. | ||||
[2] J. Polk, J. Schnizlein, and M. Linsner. DHCP Option for | 9. References | |||
Coordinate-based Location Configuration Information. Request for | ||||
Comments 3825, Internet Engineering Task Force, July 2004. | ||||
8. Author's Address | 9.1. Normative References | |||
[1] D. Johnson, C. Perkins, and J. Arkko. Mobility Support in | ||||
IPv6. Request for Comments 3775, Internet Engineering Task | ||||
Force, June 2004. | ||||
9.2. Informative References | ||||
[2] T. Berners-Lee, R. Fielding, and L. Masinter. Uniform Resource | ||||
Identifiers (URI): Generic Syntax. Request for Comments (Draft | ||||
Standard) 2396, Internet Engineering Task Force, August 1998. | ||||
[3] W. Haddad and et al., Privacy for Mobile and Multi-homed | ||||
Nodes: MoMiPriv Problem Statement (work in progress). | ||||
Internet Draft, Internet Engineering Task Force, October 2004. | ||||
[4] S. Kent and K. Seo. Security Architecture for the Internet | ||||
Protocol. Request for Comments (Proposed Standard) 4301, | ||||
Internet Engineering Task Force, December 2005. | ||||
[5] P. V. Mockapetris. Domain names - implementation and | ||||
specification. Request for Comments (Standard) 1035, Internet | ||||
Engineering Task Force, November 1987. | ||||
[6] T. Narten and R. Draves. Privacy Extensions for Stateless | ||||
Address Autoconfiguration in IPv6. Request for Comments 3041, | ||||
Internet Engineering Task Force, January 2001. | ||||
[7] T. Narten, E. Nordmark, and W. Simpson. Neighbor Discovery for | ||||
IP Version 6 (IPv6). Request for Comments (Draft Standard) | ||||
2461, Internet Engineering Task Force, December 1998. | ||||
[8] J. Polk, J. Schnizlein, and M. Linsner. DHCP Option for | ||||
Coordinate-based Location Configuration Information. Request | ||||
for Comments 3825, Internet Engineering Task Force, July 2004. | ||||
[9] J. Rosenberg and et al. SIP: Session Initiation Protocol. | ||||
Request for Comments (Proposed Standard) 3261, Internet | ||||
Engineering Task Force, June 2002. | ||||
[10] S. Thomson and T. Narten. IPv6 Stateless Address | ||||
Autoconfiguration. Request for Comments (Draft Standard) 2462, | ||||
Internet Engineering Task Force, December 1998. | ||||
10. Author's Address | ||||
Rajeev Koodli | Rajeev Koodli | |||
Nokia Research Center | Nokia Research Center | |||
313 Fairchild Drive | 975 Page Mill Road, 200 | |||
Mountain View, CA 94043 USA | Palo Alto, CA 94034 USA | |||
Phone: +1 650 625 2359 | Phone: +1 408 425 6684 | |||
Fax: +1 650 625 2502 | Fax: +1 650 625 2502 | |||
E-Mail: Rajeev.Koodli@nokia.com | E-Mail: Rajeev.Koodli@nokia.com | |||
A. Background | A. Background | |||
The location privacy topic is broad and often has different | The location privacy topic is broad and often has different | |||
connotations. It also spans multiple layers in the OSI reference | connotations. It also spans multiple layers in the OSI reference | |||
model. Besides, there are attributes beyond an IP address alone | model. Besides, there are attributes beyond an IP address alone | |||
that can reveal hints about location. For instance, even if a | that can reveal hints about location. For instance, even if a | |||
correspondent is communicating with the same end-point it is used | correspondent is communicating with the same end-point it is used | |||
to, the ``time of the day'' attribute can reveal a hint to the | to, the ``time of the day'' attribute can reveal a hint to the | |||
user. Some roaming cellphone users may have noticed that their SMS | user. Some roaming cellphone users may have noticed that their SMS | |||
messages carry a timestamp of their ``home network'' timezone (for | messages carry a timestamp of their ``home network'' timezone (for | |||
skipping to change at page 7, line 22 | skipping to change at page 11, line 27 | |||
user. Some roaming cellphone users may have noticed that their SMS | user. Some roaming cellphone users may have noticed that their SMS | |||
messages carry a timestamp of their ``home network'' timezone (for | messages carry a timestamp of their ``home network'' timezone (for | |||
location privacy or otherwise) which can reveal that the user is in | location privacy or otherwise) which can reveal that the user is in | |||
a different timezone when messages are sent during ``normal'' time | a different timezone when messages are sent during ``normal'' time | |||
of the day. Furthermore, tools exist on the Internet which can map | of the day. Furthermore, tools exist on the Internet which can map | |||
an IP address to the physical address of an ISP or the organization | an IP address to the physical address of an ISP or the organization | |||
which owns the prefix chunk. Taking this to another step, with | which owns the prefix chunk. Taking this to another step, with | |||
in-built GPS receivers on IP hosts, applications can be devised | in-built GPS receivers on IP hosts, applications can be devised | |||
to map geo-locations to IP network information. Even without GPS | to map geo-locations to IP network information. Even without GPS | |||
receivers, geo-location can also be obtained in environments where | receivers, geo-location can also be obtained in environments where | |||
[Geopriv] is supported, for instance as a DHCP option [2]. | [Geopriv] is supported, for instance as a DHCP option [8]. | |||
In summary, a user's physical location can be determined or guessed | In summary, a user's physical location can be determined or | |||
with some certainty and with varying levels of granularity by | guessed with some certainty and with varying levels of granularity | |||
different means even though IP addresses themselves do not inherently | by different means even though IP addresses themselves do not | |||
provide any geo-location information. It is perhaps useful to bear | inherently provide any geo-location information. It is perhaps | |||
this broad scope in mind as the problem of IP address location | useful to bear this broad scope in mind as the problem of IP | |||
privacy in the presence of IP Mobility is addressed. | address location privacy in the presence of IP Mobility is | |||
addressed. | ||||
Intellectual Property Statement | Intellectual Property Statement | |||
The IETF takes no position regarding the validity or scope of any | The IETF takes no position regarding the validity or scope of | |||
Intellectual Property Rights or other rights that might be claimed to | any Intellectual Property Rights or other rights that might be | |||
pertain to the implementation or use of the technology described in | claimed to pertain to the implementation or use of the technology | |||
this document or the extent to which any license under such rights | described in this document or the extent to which any license | |||
might or might not be available; nor does it represent that it has | under such rights might or might not be available; nor does it | |||
made any independent effort to identify any such rights. Information | represent that it has made any independent effort to identify any | |||
on the procedures with respect to rights in RFC documents can be | such rights. Information on the procedures with respect to rights | |||
found in BCP 78 and BCP 79. | in RFC documents can be found in BCP 78 and BCP 79. | |||
Copies of IPR disclosures made to the IETF Secretariat and any | Copies of IPR disclosures made to the IETF Secretariat and any | |||
assurances of licenses to be made available, or the result of an | assurances of licenses to be made available, or the result of an | |||
attempt made to obtain a general license or permission for the | attempt made to obtain a general license or permission for the | |||
use of such proprietary rights by implementers or users of this | use of such proprietary rights by implementers or users of this | |||
specification can be obtained from the IETF on-line IPR repository at | specification can be obtained from the IETF on-line IPR repository | |||
http://www.ietf.org/ipr. | at http://www.ietf.org/ipr. | |||
The IETF invites any interested party to bring to its attention any | The IETF invites any interested party to bring to its attention any | |||
copyrights, patents or patent applications, or other proprietary | copyrights, patents or patent applications, or other proprietary | |||
rights that may cover technology that may be required to implement | rights that may cover technology that may be required to implement | |||
this standard. Please address the information to the IETF at | this standard. Please address the information to the IETF at | |||
ietf-ipr@ietf.org. | ietf-ipr@ietf.org. | |||
Disclaimer of Validity | Disclaimer of Validity | |||
This document and the information contained herein are provided | This document and the information contained herein are provided | |||
on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE | on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE | |||
REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE | REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE | |||
INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR | IETF TRUST, AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL | |||
IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF | WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY | |||
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED | WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE | |||
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. | ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS | |||
FOR A PARTICULAR PURPOSE. | ||||
Copyright Statement | Copyright Statement | |||
Copyright (C) The Internet Society (2006). This document is subject | Copyright (C) The IETF Trust (2007). | |||
to the rights, licenses and restrictions contained in BCP 78, and | ||||
except as set forth therein, the authors retain all their rights. | This document is subject to the rights, licenses and restrictions | |||
contained in BCP 78, and except as set forth therein, the authors | ||||
retain all their rights. | ||||
Acknowledgment | Acknowledgment | |||
Funding for the RFC Editor function is currently provided by the | Funding for the RFC Editor function is currently provided by the | |||
Internet Society. | Internet Society. | |||
End of changes. 57 change blocks. | ||||
222 lines changed or deleted | 349 lines changed or added | |||
This html diff was produced by rfcdiff 1.32. The latest version is available from http://www.levkowetz.com/ietf/tools/rfcdiff/ |