(we need your advice!) Jon Peterson MIT– December 2010 IETF & Privacy.

Slides:



Advertisements
Similar presentations
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Advertisements

Deployment Considerations for Dual-stack Lite IETF 80 Prague Yiu Lee, Roberta Magione, Carl Williams, Christian Jacquenet Mohamed Boucadair.
CST Computer Networks NAT CST 415 4/10/2017 CST Computer Networks.
 IPv6 Has built in security via IPsec (Internet Protocol Security). ◦ IPsec Operates at OSI layer 3 or internet layer of the Internet Protocol Suite.
Marla Azinger, Frontier Communications
IPv6 Privacy Hannes Tschofenig, Tara Whalen. Agenda Privacy Threats Layering Addressing Policy Questionnaire.
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
B. Davie, L. Peterson et al. draft-davie-cdni-framework-00.txt.
(4.4) Internet Protocols Layered approach to Internet Software 1.
IETF ECRIT update Marc Linsner 5/11/10. ECRIT Charter (or a piece of it) ………The group will show how the availability of location data and call routing.
IPv6 Address Provisioning In IPv6 world there are three provisioning aspects wich are independent of whether the IPv6 node is a Host or CE router: IPv6.
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
How do Networks work – Really The purposes of set of slides is to show networks really work. Most people (including technical people) don’t know Many people.
1 © 2015 Cisco and/or its affiliates. All rights reserved. IRTF icnrg interim meeting, 1/13/2015 Where are the opportunities for ICN in Sensor Networks?
An Operational Perspective on BGP Security Geoff Huston GROW WG IETF 63 August 2005.
Networks and Distributed Systems: Project Ideas
Chapter 1 Read (again) chapter 1.
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
Circuit & Application Level Gateways CS-431 Dick Steflik.
Postmodern Internet Architecture Defense Zhaosheng Zhu Kevin Tan.
A “net head” view on SIP Henning Schulzrinne Columbia University IRT Lab Siemens Munich -- January 2003.
Secure Network Design: Designing a Secure Local Area Network IT352 | Network Security |Najwa AlGhamdi1 Case Study
1 Issue Definition*: 6RD and IPv6 allocation policy Jan Žorž (Go6 Institute Slo) Mark Townsley (Cisco) *Or, Why we had to wake up on Friday to be here?
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
2002 년 2 학기이동인터넷프로토콜 1 Mobile IP:Overview 년 2 학기이동인터넷프로토콜 2 Mobile IP overview Is Mobile IP an official standard? What problems does Mobile IP solve?
CS 4720 Security CS 4720 – Web & Mobile Systems. CS 4720 The Traditional Security Model The Firewall Approach “Keep the good guys in and the bad guys.
Weiming Wang Institute of Networks and Communication Engineering Zhejiang Gongshang University, P. R.
4V6 – aka stateless 4Via6 stateless-4v6-00 W. Dec 1.
P2PSIP Charter Proposal Many people helped write this charter…
IPv6 Home Networking Architecture - update IETF homenet WG Interim meeting Philadelphia, 6 th Oct 2011 draft-chown-homenet-arch-00.
Lecture 8 Page 1 Advanced Network Security Review of Networking Basics: Internet Architecture, Routing, and Naming Advanced Network Security Peter Reiher.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
P2P SIP Names & Security Cullen Jennings
BCOP on Anti-Spoofing Long known problem Deployment status Reason for this work Where more input needed.
Requirements, Terminology and Framework for Exigent Communications H. Schulzrinne, S. Norreys, B. Rosen, H. Tschofenig.
IP Network Clearinghouse Solutions ENUM IP-Enabling The Global Telephone Directory Frank Estes Vice President , ext 224
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Russ Housley IETF Chair Internet2 Spring Member Meeting 28 April 2009 Successful Protocol Development.
(c) University of Technology, Sydney Firewall Architectures.
Internetworking Concept and Architectural Model
Doc.: IEEE /0691r0 Submission May 2011 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
1 Chapter 8 – TCP/IP Fundamentals TCP/IP Protocols IP Addressing.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP 2.0 TLS handling Magnus Westerlund draft-ietf-mmusic-rfc2326bis-12.
1 Miscellaneous Capabilities for IP Network Infrastructure IETF 64 Vancouver, BC, Canada November 2005.
S ECURING A N ETWORK : F IREWALLS, P ROXY S ERVERS, AND R OUTERS Defiana Arnaldy, M.Si
Managing the Use of Privacy Extensions for SLAAC in IPv6 (draft-gont-6man-managing-privacy- extensions-01.txt) Fernando Gont (UTN/FRH) Ron Broersma (DREN)
Protocol Privacy Considerations Russ Housley IETF Chair 8 December 2010.
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
IPv6 Site-Local Discussion Bob Hinden & Margaret Wasserman IETF 56 San Francisco March 2003.
An end-to-end usage of the IPv6 flow label
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
IPv6 - The Way Ahead Christian Huitema Architect Windows Networking & Communications
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
1 IPFIX Default Transport IPFIX IETF-58 November 10, 2003 Stewart Bryant Benoit Claise.
W3C Workshop on Languages for Privacy Policy Negotiation and Semantics- Driven Enforcement Report Hannes Tschofenig IETF 67, San Diego, November 2006.
Lecture 15 Page 1 CS 236 Online Evaluating Running Systems Evaluating system security requires knowing what’s going on Many steps are necessary for a full.
Fabric: A Retrospective on Evolving SDN Presented by: Tarek Elgamal.
IETF 83 CloudLog Gene Golovinsky March 25-30, 2012.
IPv6 Security Issues Georgios Koutepas, NTUA IPv6 Technology and Advanced Services Oct.19, 2004.
© 2015 Infoblox Inc. All Rights Reserved. Tom Coffeen, IPv6 Evangelist UKNOF January 2015 Tom Coffeen, IPv6 Evangelist UKNOF January 2015 DHCPv6 Operational.
Computer Network Architecture Lecture 7: OSI Model Layers Examples II 1 26/12/2012.
sip-identity-04 Added new response codes for various conditions
Carrying Location Objects in RADIUS
Russ Housley IETF Chair 8 December 2010
MLEF Without Capacity Admission Does Not Satisfy MLPP Requirements
Presentation transcript:

(we need your advice!) Jon Peterson MIT– December 2010 IETF & Privacy

The IETF builds protocols Protocols assume architectures –Ideally, these protocols should be useful in a variety of architectures. –However, certain protocols are not useful in some. We don’t mandate implementation style and deployment characteristics, but we constrain them in various ways. Example: DNS was designed to have a single root. Ostensibly, the network intermediaries makes simple forwarding decisions, doesn’t inspect or log packets in any deeper semantics Today, we have plenty of reason to fear otherwise

Architecting for privacy What does an application need to share to get a service delivered, and with whom? –Intermediation SIP, for example, uses intermediaries to route requests –However, intermediaries inspect many other elements of requests How can SIP share with intermediaries only the information they need to do their job? (RFC 3323 is a start) –How do we get other protocol designs to learn from this experience? –ALTO (ongoing right now) How can the user share enough with the network for it to be useful and vice-versa?

IPv6 Privacy Addresses In IPv6 stateless addressing, the Interface identifier was constructed based on the MAC address. –This raised privacy concerns. –RFC 4941 supported a dynamically generated IPv6 Interface identifier. Questions: –Threat model: Who are we attempting to hide the address from? ISP, eavesdropper (where?), other communication partner, government (police, fire, medical)? –The same mechanisms that allow ISPs to track users are used to provide location for emergency services and to deal with certain security attacks (botnets).

“Hemispheres” in ALTO H1 H2 We, the network operators want to do ALTO, but we will not disclose info about the network topology and state We, the P2P users and P2P vendors want to do ALTO, but we will not disclose info about the overlay How to bring them together?

Customizing data per recipient Classic “presence” problem –I might want to share different presence information with my friend than with my boss (RFC 2778) –Had we defined “presence” as a unique rather than a potentially manifold property, however, would this be possible? Some presence architectures admit of only one view of presence, which is either shared with a particular recipient or not –We layer our basic architecture for geolocation privacy on top of this (RFC 4119) However, just because you choose to share information selectively, what about those you shared it with? –Policy framework in geopriv for expressing usage preferences about retention, redistribution, and so on

What we need Guidance to authors of protocol specifications on at least four fronts: –How do we build privacy threat models? –How do we design protocols that do not fall into obvious privacy traps? –What are some common ways around traps that you can’t get out of? –How do we document traps that we don’t how how to get out of? draft-morris-privacy-considerations