Hello Abe,

0) Sorry I get it confused and assume that the a) Caller-ID and b) “incoming 
caller number” are different things. If b) is part of a), I get it wrong. I 
currently living in China, and my carrier always bring the b) “incoming caller 
number” each time I get a call, so probably still a modern life style : )

1) "... PKI/Certificate ..." is a patch-style tech and it works quite well, ant 
it is true things are different if we built a system from scratch. But is there 
anything you mean behind it that preform equally or better compare to " ...  
PKI/Certificate ...   " (in the context of Caller-ID or others)?

Thanks,
Yihao


From: Abraham Y. Chen <ayc...@avinta.com>
Sent: 2022年1月25日 3:31
To: Jiayihao <jiayi...@huawei.com>
Cc: int-area@ietf.org; Tom Herbert <t...@herbertland.com>
Subject: 202201241417.AYC Re: [Int-area] Where/How is the features innovation, 
happening? Re: 202201152233.AYC
Importance: High

Hi, YiHao:

1)    Re: Ur. Pt. 0):    I am getting curious. May I ask where are you and how 
old are you? May be not landline. But, cellular mobile phone services always 
have at least the numerical part of the Caller-ID function, due to concerns 
such as who is going to pay for the air-time.

2)    Re: Ur. Pts. 1) & 3):    Good analysis. As to DNS, it is an unnecessary 
"reverse" effort relative to the white-book practice in the PSTN field.

3)    Re: Ur. Pts. 2) & 4):    " ...  PKI/Certificate ...   ":    I do not 
believe this is necessary if we review the subject from the ground up.

Regards,


Abe (2022-01-24 14:30 EST)




On 2022-01-23 22:11, Jiayihao wrote:
Hello Abe,

0) Really appreciate sharing the story of Call-ID. It is really a fresh term 
and tech to me, and seems I haven’t got a chance to experience the Call-ID 
time. Really good to learn.

1) Based on my rough understanding of Call-ID, it is a classical example of how 
we choice to name an object. Assuming we want to visit the Apple Campus (the 
Headquarters of Apple Inc.) with our Google map, we can type a) Apple Campus 
(Name); b) 1 Infinite Loop, Cupertino, CA 95014 (Locator 1); c) 37.33182°N 
122.03118°W(Locator 2). The only difference is which one people would like to 
use, or which one is more friendly to human in their practice. My understanding 
is that people prefer Name while computer prefer Locator, so usually a system 
would like to provide the Name to users and build a subordinate Mapping system 
as while to corelate the name and the locator. DNS is just a good example we 
use every day.

2) Agree on your insight that authentication to just Call-ID(phone number) do 
not make much sense because it only provide the authentication of Locator, 
while leave the Name, which users are more willing to perceive, 
unauthenticated. I find that IETF STIR wg is working on this topic. Although I 
am not familiar right now, I feel a PKI/Certificate should be involved in order 
to gain practical value.

3) In a peer to peer context, IMHO, the Name based interface is more 
practically valuable compared to Locator based one, just like the name instead 
of phone number in the Call-ID case because the numbers do not offer any 
meaning even it is authenticated.

4) Agree on “….that we must have a "system view"….” and “…Some are not based on 
technology, but business practices or just mentality….”. But I feel there is no 
Silver Bullet and I don’t have an answer yet. It is really enjoyable to discuss 
and I will keep thinking on this.

Many thanks, Abe,
Yihao

From: Abraham Y. Chen <ayc...@avinta.com><mailto:ayc...@avinta.com>
Sent: 2022年1月17日 1:21
To: Jiayihao <jiayi...@huawei.com><mailto:jiayi...@huawei.com>
Cc: int-area@ietf.org<mailto:int-area@ietf.org>; Tom Herbert 
<t...@herbertland.com><mailto:t...@herbertland.com>
Subject: Re: [Int-area] Where/How is the features innovation, happening? Re: 
202201152233.AYC
Importance: High

Hi, YiHao:

1)    "...  I am curious how we can step back a bit as you said. ... current 
privacy are ultimately rely on trust point. ...":    I have already outlined 
(perhaps hinted) what is needed to deal with this issue. That is, we have to 
look at the overall environment, not just keep digging deeper into the 
technology itself. No matter how great the technology is, there are always ways 
to get around or to defeat it. Some are not based on technology, but business 
practices or just mentality. In the case of the APPLE refusing to support LE, 
it was the combination of business decision (The LE decided to do it by 
themselves and to look for help from "volunteers") and the technical challenge 
(viewed by "hackers" as fun with reward) that bypassed the "trust point".

2)    To demonstrate my point, I would like to share a brief history of a 
related topic, although based on an opposite initial intention, for you to 
compare and to figure out how to deal with the incident privacy / security 
goal. It was a service started with great results, but deteriorated by various 
business considerations and other influences to a point of nearly useless. The 
service was called Caller-ID. When it was first introduced to identify the 
caller for the convenience of the called party, it also put a big dent on 
telemarketers. That was because the capability was based on a facility inherent 
in the telephone system that no outsiders could touch. With the breakup of the 
Bell System, the Baby-Bells (There were seven to start with. They have gone 
through the M&A processes to become one AT&T again!) started to compete against 
one another. Some marketing genius invented the idea of offering (of course 
with compensation in return) big subscribers to customize their Caller-ID 
messages for various purposes, such as announcing sales. -- Note: Thanks to 
digital technology, the telephone switching equipment used by big business 
(called PABX) had become just as powerful as those used by local telcos (COs - 
Central Offices) where Caller-ID information originated. This allowed 
telemarketers (pretty big operations) to masquerade behind any phone number 
desired, such as using the same local exchange prefix number as that of the 
target subscribers to pretend being a neighbor. Still, a called could pick out 
welcomed callers by paying some attention to the message displayed. After VoIP 
became widely used, rather than mimicking the practice employed by cellular 
phone industry, making sense out of the VoIP based phone numbers became 
mind-boggling for practically everyone. No wonder that Robocalls became much 
prevalent than the past telemarketer calls.

    https://en.wikipedia.org/wiki/Caller_ID#History

3)    With the FCC's Authentication program, the Robocalls may be tempered for 
awhile. But, the caller name has been dropped out of the Caller-ID message, 
because the carriers now treat such as their own valuable merchandise that the 
called party has to pay to receive it (Try figuring out how to identify such 
relationships and then to establish agreements?) An incoming call now may have 
a "[V]" prefix indicating it has passed the "Stir/Shaken" Verification process, 
followed by only a caller phone number without name which becomes pretty much 
the same challenge for most people to begin with. So, the Caller-ID service has 
pretty much lost its original intended main purpose.

    https://www.fcc.gov/call-authentication

4)    In brief, Caller-ID was designed under an environment of uniformly 
structured system (the PSTN). Even so, it quickly degraded to a service with 
minimal residual value when system fragmentation, diverse marketing incentives, 
narrow-mindedness (individual's "freedom"?), etc. came into play. With 
distributed network architecture and operation philosophy as the foundation, I 
will venture to say that the Internet would have a hard time to just mimic the 
identification of the "well-behaved" subscribers like the original Caller-ID 
service, let alone hiding their identity and providing security. What I am 
saying is that we must have a "system view" of all parameters involved in an 
issue, before we could define what we can do and which we want to do. Then, the 
chosen technology may have a chance to deliver the expected goal. Otherwise, we 
will be just spinning the wheels on partial solutions from the diverse 
individualized perspectives.

Regards,



Abe (2022-01-16 12:20 EST)




On 2022-01-13 01:33, Jiayihao wrote:
Hello Abe,

I think we agree on that it is hard for sender to "hide" the identities in 
terms of IP.
And I am curious how we can step back a bit as you said. My concerns focus on 
that if we want improve the privacy (even if one step further), what direction 
could we head? I embrace any insight that can enlighten me.

As for the event you mentioned about Apple, Apple is just another trust point a 
lot of us trust. So back to the case that current privacy are ultimately rely 
on trust point. Whether we could remove the trust point is indeed a question 
for me.

Maybe Tor network provide an good example for the volunteer mode rather than 
trust point.

Thanks,
Yihao

From: Abraham Y. Chen <ayc...@avinta.com><mailto:ayc...@avinta.com>
Sent: 2022年1月12日 0:22
To: Jiayihao <jiayi...@huawei.com><mailto:jiayi...@huawei.com>
Cc: int-area@ietf.org<mailto:int-area@ietf.org>; Tom Herbert 
<t...@herbertland.com><mailto:t...@herbertland.com>
Subject: Re: [Int-area] Where/How is the features innovation, happening? Re: 
202201111037.AYC
Importance: High

Hi, YiHao:

0)    It appears to me that you are still applying your own technical 
considerations around the subject. Doing so will perpetuate the current 
stalemate. What I suggested was to step back a bit, in order to visualize an 
overall picture of the logic and interactions among the parties involved.

1)    " ...  I would say the current countermeasures are designed for anyone 
except the LE because LE can force any part to disclose specific data ...    ": 
   Then, make this an explicit statement as the design criterion for the 
privacy measures, so that the LEs will not have the excuses to do mass 
surveillance. Bragging there is no back-door, or even refusing to support LE 
when requested, such as Apple's position on a criminal case sometime ago as I 
heard, LEs will get it done anyway by looking for "volunteers" from third-party 
encryption crackers when their internal resources could not. Then, the solution 
to the secret is out in the hacker community.

2)    I learned a long time ago that a sophisticated lock is out there for 
challenging a hacker to figure out a way to break into it. Way back when, a 
chemist told me that even Epoxies had solvents. So, we should not stretch our 
energy to cover too much aspects that some tend to be counterproductive for the 
society as a whole, in the long run.

Regards,


Abe (2022-01-11 11:22)



On 2022-01-07 02:29, Jiayihao wrote:
Hello Abe,

Happy new year!

The postal system analogy is a good story to understand IP, but not equal to 
the pessimistic conclusion you made. For the conclusion part, I am fully agree 
with Tom’s arguments.

As you focus on IP(v4/v6) specifically, we more or less follow the logic of How 
TCP/IP works. Within TCP/IP, privacy can be divided into content encryption (A) 
and content delivery (B). A and B both belong to user privacy. However, A and B 
are different things.

For A, Tom’s arguments is good enough. As for B, same as Tom’s but one more 
thing to point. Since you care more about the LE, I would say the current 
countermeasures are designed for anyone except the LE because LE can force any 
part to disclose specific data that should be uncovered under its design 
philosophy.

In short, in IP ecosystem, both A and B is still worth doing. However, as I 
mentioned in my last mail, any design philosophy/architecture has somehow 
implicit *trust party*. But a LE could be All-powerful because the fundament of 
*trust party* is break and no *trust party* anymore if you put LE into 
consideration.

As you mentioned in your last email that there are conflicts requirements, it 
happens all the time. RFC 8890 give the answer and the direction IETF choose.

So back to the questions I am wondering: If we can upgrade the architecture 
somehow, can we enhance the privacy by ways that more than current 
countermeasures like RFC7721 can do?

Have an excellent 2022!
Best,
Yihao

From: Abraham Y. Chen <ayc...@avinta.com><mailto:ayc...@avinta.com>
Sent: 2022年1月1日 0:58
To: Tom Herbert <t...@herbertland.com><mailto:t...@herbertland.com>
Cc: Jiayihao <jiayi...@huawei.com><mailto:jiayi...@huawei.com>; 
int-area@ietf.org<mailto:int-area@ietf.org>
Subject: Re: [Int-area] Where/How is the features innovation, happening? Re: 
202112301817.AYC
Importance: High

Hi, Tom:

1)    "Your argument seems to be that we shouldn't bother with things like 
security or encryption at all :-) ...    ":    My apologies for getting you to 
an unexpected conclusion. Perhaps I failed to make an explicit statement 
because I thought that I was following a thread about the IPv4 or IPv6 
addresses "scrambling" schemes for protecting the privacy of or increasing the 
security to users. That is, we should look at this subject by the "Divide & 
Conquer" concept. In other words, I was saying that encrypting the "Content" 
part as much as the sender / receiver pair agrees to. But, keep the "Address" 
part mostly clear. This way, the LE parties will not have the excuse of 
performing "mass surveillance" by scooping up everything, then take time to 
digest and regurgitate the "Content" for hidden treasures. (Remember the report 
that the German Chancellor's telephone calls were picked up by spy agencies?) 
Rumors have been, that high performance computer and large capacity storage 
device manufacturers are having a field day supplying equipment to LE 
organizations such as NSA because the current Internet trend.

2)    Since my engineering training started from RF (Radio Frequency or 
Wireless -- actually all bands from audio all the way to 60+ GHz), then 
telephony, and cellular phone before getting involved with the Internet, allow 
me to briefly describe my understanding of the characteristics of each with 
respect to our current discussion. Hopefully, the below can thread different 
fields together to clarify my point:

    A.    In the RF field, any signal that is transmitted (sent) into the 
"ether" is a fair game for everyone. So, there is no "Address" in the basic RF 
signal transmission. Most RF equipment does not transmit its identification by 
itself unless the user does so as part of the "Content" on purpose. For 
example, a commercial (AM, FM, TV) station announces its station ID, or 
call-sign (Address) as part of the broadcast (Content) according to FCC Rules. 
So, in RF communication, we concentrate only on encrypting the "Content" (such 
as scrambled / encode speech) for proprietary applications.

    B.    For traditional land-line telephony services, the caller's phone 
number (Address) is fixed by wiring (nailed up) upon subscription. Only the 
called party's phone number (Addressee) is dialed once to tell the switching 
system who is the destination party, so that the switches can make the 
connection. Once the called party answers, the actual session consists of only 
"Content" exchanges, no more "Address" information necessary. Speech scramblers 
may be used on either end as a pair, for private conversation (Content).

    C.   RF signals from cellular mobile phone do carry the handset (and the 
cell tower) identifications (Addresses) on both ends without the user's 
knowledge to facilitate establishing and maintaining a connection, while the 
user constantly crosses the boundaries between cells. Similarly, speech 
scramblers may be used on either end as a pair for private conversation 
(Content). Note that since VoIP is behind the scene these days, cellular mobile 
service is supported by a mixture of both the traditional telephony and the 
Internet infrastructures.

    D.   If we look at the Internet environment itself, it is kind like the 
cellular mobile phone service. It is inherently wide open like RF because 
packets are forwarded by unstructured mesh routers allowing everyone to listen 
in. Yet, each IP packet header carries the Addresses of both ends for directing 
routers to deliver the packet, as well as for the return packet. So, how much 
can a sender "hide" the identities of either or both ends for privacy while 
still enables the routers to deliver the packet to its intended destination 
effectively is a real challenge. Whatever the scheme chosen, it can not be too 
sophisticated to over-burden the routers which means that it is probably mot 
much a challenge for a perpetrator intentionally trying to crack the scheme.

3)    My sense from the above analysis is that attempting to make the "Address" 
part of an IP packet "cryptic" for improving the privacy / security properties 
of the "Content" is probably futile. The more we attempt doing it, the stronger 
the LEs' argument for mass surveillance, even though they probably already knew 
the solution.

4)    On the other hand, if we push too hard on strengthening the encryption of 
the "Content" without a back door, we essentially are helping the perpetrators. 
This is because if this part worked, the LEs will not be able to monitor and 
catch the criminals!

5)    So, we need to review the pros and cons of the end results, before 
jumping into a scheme.


Happy New Year!



Abe (2021-12-31 11:57 EST)



On 2021-12-30 13:29, Tom Herbert wrote:


On Mon, Dec 27, 2021 at 7:00 PM Abraham Y. Chen 
<ayc...@avinta.com<mailto:ayc...@avinta.com>> wrote:
Hi, YiHao:

0)    Hope you had a Merry Christmas as well!

1)    Re: Ur. Pts 1) & 2):    Allow me to modify and expand your definitions of 
the abbreviations, ICP & ISP, a bit to streamline our discussion, then focusing 
on related meanings of the two keyword prefixes, "C" and "A" in the middle of 
them:

    A.    ICP (Internet Content Provider):    This is the same as you are using.

    B.    IAP (Internet Access Provider):    This will represent the ISP that 
you are referring to.

    C.    ISP (Internet Service Provider):    This will be used as the general 
expression that covers both ICP and IAP above.

    With these, I agree in general with your analysis.

2)    From the above, there is a simpler (layman's instead of engineer's) way 
to look at this riddle. Let's consider the old fashioned postal service. A 
letter itself is the "Content". The envelop has the "Address". The postal 
service cares only what is on the envelop. In fact, it is commonly practiced 
without explicitly identified that one letter may have multiple layers of 
envelops that each is opened by the "Addressee" who then forward the next 
"Addressee" according to the "Address" on the inside envelop, accordingly. To a 
larger scale, postal services put envelops destined to the same city in one 
bag. Then, bags destined to the same country in one container, etc. This 
process is refined to multiple levels depending on the volume of the mail and 
the facility (routes) available for delivery. Then, the containers are opened 
progressively along the destination route. No wonder that the US Postal Service 
claimed (during the early days of the Internet) that the mail system was the 
fist "packet switching" system.

3)    So, in this analogy, the "Address" on each and every envelop has to be in 
the clear (not coded or encrypted in any sense) for the mail handlers to work 
with. It is only the most inner "Content", the letter itself, can have 
Confidential information (or encrypted if the sender wishes). Under this 
scenario, the LE (Law Enforcement) is allowed only to track suspected mail by 
the "Addresses". And, any specific surveillance is only authorized by court, 
case by case. While no one can prevent LE bypassing this procedure, cases built 
by violating this requirement would be the ground for being thrown out of the 
court.

4)    However, in the Internet environment, largely, if not most, Addresses are 
dynamic. There is no way to specify an IP Address for surveillance of a 
suspect. This gives the LE the perfect excuse to scoop up everything and then 
analyze offline. This gives them plenty of time to try various ways to decrypt 
the encoded messages and the opportunity to sift through everything for 
incidental "surprise bonus finds". The result is that practically no privacy is 
left for anyone. is means that all of the schemes of scrambling IP Addresses 
are useless at the end. So, why do we bother with doing so, at all?

Abe,

Happy New Year!

Your argument seems to be that we shouldn't bother with things like security or 
encryption at all :-) While it's true that anything sent into the Internet can 
be intercepted and analyzed offline, it's clearly the intent of security and 
privacy mechanisms to make offline analysis of data ineffective or at least 
cost prohibitive. For encryption the calculation is pretty straightforward, the 
complexity and cost and breaking a cipher is generally correlated to the key 
size. So for any given key size, it can be determined what sort of resources 
are required to break the code. This is a continuous escalation as attackers 
gain access for more computational resources and there are breakthroughs like 
in quantum computing that require rethinking encryption.  But regardless, the 
effectiveness of encryption at any given point of time is quantifiable.

For security and privacy in IP addresses I believe we should be similarly 
taking a quantitative approach. This is where RFC7721 fails. The recommendation 
of RFC7721 is that for better security, use temporary addresses with shorter 
lifetimes. But the RFC doesn't attempt to quantify the relationship between 
address lifetime and the security that's offered or even say what specific 
lifetime is recommended for optimal security. For instance, if the user changes 
their interface address twice a day instead of once a day does that halve the 
chances that some may breach their security by correlating two different flows 
that they source from the user? Probably not. But, what if they change their 
address every five minutes? How much better is that than changing the address 
once a day? It's intuitive that it should be better security, but is it 
_really_ better? And if it is better, are the benefits worth the aggravation of 
changing the address. This is quite similar to some companies that have a 
policy that everyone needs to change their passwords periodically. Studies have 
shown that there is little quantitative value in doing this and in fact the net 
effect is likely less security and increased user aggravation-- even so, 
companies will continue to do this because it's easier to stick with the 
inertia of intuition.

The fix for the password problem is one time passwords (OTP) and IMO that hints 
at the fix for the address security problems described in RFC7712, essentially 
we need single use source addresses per each connection.  The security effects 
of single use addresses are quantifiable, i.e. given sample packets from 
independent two flows generated by the same user, without additional 
information it isn't possible for a third party to correlate that they are 
sourced by the same user.

Tom



Happy New Year!


Abe (2021-12-27 21:59)





On 2021-12-23 22:26, Jiayihao wrote:
Hello Abe,

Users are unwilling to be watched by any parties(ISP, and ICP also) excepts 
users themselves. Actually I would like to divide the arguments into 2 case: 
network layers and below (not completely but mostly controlled by ISP); 
transport layers and above (not completely but mostly controlled by ICP).

1) For transport layers and above, Encryption Everywhere (like TLS) is a good 
tool to provide user privacy. However, it is only a tool against ISPs, while 
ICPs survive and keep gaining revenue (even by selling data like the negative 
news of Facebook, or Meta, whatever you call it). As discussed, it is not 
networks faults because IP provides peer-to-peer already. You may blame CGNAT 
in ISP increasingly contributes to a C/S mode in replacing P2P, like in China 
where IPv4 addresses are scare and CGNAT is almost everywhere. However, I don’t 
find the situation any better in U.S. where most of IPv4 address are located. 
It is a business choice to overwrite the mode to be peer-ICP-peer(C/S mode) at 
application layer, other than utilize the P2P mode that natively provided by IP.

In this case, there are trust points and they are ICPs.

2) For network layers and below, ISP and IP still provide a pure P2P network, 
and Encryption in TLS do not blind ISP in IP layer since IP header is still in 
plaintext and almost controlled by ISP. That is to say, in an access network 
scenario, the access network provide can see every trace of every user at 
network layer level (although exclude the encrypted payload). To against this, 
one can use Proxy(i.e., VPN, Tor) to bypass the trace analysis just like the 
CGNAT does. The only difference is that detour points (Proxies) belong to a 
third party, not ISP.

In this case, there are trust points and they are third party proxies.

The bottom line is that trust points are everywhere explicitly or implicitly, 
and privacy can be leaked from every (trust) point that you trust (or have 
business with). No matter what network system you have, no matter it is PSTN or 
ATM, these trust points are just the weak points for your privacy, and the only 
things users can beg is that *ALL* trust points are 1) well behave/don’t be 
evil; 2)system is advanced enough that can’t be hacked by any others; 3) 
protected by law.

I would say pretty challenging and also expecting to reach that.
Network itself just cannot be bypassed in reaching that.

Merry Christmas,
Yihao


From: Abraham Y. Chen <ayc...@avinta.com><mailto:ayc...@avinta.com>
Sent: 2021年12月23日 10:01
To: Jiayihao <jiayi...@huawei.com><mailto:jiayi...@huawei.com>
Cc: t...@herbertland.com<mailto:t...@herbertland.com>; 
int-area@ietf.org<mailto:int-area@ietf.org>
Subject: Re: [Int-area] Where/How is the features innovation, happening? Re: 
202112221726.AYC
Importance: High


Hi, YiHao:

0)    I am glad that you distilled the complex and elusive privacy / security 
tradeoff issues to a very unique and concise perspective.

1)    Yes, the IPv4 CG-NAT and IPv6 Temporary address may seem to provide some 
privacy protection. However, with the availability of the computing power, 
these (and others such as VPN) approaches may be just ostrich mentality.  On 
the other hand, they provide the perfect excuse for the government (at least 
US) to justify for "mass surveillance". For example, the following is a recent 
news report which practically defeats all current "privacy protection" attempts.

    
https://www.usatoday.com/story/news/2021/12/08/federal-court-upholds-terrorism-conviction-mass-surveillance-case/6440325001/

[jiayihao] there is no doubt.

2)    Rather than contradicting efforts, it is time to review whether any of 
these schemes such as mapping techniques really is effective for the perceived 
"protection". As much of the current science fiction type crime scene detective 
novel / movie / TV program hinted, the government probably has more capability 
to zero-in on anyone than an ordinary citizen can imagine, anyway. And, 
businesses have gathered more information about us than they will ever admit. 
Perhaps we should "think out of the box" by going back to the PSTN days of 
definitive subscriber identification systems, so that accordingly we will 
behave appropriately on the Internet, and the government will be allowed to 
only monitor suspected criminals by filing explicit (although in secret) 
requests, case by case, to the court for approval?



Happy Holidays!





Abe (2021-12-22 21:00 EST)



Hello Tom,



The privacy countermeasure for IPv4/IPv6 is interestingly different.

IPv4 usually utilize CGNAT, i.e., M(hosts)-to-N(IPs), where M >> N so that the 
host could remain anonymous

IPv6 usually utilize Temporary address, i.e., 1(host)-to-M(IPs[at least suffix 
level]), where M >> 1 so that the host could remain anonymous.



HOWEVER, I don't feel any approach reaches privacy perfectly, because access 
network have a global perspective on M-to-N or 1-to-M mapping.

For this, it is hard to be convinced that IPv4/6 itself can reach a perfect 
privacy.



Thanks,

Yihao Jia



-----------



I believe CGNAT is better than IPv6 in terms of privacy in addressing.

In fact one might argue that IPv4 provides better privacy and security

than IPv6 in this regard. Temporary addresses are not single use which

means the attacker can correlate addresses from a user between

unrelated flows during the quantum the temporary address is used. When

a user changes their address, the attacker can continue monitoring if

it is signaled that the address changed. Here is a fairly simple

exploit I derived to do that (from

draft-herbert-ipv6-prefix-address-privacy-00).



The exploit is:

      o An attacker creates an "always connected" app that provides some

        seemingly benign service and users download the app.

      o The app includes some sort of persistent identity. For instance,

        this could be an account login.

      o The backend server for the app logs the identity and IP address

        of a user each time they connect

      o When an address change happens, existing connections on the user

        device are disconnected. The app will receive a notification and

        immediately attempt to reconnect using the new source address.

      o The backend server will see the new connection and log the new

        IP address as being associated with the specific user. Thus,

the server has

        a real-time record of users and the IP address they are using.

      o The attacker intercepts packets at some point in the Internet.

        The addresses in the captured packets can be time correlated

        with the server database to deduce identities of parties in

        communications that are unrelated to the app.



The only way I see to mitigate this sort of surveillance is single use

addresses. That is effectively what  CGNAT can provide.



Tom

[Image removed by                                              
sender.]<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=icon>

Virus-free. 
www.avast.com<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=link>












_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to