Hi, YiHao:

0)    Re: Ur. Pt. 0): Correct. However, the Caller-ID terminology was introduced when the caller's name was displayed on Called's phone. So, when only b) is shown, it is at best a subset, or the minor part, of the Caller-ID service.

1)    Re: Ur. Pt. 1): Why do you need a way to certify / authenticate a caller if a system is set up with explicit originator identification in the first place?

Regards,


Abe (2022-01-25 07:29)


On 2022-01-24 22:42, Jiayihao wrote:

Hello Abe,

0) Sorry I get it confused and assume that the a) Caller-ID and b) “incoming caller number” are different things. If b) is part of a), I get it wrong. I currently living in China, and my carrier always bring the b) “incoming caller number” each time I get a call, so probably still a modern life style : )

1) "... PKI/Certificate ..." is a patch-style tech and it works quite well, ant it is true things are different if we built a system from scratch. But is there anything you mean behind it that preform equally or better compare to " ...  PKI/Certificate ...   " (in the context of Caller-ID or others)?

Thanks,

Yihao

*From:* Abraham Y. Chen <ayc...@avinta.com>
*Sent:* 2022年1月25日 3:31
*To:* Jiayihao <jiayi...@huawei.com>
*Cc:* int-area@ietf.org; Tom Herbert <t...@herbertland.com>
*Subject:* 202201241417.AYC Re: [Int-area] Where/How is the features innovation, happening? Re: 202201152233.AYC
*Importance:* High

Hi, YiHao:

1)    Re: Ur. Pt. 0):    I am getting curious. May I ask where are you and how old are you? May be not landline. But, cellular mobile phone services always have at least the numerical part of the Caller-ID function, due to concerns such as who is going to pay for the air-time.

2)    Re: Ur. Pts. 1) & 3):    Good analysis. As to DNS, it is an unnecessary "reverse" effort relative to the white-book practice in the PSTN field.

3)    Re: Ur. Pts. 2) & 4):    " ...  PKI/Certificate ... ":    I do not believe this is necessary if we review the subject from the ground up.

Regards,

Abe (2022-01-24 14:30 EST)

On 2022-01-23 22:11, Jiayihao wrote:

    Hello Abe,

    0) Really appreciate sharing the story of Call-ID. It is really a
    fresh term and tech to me, and seems I haven’t got a chance to
    experience the Call-ID time. Really good to learn.

    1) Based on my rough understanding of Call-ID, it is a classical
    example of how we choice to name an object. Assuming we want to
    visit the Apple Campus (the Headquarters of Apple Inc.) with our
    Google map, we can type a) Apple Campus (Name); b) 1 Infinite
    Loop, Cupertino, CA 95014 (Locator 1); c) 37.33182°N
    122.03118°W(Locator 2). The only difference is which one people
    would like to use, or which one is more friendly to human in their
    practice. My understanding is that people prefer Name while
    computer prefer Locator, so usually a system would like to provide
    the Name to users and build a subordinate Mapping system as while
    to corelate the name and the locator. DNS is just a good example
    we use every day.

    2) Agree on your insight that authentication to just Call-ID(phone
    number) do not make much sense because it only provide the
    authentication of Locator, while leave the Name, which users are
    more willing to perceive, unauthenticated. I find that IETF STIR
    wg is working on this topic. Although I am not familiar right now,
    I feel a PKI/Certificate should be involved in order to gain
    practical value.

    3) In a peer to peer context, IMHO, the Name based interface is
    more practically valuable compared to Locator based one, just like
    the name instead of phone number in the Call-ID case because the
    numbers do not offer any meaning even it is authenticated.

    4) Agree on “….that we must have a "system view"….” and “…Some are
    not based on technology, but business practices or just
    mentality….”. But I feel there is no Silver Bullet and I don’t
    have an answer yet. It is really enjoyable to discuss and I will
    keep thinking on this.

    Many thanks, Abe,

    Yihao

    *From:* Abraham Y. Chen <ayc...@avinta.com>
    <mailto:ayc...@avinta.com>
    *Sent:* 2022年1月17日 1:21
    *To:* Jiayihao <jiayi...@huawei.com> <mailto:jiayi...@huawei.com>
    *Cc:* int-area@ietf.org; Tom Herbert <t...@herbertland.com>
    <mailto:t...@herbertland.com>
    *Subject:* Re: [Int-area] Where/How is the features innovation,
    happening? Re: 202201152233.AYC
    *Importance:* High

    Hi, YiHao:

    1) "...  I am curious how we can step back a bit as you said. ...
    current privacy are ultimately rely on trust point. ...":    I
    have already outlined (perhaps hinted) what is needed to deal with
    this issue. That is, we have to look at the overall environment,
    not just keep digging deeper into the technology itself. No matter
    how great the technology is, there are always ways to get around
    or to defeat it. Some are not based on technology, but business
    practices or just mentality. In the case of the APPLE refusing to
    support LE, it was the combination of business decision (The LE
    decided to do it by themselves and to look for help from
    "volunteers") and the technical challenge (viewed by "hackers" as
    fun with reward) that bypassed the "trust point".

    2)    To demonstrate my point, I would like to share a brief
    history of a related topic, although based on an opposite initial
    intention, for you to compare and to figure out how to deal with
    the incident privacy / security goal. It was a service started
    with great results, but deteriorated by various business
    considerations and other influences to a point of nearly useless.
    The service was called Caller-ID. When it was first introduced to
    identify the caller for the convenience of the called party, it
    also put a big dent on telemarketers. That was because the
    capability was based on a facility inherent in the telephone
    system that no outsiders could touch. With the breakup of the Bell
    System, the Baby-Bells (There were seven to start with. They have
    gone through the M&A processes to become one AT&T again!) started
    to compete against one another. Some marketing genius invented the
    idea of offering (of course with compensation in return) big
    subscribers to customize their Caller-ID messages for various
    purposes, such as announcing sales. -- Note: Thanks to digital
    technology, the telephone switching equipment used by big business
    (called PABX) had become just as powerful as those used by local
    telcos (COs - Central Offices) where Caller-ID information
    originated. This allowed telemarketers (pretty big operations) to
    masquerade behind any phone number desired, such as using the same
    local exchange prefix number as that of the target subscribers to
    pretend being a neighbor. Still, a called could pick out welcomed
    callers by paying some attention to the message displayed. After
    VoIP became widely used, rather than mimicking the practice
    employed by cellular phone industry, making sense out of the VoIP
    based phone numbers became mind-boggling for practically everyone.
    No wonder that Robocalls became much prevalent than the past
    telemarketer calls.


    https://en.wikipedia.org/wiki/Caller_ID#History

    3) With the FCC's Authentication program, the Robocalls may be
    tempered for awhile. But, the caller name has been dropped out of
    the Caller-ID message, because the carriers now treat such as
    their own valuable merchandise that the called party has to pay to
    receive it (Try figuring out how to identify such relationships
    and then to establish agreements?) An incoming call now may have a
    "[V]" prefix indicating it has passed the "Stir/Shaken"
    Verification process, followed by only a caller phone number
    without name which becomes pretty much the same challenge for most
    people to begin with. So, the Caller-ID service has pretty much
    lost its original intended main purpose.

    https://www.fcc.gov/call-authentication

    4)    In brief, Caller-ID was designed under an environment of
    uniformly structured system (the PSTN). Even so, it quickly
    degraded to a service with minimal residual value when system
    fragmentation, diverse marketing incentives, narrow-mindedness
    (individual's "freedom"?), etc. came into play. With distributed
    network architecture and operation philosophy as the foundation, I
    will venture to say that the Internet would have a hard time to
    just mimic the identification of the "well-behaved" subscribers
    like the original Caller-ID service, let alone hiding their
    identity and providing security. What I am saying is that we must
    have a "system view" of all parameters involved in an issue,
    before we could define what we can do and which we want to do.
    Then, the chosen technology may have a chance to deliver the
    expected goal. Otherwise, we will be just spinning the wheels on
    partial solutions from the diverse individualized perspectives.

    Regards,

    Abe (2022-01-16 12:20 EST)

    On 2022-01-13 01:33, Jiayihao wrote:

        Hello Abe,

        I think we agree on that it is hard for sender to "hide" the
        identities in terms of IP.

        And I am curious how we can step back a bit as you said. My
        concerns focus on that if we want improve the privacy (even if
        one step further), what direction could we head? I embrace any
        insight that can enlighten me.

        As for the event you mentioned about Apple, Apple is just
        another trust point a lot of us trust. So back to the case
        that current privacy are ultimately rely on trust point.
        Whether we could remove the trust point is indeed a question
        for me.

        Maybe Tor network provide an good example for the volunteer
        mode rather than trust point.

        Thanks,

        Yihao

        *From:* Abraham Y. Chen <ayc...@avinta.com>
        <mailto:ayc...@avinta.com>
        *Sent:* 2022年1月12日 0:22
        *To:* Jiayihao <jiayi...@huawei.com> <mailto:jiayi...@huawei.com>
        *Cc:* int-area@ietf.org; Tom Herbert <t...@herbertland.com>
        <mailto:t...@herbertland.com>
        *Subject:* Re: [Int-area] Where/How is the features
        innovation, happening? Re: 202201111037.AYC
        *Importance:* High

        Hi, YiHao:

        0) It appears to me that you are still applying your own
        technical considerations around the subject. Doing so will
        perpetuate the current stalemate. What I suggested was to step
        back a bit, in order to visualize an overall picture of the
        logic and interactions among the parties involved.

        1) " ...  I would say the current countermeasures are designed
        for anyone except the LE because LE can force any part to
        disclose specific data ...    ":    Then, make this an
        explicit statement as the design criterion for the privacy
        measures, so that the LEs will not have the excuses to do mass
        surveillance. Bragging there is no back-door, or even refusing
        to support LE when requested, such as Apple's position on a
        criminal case sometime ago as I heard, LEs will get it done
        anyway by looking for "volunteers" from third-party encryption
        crackers when their internal resources could not. Then, the
        solution to the secret is out in the hacker community.

        2) I learned a long time ago that a sophisticated lock is out
        there for challenging a hacker to figure out a way to break
        into it. Way back when, a chemist told me that even Epoxies
        had solvents. So, we should not stretch our energy to cover
        too much aspects that some tend to be counterproductive for
        the society as a whole, in the long run.

        Regards,

        Abe (2022-01-11 11:22)

        On 2022-01-07 02:29, Jiayihao wrote:

            Hello Abe,

            Happy new year!

            The postal system analogy is a good story to understand
            IP, but not equal to the pessimistic conclusion you made.
            For the conclusion part, I am fully agree with Tom’s
            arguments.

            As you focus on IP(v4/v6) specifically, we more or less
            follow the logic of How TCP/IP works. Within TCP/IP,
            privacy can be divided into content encryption (A) and
            content delivery (B). A and B both belong to user privacy.
            However, A and B are different things.

            For A, Tom’s arguments is good enough. As for B, same as
            Tom’s but one more thing to point. Since you care more
            about the LE, I would say the current countermeasures are
            designed for anyone except the LE because LE can force any
            part to disclose specific data that should be uncovered
            under its design philosophy.

            In short, in IP ecosystem, both A and B is still worth
            doing. However, as I mentioned in my last mail, any design
            philosophy/architecture has somehow implicit **trust
            party**. But a LE could be All-powerful because the
            fundament of **trust party** is break and no **trust
            party** anymore if you put LE into consideration.

            As you mentioned in your last email that there are
            conflicts requirements, it happens all the time. RFC 8890
            give the answer and the direction IETF choose.

            So back to the questions I am wondering: If we can upgrade
            the architecture somehow, can we enhance the privacy by
            ways that more than current countermeasures like RFC7721
            can do?

            Have an excellent 2022!

            Best,

            Yihao

            *From:* Abraham Y. Chen <ayc...@avinta.com>
            <mailto:ayc...@avinta.com>
            *Sent:* 2022年1月1日 0:58
            *To:* Tom Herbert <t...@herbertland.com>
            <mailto:t...@herbertland.com>
            *Cc:* Jiayihao <jiayi...@huawei.com>
            <mailto:jiayi...@huawei.com>; int-area@ietf.org
            *Subject:* Re: [Int-area] Where/How is the features
            innovation, happening? Re: 202112301817.AYC
            *Importance:* High

            Hi, Tom:

            1) "Your argument seems to be that we shouldn't bother
            with things like security or encryption at all :-) ...   
            ":    My apologies for getting you to an unexpected
            conclusion. Perhaps I failed to make an explicit statement
            because I thought that I was following a thread about the
            IPv4 or IPv6 addresses "scrambling" schemes for protecting
            the privacy of or increasing the security to users. That
            is, we should look at this subject by the "Divide &
            Conquer" concept. In other words, I was saying that
            encrypting the "Content" part as much as the sender /
            receiver pair agrees to. But, keep the "Address" part
            mostly clear. This way, the LE parties will not have the
            excuse of performing "mass surveillance" by scooping up
            everything, then take time to digest and regurgitate the
            "Content" for hidden treasures. (Remember the report that
            the German Chancellor's telephone calls were picked up by
            spy agencies?) Rumors have been, that high performance
            computer and large capacity storage device manufacturers
            are having a field day supplying equipment to LE
            organizations such as NSA because the current Internet trend.

            2) Since my engineering training started from RF (Radio
            Frequency or Wireless -- actually all bands from audio all
            the way to 60+ GHz), then telephony, and cellular phone
            before getting involved with the Internet, allow me to
            briefly describe my understanding of the characteristics
            of each with respect to our current discussion. Hopefully,
            the below can thread different fields together to clarify
            my point:

            A.    In the RF field, any signal that is transmitted
            (sent) into the "ether" is a fair game for everyone. So,
            there is no "Address" in the basic RF signal transmission.
            Most RF equipment does not transmit its identification by
            itself unless the user does so as part of the "Content" on
            purpose. For example, a commercial (AM, FM, TV) station
            announces its station ID, or call-sign (Address) as part
            of the broadcast (Content) according to FCC Rules. So, in
            RF communication, we concentrate only on encrypting the
            "Content" (such as scrambled / encode speech) for
            proprietary applications.

            B.    For traditional land-line telephony services, the
            caller's phone number (Address) is fixed by wiring (nailed
            up) upon subscription. Only the called party's phone
            number (Addressee) is dialed once to tell the switching
            system who is the destination party, so that the switches
            can make the connection. Once the called party answers,
            the actual session consists of only "Content" exchanges,
            no more "Address" information necessary. Speech scramblers
            may be used on either end as a pair, for private
            conversation (Content).

            C.   RF signals from cellular mobile phone do carry the
            handset (and the cell tower) identifications (Addresses)
            on both ends without the user's knowledge to facilitate
            establishing and maintaining a connection, while the user
            constantly crosses the boundaries between cells.
            Similarly, speech scramblers may be used on either end as
            a pair for private conversation (Content). Note that since
            VoIP is behind the scene these days, cellular mobile
            service is supported by a mixture of both the traditional
            telephony and the Internet infrastructures.

            D.   If we look at the Internet environment itself, it is
            kind like the cellular mobile phone service. It is
            inherently wide open like RF because packets are forwarded
            by unstructured mesh routers allowing everyone to listen
            in. Yet, each IP packet header carries the Addresses of
            both ends for directing routers to deliver the packet, as
            well as for the return packet. So, how much can a sender
            "hide" the identities of either or both ends for privacy
            while still enables the routers to deliver the packet to
            its intended destination effectively is a real challenge.
            Whatever the scheme chosen, it can not be too
            sophisticated to over-burden the routers which means that
            it is probably mot much a challenge for a perpetrator
            intentionally trying to crack the scheme.

            3) My sense from the above analysis is that attempting to
            make the "Address" part of an IP packet "cryptic" for
            improving the privacy / security properties of the
            "Content" is probably futile. The more we attempt doing
            it, the stronger the LEs' argument for mass surveillance,
            even though they probably already knew the solution.

            4) On the other hand, if we push too hard on strengthening
            the encryption of the "Content" without a back door, we
            essentially are helping the perpetrators. This is because
            if this part worked, the LEs will not be able to monitor
            and catch the criminals!

            5) So, we need to review the pros and cons of the end
            results, before jumping into a scheme.

            Happy New Year!

            Abe (2021-12-31 11:57 EST)

            On 2021-12-30 13:29, Tom Herbert wrote:

                On Mon, Dec 27, 2021 at 7:00 PM Abraham Y. Chen
                <ayc...@avinta.com> wrote:

                    Hi, YiHao:

                    0)    Hope you had a Merry Christmas as well!

                    1)    Re: Ur. Pts 1) & 2):    Allow me to modify
                    and expand your definitions of the abbreviations,
                    ICP & ISP, a bit to streamline our discussion,
                    then focusing on related meanings of the two
                    keyword prefixes, "C" and "A" in the middle of them:

                        A.    ICP (Internet Content Provider):    This
                    is the same as you are using.

                        B.    IAP (Internet Access Provider):    This
                    will represent the ISP that you are referring to.

                        C.    ISP (Internet Service Provider):    This
                    will be used as the general expression that covers
                    both ICP and IAP above.

                        With these, I agree in general with your analysis.

                    2)    From the above, there is a simpler (layman's
                    instead of engineer's) way to look at this riddle.
                    Let's consider the old fashioned postal service. A
                    letter itself is the "Content". The envelop has
                    the "Address". The postal service cares only what
                    is on the envelop. In fact, it is commonly
                    practiced without explicitly identified that one
                    letter may have multiple layers of envelops that
                    each is opened by the "Addressee" who then forward
                    the next "Addressee" according to the "Address" on
                    the inside envelop, accordingly. To a larger
                    scale, postal services put envelops destined to
                    the same city in one bag. Then, bags destined to
                    the same country in one container, etc. This
                    process is refined to multiple levels depending on
                    the volume of the mail and the facility (routes)
                    available for delivery. Then, the containers are
                    opened progressively along the destination route.
                    No wonder that the US Postal Service claimed
                    (during the early days of the Internet) that the
                    mail system was the fist "packet switching" system.

                    3)    So, in this analogy, the "Address" on each
                    and every envelop has to be in the clear (not
                    coded or encrypted in any sense) for the mail
                    handlers to work with. It is only the most inner
                    "Content", the letter itself, can have
                    Confidential information (or encrypted if the
                    sender wishes). Under this scenario, the LE (Law
                    Enforcement) is allowed only to track suspected
                    mail by the "Addresses". And, any specific
                    surveillance is only authorized by court, case by
                    case. While no one can prevent LE bypassing this
                    procedure, cases built by violating this
                    requirement would be the ground for being thrown
                    out of the court.

                    4)    However, in the Internet environment,
                    largely, if not most, Addresses are dynamic. There
                    is no way to specify an IP Address for
                    surveillance of a suspect. This gives the LE the
                    perfect excuse to scoop up everything and then
                    analyze offline. This gives them plenty of time to
                    try various ways to decrypt the encoded messages
                    and the opportunity to sift through everything for
                    incidental "surprise bonus finds". The result is
                    that practically no privacy is left for anyone. is
                    means that all of the schemes of scrambling IP
                    Addresses are useless at the end. So, why do we
                    bother with doing so, at all?

                Abe,

                Happy New Year!

                Your argument seems to be that we shouldn't bother
                with things like security or encryption at all :-)
                While it's true that anything sent into the Internet
                can be intercepted and analyzed offline, it's clearly
                the intent of security and privacy mechanisms to make
                offline analysis of data ineffective or at least cost
                prohibitive. For encryption the calculation is pretty
                straightforward, the complexity and cost and breaking
                a cipher is generally correlated to the key size. So
                for any given key size, it can be determined what sort
                of resources are required to break the code. This is a
                continuous escalation as attackers gain access for
                more computational resources and there are
                breakthroughs like in quantum computing that require
                rethinking encryption. But regardless, the
                effectiveness of encryption at any given point of time
                is quantifiable.

                For security and privacy in IP addresses I believe we
                should be similarly taking a quantitative approach.
                This is where RFC7721 fails. The recommendation of
                RFC7721 is that for better security, use temporary
                addresses with shorter lifetimes. But the RFC doesn't
                attempt to quantify the relationship between address
                lifetime and the security that's offered or even say
                what specific lifetime is recommended for optimal
                security. For instance, if the user changes their
                interface address twice a day instead of once a day
                does that halve the chances that some may breach their
                security by correlating two different flows that they
                source from the user? Probably not. But, what if they
                change their address every five minutes? How much
                better is that than changing the address once a day?
                It's intuitive that it should be better security, but
                is it _really_ better? And if it is better, are
                the benefits worth the aggravation of changing the
                address. This is quite similar to some companies that
                have a policy that everyone needs to change their
                passwords periodically. Studies have shown that there
                is little quantitative value in doing this and in fact
                the net effect is likely less security and increased
                user aggravation-- even so, companies will continue to
                do this because it's easier to stick with the inertia
                of intuition.

                The fix for the password problem is one time passwords
                (OTP) and IMO that hints at the fix for the address
                security problems described in RFC7712, essentially we
                need single use source addresses per each connection. 
                The security effects of single use addresses are
                quantifiable, i.e. given sample packets from
                independent two flows generated by the same user,
                without additional information it isn't possible for a
                third party to correlate that they are sourced by the
                same user.

                Tom

                    Happy New Year!

                    Abe (2021-12-27 21:59)

                    On 2021-12-23 22:26, Jiayihao wrote:

                        Hello Abe,

                        Users are unwilling to be watched by any
                        parties(ISP, and ICP also) excepts users
                        themselves. Actually I would like to divide
                        the arguments into 2 case: network layers and
                        below (not completely but mostly controlled by
                        ISP); transport layers and above (not
                        completely but mostly controlled by ICP).

                        1) For transport layers and above, Encryption
                        Everywhere (like TLS) is a good tool to
                        provide user privacy. However, it is only a
                        tool against ISPs, while ICPs survive and keep
                        gaining revenue (even by selling data like the
                        negative news of Facebook, or Meta, whatever
                        you call it). As discussed, it is not networks
                        faults because IP provides peer-to-peer
                        already. You may blame CGNAT in ISP
                        increasingly contributes to a C/S mode in
                        replacing P2P, like in China where IPv4
                        addresses are scare and CGNAT is almost
                        everywhere. However, I don’t find the
                        situation any better in U.S. where most of
                        IPv4 address are located. It is a business
                        choice to overwrite the mode to be
                        peer-ICP-peer(C/S mode) at application layer,
                        other than utilize the P2P mode that natively
                        provided by IP.

                        In this case, there are trust points and they
                        are ICPs.

                        2) For network layers and below, ISP and IP
                        still provide a pure P2P network, and
                        Encryption in TLS do not blind ISP in IP layer
                        since IP header is still in plaintext and
                        almost controlled by ISP. That is to say, in
                        an access network scenario, the access network
                        provide can see every trace of every user at
                        network layer level (although exclude the
                        encrypted payload). To against this, one can
                        use Proxy(i.e., VPN, Tor) to bypass the trace
                        analysis just like the CGNAT does. The only
                        difference is that detour points (Proxies)
                        belong to a third party, not ISP.

                        In this case, there are trust points and they
                        are third party proxies.

                        The bottom line is that trust points are
                        everywhere explicitly or implicitly, and
                        privacy can be leaked from every (trust) point
                        that you trust (or have business with). No
                        matter what network system you have, no matter
                        it is PSTN or ATM, these trust points are just
                        the weak points for your privacy, and the only
                        things users can beg is that **ALL** trust
                        points are 1) well behave/don’t be evil;
                        2)system is advanced enough that can’t be
                        hacked by any others; 3) protected by law.

                        I would say pretty challenging and also
                        expecting to reach that.

                        Network itself just cannot be bypassed in
                        reaching that.

                        Merry Christmas,

                        Yihao

                        *From:* Abraham Y. Chen <ayc...@avinta.com>
                        <mailto:ayc...@avinta.com>
                        *Sent:* 2021年12月23日10:01
                        *To:* Jiayihao <jiayi...@huawei.com>
                        <mailto:jiayi...@huawei.com>
                        *Cc:* t...@herbertland.com; int-area@ietf.org
                        *Subject:* Re: [Int-area] Where/How is the
                        features innovation, happening? Re:
                        202112221726.AYC
                        *Importance:* High

                        Hi, YiHao:

                        0)    I am glad that you distilled the complex
                        and elusive privacy / security tradeoff issues
                        to a very unique and concise perspective.

                        1)    Yes, the IPv4 CG-NAT and IPv6 Temporary
                        address may seem to provide some privacy
                        protection. However, with the availability of
                        the computing power, these (and others such as
                        VPN) approaches may be just ostrich
                        mentality.  On the other hand, they provide
                        the perfect excuse for the government (at
                        least US) to justify for "mass surveillance".
                        For example, the following is a recent news
                        report which practically defeats all current
                        "privacy protection" attempts.

                        
https://www.usatoday.com/story/news/2021/12/08/federal-court-upholds-terrorism-conviction-mass-surveillance-case/6440325001/
                        
<https://www.usatoday.com/story/news/2021/12/08/federal-court-upholds-terrorism-conviction-mass-surveillance-case/6440325001/>

                        */[jiayihao] there is no doubt./*

                        2) Rather than contradicting efforts, it is
                        time to review whether any of these schemes
                        such as mapping techniques really is effective
                        for the perceived "protection". As much of the
                        current science fiction type crime scene
                        detective novel / movie / TV program hinted,
                        the government probably has more capability to
                        zero-in on anyone than an ordinary citizen can
                        imagine, anyway. And, businesses have gathered
                        more information about us than they will ever
                        admit. Perhaps we should "think out of the
                        box" by going back to the PSTN days of
                        definitive subscriber identification systems,
                        so that accordingly we will behave
                        appropriately on the Internet, and the
                        government will be allowed to only monitor
                        suspected criminals by filing explicit
                        (although in secret) requests, case by case,
                        to the court for approval?

                        Happy Holidays!

                        Abe (2021-12-22 21:00 EST)

                        Hello Tom,

                        The privacy countermeasure for IPv4/IPv6 is 
interestingly different.

                        IPv4 usually utilize CGNAT, i.e., M(hosts)-to-N(IPs), where M 
>> N so that the host could remain anonymous

                        IPv6 usually utilize Temporary address, i.e., 
1(host)-to-M(IPs[at least suffix level]), where M >> 1 so that the host could 
remain anonymous.

                        HOWEVER, I don't feel any approach reaches privacy 
perfectly, because access network have a global perspective on M-to-N or 1-to-M 
mapping.

                        For this, it is hard to be convinced that IPv4/6 itself 
can reach a perfect privacy.

                        Thanks,

                        Yihao Jia

                        -----------

                        I believe CGNAT is better than IPv6 in terms of privacy 
in addressing.

                        In fact one might argue that IPv4 provides better 
privacy and security

                        than IPv6 in this regard. Temporary addresses are not 
single use which

                        means the attacker can correlate addresses from a user 
between

                        unrelated flows during the quantum the temporary 
address is used. When

                        a user changes their address, the attacker can continue 
monitoring if

                        it is signaled that the address changed. Here is a 
fairly simple

                        exploit I derived to do that (from

                        draft-herbert-ipv6-prefix-address-privacy-00).

                        The exploit is:

                               o An attacker creates an "always connected" app 
that provides some

                                 seemingly benign service and users download 
the app.

                               o The app includes some sort of persistent 
identity. For instance,

                                 this could be an account login.

                               o The backend server for the app logs the 
identity and IP address

                                 of a user each time they connect

                               o When an address change happens, existing 
connections on the user

                                 device are disconnected. The app will receive 
a notification and

                                 immediately attempt to reconnect using the new 
source address.

                               o The backend server will see the new connection 
and log the new

                                 IP address as being associated with the 
specific user. Thus,

                        the server has

                                 a real-time record of users and the IP address 
they are using.

                               o The attacker intercepts packets at some point 
in the Internet.

                                 The addresses in the captured packets can be 
time correlated

                                 with the server database to deduce identities 
of parties in

                                 communications that are unrelated to the app.

                        The only way I see to mitigate this sort of 
surveillance is single use

                        addresses. That is effectively what  CGNAT can provide.

                        Tom

                        Image removed by sender.
                        
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=icon>

                                

                        Virus-free. www.avast.com
                        
<https://www.avast.com/sig-email?utm_medium=email&utm_source=link&utm_campaign=sig-email&utm_content=emailclient&utm_term=link>



--
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
_______________________________________________
Int-area mailing list
Int-area@ietf.org
https://www.ietf.org/mailman/listinfo/int-area

Reply via email to