Thread Links Date Links
Thread Prev Thread Next Thread Index Date Prev Date Next Date Index

Re: [STDS-802-Privacy] Confidentiality in the Face of Pervasive Surveillance: re A Threat Model and Problem Statement



Hi Mick,

 

Thanks for pointing to the assumption of a purely passive attacker. I fully agree that considering only pervasive ‘passive’ surveillance is much too short. On the other side I don’t believe that it should become task of the Privacy SG to evaluate the strength of security protocols regarding flaws and backdoors – such assurance of quality of security means belongs to the duties of the security groups.

 

But the intersection that attackers actively use legitimate protocol behavior to illegitimately retrieve privacy related information is a domain that the privacy SG should address.

 

Also agreeing that the initial PAR should be tightly focused, it may not be appropriate to continue with the differentiation between passive pervasive surveillance and leveraging legitimate protocol behavior to actively querying the information.

 

Bye

Max

 

From: ext Mick's Gmail Calendar [mailto:mickseaman@xxxxxxxxx]
Sent: Monday, April 13, 2015 08:44
To: STDS-802-PRIVACY@xxxxxxxxxxxxxxxxx
Subject: Re: [STDS-802-Privacy] Confidentiality in the Face of Pervasive Surveillance: re A Threat Model and Problem Statement

 

The most striking thing about the referenced PrivSec draft (for me) is the assumption of a purely passive attacker. Hacking tools that use active techniques to invoke disclosure are widely available [google "wi-fi pineapple" for example -I'm not providing links for obvious reasons and advise great care when acquiring such tools to verify their claims, though their listed techniques should be of considerable interest to us] and I don't currently believe that is safe to assume that pervasive surveillance is technically constrained to passive attacks except in the very special case of an attacker who is very sensitive to disclosing his presence and techniques-e.g. an attacker who has to maintain a strong appearance of legality and is restricted in his ability to change or override legal considerations. This excludes most opportunistic criminal attackers (at one end of the spectrum) and repressive regimes (at the other).

 

It does make me wonder if the initial privacy sg par should not be much more tightly focused - recommendations on resisting persistence surveillance by passive attackers for example, rather than privacy as a whole. That restricted scope should be challenging in itself (there is more than MAC address use that can identify a device) and we don't have any input to date on resisting active attacks (e.g. advertising bogus SSIDs to see if mobile stations are interested in them-how many students were at that demonstration)  and we haven't demonstrated technical feasibility for any active attacks.

 

Mick

Sent from my iPhone


On Apr 3, 2015, at 3:26 AM, Zuniga, Juan Carlos <JuanCarlos.Zuniga@xxxxxxxxxxxxxxxx> wrote:

As you are probably aware, the Internet Architecture Board (IAB) and the PrivSec IAB program (where I participate) have recently issued a statement on Internet Confidentiality.

 

Now the IAB PrivSec program is working on a new internet-draft on “Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement.” During the last IETF meeting we had some discussions about it which I believe are relevant to the work we are doing in the IEEE Privacy EC SG.

 

This is a link to the latest draft: http://tools.ietf.org/html/draft-iab-privsec-confidentiality-threat

 

I will reserve some time in the agenda of our next teleconference call on April 15th to discuss about it. Meanwhile, if you have any comments please submit them to this Privacy EC SG list.

 

Regards,

 

Juan Carlos

(IEEE 802 Privacy EC SG Chair)