On the Generation of Transient Numeric Identifiers
draft-irtf-pearg-numeric-ids-generation-07
Internet Research Task Force (IRTF) F. Gont
Internet-Draft SI6 Networks
Intended status: Informational I. Arce
Expires: August 6, 2021 Quarkslab
February 2, 2021
On the Generation of Transient Numeric Identifiers
draft-irtf-pearg-numeric-ids-generation-07
Abstract
This document performs an analysis of the security and privacy
implications of different types of "transient numeric identifiers"
used in IETF protocols, and tries to categorize them based on their
interoperability requirements and their associated failure severity
when such requirements are not met. Subsequently, it provides advice
on possible algorithms that could be employed to satisfy the
interoperability requirements of each identifier category, while
minimizing the negative security and privacy implications, thus
providing guidance to protocol designers and protocol implementers.
Finally, it describes a number of algorithms that have been employed
in real implementations to generate transient numeric identifiers,
and analyzes their security and privacy properties. This document is
a product of the Privacy Enhancement and Assessment Research Group
(PEARG) in the IRTF.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 6, 2021.
Gont & Arce Expires August 6, 2021 [Page 1]
Internet-Draft Generation of Transient Numeric IDs February 2021
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Threat Model . . . . . . . . . . . . . . . . . . . . . . . . 5
4. Issues with the Specification of Transient Numeric
Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . 6
5. Protocol Failure Severity . . . . . . . . . . . . . . . . . . 7
6. Categorizing Transient Numeric Identifiers . . . . . . . . . 7
7. Common Algorithms for Transient Numeric Identifier Generation 10
7.1. Category #1: Uniqueness (soft failure) . . . . . . . . . 10
7.2. Category #2: Uniqueness (hard failure) . . . . . . . . . 13
7.3. Category #3: Uniqueness, stable within context (soft
failure) . . . . . . . . . . . . . . . . . . . . . . . . 13
7.4. Category #4: Uniqueness, monotonically increasing within
context (hard failure) . . . . . . . . . . . . . . . . . 15
8. Common Vulnerabilities Associated with Transient Numeric
Identifiers . . . . . . . . . . . . . . . . . . . . . . . . . 21
8.1. Network Activity Correlation . . . . . . . . . . . . . . 21
8.2. Information Leakage . . . . . . . . . . . . . . . . . . . 22
8.3. Fingerprinting . . . . . . . . . . . . . . . . . . . . . 23
8.4. Exploitation of the Semantics of Transient Numeric
Identifiers . . . . . . . . . . . . . . . . . . . . . . . 24
8.5. Exploitation of Collisions of Transient Numeric
Identifiers . . . . . . . . . . . . . . . . . . . . . . . 24
8.6. Exploitation of Predictable Transient Numeric Identifiers
for Injection Attacks . . . . . . . . . . . . . . . . . . 24
8.7. Cryptanalysis . . . . . . . . . . . . . . . . . . . . . . 25
9. Vulnerability Assessment of Transient Numeric Identifiers . . 26
9.1. Category #1: Uniqueness (soft failure) . . . . . . . . . 26
9.2. Category #2: Uniqueness (hard failure) . . . . . . . . . 26
9.3. Category #3: Uniqueness, stable within context (soft
failure) . . . . . . . . . . . . . . . . . . . . . . . . 27
9.4. Category #4: Uniqueness, monotonically increasing within
Show full document text