Distributed Mobility Management [dmm]                         C. Perkins
Internet-Draft                                                 Futurewei
Expires: April 29, 2015                                    S. Gundavelli
                                                          Cisco Networks
                                                        October 26, 2014


                     Privacy considerations for DMM
                    draft-perkins-dmm-privacy-00.txt

Abstract

   Recent events have emphasized the importance of privacy in protocol
   design.  This document describes ways in which DMM protocol designs
   and DMM networks can reduce certain threats to privacy.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on April 29, 2015.

Copyright Notice

   Copyright (c) 2014 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.




Perkins & Gundavelli     Expires April 29, 2015                 [Page 1]


Internet-Draft                 DMM Privacy                  October 2014


Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Pseudo-home Address . . . . . . . . . . . . . . . . . . . . .   3
   3.  Source IPv6 Address Utilization . . . . . . . . . . . . . . .   3
   4.  MPTCP . . . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   5.  MNID  . . . . . . . . . . . . . . . . . . . . . . . . . . . .   3
   6.  MAC Randomization . . . . . . . . . . . . . . . . . . . . . .   3
   7.  Non-issues  . . . . . . . . . . . . . . . . . . . . . . . . .   4
   8.  Security Considerations . . . . . . . . . . . . . . . . . . .   4
   9.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .   4
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .   4
     10.1.  Normative References . . . . . . . . . . . . . . . . . .   4
     10.2.  Informative References . . . . . . . . . . . . . . . . .   5
   Authors' Addresses  . . . . . . . . . . . . . . . . . . . . . . .   5

1.  Introduction

   There have been many recent disclosures about breaches of privacy,
   and the all-too-frequent news stories about identity theft, credit
   card services infiltrated, and other serious threats.  An extensive
   IAB discussion about the nature of such breaches is available
   [RFC6462].

   Within the IETF, there has been a greatly increased awareness of how
   to mitigate these threats by improved protocol design [RFC6973].  One
   major danger is the dissemination of long-lived identifiers as part
   of protocol transactions.  When a long-lived identifier can be
   observed in such transactions with disparate applications and
   servers, a history can be constructed about the person associated
   with that long-lived identier.  Remarkably accurate predications can
   then be made about the future behavior of that person -- a clear
   threat to privacy.  Notably, such predictions are not at all illegal,
   and yet most people would consider the ability to make such
   predictions as an unwanted outcome of using IETF protocols.
   Similarly, knowledge about the recent history of a person as inferred
   by tracking a long-lived identifier can provide strong hints about
   how to analyze the earlier actions (including personal interactions)
   of that person.

   This document details the mechanisms as currently understood within
   mobility management protocols in order to better avoid perpetuating
   potential threats to privacy within DMM.  As a general rule,
   trackable information in protocol messages should be avoided as much
   as possible [RFC4882].

   The following mechanisms are discussed.




Perkins & Gundavelli     Expires April 29, 2015                 [Page 2]


Internet-Draft                 DMM Privacy                  October 2014


   o  Recommend implementation of pseudo-home address feature [RFC5726].
   o  Source IPv6 address for data packets could be used only for the
      lifetime of the application used for that address
   o  MPTCP may be useful for additional protection against traffic
      analysis
   o  MNID may contain confidential information.  Packets in which the
      MNID extension contains a confidential identifer should be
      encrypted.
   o  MAC randomization, recent Apple announcement

2.  Pseudo-home Address

   Recommend consideration of using the pseudo-home address feature from
   RFC 5726[RFC5726].  This has the effect of reducing or eliminating
   the ability to track the movement events related to a mobile node,
   which otherwise might be visible to snooping devices located anywhere
   between the mobile node and home agent.

3.  Source IPv6 Address Utilization

   Source IPv6 address for data packets could be used only for the
   lifetime of the application used for that address.  For this purpose,
   each new address can be generated as detailed in [RFC4941].

4.  MPTCP

   MPTCP [RFC6824] can be used for additional protection against traffic
   analysis.  This can be done by spreading traffic over several
   associated TCP endpoints, either randomly, or as chosen to emulate
   traffic patterns for unrelated applications.

5.  MNID

   MNID [RFC4283] may contain confidential information.  Control packets
   in which the MNID extension contains a confidential identifer should
   be encrypted.  Alternatively, the MN-ID could be generated based on
   CUI (Chargeable user identity), or some other temporary identifier.
   In that way, the access network would never have access to the real
   MN-ID.

6.  MAC Randomization

   While not under the jurisdiction of the IETF, MAC addresses are often
   included within IETF protocols.  For the purposes of better
   protecting privacy, there has been much recent discussion about
   randomization of MAC addresses.  As one example, see the recent
   announcement about Randomized Wi-Fi addresses by Apple Computers
   [apple-privacy].



Perkins & Gundavelli     Expires April 29, 2015                 [Page 3]


Internet-Draft                 DMM Privacy                  October 2014


   Various protocols derived from Mobile IP are designed using certain
   assumptions related to the use of same MAC address.  For example, LMA
   looks up a MN session using the MN's MAC address.  This breaks when
   the MAC address changes.  It is recommended that mobility management
   protocols reduce or eliminate dependence on MAC addresses.  Some
   specific suggestions include the following:

   o  Require the MN to present a new MAC address in each access attach.
   o  Allow MN to present multiple MAC addresses during a single attach.
   o  Handover keys and other key material should be able to deal with
      MAC address changes.

7.  Non-issues

   There are many cases where nonces or cookies are used for temporary
   use during control signal sequences -- for instance nonces as used
   with Mobile IP route optimization [RFC6275].  Insofar as these fields
   are used only temporarily, they are not often useful for tracking
   user movements.  Even so, when the same value is used for a request
   and returned in a response, a small bit of information is leaked
   about the status of a protocol transaction.  This may not be
   important, but if so can be averted by encryption.

8.  Security Considerations

   This document is entirely concerned with raising important security
   considerations, but does not specify any new protocol that may affect
   existing security designs.

9.  IANA Considerations

   This document does not suggest any IANA actions.

10.  References

10.1.  Normative References

   [RFC3315]  Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C.,
              and M. Carney, "Dynamic Host Configuration Protocol for
              IPv6 (DHCPv6)", RFC 3315, July 2003.

   [RFC4283]  Patel, A., Leung, K., Khalil, M., Akhtar, H., and K.
              Chowdhury, "Mobile Node Identifier Option for Mobile IPv6
              (MIPv6)", RFC 4283, November 2005.

   [RFC4285]  Patel, A., Leung, K., Khalil, M., Akhtar, H., and K.
              Chowdhury, "Authentication Protocol for Mobile IPv6", RFC
              4285, January 2006.



Perkins & Gundavelli     Expires April 29, 2015                 [Page 4]


Internet-Draft                 DMM Privacy                  October 2014


   [RFC4882]  Koodli, R., "IP Address Location Privacy and Mobile IPv6:
              Problem Statement", RFC 4882, May 2007.

   [RFC4941]  Narten, T., Draves, R., and S. Krishnan, "Privacy
              Extensions for Stateless Address Autoconfiguration in
              IPv6", RFC 4941, September 2007.

   [RFC5726]  Qiu, Y., Zhao, F., and R. Koodli, "Mobile IPv6 Location
              Privacy Solutions", RFC 5726, February 2010.

   [RFC6275]  Perkins, C., Johnson, D., and J. Arkko, "Mobility Support
              in IPv6", RFC 6275, July 2011.

   [RFC6462]  Cooper, A., "Report from the Internet Privacy Workshop",
              RFC 6462, January 2012.

   [RFC6824]  Ford, A., Raiciu, C., Handley, M., and O. Bonaventure,
              "TCP Extensions for Multipath Operation with Multiple
              Addresses", RFC 6824, January 2013.

   [RFC6973]  Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
              Morris, J., Hansen, M., and R. Smith, "Privacy
              Considerations for Internet Protocols", RFC 6973, July
              2013.

10.2.  Informative References

   [apple-privacy]
              Apple Computer, , "Randomized Wi-Fi Addresses", 2014,
              <https://www.apple.com/privacy/privacy-built-in/>.

Authors' Addresses

   Charles E. Perkins
   Futurewei Inc.
   2330 Central Expressway
   Santa Clara, CA  95050
   USA

   Phone: +1-408-330-4586
   Email: charliep@computer.org










Perkins & Gundavelli     Expires April 29, 2015                 [Page 5]


Internet-Draft                 DMM Privacy                  October 2014


   Sri Gundavelli
   Cisco Networks
   170 West Tasman Drive
   San Jose, CA  95134
   USA

   Email: sgundave@cisco.com












































Perkins & Gundavelli     Expires April 29, 2015                 [Page 6]