Skip to main content

Minutes IETF114: ppm: Thu 10:00
minutes-114-ppm-202207281000-00

Meeting Minutes Privacy Preserving Measurement (ppm) WG
Date and time 2022-07-28 14:00
Title Minutes IETF114: ppm: Thu 10:00
State Active
Other versions markdown
Last updated 2022-08-05

minutes-114-ppm-202207281000-00

PPM (Privacy Preserving Measurements) at IETF 114

Thursday Session 1

Welcome, Administrivia, Agenda Bashing

STAR: Distributed Secret Sharing for Private Threshold Aggregation - Reporting (Shivan Kaul Sahib)

  • Note: not adopted as a WG doc
    https://datatracker.ietf.org/doc/html/draft-dss-star
  • Central idea: use Shamir secret sharing (see Alex preso from IETF
    113). Need an anonymizing proxy, such as OHAI, and a randomness
    server (masked via OPRF). Implemented in Brave for some telemetry.
  • EKR detailed tech Q&A about risks of accepting bad shares and being
    able to reject bogus values; see Apple docs on how they addressed
    this.
  • Chairs: might revisit adoption at end of session if there is time.

Distributed Aggregation Protocol for Privacy Preserving Measurement

https://datatracker.ietf.org/doc/html/draft-ietf-ppm-dap-01

## What's new in DAP-01 (Tim Geoghegan)

  • Implementation status: two servers in rust (share common code),
    client in typescript. Needs draft-irtf-cfrg-vdaf, both servers use
    rust prio crate. Interop testing between servers underway. Designing
    interop runner, like quicInteropRunner
  • Timestamps are more coarse-grained, have more random bytes.
  • Changes to aggregation/leader/jobs to leverage possible
    parallization of preparation.
  • Inter-aggregator channel needs mutual auth. Adding DAP-Auth-Token
    header for now, but that requires long-term shared secret and there
    are already many HTTP auth schemes. See slides for survey of channel
    security among parties. What should the doc say about request
    authentication?
  • Some goals for next draft: rewrite API to be more resource-oriented,
    better use of HTTP BCPs, revisit authen. Look forward to WG
    discussion. EKR: maybe HTTPAPI WG has advice? Chris Patton: not
    comfortable using HPKE for mutual auth. Rich: caveat that there's
    expertise in HTTPAPI but no current work items. Chris Wood: concern
    that generic auth will be too expensive for traffic, this might not
    be a general protocol after all.
  • Discussion of number of helpers involved and communication paths
    between it/them and leader(s). Discussion of power of leader and
    attacks to subvert that.

Use cases / batch selection (Chris Patton)

  • https://mailarchive.ietf.org/arch/msg/ppm/NKPIIm5HvZ1p8EkS3tmwj6DBXDs/
  • DAP overview presented.
  • How to determine set of reports to batch? Need to preserve privacy;
    batch size is app-specific. Currently use time-based intervals. Not
    suited for all uses, such as user-agent or location, or disjoint
    fixed-size batches. So how much more flexibility is needed?
  • Proposal: enumerate query types; batch request includes query,
    leader chooses reports that satisfy query. Implementations need not
    support all query types. EKR: we're already off the fairway, let's
    try to solve the full problem (and not worry about overlapping
    issue? I think he said that) What is underlying rule that preserves
    privacy and implement that rule. DKG: the more complicated it is,
    the harder it is for people to know that they're private. Prefer
    not-dynamic group series. CAW: concerned about
    flexibility/protocol-desireability tradeoffs. Wes: need advice
    especially about legal frameworks. ChrisP: agree we should take
    smallest step possible. EKR: drilling down is an important use-case.

Privacy considerations for the collect sub-protocol (Chris Wood)

  • https://github.com/ietf-wg-ppm/draft-ietf-ppm-dap/issues/195
  • Current query has limiting constraints (min batch size, no overlap,
    etc).
  • Privacy threat model (not robustness threats): limit malicious
    clients, at least one aggregator is honest, and colllector is
    malicious.
  • Enumeration of some attacks and possible mitigations (see slides).
    WG discussion of this.
  • (off-topic: ChrisPatton mentioned that CFRG VDAP discussion will be
    touching on differential privacy, seeking knowledgeable people to
    contribute.)
  • Is this threat model clear? Any attacks missing? Is selecting
    "intersection attack" something we can mitigate in the protocol?
    EKR: yes, probably, yes. ;) Tim: some of this is in the draft. Nick:
    this is a great start. Audio breakup, see chat for Nick's point
    about multiple parties.

Task Enforcement and Configuration (Shan Wang)

  • https://github.com/ietf-wg-ppm/draft-ietf-ppm-dap/issues/271,
    https://github.com/ietf-wg-ppm/draft-ietf-ppm-dap/issues/290
  • Somewhat related to "stuffing attack" from previous. Focusing on
    task parameters here.
  • Potential privacy problems (e.g., min batch size) Since parameters
    are out of band, and therefore out of site, can't confirm. Need
    transparency, enforcement by aggregators.
  • Presented rationale and example for various points in 271 (see
    slides).
  • Taking it futher, doing task configuration in-band (issue 290).
  • Replace task-id from a uuid, to (id,parameters) id is a hash.
  • Tim: valuable to have dynamic capability to not require three-party
    coordination.
  • ChrisP: would like to see a PR, thanks. Shan: will do.
  • DKG: How would client be able to evaluate parameters? Seems
    complicated. Helper keeps system honest, having them evaluate is
    hard, might not get helpers. Shan: I think the transparency is
    important.