hi Stephen, all,

(copying ietf-privacy as requested in the draft)

I've read the draft; it's a very good and welcome start at extending 6973 to a 
set of concrete recommendations for protocol design. I've got one comment on 
opportunistic encryption, though:

In section 3, halfway down the page: "...at minimum, opportunistic encryption 
needs to be well-defined for almost all new IETF standards track protocols." 

I understand the rationale behind that "almost", but the lines around it will 
need to be very clearly drawn. On brief consideration, I cannot think of a 
single _new_ protocol for which opportunistic encryption shouldn't be the 
default, for reasons other than interoperability with an existing protocol that 
has a significant installed base. Even in such cases, I think it would be 
useful to be very clear that communication in the clear for interoperability is 
an exception, a "legacy" mode, "to be deprecated", or other 
not-very-happy-sounding words that mean "we realize we're stuck with it in this 
case but that's really no excuse."

The information radiated even from protocols which have no obvious connection 
with personal data can be correlated with other information which can paint a 
very rich behavioral picture, that only takes one unprotected link in the chain 
to associate with an identity. Opportunistic encryption everywhere reduces the 
content of this radiated information, as well as reducing the risk of 
unprotected links holding some associable identifier. So exceptions will have 
to be very well justified if an aim of this work is protection of privacy 
against pervasive surveillance.

Cheers,

Brian

On Sep 20, 2013, at 6:36 PM, Stephen Farrell <[email protected]> wrote:

> 
> FYI. Comments welcome.
> 
> S.
> 
> 
> -------- Original Message --------
> Subject: New Version Notification for
> draft-cooper-ietf-privacy-requirements-00.txt
> Date: Fri, 20 Sep 2013 09:23:52 -0700
> From: [email protected]
> To: Alissa Cooper <[email protected]>, Sean Turner <[email protected]>,
> Stephen Farrell <[email protected]>
> 
> 
> A new version of I-D, draft-cooper-ietf-privacy-requirements-00.txt
> has been successfully submitted by Alissa Cooper and posted to the
> IETF repository.
> 
> Filename:      draft-cooper-ietf-privacy-requirements
> Revision:      00
> Title:                 Privacy Requirements for IETF Protocols
> Creation date:         2013-09-20
> Group:                 Individual Submission
> Number of pages: 11
> URL:
> http://www.ietf.org/internet-drafts/draft-cooper-ietf-privacy-requirements-00.txt
> Status:
> http://datatracker.ietf.org/doc/draft-cooper-ietf-privacy-requirements
> Htmlized:
> http://tools.ietf.org/html/draft-cooper-ietf-privacy-requirements-00
> 
> 
> Abstract:
>   It is the consensus of the IETF that IETF protocols be designed to
>   avoid privacy violations to the extent possible.  This document
>   establishes a number of protocol design choices as Best Current
>   Practices for the purpose of avoiding such violations.
> 
> 
> 
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> The IETF Secretariat
> 
> 
> 
> _______________________________________________
> perpass mailing list
> [email protected]
> https://www.ietf.org/mailman/listinfo/perpass

Attachment: signature.asc
Description: Message signed with OpenPGP using GPGMail

_______________________________________________
perpass mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/perpass

Reply via email to