Re: [rtcweb] Revealing IP addresses (Re: Review of draft-ietf-rtcweb-use-cases-and-requirements-10 (Part II))

Eric Burger <eburger@standardstrack.com> Mon, 04 February 2013 10:52 UTC

Return-Path: <eburger@standardstrack.com>
X-Original-To: rtcweb@ietfa.amsl.com
Delivered-To: rtcweb@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 65DA521F8444 for <rtcweb@ietfa.amsl.com>; Mon, 4 Feb 2013 02:52:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.599
X-Spam-Level:
X-Spam-Status: No, score=-102.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dQP0V4nNe+Ws for <rtcweb@ietfa.amsl.com>; Mon, 4 Feb 2013 02:52:32 -0800 (PST)
Received: from biz104.inmotionhosting.com (biz104.inmotionhosting.com [74.124.215.15]) by ietfa.amsl.com (Postfix) with ESMTP id A593021F8442 for <rtcweb@ietf.org>; Mon, 4 Feb 2013 02:52:32 -0800 (PST)
Received: from 208.177.47.110.ptr.us.xo.net ([208.177.47.110]:59586 helo=[10.166.71.157]) by biz104.inmotionhosting.com with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.80) (envelope-from <eburger@standardstrack.com>) id 1U2Jek-00086V-71; Mon, 04 Feb 2013 02:52:10 -0800
Content-Type: multipart/signed; boundary="Apple-Mail=_30640413-C1C1-485A-B183-8FF5D88551C9"; protocol="application/pgp-signature"; micalg="pgp-sha1"
Mime-Version: 1.0 (Mac OS X Mail 6.2 \(1499\))
From: Eric Burger <eburger@standardstrack.com>
In-Reply-To: <CABcZeBPk+9-qJhScSGcVhTr9=077TiU8NERqNabpq-LtVXKTjQ@mail.gmail.com>
Date: Mon, 04 Feb 2013 05:52:31 -0500
Message-Id: <BA4D4176-729C-47AF-9AAC-816F4BC97F94@standardstrack.com>
References: <50F97303.4070906@ericsson.com> <CABkgnnWcqZ+dU+87djBQ0z47ufB-Go13mWyPi_ZQA8BPinQJEA@mail.gmail.com> <BLU002-W1705DC54006131B55B432A931F0@phx.gbl> <BLU002-W210B8DBB897CAF5BECC501A931F0@phx.gbl> <5109265F.6040106@ericsson.com> <BLU002-W123BE6BAA58BE0B26DEA28F931E0@phx.gbl> <510B9A41.8000804@ericsson.com> <510B9FD8.6000008@alvestrand.no> <510BB070.9040602@ericsson.com> <510CEAF9.6020509@alvestrand.no> <510D0D14.4050301@ericsson.com> <510D6039.3060501@alvestrand.no> <CABcZeBMyH7KThkrqZRy4b2eLOpELnPhNsaYpL3D4EcbwG9XRyg@mail.gmail.com> <479FFA31-EE78-4E6E-A8BB-440DF9A82A74@cs.georgetown.edu> <CABcZeBPz2X+CkcrVqdGk-Xzf98VEdND8H+Drxs+0=Mou=xNzKg@mail.gmail.com> <984674BE-1A5C-4728-89C1-F2EAAD1A3D6B@standardstrack.com> <CABcZeBPk+9-qJhScSGcVhTr9=077TiU8NERqNabpq-LtVXKTjQ@mail.gmail.com>
To: Eric Rescorla <ekr@rtfm.com>
X-Mailer: Apple Mail (2.1499)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz104.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - standardstrack.com
X-Source:
X-Source-Args:
X-Source-Dir:
Cc: "rtcweb@ietf.org" <rtcweb@ietf.org>
Subject: Re: [rtcweb] Revealing IP addresses (Re: Review of draft-ietf-rtcweb-use-cases-and-requirements-10 (Part II))
X-BeenThere: rtcweb@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Real-Time Communication in WEB-browsers working group list <rtcweb.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rtcweb>
List-Post: <mailto:rtcweb@ietf.org>
List-Help: <mailto:rtcweb-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rtcweb>, <mailto:rtcweb-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 04 Feb 2013 10:52:33 -0000

Under what circumstances would it be up to the Web server to decide to make the client interaction quasi-anonymous? Would that not be a entirely up to and the responsibility of the client? By definition, the Web server is not anonymous -- the user had to reach it somehow to get the page in the first place. Likewise, it is well within the power of the server to obfuscate its media address. It is quite likely media is NOT coming from the same IP address as the Web page under normal circumstances, so the server has built-in opportunities to obfuscate its address. Conversely, it is well within the capabilities of the browser to figure out how to obfuscate its media address. More importantly, I have yet to hear a cogent use case for the server saying, "I want this interaction to not have IP addresses *TO PROTECT YOU*." If you are in a scenario where you need protection, you cannot depend on the server. You must depend on yourself, which means you will have a browser that will protect you. Moreover, will not a bad server simply always tell all browsers it connects with to open lots of anonymity relays to DDoS the relays? Saying we want to build something that is only sometimes useful and can only be useful if we trust all sides to do the right thing does not sound very useful.

Am I missing something here?

On Feb 3, 2013, at 6:48 PM, Eric Rescorla <ekr@rtfm.com> wrote:

> 
> 
> On Sun, Feb 3, 2013 at 10:56 AM, Eric Burger <eburger@standardstrack.com> wrote:
> To be clear, I think ekr's formulation is the best:
> > 1. If you don't want the server learning your global IP, you need to use Tor or the like.
> 
> To me, this means it is totally orthogonal to RTCweb. If you want to use Tor, a TURN server, an ALG, or foo, that is up to you. That does not impact the protocol.
> 
> That's certainly what I meant to be saying, with the small caveat that
> if you are using media relays (e.g., TURN) they are supposed to be
> reflected in ICE candidate lines.
> 
> 
> > 2. I would suggest that it is simplest to divide the world into host addresses, server/peer
> > reflexive, and relayed and say that the requirement is that the browser must be able
> > to send packets without revealing either of the former two, but that it is not a requirement
> > that it be able to do so in the face of an adversarial server.
> And this is the most reasonable. I guess the concern is we will forget all of this list discussion, and someone will require hard-coded endpoint IP addresses in the protocol, which is what sunk SIP in the early days.
> 
> Inline…
> 
> On Feb 3, 2013, at 1:32 PM, Eric Rescorla <ekr@rtfm.com> wrote:
> 
> > On Sun, Feb 3, 2013 at 7:32 AM, Burger Eric <eburger@cs.georgetown.edu> wrote:
> > Is what we are really asking for is the ability of the protocol to be TOR-, TURN-, and mumble-friendly? I am hesitant to suggest we bake in one particular anonymity network or another into the RTCweb protocol suite.
> >
> > I'm certainly not suggesting that.
> >
> >
> > On the one hand, with my purist hat on, saying it is a requirement to make sure we do not need to have end-to-end connectivity smells a bit weird.
> >
> >> I don't understand this... I don't think anyone is suggesting that.
> 
> Saying we will bake into the protocol the REQUIREMENT that it support good or bad boxes in the middle of the network does not sound like the end-to-end Internet. It sounds more like IMS.
> 
> Which requirement do you think suggests that? I certainly favor requirements that we be
> able to work in the face of as many known classes of intermediaries (NATs, firewalls,
> etc. as possible.) I mean, isn't that the point of ICE supporting TURN and other types
> of relays?
> 
> Is there something wrong with this? Do you think people are suggesting some
> other requirement?
> 
> 
> > On the other hand, with my practical hat on, saying it is a requirement to make sure the protocol works in situations that are NOT the Internet (NATs, a need for an overlay privacy network, etc.) seems like a good thing to do.
> >
> >> As far as I know, the only novel requirement here is that there be a way for Web
> >> application to tell the browser to solely use relayed addresses/candidates
> >> (and hopefully thus not reveal the user's actual location) when communicating
> >> with the peer. There is of course a requirement to be able to work when
> >> behind NATs but that is a functional requirement, not an anonymity one.
> 
> That is asking an awful lot of an application. Moreover, as the cat-and-mouse game of anonymous application communication is ever evolving, I would challenge how meaningful it is to specify a Hidden Bit or Anonymous Bit in the protocol. I would offer that will work as well as the Evil Bit.
> 
> I really am not following what you are saying here about a "hidden bit"?
> 
> There is a very specific requirement being suggested here, namely that applications
> should be able to instruct browsers not to use host or srvflx candidates. This is
> neither a hidden bit, nor an anonymous bit. Rather, it is a mechanism designed
> to allow the site, *if it wishes* to offer a calling service that doesn't immediately
> reveal the caller's location. This isn't a complete anonymity service against
> sophisticated attackers. For that you need something like Tor. Rather, it's an
> easy-to-implement measure that offers location protection against a 
> (relatively common) class of limited attackers.
> 
> What is it you object to about this requirement?
> 
> -Ekr
>