< draft-irtf-pearg-safe-internet-measurement-02.txt   draft-irtf-pearg-safe-internet-measurement-03.txt >
Network Working Group I. Learmonth Network Working Group I. Learmonth
Internet-Draft Tor Project Internet-Draft Tor Project
Intended status: Informational December 4, 2019 Intended status: Informational May 18, 2020
Expires: June 6, 2020 Expires: November 19, 2020
Guidelines for Performing Safe Measurement on the Internet Guidelines for Performing Safe Measurement on the Internet
draft-irtf-pearg-safe-internet-measurement-02 draft-irtf-pearg-safe-internet-measurement-03
Abstract Abstract
Researchers from industry and academia often use Internet Researchers from industry and academia often use Internet
measurements as part of their work. While these measurements can measurements as part of their work. While these measurements can
give insight into the functioning and usage of the Internet, they can give insight into the functioning and usage of the Internet, they can
come at the cost of user privacy. This document describes guidelines come at the cost of user privacy. This document describes guidelines
for ensuring that such measurements can be carried out safely. for ensuring that such measurements can be carried out safely.
Note Note
skipping to change at page 1, line 43 skipping to change at page 1, line 43
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/. Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on June 6, 2020. This Internet-Draft will expire on November 19, 2020.
Copyright Notice Copyright Notice
Copyright (c) 2019 IETF Trust and the persons identified as the Copyright (c) 2020 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of (https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. to this document.
1. Introduction 1. Introduction
skipping to change at page 2, line 30 skipping to change at page 2, line 30
1.1. Scope of this document 1.1. Scope of this document
Following the guidelines contained within this document is not a Following the guidelines contained within this document is not a
substitute for any institutional ethics review process, although substitute for any institutional ethics review process, although
these guidelines could help to inform that process. Similarly, these these guidelines could help to inform that process. Similarly, these
guidelines are not legal advice and local laws must also be guidelines are not legal advice and local laws must also be
considered before starting any experiment that could have adverse considered before starting any experiment that could have adverse
impacts on user safety. impacts on user safety.
1.2. Active and passive measurements The scope of this document is restricted to guidelines that mitigate
exposure to risks to Internet user safety when measuring properties
of the Internet: the network, its constiuent hosts and links, or its
users traffic.
For the purpose of this document, an Internet user is an individual
or organisation that uses the Internet to communicate, or maintains
Internet infrastructure.
1.2. Threat Model
A threat is a potential for a security violation, which exists when
there is a circumstance, capability, action, or event that could
breach security and cause harm [RFC4949]. Every Internet measurement
study has the potential to subject Internet users to threat actions,
or attacks.
Many of the threats to user safety occur from an instantiation (or
combination) of the following:
Surveillance: An attack whereby an Internet user's information is
collected. This type of attack covers not only data but also
metadata.
Inadequate protection of collected data: An attack where data, either
in flight or at rest, was not adequately protected from disclosure.
Failure to adequately protect data to the expectations of the user is
an attack even if it does not lead to another party gaining access to
the data.
Traffic generation: An attack whereby traffic is generated to
traverse the Internet.
Traffic modification: An attack whereby the Internet traffic of users
is modified.
Any conceivable Internet measurement study might be considered an
attack on an Internet user's safety. It is always necessary to
consider the best approach to mitigate the impact of measurements,
and to balance the risks of measurements against the benefits to
impacted users.
1.3. Measurement Studies
Internet measurement studies can be broadly categorized into two Internet measurement studies can be broadly categorized into two
groups: active measurements and passive measurements. Active groups: active measurements and passive measurements. Active
measurements generate traffic. Performance measurements such as TCP measurements generate or modify traffic while passive measurements
throughput testing [RFC6349] or functional measurements such as the use surveillance of existing traffic. The type of measurement is not
feature-dependent connectivity failure tests performed by truly binary and many studies will include both active and passive
[PATHspider] both fall into this category. Performing passive components. The measurement of generated traffic may also lead to
measurements requires existing traffic. insights into other users' traffic indirectly.
Both active and passive measurements carry risk. A poorly considered XXX On-path/off-path
active measurement could result in an inadvertent denial-of-service
attack, while passive measurements could result in serious violations
of user privacy.
The type of measurement is not truly binary and many studies will XXX One ended/two ended
include both active and passive components. Each of the
considerations in this document must be carefully considered for 1.4. User Impact from Measurement Studies
their applicability regardless of the type of measurement.
Consequences of attacks
Breach of Privacy: data collection. This impact also covers the case
of an Internet user's data being shared beyond that which a user had
given consent for.
Impersonation: An attack where a user is impersonated during a
measurement.
XXX Legal
XXX Other Retribution
System corruption: An attack where generated or modified traffic
causes the corruption of a system. This attack covers cases where a
user's data may be lost or corrupted, and cases where a user's access
to a system may be affected.
XXX Data loss, corruption
XXX Denial of Service (by which self-censorship is covered)
XXX Emotional Trauma
2. Consent 2. Consent
XXX a user is best placed to balanced risks vs benefits themselves
In an ideal world, informed consent would be collected from all users In an ideal world, informed consent would be collected from all users
that may be placed at risk, no matter how small a risk, by an that may be placed at risk, no matter how small a risk, by an
experiment. In cases where it is practical to do so, this should be experiment. In cases where it is practical to do so, this should be
done. done.
2.1. Informed Consent 2.1. Informed Consent
For consent to be informed, all possible risks must be presented to For consent to be informed, all possible risks must be presented to
the users. The considerations in this document can be used to the users. The considerations in this document can be used to
provide a starting point although other risks may be present provide a starting point although other risks may be present
skipping to change at page 8, line 32 skipping to change at page 9, line 49
[MenloReportCompanion] [MenloReportCompanion]
Bailey, M., Dittrich, D., and E. Kenneally, "Applying Bailey, M., Dittrich, D., and E. Kenneally, "Applying
Ethical Principles to Information and Communication Ethical Principles to Information and Communication
Technology Research", October 2013, Technology Research", October 2013,
<https://www.impactcybertrust.org/link_docs/Menlo-Report- <https://www.impactcybertrust.org/link_docs/Menlo-Report-
Companion.pdf>. Companion.pdf>.
[netem] Stephen, H., "Network emulation with NetEm", April 2005. [netem] Stephen, H., "Network emulation with NetEm", April 2005.
[PATHspider]
Learmonth, I., Trammell, B., Kuehlewind, M., and G.
Fairhurst, "PATHspider: A tool for active measurement of
path transparency", DOI 10.1145/2959424.2959441, July
2016,
<https://dl.acm.org/citation.cfm?doid=2959424.2959441>.
[RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for [RFC2544] Bradner, S. and J. McQuaid, "Benchmarking Methodology for
Network Interconnect Devices", RFC 2544, Network Interconnect Devices", RFC 2544,
DOI 10.17487/RFC2544, March 1999, DOI 10.17487/RFC2544, March 1999,
<https://www.rfc-editor.org/info/rfc2544>. <https://www.rfc-editor.org/info/rfc2544>.
[RFC6349] Constantine, B., Forget, G., Geib, R., and R. Schrage, [RFC4949] Shirey, R., "Internet Security Glossary, Version 2",
"Framework for TCP Throughput Testing", RFC 6349, August 2007, <https://www.rfc-editor.org/info/rfc4949>.
DOI 10.17487/RFC6349, August 2011,
<https://www.rfc-editor.org/info/rfc6349>.
[RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J., [RFC6973] Cooper, A., Tschofenig, H., Aboba, B., Peterson, J.,
Morris, J., Hansen, M., and R. Smith, "Privacy Morris, J., Hansen, M., and R. Smith, "Privacy
Considerations for Internet Protocols", RFC 6973, July Considerations for Internet Protocols", RFC 6973, July
2013, <https://www.rfc-editor.org/info/rfc6937>. 2013, <https://www.rfc-editor.org/info/rfc6937>.
[Tor.2017-04-001] [Tor.2017-04-001]
Herm, K., "Privacy analysis of Tor's in-memory Herm, K., "Privacy analysis of Tor's in-memory
statistics", Tor Tech Report 2017-04-001, April 2017, statistics", Tor Tech Report 2017-04-001, April 2017,
<https://research.torproject.org/techreports/privacy-in- <https://research.torproject.org/techreports/privacy-in-
 End of changes. 11 change blocks. 
30 lines changed or deleted 84 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/