<?xml version="1.0" encoding="UTF-8"?>
  <?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
  <!-- generated by https://github.com/cabo/kramdown-rfc2629 version 1.2.11 -->

<!DOCTYPE rfc SYSTEM "rfc2629.dtd" [
]>

<?rfc toc="yes"?>
<?rfc sortrefs="yes"?>
<?rfc symrefs="yes"?>

<rfc ipr="trust200902" docName="draft-arkko-iab-data-minimization-principle-05" category="info">

  <front>
    <title abbrev="Data Minimization">Emphasizing data minimization among protocol participants</title>

    <author initials="J." surname="Arkko" fullname="Jari Arkko">
      <organization>Ericsson</organization>
      <address>
        <postal>
          <street>Valitie 1B</street>
          <city>Kauniainen</city>
          <country>Finland</country>
        </postal>
        <email>jari.arkko@piuha.net</email>
      </address>
    </author>

    <date year="2023" month="July"/>

    
    
    <keyword>Internet-Draft</keyword>

    <abstract>


<t>Data minimization is an important privacy technique, as it can reduce
the amount information exposed about a user.  This document emphasizes
the need for data minimization among primary protocol participants,
such as between clients and servers. Avoiding data leakage to outside
parties is of course very important as well, but both need to be considered
in minimization.</t>

<t>This is because is necessary to protect against endpoints that are
compromised, malicious, or whose interests simply do not align with
the interests of users. It is important to consider the role of a
participant and limit any data provided to it according to that
role.</t>



    </abstract>


  </front>

  <middle>


<section anchor="introduction" title="Introduction">

<t>Privacy been at the center of many activities in the IETF.  Privacy
and its impact on protocol development activities at IETF is discussed
in <xref target="RFC6973"/>, covering a number of topics, from understanding
privacy threats to threat mitigation, including data minimization.</t>

<t>This document emphasizes the need for data minimization among primary
protocol participants, such as between clients and servers. Avoiding
data leakage to outside parties such as observers or attackers is of
course very important as well, but minimization needs to consider
both.</t>

<t>As RFC 6973 states:</t>

<figure><artwork><![CDATA[
   "Limiting the data collected by protocol elements to
    only what is necessary (collection limitation) is 
    the most straightforward way to help reduce privacy
    risks associated with the use of the protocol."
]]></artwork></figure>

<t>This document offers some further discussion, recommendations, and
clarifications for this. This document suggests that limiting the
sharing of data to the protocol participants is a key technique in
limiting the data collection mentioned above. It is important that
minimization happens prior to disclosing information to another
party, rather than relying on the good will of the other party to 
avoid storing the information.</t>

<t>This is because is necessary to protect against endpoints that are
compromised, malicious, or whose interests simply do not align with
the interests of users. It is important to consider the role of a
participant and limit any data provided to it according to that role.</t>

<t>Even closed, managed networks may have compromised nodes, justifying
careful consideration of what information is provided to different
nodes in the network.  And in all networks, increased use of
communication security means adversaries may resort to new avenues of
attack. New adversaries and risks have also arisen, e.g., due to
increasing amount of information stored in various Internet
services. And in situations where interests do not align across the
protocol participants, limiting data collection by a protocol
participant itself - who is interested in data collection - may not be
sufficient.</t>

<t>Careful control of information is also useful for technology
evolution. For instance, allowing a party to unnecessarily collect or
receive information may lead to a similar effect as described in
<xref target="RFC8546"/> for protocols: regardless of initial expectations, over
time unnecessary information will get used, leading to, for instance,
ossification. Systems end up depend on having access to exactly the
same information as they had access to previously. This makes it hard
to change what information is provided or how it is provided.</t>

</section>
<section anchor="rec" title="Recommendations">

<t>The Principle of Least Privilege <xref target="PoLP"/> is applicable:</t>

<figure><artwork><![CDATA[
  "Every program and every user of the system should operate 
   using the least set of privileges necessary to complete the
   job."
]]></artwork></figure>

<t>In this context, it is recommended that the protocol participants
minimize the information they share. I.e., they should provide only
the information to each other that is necessary for the function that
is expected to be performed by the other party.</t>

</section>
<section anchor="discussion" title="Discussion">

<section anchor="types-of-protocol-exchanges" title="Types of Protocol Exchanges">

<t>Information sharing may relate to different types of protocol
exchanges, e.g., interaction of an endpoint with outsiders, the network, or 
intermediaries.</t>

<t>Other documents address aspects related to networks
(<xref target="RFC8546"/>, <xref target="RFC8558"/>, <xref target="I-D.iab-path-signals-collaboration"/>). Thomson <xref target="I-D.thomson-tmi"/>
discusses the role intermediaries. Communications security largely
addresses observers and outsider adversaries, see for instance <xref target="Confidentiality"/>,
<xref target="RFC7858"/>, <xref target="RFC8446"/>, <xref target="RFC8484"/>, <xref target="RFC9000"/>. And <xref target="RFC6973"/>
discusses associated traffic analysis threats.</t>

<t>The focus in this
document is on the primary protocol participants, such as a server in
a client-server architecture or a service enables some kind of
interaction among groups of users.</t>

<t>As with communication security, we try to avoid providing too much
information as it may be misused or leak through attacks. The same
principle applies not just to routers and potential attackers on path,
but also many other services in the Internet, including servers that
provide some function.</t>

</section>
<section anchor="types-of-information" title="Types of information">

<t>The use of identifiers has been extensively discussed in <xref target="RFC6973"/>,</t>

<t>Note that indirectly inferred information can also end up being
shared, such as message arrival times or patterns in the traffic flow
(<xref target="RFC6973"/>). Information may also be obtained from fingerprinting
the protocol participants, in an effort to identify unique endpoints
or users. Information may also be combined from multiple sources,
e.g., websites and social media systems collaborating to identify
visiting users <xref target="WP2021"/>.</t>

</section>
<section anchor="different-ways-of-avoiding-information-sharing" title="Different Ways of Avoiding Information Sharing">

<t>The most straightforward approach is of course to avoid sending a
particular piece of information at all.</t>

<t>Or the information needs to be encrypted to very specific recipients,
even if the encrypted message is shared with a broader set of protocol
participants. For instance, a
client can encrypt a message only to the actual final recipient, even
if the server holds the message before it is delivered.</t>

<figure><artwork><![CDATA[
    Architectural note: A transport connection between
    two components of a system is not an end-to-end 
    connection even if it encompasses all the protocol
    layers up to the application layer. It is not 
    end-to-end, if the information or control function
    it carries extends beyond those components. Just
    because an e-mail server can read the contents of
    an e-mail message do not make it a legitimate
    recipient of the e-mail.
]]></artwork></figure>

<t>This document recommends that information should not be disclosed,
stored, or routed in cleartext through services that do not need to
have that information for the function they perform.</t>

<t>Where the above methods are not possible due to the information being necessary for
a function that the user wishes to be performed, there are still
methods to set limits on the information sharing.</t>

<t>Kühlewind et al discuss the concept of Privacy Partititioning
<xref target="I-D.iab-privacy-partitioning"/>. This may involve designs where no
single party has all information such as with Oblivious DNS
<xref target="I-D.annee-dprive-oblivious-dns"/>, <xref target="I-D.pauly-dprive-oblivious-doh"/>
or HTTP <xref target="I-D.ietf-ohai-ohttp"/>, cryptographic designs where a service
such as with the recent IETF PPM effort <xref target="I-D.ietf-ppm-dap"/>, and so
on.</t>

</section>
<section anchor="role-of-trust" title="Role of Trust">

<t>Of course, participants may provide more information to each other
after careful consideration, e.g., information provided in exchange of
some benefit, or to parties that are trusted by the participant.</t>

</section>
<section anchor="evolvability-and-fingerprinting" title="Evolvability and Fingerprinting">

<t>The general topic of ensuring that protocol mechanisms stays evolvable
and workable is covered in <xref target="I-D.iab-use-it-or-lose-it"/>. But the
associated methods for reducing fingerprinting possibilities probably
deserve further study <xref target="Fingerprinting"/>
<xref target="AmIUnique"/>. <xref target="I-D.wood-pearg-website-fingerprinting"/> discusses one
aspect of this.</t>

</section>
<section anchor="related" title="Related work">

<t>Cooper et al.  <xref target="RFC6973"/> discuss the general concept of privacy,
including data minimization. Among other things, it provides the
general statement quoted in <xref target="introduction"/>. It also provides
guidelines to authors of specifications, a number of questions that
protocol designers can use to further analyze the impact of their
design.  For data minimization the questions relate to identifiers,
data, observers, and fingerprinting. This includes, for instance,
asking what information is exposed to which protocol entities, and if
there are ways to limit such exposure:</t>

<figure><artwork><![CDATA[
    Observers.  Which information discussed in (a) and (b)
    is exposed to each other protocol entity (i.e., recipients,
    intermediaries, and enablers)?  Are there ways for protocol
    implementers to choose to limit the information shared with
    each entity?  Are there operational controls available to
    limit the information shared with each entity?
]]></artwork></figure>

<t>This is very much in line with this document, although today it would be desirable
to have recommendation as well as questions. For instance, recommending
against sharing information with a participant if it is not necessary
for the expected role of that participant. And, as discussed earlier,
it is important to distinguish between the choices of a sender not
sharing information and a receiver choosing to not collect
information. Trusting an entity to not collect is not sufficient.</t>

<t>There has also been a number of documents that address data
minimization for specific situations, such as one DNS Query Name
Minimization <xref target="RFC7816"/>, general DNS privacy advice including data
minimization <xref target="RFC9076"/>, advice for DHCP clients for minimizing
information in requests they send to DHCP servers <xref target="RFC7844"/> (along
with general privacy considerations of DHCP <xref target="RFC7819"/>
<xref target="RFC7824"/>). These are on the topic of limiting information sent by
one primary protocol particiant (client) to another (server).</t>

<t>Hardie <xref target="RFC8558"/> and Arkko et
al. <xref target="I-D.iab-path-signals-collaboration"/> discuss path signals, i.e.,
messages to or from on-path elements to endpoints. In the past, path
signals were often implicit, e.g., network nodes interpreting in a
particular way transport protocol headers originally intended for
end-to-end consumption.  Implicit signals should be avoided and that
explicit signals be used instead.</t>

<t>Kühlewind, Pauly, and Wood <xref target="I-D.iab-privacy-partitioning"/> discuss
the concept of privacy partitioning: how information can be split and
carefully shared in ways where no individual party beyond the client
requesting a service has full picture of who is asking and what is
being asked.</t>

<t>Thomson <xref target="I-D.thomson-tmi"/> discusses the role intermediaries in the
Internet architecture, at different layers of the stack. For instance,
a router is an intermediary, some parts of DNS infrastructure can be
intermediaries, messaging gateways are intermediaries. Thomson
discusses when intermediaries are or are not an appropriate tool and
presents a number of principles relating to the use of intermediaries.</t>

<t>Trammel and Kühlewind <xref target="RFC8546"/> discuss the concept of a “wire
image” of a protocol, and how network elements may start to rely
on information in the image, even if it was not originally intended
for them. The issues are largely the same even for
participants.</t>

</section>
</section>
<section anchor="ack" title="Acknowledgements">

<t>The author would like to thank the participants of various IAB
workshops and programs, and IETF discussion list contributors for
interesting discussions in this area.  The author would in particular
like to acknowledge the significant contributions of Martin Thomson,
Nick Doty, Alissa Cooper, Stephen Farrell, Mark McFadden, John
Mattsson, Chris Wood, Dominique Lazanski, Eric Rescorla, Russ Housley,
Robin Wilton, Mirja Kühlewind, Tommy Pauly, Jaime Jiménez and
Christian Huitema.</t>

<t>This work has been influenced by <xref target="RFC6973"/>, <xref target="RFC8980"/>,
<xref target="I-D.farrell-etm"/> <xref target="I-D.arkko-arch-internet-threat-model-guidance"/>,
<xref target="I-D.lazanski-smart-users-internet"/>,</t>

</section>


  </middle>

  <back>


    <references title='Informative References'>



<reference anchor="RFC6973" target="https://www.rfc-editor.org/info/rfc6973">
  <front>
    <title>Privacy Considerations for Internet Protocols</title>
    <author fullname="A. Cooper" initials="A." surname="Cooper"/>
    <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
    <author fullname="B. Aboba" initials="B." surname="Aboba"/>
    <author fullname="J. Peterson" initials="J." surname="Peterson"/>
    <author fullname="J. Morris" initials="J." surname="Morris"/>
    <author fullname="M. Hansen" initials="M." surname="Hansen"/>
    <author fullname="R. Smith" initials="R." surname="Smith"/>
    <date month="July" year="2013"/>
    <abstract>
      <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications. It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices. It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="6973"/>
  <seriesInfo name="DOI" value="10.17487/RFC6973"/>
</reference>

<reference anchor="RFC7816" target="https://www.rfc-editor.org/info/rfc7816">
  <front>
    <title>DNS Query Name Minimisation to Improve Privacy</title>
    <author fullname="S. Bortzmeyer" initials="S." surname="Bortzmeyer"/>
    <date month="March" year="2016"/>
    <abstract>
      <t>This document describes a technique to improve DNS privacy, a technique called "QNAME minimisation", where the DNS resolver no longer sends the full original QNAME to the upstream name server.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7816"/>
  <seriesInfo name="DOI" value="10.17487/RFC7816"/>
</reference>

<reference anchor="RFC7819" target="https://www.rfc-editor.org/info/rfc7819">
  <front>
    <title>Privacy Considerations for DHCP</title>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <date month="April" year="2016"/>
    <abstract>
      <t>DHCP is a protocol that is used to provide addressing and configuration information to IPv4 hosts. This document discusses the various identifiers used by DHCP and the potential privacy issues.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7819"/>
  <seriesInfo name="DOI" value="10.17487/RFC7819"/>
</reference>

<reference anchor="RFC7824" target="https://www.rfc-editor.org/info/rfc7824">
  <front>
    <title>Privacy Considerations for DHCPv6</title>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="S. Jiang" initials="S." surname="Jiang"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>DHCPv6 is a protocol that is used to provide addressing and configuration information to IPv6 hosts. This document describes the privacy issues associated with the use of DHCPv6 by Internet users. It is intended to be an analysis of the present situation and does not propose any solutions.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7824"/>
  <seriesInfo name="DOI" value="10.17487/RFC7824"/>
</reference>

<reference anchor="RFC7844" target="https://www.rfc-editor.org/info/rfc7844">
  <front>
    <title>Anonymity Profiles for DHCP Clients</title>
    <author fullname="C. Huitema" initials="C." surname="Huitema"/>
    <author fullname="T. Mrugalski" initials="T." surname="Mrugalski"/>
    <author fullname="S. Krishnan" initials="S." surname="Krishnan"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>Some DHCP options carry unique identifiers. These identifiers can enable device tracking even if the device administrator takes care of randomizing other potential identifications like link-layer addresses or IPv6 addresses. The anonymity profiles are designed for clients that wish to remain anonymous to the visited network. The profiles provide guidelines on the composition of DHCP or DHCPv6 messages, designed to minimize disclosure of identifying information.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7844"/>
  <seriesInfo name="DOI" value="10.17487/RFC7844"/>
</reference>

<reference anchor="RFC7858" target="https://www.rfc-editor.org/info/rfc7858">
  <front>
    <title>Specification for DNS over Transport Layer Security (TLS)</title>
    <author fullname="Z. Hu" initials="Z." surname="Hu"/>
    <author fullname="L. Zhu" initials="L." surname="Zhu"/>
    <author fullname="J. Heidemann" initials="J." surname="Heidemann"/>
    <author fullname="A. Mankin" initials="A." surname="Mankin"/>
    <author fullname="D. Wessels" initials="D." surname="Wessels"/>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <date month="May" year="2016"/>
    <abstract>
      <t>This document describes the use of Transport Layer Security (TLS) to provide privacy for DNS. Encryption provided by TLS eliminates opportunities for eavesdropping and on-path tampering with DNS queries in the network, such as discussed in RFC 7626. In addition, this document specifies two usage profiles for DNS over TLS and provides advice on performance considerations to minimize overhead from using TCP and TLS with DNS.</t>
      <t>This document focuses on securing stub-to-recursive traffic, as per the charter of the DPRIVE Working Group. It does not prevent future applications of the protocol to recursive-to-authoritative traffic.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="7858"/>
  <seriesInfo name="DOI" value="10.17487/RFC7858"/>
</reference>

<reference anchor="RFC8446" target="https://www.rfc-editor.org/info/rfc8446">
  <front>
    <title>The Transport Layer Security (TLS) Protocol Version 1.3</title>
    <author fullname="E. Rescorla" initials="E." surname="Rescorla"/>
    <date month="August" year="2018"/>
    <abstract>
      <t>This document specifies version 1.3 of the Transport Layer Security (TLS) protocol. TLS allows client/server applications to communicate over the Internet in a way that is designed to prevent eavesdropping, tampering, and message forgery.</t>
      <t>This document updates RFCs 5705 and 6066, and obsoletes RFCs 5077, 5246, and 6961. This document also specifies new requirements for TLS 1.2 implementations.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8446"/>
  <seriesInfo name="DOI" value="10.17487/RFC8446"/>
</reference>

<reference anchor="RFC8484" target="https://www.rfc-editor.org/info/rfc8484">
  <front>
    <title>DNS Queries over HTTPS (DoH)</title>
    <author fullname="P. Hoffman" initials="P." surname="Hoffman"/>
    <author fullname="P. McManus" initials="P." surname="McManus"/>
    <date month="October" year="2018"/>
    <abstract>
      <t>This document defines a protocol for sending DNS queries and getting DNS responses over HTTPS. Each DNS query-response pair is mapped into an HTTP exchange.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8484"/>
  <seriesInfo name="DOI" value="10.17487/RFC8484"/>
</reference>

<reference anchor="RFC8546" target="https://www.rfc-editor.org/info/rfc8546">
  <front>
    <title>The Wire Image of a Network Protocol</title>
    <author fullname="B. Trammell" initials="B." surname="Trammell"/>
    <author fullname="M. Kuehlewind" initials="M." surname="Kuehlewind"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document defines the wire image, an abstraction of the information available to an on-path non-participant in a networking protocol. This abstraction is intended to shed light on the implications that increased encryption has for network functions that use the wire image.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8546"/>
  <seriesInfo name="DOI" value="10.17487/RFC8546"/>
</reference>

<reference anchor="RFC8558" target="https://www.rfc-editor.org/info/rfc8558">
  <front>
    <title>Transport Protocol Path Signals</title>
    <author fullname="T. Hardie" initials="T." role="editor" surname="Hardie"/>
    <date month="April" year="2019"/>
    <abstract>
      <t>This document discusses the nature of signals seen by on-path elements examining transport protocols, contrasting implicit and explicit signals. For example, TCP's state machine uses a series of well-known messages that are exchanged in the clear. Because these are visible to network elements on the path between the two nodes setting up the transport connection, they are often used as signals by those network elements. In transports that do not exchange these messages in the clear, on-path network elements lack those signals. Often, the removal of those signals is intended by those moving the messages to confidential channels. Where the endpoints desire that network elements along the path receive these signals, this document recommends explicit signals be used.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8558"/>
  <seriesInfo name="DOI" value="10.17487/RFC8558"/>
</reference>

<reference anchor="RFC8980" target="https://www.rfc-editor.org/info/rfc8980">
  <front>
    <title>Report from the IAB Workshop on Design Expectations vs. Deployment Reality in Protocol Development</title>
    <author fullname="J. Arkko" initials="J." surname="Arkko"/>
    <author fullname="T. Hardie" initials="T." surname="Hardie"/>
    <date month="February" year="2021"/>
    <abstract>
      <t>The Design Expectations vs. Deployment Reality in Protocol Development Workshop was convened by the Internet Architecture Board (IAB) in June 2019. This report summarizes the workshop's significant points of discussion and identifies topics that may warrant further consideration.</t>
      <t>Note that this document is a report on the proceedings of the workshop. The views and positions documented in this report are those of the workshop participants and do not necessarily reflect IAB views and positions.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="8980"/>
  <seriesInfo name="DOI" value="10.17487/RFC8980"/>
</reference>

<reference anchor="RFC9000" target="https://www.rfc-editor.org/info/rfc9000">
  <front>
    <title>QUIC: A UDP-Based Multiplexed and Secure Transport</title>
    <author fullname="J. Iyengar" initials="J." role="editor" surname="Iyengar"/>
    <author fullname="M. Thomson" initials="M." role="editor" surname="Thomson"/>
    <date month="May" year="2021"/>
    <abstract>
      <t>This document defines the core of the QUIC transport protocol. QUIC provides applications with flow-controlled streams for structured communication, low-latency connection establishment, and network path migration. QUIC includes security measures that ensure confidentiality, integrity, and availability in a range of deployment circumstances. Accompanying documents describe the integration of TLS for key negotiation, loss detection, and an exemplary congestion control algorithm.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9000"/>
  <seriesInfo name="DOI" value="10.17487/RFC9000"/>
</reference>

<reference anchor="RFC9076" target="https://www.rfc-editor.org/info/rfc9076">
  <front>
    <title>DNS Privacy Considerations</title>
    <author fullname="T. Wicinski" initials="T." role="editor" surname="Wicinski"/>
    <date month="July" year="2021"/>
    <abstract>
      <t>This document describes the privacy issues associated with the use of the DNS by Internet users. It provides general observations about typical current privacy practices. It is intended to be an analysis of the present situation and does not prescribe solutions. This document obsoletes RFC 7626.</t>
    </abstract>
  </front>
  <seriesInfo name="RFC" value="9076"/>
  <seriesInfo name="DOI" value="10.17487/RFC9076"/>
</reference>

<reference anchor="I-D.farrell-etm" target="https://datatracker.ietf.org/doc/html/draft-farrell-etm-03">
  <front>
    <title>We're gonna need a bigger threat model</title>
    <author fullname="Stephen Farrell" initials="S." surname="Farrell">
      <organization>Trinity College Dublin</organization>
    </author>
    <date day="6" month="July" year="2019"/>
    <abstract>
      <t>We argue that an expanded threat model is needed for Internet protocol development as protocol endpoints can no longer be considered to be generally trustworthy for any general definition of "trustworthy."</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-farrell-etm-03"/>
</reference>

<reference anchor="I-D.arkko-arch-internet-threat-model-guidance" target="https://datatracker.ietf.org/doc/html/draft-arkko-arch-internet-threat-model-guidance-00">
  <front>
    <title>Internet Threat Model Guidance</title>
    <author fullname="Jari Arkko" initials="J." surname="Arkko">
      <organization>Ericsson</organization>
    </author>
    <author fullname="Stephen Farrell" initials="S." surname="Farrell">
      <organization>Trinity College Dublin</organization>
    </author>
    <date day="12" month="July" year="2021"/>
    <abstract>
      <t>Communications security has been at the center of many security improvements in the Internet. The goal has been to ensure that communications are protected against outside observers and attackers. This memo suggests that the existing RFC 3552 threat model, while important and still valid, is no longer alone sufficient to cater for the pressing security and privacy issues seen on the Internet today. For instance, it is often also necessary to protect against endpoints that are compromised, malicious, or whose interests simply do not align with the interests of users. While such protection is difficult, there are some measures that can be taken and we argue that investigation of these issues is warranted. It is particularly important to ensure that as we continue to develop Internet technology, non-communications security related threats, and privacy issues, are properly understood.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-arkko-arch-internet-threat-model-guidance-00"/>
</reference>

<reference anchor="I-D.lazanski-smart-users-internet" target="https://datatracker.ietf.org/doc/html/draft-lazanski-smart-users-internet-00">
  <front>
    <title>An Internet for Users Again</title>
    <author fullname="Dominique Lazanski" initials="D." surname="Lazanski">
      <organization>Last Press Label</organization>
    </author>
    <date day="8" month="July" year="2019"/>
    <abstract>
      <t>RFC 3552 introduces a threat model that does not include endpoint security. In the fifteen years since RFC 3552 security issues and cyber attacks have increased, especially on the endpoint. This document proposes a new approach to Internet cyber security protocol development that focuses on the user of the Internet, namely those who use the endpoint and are the most vulnerable to attacks.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-lazanski-smart-users-internet-00"/>
</reference>

<reference anchor="I-D.iab-path-signals-collaboration" target="https://datatracker.ietf.org/doc/html/draft-iab-path-signals-collaboration-03">
  <front>
    <title>Considerations on Application - Network Collaboration Using Path Signals</title>
    <author fullname="Jari Arkko" initials="J." surname="Arkko">
      <organization>Ericsson</organization>
    </author>
    <author fullname="Ted Hardie" initials="T." surname="Hardie">
      <organization>Cisco</organization>
    </author>
    <author fullname="Tommy Pauly" initials="T." surname="Pauly">
      <organization>Apple</organization>
    </author>
    <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
      <organization>Ericsson</organization>
    </author>
    <date day="3" month="February" year="2023"/>
    <abstract>
      <t>This document discusses principles for designing mechanisms that use or provide path signals, and calls for standards action in specific valuable cases. RFC 8558 describes path signals as messages to or from on-path elements, and points out that visible information will be used whether it is intended as a signal or not. The principles in this document are intended as guidance for the design of explicit path signals, which are encouraged to be authenticated and include a minimal set of parties to minimize information sharing. These principles can be achieved through mechanisms like encryption of information and establishing trust relationships between entities on a path.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-iab-path-signals-collaboration-03"/>
</reference>

<reference anchor="I-D.iab-privacy-partitioning" target="https://datatracker.ietf.org/doc/html/draft-iab-privacy-partitioning-01">
  <front>
    <title>Partitioning as an Architecture for Privacy</title>
    <author fullname="Mirja Kühlewind" initials="M." surname="Kühlewind">
      <organization>Ericsson Research</organization>
    </author>
    <author fullname="Tommy Pauly" initials="T." surname="Pauly">
      <organization>Apple</organization>
    </author>
    <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
      <organization>Cloudflare</organization>
    </author>
    <date day="13" month="March" year="2023"/>
    <abstract>
      <t>This document describes the principle of privacy partitioning, which selectively spreads data and communication across multiple parties as a means to improve the privacy by separating user identity from user data. This document describes emerging patterns in protocols to partition what data and metadata is revealed through protocol interactions, provides common terminology, and discusses how to analyze such models.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-iab-privacy-partitioning-01"/>
</reference>

<reference anchor="I-D.thomson-tmi" target="https://datatracker.ietf.org/doc/html/draft-thomson-tmi-04">
  <front>
    <title>Principles for the Involvement of Intermediaries in Internet Protocols</title>
    <author fullname="Martin Thomson" initials="M." surname="Thomson">
      <organization>Mozilla</organization>
    </author>
    <date day="8" month="September" year="2022"/>
    <abstract>
      <t>This document proposes a set of principles for designing protocols with rules for intermediaries. The goal of these principles is to limit the ways in which intermediaries can produce undesirable effects and to protect the useful functions that intermediaries legitimately provide.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-thomson-tmi-04"/>
</reference>

<reference anchor="I-D.iab-use-it-or-lose-it" target="https://datatracker.ietf.org/doc/html/draft-iab-use-it-or-lose-it-04">
  <front>
    <title>Long-Term Viability of Protocol Extension Mechanisms</title>
    <author fullname="Martin Thomson" initials="M." surname="Thomson">
      <organization>Mozilla</organization>
    </author>
    <author fullname="Tommy Pauly" initials="T." surname="Pauly">
      <organization>Apple</organization>
    </author>
    <date day="12" month="October" year="2021"/>
    <abstract>
      <t>The ability to change protocols depends on exercising the extension and version-negotiation mechanisms that support change. This document explores how regular use of new protocol features can ensure that it remains possible to deploy changes to a protocol. Examples are given where lack of use caused changes to be more difficult or costly.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-iab-use-it-or-lose-it-04"/>
</reference>

<reference anchor="I-D.wood-pearg-website-fingerprinting" target="https://datatracker.ietf.org/doc/html/draft-wood-pearg-website-fingerprinting-00">
  <front>
    <title>Network-Based Website Fingerprinting</title>
    <author fullname="Ian Goldberg" initials="I." surname="Goldberg">
      <organization>University of Waterloo</organization>
    </author>
    <author fullname="Tao Wang" initials="T." surname="Wang">
      <organization>HK University of Science and Technology</organization>
    </author>
    <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
      <organization>Apple, Inc.</organization>
    </author>
    <date day="4" month="November" year="2019"/>
    <abstract>
      <t>The IETF is well on its way to protecting connection metadata with protocols such as DNS-over-TLS and DNS-over-HTTPS, and work-in- progress towards encrypting the TLS SNI. However, more work is needed to protect traffic metadata, especially in the context of web traffic. In this document, we survey Website Fingerprinting attacks, which are a class of attacks that use machine learning techniques to attack web privacy, and highlight metadata leaks used by said attacks. We also survey proposed mitigations for such leakage and discuss their applicability to IETF protocols such as TLS, QUIC, and HTTP. We endeavor to show that Website Fingerprinting attacks are a serious problem that affect all Internet users, and we pose open problems and directions for future research in this area.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-wood-pearg-website-fingerprinting-00"/>
</reference>

<reference anchor="I-D.ietf-ohai-ohttp" target="https://datatracker.ietf.org/doc/html/draft-ietf-ohai-ohttp-08">
  <front>
    <title>Oblivious HTTP</title>
    <author fullname="Martin Thomson" initials="M." surname="Thomson">
      <organization>Mozilla</organization>
    </author>
    <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
      <organization>Cloudflare</organization>
    </author>
    <date day="15" month="March" year="2023"/>
    <abstract>
      <t>This document describes a system for forwarding encrypted HTTP messages. This allows a client to make multiple requests to an origin server without that server being able to link those requests to the client or to identify the requests as having come from the same client, while placing only limited trust in the nodes used to forward the messages.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-ohai-ohttp-08"/>
</reference>

<reference anchor="I-D.pauly-dprive-oblivious-doh" target="https://datatracker.ietf.org/doc/html/draft-pauly-dprive-oblivious-doh-11">
  <front>
    <title>Oblivious DNS over HTTPS</title>
    <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
      <organization>Apple Inc.</organization>
    </author>
    <author fullname="Patrick McManus" initials="P." surname="McManus">
      <organization>Fastly</organization>
    </author>
    <author fullname="Tommy Pauly" initials="T." surname="Pauly">
      <organization>Apple Inc.</organization>
    </author>
    <author fullname="Tanya Verma" initials="T." surname="Verma">
      <organization>Cloudflare</organization>
    </author>
    <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
      <organization>Cloudflare</organization>
    </author>
    <date day="17" month="February" year="2022"/>
    <abstract>
      <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers. This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-11"/>
</reference>

<reference anchor="I-D.ietf-ppm-dap" target="https://datatracker.ietf.org/api/v1/doc/document/draft-ietf-ppm-dap/">
  <front>
    <title>Distributed Aggregation Protocol for Privacy Preserving Measurement</title>
    <author fullname="Tim Geoghegan"/>
    <author fullname="Christopher Patton"/>
    <author fullname="Eric Rescorla"/>
    <author fullname="Christopher A. Wood"/>
    <date day="10" month="July" year="2023"/>
    <abstract>
      <t>There are many situations in which it is desirable to take
   measurements of data which people consider sensitive.  In these
   cases, the entity taking the measurement is usually not interested in
   people's individual responses but rather in aggregated data.
   Conventional methods require collecting individual responses and then
   aggregating them, thus representing a threat to user privacy and
   rendering many such measurements difficult and impractical.  This
   document describes a multi-party distributed aggregation protocol
   (DAP) for privacy preserving measurement (PPM) which can be used to
   collect aggregate data without revealing any individual user's data.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-ietf-ppm-dap-05"/>
</reference>

<reference anchor="I-D.annee-dprive-oblivious-dns" target="https://datatracker.ietf.org/doc/html/draft-annee-dprive-oblivious-dns-00">
  <front>
    <title>Oblivious DNS - Strong Privacy for DNS Queries</title>
    <author fullname="Annie Edmundson" initials="A." surname="Edmundson">
      <organization>Princeton University</organization>
    </author>
    <author fullname="Paul Schmitt" initials="P." surname="Schmitt">
      <organization>Princeton University</organization>
    </author>
    <author fullname="Nick Feamster" initials="N." surname="Feamster">
      <organization>Princeton University</organization>
    </author>
    <author fullname="Allison Mankin" initials="A." surname="Mankin">
      <organization>Salesforce</organization>
    </author>
    <date day="2" month="July" year="2018"/>
    <abstract>
      <t>Recognizing the privacy vulnerabilities associated with DNS queries, a number of standards have been developed and services deployed that that encrypt a user's DNS queries to the recursive resolver and thus obscure them from some network observers and from the user's Internet service provider. However, these systems merely transfer trust to a third party. We argue that no single party should be able to associate DNS queries with a client IP address that issues those queries. To this end, this document specifies Oblivious DNS (ODNS), which introduces an additional layer of obfuscation between clients and their queries. To accomplish this, ODNS uses its own authoritative namespace; the authoritative servers for the ODNS namespace act as recursive resolvers for the DNS queries that they receive, but they never see the IP addresses for the clients that initiated these queries. The ODNS experimental protocol is compatible with existing DNS infrastructure.</t>
    </abstract>
  </front>
  <seriesInfo name="Internet-Draft" value="draft-annee-dprive-oblivious-dns-00"/>
</reference>


<reference anchor="Confidentiality" >
  <front>
    <title>IAB Statement on Internet Confidentiality</title>
    <author initials="." surname="The Internet Architecture Board">
      <organization></organization>
    </author>
    <date year="2014" month="November"/>
  </front>
  <seriesInfo name="https://www.iab.org/2014/11/14/iab-statement-on-internet-confidentiality/" value=""/>
</reference>
<reference anchor="PoLP" >
  <front>
    <title>The Protection of Information in Computer Systems</title>
    <author initials="J." surname="Saltzer">
      <organization></organization>
    </author>
    <author initials="M." surname="Schroader">
      <organization></organization>
    </author>
    <date year="1975" month="October"/>
  </front>
  <seriesInfo name="Fourth ACM Symposium on Operating System Principles" value=""/>
</reference>
<reference anchor="WP2021" >
  <front>
    <title>There’s no escape from Facebook, even if you don’t use it</title>
    <author initials="Geoffrey A." surname="Fowler">
      <organization></organization>
    </author>
    <date year="2021" month="August"/>
  </front>
  <seriesInfo name="Washington Post" value=""/>
</reference>
<reference anchor="Fingerprinting" >
  <front>
    <title>Browser Fingerprinting: A survey</title>
    <author initials="P." surname="Laperdrix">
      <organization></organization>
    </author>
    <author initials="N." surname="Bielova">
      <organization></organization>
    </author>
    <author initials="B." surname="Baudry">
      <organization></organization>
    </author>
    <author initials="G." surname="Avoine">
      <organization></organization>
    </author>
    <date year="2019" month="November"/>
  </front>
  <seriesInfo name="arXiv:1905.01051v2 [cs.CR] 4 Nov 2019" value=""/>
</reference>
<reference anchor="AmIUnique" >
  <front>
    <title>Am I Unique?</title>
    <author initials="." surname="INRIA">
      <organization></organization>
    </author>
    <date year="2020"/>
  </front>
  <seriesInfo name="https://amiunique.org" value=""/>
</reference>


    </references>



  </back>

<!-- ##markdown-source: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-->

</rfc>

