1 privecsg-15-0013-00-ecsg Response to comments on Privacy PAR/CSD Date: [2015-03-12] Authors: NameAffiliationPhoneEmail Juan Carlos ZúñigaInterDigital.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0085r2 Submission July 2011 Gerald Chouinard, CRCSlide Response to Comments received on the proposed a PAR and 5C Date:
Advertisements

CSD for P802.1AS-REV WG Wednesday, 05 November 2014.
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
and LMAP liaison Document Number: IEEE R0
PAR and CSD for P802.1Qxx WG January PAR (1) 1.1 Project Number: P802.1Qxx 1.2 Type of Document: Standard 1.3 Life Cycle: Full Use 2.1 Title:
Logical Interface Overview Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital Notice:
Doc.: IEEE /0094r0 Submission November 2009 Steve Shellhammer, QualcommSlide 1 Comments on PAR Notice: This document has been prepared.
Consolidated comments on LASG 802c PAR and CSD Stephen Haddock March 11,
1 privecsg ecsg IEEE 802 EC Privacy Recommendation SG Comments on Privacy PAR/CSD March, 2015 Juan Carlos Zuniga, InterDigital Labs (EC SG Chair)
Privecsg ‹#› IEEE 802 Privacy concerns about 802c PAR Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZunigaInterDigital.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
IEEE MEDIA INDEPENDENT HANDOVER DCN: mugm Title: Group Management TG Opening Note Date Submitted: September 18, 2012 Presented at.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: Subscription ID Scope Date Submitted: June, 14 th, 2007 Presented.
WiFi Privacy network experiment at IEEE 802 Berlin Plenary and IETF92 Date: [ ] Authors: NameAffiliationPhone Carlos Jesús
Omniran Thoughts about the tenets in IEEE 802.1CF Date: Authors: NameAffiliationPhone Max RiegelNSN
Privecsg Tracking of Link Layer Identifiers Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Proposed P802.16r Activity Schedule [IEEE Mentor Presentation Template (Rev. 0)] Document Number: IEEE gcon Date Submitted:
Doc.: IEEE leci SGLECIM November 2010 Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPAN) Submission Title:
IEEE mban SubmissionSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title:Resolution.
1 privecsg Privacy EC SG Update to NGP SG Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
Doc.: IEEE /0287r2 Submission January 2006 Adrian Stephens, Intel Corporation TGn Editor Candidate – Adrian Stephens Notice: This document has.
Privecsg Overview of Privacy in Date: Authors: NameAffiliationPhone Phillip BarberBroadband Mobile Tech
Doc.: IEEE /0010r0 Submission March 2006 Steve Shellhammer, QualcommSlide 1 Overview of the TAG Notice: This document has been prepared.
Doc.: IEEE sru Submission 11 November 2013 M Ariyoshi, S Kitazawa (ATR)Slide 1 Project: IEEE P Working Group for Wireless Personal.
Doc.: IEEE /165r0 Submission March, 2005 Reed Fisher, OkiSlide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs)
and LMAP liaison Document Number: IEEE R0 Date Submitted: Source: Antonio BovoVoice:
Suggestions for GRIDMAN PAR Proposal IEEE Presentation Submission Template (Rev. 9) Document Number: IEEE C802.16gman-10/0005 Date Submitted:
Doc.: IEEE ulp Submission Slide 1 May 2012 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission.
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Single_Radio_HO_Response_Comments Title: Response for comments on proposed.
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG ULI Report for Jan 2016.
Doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.
Doc.: IEEE /0236r0 Submission November 2009 Wendong Hu, STMSlide 1 Responses to Comments on PAR Modification IEEE P Wireless RANs.
Privecsg Privacy Recommendation PAR Proposal Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Emergency Call Support
Nov 2010 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Resolution of PAR and 5C Comments for MBAN Study.
and LMAP liaison Document Number: IEEE R0
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: z PAR/CSD Comments Responses Date.
<month year> doc.: IEEE < e>
Submission Title: [SGLECIM PAR & 5C comment resolution November 2010]
<month year> doc.: IEEE < e> <March 2018>
Submission Title: [SGLECIM PAR & 5C comment resolution November 2010]
[place document title here]
<month year> Denver, March 2006
March 2005 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Conformance PAR Background Date Submitted:
Privacy Recommendation PAR Proposal
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG FANE PAR & CSD Comment resolution March.
July 2015 SG CUB Opening Report
Submission Title: [SGLECIM PAR & 5C comment resolution November 2010]
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: z PAR/CSD Comments Responses Date.
and LMAP liaison Document Number: IEEE R0
RA-OLSR Comment Resolution
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: z PAR/CSD Comments Responses Date.
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [SG FANE PAR & CSD Comment resolution March.
March 2015 SG CUB Opening Report
<month year> doc.: IEEE < e>
What is a CA document? Date: Authors: March 2005 March 2005
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
RA-OLSR Comment Resolution
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Response to PAR and 5C Comments.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
<month year> doc.: IEEE < e> <March 2018>
TV White Space Coexistence Plan
OmniRAN SDN Use Case ToC
OmniRAN SDN Use Case ToC
July 2015 SG CUB Opening Report
RA-OLSR Comment Resolution
Wireless Architectural Thoughts
Presentation transcript:

1 privecsg ecsg Response to comments on Privacy PAR/CSD Date: [ ] Authors: NameAffiliationPhone Juan Carlos ZúñigaInterDigital Notice: This document does not represent the agreed view of the IEEE 802 EC Privacy Recommendation SG. It represents only the views of the participants listed in the ‘Authors:’ field above. It is offered as a basis for discussion. It is not binding on the contributor, who reserve the right to add, amend or withdraw material contained herein. Copyright policy: The contributor is familiar with the IEEE-SA Copyright Policy. Patent policy: The contributor is familiar with the IEEE-SA Patent Policy and Procedures: and. Abstract The present document proposes some responses to the comments received on the Privacy Recommendation PAR/CSD

2 privecsg ecsg Comments from Roger Marks comments-on-privacy-recommendation- par-and-csd.pdfhttps://mentor.ieee.org/privecsg/dcn/15/privecsg comments-on-privacy-recommendation- par-and-csd.pdf Dates The PAR form dates are blank. Dates are consensus- based decisions to which participants may be sensitive. These must be discussed and agreed as part of the technical decision to submit a PAR. They are not editorial issues. –Dates will be provided, stating that the project expects to finalize 2 years after the initial date March 2015

3 privecsg ecsg Comments from Roger Marks Working Group The Working Group is indicated as: “Privacy Recommendation EC Study Group (C/LM/PrivacySG).” This is not a valid Working Group. Proposed change: Name an existing Working Group, or a new one. Suggestion: Working Group –Agreed March 2015

4 privecsg ecsg Comments from Roger Marks Title Extraneous language in the title follows format that has generally been abandoned within IEEE 802. Proposed change: Title: Recommended Practice for Information technology-- Telecommunications and information exchange between systems– Local and metropolitan area networks: Privacy considerations for IEEE 802 Technologies. –Agreed March 2015

5 privecsg ecsg Comments from Roger Marks Scope (1) Scope refers to “general recommendations”, but the project will be of little use without specific recommendations. Proposed change: Title: This document specifies a privacy threat model for IEEE 802 technologies and provides general recommendations for standards developers and implementers on how to protect against privacy threats. –Agreed March 2015

6 privecsg ecsg Comments from Roger Marks Scope (2) Scope refers to “recommendations for standards developers,” but the remainder of the PAR and CSD have no indication that the recommendations are relevant to the development of standards within IEEE 802. Is an intent to make recommendations on how IEEE 802 standards should be amended? If no, then “for standards developers” should be deleted from the scope. If yes, then the rest of the PAR and CSD should be aligned (including but not limited to, the “Stakeholders,”“Broad Market Potential,” and “Technical Feasibility” elements). –Propose clarifying that privacy can be engineered by design. Please see: CF00-privacy-engineered-access-network.pptxhttps://mentor.ieee.org/omniran/dcn/15/omniran CF00-privacy-engineered-access-network.pptx March 2015

7 privecsg ecsg Comments from Roger Marks Purpose The language mentions “recommendations to address privacy threats” and mentions some threats, but it does not explain the purpose of the recommendations. Presumably, the recommendations will mitigate the threats if adopted. But to whom are the recommendations addressed? To which users, designers, standards groups, implementers, or network elements will the recommendations be applicable? This is not apparent, and, without an understanding of the answer, it is difficult to understand the purpose. –Requires further clarification about the expected audience of the document March 2015

8 privecsg ecsg Comments from Roger Marks Stakeholders See comments on Scope and Purpose –Agree to provide coherent information in these sections March 2015

9 privecsg ecsg Comments from Roger Marks CSD Coexistence The response “A CA document is not applicable because this project does not use wireless spectrum.” could be understood to mean that the standard is not applicable to wireless networks. Proposed change: A CA document is not applicable because this project standard does not use specify wireless spectrum operation. Smart-aleck remark: The criterion is not applicable because it applies only to a WG proposing a project, not to a Study Group proposing a project. –Agree with proposed text March 2015

10 privecsg ecsg Comments from Roger Marks CSD Broad Market Potential “Broad Market Potential” refers to “numerous users.” But who are the users of the recommendation? For example, if standards developers are potential users of the recommendation, which standards developers are potential adopters? –Will provide details about expected audience March 2015

11 privecsg ecsg Comments from Roger Marks CSD Technical Feasibility The response indicates that “The recommended practice will define recommendations that can be followed by system designers and implementers,” but the Scope refers to “recommendations for standards developers and implementers.” Which is it: system designers or standards developers? –Will provide details about expected audience March 2015

12 privecsg ecsg Comments from Roger Marks CSD Economical Feasibility The response does not address economic feasibility. Increased privacy has economic benefits to some parties and is an economic threat to others. These issues should be articulated. –Should state that Privacy enhances, not degrades, security and functionality –Please see: CF00-privacy-engineered-access-network.pptxhttps://mentor.ieee.org/omniran/dcn/15/omniran CF00-privacy-engineered-access-network.pptx March 2015

13 privecsg ecsg Comments from PAR Project number –Agree with suggestion in the EC announcement that this would fit in and should be assigned there with assent of the WG. –Agree 2.1 (non-­ ‐ substantive) Title doesn’t include a period (aka, full stop). (It is unlikely that publication editors would include one independent of the PAR.) –Agree 4.2, 4.3 Dates need to be included – lack of dates could suggest the SG does not yet understand the magnitude of the work to be done and resources required to complete the work. –Agree. See previous comment from Roger Marks March 2015

14 privecsg ecsg Comments from PAR 5.1 Please justify the estimate of number of participants, for 802, this shouldn’t be the number of people expected to be in the WG ballot group, but the number actively participating in the project (e.g., TF/TG). How many regular ECSG participants is a good indicator. This number is subject to review by the WG and EC at checkpoints, so not inflating this number is wise. –73 subscribers to mailing list, 24 contributors to mailing list, 12 contributors to mentor, attendees to face-to-face meetings, attendees to teleconferences March 2015

15 privecsg ecsg Comments from PAR 5.2.a (non-­ ‐ substantive) There is a superfluous return in the presumably pasted text. –Agree 5.4 (non-­ ‐ substantive) Inappropriate capitalization of attack methods. –Agree 5.5 (non-­ ‐ substantive) There are superfluous returns in the presumably pasted text. –Agree March 2015

16 privecsg ecsg Comments from CSD General: The responses are perfunctory and are generally without substance. Managed Objects: A recommended practice can include parameters and management capability. The response needs to be relevant to this proposed project and why the scope of work will not include management capability. If high level management architecture or capability definition is included, (what we expect with threat definition and measurement), that should be stated in the response. –Should clarify that no management architecture is expected Broad Market Potential This response sounds like it is in satisfaction of an existing and well known privacy requirement, (e.g., an encryption protocol), not for determining the need for encryption (e.g., threat assessment). –Should clarify differences between Privacy and Security, and perhaps related requirements March 2015

17 privecsg ecsg Comments from CSD Technical Feasibility It would be expected for the response to address the technical feasibility to measure each of the multiple threats listed in the Purpose section of the PAR. –List will only include Surveillance, as per 802.1’s comment Economic Feasibility Answer is non-­ ‐ responsive to the list of considerations. It does not address at all the economic feasibility of doing the threat assessment. –See previous response to Roger Mark’s comment Most security techniques have some impact on system cost(e.g., encryption hardware, software complexity), security overlays have installation costs. While features integral to implementations may have negligible installation impacts, maintenance costs (updating capabilities for new threats) certainly have operational cost implications. –Should clarify misunderstanding between Privacy and Security, and perhaps mention some examples March 2015

18 privecsg ecsg Comments from and 4.3 need to include target dates for completion. Should be at least 6 months apart. –See previous response to Roger Mark’s comment 5.2 Change “document” to “recommended practice” 5.4 delete “document” result “The recommended practice…” 5.5 change “and certain threats” to “and certain privacy threats” 5.5 change “with IETF in many” to “with IETF on many” 5.5 change “guidelines” to “recommendations” –Agree with the above CSD: Distinct Identity: change “defines privacy” to “defines a privacy” and “practice” to “practices” Economic Feasibility – Question was not answered need to provide evidence and address the requested specific areas “a) through e)”. –See previous response to Roger Mark’s comment March 2015

19 privecsg ecsg Comments from There are a lot of carriage returns in Sections 5.2 and 5.5. You may want to remove them. –Agree 2.It will be nice to provide an example of some of the mechanisms on how the system can achieve resilience to (Surveillance, Monitoring, Stored Data Compromise, Intrusion, Misattribution, Correlation, Identification, Secondary Use, Disclosure and Exclusion) without making too many modifications to the operation of the system - e. g. MAC address randomization. –Should provide example of Surveillance March 2015

20 privecsg ecsg Comments from (1/3) General – Many aspects of this proposed PAR seemed to refer to the need for an activity within 802, rather than for the need for the production of a Recommended Practice or other standards document. The timescale over which this activity needs to influence the development of standards within 802 seems to be rather shorter than the time that it would take to develop and approve a Recommended Practice of the proposed scope (typically 2-3 years). There needs to be some consideration of the intended audience for this Recommended Practice. If it is the relative small community of experts that will/could incorporate privacy best practices in 802 standards going forward, other influencing methods may be more appropriate. The Recommended Practice might be retargeted to the external community of developers and users. –Responding to this comment requires further consideration by the group Scope - We do not understand what is meant in ‘scope’ by ‘privacy threat model’ as there are multiple different interpretations of this term including: (a) reference to ‘privacy considerations’ (RFC 6973); or (b) an analysis of the threats that the project might feasibly address; or (c) reference to a top down security model. –Responding to this comment requires further consideration by the group March 2015

21 privecsg ecsg Comments from (2/3) Purpose – the threats listed appear to be overly broad, with no technical work having been done to date with respect to the feasibility of addressing some of the areas listed, specifically –Stored Data Compromise –Intrusion –Misattribution –Secondary Use –Exclusion A focus on specific requirements would seem to be essential to timely project completion. Suggest that the current purpose termination after “including Surveillance.” This should make it clear that the project will address the surveillance issue and that it’s successful conclusion should not be held up by objections that it does not satisfactorily address ‘Misattribution’, for example. –Agree March 2015

22 privecsg ecsg Comments from (3/3) Need – The Need section of the PAR should address why this specific project is needed, not why privacy in general is wanted. –Agree Technical Feasibility – The technical feasibility that has been demonstrated does not match the proposed scope. Demonstration of the successful use of MAC address randomization does not itself demonstrate that a particular privacy goal has been achieved. –Agree Economic Feasibility – The statement being made in this section of the CSD is a statement of future intent, not evidence of economic feasibility. It would be easier to make a justifiable statement for a PAR with a narrower scope. –See previous response to Roger Mark’s comment March 2015

23 privecsg ecsg Comments from Paul Nikolich (1/2) 1) 2.1 Title. Shorten to "Recommended Practice on Privacy Recommendations for IEEE 802 Technologies. –Agree (verify with EC) 2) 5.1 Approximate number of people. 50 seems unrealistically high (I suspect it will be closer to 20), but I may be off base. How did you arrive at that number? –See previous response to 802.3’s comment 3) 5.2 Scope. I recommend deleting "...for standards developers...". and move it to Purpose. –See previous response to Roger Mark’s comment March 2015

24 privecsg ecsg Comments from Paul Nikolich (2/2) 4) 5.4 Purpose. part 1 It seems to me much of the Purpose belongs in Scope. I suggest moving some of the Purpose text to Scope. Possible Scope text: –Scope: "This document specifies a privacy threat model applicable to IEEE 802 link layer technologies. The model addresses privacy threats such as Surveillance, Monitoring, Stored Data Compromise, Intrusion, Misattribution, Correlation, Identification, Secondary Use, Disclosure and Exclusion. Suggest adopting text, with limited list as per 802.1’s comment 5) 5.4 Purpose. part 2 Possible modified Purpose text: –Purpose: To develop a recommendation that defines a privacy threat model and a privacy guideline for 802 standards developers. –Agree March 2015