Download presentation
Presentation is loading. Please wait.
Published byWalter Melton Modified over 8 years ago
1
DHCP Privacy Considerations Tomek Mrugalski IETF90, Toronto 2014-07-23 IETF-90 DHC WG1
2
Problem statement DHCP is susceptible to surveillance DHCP can be used to track users and devices Users’ mobility patterns may be revealed Users’ personal information may be revealed... IETF-90 DHC WG2
3
Examples When moving to a new location, the client sends Confirm with addresses that reveal previous location You may be identified by MAC, link-local, DUID, FQDN and many others Your device can be fingerprinted by options presence, options content, options order, and behavior IA_TA (temporary addresses) will help, but only a little. (corresponding servers can track me => my DHCP server can track me) IETF-90 DHC WG3
4
Privacy vs security IETF-90 DHC WG4 Amount of information revealed anonymity susceptibility to surveillance certificates service
5
Question #1 IETF-90 DHC WG5 Is WG interested in working on DHCP privacy? YES ON
6
Question #2 IETF-90 DHC WG6 Is WG interested in working on DHCP privacy? YES ON Do we want to focus on… DHCPv6 only DHCPv4 and DHCPv6
7
Question #3 IETF-90 DHC WG7 Is WG interested in working on DHCP privacy? YES ON Do we want to focus on… DHCPv6 only What should our goal be? Analyse Analyse and change protocol if needed Analyse and decide what to do next DHCPv4 and DHCPv6
8
Question #4 IETF-90 DHC WG8 How much would you like this work to proceed? Not much (honestly I don’t care) Not much (honestly I don’t care) A bit (I will discuss and review) A bit (I will discuss and review) A lot (I volunteer for this work) A lot (I volunteer for this work)
9
Scope of work Part of a bigger picture –Much bigger problem than just DHCP –Need to limit the analysis to DHCP aspects only Problem analysis Discussion of possible solutions Review existing drafts and comment on privacy implications IETF-90 DHC WG9
10
Next steps? IETF-90 DHC WG10
11
Further reading No. TitleReason 1.RFC7258: Pervasive monitoring is an attack Why pervasive monitoring is a problem 2.dhc-v4-threat-analysis-03What are the potential attacks in DHCPv4 3.dhc-sedhcpv6-03Proposed strong protection against attacks, privacy degradation (certs) 4. IETF-90 DHC WG11
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.