Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement (RFC7624)
Original Publication Date: 2015-Aug-01
Included in the Prior Art Database: 2015-Aug-21
Internet Society Requests For Comment (RFCs)
R. Barnes: AUTHOR [+7]
Starting in June 2013, documents released to the press by Edward Snowden have revealed several operations undertaken by intelligence agencies to exploit Internet communications for intelligence purposes. These attacks were largely based on protocol vulnerabilities that were already known to exist. The attacks were nonetheless striking in their pervasive nature, in terms of both the volume of Internet traffic targeted and the diversity of attack techniques employed.
Internet Architecture Board (IAB) R. Barnes Request for Comments: 7624 B. Schneier Category: Informational C. Jennings ISSN: 2070-1721 T. Hardie B. Trammell C. Huitema D. Borkmann August 2015
Confidentiality in the Face of Pervasive Surveillance: A Threat Model and Problem Statement
Since the initial revelations of pervasive surveillance in 2013, several classes of attacks on Internet communications have been discovered. In this document, we develop a threat model that describes these attacks on Internet confidentiality. We assume an attacker that is interested in undetected, indiscriminate eavesdropping. The threat model is based on published, verified attacks.
Status of This Memo
This document is not an Internet Standards Track specification; it is published for informational purposes.
This document is a product of the Internet Architecture Board (IAB) and represents information that the IAB has deemed valuable to provide for permanent record. It represents the consensus of the Internet Architecture Board (IAB). Documents approved for publication by the IAB are not a candidate for any level of Internet Standard; see Section 2 of RFC 5741.
Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc7624.
al. Informational [Page 1]
RFC 7624 Confidentiality Threat Model August 2015
Copyright (c) 2015 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
Table of Contents