Internet DRAFT - draft-huitema-perpass-trafficanalysis

draft-huitema-perpass-trafficanalysis






Network Working Group                                         C. Huitema
Internet-Draft                                     Microsoft Corporation
Intended status: Informational                         November 06, 2013
Expires: May 10, 2014


              Passive Traffic Analysis Threats and Defense
              draft-huitema-perpass-trafficanalysis-00.txt

Abstract

   Traffic analysis is used by various entities to derive "meta data"
   about Internet communications, such as who communicates with whom or
   what, and when.  We analyze how meta-data can be extracted by
   monitoring IP headers, DNS traffic, and clear-text headers of
   commonly used protocols.  We then propose a series of actions that
   would make traffic analysis more difficult.

Status of This Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on May 10, 2014.

Copyright Notice

   Copyright (c) 2013 IETF Trust and the persons identified as the
   document authors.  All rights reserved.












Huitema                   Expires May 10, 2014                  [Page 1]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.

Table of Contents

   1.  Introduction  . . . . . . . . . . . . . . . . . . . . . . . .   2
   2.  Passive Analysis Targets  . . . . . . . . . . . . . . . . . .   3
   3.  Analysis of IP headers  . . . . . . . . . . . . . . . . . . .   4
   4.  Linking IP addresses to user identities . . . . . . . . . . .   5
     4.1.  Monitoring POP3, IMAP or SIP clients for identifying
           users of IP addresses . . . . . . . . . . . . . . . . . .   5
     4.2.  Retrieving IP addresses from mail headers . . . . . . . .   6
     4.3.  Tracking address use with web cookies . . . . . . . . . .   7
     4.4.  Tracking address use with network graphs  . . . . . . . .   7
     4.5.  Static IPv6 interface identifiers . . . . . . . . . . . .   8
     4.6.  Stuff we have not thought off yet . . . . . . . . . . . .   8
   5.  Defenses against IP header monitoring . . . . . . . . . . . .   8
     5.1.  Client server encryption  . . . . . . . . . . . . . . . .   8
     5.2.  Clean-up E-mail headers . . . . . . . . . . . . . . . . .   9
     5.3.  Source address obfuscation  . . . . . . . . . . . . . . .   9
     5.4.  Network address translation . . . . . . . . . . . . . . .  10
     5.5.  IPv6 privacy addresses  . . . . . . . . . . . . . . . . .  10
     5.6.  Frequent address renumbering  . . . . . . . . . . . . . .  11
     5.7.  Multihoming . . . . . . . . . . . . . . . . . . . . . . .  11
     5.8.  Virtual Private Networks  . . . . . . . . . . . . . . . .  11
     5.9.  Web proxies . . . . . . . . . . . . . . . . . . . . . . .  11
     5.10. Onion routing and shuffle nets  . . . . . . . . . . . . .  12
     5.11. And there is more . . . . . . . . . . . . . . . . . . . .  12
   6.  Recommendations . . . . . . . . . . . . . . . . . . . . . . .  12
   7.  Security Considerations . . . . . . . . . . . . . . . . . . .  12
   8.  IANA Considerations . . . . . . . . . . . . . . . . . . . . .  12
   9.  Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .  13
   10. References  . . . . . . . . . . . . . . . . . . . . . . . . .  13
     10.1.  Normative References . . . . . . . . . . . . . . . . . .  13
     10.2.  Informative References . . . . . . . . . . . . . . . . .  13
   Author's Address  . . . . . . . . . . . . . . . . . . . . . . . .  14

1.  Introduction

   The massive monitoring attacks that we know about seem to fall into
   three categories: listening to the content of communications in



Huitema                   Expires May 10, 2014                  [Page 2]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   transit, accessing content of documents and past exchanges at a
   server, and analyzing traffic to find patterns of communications and
   deduce social exchanges.

   Other efforts address the "listening on conversations" attack, and
   how to prevent them with more or better encryption.  There are some
   good ideas for reducing the risk of accessing contents on server,
   such as storing encrypted contents on servers, or enabling
   distributed services so that users can chose server locations that
   they find more acceptable.  Enabling encryption will also reduce the
   capability to extract information from the e-mail or http headers.
   This draft focuses on a different set of threats, the monitoring and
   analysis of Internet Protocol headers to extract "metadata" such as
   the structure of social graphs or the timing of social events.

   This draft proceeds by analyzing first the information that the
   monitoring entities desire to acquire and that privacy advocates
   would like to protect.  These monitoring tools are expected to work
   for both IPv4 [RFC0791] and IPv6 [RFC2460].  We present then the
   mechanism of IP header monitoring, and discuss the critical problem
   of associating IP addresses to user identities.  We then review a
   series of mechanisms that might be used to mitigate IP header
   monitoring.

2.  Passive Analysis Targets

   Questioned about revelation that his secret services were monitoring
   all the phone calls of the populace, a famous leader defended himself
   by saying that no, we don't listen to your phone calls, we merely
   gather "meta data."  It turns out that meta data such as who called
   what telephone number and at what time is actually very valuable.

   The first target of traffic analysis is the graph of connectivity
   within a given population.  If we known that two phone numbers
   frequently call each other, we can infer that there is a relation
   between the owners of these numbers.  For example, if investigative
   services discover a pattern of calls between an old general and some
   young lady, they can infer the existence of some inappropriate
   relation, and eventually force the general to relinquish his
   leadership position.  Similarly, if we find a pattern of frequent
   calls between a small set of telephone numbers, we can infer the
   existence of some tight-knit network.  Further analysis can then lead
   to the evaluation that these are just the members of the same family
   or the same sports team, or on the contrary it can find that these
   are political opponents organizing themselves, or maybe in rare cases
   some members of an underground criminal organization.





Huitema                   Expires May 10, 2014                  [Page 3]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   The graph of connectivity may sometimes take very simple forms.  For
   example, visiting the web site of a banned organization may be
   sufficient to get flagged as a dissident by some autocratic regimes.

   The second target of traffic analysis is the discovery of traffic
   surges, or the opposite, sudden absence of traffic indicating that a
   particular group has gone silent.  If the monitoring of traffic
   reveals increased activity between a particular group, secondary
   analysis can be used to obtain more information on the activities of
   the group.  That secondary analysis will be able to find the
   difference between a family preparing a birthday event, a sports team
   training for a particular competition, a group of activists planning
   a political protest, and maybe in rare cases a group of criminals
   planning some nefarious act.

   Traffic can operate across multiple media.  Analysis of phone calls
   reveals patterns between phone numbers, but similar analysis can be
   applied to IP addresses.  Traffic analysis becomes much more valuable
   if the IP address can be associated with a personal email address or
   with a personal phone number.  This correlation is also a target of
   traffic analysis.

   Traffic analysis may also reveal the targets location.  If the same
   user appears to connect to the Internet from a succession of IP
   addresses at different locations, the monitoring services can deduce
   the itinerary of that user.

   For the defenders, the targets of traffic analysis become as many
   assets to be protected.  In the following analysis, we will focus on
   ways to thwart discovery of the graph of connectivity, timing of
   activity, and correlation between identifiers.

3.  Analysis of IP headers

   Internet traffic can be monitored by tapping Internet links, or by
   installing monitoring tools in Internet routers.  Of course, a single
   link or a single router only provides access to a fraction of the
   global Internet traffic.  However, monitoring a number of high
   capacity links or monitoring a set of routers placed at strategic
   locations provides access to a good sampling of Internet traffic.

   Tools like Cisco's NetFlow [RFC3954] allow administrators to acquire
   statistics about "sequence of packets with some common properties
   that pass through a network device."  The most common set of
   properties is the "five tuple" of source and destination addresses,
   protocol type, and source and destination ports.  These statistics
   are commonly used for network engineering, but could certainly be
   used for other purposes.



Huitema                   Expires May 10, 2014                  [Page 4]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   Let's assume for a moment that IP addresses can be correlated to
   specific services or specific users.  Analysis of the sequences of
   packets will quickly reveal which users use what services, and also
   which users engage in peer-to-peer connection with other users.
   Analysis of traffic variations over time can be used to detect
   increased activity by particular users, or in the case of peer-to-
   peer connections increased activity within groups of users.

4.  Linking IP addresses to user identities

   In Section 3, we have assumed that IP addresses can be correlated
   with specific user identities.  This can be done in various ways.

   Tools like reverse DNS lookup can be used to retrieve the DNS names
   of servers.  In fact, since the addresses of servers tend to be quite
   stable and since servers are relatively less numerous than users, we
   can expect that large scale monitoring services maintain databases of
   servers' IP addresses to facilitate such retrieval.  On the other
   hand, the reverse lookup of users addresses is less informative.  For
   example, a lookup of the address currently used by my home network
   returns a name of the form "c-xxx-xxx-xxx-xxx.hsd1.wa.comcast.net" in
   which the symbols "xxx-xxx-xxx-xxx" correspond to the IP address used
   by my home network.  This particular type of reverse DNS lookup does
   not reveal much interesting information.

   Traditionally, the police has relied on Internet Service Providers
   (ISP) to provide identification on a case by case basis of the
   "owner" of a specific IP address.  This is a reasonably expedient
   process for police investigations, but large scale monitoring
   requires something more efficient.  If the monitoring service can
   secure the cooperation of the ISP, they may obtain the link between
   identity and address through some automated update process.  We may
   expect that some ISP will not willingly cooperate with large scale
   monitoring of their customers, in which case the monitoring entities
   have to rely on other methods.

   Even if the ISP does not cooperate, identity can often be obtained by
   analyzing the traffic.  We will discuss in the next section how SMTP
   and HTTP can leak information that links the IP address to the
   identity of the user.

4.1.  Monitoring POP3, IMAP or SIP clients for identifying users of IP
      addresses








Huitema                   Expires May 10, 2014                  [Page 5]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   POP3 [RFC1939] and IMAP [RFC3501] are used to retrieve mail from mail
   servers, while a variant of SMTP [RFC5321] is used to submit messages
   through mail servers.  The IMAP connections originate from the
   client, and typically start with an authentication exchange in which
   the client proves its identity by answering a password challenge.

   If the protocol is executed in clear text, monitoring services can
   "tap" the links to the mail server, retrieve the user name provided
   by the client, and associate it with the IP address used to establish
   the connection.

   The same attack can be executed against the SIP protocol, [RFC3261]
   if the connection between the SIP UA and the SIP server operates in
   clear text.

   There are many instant messaging services operating over the Internet
   using proprietary protocols.  If any of these proprietary protocols
   includes clear-text transmission of the user identity, it can be
   tapped to provide an association between the user identity and the IP
   address.

4.2.  Retrieving IP addresses from mail headers

   The SMTP protocol specification [RFC5321] requires that each
   successive SMTP relay adds a "Received" header to the mail headers.
   The purpose of these headers is to enable audit of mail transmission,
   and perhaps to distinguish between regular mail and spam.  Here is an
   extract from the headers of a message recently received from the
   "perpass" mailing list:

   Received: from xxx-xxx-xxx-xxx.zone13.example.org (HELO ?192.168.1.100?)
    (xxx.xxx.xxx.xxx)
    by lvpsyyy-yyy-yyy-yyy.example.net with ESMTPSA
    (DHE-RSA-AES256-SHA encrypted, authenticated);
    27 Oct 2013 21:47:14 +0100
   Message-ID: <526D7BD2.7070908@example.org>
   Date: Sun, 27 Oct 2013 20:47:14 +0000
   From: Some One <some.one@example.org>


   This is the first "Received" header attached to the message by the
   first SMTP relay.  For privacy reason, the field values have been
   anonymized.  We learn here that the message was submitted by "Some
   One" on October 27, from a host behind a NAT (192.168.1.100) that
   used the IP address "xxx.xxx.xxx.xxx."  The information remained in
   the message, and is accessible by all recipients of the "perpass"
   mailing list, or indeed by any monitoring service that sees at least
   one copy of the message.



Huitema                   Expires May 10, 2014                  [Page 6]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   For monitoring services, such information is just plain candy.
   Monitor enough e-mail traffic and you can regularly update the
   mapping between IP addresses and individuals.  Even if the SMTP
   traffic was encrypted, the monitoring service could still register to
   receive a copy of public mailing lists like "perpass," and then log
   the header fields.

   Similar information is available in the SIP headers [RFC3261].

4.3.  Tracking address use with web cookies

   Many web sites only encrypt a small fraction of their transactions.
   A popular pattern was to use HTTPS for the login information, and
   then use a "cookie" to associate following clear-text transactions
   with the user's identity.  Cookies are also used by various
   advertisement services to quickly identify the users and serve them
   with "personalized" advertisements.  Such cookies are particularly
   useful if the advertisement services wants to keep tracking the user
   across multiple sessions that may use different IP addresses.

   As cookies are sent in clear text, a monitoring service can build a
   database that associates cookies to IP addresses.  If the IP address
   is already identified, the cookie can be linked to the user identify.
   After that, if the same cookie appears on a new IP address, the new
   IP address can be immediately associated with the pre-determined
   identity.

4.4.  Tracking address use with network graphs

   There have been many publicly reported instances in which the police
   managed to find the owner of a "disposable" cell phone.  In theory
   this is hard, because there is no direct registration of the owner's
   identity.  But in practice, the identity can be inferred through
   analysis of network graphs.

   Suppose that the new owner of the cell phone uses it carelessly to
   call his mother, his brother, his boss and his preferred restaurant.
   Mother, brother, boss and restaurant are part of the "network graph"
   already collected by pervasive monitoring, and in fact constitute an
   almost unique signature of this particular individual.  A quick
   database search and voila, the cell phone is identified.

   The same approach can be applied to IP addresses.  Users do a lot of
   repeat visits to web sites, mail servers, game servers, instant
   messaging servers, etc.  These visits tend to follow time patterns.
   It is easy to imagine that if a particular pattern was seen from
   address "A" one day, and the same pattern from address "B" the next
   day, then A and B point to the same user, whose computer just got a



Huitema                   Expires May 10, 2014                  [Page 7]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   new address.  At that point, the user may be identified only as a
   "case number," but the real identity can be filled as soon as email
   monitoring is successful, or sip monitoring, or maybe some ISP
   cooperation.

4.5.  Static IPv6 interface identifiers

   The IP Version 6 Addressing Architecture [RFC4291] suggests that "for
   all unicast addresses, except those that start with the binary value
   000, Interface IDs... may have universal scope when derived from a
   universal token (e.g., IEEE 802 48-bit MAC or IEEE EUI-64 identifiers
   [EUI64])."

   When implementors follow this recommendation, the IID part of the
   IPv6 address becomes a globally unique 64 bit number.  Even if the
   IPv6 host moves to a new location, the IID will remain constant.
   Monitoring services can use that property to correlate IPv6 addresses
   belonging to the same host, and thus to the same user.

4.6.  Stuff we have not thought off yet

   The previous sections listed a number of known ways to extract
   identities from IP addresses.  This is by no means an exhaustive
   list.  There are certainly other possibilities, for example
   monitoring of public Wi-Fi networks and tracking of association
   between MAC addresses and IP addresses, or monitoring of various
   authentication services.

5.  Defenses against IP header monitoring

   In the current state of the Internet, defense against monitoring is
   very hard.  There are many ways to associate IP addresses with user
   identity.  Tapping of big Internet pipes is bound to provide a trove
   of data.  Retrieving social graphs and detecting surges of activity
   is well within the means of a well funded monitoring service.  But
   this does not mean that the Internet engineering community should
   just give up.  Even if we cannot stop this monitoring completely, we
   can certainly make it harder and less reliable.

   The first version of this internet draft presents a list of potential
   defenses that have been mentioned in various discussions.  This list
   is not exhaustive, and is also not prioritized.  It is merely a
   recollection of a number of suggestions.

5.1.  Client server encryption

   The previous analysis shows that IP traffic analysis is facilitated
   by the discovery of relations between IP addresses and users.



Huitema                   Expires May 10, 2014                  [Page 8]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   Encryption of the client-server protocols will deprive monitoring of
   this source of information.

   The analysis was conducted for mail protocols (POP3, IMAP, SMTP) and
   for SIP.  Encrypting these protocols is of course a priority.  But if
   we want to really mitigate the threat of disclosing identity to
   address mappings, we should encrypt any protocol that carries a
   description of the user identity.

   Encryption may not always completely remove the possibility to
   monitor connections.  Encrypted traffic may still contain patterns,
   such as for example VOIP connections sending one RTP audio message
   every 20 ms.  With elaborate pattern analysis, monitoring entities
   may be able to find user-specific patterns in the encrypted messages.
   Studying cryptographic protection against such analysis is probably
   beyond the scope of this document.

5.2.  Clean-up E-mail headers

   The email service is by itself a rich target for traffic analysis.
   Analyzing who sent mail to whom and when provides a rich set of meta
   data, even when the messages' contents are encrypted.  This would
   probably justify a draft focusing just on email trafic analysis and
   protection.  Since this document focuses on IP header monitoring, we
   will just point here a tiny problem related to discovery of linkage
   between IP and email addresses.

   The initial "Received" field of e-mail headers carries the IP address
   from which the e-mail was submitted.  This is equivalent to
   broadcasting the mapping between that IP address and the user
   identity.  We should seriously consider the tradeoff between privacy
   and auditability that this feature afford.

   A reasonable tradeoff could be to not publish the IP address or the
   domain name of the initial submitter, and to start the "Received"
   list with the IP address of the mail server.  We should however
   consider the case where the first server is a "home" server, whose
   public IP address is the same as that of the user.  Ideally, we
   should not publish that either.

   The same reasoning should apply to any protocol that publishes a
   trace of successive server addresses in its headers.  At some point,
   auditability should give way to privacy.

5.3.  Source address obfuscation

   Jon Crowcroft suggested a nice idea a few years ago, although for a
   different reason: sourceless network architecture [SNA].  Send



Huitema                   Expires May 10, 2014                  [Page 9]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   packets with no source address, and you make the metadata much less
   useful.  (Of course, if the packet is to get a reply, the source
   address needs to be encrypted in the payload.)

   The idea is largely theoretical, and would require significant
   changes in a number of widely deployed protocols, including TCP.

5.4.  Network address translation

   Many home networks use "network address translation" (NAT) [RFC3022]
   to share a single IPv4 address between several computers, and
   possibly several users.  NAT are also used in some enterprise
   networks, and in some Wi-Fi "hot spots."  Some ISP have also begun to
   use NAT, providing "private" addresses to their subscribers.

   NAT complicates the task of IP header monitoring, because a
   particular address may be shared between multiple users.  If the
   address is only shared between few users, like the members of a
   family sharing a home network, monitoring services can probably use
   analysis techniques to retrieve the individual connections, and NAT
   may not be more than a speed bump.  If the sharing pool is much
   larger, like all the subscribers to a medium size ISP, monitoring
   becomes significantly harder.

5.5.  IPv6 privacy addresses

   It is ironic to notice that as IPv6 improves "address transparency"
   by removing the need for address translation, it also makes
   monitoring significantly easier than when using NAT.  But the Privacy
   Extensions for Stateless Address Autoconfiguration in IPv6 [RFC4941]
   allow users to configure temporary IPv6 addresses out of a global
   prefix.  Privacy addresses are meant to be used for a short time,
   typically no more than a day, and are specifically designed to render
   monitoring based on IPv6 addresses harder.

   Privacy extensions only affect the least significant 64 bits of the
   IPv6 address.  The most significant 64 bits remain unaffected.  The
   64 bit prefix is typically allocated to a small network, e.g., a
   single household or a Wi-Fi hot spot.  It has pretty much the same
   identifying power as an IPv4 address.  If the network is small in
   size, the use of privacy addresses, just like the use of NAT, will be
   a mere speed bump for IP header monitoring.









Huitema                   Expires May 10, 2014                 [Page 10]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


5.6.  Frequent address renumbering

   In the days of modem networking, a computer would receive a new IPv4
   address each time it connected to the Internet.  Always on broadband
   connections may or may not provide the subscribers with permanent
   stable addresses.  Some users pay extra for the convenience of a
   stable address.  Of course, stable addresses greatly facilitate IP
   header monitoring.

   In contrast, we could imagine that the broadband modem is re-
   provisioned at regular interval with a new IPv4 address, or with a
   new IPv6 address prefix.  Some convenience will be lost, and TCP
   connections active before the renumbering will have to be
   reestablished.  However, the renumbering will significantly
   complicate the task of IP header monitoring.

5.7.  Multihoming

   Multihoming is the practice of using multiple connections
   simultaneously.  If done well, multihoming will split the graph of
   connectivity in interesting ways.  Packets will travel over different
   routes, IP addresses will be different.  Multihoming could make IP
   header monitoring harder.

5.8.  Virtual Private Networks

   Virtual private networks (VPN) allow users to set up a "tunnel"
   across the Internet to a "virtual" connection point, and effectively
   provide a form of multihoming.  Since the connections are virtual,
   VPN could also provide a form of frequent address renumbering.  As
   such, VPN can provide some resistance against IP address monitoring.

   VPN's require careful configuration and setup to prevent leakage of
   identifying information.  Tech that purports to secure or privatize
   your communication but that actually leaks - or worse, can be coerced
   into revealing your traffic, is worse than no tech at all.

5.9.  Web proxies

   Sending HTTP requests through web proxy is a way to hide the actual
   IP source of the request, and as such a way to complicate monitoring.

   Much like VPN, web proxies are a two edged sword.  If the proxy is
   compromised, the true origin of the traffic can be retrieved.
   Moreover, the proxy could become an observation point to monitor the
   web traffic.





Huitema                   Expires May 10, 2014                 [Page 11]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   If the monitoring services can observe the traffic coming in and out
   of the proxies, they can use correlation methods to match incoming
   and outgoing flows.  This is obvious in the trivial case where there
   is just 1 user of the proxy.  The monitoring will reveal that a
   message to the proxy from address A was quickly followed by a message
   from the proxy to address B, and the monitoring service will infer a
   connection from address A to address B. Even if the number of proxy
   users increase, the monitoring services may still be able to use
   timing information and correlate input and output messages.

5.10.  Onion routing and shuffle nets

   Services like Tor provide an obvious form of resistance against IP
   header monitoring.

5.11.  And there is more

   There are certainly more potential defenses, which will emerge during
   the discussion of this draft.

6.  Recommendations

   The following recommendations are an attempt to summarize the threat
   and mitigation analysis in the previous sections:

   o  Use encryption.  In particular, never send a user identity in
      clear text.

   o  Ask "submission" SMTP server to obfuscate the IP address of the
      user, and not place it in mail headers.

   o  Not completely written yet...

7.  Security Considerations

   This draft does not introduce new protocols.  It does present a
   series of attacks on existing protocols, and proposes an assorted set
   of mitigations.

8.  IANA Considerations

   This draft does not require any IANA action.









Huitema                   Expires May 10, 2014                 [Page 12]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


9.  Acknowledgments

   The inspiration for this draft came from discussions in the Perpass
   mailing list.  Some of the text was contributed in messages to the
   list by Dave Nix, Brian Trammel and Brian Carpenter.  Stephen Farrell
   provided guidance and useful suggestions.  Thanks to Linus Nordberg
   for checkproofing the draft.

10.  References

10.1.  Normative References

   [RFC2026]  Bradner, S., "The Internet Standards Process -- Revision
              3", BCP 9, RFC 2026, October 1996.

10.2.  Informative References

   [RFC0791]  Postel, J., "Internet Protocol", STD 5, RFC 791, September
              1981.

   [RFC1939]  Myers, J. and M. Rose, "Post Office Protocol - Version 3",
              STD 53, RFC 1939, May 1996.

   [RFC2460]  Deering, S. and R. Hinden, "Internet Protocol, Version 6
              (IPv6) Specification", RFC 2460, December 1998.

   [RFC3022]  Srisuresh, P. and K. Egevang, "Traditional IP Network
              Address Translator (Traditional NAT)", RFC 3022, January
              2001.

   [RFC3261]  Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
              A., Peterson, J., Sparks, R., Handley, M., and E.
              Schooler, "SIP: Session Initiation Protocol", RFC 3261,
              June 2002.

   [RFC3501]  Crispin, M., "INTERNET MESSAGE ACCESS PROTOCOL - VERSION
              4rev1", RFC 3501, March 2003.

   [RFC3954]  Claise, B., "Cisco Systems NetFlow Services Export Version
              9", RFC 3954, October 2004.

   [RFC4291]  Hinden, R. and S. Deering, "IP Version 6 Addressing
              Architecture", RFC 4291, February 2006.

   [RFC4941]  Narten, T., Draves, R., and S. Krishnan, "Privacy
              Extensions for Stateless Address Autoconfiguration in
              IPv6", RFC 4941, September 2007.




Huitema                   Expires May 10, 2014                 [Page 13]

Internet-DraftPassive Traffic Analysis Threats and Defense November 2013


   [RFC5321]  Klensin, J., "Simple Mail Transfer Protocol", RFC 5321,
              October 2008.

   [SNA]      Crowcroft, J. and M. Bagnulo, "SNA: Sourceless Network
              Architecture", June 2008,
              <http://www.cl.cam.ac.uk/~jac22/talks/sna.ppt>.

Author's Address

   Christian Huitema
   Microsoft Corporation
   One Microsoft Way
   Redmond, WA  98052-6399
   U.S.A.

   Email: huitema@huitema.net



































Huitema                   Expires May 10, 2014                 [Page 14]