Perhaps an explanation of the phrase “other actors within a protocol” in paragraph 2 of section 3. Is it just intermediaries (which according to the definition in RFC 6973 are necessary for the protocol) or are there any other entities? Is it existing middleboxes that new protocols seed to modify or entirely new middleboxes?
Just that I would never write a privacy considerations section that says “The source address of the client is obfuscated because NATs and proxies are everywhere”. I can’t count on a proxy (or NAT) always being present, so I can’t count on them as the solution to the data minimization need. I *can* generally assume that clients will use a recursive DNS resolver.
OLD similarly a VPN system used to provide channel security may believe that origin IP should be restored. NEW similarly a VPN system restores all of the metadata associated with the IP packet at the tunnel egress. Yoav |
Attachment:
signature.asc
Description: Message signed with OpenPGP