<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.17 (Ruby 2.7.0) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-irtf-pearg-ip-address-privacy-considerations-01" category="info" submissionType="IRTF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.15.1 -->
  <front>
    <title abbrev="IP Address Privacy Considerations">IP Address Privacy Considerations</title>
    <seriesInfo name="Internet-Draft" value="draft-irtf-pearg-ip-address-privacy-considerations-01"/>
    <author initials="M." surname="Finkel" fullname="Matthew Finkel">
      <organization>Apple Inc.</organization>
      <address>
        <email>sysrqb@apple.com</email>
      </address>
    </author>
    <author initials="B." surname="Lassey" fullname="Bradford Lassey">
      <organization>Google</organization>
      <address>
        <email>lassey@chromium.org</email>
      </address>
    </author>
    <author initials="L." surname="Iannone" fullname="Luigi Iannone">
      <organization abbrev="Huawei">Huawei Technologies France S.A.S.U</organization>
      <address>
        <email>luigi.iannone@huawei.com</email>
      </address>
    </author>
    <author initials="J. B." surname="Chen" fullname="J. Bradley Chen">
      <organization>Google</organization>
      <address>
        <email>bradchen@google.com</email>
      </address>
    </author>
    <date year="2022" month="October" day="23"/>
    <area>General</area>
    <workgroup>Network Working Group</workgroup>
    <keyword>Internet-Draft</keyword>
    <abstract>
      <t>This document provides an overview of privacy considerations related to user IP addresses. It includes an analysis of some current use cases for tracking of user IP addresses, mainly in the context of anti-abuse. It discusses the privacy issues associated with such tracking and provides input on mechanisms to improve the privacy of this existing model. It then captures requirements for proposed 'replacement signals' for IP addresses from this analysis. In addition, existing and under-development techniques are evaluated for fulfilling these requirements.</t>
    </abstract>
    <note removeInRFC="true">
      <name>Discussion Venues</name>
      <t>Discussion of this document takes place on the
    mailing list (),
  which is archived at <eref target=""/>.</t>
      <t>Source for this draft and an issue tracker can be found at
  <eref target="https://github.com/ShivanKaul/draft-ip-address-privacy"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>The initial intention of this draft is to capture an overview of the problem space and research on proposed solutions concerning privacy considerations related to user IP addresses (informally, IP privacy). The draft is likely to evolve significantly over time and may well split into multiple drafts as content is added.</t>
      <t>Tracking of IP addresses is common place on the Internet today, and is particularly widely used in the context of
anti-abuse, e.g. anti-fraud, DDoS management, and child protection activities. IP addresses are currently used in determining
"reputation" <xref target="RFC5782"/> in conjunction with other signals to protect against malicious traffic, since these addresses are usually a relatively stable
identifier of a request's origin. Servers use these reputations in determining whether or not a given packet, connection,
or flow likely corresponds to malicious traffic. In addition, IP addresses are used in investigating past events and attributing responsibility.</t>
      <t>However, identifying the activity of users based on IP addresses has clear privacy implications (<xref target="WEBTRACKING1"/>, <xref target="WEBTRACKING2"/>), e.g. user fingerprinting and cross-site identity linking. Many technologies exist today that allow users to obfuscate their external IP address to avoid such tracking, e.g. VPNs (<xref target="VPNCMP1"/>, <xref target="VPNCMP2"/>) and Tor (<xref target="TOR"/>, <xref target="VPNTOR"/>). Several new technologies are emerging, as well, in the landscape, e.g. Apple iCloud Private Relay <xref target="APPLEPRIV"/>, Gnatcatcher <xref target="GNATCATCHER"/>, and Oblivious technologies (ODoH <xref target="I-D.pauly-dprive-oblivious-doh"/>, OHTTP <xref target="I-D.thomson-ohai-ohttp"/>).</t>
      <t>General consideration about privacy for Internet protocols can be found in <xref target="RFC6973"/>. This document builds upon <xref target="RFC6973"/> and more specifically attempts to capture the following aspects of the tension between valid use cases for user identification and the related privacy concerns, including:</t>
      <ul spacing="normal">
        <li>An analysis of the current use cases, attempting to categorize/group such use cases where commonalities exist.</li>
        <li>Find ways to enhance the privacy of existing uses of IP addresses.</li>
        <li>Generating requirements for proposed 'replacement signals' from this analysis (these could be different for each category/group of use cases).</li>
        <li>Research to evaluate existing technologies or propose new mechanisms for such signals.</li>
      </ul>
      <t>With the goal of replacing IP addresses as a fundemental signal, the following sections enumerate existing use cases and describe applicable substitution signals. This description may not be exhaustive due to the breadth of IP address usage.</t>
    </section>
    <section anchor="terminology">
      <name>Terminology</name>
      <t>(Work in progress)</t>
      <t>This section defines basic terms used in this document, with references to pre-existing definitions as appropriate. As in <xref target="RFC4949"/> and <xref target="RFC6973"/>, each entry is preceded by a dollar sign ($) and a space for automated searching.</t>
      <ul spacing="normal">
        <li>$ Identity: Extending <xref target="RFC6973"/>, an individual's attributes may only identify an individual up to an anonymity set within a given context.</li>
        <li>$ Reputation: A random variable with some distribution. A reputation can either be "bad" or "good" with some probability according to the distribution.</li>
        <li>$ Reputation context: The context in which a given reputation applies.</li>
        <li>$ Reputation proof: A non-interactive zero knowledge proof of a reputation signal.</li>
        <li>$ Reputation signal: A representative of a reputation.</li>
        <li>$ Service provider: An entity that provides a service on the Internet; examples services include hosted e-mail, e-commerce sites, and cloud computing platforms.</li>
      </ul>
      <section anchor="categories-of-interaction">
        <name>Categories of Interaction</name>
        <t>Interactions between parties on the Internet may be classified into one (or more) of three categories:</t>
        <ul spacing="normal">
          <li>$ Private Interaction: An interaction occuring between mutually consenting parties, with a mutual expectation of privacy.</li>
          <li>$ Public Interaction: An interaction occuring between multiple parties that are not engaged in a Private Interaction.</li>
          <li>$ Consumption: An interaction where one party primarily receives information from other parties.</li>
        </ul>
      </section>
    </section>
    <section anchor="ip-address-tracking">
      <name>IP address tracking</name>
      <section anchor="ip-address-use-cases">
        <name>IP address use cases</name>
        <section anchor="antiabuse">
          <name>Anti-abuse</name>
          <t>IP addresses are a passive identifier used in defensive operations. They allow correlating requests, attribution, and recognizing numerous attacks, including:</t>
          <ul spacing="normal">
            <li>account takeover</li>
            <li>advertising fraud (e.g., click-fraud)</li>
            <li>disinformation operations (e.g., detecting scaled and/or coordinated attacks)</li>
            <li>financial fraud (e.g., stolen credit cards, email account compromise)</li>
            <li>malware/ransomware (e.g., detecting C2 connections)</li>
            <li>phishing</li>
            <li>real-world harm (e.g., child abuse)</li>
            <li>scraping (e.g., e-commerce, search)</li>
            <li>spam (e.g., email, comments)</li>
            <li>vulnerability exploitation (e.g., "hacking")</li>
          </ul>
          <t>Malicious activity recognized by one service provider may be shared with other services <xref target="RFC5782"/> as a way of limiting harm.</t>
        </section>
        <section anchor="ddos-and-botnets">
          <name>DDoS and Botnets</name>
          <t>Cyber-attackers can leverage the good reputation of an IP address to carry out specific attacks that wouldn't work otherwise. Main examples are Distributed Denial of Service (DDoS) attacks carried out by spoofing a trusted (i.e., having good reputation) IP address (which may or may not be the victim of the attack) so that the servers used to generate the DDoS traffic actually respond to the attackers trigger (i.e., spoofed packets). Similarly botnets may use spoofed addresses in order to gain access and attack services that otherwise would not be reachable.</t>
        </section>
        <section anchor="multi-platform-threat-models">
          <name>Multi-platform threat models</name>
          <t>As siloed (single-platform) abuse defenses improve, abusers have moved to multi-platform threat models. For example, a public discussion platform with a culture of anonymity may redirect traffic to YouTube as a video library, bypassing YouTube defenses that otherwise reduce exposure of potentially harmful content. Similarly, a minor could be solicited by an adult impersonating a child on a popular social media platform, then redirected to a smaller, less established and less defended platform where illegal activity could occur. Phishing attacks are also common. There are many such cross-platform abuse models and they cause significant public harm. IP addresses are commonly used to investigate, understand and communicate these cross-platform threats. There are very few alternatives for cross-platform signals.</t>
        </section>
        <section anchor="rough-geolocation">
          <name>Rough Geolocation</name>
          <t>A rough geolocation can be inferred from a client's IP address, which is commonly known as either IP-Geo or Geo-IP. This information can have several useful implications. When abuse extends beyond attacks in the digital space, IP addresses may help identify the physical location of real-world harm, such as child exploitation.</t>
          <section anchor="legal-compliance">
            <name>Legal compliance</name>
            <t>Legal and regulatory compliance often needs to take the jurisdiction of the client into account. This is especially important in cases where regulations are mutually contradictory (i.e. there is no way to be in legal compliance universally). Because Geo-IP is often bound to the IP addresses a given ISP uses, and ISPs tend to operate within national borders, Geo-IP tends to be a good fit for server operators to comply with local laws and regulations</t>
          </section>
          <section anchor="contractual-obligations">
            <name>Contractual obligations</name>
            <t>Similar to legal compliance, some content and media has licensing terms that are valid only for certain locations. The rough geolocation derived from IP addresses allow this content to be hosted on the web.</t>
          </section>
          <section anchor="locally-relevant-content">
            <name>Locally relevant content</name>
            <t>Rough geolocation can also be useful to tailor content to the client's location simply to improve their experience. A search for "coffee shop" can include results of coffee shops within reasonable travel distance from a user rather than generic information about coffee shops, a merchant's website could show brick and mortar stores near the user and a news site can surface locally relevant news stories that wouldn't be as interesting to visitors from other locations.</t>
          </section>
        </section>
      </section>
      <section anchor="implications-of-ip-addresses">
        <name>Implications of IP addresses</name>
        <section anchor="next-user-implications">
          <name>Next-User Implications</name>
          <t>When an attacker uses IP addresses with "good" reputations, the collateral damage poses a serious risk to legitimate service providers, developers, and end users. IP addresses may become assocaited with a "bad" reputation from temporal abuse, and legitimate users may be affected by blocklists as a result. This unintended impact may hurt the reputation of a service or an end user <xref target="RFC6269"/>.</t>
        </section>
        <section anchor="privacy-implications">
          <name>Privacy Implications</name>
          <t>IP addresses are sent in the clear throughout the packet journey over the Internet.
As such, any observer along the path can pick it up and use it for various tracking purposes. Beside basic information about the network or the device, it is possible to associate an IP address to an end user, hence, the relevance of IP addresses for user privacy. A very short list of information about user, device, and network that can be obtained via the IP address.</t>
          <ul spacing="normal">
            <li>Determine who owns and operates the network. Searching the WHOIS database using an IP address can provide a range of information about the organization to which the address is assigned, including a name, phone number, and civic address;</li>
            <li>Through a reverse DNS lookup and/or traceroute the computer name can be obtained, which often contains clues to logical and physical location;</li>
            <li>Geo-localisation of the device (hence the user) through various techniques <xref target="GEOIP"/>. Depending on the lookup tool used, this could include country, region/state, city, latitude/longitude, telephone area code and a location-specific map;</li>
            <li>Search the Internet using the IP address or computer names. The results of these searches might reveal peer-to-peer (P2P) activities (e.g., file sharing), records in web server log files, or glimpses of the individual's web activities (e.g., Wikipedia edits). These bits of individuals' online history may reveal their political inclinations, state of health, sexuality, religious sentiments and a range of other personal characteristics, preoccupations and individual interests;</li>
            <li>Seek information on any e-mail addresses used from a particular IP address which, in turn, could be the subject of further requests for subscriber information.</li>
          </ul>
        </section>
      </section>
      <section anchor="ip-privacy-protection-and-law">
        <name>IP Privacy Protection and Law</name>
        <t>Various countries, in the last decade, have adopted, or updated, laws that aim at protecting citizens privacy, which includes IP addresses.
Very often, these laws are actually part of larger regulatory frameworks aimed at protecting users' Personal Identifiable Information (PII) in a broad sense. <xref target="table_laws"/> provides a snapshot of relevant existing regulations.</t>
        <table anchor="table_laws">
          <name>Relevant privacy laws and regulations</name>
          <thead>
            <tr>
              <th align="left">Country</th>
              <th align="left">Law</th>
              <th align="left">IP Address is PII</th>
            </tr>
          </thead>
          <tbody>
            <tr>
              <td align="left">Brazil</td>
              <td align="left">
                <xref target="LGPD"/> - Lei General de Protecao de Dados Pessoals</td>
              <td align="left">Yes (not explicitly stated)</td>
            </tr>
            <tr>
              <td align="left">Canada</td>
              <td align="left">
                <xref target="PIPEDA"/> - Personal Information Protection and Electronic Documents Act</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">China</td>
              <td align="left">
                <xref target="PIPL-C"/><xref target="PIPL"/> - Personal Information Protection Law</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">European Union</td>
              <td align="left">
                <xref target="GDPR"/> - General Data Protection Regulation</td>
              <td align="left">Yes</td>
            </tr>
            <tr>
              <td align="left">Japan</td>
              <td align="left">
                <xref target="APPI"/> - Act of Protection of Personal Information</td>
              <td align="left">Yes (including anonymized data)</td>
            </tr>
          </tbody>
        </table>
        <t>All of the major laws recognizes IP addresses as personal identification information when there is sufficiently strong correlation between an address and a person or when combined with other information to create that correlation. Brazil does not mention IP addresses explicitly but includes them de facto. Japan does protect even anonymized data. All require an explicit action from the user to grant permission to use PII, except for Canada that allows implicit consent. Note that all laws include exceptions on the type of consent, which, however are difficult to summarize. USA does not have a general federal law, but state sector-specific laws pertaining to privacy that would be too difficult to summarize (see <xref target="CCPA"/> as an example). Depending  on the state, IP addresses may not be considered as personally identifiable information <xref target="IP2009"/>.</t>
      </section>
      <section anchor="mitigations-for-ip-address-tracking">
        <name>Mitigations for IP address tracking</name>
        <t>The ability to track individual people by IP address has been well understood for decades. Commercial VPNs and Tor are the most common methods of mitigating IP address-based tracking.</t>
        <ul spacing="normal">
          <li>Commerical VPNs offer a layer of indirection between the user and the destination, however if the VPN endpoint's IP address is static then this simply substitutes one address for another. In addition, commerial VPNs replace tracking across sites with a single company that may track their users' activities.</li>
          <li>Tor is another mitigation option due to its dynamic path selection and distributed network of relays, however its current design suffers from degraded performance. In addition, correct application integration is difficult and not common.</li>
          <li>
            <t>Address anonymization (e.g. <xref target="GNATCATCHER"/> and similar):
            </t>
            <ul spacing="normal">
              <li>
                <xref target="GNATCATCHER"/> is a single-hop proxy system providing more protection against third-party tracking than a traditional commercial VPN. However, its design maintains the industry-standard reliance on IP addresses for anti-abuse purposes and it provides near backwards compatibility for select services that submit to periodic audits.</li>
              <li>
                <xref target="APPLEPRIV"/> iCloud Private Relay is described as using two proxies between the client and server, and it would provide a level of protection somewhere between a commercial VPN and Tor.</li>
            </ul>
          </li>
          <li>Recent interest has resulted in new protocols such as Oblivious DNS (<xref target="I-D.pauly-dprive-oblivious-doh"/>) and Oblivious HTTP (<xref target="I-D.thomson-ohai-ohttp"/>). While they both prevent tracking by individual parties, they are not intended for the general-purpose web browsing use case.</li>
          <li>Temporary addresses</li>
        </ul>
      </section>
    </section>
    <section anchor="replacement-signals-for-ip-addresses">
      <name>Replacement signals for IP addresses</name>
      <t>Fundamentally, the current ecosystem operates by making the immediate peer of a connection accountable for bad traffic, rather than the source of the traffic itself.  This is problematic because in some network architectures the peer node of the connection is simply routing traffic for other clients, and any client's use of that node may be only temporary.  Ideally, clients could present appropriate identification end-to-end that is separate from the IP address, and uniquely bound to a given connection.</t>
      <section anchor="signals">
        <name>Signals</name>
        <t>There are 7 classes of signals identified in this document that may be used in place of IP addresses. A signal's provenance is a critical property and will be discussed in <xref target="provenance"/>.</t>
        <ul spacing="normal">
          <li>ADDRESS_ESCROW: Provides sufficient information for retroactively obtaining a client's IP address.</li>
          <li>IDENTITY_TRANSPARENCY: Reveals a person's identity within a context.</li>
          <li>IS_HUMAN: Informs the recipient that, most likely, a human recently proved their presence on the opposite end of the connection.</li>
          <li>PEER_INTEGRITY: Provides a secure, remote attestation of hardware and/or software state.</li>
          <li>REIDENTIFICATION: Provides a mechanism for identifying the same user across different connections within a time period.</li>
          <li>REPUTATION: Provides the recipient with a proof of reputation from a reputation provider.</li>
          <li>SOURCE_ASN: Reveals the ASN from which the client is connecting.</li>
        </ul>
        <t>In some situations one of the above signals may be a sufficient replacement signal in isolation, or more than one signal may be needed in combination.</t>
        <t>Separately, there are three signal categories that are out-of-scope for this document but are important improvements for mitigating abuse on platforms.</t>
        <ul spacing="normal">
          <li>publisher norms: Standard expections of publishers including identity transparency and conflicts of interest.</li>
          <li>protocol improvements: Increasing security of existing protocols.</li>
          <li>ecosystem improvements: Reducing reliance on less secure systems, for example, migrating user authentication from password-based to WebAuthn <xref target="WEBAUTHN"/> and relying on multiple factors (MFA).</li>
        </ul>
        <section anchor="adoption">
          <name>Adoption</name>
          <t>Adoption of replacement signals requires coordination between user agents, service providers, and proxy services. Some user agents and proxy services may support only a subset of these signals, while service providers may require additional signals. A mechanism of negotiation may be needed for communicating these requirements.</t>
          <t>In addition, service providers should only require a signal within the scope it will be used. In the same way that service provides only require user authentication when the user requests access to a non-public resource, a signal should not be pre-emptively requested before it is needed. The categories of interaction described above may help define scopes within a service, and they may help communicate to the user the reasoning for requiring a signal.</t>
        </section>
        <section anchor="privacy-considerations">
          <name>Privacy Considerations</name>
          <t>A signal should not be required without clear justification, service providers should practice data minimization <xref target="RFC6973"/> wherever possible. Requiring excessive signals may be more harmful to user privacy than requiring IP address transparency. This section provides a more details analysis of some signals.</t>
          <t>ADDRESS_ESCROW gives service providers a time period within which they may obtain the client's IP address, but the information-in-escrow is not immediately available. Service providers should not gain access to the information in secret. A service provider may misuse the information-in-escrow for tracking and privacy-invasion purposes.</t>
          <t>PEER_INTEGRITY partitions users into two groups with valid and invalid hardware/software state, at a minimum. If the signal reveals more information, then it may allow more granular tracking of small sets of devices.</t>
          <t>IDENTITY_TRANSPARENCY may expose significant information about a user to a service provider; the resulting privacy invasion may be significantly worse than IP address transparency causes.</t>
          <t>IS_HUMAN depends on the mechanism used for proving humanness.</t>
          <t>REIDENTIFICATION explicitly allows a service provider to associate requests across unlinkable connections. This signal allows for profiling user behavior and tracking user activity without requesting more identifying information. First-party reidentification is a use case for this signal.</t>
          <t>REPUTATION partitions users into a set based on their reputation. The privacy invasion associated with this signal is intentionally small.</t>
          <t>SOURCE_ASN allows for identifying request patterns originating from an ASN without providing IP address transparency. However, ASNs are not guaranteed to serve large populations, therefore revealing the source ASN of a request may reveal more information about the user than intended.</t>
        </section>
        <section anchor="provenance">
          <name>Provenance</name>
          <t>Replacement signals are only useful if they are trustworthy.</t>
          <t><eref target="https://github.com/ShivanKaul/draft-ip-address-privacy/issues/24">OPEN ISSUE 24</eref></t>
        </section>
        <section anchor="applying-appropriate-signals">
          <name>Applying Appropriate Signals</name>
          <t>As previous discussed, IP addresses are used for various reasons; therefore, describing a one-size-fits-all replacement signal is not appropriate. In addition, the quality and quantity of replacement signals needed by a service depends on the category of interaction of its users and potential attacks on the service.</t>
          <t>As an example, the attacks listed above in <xref target="antiabuse"/> can be organized into six groups based on the signals that may sufficiently replace IP addresses:</t>
          <ol spacing="normal" type="1"><li>
              <t>IS_HUMAN, REPUTATION, REIDENTIFICATION, PEER_INTEGRITY
              </t>
              <ul spacing="normal">
                <li>advertising fraud (e.g., click-fraud)</li>
                <li>phishing</li>
                <li>scraping (e.g., e-commerce, search)</li>
                <li>spam (e.g., email, comments)</li>
              </ul>
            </li>
            <li>
              <t>IS_HUMAN, REPUTATION, REIDENTIFICATION, ecosystem improvements
              </t>
              <ul spacing="normal">
                <li>account takeover</li>
              </ul>
            </li>
            <li>
              <t>IS_HUMAN, REPUTATION, SOURCE_ASN
              </t>
              <ul spacing="normal">
                <li>influence (e.g., brigading, astroturfing)</li>
              </ul>
            </li>
            <li>
              <t>publisher norms, (publisher) IDENTITY_TRANSPARENCY, PEER_INTEGRITY
              </t>
              <ul spacing="normal">
                <li>disinformation operations (e.g., detecting scaled and/or coordinated attacks)</li>
              </ul>
            </li>
            <li>
              <t>publisher norms, (publisher) IDENTITY_TRANSPARENCY, ADDRESS_ESCROW
              </t>
              <ul spacing="normal">
                <li>real-world harm (e.g., child abuse)</li>
              </ul>
            </li>
            <li>
              <t>IDENTITY_TRANSPARENCY, protocol improvements
              </t>
              <ul spacing="normal">
                <li>financial fraud (e.g., stolen credit cards, email account compromise)</li>
              </ul>
            </li>
          </ol>
          <t>The remaining two attack categories fall outside of the scope of this document.</t>
          <ul spacing="normal">
            <li>malware/ransomware (e.g., detecting C2 connections)</li>
            <li>vulnerability exploitation (e.g., "hacking")</li>
          </ul>
          <t>Note, IP addresses do not provide a perfect signal in their existing usage, and the above replacement signals do not provide a better signal in all cases.</t>
        </section>
      </section>
      <section anchor="evaluation-of-existing-technologies">
        <name>Evaluation of existing technologies</name>
        <t>Technologies exist that are designed to solve some of the problems described in this document.</t>
        <t>Privacy Pass <xref target="I-D.ietf-privacypass-protocol"/> is a useful building block for solving numerous problems. Its design involves an interaction between a client and server where, at the end, the client is issued a set of anonymous tokens. These tokens may be redeemed at a later time, and this redemption should not be linkable with the initial issuance interaction. One existing use case is substituting a CAPTCHA challenge with a token, where successfully solving a CAPTCHA challenge results in a client being issued a set of anonymous tokens, and these tokens may be used in the future to bypass solving another CAPTCHA challenge. Therefore, Privacy Pass may be acceptable as an IS_HUMAN signal by some service providers. The current token design can't carry additional metadata like a user's reputation or an expiration date, and the tokens are not bound to an identity. The unlinkability property of the tokens is dependent on the implementation of key consistency <xref target="I-D.wood-key-consistency"/>.</t>
        <t>Trust Token <xref target="TRUSTTOKEN"/> is an extension of Privacy Pass where the issuance and redemption functionality are provided in the browser setting. The tokens are allowed to carry public and private metadata as extensions.</t>
        <t>Private Access Tokens <xref target="I-D.private-access-tokens"/> provide a technique for partitioning clients based on a per-origin policy within a time period. Its use cases include rate-limiting access to content and geo-location. PATs could be used as a REIDENTIFICATION signal or a replacement signal for GeoIP, depending on requirements.</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>This draft discussses IP address use cases, underlying requirements, and possible replacement signals. Adoption challenges and privacy considerations for those signals are also discussed. Further work is needed to build and evaluate these signals as suitable replacements for IP addresses.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC5782">
          <front>
            <title>DNS Blacklists and Whitelists</title>
            <author fullname="J. Levine" initials="J." surname="Levine">
              <organization/>
            </author>
            <date month="February" year="2010"/>
            <abstract>
              <t>The rise of spam and other anti-social behavior on the Internet has led to the creation of shared blacklists and whitelists of IP addresses or domains.  The DNS has become the de-facto standard method of distributing these blacklists and whitelists.  This memo documents the structure and usage of DNS-based blacklists and whitelists, and the protocol used to query them.  This document  is not an Internet Standards Track specification; it is published for  informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5782"/>
          <seriesInfo name="DOI" value="10.17487/RFC5782"/>
        </reference>
        <reference anchor="RFC6973">
          <front>
            <title>Privacy Considerations for Internet Protocols</title>
            <author fullname="A. Cooper" initials="A." surname="Cooper">
              <organization/>
            </author>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig">
              <organization/>
            </author>
            <author fullname="B. Aboba" initials="B." surname="Aboba">
              <organization/>
            </author>
            <author fullname="J. Peterson" initials="J." surname="Peterson">
              <organization/>
            </author>
            <author fullname="J. Morris" initials="J." surname="Morris">
              <organization/>
            </author>
            <author fullname="M. Hansen" initials="M." surname="Hansen">
              <organization/>
            </author>
            <author fullname="R. Smith" initials="R." surname="Smith">
              <organization/>
            </author>
            <date month="July" year="2013"/>
            <abstract>
              <t>This document offers guidance for developing privacy considerations for inclusion in protocol specifications.  It aims to make designers, implementers, and users of Internet protocols aware of privacy-related design choices.  It suggests that whether any individual RFC warrants a specific privacy considerations section will depend on the document's content.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6973"/>
          <seriesInfo name="DOI" value="10.17487/RFC6973"/>
        </reference>
        <reference anchor="RFC4949">
          <front>
            <title>Internet Security Glossary, Version 2</title>
            <author fullname="R. Shirey" initials="R." surname="Shirey">
              <organization/>
            </author>
            <date month="August" year="2007"/>
            <abstract>
              <t>This Glossary provides definitions, abbreviations, and explanations of terminology for information system security. The 334 pages of entries offer recommendations to improve the comprehensibility of written material that is generated in the Internet Standards Process (RFC 2026). The recommendations follow the principles that such writing should (a) use the same term or definition whenever the same concept is mentioned; (b) use terms in their plainest, dictionary sense; (c) use terms that are already well-established in open publications; and (d) avoid terms that either favor a particular vendor or favor a particular technology or mechanism over other, competing techniques that already exist or could be developed.  This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="FYI" value="36"/>
          <seriesInfo name="RFC" value="4949"/>
          <seriesInfo name="DOI" value="10.17487/RFC4949"/>
        </reference>
        <reference anchor="RFC6269">
          <front>
            <title>Issues with IP Address Sharing</title>
            <author fullname="M. Ford" initials="M." role="editor" surname="Ford">
              <organization/>
            </author>
            <author fullname="M. Boucadair" initials="M." surname="Boucadair">
              <organization/>
            </author>
            <author fullname="A. Durand" initials="A." surname="Durand">
              <organization/>
            </author>
            <author fullname="P. Levis" initials="P." surname="Levis">
              <organization/>
            </author>
            <author fullname="P. Roberts" initials="P." surname="Roberts">
              <organization/>
            </author>
            <date month="June" year="2011"/>
            <abstract>
              <t>The completion of IPv4 address allocations from IANA and the Regional Internet Registries (RIRs) is causing service providers around the world to question how they will continue providing IPv4 connectivity service to their subscribers when there are no longer sufficient IPv4 addresses to allocate them one per subscriber.  Several possible solutions to this problem are now emerging based around the idea of shared IPv4 addressing.  These solutions give rise to a number of issues, and this memo identifies those common to all such address sharing approaches.  Such issues include application failures, additional service monitoring complexity, new security vulnerabilities, and so on.  Solution-specific discussions are out of scope.</t>
              <t>Deploying IPv6 is the only perennial way to ease pressure on the public IPv4 address pool without the need for address sharing mechanisms that give rise to the issues identified herein.  This  document is not an Internet Standards Track specification; it is published for informational purposes.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6269"/>
          <seriesInfo name="DOI" value="10.17487/RFC6269"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="WEBTRACKING1">
          <front>
            <title>A Survey on Web Tracking: Mechanisms, Implications, and Defenses</title>
            <author fullname="Tomasz Bujlow" initials="T." surname="Bujlow">
              <organization/>
            </author>
            <author fullname="Valentin Carela-Espanol" initials="V." surname="Carela-Espanol">
              <organization/>
            </author>
            <author fullname="Beom-Ryeol Lee" initials="B." surname="Lee">
              <organization/>
            </author>
            <author fullname="Pere Barlet-Ros" initials="P." surname="Barlet-Ros">
              <organization/>
            </author>
            <date month="August" year="2017"/>
          </front>
          <seriesInfo name="Proceedings of the IEEE" value="vol. 105, no. 8, pp. 1476-1510"/>
          <seriesInfo name="DOI" value="10.1109/jproc.2016.2637878"/>
        </reference>
        <reference anchor="WEBTRACKING2">
          <front>
            <title>Don’t Count Me Out: On the Relevance of IP Address in the Tracking Ecosystem</title>
            <author fullname="Vikas Mishra" initials="V." surname="Mishra">
              <organization>Inria / Univ. Lille</organization>
            </author>
            <author fullname="Pierre Laperdrix" initials="P." surname="Laperdrix">
              <organization>CNRS / Univ. Lille / Inria</organization>
            </author>
            <author fullname="Antoine Vastel" initials="A." surname="Vastel">
              <organization>Univ. Lille / Inria</organization>
            </author>
            <author fullname="Walter Rudametkin" initials="W." surname="Rudametkin">
              <organization>Univ. Lille / Inria</organization>
            </author>
            <author fullname="Romain Rouvoy" initials="R." surname="Rouvoy">
              <organization>Univ. Lille / Inria / IUF</organization>
            </author>
            <author fullname="Martin Lopatka" initials="M." surname="Lopatka">
              <organization>Mozilla</organization>
            </author>
            <date month="April" year="2020"/>
          </front>
          <seriesInfo name="Proceedings of The Web Conference" value="2020"/>
          <seriesInfo name="DOI" value="10.1145/3366423.3380161"/>
        </reference>
        <reference anchor="VPNCMP1">
          <front>
            <title>Performance Comparison of VPN Solutions</title>
            <author fullname="Lukas Osswald" initials="L." surname="Osswald">
              <organization/>
            </author>
            <author fullname="Marco Haeberle" initials="M." surname="Haeberle">
              <organization/>
            </author>
            <author fullname="Michael Menth" initials="M." surname="Menth">
              <organization/>
            </author>
            <date month="May" year="2020"/>
          </front>
          <seriesInfo name="Universität Tübingen" value="article"/>
          <seriesInfo name="DOI" value="10.15496/PUBLIKATION-41810"/>
        </reference>
        <reference anchor="VPNCMP2">
          <front>
            <title>Virtual private networks: an overview with performance evaluation</title>
            <author fullname="S. Khanvilkar" initials="S." surname="Khanvilkar">
              <organization/>
            </author>
            <author fullname="A. Khokhar" initials="A." surname="Khokhar">
              <organization/>
            </author>
            <date month="October" year="2004"/>
          </front>
          <seriesInfo name="IEEE Communications Magazine" value="vol. 42, no. 10, pp. 146-154"/>
          <seriesInfo name="DOI" value="10.1109/mcom.2004.1341273"/>
        </reference>
        <reference anchor="GEOIP">
          <front>
            <title>IP Geolocation Using Traceroute Location Propagation and IP Range Location Interpolation</title>
            <author fullname="Ovidiu Dan" initials="O." surname="Dan">
              <organization>Microsoft Bing</organization>
            </author>
            <author fullname="Vaibhav Parikh" initials="V." surname="Parikh">
              <organization>Microsoft</organization>
            </author>
            <author fullname="Brian D. Davison" initials="B." surname="Davison">
              <organization>Lehigh University</organization>
            </author>
            <date month="April" year="2021"/>
          </front>
          <seriesInfo name="Companion Proceedings of the Web Conference" value="2021"/>
          <seriesInfo name="DOI" value="10.1145/3442442.3451888"/>
        </reference>
        <reference anchor="TOR" target="https://www.torproject.org/">
          <front>
            <title>The Tor Project</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="VPNTOR" target="Journal of Physics Conference Series">
          <front>
            <title>Anonymity communication VPN and Tor: A comparative study</title>
            <author initials="E." surname="Ramadhani">
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GNATCATCHER" target="https://github.com/bslassey/ip-blindness">
          <front>
            <title>Global Network Address Translation Combined with Audited and Trusted CDN or HTTP-Proxy Eliminating Reidentification</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APPLEPRIV" target="https://www.apple.com/icloud/docs/iCloud_Private_Relay_Overview_Dec2021.pdf">
          <front>
            <title>Apple iCloud Private Relay</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="TRUSTTOKEN" target="https://github.com/WICG/trust-token-api">
          <front>
            <title>Trust Token API Explainer</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="WEBAUTHN" target="https://www.w3.org/TR/webauthn-2/">
          <front>
            <title>Web Authentication: An API for accessing Public Key Credentials Level 2</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="GDPR" target="https://gdpr.eu/tag/gdpr/">
          <front>
            <title>General Data Protection Regulation</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="APPI" target="https://www.dataguidance.com/notes/japan-data-protection-overview">
          <front>
            <title>Japan - Data Protection Overview</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="LGPD" target="https://iapp.org/media/pdf/resource_center/Brazilian_General_Data_Protection_Law.pdf">
          <front>
            <title>General Personal Data Protection Law (Brazil)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PIPL-C" target="http://www.npc.gov.cn/npc/c30834/202108/a8c4e3672c74491a80b53a172bb753fe.shtml">
          <front>
            <title>Personal Information Protection Law of the People's Republic of China (Chinese)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PIPL" target="https://digichina.stanford.edu/work/translation-personal-information-protection-law-of-the-peoples-republic-of-china-effective-nov-1-2021/">
          <front>
            <title>Personal Information Protection Law of the People's Republic of China (English translation)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="PIPEDA" target="https://laws-lois.justice.gc.ca/PDF/P-8.6.pdf">
          <front>
            <title>Personal Information Protection and Electronic Documents Act</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="IP2009" target="https://www.huntonprivacyblog.com/2009/07/10/washington-court-rules-that-ip-addresses-are-not-personally-identifiable-information/">
          <front>
            <title>Washington Court Rules that IP Addresses are not Personally Identifiable Information</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="CCPA" target="https://oag.ca.gov/privacy/ccpa">
          <front>
            <title>California Consumer Privacy Act (CCPA)</title>
            <author>
              <organization/>
            </author>
            <date>n.d.</date>
          </front>
        </reference>
        <reference anchor="I-D.pauly-dprive-oblivious-doh">
          <front>
            <title>Oblivious DNS over HTTPS</title>
            <author fullname="Eric Kinnear" initials="E." surname="Kinnear">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Patrick McManus" initials="P." surname="McManus">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Tanya Verma" initials="T." surname="Verma">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="17" month="February" year="2022"/>
            <abstract>
              <t>This document describes a protocol that allows clients to hide their IP addresses from DNS resolvers via proxying encrypted DNS over HTTPS (DoH) messages. This improves privacy of DNS operations by not allowing any one server entity to be aware of both the client IP address and the content of DNS queries and answers.

 This experimental protocol has been developed outside the IETF and is published here to guide implementation, ensure interoperability among implementations, and enable wide-scale experimentation.
              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-pauly-dprive-oblivious-doh-11"/>
        </reference>
        <reference anchor="I-D.thomson-ohai-ohttp">
          <front>
            <title>Oblivious HTTP</title>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document describes a system for the forwarding of encrypted HTTP
   messages.  This allows a client to make multiple requests of a server
   without the server being able to link those requests to the client or
   to identify the requests as having come from the same client.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/unicorn-wg/oblivious-http.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-thomson-ohai-ohttp-00"/>
        </reference>
        <reference anchor="I-D.ietf-privacypass-protocol">
          <front>
            <title>Privacy Pass Issuance Protocol</title>
            <author fullname="Sofia Celi" initials="S." surname="Celi">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Armando Faz-Hernández" initials="A." surname="Faz-Hernández">
              <organization>Cloudflare</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="6" month="July" year="2022"/>
            <abstract>
              <t>   This document specifies two variants of the the two-message issuance
   protocol for Privacy Pass tokens: one that produces tokens that are
   privately verifiable, and another that produces tokens that are
   publicly verifiable.  The privately verifiable issuance protocol
   optionally supports public metadata during the issuance flow.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-ietf-privacypass-protocol-06"/>
        </reference>
        <reference anchor="I-D.wood-key-consistency">
          <front>
            <title>Key Consistency and Discovery</title>
            <author fullname="Alex Davidson" initials="A." surname="Davidson">
              <organization>Brave Software</organization>
            </author>
            <author fullname="Matthew Finkel" initials="M." surname="Finkel">
              <organization>The Tor Project</organization>
            </author>
            <author fullname="Martin Thomson" initials="M." surname="Thomson">
              <organization>Mozilla</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="17" month="August" year="2022"/>
            <abstract>
              <t>   This document describes the key consistency and correctness
   requirements of protocols such as Privacy Pass, Oblivious DoH, and
   Oblivious HTTP for user privacy.  It discusses several mechanisms and
   proposals for enabling user privacy in varying threat models.  In
   concludes with discussion of open problems in this area.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-wood-key-consistency-03"/>
        </reference>
        <reference anchor="I-D.private-access-tokens">
          <front>
            <title>Private Access Tokens</title>
            <author fullname="Scott Hendrickson" initials="S." surname="Hendrickson">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Jana Iyengar" initials="J." surname="Iyengar">
              <organization>Fastly</organization>
            </author>
            <author fullname="Tommy Pauly" initials="T." surname="Pauly">
              <organization>Apple Inc.</organization>
            </author>
            <author fullname="Steven Valdez" initials="S." surname="Valdez">
              <organization>Google LLC</organization>
            </author>
            <author fullname="Christopher A. Wood" initials="C. A." surname="Wood">
              <organization>Cloudflare</organization>
            </author>
            <date day="25" month="October" year="2021"/>
            <abstract>
              <t>   This document defines a protocol for issuing and redeeming privacy-
   preserving access tokens.  These tokens can adhere to an issuance
   policy, allowing a service to limit access according to the policy
   without tracking client identity.

Discussion Venues

   This note is to be removed before publishing as an RFC.

   Source for this draft and an issue tracker can be found at
   https://github.com/tfpauly/privacy-proxy.

              </t>
            </abstract>
          </front>
          <seriesInfo name="Internet-Draft" value="draft-private-access-tokens-01"/>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t><eref target="https://github.com/ShivanKaul/draft-ip-address-privacy/issues/">OPEN ISSUE: TODO</eref></t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
