From kent@bbn.com Tue Oct 1 08:29:54 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6729721E81DF for ; Tue, 1 Oct 2013 08:29:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.598 X-Spam-Level: X-Spam-Status: No, score=-106.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vdf+mP9cLKhu for ; Tue, 1 Oct 2013 08:29:48 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 72C4E21E80C7 for ; Tue, 1 Oct 2013 08:29:25 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:50641) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1VR1st-0006YL-JQ; Tue, 01 Oct 2013 11:29:11 -0400 Message-ID: <524AEA47.20903@bbn.com> Date: Tue, 01 Oct 2013 11:29:11 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: Brian Rosen References: <546DB8432567684FA41E336EF1D312B84A16487C@PLSWM14A.ad.sprint.com> <71E3420F5D11314D8D989D8B72D247E129FD51DA@xmb-aln-x06.cisco.com>, <00C069FD01E0324C9FFCADF539701DB3BBEDBA62@sc9-ex2k10mb1.corp.yaanatech.com> <4B1956260CD29F4A9622F00322FE05319381A90798@BOBO1A.bobotek.net>, <5249D297.5090209@bbn.com> , <92B4B612-7EB0-456A-AB42-1772317F2EFA@att.com> In-Reply-To: Content-Type: multipart/alternative; boundary="------------010108060802000902090702" Cc: "stir@ietf.org" , "DOLLY, MARTIN C" Subject: Re: [stir] Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 15:29:54 -0000 This is a multi-part message in MIME format. --------------010108060802000902090702 Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Brian, > There are two ways proposed. > > One is to use X.509 certs, or something like them. The cert has the public key of the signing authority, and that cert is signed by the national database operator's well known key. just to maintain technical accuracy, the database operator would use it's _private_ key to sign a cert; the well-known key is it's _public_ key. Steve --------------010108060802000902090702 Content-Type: text/html; charset=us-ascii Content-Transfer-Encoding: 7bit Brian,

There are two ways proposed.

One is to use X.509 certs, or something like them.   The cert has the public key of the signing authority, and that cert is signed by the national database operator's well known key.
just to maintain technical accuracy, the database operator would use it's private
key to sign a cert; the well-known key is it's public key.

Steve
--------------010108060802000902090702-- From br@brianrosen.net Tue Oct 1 08:31:20 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7691F11E8169 for ; Tue, 1 Oct 2013 08:31:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.547 X-Spam-Level: X-Spam-Status: No, score=-103.547 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xYGQyVnY+xqU for ; Tue, 1 Oct 2013 08:31:10 -0700 (PDT) Received: from mail-yh0-f41.google.com (mail-yh0-f41.google.com [209.85.213.41]) by ietfa.amsl.com (Postfix) with ESMTP id 02A4E21E81EF for ; Tue, 1 Oct 2013 08:30:39 -0700 (PDT) Received: by mail-yh0-f41.google.com with SMTP id f73so2522724yha.0 for ; Tue, 01 Oct 2013 08:30:38 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=z87fL1VUlFiTYHUXkW8WPy7N5jSWhga2XasxbG3Uenk=; b=gw06+dBuDNjsTPJW4n/lZsgHijM2OG5i8w7qQHIHL1qZGFFPUEeLk9nhVrSz+NZ2l9 zhor7QMRondSpWjSfU9l8CJgKZCA107bXMQT65RtdnDwVYXGr83ooFS2/O1h1GV1WmJf nFQhoHHCv4iyGc08XLleGdQB2zi1IG92Q9bYZr8doq8ges27II9C/4aSJ5kc/JLFt++8 81kuX/DtJvtF069jzt+VD7w1HzZhaXQ7W9HIqtF4ivvYYYsnQB/180t3IFS+60KTGCIy pndIlaetGt3cH8w6YcRCl6e2WIJBVVLdyyYREy44LyMUpixH7qoUuNmdP4HJO97VS5Aw 3HFA== X-Gm-Message-State: ALoCoQnr1Rj4o/awHT8E3UvK+54Rq6fL1ja+q6aWQruV2F5/4LHKs0mutlq6MdozC5jJqh6UrXmE X-Received: by 10.236.228.8 with SMTP id e8mr200639yhq.135.1380641437922; Tue, 01 Oct 2013 08:30:37 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id e42sm10184161yhe.14.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 01 Oct 2013 08:30:37 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Brian Rosen In-Reply-To: <524AEA47.20903@bbn.com> Date: Tue, 1 Oct 2013 11:30:35 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <67CD10DF-57F0-4DFE-8CFD-4A986E3D328F@brianrosen.net> References: <546DB8432567684FA41E336EF1D312B84A16487C@PLSWM14A.ad.sprint.com> <71E3420F5D11314D8D989D8B72D247E129FD51DA@xmb-aln-x06.cisco.com>, <00C069FD01E0324C9FFCADF539701DB3BBEDBA62@sc9-ex2k10mb1.corp.yaanatech.com> <4B1956260CD29F4A9622F00322FE05319381A90798@BOBO1A.bobotek.net>, <5249D297.5090209@bbn.com> , <92B4B612-7EB0-456A-AB42-1772317F2EFA@att.com> <524AEA47.20903@bbn.com> To: Stephen Kent X-Mailer: Apple Mail (2.1508) Cc: "stir@ietf.org" , "DOLLY, MARTIN C" Subject: Re: [stir] Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 15:31:20 -0000 Yes, sorry for being sloppy. Brian On Oct 1, 2013, at 11:29 AM, Stephen Kent wrote: > Brian, >=20 >> There are two ways proposed. >>=20 >> One is to use X.509 certs, or something like them. The cert has the = public key of the signing authority, and that cert is signed by the = national database operator's well known key. > just to maintain technical accuracy, the database operator would use = it's private > key to sign a cert; the well-known key is it's public key. >=20 > Steve From jon.peterson@neustar.biz Tue Oct 1 09:24:40 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8207C21E8085 for ; Tue, 1 Oct 2013 09:24:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.488 X-Spam-Level: X-Spam-Status: No, score=-106.488 tagged_above=-999 required=5 tests=[AWL=0.111, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3VftB7M-4+WI for ; Tue, 1 Oct 2013 09:24:36 -0700 (PDT) Received: from neustar.com (smartmail.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id 60D0721E81E9 for ; Tue, 1 Oct 2013 09:24:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1380644678; x=1696002852; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=Kd2ddsspTA ha+blLlpJX6rSQW8uC7PczyNdJw4muUlw=; b=rBYe4brFUijYNDhBGTTGI59MZS ZtcmSwT5vdmEiu4NDDHWGvHgjifm3L8a7by00qWs4jBe7lUi//g5UjFbjgmQ== Received: from ([10.31.58.69]) by chihiron2.nc.neustar.com with ESMTP with TLS id J041123125.26414067; Tue, 01 Oct 2013 12:24:36 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc10.cis.neustar.com ([169.254.4.132]) with mapi id 14.02.0342.003; Tue, 1 Oct 2013 12:24:19 -0400 From: "Peterson, Jon" To: Alex Bobotek , Richard Shockey , "'DOLLY, MARTIN C'" , 'Robert Sparks' Thread-Topic: [stir] draft-peterson-stir-threats-00.txt Thread-Index: AQHOtke3HwmPRFz400C8kKhclM/vrZnYxtOAgAABooCABgdXgIAAAv8AgAA1+gCAAEHPAIAAm+iA Date: Tue, 1 Oct 2013 16:24:18 +0000 Message-ID: In-Reply-To: <4B1956260CD29F4A9622F00322FE05319381A907BE@BOBO1A.bobotek.net> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.0] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: RcpB9q6ENIR6uz8OlqpnKg== Content-Type: text/plain; charset="us-ascii" Content-ID: <27B577901F427542A5555FF1B21C14B2@neustar.biz> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "stir@ietf.org" Subject: Re: [stir] draft-peterson-stir-threats-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 16:24:40 -0000 Thanks for these notes, Alex. Some responses below. >Here are several comments that should feed into the IETF Peterson draft: > >* Remove any assumptions that the solution cannot be in-network [IMO, >both endpoint and in-network solutions should be facilitated] Agreed that both in-band and out-of-band solutions can usually be implemented in either endpoints or in intermediaries of various kinds. If I see text that implies otherwise, I'll certainly change it. >* Add a sessionless attack scenario. A spam payload may be carried in a >SIP INVITE or MESSAGE, which might contain stock market advice even in a >display name field. These attacks do NOT require session establishment. >More generally, we should be mindful of the fact that SIP is used in >telephony form more than voice session setup. Probably if we were going to include a sessionless attack scenario, it would be with regular text messages (whether carried on the PSTN over TCAP or with some Internet protocol, including MESSAGE) rather than with an INVITE, which typically wouldn't result in a payload being immediately rendered to a user. More on this below with your suggested text. >Here's some suggested markup: > > >1. Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with: > >The primary attack vector is > therefore one where the attacker contrives for the calling telephone > number in signaling to be a particular chosen number that the > attacker does not have the authority to call from. What you want here is to remove the implication that the number will be rendered on the terminating side? While there are some attacks where that isn't significant, perhaps, I would say it is significant in the primary attack vectors that concern us. >2. Replace 3rd paragraph of 2.1 Endpoints with: > > Smart devices are generally based on computers with some degree of >programmability, the capacity to access the Internet, and capabilities of >rendering text, audio and/or images. This includes smart phones, >telephone applications on desktop and laptop computers, IP private branch >exchanges, and so on. I can add the notion that smart devices can render text, audio and/or images as you suggest. >3. Add to 3.3 Attack Scenarios: > > Impersonation, IP-Mobile Text Message > > An attacker with an computer sends a high volume of SIP MESSAGE spam >message to IP-enabled smart phones using randomized calling party >numbers. =20 > > Countermeasure: in-band authenticated identity Provided we're talking about end-to-end SIP use of MESSAGE, agreed that in-band would be the right countermeasure. I am curious though whether practically speaking there is enough use of MESSAGE in this fashion that we're actually seeing high-volume spam over MESSAGE today. Either way, no problem having an attack scenario of this form in the document. Jon Peterson Neustar, Inc. >Regards, > >Alex > >> -----Original Message----- >> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >> Richard Shockey >> Sent: Monday, September 30, 2013 1:11 PM >> To: 'DOLLY, MARTIN C'; 'Robert Sparks' >> Cc: stir@ietf.org >> Subject: Re: [stir] draft-peterson-stir-threats-00.txt >>=20 >> +1 >>=20 >> -----Original Message----- >> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >> DOLLY, MARTIN C >> Sent: Monday, September 30, 2013 12:58 PM >> To: Robert Sparks >> Cc: stir@ietf.org >> Subject: Re: [stir] draft-peterson-stir-threats-00.txt >>=20 >> Yes, ok >>=20 >> Martin Dolly >> Lead Member of Technical Staff >> Core Network & Gov't/Regulatory Standards AT&T Labs - Network >> Technology >> +1-609-903-3360 >> md3135@att.com >>=20 >> > On Sep 30, 2013, at 12:47 PM, "Robert Sparks" >> wrote: >> > >> >> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote: >> >> With Hadriel comments incorporated, it is a start >> > Hi Martin - >> > >> > Just to make sure - I think you're referring to Hadriel's comments on >> > the >> problem statement document? >> > I don't think Hadriel's commented directly on stir-threats yet. >> > >> > In any case, we _are_ talking about a starting place, not a finished >> product. >> > >> > If there's no other objection, I'd like to get Jon to submit the >> > threats >> document as a WG -00 as soon as it's convenient. >> > >> > RjS >> >> >> >> -----Original Message----- >> >> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >> >> Of Russ Housley >> >> Sent: Thursday, September 26, 2013 4:37 PM >> >> To: IETF STIR Mail List >> >> Subject: Re: [stir] draft-peterson-stir-threats-00.txt >> >> >> >> It has been six days, I'd like to hear from more people about this >> document. Martin asked for an additional week, so I'm sure we will hear >> from him soon. >> >> >> >> Russ >> >> >> >> >> >>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote: >> >>> >> >>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt >> >>> >> >>> Should the working group adopt this I-D as the starting point for >> >>> the >> STIR threat docuent? >> >>> >> >>> Russ >> >> _______________________________________________ >> >> stir mailing list >> >> stir@ietf.org >> >> https://www.ietf.org/mailman/listinfo/stir >> > >> > _______________________________________________ >> > stir mailing list >> > stir@ietf.org >> > https://www.ietf.org/mailman/listinfo/stir >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From br@brianrosen.net Tue Oct 1 09:29:10 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 972E721E80C7 for ; Tue, 1 Oct 2013 09:29:10 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.55 X-Spam-Level: X-Spam-Status: No, score=-103.55 tagged_above=-999 required=5 tests=[AWL=0.049, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nQGWpjlCARu2 for ; Tue, 1 Oct 2013 09:29:05 -0700 (PDT) Received: from mail-qc0-f172.google.com (mail-qc0-f172.google.com [209.85.216.172]) by ietfa.amsl.com (Postfix) with ESMTP id CAF5211E8169 for ; Tue, 1 Oct 2013 09:28:59 -0700 (PDT) Received: by mail-qc0-f172.google.com with SMTP id l13so4944003qcy.3 for ; Tue, 01 Oct 2013 09:28:59 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=7PfpNvEDHCDmrn5f54FR751XRS45Lm1veD9o9hJ70Ec=; b=SN+bnx5UMi25iA9ppGoUHGrNJ9MPi1Wna/Y6GufMEojFxQy03IHRAb85pEFa2rwuhb mdaDEPEBJbHIW3M7cmTme+NMNev/+P8wZ90kFKVNgn/EHVoR8BOGC1DwvTuoCSHLJHPL D6cMtz/XXYXCYJK25ZJwFIlQ38vs6Jc0Zw2yENfsEkKGnu54HhWB3yv9FnBRrUJ/PvkG x6VxnaU7CSed3Ob0iueyGNBVfCdxcqr4G0zaYC1b3uwSxNBGVoqWk4UjNCNWa2Li5DVm KK30k/4mX1szCBbOEsaDhasQW/YQIv1n/hOpv39NKRlLPOZw1XRBqTcgMFd1oQG4/q61 QEOw== X-Gm-Message-State: ALoCoQkUysccm4Hd5GqZYnv8B89gI/BZR1R+FbdE/Y5XC6VuLQDBCF3R6Yn+Rh53HekvKGsBjU1R X-Received: by 10.224.22.202 with SMTP id o10mr2616658qab.117.1380644939169; Tue, 01 Oct 2013 09:28:59 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id g2sm15149327qaf.12.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 01 Oct 2013 09:28:57 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Brian Rosen In-Reply-To: Date: Tue, 1 Oct 2013 12:28:56 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: References: To: "Peterson, Jon" X-Mailer: Apple Mail (2.1508) Cc: "stir@ietf.org" , Alex Bobotek , 'Robert Sparks' , "'DOLLY, MARTIN C'" , Richard Shockey Subject: Re: [stir] draft-peterson-stir-threats-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 16:29:10 -0000 Don't think there is much MESSAGE. MSRP is about all we see, and XMPP = is more likely than that. Brian On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" = wrote: > Thanks for these notes, Alex. Some responses below. >=20 >> Here are several comments that should feed into the IETF Peterson = draft: >>=20 >> * Remove any assumptions that the solution cannot be in-network = [IMO, >> both endpoint and in-network solutions should be facilitated] >=20 > Agreed that both in-band and out-of-band solutions can usually be > implemented in either endpoints or in intermediaries of various kinds. = If > I see text that implies otherwise, I'll certainly change it. >=20 >> * Add a sessionless attack scenario. A spam payload may be = carried in a >> SIP INVITE or MESSAGE, which might contain stock market advice even = in a >> display name field. These attacks do NOT require session = establishment. >> More generally, we should be mindful of the fact that SIP is used in >> telephony form more than voice session setup. >=20 > Probably if we were going to include a sessionless attack scenario, it > would be with regular text messages (whether carried on the PSTN over = TCAP > or with some Internet protocol, including MESSAGE) rather than with an > INVITE, which typically wouldn't result in a payload being immediately > rendered to a user. More on this below with your suggested text. >=20 >> Here's some suggested markup: >>=20 >>=20 >> 1. Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with: >>=20 >> The primary attack vector is >> therefore one where the attacker contrives for the calling telephone >> number in signaling to be a particular chosen number that the >> attacker does not have the authority to call from. >=20 > What you want here is to remove the implication that the number will = be > rendered on the terminating side? While there are some attacks where = that > isn't significant, perhaps, I would say it is significant in the = primary > attack vectors that concern us. >=20 >> 2. Replace 3rd paragraph of 2.1 Endpoints with: >>=20 >> Smart devices are generally based on computers with some degree = of >> programmability, the capacity to access the Internet, and = capabilities of >> rendering text, audio and/or images. This includes smart phones, >> telephone applications on desktop and laptop computers, IP private = branch >> exchanges, and so on. >=20 > I can add the notion that smart devices can render text, audio and/or > images as you suggest. >=20 >> 3. Add to 3.3 Attack Scenarios: >>=20 >> Impersonation, IP-Mobile Text Message >>=20 >> An attacker with an computer sends a high volume of SIP MESSAGE = spam >> message to IP-enabled smart phones using randomized calling party >> numbers. =20 >>=20 >> Countermeasure: in-band authenticated identity >=20 > Provided we're talking about end-to-end SIP use of MESSAGE, agreed = that > in-band would be the right countermeasure. I am curious though whether > practically speaking there is enough use of MESSAGE in this fashion = that > we're actually seeing high-volume spam over MESSAGE today. Either way, = no > problem having an attack scenario of this form in the document. >=20 > Jon Peterson > Neustar, Inc. >=20 >> Regards, >>=20 >> Alex >>=20 >>> -----Original Message----- >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf = Of >>> Richard Shockey >>> Sent: Monday, September 30, 2013 1:11 PM >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks' >>> Cc: stir@ietf.org >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt >>>=20 >>> +1 >>>=20 >>> -----Original Message----- >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf = Of >>> DOLLY, MARTIN C >>> Sent: Monday, September 30, 2013 12:58 PM >>> To: Robert Sparks >>> Cc: stir@ietf.org >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt >>>=20 >>> Yes, ok >>>=20 >>> Martin Dolly >>> Lead Member of Technical Staff >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network >>> Technology >>> +1-609-903-3360 >>> md3135@att.com >>>=20 >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks" = >>> wrote: >>>>=20 >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote: >>>>> With Hadriel comments incorporated, it is a start >>>> Hi Martin - >>>>=20 >>>> Just to make sure - I think you're referring to Hadriel's comments = on >>>> the >>> problem statement document? >>>> I don't think Hadriel's commented directly on stir-threats yet. >>>>=20 >>>> In any case, we _are_ talking about a starting place, not a = finished >>> product. >>>>=20 >>>> If there's no other objection, I'd like to get Jon to submit the >>>> threats >>> document as a WG -00 as soon as it's convenient. >>>>=20 >>>> RjS >>>>>=20 >>>>> -----Original Message----- >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>> Of Russ Housley >>>>> Sent: Thursday, September 26, 2013 4:37 PM >>>>> To: IETF STIR Mail List >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt >>>>>=20 >>>>> It has been six days, I'd like to hear from more people about this >>> document. Martin asked for an additional week, so I'm sure we will = hear >>> from him soon. >>>>>=20 >>>>> Russ >>>>>=20 >>>>>=20 >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote: >>>>>>=20 >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt >>>>>>=20 >>>>>> Should the working group adopt this I-D as the starting point for >>>>>> the >>> STIR threat docuent? >>>>>>=20 >>>>>> Russ >>>>> _______________________________________________ >>>>> stir mailing list >>>>> stir@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/stir >>>>=20 >>>> _______________________________________________ >>>> stir mailing list >>>> stir@ietf.org >>>> https://www.ietf.org/mailman/listinfo/stir >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From brian.rosen@neustar.biz Tue Oct 1 10:01:25 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4235711E8169 for ; Tue, 1 Oct 2013 10:01:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -6.599 X-Spam-Level: X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tpL6sRL5LlTy for ; Tue, 1 Oct 2013 10:01:21 -0700 (PDT) Received: from neustar.com (smartmail.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id A178511E81AD for ; Tue, 1 Oct 2013 10:01:20 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1380646824; x=1695995823; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=ov0XiXCQ0i ps+jIVRPl6aICPxNRVeHIXDGFsobQ9u7Y=; b=W0PxPoNCNXslvMcokd+fwrL0F8 xoN/y4e2MhYIKPW/FtzSJL0GpZg2HaF82LEi486QKEtoeQT0pNRk4HgswSkw== Received: from ([10.31.58.69]) by chihiron1.nc.neustar.com with ESMTP with TLS id J041123128.25330918; Tue, 01 Oct 2013 13:00:22 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc10.cis.neustar.com ([169.254.4.132]) with mapi id 14.02.0342.003; Tue, 1 Oct 2013 13:01:12 -0400 From: "Rosen, Brian" To: "stir@ietf.org List" Thread-Topic: Comments on draft-peterson-stir-threats-00 Thread-Index: AQHOvsfUbiPUZPEZSU6y5TDfiZrobQ== Date: Tue, 1 Oct 2013 17:01:12 +0000 Message-ID: <01F04E36-C5F8-4DF4-A575-21290E7E7ED8@neustar.biz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.33.193.37] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: iKEWtx/Hw1sbEsvRx5PyCQ== Content-Type: text/plain; charset="us-ascii" Content-ID: <531589B15527F6428AA009F4DB61F598@neustar.biz> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: [stir] Comments on draft-peterson-stir-threats-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 17:01:25 -0000 I think this document is a very good start as a threat analysis and should = be adopted by the work group. In the Introduction, I think the most stark example of these attacks is swa= tting, where the caller impersonates a victim and causes a massive law enfo= rcement action without any real basis. There is a paragraph that talks about post set-up changes. It's correct th= at we don't consider them, but the way SIP works, any INVITE (say from a br= idge) could be protected. Do you want to at least reference cnit? Maybe just as "further work will b= e needed". In Attackers, I'm not sure I understand an attacker that observes but does = not replay. We are not encrypting anything, so observation will always be = possible. The voicemail hack would require a replay to be successful (if i= t were possible) unless they had the keys. When you talk about not including intermediaries as attackers, perhaps it w= ould be good to explain in the intro that we don't consider service provide= rs to be directly participating, but we do see some of them turning a blind= eye to bad things their customers are doing. We're not assuming the servi= ce providers are the attackers, but we are assuming some of them are indire= ctly complicit. In Voicemail Attacks, I got lost in the paragraph beginning "If the voicema= il service could know ahead of time that it should always expect authentica= ted identity.." I'm not sure what it's trying to say and wonder if it coul= d be deleted without losing anything important. In Commercial impersonation Attacks, I am bothered by the sentence "If ther= e were a directory that could inform the terminating side of that fact, how= ever, that would help in the robocalling case." I have no idea what direct= ory that is referring to, and ISTM that you can rarely assure you can ALWAY= S get authenticated identity from a given TN. I guess you mean the out of = band directory, but that would depend on the called party having credential= s, so there is at least some qualification needed. I'd like the swatting case documented. I can send text if desired. In IP-PSTN attack scenario, if we did adopt some of the ideas in Hadriel's = proposal, we might get the in band solution to work with IP-PSTN GWs. I al= so want to get the notion that if there is an intermediary on the IP side, = including the IP-PSTN GW, it could validate. Isn't it a stretch to say that the out of band mechanism could work for a P= STN-PSTN connection? It assumes an Internet-aware origination (device or s= ervice) with both IP and PSTN connectivity. That would not cover any existi= ng device or service, so you are talking about an upgraded service that did= not also upgrade to SIP origination. Possible, sure, but worth documentin= g? Dunno. IP-PSTN-IP - same comments as IP-PSTN Brian= From michael.hammer@yaanatech.com Tue Oct 1 10:32:35 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CEA5B21E812C for ; Tue, 1 Oct 2013 10:32:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.38 X-Spam-Level: X-Spam-Status: No, score=-2.38 tagged_above=-999 required=5 tests=[AWL=0.219, BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pOZ84tkmlLuH for ; Tue, 1 Oct 2013 10:32:31 -0700 (PDT) Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id 5121221E81BA for ; Tue, 1 Oct 2013 10:32:31 -0700 (PDT) Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Tue, 1 Oct 2013 10:32:31 -0700 From: Michael Hammer To: "Brian.Rosen@neustar.biz" , "stir@ietf.org" Thread-Topic: Comments on draft-peterson-stir-threats-00 Thread-Index: AQHOvsfUbiPUZPEZSU6y5TDfiZrobZngGqcw Date: Tue, 1 Oct 2013 17:32:30 +0000 Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEE01EE@sc9-ex2k10mb1.corp.yaanatech.com> References: <01F04E36-C5F8-4DF4-A575-21290E7E7ED8@neustar.biz> In-Reply-To: <01F04E36-C5F8-4DF4-A575-21290E7E7ED8@neustar.biz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.17.100.36] Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_00DA_01CEBEAA.ACAEAED0" MIME-Version: 1.0 Subject: Re: [stir] Comments on draft-peterson-stir-threats-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 17:32:35 -0000 ------=_NextPart_000_00DA_01CEBEAA.ACAEAED0 Content-Type: text/plain; charset="US-ASCII" Content-Transfer-Encoding: 7bit sentence "If there were a directory that could inform... This sounds like it is getting into solutions. Better to not go there in a definition of the threats. Mike -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Rosen, Brian Sent: Tuesday, October 01, 2013 1:01 PM To: stir@ietf.org List Subject: [stir] Comments on draft-peterson-stir-threats-00 I think this document is a very good start as a threat analysis and should be adopted by the work group. In the Introduction, I think the most stark example of these attacks is swatting, where the caller impersonates a victim and causes a massive law enforcement action without any real basis. There is a paragraph that talks about post set-up changes. It's correct that we don't consider them, but the way SIP works, any INVITE (say from a bridge) could be protected. Do you want to at least reference cnit? Maybe just as "further work will be needed". In Attackers, I'm not sure I understand an attacker that observes but does not replay. We are not encrypting anything, so observation will always be possible. The voicemail hack would require a replay to be successful (if it were possible) unless they had the keys. When you talk about not including intermediaries as attackers, perhaps it would be good to explain in the intro that we don't consider service providers to be directly participating, but we do see some of them turning a blind eye to bad things their customers are doing. We're not assuming the service providers are the attackers, but we are assuming some of them are indirectly complicit. In Voicemail Attacks, I got lost in the paragraph beginning "If the voicemail service could know ahead of time that it should always expect authenticated identity.." I'm not sure what it's trying to say and wonder if it could be deleted without losing anything important. In Commercial impersonation Attacks, I am bothered by the sentence "If there were a directory that could inform the terminating side of that fact, however, that would help in the robocalling case." I have no idea what directory that is referring to, and ISTM that you can rarely assure you can ALWAYS get authenticated identity from a given TN. I guess you mean the out of band directory, but that would depend on the called party having credentials, so there is at least some qualification needed. I'd like the swatting case documented. I can send text if desired. In IP-PSTN attack scenario, if we did adopt some of the ideas in Hadriel's proposal, we might get the in band solution to work with IP-PSTN GWs. I also want to get the notion that if there is an intermediary on the IP side, including the IP-PSTN GW, it could validate. Isn't it a stretch to say that the out of band mechanism could work for a PSTN-PSTN connection? It assumes an Internet-aware origination (device or service) with both IP and PSTN connectivity. That would not cover any existing device or service, so you are talking about an upgraded service that did not also upgrade to SIP origination. Possible, sure, but worth documenting? Dunno. IP-PSTN-IP - same comments as IP-PSTN Brian _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir ------=_NextPart_000_00DA_01CEBEAA.ACAEAED0 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIRPzCCBBow ggMCAhEAi1t1VoRUhQsAz684SM6xpDANBgkqhkiG9w0BAQUFADCByjELMAkGA1UEBhMCVVMxFzAV BgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTow OAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5 MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24g QXV0aG9yaXR5IC0gRzMwHhcNOTkxMDAxMDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDd hNS5tPmn2PMEeJzePdxsExbZet0kUWbAxyZZDawGCMKU0TMf8IM1H24byN6qbhVOVCfvxG0a7Avj DvBEpVfHQFgeo0cfcexg9m2UyBg57f5CGFbf5ExJEHhOAXY1YxI23Wa8AQQ2o1Vo1aI2CayrISZU Bq0/yhTgrMqtBh2V4vid8eBg/8J/dStMzNr+h5kh6rr+PlTX0ll42zxuz6ATABq4J6HkvmeWyqDF s5zdyXWe6zCaX6PN2a54GT8j6VzbKb2tVcgbVIxj9uim6sc3ElyjKR4C2dsfO7TXD1ZHgRUESq+D J9HFWIjB3faqp6MY2miqbRFR4b9la5+WdtE9AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAKtmjdez useatuZV0AXxnzGNWqrZqkYmD3Htpa1TVmIBRypE6f4/dAsTm7n0TRuy0V+yttKIXLOfzcvUp9lg lYQ6+ME3HWHK57DF5ZHaVKasMYGul97NCKy4wJeAf25ypOdpE5VlH8STPP15jwTUPk/q957OzWd8 T2UC/5GFVHPH/zb3hi3s0F5P/xGfcgbWuBrxTA0mZeJEgB7Hn+Pd6Ara7KUggGlooU9+4WvPB0H6 g468ON2wLhGxa7JCzJq8+UgieUoZD7IcPiB02WrDvvIoeBNWeU9tUOobsLVXsTdmWCPz3A/fCofE 74YF1TgUYJmjS94GlnEs8tu2H6TvP+4wggZCMIIFKqADAgECAhA4qwAv/66Wt1b/OVr7XecbMA0G CSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAd BgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNz IDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzAeFw0xMTA5MDEw MDAwMDBaFw0yMTA4MzEyMzU5NTlaMIGmMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMg Q29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxHjAcBgNVBAsTFVBl cnNvbmEgTm90IFZhbGlkYXRlZDE3MDUGA1UEAxMuU3ltYW50ZWMgQ2xhc3MgMSBJbmRpdmlkdWFs IFN1YnNjcmliZXIgQ0EgLSBHNDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbsJ/0d Y/Q7HYrB0xzIyIKGtrhKhpKqgVxyyjANL55BIlcwISWQmqP0rCrGiBeGYXITdi7sA8snm48ggDfg 5IraVaZQD/y5XCNpiUKhuh+v7w75pMkK8fg3ssbZkkqufd+4RB+buj+MBv7YI09IUSNqYISo7icv YN+W8hoqjDyPAMxPy/ogjrw19uHwmrYF8/wdP8YUew7a8gXk04MCpsVpcLSp5Fbp2x1c9KY24mu1 Hiot3L677joEsDAIrV9obMa9BpaIhOfmqWQtvDgwu4gmw2dmZrS0d/nAoccOcu9m4uW5yuDzhXc1 mN7UHLD+ZnHiOMtufE9AVeuX2agYHu0CAwEAAaOCAkQwggJAMDgGCCsGAQUFBwEBBCwwKjAoBggr BgEFBQcwAYYcaHR0cDovL3BraS1vY3NwLnZlcmlzaWduLmNvbTASBgNVHRMBAf8ECDAGAQH/AgEA MGwGA1UdIARlMGMwYQYLYIZIAYb4RQEHFwEwUjAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5zeW1h dXRoLmNvbS9jcHMwKAYIKwYBBQUHAgIwHBoaaHR0cDovL3d3dy5zeW1hdXRoLmNvbS9ycGEwNAYD VR0fBC0wKzApoCegJYYjaHR0cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMS1nMy5jcmwwDgYDVR0P AQH/BAQDAgEGMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFWZXJpU2lnbk1QS0ktMi05NzAdBgNV HQ4EFgQUrfnDk3IttbkoYeSk12DVxApeGgEwgfEGA1UdIwSB6TCB5qGB0KSBzTCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzOCEQCLW3VWhFSFCwDPrzhIzrGkMA0GCSqGSIb3DQEBBQUA A4IBAQDWj8Ham4jys2xNH1gvugFRXXTBRujDuHuf1kDx7/8yuolrwA40Q5+kmeak8F1IM2KFhWH+ I4gijGCbK5xlSZTEojgkSKVcpVBLaOliIqeT6Jkibj1buxBCDh9MdUc0VgmP+L2MPPNcu9KWcFRw Yk3v0RC+nUgsXuyGaweC8D3hJScoLOAWdh6z/eViltKKPV8rrvtcwhO3ZWPLNHZDn9aHmaturZXB AD9GJ4H/Nd4jDkPcFF8y+cop78JSMPWZ3bmB+DolII2CaPK5IYV0ZgThhjkWMvIt1iqoyd7ZAAJP 4xggxaWBVraV3tOCrfh7Jb5kfC6gunAs+Pl14nRNB22EMIIG1zCCBb+gAwIBAgIQEB3dROkPDT0Q 6QYEc74tcjANBgkqhkiG9w0BAQUFADCBpjELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVj IENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQ ZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMTLlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVh bCBTdWJzY3JpYmVyIENBIC0gRzQwHhcNMTMwNDAxMDAwMDAwWhcNMTQwNDAyMjM1OTU5WjCBzjEu MCwGA1UEAwwlUGVyc29uYSBOb3QgVmFsaWRhdGVkIC0gMTM2NDg0MjY5NDQ0MzErMCkGCSqGSIb3 DQEJARYcbWljaGFlbC5oYW1tZXJAeWFhbmF0ZWNoLmNvbTEPMA0GA1UECwwGUy9NSU1FMR4wHAYD VQQLDBVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxHzAdBgNVBAsMFlN5bWFudGVjIFRydXN0IE5ldHdv cmsxHTAbBgNVBAoMFFN5bWFudGVjIENvcnBvcmF0aW9uMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAh2AtKQNowI8ILmNvdcY16moA8CH7hjSvGDNofwWsh4quEfZ6VQGtDhhOjUmW6JVq 719MH8FNJcVr8oAiVaK3nNeJTL2wO68LpgX6tcZ/z22pJoz98wHzgfWf3pfEUYrCqYg2V3m6oe0t kd+OaeY8DmPVSpG7as0rkoEzeNwCtmpYjkm96mBO6/AQwsowSLbSuqkEGykp1k47KiPBtxhbp2um IReh94vPrr1O9zXau9oGMvABJjigYQ2e5AhhhDdK8qOkhgkMAJN2nvLqY+VFrnFIsb5noQ/tP2M/ ct9qwRZ5kUaumRqE/XzV3rH8PoacZW/YvcwAp8Gr1ZaHCMRl+wIDAQABo4IC1TCCAtEwDAYDVR0T AQH/BAIwADAOBgNVHQ8BAf8EBAMCBaAwIAYDVR0lAQH/BBYwFAYIKwYBBQUHAwQGCCsGAQUFBwMC MB0GA1UdDgQWBBTlvYUx4PMlUy6uvceJkDMK4jBDZjAnBgNVHREEIDAegRxtaWNoYWVsLmhhbW1l ckB5YWFuYXRlY2guY29tMB8GA1UdIwQYMBaAFK35w5NyLbW5KGHkpNdg1cQKXhoBMIIBKwYIKwYB BQUHAQEEggEdMIIBGTCCARUGCCsGAQUFBzAChoIBB2xkYXA6Ly9kaXJlY3RvcnkudmVyaXNpZ24u Y29tL0NOJTIwJTNEJTIwU3ltYW50ZWMlMjBDbGFzcyUyMDElMjBJbmRpdmlkdWFsJTIwU3Vic2Ny aWJlciUyMENBJTIwLSUyMEc0JTJDJTIwT1UlMjAlM0QlMjBQZXJzb25hJTIwTm90JTIwVmFsaWRh dGVkJTJDJTIwT1UlMjAlM0QlMjBTeW1hbnRlYyUyMFRydXN0JTIwTmV0d29yayUyQyUyME8lMjAl M0QlMjBTeW1hbnRlYyUyMENvcnBvcmF0aW9uJTJDJTIwQyUyMCUzRCUyMFVTP2NBQ2VydGlmaWNh dGU7YmluYXJ5MF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9wa2ktY3JsLnN5bWF1dGguY29tL2Nh XzU2MWMxMDM2OTBjOTdhNjkyNDdhMGVmMDcxYWM4MWFmL0xhdGVzdENSTC5jcmwwbAYDVR0gBGUw YzBhBgtghkgBhvhFAQcXATBSMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LnN5bWF1dGguY29tL2Nw czAoBggrBgEFBQcCAjAcGhpodHRwOi8vd3d3LnN5bWF1dGguY29tL3JwYTAqBgpghkgBhvhFARAD BBwwGgYRYIZIAYb4RQEQAQICBAGGsxcWBTEwOTIyMA0GCSqGSIb3DQEBBQUAA4IBAQAae/er4pfB TpqK6c/uJ9D8dVJzzNX26akkB8z/29totzbkpFAIlXRh02iNVK+GnsgS1gwu3FOvjgT5M4i+cNxD vTJVcnZNXns75JUGX3UsWQbtSySrVzQx8lMtwW6nXHM5GlEaY8/jKVpambG2q9OHjmwMTz7I4A+y KiiGCGdhE23dFOvku6t/oiwqFnXJmb4o75kbVevKEOd34MIj0P7Q8+1mZcNYEUTYKadoPXFyTWnO 2HTMvFcGgdLFKcqb13clWeW3/B5WjdBimpMjbvwi8ZbrhFdp7Y3NLKFSRH8W29rt0LW7zULxii0z 34NGsBkW9w95PLzTsqmKD4Yv5AkIMYIEkjCCBI4CAQEwgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYD VQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29y azEeMBwGA1UECxMVUGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFz cyAxIEluZGl2aWR1YWwgU3Vic2NyaWJlciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMAkGBSsO AwIaBQCgggKrMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEzMTAw MTE3MzIyOVowIwYJKoZIhvcNAQkEMRYEFJaW1pFiNRjw0d1461GUugYJILozMIGrBgkqhkiG9w0B CQ8xgZ0wgZowCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBFjAKBggqhkiG9w0DBzALBglghkgBZQME AQIwDgYIKoZIhvcNAwICAgCAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgFAMA0GCCqGSIb3DQMCAgEo MAcGBSsOAwIaMAsGCWCGSAFlAwQCAzALBglghkgBZQMEAgIwCwYJYIZIAWUDBAIBMIHMBgkrBgEE AYI3EAQxgb4wgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlv bjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEeMBwGA1UECxMVUGVyc29uYSBOb3Qg VmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2NyaWJl ciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMIHOBgsqhkiG9w0BCRACCzGBvqCBuzCBpjELMAkG A1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRl YyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMT LlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVhbCBTdWJzY3JpYmVyIENBIC0gRzQCEBAd3UTpDw09 EOkGBHO+LXIwDQYJKoZIhvcNAQEBBQAEggEAJx/E5qL9muOeGmhhjw9xdi9J25ffrhkNfj1+DtFH BCcBrzGfeCVsSamQpCYvlAji2cC/7SKydI20Fib2qZSgoW8vAkMCcbrxWg/Y8q3s40wSTRgDZq+S RGFTwdKCyD6V+3KoDP41ANVdizPdb8vQZn0gCuObd1r/xglqKul8KZAdKlSV4VyL5HM5GSjuWyGZ XmXuTBtjWxRMFis1YGwIE3gVsZFkXwXEeZOOn6xGQA8PO8z53XFKw7VsR39KcvW1LE/IV18pkxBN SUGmMac3lN1ffv+dfuiQxLeiY2Aa0AZO4KCbr1fkUJ9QNgBKan2AmDmrLszGxCYW3l0HnrhCpAAA AAAAAA== ------=_NextPart_000_00DA_01CEBEAA.ACAEAED0-- From alex@bobotek.net Tue Oct 1 10:50:15 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BDB1111E8153 for ; Tue, 1 Oct 2013 10:50:15 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.437 X-Spam-Level: X-Spam-Status: No, score=-0.437 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611, RDNS_NONE=0.1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8RDDTyfnaevV for ; Tue, 1 Oct 2013 10:50:10 -0700 (PDT) Received: from qmta03.emeryville.ca.mail.comcast.net (qmta03.emeryville.ca.mail.comcast.net [IPv6:2001:558:fe2d:43:76:96:30:32]) by ietfa.amsl.com (Postfix) with ESMTP id 6C7DD21E805F for ; Tue, 1 Oct 2013 10:50:07 -0700 (PDT) Received: from omta17.emeryville.ca.mail.comcast.net ([76.96.30.73]) by qmta03.emeryville.ca.mail.comcast.net with comcast id XrjJ1m00D1afHeLA3tq7US; Tue, 01 Oct 2013 17:50:07 +0000 Received: from BOBO1A.bobotek.net ([76.22.113.196]) by omta17.emeryville.ca.mail.comcast.net with comcast id Xtq51m00W4EJ4tY8dtq607; Tue, 01 Oct 2013 17:50:07 +0000 Received: from BOBO1A.bobotek.net ([fe80::4851:b4bb:416a:e1ad]) by BOBO1A.bobotek.net ([fe80::4851:b4bb:416a:e1ad%10]) with mapi; Tue, 1 Oct 2013 10:39:12 -0700 From: Alex Bobotek To: Brian Rosen , "Peterson, Jon" Date: Tue, 1 Oct 2013 10:39:10 -0700 Thread-Topic: [stir] draft-peterson-stir-threats-00.txt Thread-Index: Ac6+wdghvLotw655QCep/ayjVx7fdAADBdpg Message-ID: <4B1956260CD29F4A9622F00322FE05319381A907C3@BOBO1A.bobotek.net> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20121106; t=1380649807; bh=E882pmnUGtKVB6xbN1Zvqo5HDKTn15R2JZ8YLtlq54U=; h=Received:Received:Received:From:To:Date:Subject:Message-ID: Content-Type:MIME-Version; b=ZepmIAFlGWvY/rjjnLkN+luiU/SZj5fBn6e0rEWNRVF8sS8LNRE3VudlaRTN/aeMk WI001QGqqPXKy23CySFAZJkQDed9VmSGAUOeHQDqE4dIwc/ftWHxtoNDedKICaW9ae KAsIpbUUJegH6ga92TXP1cFYeVP2f4XV0MQitmqhLG1ctrAwWU+rd8cpgYxPi0jMOc F+nMxgARwuk6AxPeVsSx7JEYZgi38P2ClFC/pXDrzzXcBSUQTyrt+4KMyY/UOT4vPf 1fP+aC4iaJjV/LjoIaF70+bWkObX1cNW1yQayu0o1jvbfQNj5rKW3AjNkTfHCrtz6V BzQT22sOo6Xeg== Cc: "stir@ietf.org" , Richard Shockey , "'DOLLY, MARTIN C'" , 'Robert Sparks' Subject: Re: [stir] draft-peterson-stir-threats-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 17:50:15 -0000 The reason for considering MESSAGE is that it's the predominant transport i= n IP-based mobile text messaging (i.e., RMS). It is targeted to replace SM= S, and is also being integrated into landline telephone numbers by non-carr= iers. It's expected that >50% of phone numbers will use it a few years fro= m now as IP-based telephony replaces current technologies. =20 Similarly, SIP INVITE may carry message payload. =20 I hope this helps explain the relevance of SIP MESSAGE. Regards, Alex > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of > Brian Rosen > Sent: Tuesday, October 01, 2013 9:29 AM > To: Peterson, Jon > Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; 'DOLLY, MARTIN C'; Rich= ard > Shockey > Subject: Re: [stir] draft-peterson-stir-threats-00.txt >=20 > Don't think there is much MESSAGE. MSRP is about all we see, and XMPP is > more likely than that. >=20 > Brian >=20 > On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" > wrote: >=20 > > Thanks for these notes, Alex. Some responses below. > > > >> Here are several comments that should feed into the IETF Peterson draf= t: > >> > >> * Remove any assumptions that the solution cannot be in-network > [IMO, > >> both endpoint and in-network solutions should be facilitated] > > > > Agreed that both in-band and out-of-band solutions can usually be > > implemented in either endpoints or in intermediaries of various kinds. > > If I see text that implies otherwise, I'll certainly change it. > > > >> * Add a sessionless attack scenario. A spam payload may be carried in > a > >> SIP INVITE or MESSAGE, which might contain stock market advice even > >> in a display name field. These attacks do NOT require session > establishment. > >> More generally, we should be mindful of the fact that SIP is used in > >> telephony form more than voice session setup. > > > > Probably if we were going to include a sessionless attack scenario, it > > would be with regular text messages (whether carried on the PSTN over > > TCAP or with some Internet protocol, including MESSAGE) rather than > > with an INVITE, which typically wouldn't result in a payload being > > immediately rendered to a user. More on this below with your suggested > text. > > > >> Here's some suggested markup: > >> > >> > >> 1. Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with: > >> > >> The primary attack vector is > >> therefore one where the attacker contrives for the calling telephone > >> number in signaling to be a particular chosen number that the > >> attacker does not have the authority to call from. > > > > What you want here is to remove the implication that the number will > > be rendered on the terminating side? While there are some attacks > > where that isn't significant, perhaps, I would say it is significant > > in the primary attack vectors that concern us. > > > >> 2. Replace 3rd paragraph of 2.1 Endpoints with: > >> > >> Smart devices are generally based on computers with some degree > >> of programmability, the capacity to access the Internet, and > >> capabilities of rendering text, audio and/or images. This includes > >> smart phones, telephone applications on desktop and laptop computers, > >> IP private branch exchanges, and so on. > > > > I can add the notion that smart devices can render text, audio and/or > > images as you suggest. > > > >> 3. Add to 3.3 Attack Scenarios: > >> > >> Impersonation, IP-Mobile Text Message > >> > >> An attacker with an computer sends a high volume of SIP MESSAGE > >> spam message to IP-enabled smart phones using randomized calling > >> party numbers. > >> > >> Countermeasure: in-band authenticated identity > > > > Provided we're talking about end-to-end SIP use of MESSAGE, agreed > > that in-band would be the right countermeasure. I am curious though > > whether practically speaking there is enough use of MESSAGE in this > > fashion that we're actually seeing high-volume spam over MESSAGE > > today. Either way, no problem having an attack scenario of this form in= the > document. > > > > Jon Peterson > > Neustar, Inc. > > > >> Regards, > >> > >> Alex > >> > >>> -----Original Message----- > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf > >>> Of Richard Shockey > >>> Sent: Monday, September 30, 2013 1:11 PM > >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks' > >>> Cc: stir@ietf.org > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt > >>> > >>> +1 > >>> > >>> -----Original Message----- > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf > >>> Of DOLLY, MARTIN C > >>> Sent: Monday, September 30, 2013 12:58 PM > >>> To: Robert Sparks > >>> Cc: stir@ietf.org > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt > >>> > >>> Yes, ok > >>> > >>> Martin Dolly > >>> Lead Member of Technical Staff > >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network > >>> Technology > >>> +1-609-903-3360 > >>> md3135@att.com > >>> > >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks" > >>>> > >>> wrote: > >>>> > >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote: > >>>>> With Hadriel comments incorporated, it is a start > >>>> Hi Martin - > >>>> > >>>> Just to make sure - I think you're referring to Hadriel's comments > >>>> on the > >>> problem statement document? > >>>> I don't think Hadriel's commented directly on stir-threats yet. > >>>> > >>>> In any case, we _are_ talking about a starting place, not a > >>>> finished > >>> product. > >>>> > >>>> If there's no other objection, I'd like to get Jon to submit the > >>>> threats > >>> document as a WG -00 as soon as it's convenient. > >>>> > >>>> RjS > >>>>> > >>>>> -----Original Message----- > >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On > >>>>> Behalf Of Russ Housley > >>>>> Sent: Thursday, September 26, 2013 4:37 PM > >>>>> To: IETF STIR Mail List > >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt > >>>>> > >>>>> It has been six days, I'd like to hear from more people about this > >>> document. Martin asked for an additional week, so I'm sure we will > >>> hear from him soon. > >>>>> > >>>>> Russ > >>>>> > >>>>> > >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote: > >>>>>> > >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt > >>>>>> > >>>>>> Should the working group adopt this I-D as the starting point for > >>>>>> the > >>> STIR threat docuent? > >>>>>> > >>>>>> Russ > >>>>> _______________________________________________ > >>>>> stir mailing list > >>>>> stir@ietf.org > >>>>> https://www.ietf.org/mailman/listinfo/stir > >>>> > >>>> _______________________________________________ > >>>> stir mailing list > >>>> stir@ietf.org > >>>> https://www.ietf.org/mailman/listinfo/stir > >>> _______________________________________________ > >>> stir mailing list > >>> stir@ietf.org > >>> https://www.ietf.org/mailman/listinfo/stir > >>> > >>> _______________________________________________ > >>> stir mailing list > >>> stir@ietf.org > >>> https://www.ietf.org/mailman/listinfo/stir > >> _______________________________________________ > >> stir mailing list > >> stir@ietf.org > >> https://www.ietf.org/mailman/listinfo/stir > > > > _______________________________________________ > > stir mailing list > > stir@ietf.org > > https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From alex@bobotek.net Tue Oct 1 11:02:43 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C2A921E80C7 for ; Tue, 1 Oct 2013 11:02:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.437 X-Spam-Level: X-Spam-Status: No, score=-0.437 tagged_above=-999 required=5 tests=[AWL=-0.001, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611, HTML_MESSAGE=0.001, RDNS_NONE=0.1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AJ9Lwq9m5AG1 for ; Tue, 1 Oct 2013 11:02:32 -0700 (PDT) Received: from qmta07.emeryville.ca.mail.comcast.net (qmta07.emeryville.ca.mail.comcast.net [IPv6:2001:558:fe2d:43:76:96:30:64]) by ietfa.amsl.com (Postfix) with ESMTP id D4A8721E81BA for ; Tue, 1 Oct 2013 11:02:30 -0700 (PDT) Received: from omta11.emeryville.ca.mail.comcast.net ([76.96.30.36]) by qmta07.emeryville.ca.mail.comcast.net with comcast id Xtix1m0040mlR8UA7u2WHA; Tue, 01 Oct 2013 18:02:30 +0000 Received: from BOBO1A.bobotek.net ([76.22.113.196]) by omta11.emeryville.ca.mail.comcast.net with comcast id Xu2V1m00J4EJ4tY8Xu2VeC; Tue, 01 Oct 2013 18:02:30 +0000 Received: from BOBO1A.bobotek.net ([fe80::4851:b4bb:416a:e1ad]) by BOBO1A.bobotek.net ([fe80::4851:b4bb:416a:e1ad%10]) with mapi; Tue, 1 Oct 2013 10:51:35 -0700 From: Alex Bobotek To: Brian Rosen , "Peterson, Jon" Date: Tue, 1 Oct 2013 10:51:34 -0700 Thread-Topic: [stir] draft-peterson-stir-threats-00.txt Thread-Index: Ac6+wdghvLotw655QCep/ayjVx7fdAACqeWw Message-ID: <4B1956260CD29F4A9622F00322FE05319381A907C4@BOBO1A.bobotek.net> References: In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: acceptlanguage: en-US Content-Type: multipart/alternative; boundary="_000_4B1956260CD29F4A9622F00322FE05319381A907C4BOBO1Abobotek_" MIME-Version: 1.0 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20121106; t=1380650550; bh=60VuEPbqQu03Px9Py/VsPvUqwFXkOduhfz4KxzJ59v0=; h=Received:Received:Received:From:To:Date:Subject:Message-ID: Content-Type:MIME-Version; b=TAFk+XzJBH04uQrJlX3t0QfVyvklZo/3k6Vb2Af5/sumTiiN+ycDCUTiJqYui4+7A k9abq9IYTTlTjUhDaNgWmwe3C6B8ZQ6uhtc/0N4MPXsg60eD/IuXtMaa8TYIjUYMKM 55JMhQt0S6B7fo/Wvr1nbDYOWffnz1bF+Bx+OP/IBi35CLHsTHvZh3JSsJzzlP2yup 33u44UVdiJYNnBfMyvJJkDP6x7fJ3ujNqE2xX9vnsaQfuC3DvObF/2Wr1OkecOoefY W+h79I5PFPUxF5Q/6+D+zaGVuG31wIiO+8yizIwb/ipgJcoQ7EeayQtqlzD9jpfYDv 1+XqFUK0wTCMg== Cc: "stir@ietf.org" , Richard Shockey , "'DOLLY, MARTIN C'" , 'Robert Sparks' Subject: Re: [stir] draft-peterson-stir-threats-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 01 Oct 2013 18:02:44 -0000 --_000_4B1956260CD29F4A9622F00322FE05319381A907C4BOBO1Abobotek_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Jon, Thanks for the response. The intention in #1 below is to clarify the follo= wing sentence: The primary attack vector is therefore one where the attacker contrives for the calling telephone number in signaling to be a particular chosen number, one that the attacker does not have the authority to call from, in order for that number to be rendered on the terminating side. This might be misconstrued as indicating that the objective of spoofing is = simply the rendering of a spoofed number on the receiving display, causing = mistaken conclusions that defenses might be limited to securing the rendere= d information. No issues with leaving this as it's a valid point. Another= (increasing) motivation is to evade network and/or endpoint defenses that = may block based on CPN. So however it's worded, I think it's important to allow for both attack obj= ectives of a spoofed presentation at the endpoint and in transit. Regards, Alex > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of > Brian Rosen > Sent: Tuesday, October 01, 2013 9:29 AM > To: Peterson, Jon > Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; 'DOLLY, MARTIN C'; Rich= ard > Shockey > Subject: Re: [stir] draft-peterson-stir-threats-00.txt > > Don't think there is much MESSAGE. MSRP is about all we see, and XMPP is > more likely than that. > > Brian > > On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" > > wrote: > > > Thanks for these notes, Alex. Some responses below. > > > >> Here are several comments that should feed into the IETF Peterson draf= t: > >> > >> * Remove any assumptions that the solution cannot be in-network > [IMO, > >> both endpoint and in-network solutions should be facilitated] > > > > Agreed that both in-band and out-of-band solutions can usually be > > implemented in either endpoints or in intermediaries of various kinds. > > If I see text that implies otherwise, I'll certainly change it. > > > >> * Add a sessionless attack scenario. A spam payload may be carried = in > a > >> SIP INVITE or MESSAGE, which might contain stock market advice even > >> in a display name field. These attacks do NOT require session > establishment. > >> More generally, we should be mindful of the fact that SIP is used in > >> telephony form more than voice session setup. > > > > Probably if we were going to include a sessionless attack scenario, it > > would be with regular text messages (whether carried on the PSTN over > > TCAP or with some Internet protocol, including MESSAGE) rather than > > with an INVITE, which typically wouldn't result in a payload being > > immediately rendered to a user. More on this below with your suggested > text. > > > >> Here's some suggested markup: > >> > >> > >> 1. Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with: > >> > >> The primary attack vector is > >> therefore one where the attacker contrives for the calling telephone > >> number in signaling to be a particular chosen number that the > >> attacker does not have the authority to call from. > > > > What you want here is to remove the implication that the number will > > be rendered on the terminating side? While there are some attacks > > where that isn't significant, perhaps, I would say it is significant > > in the primary attack vectors that concern us. > > > >> 2. Replace 3rd paragraph of 2.1 Endpoints with: > >> > >> Smart devices are generally based on computers with some degree > >> of programmability, the capacity to access the Internet, and > >> capabilities of rendering text, audio and/or images. This includes > >> smart phones, telephone applications on desktop and laptop computers, > >> IP private branch exchanges, and so on. > > > > I can add the notion that smart devices can render text, audio and/or > > images as you suggest. > > > >> 3. Add to 3.3 Attack Scenarios: > >> > >> Impersonation, IP-Mobile Text Message > >> > >> An attacker with an computer sends a high volume of SIP MESSAGE > >> spam message to IP-enabled smart phones using randomized calling > >> party numbers. > >> > >> Countermeasure: in-band authenticated identity > > > > Provided we're talking about end-to-end SIP use of MESSAGE, agreed > > that in-band would be the right countermeasure. I am curious though > > whether practically speaking there is enough use of MESSAGE in this > > fashion that we're actually seeing high-volume spam over MESSAGE > > today. Either way, no problem having an attack scenario of this form in= the > document. > > > > Jon Peterson > > Neustar, Inc. > > > >> Regards, > >> > >> Alex > >> > >>> -----Original Message----- > >>> From: stir-bounces@ietf.org [mailto:sti= r-bounces@ietf.org] On Behalf > >>> Of Richard Shockey > >>> Sent: Monday, September 30, 2013 1:11 PM > >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks' > >>> Cc: stir@ietf.org > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt > >>> > >>> +1 > >>> > >>> -----Original Message----- > >>> From: stir-bounces@ietf.org [mailto:sti= r-bounces@ietf.org] On Behalf > >>> Of DOLLY, MARTIN C > >>> Sent: Monday, September 30, 2013 12:58 PM > >>> To: Robert Sparks > >>> Cc: stir@ietf.org > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt > >>> > >>> Yes, ok > >>> > >>> Martin Dolly > >>> Lead Member of Technical Staff > >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network > >>> Technology > >>> +1-609-903-3360 > >>> md3135@att.com > >>> > >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks" > >>>> > > >>> wrote: > >>>> > >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote: > >>>>> With Hadriel comments incorporated, it is a start > >>>> Hi Martin - > >>>> > >>>> Just to make sure - I think you're referring to Hadriel's comments > >>>> on the > >>> problem statement document? > >>>> I don't think Hadriel's commented directly on stir-threats yet. > >>>> > >>>> In any case, we _are_ talking about a starting place, not a > >>>> finished > >>> product. > >>>> > >>>> If there's no other objection, I'd like to get Jon to submit the > >>>> threats > >>> document as a WG -00 as soon as it's convenient. > >>>> > >>>> RjS > >>>>> > >>>>> -----Original Message----- > >>>>> From: stir-bounces@ietf.org [mailto:s= tir-bounces@ietf.org] On > >>>>> Behalf Of Russ Housley > >>>>> Sent: Thursday, September 26, 2013 4:37 PM > >>>>> To: IETF STIR Mail List > >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt > >>>>> > >>>>> It has been six days, I'd like to hear from more people about this > >>> document. Martin asked for an additional week, so I'm sure we will > >>> hear from him soon. > >>>>> > >>>>> Russ > >>>>> > >>>>> > >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote: > >>>>>> > >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt > >>>>>> > >>>>>> Should the working group adopt this I-D as the starting point for > >>>>>> the > >>> STIR threat docuent? > >>>>>> > >>>>>> Russ > >>>>> _______________________________________________ > >>>>> stir mailing list > >>>>> stir@ietf.org > >>>>> https://www.ietf.org/mailman/listinfo/stir > >>>> > >>>> _______________________________________________ > >>>> stir mailing list > >>>> stir@ietf.org > >>>> https://www.ietf.org/mailman/listinfo/stir > >>> _______________________________________________ > >>> stir mailing list > >>> stir@ietf.org > >>> https://www.ietf.org/mailman/listinfo/stir > >>> > >>> _______________________________________________ > >>> stir mailing list > >>> stir@ietf.org > >>> https://www.ietf.org/mailman/listinfo/stir > >> _______________________________________________ > >> stir mailing list > >> stir@ietf.org > >> https://www.ietf.org/mailman/listinfo/stir > > > > _______________________________________________ > > stir mailing list > > stir@ietf.org > > https://www.ietf.org/mailman/listinfo/stir > > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir --_000_4B1956260CD29F4A9622F00322FE05319381A907C4BOBO1Abobotek_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Jon,<= o:p>

 

Thanks for the response.  The intention in #1 below is to clar= ify the following sentence:

&nbs= p;

The primary attack vector is

   therefore one where the att= acker contrives for the calling telephone

   number in signaling to be a particular chosen number, one= that the

   attacker does = not have the authority to call from, in order for that

   number to be rendered on the termi= nating side

 

This might be misconstrued as indicating th= at the objective of spoofing is simply the rendering of a spoofed number on= the receiving display, causing mistaken conclusions that defenses might be= limited to securing the rendered information.  No issues with leaving= this as it’s a valid point.  Another (increasing) motivation is= to evade network and/or endpoint defenses that may block based on CPN.&nbs= p;

 

So however it’s worded, I think it’s important to a= llow for both attack objectives of a spoofed presentation at the endpoint a= nd in transit.   

&nbs= p;

Regards,

 

Alex

 

> ----= -Original Message-----

> From: stir-bounces@i= etf.org [mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October= 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; = 'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.= txt

>

> Don't = think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

>

> Brian

>

> On Oct 1, 2013, at 12:24 PM, "P= eterson, Jon" <jon.peterson@neustar.biz>

> wrote:

>

> > Thanks for these notes, Alex. = Some responses below.

> >

> >> Here are several comments that should feed into th= e IETF Peterson draft:

> >>

> >> *   Remove any assumptions that the= solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions s= hould be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can= usually be

> > implemented in either endp= oints or in intermediaries of various kinds.

>= ; > If I see text that implies otherwise, I'll certainly change it.

<= p class=3DMsoPlainText>> >

> >> *=    Add a sessionless attack scenario.  A spam payload may be= carried in

> a

&g= t; >> SIP INVITE or MESSAGE, which might contain stock market advice = even

> >> in a display name field. = ; These attacks do NOT require session

> esta= blishment.

> >> More generally, we shou= ld be mindful of the fact that SIP is used in

&g= t; >> telephony form more than voice session setup.

> >

> > Probably if we wer= e going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the = PSTN over

> > TCAP or with some Internet p= rotocol, including MESSAGE) rather than

> >= ; with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this= below with your suggested

> text.

> >

> >> Here's = some suggested markup:

> >>

> >>

> >> 1.&n= bsp;   Replace 2nd sentence of 2nd paragraph of 1.0 Introduction = with:

> >>

&= gt; >> The primary attack vector is

> &= gt;>  therefore one where the attacker contrives for the calling te= lephone

> >> number in signaling to be = a particular chosen number that the

> >>= ; attacker does not have the authority to call from.

> >

> > What you want here is t= o remove the implication that the number will

&g= t; > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, = I would say it is significant

> > in the p= rimary attack vectors that concern us.

> >=

> >> 2.  Replace 3rd paragraph of= 2.1 Endpoints with:

> >>

> >>     Smart devices are gen= erally based on computers with some degree

> = >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio a= nd/or images.  This includes

> >> = smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.=

> >

> > = I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3= .3 Attack Scenarios:

> >>

> >>       Impersonation,= IP-Mobile Text Message

> >>

> >>        An atta= cker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using random= ized calling

> >> party numbers.

> >>

> >>=        Countermeasure: in-band authenticated ident= ity

> >

> &g= t; Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeas= ure. I am curious though

> > whether pract= ically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over M= ESSAGE

> > today. Either way, no problem h= aving an attack scenario of this form in the

>= ; document.

> >

> > Jon Peterson

> > Neustar, Inc.<= /p>

> >

> >&g= t; Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From: stir-bounces@ie= tf.org [mailto:stir-bounces@ietf.org<= /a>] On Behalf

> >>> Of Richard Shoc= key

> >>> Sent: Monday, September 30= , 2013 1:11 PM

> >>> To: 'DOLLY, MAR= TIN C'; 'Robert Sparks'

> >>> Cc: stir@ietf.org

> >>= > Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> = +1

> >>>

= > >>> -----Original Message-----

>= ; >>> From: stir-bounces@ietf.org= [mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM=

> >>> To: Robert Sparks

> >>> Cc: stir@ietf.org<= /p>

> >>> Subject: Re: [stir] draft-pete= rson-stir-threats-00.txt

> >>>

> >>> Yes, ok

= > >>>

> >>> Martin Dolly=

> >>> Lead Member of Technical Staf= f

> >>> Core Network & Gov't/Reg= ulatory Standards AT&T Labs - Network

> &= gt;>> Technology

> >>> +1-609-= 903-3360

> >>> md3135@a= tt.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "R= obert Sparks"

> >>>> <rjsparks@nostrum.com>

> >>> wrote:

> >>>&g= t;

> >>>>> On 9/26/13 3:42 PM,= DOLLY, MARTIN C wrote:

> >>>>>= ; With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >&= gt;>>

> >>>> Just to make s= ure - I think you're referring to Hadriel's comments

> >>>> on the

> >>&= gt; problem statement document?

> >>>= ;> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

>= >>>> In any case, we _are_ talking about a starting place, not= a

> >>>> finished

> >>> product.

> >= ;>>>

> >>>> If there's n= o other objection, I'd like to get Jon to submit the

> >>>> threats

> >>= > document as a WG -00 as soon as it's convenient.

> >>>>

> >>>>= ; RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From: stir-bo= unces@ietf.org [mailto:stir-bounces@ietf.org= ] On

> >>>>> Behalf= Of Russ Housley

> >>>>> Sent:= Thursday, September 26, 2013 4:37 PM

> >&= gt;>>> To: IETF STIR Mail List

> >= ;>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from mo= re people about this

> >>> document.=   Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>= ;>> Russ

> >>>>>

> >>>>>

&g= t; >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote= :

> >>>>>>

> >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group ad= opt this I-D as the starting point for

> >= >>>>> the

> >>> STIR = threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _____________________________________= __________

> >>>>> stir mailin= g list

> >>>>> sti= r@ietf.org

> >>>>> = https://www.ietf.org/mailman/listinfo/sti= r

> >>>>

> >>>> _____________________________________= __________

> >>>> stir mailing li= st

> >>>> stir@ietf.o= rg

> >>>> https://www.ietf.org/mailman/listinfo/stir=

> >>> _____________________________= __________________

> >>> stir mailin= g list

> >>> stir@ietf.o= rg

> >>> https://www.ietf.org/mailman/listinfo/stir

=

> >>>

> &= gt;>> _______________________________________________

> >>> stir mailing list

= > >>> stir@ietf.org

> >>> https://www.ietf= .org/mailman/listinfo/stir

> >&= gt; _______________________________________________

> >> stir mailing list

> >>= ; stir@ietf.org

> >= > https://www.ietf.org/mailman/listinf= o/stir

> >

> > _______________________________________________

> > stir mailing list

>= ; > stir@ietf.org

>= > https://www.ietf.org/mailman/listin= fo/stir

>

> _______________________________________________

> stir mailing list

> stir@ietf.org

> https://www.ietf.org/mailman/listinfo/stir

<= /div>= --_000_4B1956260CD29F4A9622F00322FE05319381A907C4BOBO1Abobotek_-- From fmousinh@cisco.com Wed Oct 2 10:01:51 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BE06A21F9E70 for ; Wed, 2 Oct 2013 10:01:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -8.299 X-Spam-Level: X-Spam-Status: No, score=-8.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MANGLED_COMPNY=2.3, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fXqujKUrHYv2 for ; Wed, 2 Oct 2013 10:01:35 -0700 (PDT) Received: from rcdn-iport-7.cisco.com (rcdn-iport-7.cisco.com [173.37.86.78]) by ietfa.amsl.com (Postfix) with ESMTP id ECF8721F9C05 for ; Wed, 2 Oct 2013 09:59:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=15244; q=dns/txt; s=iport; t=1380733147; x=1381942747; h=from:to:cc:subject:date:message-id:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=gq+wAFmhXtv/LqVNEaVmFEfZ6lrrq4mQ7io88EpMISA=; b=UKh6fBnvYSRZ/4PLSdJh1Rry6bLLExKyvvEhmi70Ko557SEWQrcSHX44 tZ1o3+GOl3dQme/Y5qPhODe8nzudRijiLTcZ2VCwgHdUYvT6WAwvpE0Ki 9v7Pa4T52JGLdVWSgOPlc/t9toz1YU1A0tUbY/UIVTitnCH90An1zHd6U E=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AgUFALdPTFKtJXHB/2dsb2JhbABPAQYDgwc4UsEWgRgWdIIlAQEBBAEBAVYVCwwGAQgOAwEDAQEBCh0uCxQDBggCBA4FCBOHawy9CASODgEDBgWBAwYbEAcCBAuDDoEEA5QklVyDJIFoAgcXIg X-IronPort-AV: E=Sophos;i="4.90,1019,1371081600"; d="scan'208";a="267198140" Received: from rcdn-core2-6.cisco.com ([173.37.113.193]) by rcdn-iport-7.cisco.com with ESMTP; 02 Oct 2013 16:59:06 +0000 Received: from xhc-rcd-x09.cisco.com (xhc-rcd-x09.cisco.com [173.37.183.83]) by rcdn-core2-6.cisco.com (8.14.5/8.14.5) with ESMTP id r92Gx4kT009064 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Wed, 2 Oct 2013 16:59:04 GMT Received: from xmb-aln-x06.cisco.com ([169.254.1.176]) by xhc-rcd-x09.cisco.com ([173.37.183.83]) with mapi id 14.02.0318.004; Wed, 2 Oct 2013 11:59:04 -0500 From: "Fernando Mousinho (fmousinh)" To: Brian Rosen Thread-Topic: [stir] Call Center Implications Thread-Index: AQHOs6wM4w3gYleEHUa5h7lxd4Kh+JnNbOEggAAiDICAAEzNAIAADeUAgAAA5QCAAANyAP//6DzSgABb64CAE5iwgA== Date: Wed, 2 Oct 2013 16:59:04 +0000 Message-ID: <71E3420F5D11314D8D989D8B72D247E129FE2079@xmb-aln-x06.cisco.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.7.130812 x-originating-ip: [10.117.152.4] Content-Type: text/plain; charset="iso-8859-2" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "Gregory.Schumacher@sprint.com" , Richard Shockey , "stir@ietf.org" , Alex Bobotek , Michael Hammer , Henning Schulzrinne Subject: Re: [stir] Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Oct 2013 17:01:51 -0000 Point taken on PAI, but am still struggling with this BPO model. Apologies upfront if this is obvious and I'm just failing to understand. If the company hires several BPOs and authorizes all of them to sign calls on its behalf, is there a way to trace back the originator (specific BPO) later on? I suppose that at some level the actual caller must be exposed (perhaps to trace malicious activity, such as malicious person infiltrated in an otherwise legitimate BPO). Via headers would be the obvious pick, but they don't survive the plethora of SBCs that the call is likely to transverse. Or maybe the certs themselves can carry this type of data (actual caller identity). On 9/19/13 9:43 PM, "Brian Rosen" wrote: >Don't think that would work without related changes in the networks. In >some networks, PAI is used for called id. They would have to change to >use From (if signed maybe). It also doesn't fit the definition of PAI. > >Brian > >On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh) > wrote: > >> Could a signed PAI be a potential solution to the BPO use case? "From" >>identifies the BPO, "PAI" the c >>ompany hiring the BPO - based on the delegation process Rosen mentions. >>PAI's use is widespread, and it's main limitation is being spoofable - >>but this is exactly the problem we are trying to solve anyway. >>=20 >>=20 >>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey" >>>wrote: >>>=20 >>> Excellent point a profile or BCP to complement the work. >>>=20 >>> -----Original Message----- >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>Of Alex >>> Bobotek >>> Sent: Thursday, September 19, 2013 5:27 PM >>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; >>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>> Cc: stir@ietf.org >>> Subject: Re: [stir] Call Center Implications >>>=20 >>> +1 >>> I've assumed that we are headed towards a "sign whatever extras you >>>wish, >>> and indicate what your signature covers" mechanism. >>>=20 >>> Based on this, standards would need to identify only a minimal subset >>>of >>> what shall/should be signed, and ensure that any required group of >>>signed >>> items survives transit intact. >>>=20 >>> Best signing practices may be needed to complement the standard, and an >>> appropriate place for all but the most basic 'what to sign' >>>recommendations. >>>=20 >>>=20 >>>=20 >>> Regards, >>>=20 >>> Alex >>>=20 >>>> -----Original Message----- >>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>> Of Henning Schulzrinne >>>> Sent: Thursday, September 19, 2013 2:24 PM >>>> To: Michael Hammer; fmousinh@cisco.com; Gregory.Schumacher@sprint.com; >>>> br@brianrosen.net >>>> Cc: stir@ietf.org >>>> Subject: Re: [stir] Call Center Implications >>>>=20 >>>> I see no reason not to allow signing any number-related field in the >>>> SIP request. (Signing may well be done by different parties.) >>>>=20 >>>> As far as I know, callback numbers (SIP Reply-To) aren't conveyable >>>>in=20 >>>> legacy systems, however, so this may be of somewhat limited use for a >>> while. >>>>=20 >>>> ________________________________________ >>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf of >>>> Michael Hammer [michael.hammer@yaanatech.com] >>>> Sent: Thursday, September 19, 2013 4:34 PM >>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com; >>>> br@brianrosen.net >>>> Cc: stir@ietf.org >>>> Subject: Re: [stir] Call Center Implications >>>>=20 >>>> Don't we still want to know the true originator of the call, even >>>>when=20 >>>> we have some token that says "Doctor so and so approved this message." >>>>=20 >>>> Originating number, display number, and call-back number could be 3 >>>> different things. >>>> Should all of them be verifiable? >>>>=20 >>>> Mike >>>>=20 >>>>=20 >>>> -----Original Message----- >>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>> Of Fernando Mousinho (fmousinh) >>>> Sent: Thursday, September 19, 2013 4:00 PM >>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>> Cc: stir@ietf.org >>>> Subject: Re: [stir] Call Center Implications >>>>=20 >>>> I believe the scenario telemarketing here is when a client hires a >>>>BPO=20 >>>> to place outbound calls, but expect customers to return these calls >>>>to=20 >>>> a different place (say, their own and operated call center). This >>>>way,=20 >>>> this client is authorizing the BPO to use an identity that it (BPO) >>> doesn't own. >>>> These numbers in this scenario are always operational, just at a >>>> different place. >>>>=20 >>>> The same telemarketing operator would then outpulse multiple numbers >>>> for their multiple clients, none of these numbers belonging to the >>> telemarketer. >>>> BTW, we are using the term "telemarketing" in a very generic sense - >>>> this could just as easily be a public service announcement, >>>>fundraiser, >>> etc. >>>>=20 >>>> If the telemarketer happens to own the inbound call center as well, >>>>it=20 >>>> very likely owns the number as well and this would necessarily be a >>>> special case >>>> - it would fall under the same characteristics of any call center. >>>>=20 >>>> On a different note, it would help a lot of we standardized >>>>terminology. >>>> Telemarketing, BPO, call center, end customer, clients=A9 it may be >>>>hard=20 >>>> for others to follow the discussion later. >>>>=20 >>>>=20 >>>>=20 >>>> (generic term for any type of outbound calling, including public >>>> service announcement, so don't think it's all about sales!) >>>>=20 >>>>=20 >>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>> wrote: >>>>=20 >>>>> There are some benefits from this approach, but also some scenarios >>>>> that need clarification how they could function. >>>>>=20 >>>>> The benefit is that the credential represents both the company >>>>> "responsible" for the sales campaign (the "company" in your >>>>>scenario)=20 >>>>> and the company operating the sales campaign (the call center in >>>>>your=20 >>>>> scenario). For the use in forensics (after the fact analysis) such >>>>> as pursuit of fraud investigation, we then can follow both paths. >>>>>=20 >>>>> However can you clarify the following - >>>>> - If a SP "signs" the call, is it attesting to the "responsible" >>>>> party for the telemarketing call or the party executing the >>>>> telemarketing campaign or both? >>>>>=20 >>>>> - How is the SP supposed to know all the parties that it is >>>>>attesting=20 >>>>> to >>>>> - the responsible party and/or executing party? >>>>>=20 >>>>> -It seems likely that some of the numbers assigned to a company in >>>>> your scenario will not be assigned to real telephones (or call >>>>>center=20 >>>>> trunk) until a telemarketing campaign is initiated or a call center >>>>> selected to execute the sales campaign, is it possible to have these >>>>> unassigned or floating numbers when not in use for a telemarketing >>>>> campaign? Is it allowed under most national numbering regimes? >>>>>=20 >>>>> - How important is it to have a known or recognized phone number as >>>>> the caller id as part of a telemarketing campaign? I am assuming >>>>> that not all campaigns care about having a number that is known or >>> recognized. >>>>>=20 >>>>> -In other words for this last bit, if a call center (telemarketing >>>>> campaign operator) is using their own set of numbers but serve >>>>> multiple simultaneous telemarketing campaigns using the same >>>>> originating numbers, what will they sign? Will they just have a >>>>> credential representing the call center alone, or a different >>>>> credential per telemarketing campaign, or a different credential per >>>>> responsible party (per client)? This will affect what is possible >>>>>for >>> any forensic activity. >>>>>=20 >>>>> -----Original Message----- >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>>> Of Brian Rosen >>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>> To: Fernando Mousinho >>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>> Subject: Re: [stir] Call Center Implications >>>>>=20 >>>>> We have a requirement to support the BPO use case. >>>>>=20 >>>>> The notion we had is that the company contracting the call center >>>>> approves the use, and the call center, or the SP acting on its >>>>> behalf, signs. >>>>> Think of this as another level of delegation. An SP delegates >>>>> numbers to the company. The company "delegates" use of those >>>>>numbers=20 >>>>> to the call center. The call center calls, using that delegation. >>>>> The credentials of the call center would be different from those of >>>>> the company, but would cover the same number. Having multiple >>>>> credentials covering the same number will be very common due to the >>>>> way delegation happens. In order to allow SPs to sign, without >>>>> creating credential per TN, we allow credentials with ranges. The >>>>> ranges could overlap when delegation happens. >>>>>=20 >>>>> Consider the following complex US case: >>>>> The North American Number Plan Administrator delegates 202-555-xxxx >>>>> to the Pooling Administrator. The PA now has a credential covering >>>>> the entire 10K block. >>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP A has >>>>>a=20 >>>>> credential for the entire 1K block SP A resells 202-555-12xx to SP B >>>>>. >>>>> SP B has a credential for a 100 TN block SP B delegates 202-555-123x >>>>> to Company C. Company C has a credential for a 10 number block >>>>> Company C authorizes 202-555-1234 to BPO D. BPO D has credential >>>>>for=20 >>>>> a 1 number block >>>>>=20 >>>>> NANPA and the PA never are in a call path, so they would never sign >>>>>a=20 >>>>> call. >>>>>=20 >>>>> However, SP A or SP B could sign a call from either Company C or BPO >>>>> D using the credential they have. >>>>>=20 >>>>> The SP for the call center could acquire credentials from the BPO >>>>>and=20 >>>>> sign on its behalf. I suspect than many service providers would be >>>>> reluctant to do so unless the numbers were from their own inventory >>>>> (that is, the company got its numbers from the same SP as the call >>> center). >>>>> Since that won't be the common case, the call center probably has to >>>>> do the signing itself. >>>>>=20 >>>>> Brian >>>>>=20 >>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh) >>>>> wrote: >>>>>=20 >>>>>> I agree, Hadriel. While large call centers (including BPOs, which >>>>>> provide services for other companies) may have special arrangements >>>>>> with SPs, the majority (small to mid-size) will probably rely on >>>>>> the SPs to do provide to vouch for their identity. This would >>>>>> probably be the case for the home analog caller anyway. This would >>>>>> imply that the "originating" SP's willingness to provide this >>>>>> signature is a critical success factor for the proposal's adoption. >>>>>>=20 >>>>>>=20 >>>>>> But back to the business process outsourcers (BPO) case - where a >>>>>> call center is providing service on behalf of multiple companies. I >>>>>> can see the value of them sending different numbers based on the >>>>>> clients they represent. Wouldn't that create a billing issue though? >>>>>> This is not an area I understand well, but I would suspect that SP >>>>>> 1 allowing one of its subscribers to send an outbound call using a >>>>>> number registered to SP 2 could be a no-no. If this hypothesis is >>>>>> correct, then we are back to the case where the SP is signing all >>>>>> calls, >>>> even for BPOs. >>>>>>=20 >>>>>> Or maybe this is another problem we are trying to fix in the >>>>>> working group, in which case we perhaps should state as a goal or >>> benefit: >>>>>> "providing a reliable mechanism to let calls originated from one >>>>>> SP1 to outpulse numbers that belong to another". >>>>>>=20 >>>>>> Fernando >>>>>>=20 >>>>>>=20 >>>>>>=20 >>>>>>=20 >>>>>>=20 >>>>>>=20 >>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>> wrote: >>>>>>=20 >>>>>>>=20 >>>>>>> Any of them could do it. My guess is service providers will do it >>>>>>> for most call centers, although larger call centers might do it >>>>>>> themselves... >>>>>>> especially ones which have trunks from multiple providers and can >>>>>>> source calls using the same number(s) out through multiple >>>>>>> providers on a call-by-call basis. >>>>>>>=20 >>>>>>> -hadriel >>>>>>>=20 >>>>>>>=20 >>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh) >>>>>>> wrote: >>>>>>>=20 >>>>>>>> I'm catching up with the discussions in this working group, and >>>>>>>> am trying to understand some architecture implications in call >>>>>>>> centers (which is where my background is). It seems that many of >>>>>>>> the problems we are trying to fix are related to contact centers >>>>>>>> anyway, so it is probably a good idea to have everyone in the >>>>>>>> same >>>> page. >>>>>>>>=20 >>>>>>>> Forgive me if it is an obvious question, but which components in >>>>>>>> a "typical call center architecture" do you see signature and >>>>>>>> verification taking place? Such "typical" deployments have >>>>>>>> premises based equipment (PME), a session border controller (SBC) >>>>>>>> and of course a SIP service provider all three could potentially >>>>>>>> be used throughout the authorization process. There are different >>>>>>>> ramifications depending on where your mind is at. >>>>>>>>=20 >>>>>>>> Fernando Mousinho >>>>>>>> Cisco Systems >>>>>>=20 >>>>>> _______________________________________________ >>>>>> stir mailing list >>>>>> stir@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>=20 >>>>> _______________________________________________ >>>>> stir mailing list >>>>> stir@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>=20 >>>>>=20 >>>>> ________________________________ >>>>>=20 >>>>> This e-mail may contain Sprint proprietary information intended for >>>>> the sole use of the recipient(s). Any use by others is prohibited. >>>>>If=20 >>>>> you are not the intended recipient, please contact the sender and >>>>> delete all copies of the message. >>>>>=20 >>>>> _______________________________________________ >>>>> stir mailing list >>>>> stir@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/stir >>>>=20 >>>> _______________________________________________ >>>> stir mailing list >>>> stir@ietf.org >>>> https://www.ietf.org/mailman/listinfo/stir >>>> _______________________________________________ >>>> stir mailing list >>>> stir@ietf.org >>>> https://www.ietf.org/mailman/listinfo/stir >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>>=20 > From br@brianrosen.net Wed Oct 2 10:31:50 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 081A121F9DC9 for ; Wed, 2 Oct 2013 10:31:50 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.299 X-Spam-Level: X-Spam-Status: No, score=-101.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MANGLED_COMPNY=2.3, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CuZhIIMK9BYe for ; Wed, 2 Oct 2013 10:31:39 -0700 (PDT) Received: from mail-ve0-f177.google.com (mail-ve0-f177.google.com [209.85.128.177]) by ietfa.amsl.com (Postfix) with ESMTP id BCB1521F9E85 for ; Wed, 2 Oct 2013 10:27:19 -0700 (PDT) Received: by mail-ve0-f177.google.com with SMTP id db12so811899veb.22 for ; Wed, 02 Oct 2013 10:27:16 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=lKaBQiFugz+3R/Suqs5rquvsZHkb/gK/yHxv09k9roY=; b=V1+xVJLIFJQllk3OySqBUYwnI9xu7ihuzb0iuBdSrIb+2VJNZLw5KTGacDe8uKxOI1 /oSKhRN95+Z3awjHMN98k7pDlzX0gDvR3YAl5e7NJNOjm8LHx0ofFlF0jzLg1PC2S/wf kHIK+TYMMUql/Ae+wLuV1ISgG1LazpHh91RAO7bK8z7mRZQCNkUKRDa9WbTjjutBNG1X vq/LVFhMR5SMoXN9ncTH32VjXqubRzUzB64uOVr9M2C+H9Aq842auEcutqOa7fY8JiMA YqBe/vq4NBCgK4hjO74wiiiKCC7JdTjim/oEdnDBShYTSfFwuEt5qPysiQ7qkaeXS3sC +3yg== X-Gm-Message-State: ALoCoQl79GXvF92Y4ttgZnOilv2+FL8IiXQ5XYh35u5eSCy9V0hXNQcHNhYNo/em6IoSJG2pmZLW X-Received: by 10.52.65.136 with SMTP id x8mr2565776vds.23.1380734836674; Wed, 02 Oct 2013 10:27:16 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id gr8sm2486830vdc.10.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 02 Oct 2013 10:27:15 -0700 (PDT) Content-Type: text/plain; charset=iso-8859-2 Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\)) From: Brian Rosen In-Reply-To: <71E3420F5D11314D8D989D8B72D247E129FE2079@xmb-aln-x06.cisco.com> Date: Wed, 2 Oct 2013 13:27:14 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <1B06BEFF-E7AC-4B30-B9D5-844E1192B4CB@brianrosen.net> References: <71E3420F5D11314D8D989D8B72D247E129FE2079@xmb-aln-x06.cisco.com> To: Fernando Mousinho (fmousinh) X-Mailer: Apple Mail (2.1508) Cc: "Gregory.Schumacher@sprint.com" , Richard Shockey , "stir@ietf.org" , Alex Bobotek , Michael Hammer , Henning Schulzrinne Subject: Re: [stir] Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 02 Oct 2013 17:31:50 -0000 Sure. Each BPO would have a different private/public key pair. So you can trace which one placed the call. Brian On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh) = wrote: > Point taken on PAI, but am still struggling with this BPO model. = Apologies > upfront if this is obvious and I'm just failing to understand. >=20 > If the company hires several BPOs and authorizes all of them to sign = calls > on its behalf, is there a way to trace back the originator (specific = BPO) > later on? I suppose that at some level the actual caller must be = exposed > (perhaps to trace malicious activity, such as malicious person = infiltrated > in an otherwise legitimate BPO). >=20 > Via headers would be the obvious pick, but they don't survive the = plethora > of SBCs that the call is likely to transverse. Or maybe the certs > themselves can carry this type of data (actual caller identity). >=20 >=20 >=20 >=20 > On 9/19/13 9:43 PM, "Brian Rosen" wrote: >=20 >> Don't think that would work without related changes in the networks. = In >> some networks, PAI is used for called id. They would have to change = to >> use =46rom (if signed maybe). It also doesn't fit the definition of = PAI. >>=20 >> Brian >>=20 >> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh) >> wrote: >>=20 >>> Could a signed PAI be a potential solution to the BPO use case? = "From" >>> identifies the BPO, "PAI" the c >>> ompany hiring the BPO - based on the delegation process Rosen = mentions. >>> PAI's use is widespread, and it's main limitation is being spoofable = - >>> but this is exactly the problem we are trying to solve anyway. >>>=20 >>>=20 >>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey" >>>> wrote: >>>>=20 >>>> Excellent point a profile or BCP to complement the work. >>>>=20 >>>> -----Original Message----- >>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>> Of Alex >>>> Bobotek >>>> Sent: Thursday, September 19, 2013 5:27 PM >>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; >>>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>>> Cc: stir@ietf.org >>>> Subject: Re: [stir] Call Center Implications >>>>=20 >>>> +1 >>>> I've assumed that we are headed towards a "sign whatever extras you >>>> wish, >>>> and indicate what your signature covers" mechanism. >>>>=20 >>>> Based on this, standards would need to identify only a minimal = subset >>>> of >>>> what shall/should be signed, and ensure that any required group of >>>> signed >>>> items survives transit intact. >>>>=20 >>>> Best signing practices may be needed to complement the standard, = and an >>>> appropriate place for all but the most basic 'what to sign' >>>> recommendations. >>>>=20 >>>>=20 >>>>=20 >>>> Regards, >>>>=20 >>>> Alex >>>>=20 >>>>> -----Original Message----- >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>> Of Henning Schulzrinne >>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>> To: Michael Hammer; fmousinh@cisco.com; = Gregory.Schumacher@sprint.com; >>>>> br@brianrosen.net >>>>> Cc: stir@ietf.org >>>>> Subject: Re: [stir] Call Center Implications >>>>>=20 >>>>> I see no reason not to allow signing any number-related field in = the >>>>> SIP request. (Signing may well be done by different parties.) >>>>>=20 >>>>> As far as I know, callback numbers (SIP Reply-To) aren't = conveyable >>>>> in=20 >>>>> legacy systems, however, so this may be of somewhat limited use = for a >>>> while. >>>>>=20 >>>>> ________________________________________ >>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf of >>>>> Michael Hammer [michael.hammer@yaanatech.com] >>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com; >>>>> br@brianrosen.net >>>>> Cc: stir@ietf.org >>>>> Subject: Re: [stir] Call Center Implications >>>>>=20 >>>>> Don't we still want to know the true originator of the call, even >>>>> when=20 >>>>> we have some token that says "Doctor so and so approved this = message." >>>>>=20 >>>>> Originating number, display number, and call-back number could be = 3 >>>>> different things. >>>>> Should all of them be verifiable? >>>>>=20 >>>>> Mike >>>>>=20 >>>>>=20 >>>>> -----Original Message----- >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>> Of Fernando Mousinho (fmousinh) >>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>> Cc: stir@ietf.org >>>>> Subject: Re: [stir] Call Center Implications >>>>>=20 >>>>> I believe the scenario telemarketing here is when a client hires a >>>>> BPO=20 >>>>> to place outbound calls, but expect customers to return these = calls >>>>> to=20 >>>>> a different place (say, their own and operated call center). This >>>>> way,=20 >>>>> this client is authorizing the BPO to use an identity that it = (BPO) >>>> doesn't own. >>>>> These numbers in this scenario are always operational, just at a >>>>> different place. >>>>>=20 >>>>> The same telemarketing operator would then outpulse multiple = numbers >>>>> for their multiple clients, none of these numbers belonging to the >>>> telemarketer. >>>>> BTW, we are using the term "telemarketing" in a very generic sense = - >>>>> this could just as easily be a public service announcement, >>>>> fundraiser, >>>> etc. >>>>>=20 >>>>> If the telemarketer happens to own the inbound call center as = well, >>>>> it=20 >>>>> very likely owns the number as well and this would necessarily be = a >>>>> special case >>>>> - it would fall under the same characteristics of any call center. >>>>>=20 >>>>> On a different note, it would help a lot of we standardized >>>>> terminology. >>>>> Telemarketing, BPO, call center, end customer, clients=A9 it may = be >>>>> hard=20 >>>>> for others to follow the discussion later. >>>>>=20 >>>>>=20 >>>>>=20 >>>>> (generic term for any type of outbound calling, including public >>>>> service announcement, so don't think it's all about sales!) >>>>>=20 >>>>>=20 >>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>> wrote: >>>>>=20 >>>>>> There are some benefits from this approach, but also some = scenarios >>>>>> that need clarification how they could function. >>>>>>=20 >>>>>> The benefit is that the credential represents both the company >>>>>> "responsible" for the sales campaign (the "company" in your >>>>>> scenario)=20 >>>>>> and the company operating the sales campaign (the call center in >>>>>> your=20 >>>>>> scenario). For the use in forensics (after the fact analysis) = such >>>>>> as pursuit of fraud investigation, we then can follow both paths. >>>>>>=20 >>>>>> However can you clarify the following - >>>>>> - If a SP "signs" the call, is it attesting to the "responsible" >>>>>> party for the telemarketing call or the party executing the >>>>>> telemarketing campaign or both? >>>>>>=20 >>>>>> - How is the SP supposed to know all the parties that it is >>>>>> attesting=20 >>>>>> to >>>>>> - the responsible party and/or executing party? >>>>>>=20 >>>>>> -It seems likely that some of the numbers assigned to a company = in >>>>>> your scenario will not be assigned to real telephones (or call >>>>>> center=20 >>>>>> trunk) until a telemarketing campaign is initiated or a call = center >>>>>> selected to execute the sales campaign, is it possible to have = these >>>>>> unassigned or floating numbers when not in use for a = telemarketing >>>>>> campaign? Is it allowed under most national numbering regimes? >>>>>>=20 >>>>>> - How important is it to have a known or recognized phone number = as >>>>>> the caller id as part of a telemarketing campaign? I am assuming >>>>>> that not all campaigns care about having a number that is known = or >>>> recognized. >>>>>>=20 >>>>>> -In other words for this last bit, if a call center = (telemarketing >>>>>> campaign operator) is using their own set of numbers but serve >>>>>> multiple simultaneous telemarketing campaigns using the same >>>>>> originating numbers, what will they sign? Will they just have a >>>>>> credential representing the call center alone, or a different >>>>>> credential per telemarketing campaign, or a different credential = per >>>>>> responsible party (per client)? This will affect what is = possible >>>>>> for >>>> any forensic activity. >>>>>>=20 >>>>>> -----Original Message----- >>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>>> Of Brian Rosen >>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>> To: Fernando Mousinho >>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>> Subject: Re: [stir] Call Center Implications >>>>>>=20 >>>>>> We have a requirement to support the BPO use case. >>>>>>=20 >>>>>> The notion we had is that the company contracting the call center >>>>>> approves the use, and the call center, or the SP acting on its >>>>>> behalf, signs. >>>>>> Think of this as another level of delegation. An SP delegates >>>>>> numbers to the company. The company "delegates" use of those >>>>>> numbers=20 >>>>>> to the call center. The call center calls, using that = delegation. >>>>>> The credentials of the call center would be different from those = of >>>>>> the company, but would cover the same number. Having multiple >>>>>> credentials covering the same number will be very common due to = the >>>>>> way delegation happens. In order to allow SPs to sign, without >>>>>> creating credential per TN, we allow credentials with ranges. = The >>>>>> ranges could overlap when delegation happens. >>>>>>=20 >>>>>> Consider the following complex US case: >>>>>> The North American Number Plan Administrator delegates = 202-555-xxxx >>>>>> to the Pooling Administrator. The PA now has a credential = covering >>>>>> the entire 10K block. >>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP A = has >>>>>> a=20 >>>>>> credential for the entire 1K block SP A resells 202-555-12xx to = SP B >>>>>> . >>>>>> SP B has a credential for a 100 TN block SP B delegates = 202-555-123x >>>>>> to Company C. Company C has a credential for a 10 number block >>>>>> Company C authorizes 202-555-1234 to BPO D. BPO D has credential >>>>>> for=20 >>>>>> a 1 number block >>>>>>=20 >>>>>> NANPA and the PA never are in a call path, so they would never = sign >>>>>> a=20 >>>>>> call. >>>>>>=20 >>>>>> However, SP A or SP B could sign a call from either Company C or = BPO >>>>>> D using the credential they have. >>>>>>=20 >>>>>> The SP for the call center could acquire credentials from the BPO >>>>>> and=20 >>>>>> sign on its behalf. I suspect than many service providers would = be >>>>>> reluctant to do so unless the numbers were from their own = inventory >>>>>> (that is, the company got its numbers from the same SP as the = call >>>> center). >>>>>> Since that won't be the common case, the call center probably has = to >>>>>> do the signing itself. >>>>>>=20 >>>>>> Brian >>>>>>=20 >>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh) >>>>>> wrote: >>>>>>=20 >>>>>>> I agree, Hadriel. While large call centers (including BPOs, = which >>>>>>> provide services for other companies) may have special = arrangements >>>>>>> with SPs, the majority (small to mid-size) will probably rely on >>>>>>> the SPs to do provide to vouch for their identity. This would >>>>>>> probably be the case for the home analog caller anyway. This = would >>>>>>> imply that the "originating" SP's willingness to provide this >>>>>>> signature is a critical success factor for the proposal's = adoption. >>>>>>>=20 >>>>>>>=20 >>>>>>> But back to the business process outsourcers (BPO) case - where = a >>>>>>> call center is providing service on behalf of multiple = companies. I >>>>>>> can see the value of them sending different numbers based on the >>>>>>> clients they represent. Wouldn't that create a billing issue = though? >>>>>>> This is not an area I understand well, but I would suspect that = SP >>>>>>> 1 allowing one of its subscribers to send an outbound call using = a >>>>>>> number registered to SP 2 could be a no-no. If this hypothesis = is >>>>>>> correct, then we are back to the case where the SP is signing = all >>>>>>> calls, >>>>> even for BPOs. >>>>>>>=20 >>>>>>> Or maybe this is another problem we are trying to fix in the >>>>>>> working group, in which case we perhaps should state as a goal = or >>>> benefit: >>>>>>> "providing a reliable mechanism to let calls originated from one >>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>=20 >>>>>>> Fernando >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" = >>>>> wrote: >>>>>>>=20 >>>>>>>>=20 >>>>>>>> Any of them could do it. My guess is service providers will do = it >>>>>>>> for most call centers, although larger call centers might do it >>>>>>>> themselves... >>>>>>>> especially ones which have trunks from multiple providers and = can >>>>>>>> source calls using the same number(s) out through multiple >>>>>>>> providers on a call-by-call basis. >>>>>>>>=20 >>>>>>>> -hadriel >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh) >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> I'm catching up with the discussions in this working group, = and >>>>>>>>> am trying to understand some architecture implications in call >>>>>>>>> centers (which is where my background is). It seems that many = of >>>>>>>>> the problems we are trying to fix are related to contact = centers >>>>>>>>> anyway, so it is probably a good idea to have everyone in the >>>>>>>>> same >>>>> page. >>>>>>>>>=20 >>>>>>>>> Forgive me if it is an obvious question, but which components = in >>>>>>>>> a "typical call center architecture" do you see signature and >>>>>>>>> verification taking place? Such "typical" deployments have >>>>>>>>> premises based equipment (PME), a session border controller = (SBC) >>>>>>>>> and of course a SIP service provider all three could = potentially >>>>>>>>> be used throughout the authorization process. There are = different >>>>>>>>> ramifications depending on where your mind is at. >>>>>>>>>=20 >>>>>>>>> Fernando Mousinho >>>>>>>>> Cisco Systems >>>>>>>=20 >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>=20 >>>>>> _______________________________________________ >>>>>> stir mailing list >>>>>> stir@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>=20 >>>>>>=20 >>>>>> ________________________________ >>>>>>=20 >>>>>> This e-mail may contain Sprint proprietary information intended = for >>>>>> the sole use of the recipient(s). Any use by others is = prohibited. >>>>>> If=20 >>>>>> you are not the intended recipient, please contact the sender and >>>>>> delete all copies of the message. >>>>>>=20 >>>>>> _______________________________________________ >>>>>> stir mailing list >>>>>> stir@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>=20 >>>>> _______________________________________________ >>>>> stir mailing list >>>>> stir@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/stir >>>>> _______________________________________________ >>>>> stir mailing list >>>>> stir@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/stir >>>> _______________________________________________ >>>> stir mailing list >>>> stir@ietf.org >>>> https://www.ietf.org/mailman/listinfo/stir >>>>=20 >>=20 >=20 From internet-drafts@ietf.org Fri Oct 4 15:23:47 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9955221F9E39; Fri, 4 Oct 2013 15:23:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.548 X-Spam-Level: X-Spam-Status: No, score=-102.548 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6IugUHk5F1Yk; Fri, 4 Oct 2013 15:23:47 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 3378721F9B65; Fri, 4 Oct 2013 15:23:47 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: internet-drafts@ietf.org To: i-d-announce@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 4.80.p1 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20131004222346.32223.87882.idtracker@ietfa.amsl.com> Date: Fri, 04 Oct 2013 15:23:46 -0700 X-Mailman-Approved-At: Sat, 05 Oct 2013 03:35:43 -0700 Cc: stir@ietf.org Subject: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 Oct 2013 22:23:47 -0000 A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the Secure Telephone Identity Revisited Worki= ng Group of the IETF. Title : Secure Telephone Identity Problem Statement Author(s) : Jon Peterson Henning Schulzrinne Hannes Tschofenig Filename : draft-ietf-stir-problem-statement-00.txt Pages : 23 Date : 2013-10-04 Abstract: Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments. Interworking VoIP systems with the traditional telephone network has reduced the overall security of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes or even circumventing multi- factor authentication systems trusted by banks. Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack of effective standards for identifying the calling party in a VoIP session. This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult, and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement There's also a htmlized version available at: http://tools.ietf.org/html/draft-ietf-stir-problem-statement-00 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From housley@vigilsec.com Tue Oct 8 09:33:25 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7C98D21E826E for ; Tue, 8 Oct 2013 09:33:25 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.289 X-Spam-Level: X-Spam-Status: No, score=-102.289 tagged_above=-999 required=5 tests=[AWL=0.310, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KIhlLedBAOiI for ; Tue, 8 Oct 2013 09:33:20 -0700 (PDT) Received: from odin.smetech.net (mail.smetech.net [208.254.26.82]) by ietfa.amsl.com (Postfix) with ESMTP id 71A7421E8236 for ; Tue, 8 Oct 2013 09:33:20 -0700 (PDT) Received: from localhost (unknown [208.254.26.81]) by odin.smetech.net (Postfix) with ESMTP id 4D62DF24093 for ; Tue, 8 Oct 2013 12:33:42 -0400 (EDT) X-Virus-Scanned: amavisd-new at smetech.net Received: from odin.smetech.net ([208.254.26.82]) by localhost (ronin.smetech.net [208.254.26.81]) (amavisd-new, port 10024) with ESMTP id WlGqvWcCyIaO for ; Tue, 8 Oct 2013 12:33:03 -0400 (EDT) Received: from [192.168.2.107] (pool-71-191-197-233.washdc.fios.verizon.net [71.191.197.233]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by odin.smetech.net (Postfix) with ESMTP id A60D4F24099 for ; Tue, 8 Oct 2013 12:33:39 -0400 (EDT) From: Russ Housley Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Date: Tue, 8 Oct 2013 12:33:15 -0400 Message-Id: <35CD2E5A-AB42-466A-AC65-7E7DBAEF5954@vigilsec.com> To: IETF STIR Mail List Mime-Version: 1.0 (Apple Message framework v1085) X-Mailer: Apple Mail (2.1085) Subject: [stir] IETF88 STIR WG Agenda X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Oct 2013 16:33:25 -0000 https://datatracker.ietf.org/meeting/88/agenda/stir/ The framework for the agenda that was previously discussed has been = posted. Please reach out to Robert or myself if you would like to = present at either session. Russ From br@brianrosen.net Tue Oct 8 09:36:36 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3BBCC21E81C6 for ; Tue, 8 Oct 2013 09:36:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.116 X-Spam-Level: X-Spam-Status: No, score=-103.116 tagged_above=-999 required=5 tests=[AWL=0.483, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8jIIJWIfmPo4 for ; Tue, 8 Oct 2013 09:36:31 -0700 (PDT) Received: from mail-ye0-f174.google.com (mail-ye0-f174.google.com [209.85.213.174]) by ietfa.amsl.com (Postfix) with ESMTP id 5469A21E81FD for ; Tue, 8 Oct 2013 09:36:28 -0700 (PDT) Received: by mail-ye0-f174.google.com with SMTP id r14so318139yen.5 for ; Tue, 08 Oct 2013 09:36:27 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=so4WkHHwaKxwe7rkbPQquz5LRYbSnVcszPwXMqq1Vdk=; b=XACBUnjPs1OLrKQjY/P9sj6OMSgaQOmh5I9oj6L4kQdWu8rdWS2udQb6Y6TMaW1O5g Blh2VJ8YRsqgRRGgeXI45KfXPRM4zjBFxAsUZ+pobC937qDICrBCQxYr8Un7Z/4Uf7my BXDcEYcGetxEPTF8IzrX7naxgmRkUwspOYfZrdKMHqsLh3pdW3mah2/sMurGkR3axuPJ U9ooKPAMQ5/zi2coIqs50dhQaQhDZyk4oGsBLtwxG179IHowziBrbsFbuwiA6HlEVdng xEo4eeg8asii9fYOs7LAnZx6abw87h7f83XsfWWCwZdG31tcVCKyLDnmYXdzkIaLSSd6 2pmw== X-Gm-Message-State: ALoCoQkgMOxewDVBMTm69Oo2qbEJmH0xgsQQ17ZiC927J0auyJh5eW5jSVtd/sfU5HgC5lifEvb2 X-Received: by 10.236.41.102 with SMTP id g66mr2082759yhb.20.1381250187798; Tue, 08 Oct 2013 09:36:27 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id m68sm53330209yhj.22.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 08 Oct 2013 09:36:27 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) From: Brian Rosen In-Reply-To: <35CD2E5A-AB42-466A-AC65-7E7DBAEF5954@vigilsec.com> Date: Tue, 8 Oct 2013 12:36:24 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <994B0D46-0F6B-4DDD-B44B-25EF5DACB7FF@brianrosen.net> References: <35CD2E5A-AB42-466A-AC65-7E7DBAEF5954@vigilsec.com> To: Russ Housley X-Mailer: Apple Mail (2.1510) Cc: IETF STIR Mail List Subject: Re: [stir] IETF88 STIR WG Agenda X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Oct 2013 16:36:36 -0000 What is your intention on adopting the problem statement and threats = docs? Wait until the meeting, or declare consensus now? I'm hoping one or both of them can enter WGLC immediately after the = meeting. Brian On Oct 8, 2013, at 12:33 PM, Russ Housley wrote: > https://datatracker.ietf.org/meeting/88/agenda/stir/ >=20 > The framework for the agenda that was previously discussed has been = posted. Please reach out to Robert or myself if you would like to = present at either session. >=20 > Russ >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From rjsparks@nostrum.com Tue Oct 8 09:45:57 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0EABB21E80BE for ; Tue, 8 Oct 2013 09:45:57 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.6 X-Spam-Level: X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GrHGHLwgb4Zs for ; Tue, 8 Oct 2013 09:45:56 -0700 (PDT) Received: from shaman.nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id 8946621E80A8 for ; Tue, 8 Oct 2013 09:45:56 -0700 (PDT) Received: from unnumerable.local (pool-173-57-89-224.dllstx.fios.verizon.net [173.57.89.224]) (authenticated bits=0) by shaman.nostrum.com (8.14.3/8.14.3) with ESMTP id r98GjteI032128 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=OK) for ; Tue, 8 Oct 2013 11:45:56 -0500 (CDT) (envelope-from rjsparks@nostrum.com) Message-ID: <525436C3.4060303@nostrum.com> Date: Tue, 08 Oct 2013 11:45:55 -0500 From: Robert Sparks User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: stir@ietf.org References: <35CD2E5A-AB42-466A-AC65-7E7DBAEF5954@vigilsec.com> <994B0D46-0F6B-4DDD-B44B-25EF5DACB7FF@brianrosen.net> In-Reply-To: <994B0D46-0F6B-4DDD-B44B-25EF5DACB7FF@brianrosen.net> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Received-SPF: pass (shaman.nostrum.com: 173.57.89.224 is authenticated by a trusted mechanism) Subject: Re: [stir] IETF88 STIR WG Agenda X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Oct 2013 16:45:57 -0000 On 10/8/13 11:36 AM, Brian Rosen wrote: > What is your intention on adopting the problem statement and threats docs? > Wait until the meeting, or declare consensus now? I've asked Jon to submit both as WG -00s as soon as it is convenient for him to do so. RjS > > I'm hoping one or both of them can enter WGLC immediately after the meeting. > > Brian > > > On Oct 8, 2013, at 12:33 PM, Russ Housley wrote: > >> https://datatracker.ietf.org/meeting/88/agenda/stir/ >> >> The framework for the agenda that was previously discussed has been posted. Please reach out to Robert or myself if you would like to present at either session. >> >> Russ >> >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From br@brianrosen.net Tue Oct 8 09:47:38 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id BD16421E8274 for ; Tue, 8 Oct 2013 09:47:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.213 X-Spam-Level: X-Spam-Status: No, score=-103.213 tagged_above=-999 required=5 tests=[AWL=0.386, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SACoFb5ovr16 for ; Tue, 8 Oct 2013 09:47:34 -0700 (PDT) Received: from mail-gg0-f177.google.com (mail-gg0-f177.google.com [209.85.161.177]) by ietfa.amsl.com (Postfix) with ESMTP id DE8B621E8249 for ; Tue, 8 Oct 2013 09:47:33 -0700 (PDT) Received: by mail-gg0-f177.google.com with SMTP id t2so1446081ggn.22 for ; Tue, 08 Oct 2013 09:47:24 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=PHQUWf90rJA+TyBwgarK0p5zhFRC4b3YrNcJgtxermQ=; b=eq3aEVKhHLwW2HoYdvQE6FzIIAbwwGn0IYby9C03G0S0fvRCHpG0v+8zQNSl/bHZKt yR9cOMmCq4FSBgNB1zizYOtVJC6EWUI929OfEhk5fXC4SI7Z5VB3t7QksC5QPujG7SfR s0P5/WkpqmWVVmwJCJ5+9pVIwY3ZrdxcFivgNemjKc8y1MjXuMphvuVXvGv64Ea4HwzZ GwumE2nMDxCbn5D+gmYInWwBVqFPGgPWyVxxmjjluF75vZYCuLixU0jU9e3a5LKjg/Ng 5usargKCbsOEzrk1PT4FFahkRLFajAGwWoMUSaIpmlzm8C8KmA29K1j+jBuWFq456p4c tMsg== X-Gm-Message-State: ALoCoQmJrYYKfJjUwiWaZcqhZt3hHuRu/0GC3FhB02KJhPi/mbQuNdEgH1DcIKRC8yCVRw2MGrIU X-Received: by 10.236.141.12 with SMTP id f12mr2125295yhj.34.1381250844100; Tue, 08 Oct 2013 09:47:24 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id t31sm53406326yhp.13.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Tue, 08 Oct 2013 09:47:23 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) From: Brian Rosen In-Reply-To: <525436C3.4060303@nostrum.com> Date: Tue, 8 Oct 2013 12:47:21 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: References: <35CD2E5A-AB42-466A-AC65-7E7DBAEF5954@vigilsec.com> <994B0D46-0F6B-4DDD-B44B-25EF5DACB7FF@brianrosen.net> <525436C3.4060303@nostrum.com> To: Robert Sparks X-Mailer: Apple Mail (2.1510) Cc: stir@ietf.org Subject: Re: [stir] IETF88 STIR WG Agenda X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Oct 2013 16:47:39 -0000 Excellent, thank you. Brian On Oct 8, 2013, at 12:45 PM, Robert Sparks wrote: > On 10/8/13 11:36 AM, Brian Rosen wrote: >> What is your intention on adopting the problem statement and threats = docs? >> Wait until the meeting, or declare consensus now? > I've asked Jon to submit both as WG -00s as soon as it is convenient = for him to do so. >=20 > RjS >>=20 >> I'm hoping one or both of them can enter WGLC immediately after the = meeting. >>=20 >> Brian >>=20 >>=20 >> On Oct 8, 2013, at 12:33 PM, Russ Housley = wrote: >>=20 >>> https://datatracker.ietf.org/meeting/88/agenda/stir/ >>>=20 >>> The framework for the agenda that was previously discussed has been = posted. Please reach out to Robert or myself if you would like to = present at either session. >>>=20 >>> Russ >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From rjsparks@nostrum.com Tue Oct 8 09:48:18 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C27621E8272 for ; Tue, 8 Oct 2013 09:48:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.6 X-Spam-Level: X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id d07hlLenSwTe for ; Tue, 8 Oct 2013 09:47:53 -0700 (PDT) Received: from shaman.nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id 8802821E823C for ; Tue, 8 Oct 2013 09:47:48 -0700 (PDT) Received: from unnumerable.local (pool-173-57-89-224.dllstx.fios.verizon.net [173.57.89.224]) (authenticated bits=0) by shaman.nostrum.com (8.14.3/8.14.3) with ESMTP id r98GlmIu032330 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=OK) for ; Tue, 8 Oct 2013 11:47:48 -0500 (CDT) (envelope-from rjsparks@nostrum.com) Message-ID: <52543734.7040404@nostrum.com> Date: Tue, 08 Oct 2013 11:47:48 -0500 From: Robert Sparks User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: stir@ietf.org References: <35CD2E5A-AB42-466A-AC65-7E7DBAEF5954@vigilsec.com> <994B0D46-0F6B-4DDD-B44B-25EF5DACB7FF@brianrosen.net> <525436C3.4060303@nostrum.com> In-Reply-To: <525436C3.4060303@nostrum.com> Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Received-SPF: pass (shaman.nostrum.com: 173.57.89.224 is authenticated by a trusted mechanism) Subject: Re: [stir] IETF88 STIR WG Agenda X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Oct 2013 16:48:18 -0000 On 10/8/13 11:45 AM, Robert Sparks wrote: > On 10/8/13 11:36 AM, Brian Rosen wrote: >> What is your intention on adopting the problem statement and threats >> docs? >> Wait until the meeting, or declare consensus now? > I've asked Jon to submit both as WG -00s as soon as it is convenient > for him to do so. and to be clear, the problem-statement is already submitted (as of the 4th). > > RjS >> >> I'm hoping one or both of them can enter WGLC immediately after the >> meeting. >> >> Brian >> >> >> On Oct 8, 2013, at 12:33 PM, Russ Housley wrote: >> >>> https://datatracker.ietf.org/meeting/88/agenda/stir/ >>> >>> The framework for the agenda that was previously discussed has been >>> posted. Please reach out to Robert or myself if you would like to >>> present at either session. >>> >>> Russ >>> >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir > From jon.peterson@neustar.biz Tue Oct 8 11:22:27 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E149011E80FE for ; Tue, 8 Oct 2013 11:22:27 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -105.722 X-Spam-Level: X-Spam-Status: No, score=-105.722 tagged_above=-999 required=5 tests=[AWL=0.877, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2S2tggvWqavk for ; Tue, 8 Oct 2013 11:22:24 -0700 (PDT) Received: from neustar.com (smartmail.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id C3FD911E80F8 for ; Tue, 8 Oct 2013 11:22:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1381256495; x=1696615825; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=zYMi/rySNq OD8vojSg2JQjp9pDsHOEjJc02ifwmdodo=; b=mu/6rAvIdTxY16qoGaG8ydNslt LthhE30LqsM+N4kl9GpAV3FuDK3OnHNrqm+e2+7Wzy8EuLmEOrMYVDbgPlmg== Received: from ([10.31.58.69]) by chihiron1.nc.neustar.com with ESMTP with TLS id J041123128.25734286; Tue, 08 Oct 2013 14:17:23 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc10.cis.neustar.com ([169.254.4.132]) with mapi id 14.02.0342.003; Tue, 8 Oct 2013 14:22:04 -0400 From: "Peterson, Jon" To: "Rosen, Brian" , "stir@ietf.org List" Thread-Topic: [stir] Comments on draft-peterson-stir-threats-00 Thread-Index: AQHOvsfUbiPUZPEZSU6y5TDfiZrobZnq9q8A Date: Tue, 8 Oct 2013 18:22:03 +0000 Message-ID: In-Reply-To: <01F04E36-C5F8-4DF4-A575-21290E7E7ED8@neustar.biz> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.154] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: oBXTu4xToWwI4Y/swvxiBw== Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] Comments on draft-peterson-stir-threats-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 08 Oct 2013 18:22:28 -0000 Thanks for these detailed notes, Brian. A few comments inline. On 10/1/13 10:01 AM, "Rosen, Brian" wrote: >I think this document is a very good start as a threat analysis and >should be adopted by the work group. > >In the Introduction, I think the most stark example of these attacks is >swatting, where the caller impersonates a victim and causes a massive law >enforcement action without any real basis. True, and we can mention it - though my understanding is that swatting attacks can be performed without impersonating any caller ID, since effectively you can just contact emergency services and claim there's a disturbance at a location and the response will be sent there. Having a caller ID for that location isn't integral to the attack. Certainly having the right caller ID provides a good corroborating detail. >There is a paragraph that talks about post set-up changes. It's correct >that we don't consider them, but the way SIP works, any INVITE (say from >a bridge) could be protected. Protected from what attack? That's the question for a threats document. >Do you want to at least reference cnit? Maybe just as "further work will >be needed". Is the second-to-last paragraph of the Introduction not sufficient? The problem-statement document already has a statement that this effort isn't considering display name validation as well. >In Attackers, I'm not sure I understand an attacker that observes but >does not replay. We are not encrypting anything, so observation will >always be possible. The voicemail hack would require a replay to be >successful (if it were possible) unless they had the keys. The attacker postulated in that TBD isn't entirely passive: the question there is if we should consider attackers who can replay signaling that wasn't sent directly to them. So, say, an attacker at the IETF who can listen to the public WiFi there, captures signaling going from you to your voicemail service, and then wants to impersonate you to your voicemail service.=20 So the point of that TBD is to ask, are we considering only attackers who replay signaling that they received, or also attackers who might replay signaling that they captured be eavesdropping? >When you talk about not including intermediaries as attackers, perhaps it >would be good to explain in the intro that we don't consider service >providers to be directly participating, but we do see some of them >turning a blind eye to bad things their customers are doing. We're not >assuming the service providers are the attackers, but we are assuming >some of them are indirectly complicit. I suspect that subtlety is probably better suited for the problem-statement than for this document. Unless we're saying that we want to implement protocol mechanisms to defend against careless service providers, I'm not sure what we'd say about this in a threat document that would change the recommendations. >In Voicemail Attacks, I got lost in the paragraph beginning "If the >voicemail service could know ahead of time that it should always expect >authenticated identity.." I'm not sure what it's trying to say and >wonder if it could be deleted without losing anything important. The rest of the paragraph does give a concrete example of this countermeasure: if I call a voicemail service regularly, and my call is signed with an identity signature, the voicemail service should be wary if it receives a call purporting to be from my number without a signature. But we want to say something more general than that, to take into account DANE-like mechanisms for advertising "you should expect identity in a call from this number." So, I went with "if you could know ahead of time" language there. In general, we want to discuss this sort of mechanism in a high-level overview of countermeasures because identity is necessarily opt-in and will be adopted only incrementally, so anything we can do to improve the prospect that incremental identity will be practically useful is very helpful.=20 >In Commercial impersonation Attacks, I am bothered by the sentence "If >there were a directory that could inform the terminating side of that >fact, however, that would help in the robocalling case." I have no idea >what directory that is referring to, and ISTM that you can rarely assure >you can ALWAYS get authenticated identity from a given TN. I guess you >mean the out of band directory, but that would depend on the called party >having credentials, so there is at least some qualification needed. Same as the last note. "Directory" here is again referring to DANE-like mechanisms. I agree you can rarely assure that you can always get identity in a call, but your policies can know to treat calls without identity with greater suspicion when you have an expectation it will be used. >I'd like the swatting case documented. I can send text if desired. Please do, but please do focus on the degree to which the calling party number actually changes what emergency responders do. >In IP-PSTN attack scenario, if we did adopt some of the ideas in >Hadriel's proposal, we might get the in band solution to work with >IP-PSTN GWs. I also want to get the notion that if there is an >intermediary on the IP side, including the IP-PSTN GW, it could validate. Certainly I thought about this question when writing these threats, though just for the IP-PSTN-IP case, not for the IP-PSTN case. For IP-PSTN the terminating gateway could validate, and say, not send the call to the PSTN if there's no identity signature - we've talked about things like that before. I'd be willing to add that as a scenario where in-band helps with the IP-PSTN case, though it's not an end-to-end indication in that case. Regarding gateway the identity signature, I suspect this question is largely one of terminology, about what is "in-band" versus "out-of-band." If "in-band" is understood strictly to mean "in SIP," then I don't think gatewaying would be in the scope of "in-band." We could even define some kind of "hybrid" designation for gatewaying. The reason why I didn't, thus far anyway, is because I'm interested in how much overlap there is in the information that we imagine would be gatewayed (stored in a field in XMPP somewhere, say) and the information that would be shared via out-of-band for identity. If the overlap turns out to be very large, then maybe these cases are closer than they might look right now. But that depends very much on the details of the solution space, and is certainly beyond the scope of a threats document. >Isn't it a stretch to say that the out of band mechanism could work for a >PSTN-PSTN connection? It assumes an Internet-aware origination (device >or service) with both IP and PSTN connectivity. That would not cover any >existing device or service, so you are talking about an upgraded service >that did not also upgrade to SIP origination. Possible, sure, but worth >documenting? Dunno. This is a cornerstone case for out-of-band: a case where two mobile phones, say, can exchange out-of-band identity even though their call goes over the PSTN. It does indeed assume an Internet-aware device with both PSTN and IP connectivity. I'd say every iPhone meets that description, so I'm not sure what distinction you're drawing here that I'm missing. >IP-PSTN-IP - same comments as IP-PSTN See above. Thanks again, Jon Peterson Neustar, Inc. >Brian >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From internet-drafts@ietf.org Fri Oct 11 16:34:33 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7F5FF21E8084; Fri, 11 Oct 2013 16:34:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.565 X-Spam-Level: X-Spam-Status: No, score=-102.565 tagged_above=-999 required=5 tests=[AWL=0.035, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cisMf6EnNlJ5; Fri, 11 Oct 2013 16:34:33 -0700 (PDT) Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F85721F9DFB; Fri, 11 Oct 2013 16:34:33 -0700 (PDT) MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: quoted-printable From: internet-drafts@ietf.org To: i-d-announce@ietf.org X-Test-IDTracker: no X-IETF-IDTracker: 4.80.p2 Auto-Submitted: auto-generated Precedence: bulk Message-ID: <20131011233433.16052.66127.idtracker@ietfa.amsl.com> Date: Fri, 11 Oct 2013 16:34:33 -0700 X-Mailman-Approved-At: Sat, 12 Oct 2013 19:34:27 -0700 Cc: stir@ietf.org Subject: [stir] I-D Action: draft-ietf-stir-threats-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Oct 2013 23:34:33 -0000 A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the Secure Telephone Identity Revisited Worki= ng Group of the IETF. Title : Secure Telephone Identity Threat Model Author(s) : Jon Peterson Filename : draft-ietf-stir-threats-00.txt Pages : 11 Date : 2013-10-11 Abstract: As the Internet and the telephone network have become increasingly interconnected and interdependent, attackers can impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes or even circumventing multi- factor authentication systems trusted by banks. This document analyzes threats in the resulting system, enumerating actors, reviewing the capabilities available to and used by attackers, and describing scenarios in which attacks are launched. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-stir-threats There's also a htmlized version available at: http://tools.ietf.org/html/draft-ietf-stir-threats-00 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ From br@brianrosen.net Mon Oct 14 14:34:46 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A7C4721F93BF for ; Mon, 14 Oct 2013 14:34:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.357 X-Spam-Level: X-Spam-Status: No, score=-103.357 tagged_above=-999 required=5 tests=[AWL=0.242, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LAXm1pcV4dUe for ; Mon, 14 Oct 2013 14:34:31 -0700 (PDT) Received: from mail-qc0-f175.google.com (mail-qc0-f175.google.com [209.85.216.175]) by ietfa.amsl.com (Postfix) with ESMTP id 8B05621E8089 for ; Mon, 14 Oct 2013 14:34:22 -0700 (PDT) Received: by mail-qc0-f175.google.com with SMTP id v2so5272771qcr.20 for ; Mon, 14 Oct 2013 14:34:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:from:content-type:content-transfer-encoding :subject:message-id:date:to:mime-version; bh=Rtt+TYPcMrDN7zEOwPQ0NZvwhHxxoDUprURxGsfTeU8=; b=LFdik8N/aEqs1Qee26g7H5Zr/ZV67RtcMwv+s2Uhgt8kbCqH+gborJqzOSKenJIxYy g6OfM4f+27VEM76D3Yx28tIlOADtI9kdjlIFIiB9C6DAeRvRt1oKmKm0b7u9lMPDTm7U xSRh4sUiss+y4We9CrGrLfq7w2mXG1eelixggPqXJaf87G+pDwYB5RN8+0FD6dlxS0WD JHxcHWlk2bP/7uzx51Jb39ZAXUgvIJqLXNunwBk2U6Dt0mmLf4vHkU0IqHKK3Dc3BmUe wQHNIlpV9wDS/GjR5Ps7nOfD+WIYf5rTV7tCICARc6SvcJWdbajZmYY7KNsxdFK5VfR6 fZ7Q== X-Gm-Message-State: ALoCoQkGgqoJZTF3h8ovQePVDN9hvTX1igpOgna8xUcg49mHqnMA7qmAZmH64rmkp8JQFPkoahag X-Received: by 10.224.130.72 with SMTP id r8mr25607749qas.32.1381786462066; Mon, 14 Oct 2013 14:34:22 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id u3sm71998074qej.8.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 14 Oct 2013 14:34:21 -0700 (PDT) From: Brian Rosen Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable Message-Id: Date: Mon, 14 Oct 2013 17:34:20 -0400 To: "stir@ietf.org Mail List" Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) X-Mailer: Apple Mail (2.1510) Subject: [stir] draft-ietf-stir-problem-statement-00 looks pretty good to me X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Oct 2013 21:34:47 -0000 I looked at the draft and most of my comments have been addressed, with = the couple remaining ones a difference of style not important. I think it's good enough and would like to send it on its way. Brian From fmousinh@cisco.com Mon Oct 14 15:11:48 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5B0D121E8195 for ; Mon, 14 Oct 2013 15:11:48 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -10.599 X-Spam-Level: X-Spam-Status: No, score=-10.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gQk24WTVlmzt for ; Mon, 14 Oct 2013 15:11:43 -0700 (PDT) Received: from rcdn-iport-4.cisco.com (rcdn-iport-4.cisco.com [173.37.86.75]) by ietfa.amsl.com (Postfix) with ESMTP id BEEB721E8133 for ; Mon, 14 Oct 2013 15:11:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=963; q=dns/txt; s=iport; t=1381788702; x=1382998302; h=from:to:subject:date:message-id:in-reply-to:content-id: content-transfer-encoding:mime-version; bh=N0imsXE434TBNAsYhUoqxnXQGCrk/qzDuESuYK110AA=; b=G/hgPvYt6OAi6MFWGx+FV9cp9rbF9vb5cGzIXk5Nf77AQpH8oFyCVsR4 +pKHXNFEMK8jzZPwzsP23iHpiJYHf2YGoYo2Zjt7A7XKnnT9gB4Wrh5oN qUKoTGXyBoNI+JHZClBQ7j3zhfe8fJItYZk1G7E7FUf0mf1gUbRbsINFC A=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AiAFABNrXFKtJXHB/2dsb2JhbABZgwc4UsIQgSoWdIInAQQBAQFrHQEIDhRLCyUCBAESCBOHawy9ZQSPIDiDH4EEA6oHgySCKQ X-IronPort-AV: E=Sophos;i="4.93,494,1378857600"; d="scan'208";a="272128704" Received: from rcdn-core2-6.cisco.com ([173.37.113.193]) by rcdn-iport-4.cisco.com with ESMTP; 14 Oct 2013 22:11:42 +0000 Received: from xhc-aln-x12.cisco.com (xhc-aln-x12.cisco.com [173.36.12.86]) by rcdn-core2-6.cisco.com (8.14.5/8.14.5) with ESMTP id r9EMBgaP019571 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Mon, 14 Oct 2013 22:11:42 GMT Received: from xmb-aln-x06.cisco.com ([169.254.1.176]) by xhc-aln-x12.cisco.com ([173.36.12.86]) with mapi id 14.02.0318.004; Mon, 14 Oct 2013 17:11:41 -0500 From: "Fernando Mousinho (fmousinh)" To: Brian Rosen , "stir@ietf.org Mail List" Thread-Topic: [stir] draft-ietf-stir-problem-statement-00 looks pretty good to me Thread-Index: AQHOySU3eq0PYu6Vv0ChL4ZBVx5DPpn00y8A Date: Mon, 14 Oct 2013 22:11:41 +0000 Message-ID: <71E3420F5D11314D8D989D8B72D247E129FF9406@xmb-aln-x06.cisco.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.8.130913 x-originating-ip: [10.117.152.12] Content-Type: text/plain; charset="Windows-1252" Content-ID: <3F3A2D78A8FCCB4584599647BD8F5E33@emea.cisco.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] draft-ietf-stir-problem-statement-00 looks pretty good to me X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 14 Oct 2013 22:11:48 -0000 Thinking loud=8A maybe these don't need to be addressed: - Do we need to specify which types of identities we want to tackle: public PSTN numbers, private numbers, and/or URIs? Or is "all of the above" implicit? - What about internal use of the solutions (e.g., verifying identities of other callers in the same domain - preventing attacks from within)? Do we care about this use case or is it assumed to be implicit? The draft reads as it inter-domain (inter-company) is the main (only?) topic, but it could be just me. On 10/14/13 5:34 PM, "Brian Rosen" wrote: >I looked at the draft and most of my comments have been addressed, with >the couple remaining ones a difference of style not important. > >I think it's good enough and would like to send it on its way. > >Brian > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From philippe.fouquart@orange.com Tue Oct 15 08:47:22 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC15A21E81D5 for ; Tue, 15 Oct 2013 08:47:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.598 X-Spam-Level: X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, UNPARSEABLE_RELAY=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QSOOFah2W07V for ; Tue, 15 Oct 2013 08:47:17 -0700 (PDT) Received: from relais-inet.francetelecom.com (relais-ias245.francetelecom.com [80.12.204.245]) by ietfa.amsl.com (Postfix) with ESMTP id D3D0221E81BB for ; Tue, 15 Oct 2013 08:46:56 -0700 (PDT) Received: from omfeda06.si.francetelecom.fr (unknown [xx.xx.xx.199]) by omfeda13.si.francetelecom.fr (ESMTP service) with ESMTP id B858F190564 for ; Tue, 15 Oct 2013 17:46:55 +0200 (CEST) Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.186]) by omfeda06.si.francetelecom.fr (ESMTP service) with ESMTP id A066EC806C for ; Tue, 15 Oct 2013 17:46:55 +0200 (CEST) Received: from PEXCVZYM12.corporate.adroot.infra.ftgroup ([fe80::81f:1640:4749:5d13]) by PEXCVZYH01.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.02.0328.009; Tue, 15 Oct 2013 17:46:55 +0200 From: To: "stir@ietf.org" Thread-Topic: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt Thread-Index: AQHOwbard6+J3gk4m0SXrO2ksZ5g2Jn17t9w Date: Tue, 15 Oct 2013 15:46:54 +0000 Message-ID: <23536_1381852015_525D636F_23536_8349_1_B5939C6860701C49AA39C5DA5189448B0C533A@PEXCVZYM12.corporate.adroot.infra.ftgroup> References: <20131004222346.32223.87882.idtracker@ietfa.amsl.com> In-Reply-To: <20131004222346.32223.87882.idtracker@ietfa.amsl.com> Accept-Language: fr-FR, en-US Content-Language: fr-FR X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.197.38.1] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-PMX-Version: 6.0.3.2322014, Antispam-Engine: 2.7.2.2107409, Antispam-Data: 2013.10.15.62114 Subject: Re: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 15 Oct 2013 15:47:22 -0000 This draft looks good to me. A few typos & nitpicking: > 1. Introduction [...] > conceptional=20 "functionally" (?) > 2. Problem Statement [...]=20 > through the concept of certificated=20 > carriers "Certified" doesn't read well to me here. "licensed"?=20 > 3. Terminology [...] > telephoone telephone > 4. Use Cases [...] > We generally assume that the PSTN component of any call path cannot > be altered. Not quite clear to me what we mean by this (or equally unclear what the con= sequence would be for the document should we make the opposite assumption..= .) Maybe remove or clarify.=20=20=20 > 4.2. IP-PSTN-IP Call > Frequently, two VoIP-based service providers Would suggest inserting "(VSP)" after that. > 4.4. VoIP-to-PSTN Call Call Probably too many calls here... > 4.5. PSTN-VoIP-PSTN Call > Consequenly Consequently > That said, > national authorities for telephone numbers are increasingly migrating > their provisioning services to the Internet, and issuing credentials > that express authority for telephone numbers to secure those > services.=20=20 The use of plural and "increasingly" seems a bit exaggerated to me. Maybe s= ay "some... are..." Regards, Philippe Fouquart Orange Labs Networks +33 (0) 1 45 29 58 13 -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of int= ernet-drafts@ietf.org Sent: Saturday, October 05, 2013 12:24 AM To: i-d-announce@ietf.org Cc: stir@ietf.org Subject: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt A New Internet-Draft is available from the on-line Internet-Drafts director= ies. This draft is a work item of the Secure Telephone Identity Revisited Worki= ng Group of the IETF. Title : Secure Telephone Identity Problem Statement Author(s) : Jon Peterson Henning Schulzrinne Hannes Tschofenig Filename : draft-ietf-stir-problem-statement-00.txt Pages : 23 Date : 2013-10-04 Abstract: Over the past decade, Voice over IP (VoIP) systems based on SIP have replaced many traditional telephony deployments. Interworking VoIP systems with the traditional telephone network has reduced the overall security of calling party number and Caller ID assurances by granting attackers new and inexpensive tools to impersonate or obscure calling party numbers when orchestrating bulk commercial calling schemes, hacking voicemail boxes or even circumventing multi- factor authentication systems trusted by banks. Despite previous attempts to provide a secure assurance of the origin of SIP communications, we still lack of effective standards for identifying the calling party in a VoIP session. This document examines the reasons why providing identity for telephone numbers on the Internet has proven so difficult, and shows how changes in the last decade may provide us with new strategies for attaching a secure identity to SIP sessions. The IETF datatracker status page for this draft is: https://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement There's also a htmlized version available at: http://tools.ietf.org/html/draft-ietf-stir-problem-statement-00 Please note that it may take a couple of minutes from the time of submission until the htmlized version and diff are available at tools.ietf.org. Internet-Drafts are also available by anonymous FTP at: ftp://ftp.ietf.org/internet-drafts/ _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir ___________________________________________________________________________= ______________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confiden= tielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu= ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el= ectroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou = falsifie. Merci. This message and its attachments may contain confidential or privileged inf= ormation that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and dele= te this message and its attachments. As emails may be altered, Orange is not liable for messages that have been = modified, changed or falsified. Thank you. From br@brianrosen.net Wed Oct 16 06:39:28 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E486B11E8260 for ; Wed, 16 Oct 2013 06:39:28 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.384 X-Spam-Level: X-Spam-Status: No, score=-103.384 tagged_above=-999 required=5 tests=[AWL=0.215, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hh9U6o+oll-s for ; Wed, 16 Oct 2013 06:39:24 -0700 (PDT) Received: from mail-qe0-f48.google.com (mail-qe0-f48.google.com [209.85.128.48]) by ietfa.amsl.com (Postfix) with ESMTP id 3AF5211E8132 for ; Wed, 16 Oct 2013 06:39:23 -0700 (PDT) Received: by mail-qe0-f48.google.com with SMTP id d4so570374qej.21 for ; Wed, 16 Oct 2013 06:39:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=5K3u4/cf2e8Ynrl5TtIzxAqrLAHTaTlXdhlXwX4ljug=; b=fA/5oO6c8x2GZIPhQKhrytB93LTJMuNBk39zimGekTLJxoFmip5sgD0eJSebxBgZ8w o+A8AfMOQKxYw3xVevHaM/XeYYba7MTP9pf+o/8lLr9ZsAI6nYgtVw4ZAY1gVyb/6HLJ /vqoYB95UWGvvkQFJDvHz4e7kbleepkk2fydyAY0KdF/FvImYqPXxvlM8qAnIl9juiLn z5QR6uGgT1x2HBe+/pztBRsjwGmiU8YN2rk+LWa13BxyxIm26XHokdTdzOghfw89kaV3 +LEIpGyuff3Qot/24fJ9x8uko8KNEtBwU8rxu7pNAqUmAeIaHH8bGlcbDCzzkTVFABXb jL0g== X-Gm-Message-State: ALoCoQlmBIheU5JK5Oo/nHQkhNfqCzlXTQZfcxgIAv7IEMmfjL+GJJuq4zzYzth3CZ7YKeTLNI+n X-Received: by 10.224.54.209 with SMTP id r17mr4827985qag.16.1381930762455; Wed, 16 Oct 2013 06:39:22 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id h9sm51829295qaq.9.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 16 Oct 2013 06:39:21 -0700 (PDT) Content-Type: text/plain; charset=windows-1252 Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) From: Brian Rosen In-Reply-To: <71E3420F5D11314D8D989D8B72D247E129FF9406@xmb-aln-x06.cisco.com> Date: Wed, 16 Oct 2013 09:39:19 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <0DEDEC27-D3C2-48E3-9799-A005906CD3D6@brianrosen.net> References: <71E3420F5D11314D8D989D8B72D247E129FF9406@xmb-aln-x06.cisco.com> To: Fernando Mousinho (fmousinh) X-Mailer: Apple Mail (2.1510) Cc: "stir@ietf.org Mail List" Subject: Re: [stir] draft-ietf-stir-problem-statement-00 looks pretty good to me X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Oct 2013 13:39:29 -0000 I think the draft is fairly clear we're talking about public identities. = It mostly talks about telephone numbers, but ISTM the mechanisms we're = discussing probably would work with user@domain IDs, but I think that's = a bonus and not an explicit goal. Similarly, I think internal use would work just fine, but is also not an = explicit goal. Brian On Oct 14, 2013, at 6:11 PM, Fernando Mousinho (fmousinh) = wrote: > Thinking loud=8A maybe these don't need to be addressed: >=20 > - Do we need to specify which types of identities we want to tackle: > public PSTN numbers, private numbers, and/or URIs? Or is "all of the > above" implicit? >=20 > - What about internal use of the solutions (e.g., verifying identities = of > other callers in the same domain - preventing attacks from within)? Do = we > care about this use case or is it assumed to be implicit? >=20 > The draft reads as it inter-domain (inter-company) is the main (only?) > topic, but it could be just me. >=20 >=20 >=20 >=20 >=20 > On 10/14/13 5:34 PM, "Brian Rosen" wrote: >=20 >> I looked at the draft and most of my comments have been addressed, = with >> the couple remaining ones a difference of style not important. >>=20 >> I think it's good enough and would like to send it on its way. >>=20 >> Brian >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 From br@brianrosen.net Wed Oct 16 12:14:52 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6AC7911E8255 for ; Wed, 16 Oct 2013 12:14:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.406 X-Spam-Level: X-Spam-Status: No, score=-103.406 tagged_above=-999 required=5 tests=[AWL=0.193, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qBeAsrP5f9Jj for ; Wed, 16 Oct 2013 12:14:46 -0700 (PDT) Received: from mail-yh0-f51.google.com (mail-yh0-f51.google.com [209.85.213.51]) by ietfa.amsl.com (Postfix) with ESMTP id 4E74911E8147 for ; Wed, 16 Oct 2013 12:14:43 -0700 (PDT) Received: by mail-yh0-f51.google.com with SMTP id 29so286294yhl.24 for ; Wed, 16 Oct 2013 12:14:43 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=I54MAzDfXSY3zQArmUjtqXe8y0s1NubKoXPS6GLAY+s=; b=aMips/tY2iA2KCvz8hUe6NhGL/OyKBOE1+B1+4zSZTxcWw4r/0ZUcZEpflqse7yPXf crWWjUrrwCUkSkvMNRdRsu3EHMGJh/D3kea9mSOngM4F6wMht+hs3I80S1dFktBHus9s iozPzrOoST8jD3TPP5uLPaMRlQ1Su7DdO9Ohzmu4DZX1p96h8xV0dH0GQRub6FeHFMpg sK9y8UT3kbQlhS5GXNFVl2Kt/3i/Ro7K1m9K+AjrF6lHLCKa4a36QWwdGlNnO618/JQf HuePZ8QGj6Jf6Fa6RCna5gUvn4RykmzPakW0FuwhAgqAcmMWse2ASmKXkl/5pfFFT2gF UD1g== X-Gm-Message-State: ALoCoQnOxbtr/PzjUJCSJzxB8dOf98SfWvPzmw+0WgR5ayBAdOZlcMdECxZEj7DgwZYK8wv4Sk3n X-Received: by 10.236.181.6 with SMTP id k6mr1903334yhm.93.1381950882903; Wed, 16 Oct 2013 12:14:42 -0700 (PDT) Received: from [10.33.193.37] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id d26sm122426742yhj.25.1969.12.31.16.00.00 (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 16 Oct 2013 12:14:41 -0700 (PDT) Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) From: Brian Rosen In-Reply-To: <23536_1381852015_525D636F_23536_8349_1_B5939C6860701C49AA39C5DA5189448B0C533A@PEXCVZYM12.corporate.adroot.infra.ftgroup> Date: Wed, 16 Oct 2013 15:14:39 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <2437B7EA-7092-4F3D-81F0-F55C1BB705A8@brianrosen.net> References: <20131004222346.32223.87882.idtracker@ietfa.amsl.com> <23536_1381852015_525D636F_23536_8349_1_B5939C6860701C49AA39C5DA5189448B0C533A@PEXCVZYM12.corporate.adroot.infra.ftgroup> To: philippe.fouquart@orange.com X-Mailer: Apple Mail (2.1510) Cc: "stir@ietf.org" Subject: Re: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 16 Oct 2013 19:14:52 -0000 Minor detail but in 2, "certificated" is a U.S.-centric term that means = a government authorized carrier. The term of art is "certificated" = because a state government entity issues an operating certificate to the = carrier that lets other entities know that it is authorized to provide = service. "Licensed" is pretty close, but not actually what happens in the U.S. I = could deal with "licensed" though - it's clear what it means. Brian On Oct 15, 2013, at 11:46 AM, philippe.fouquart@orange.com wrote: > This draft looks good to me. >=20 > A few typos & nitpicking: >=20 >> 1. Introduction > [...] >> conceptional=20 >=20 > "functionally" (?) >=20 >> 2. Problem Statement > [...]=20 >> through the concept of certificated=20 >> carriers >=20 > "Certified" doesn't read well to me here. "licensed"?=20 >=20 >> 3. Terminology > [...] >> telephoone >=20 > telephone >=20 >> 4. Use Cases > [...] >> We generally assume that the PSTN component of any call path cannot >> be altered. >=20 > Not quite clear to me what we mean by this (or equally unclear what = the consequence would be for the document should we make the opposite = assumption...) Maybe remove or clarify. =20 >=20 >> 4.2. IP-PSTN-IP Call >> Frequently, two VoIP-based service providers >=20 > Would suggest inserting "(VSP)" after that. >=20 >> 4.4. VoIP-to-PSTN Call Call >=20 > Probably too many calls here... >=20 >> 4.5. PSTN-VoIP-PSTN Call >> Consequenly >=20 > Consequently >=20 >> That said, >> national authorities for telephone numbers are increasingly = migrating >> their provisioning services to the Internet, and issuing credentials >> that express authority for telephone numbers to secure those >> services. =20 >=20 > The use of plural and "increasingly" seems a bit exaggerated to me. = Maybe say "some... are..." >=20 > Regards, >=20 > Philippe Fouquart > Orange Labs Networks > +33 (0) 1 45 29 58 13 >=20 > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf = Of internet-drafts@ietf.org > Sent: Saturday, October 05, 2013 12:24 AM > To: i-d-announce@ietf.org > Cc: stir@ietf.org > Subject: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt >=20 >=20 > A New Internet-Draft is available from the on-line Internet-Drafts = directories. > This draft is a work item of the Secure Telephone Identity Revisited = Working Group of the IETF. >=20 > Title : Secure Telephone Identity Problem Statement > Author(s) : Jon Peterson > Henning Schulzrinne > Hannes Tschofenig > Filename : draft-ietf-stir-problem-statement-00.txt > Pages : 23 > Date : 2013-10-04 >=20 > Abstract: > Over the past decade, Voice over IP (VoIP) systems based on SIP have > replaced many traditional telephony deployments. Interworking VoIP > systems with the traditional telephone network has reduced the > overall security of calling party number and Caller ID assurances by > granting attackers new and inexpensive tools to impersonate or > obscure calling party numbers when orchestrating bulk commercial > calling schemes, hacking voicemail boxes or even circumventing = multi- > factor authentication systems trusted by banks. Despite previous > attempts to provide a secure assurance of the origin of SIP > communications, we still lack of effective standards for identifying > the calling party in a VoIP session. This document examines the > reasons why providing identity for telephone numbers on the Internet > has proven so difficult, and shows how changes in the last decade = may > provide us with new strategies for attaching a secure identity to = SIP > sessions. >=20 >=20 > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement >=20 > There's also a htmlized version available at: > http://tools.ietf.org/html/draft-ietf-stir-problem-statement-00 >=20 >=20 > Please note that it may take a couple of minutes from the time of = submission > until the htmlized version and diff are available at tools.ietf.org. >=20 > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir >=20 > = __________________________________________________________________________= _______________________________________________ >=20 > Ce message et ses pieces jointes peuvent contenir des informations = confidentielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez = recu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les = messages electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, = deforme ou falsifie. Merci. >=20 > This message and its attachments may contain confidential or = privileged information that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and = delete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have = been modified, changed or falsified. > Thank you. >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From philippe.fouquart@orange.com Thu Oct 17 01:31:39 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB73C11E8114 for ; Thu, 17 Oct 2013 01:31:39 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.598 X-Spam-Level: X-Spam-Status: No, score=-2.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, UNPARSEABLE_RELAY=0.001] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id peMVF76OgBLA for ; Thu, 17 Oct 2013 01:31:35 -0700 (PDT) Received: from relais-inet.francetelecom.com (relais-ias91.francetelecom.com [193.251.215.91]) by ietfa.amsl.com (Postfix) with ESMTP id F32B611E810D for ; Thu, 17 Oct 2013 01:31:32 -0700 (PDT) Received: from omfedm05.si.francetelecom.fr (unknown [xx.xx.xx.1]) by omfedm14.si.francetelecom.fr (ESMTP service) with ESMTP id AFE8422CC60; Thu, 17 Oct 2013 10:31:31 +0200 (CEST) Received: from Exchangemail-eme1.itn.ftgroup (unknown [10.114.1.183]) by omfedm05.si.francetelecom.fr (ESMTP service) with ESMTP id 7477935C082; Thu, 17 Oct 2013 10:31:31 +0200 (CEST) Received: from PEXCVZYM12.corporate.adroot.infra.ftgroup ([fe80::81f:1640:4749:5d13]) by PEXCVZYH02.corporate.adroot.infra.ftgroup ([::1]) with mapi id 14.02.0347.000; Thu, 17 Oct 2013 10:31:31 +0200 From: To: Brian Rosen Thread-Topic: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt Thread-Index: AQHOwbard6+J3gk4m0SXrO2ksZ5g2Jn17t9wgAG0F4CAAPSc0A== Date: Thu, 17 Oct 2013 08:31:31 +0000 Message-ID: <19616_1381998691_525FA063_19616_4126_2_B5939C6860701C49AA39C5DA5189448B0CE8FE@PEXCVZYM12.corporate.adroot.infra.ftgroup> References: <20131004222346.32223.87882.idtracker@ietfa.amsl.com> <23536_1381852015_525D636F_23536_8349_1_B5939C6860701C49AA39C5DA5189448B0C533A@PEXCVZYM12.corporate.adroot.infra.ftgroup> <2437B7EA-7092-4F3D-81F0-F55C1BB705A8@brianrosen.net> In-Reply-To: <2437B7EA-7092-4F3D-81F0-F55C1BB705A8@brianrosen.net> Accept-Language: fr-FR, en-US Content-Language: fr-FR X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.197.38.3] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-PMX-Version: 5.6.1.2065439, Antispam-Engine: 2.7.2.376379, Antispam-Data: 2013.10.17.43315 Cc: "stir@ietf.org" Subject: Re: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 17 Oct 2013 08:31:39 -0000 Thanks for the background on this, Brian.=20 FWIW this makes me think that people familiar with the EU framework may als= o argue for the use of "authorization" since the individual licensing regim= e has moved to what's called authorizations there (and it's generally more = of a lightweight registration really). Given the context of stir, I just th= ought readers might infer that such carriers always get digital certificate= s if they're "certificated"/registered/authorized/licensed, when they don't= always do - and probably don't in general.=20 But I don't feel strongly one way or another, either.=20 Regards, Philippe Fouquart Orange Labs Networks +33 (0) 1 45 29 58 13 -----Original Message----- From: Brian Rosen [mailto:br@brianrosen.net]=20 Sent: Wednesday, October 16, 2013 9:15 PM To: FOUQUART Philippe IMT/OLN Cc: stir@ietf.org Subject: Re: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt Minor detail but in 2, "certificated" is a U.S.-centric term that means a g= overnment authorized carrier. The term of art is "certificated" because a = state government entity issues an operating certificate to the carrier that= lets other entities know that it is authorized to provide service. "Licensed" is pretty close, but not actually what happens in the U.S. I co= uld deal with "licensed" though - it's clear what it means. Brian On Oct 15, 2013, at 11:46 AM, philippe.fouquart@orange.com wrote: > This draft looks good to me. >=20 > A few typos & nitpicking: >=20 >> 1. Introduction > [...] >> conceptional=20 >=20 > "functionally" (?) >=20 >> 2. Problem Statement > [...]=20 >> through the concept of certificated=20 >> carriers >=20 > "Certified" doesn't read well to me here. "licensed"?=20 >=20 >> 3. Terminology > [...] >> telephoone >=20 > telephone >=20 >> 4. Use Cases > [...] >> We generally assume that the PSTN component of any call path cannot >> be altered. >=20 > Not quite clear to me what we mean by this (or equally unclear what the c= onsequence would be for the document should we make the opposite assumption= ...) Maybe remove or clarify.=20=20=20 >=20 >> 4.2. IP-PSTN-IP Call >> Frequently, two VoIP-based service providers >=20 > Would suggest inserting "(VSP)" after that. >=20 >> 4.4. VoIP-to-PSTN Call Call >=20 > Probably too many calls here... >=20 >> 4.5. PSTN-VoIP-PSTN Call >> Consequenly >=20 > Consequently >=20 >> That said, >> national authorities for telephone numbers are increasingly migrating >> their provisioning services to the Internet, and issuing credentials >> that express authority for telephone numbers to secure those >> services.=20=20 >=20 > The use of plural and "increasingly" seems a bit exaggerated to me. Maybe= say "some... are..." >=20 > Regards, >=20 > Philippe Fouquart > Orange Labs Networks > +33 (0) 1 45 29 58 13 >=20 > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of i= nternet-drafts@ietf.org > Sent: Saturday, October 05, 2013 12:24 AM > To: i-d-announce@ietf.org > Cc: stir@ietf.org > Subject: [stir] I-D Action: draft-ietf-stir-problem-statement-00.txt >=20 >=20 > A New Internet-Draft is available from the on-line Internet-Drafts direct= ories. > This draft is a work item of the Secure Telephone Identity Revisited Work= ing Group of the IETF. >=20 > Title : Secure Telephone Identity Problem Statement > Author(s) : Jon Peterson > Henning Schulzrinne > Hannes Tschofenig > Filename : draft-ietf-stir-problem-statement-00.txt > Pages : 23 > Date : 2013-10-04 >=20 > Abstract: > Over the past decade, Voice over IP (VoIP) systems based on SIP have > replaced many traditional telephony deployments. Interworking VoIP > systems with the traditional telephone network has reduced the > overall security of calling party number and Caller ID assurances by > granting attackers new and inexpensive tools to impersonate or > obscure calling party numbers when orchestrating bulk commercial > calling schemes, hacking voicemail boxes or even circumventing multi- > factor authentication systems trusted by banks. Despite previous > attempts to provide a secure assurance of the origin of SIP > communications, we still lack of effective standards for identifying > the calling party in a VoIP session. This document examines the > reasons why providing identity for telephone numbers on the Internet > has proven so difficult, and shows how changes in the last decade may > provide us with new strategies for attaching a secure identity to SIP > sessions. >=20 >=20 > The IETF datatracker status page for this draft is: > https://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement >=20 > There's also a htmlized version available at: > http://tools.ietf.org/html/draft-ietf-stir-problem-statement-00 >=20 >=20 > Please note that it may take a couple of minutes from the time of submiss= ion > until the htmlized version and diff are available at tools.ietf.org. >=20 > Internet-Drafts are also available by anonymous FTP at: > ftp://ftp.ietf.org/internet-drafts/ >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir >=20 > _________________________________________________________________________= ________________________________________________ >=20 > Ce message et ses pieces jointes peuvent contenir des informations confid= entielles ou privilegiees et ne doivent donc > pas etre diffuses, exploites ou copies sans autorisation. Si vous avez re= cu ce message par erreur, veuillez le signaler > a l'expediteur et le detruire ainsi que les pieces jointes. Les messages = electroniques etant susceptibles d'alteration, > Orange decline toute responsabilite si ce message a ete altere, deforme o= u falsifie. Merci. >=20 > This message and its attachments may contain confidential or privileged i= nformation that may be protected by law; > they should not be distributed, used or copied without authorisation. > If you have received this email in error, please notify the sender and de= lete this message and its attachments. > As emails may be altered, Orange is not liable for messages that have bee= n modified, changed or falsified. > Thank you. >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir ___________________________________________________________________________= ______________________________________________ Ce message et ses pieces jointes peuvent contenir des informations confiden= tielles ou privilegiees et ne doivent donc pas etre diffuses, exploites ou copies sans autorisation. Si vous avez recu= ce message par erreur, veuillez le signaler a l'expediteur et le detruire ainsi que les pieces jointes. Les messages el= ectroniques etant susceptibles d'alteration, Orange decline toute responsabilite si ce message a ete altere, deforme ou = falsifie. Merci. This message and its attachments may contain confidential or privileged inf= ormation that may be protected by law; they should not be distributed, used or copied without authorisation. If you have received this email in error, please notify the sender and dele= te this message and its attachments. As emails may be altered, Orange is not liable for messages that have been = modified, changed or falsified. Thank you. From fluffy@cisco.com Sat Oct 19 22:12:14 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A8CCE11E8162 for ; Sat, 19 Oct 2013 22:12:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -110.599 X-Spam-Level: X-Spam-Status: No, score=-110.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_HI=-8, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3fRNHgCJK9L5 for ; Sat, 19 Oct 2013 22:12:09 -0700 (PDT) Received: from rcdn-iport-9.cisco.com (rcdn-iport-9.cisco.com [173.37.86.80]) by ietfa.amsl.com (Postfix) with ESMTP id 09D8D11E816D for ; Sat, 19 Oct 2013 22:12:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=16901; q=dns/txt; s=iport; t=1382245926; x=1383455526; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=hijl2VLTjAyCpSpK5d42gaci/L51iKIz9S9pjh/qxOo=; b=ED08jxX4kru3eycZWeOxXwDnESyrKkmtTgs3uP5qS9iF0lgf3GyqeRtM 1EOKNvkJKtP7KXwfjCgzZ9bNgild2n4WwTfK6M9DSyZAfpqcPZDFvPEdu rUQ0cbl0pY1NTXdrH4Y7iL2YaPWGSUS3TVJnCww96miCFlEz0S0+/8xMU 8=; X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AggFAA5lY1KtJV2b/2dsb2JhbABQAQYDgwc4VL4zgSAWdIIlAQEBAwEBAQFWFQsFBwQCAQgOAwEDAQEBCh0HJwsUAwYIAgQOBQgTh2UGDb95BI4ZAQMGBYEBAgYbEAcCBAuDDoEKA5QqlWaDJIFoAgcXIg X-IronPort-AV: E=Sophos;i="4.93,532,1378857600"; d="scan'208";a="271234502" Received: from rcdn-core-4.cisco.com ([173.37.93.155]) by rcdn-iport-9.cisco.com with ESMTP; 20 Oct 2013 05:12:05 +0000 Received: from xhc-rcd-x10.cisco.com (xhc-rcd-x10.cisco.com [173.37.183.84]) by rcdn-core-4.cisco.com (8.14.5/8.14.5) with ESMTP id r9K5C4Oc015800 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=FAIL); Sun, 20 Oct 2013 05:12:04 GMT Received: from xmb-aln-x02.cisco.com ([169.254.5.143]) by xhc-rcd-x10.cisco.com ([173.37.183.84]) with mapi id 14.02.0318.004; Sun, 20 Oct 2013 00:12:04 -0500 From: "Cullen Jennings (fluffy)" To: Brian Rosen Thread-Topic: [stir] Call Center Implications Thread-Index: AQHOzVLqVcqY5phDgki6OmYv42qajQ== Date: Sun, 20 Oct 2013 05:12:03 +0000 Message-ID: References: <71E3420F5D11314D8D989D8B72D247E129FE2079@xmb-aln-x06.cisco.com> <1B06BEFF-E7AC-4B30-B9D5-844E1192B4CB@brianrosen.net> In-Reply-To: <1B06BEFF-E7AC-4B30-B9D5-844E1192B4CB@brianrosen.net> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.20.249.164] Content-Type: text/plain; charset="iso-8859-2" Content-ID: <794AECF2E3D05749B9C46BC3E21EEB07@emea.cisco.com> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "Gregory.Schumacher@sprint.com" , Richard Shockey , Henning Schulzrinne , "stir@ietf.org" , Alex Bobotek , Michael Hammer , "Fernando Mousinho \(fmousinh\)" Subject: Re: [stir] Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 20 Oct 2013 05:12:14 -0000 What Fernando is saying makes sense to me a desirable property of the solut= ion and I agree that if we gave each BPO a different private key that woul= d solve it but that might be pretty hard to mange in other ways. I like the= requirements but the solution is not 100% obvious to me.=20 On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: > Sure. >=20 > Each BPO would have a different private/public key pair. >=20 > So you can trace which one placed the call. >=20 > Brian >=20 > On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh) wrote: >=20 >> Point taken on PAI, but am still struggling with this BPO model. Apologi= es >> upfront if this is obvious and I'm just failing to understand. >>=20 >> If the company hires several BPOs and authorizes all of them to sign cal= ls >> on its behalf, is there a way to trace back the originator (specific BPO= ) >> later on? I suppose that at some level the actual caller must be exposed >> (perhaps to trace malicious activity, such as malicious person infiltrat= ed >> in an otherwise legitimate BPO). >>=20 >> Via headers would be the obvious pick, but they don't survive the pletho= ra >> of SBCs that the call is likely to transverse. Or maybe the certs >> themselves can carry this type of data (actual caller identity). >>=20 >>=20 >>=20 >>=20 >> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>=20 >>> Don't think that would work without related changes in the networks. I= n >>> some networks, PAI is used for called id. They would have to change to >>> use From (if signed maybe). It also doesn't fit the definition of PAI. >>>=20 >>> Brian >>>=20 >>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh) >>> wrote: >>>=20 >>>> Could a signed PAI be a potential solution to the BPO use case? "From" >>>> identifies the BPO, "PAI" the c >>>> ompany hiring the BPO - based on the delegation process Rosen mentions= . >>>> PAI's use is widespread, and it's main limitation is being spoofable - >>>> but this is exactly the problem we are trying to solve anyway. >>>>=20 >>>>=20 >>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey" >>>>> wrote: >>>>>=20 >>>>> Excellent point a profile or BCP to complement the work. >>>>>=20 >>>>> -----Original Message----- >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>>> Of Alex >>>>> Bobotek >>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; >>>>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>> Cc: stir@ietf.org >>>>> Subject: Re: [stir] Call Center Implications >>>>>=20 >>>>> +1 >>>>> I've assumed that we are headed towards a "sign whatever extras you >>>>> wish, >>>>> and indicate what your signature covers" mechanism. >>>>>=20 >>>>> Based on this, standards would need to identify only a minimal subset >>>>> of >>>>> what shall/should be signed, and ensure that any required group of >>>>> signed >>>>> items survives transit intact. >>>>>=20 >>>>> Best signing practices may be needed to complement the standard, and = an >>>>> appropriate place for all but the most basic 'what to sign' >>>>> recommendations. >>>>>=20 >>>>>=20 >>>>>=20 >>>>> Regards, >>>>>=20 >>>>> Alex >>>>>=20 >>>>>> -----Original Message----- >>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>>>> Of Henning Schulzrinne >>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>> To: Michael Hammer; fmousinh@cisco.com; Gregory.Schumacher@sprint.co= m; >>>>>> br@brianrosen.net >>>>>> Cc: stir@ietf.org >>>>>> Subject: Re: [stir] Call Center Implications >>>>>>=20 >>>>>> I see no reason not to allow signing any number-related field in the >>>>>> SIP request. (Signing may well be done by different parties.) >>>>>>=20 >>>>>> As far as I know, callback numbers (SIP Reply-To) aren't conveyable >>>>>> in=20 >>>>>> legacy systems, however, so this may be of somewhat limited use for = a >>>>> while. >>>>>>=20 >>>>>> ________________________________________ >>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf of >>>>>> Michael Hammer [michael.hammer@yaanatech.com] >>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com; >>>>>> br@brianrosen.net >>>>>> Cc: stir@ietf.org >>>>>> Subject: Re: [stir] Call Center Implications >>>>>>=20 >>>>>> Don't we still want to know the true originator of the call, even >>>>>> when=20 >>>>>> we have some token that says "Doctor so and so approved this message= ." >>>>>>=20 >>>>>> Originating number, display number, and call-back number could be 3 >>>>>> different things. >>>>>> Should all of them be verifiable? >>>>>>=20 >>>>>> Mike >>>>>>=20 >>>>>>=20 >>>>>> -----Original Message----- >>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf >>>>>> Of Fernando Mousinho (fmousinh) >>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>> Cc: stir@ietf.org >>>>>> Subject: Re: [stir] Call Center Implications >>>>>>=20 >>>>>> I believe the scenario telemarketing here is when a client hires a >>>>>> BPO=20 >>>>>> to place outbound calls, but expect customers to return these calls >>>>>> to=20 >>>>>> a different place (say, their own and operated call center). This >>>>>> way,=20 >>>>>> this client is authorizing the BPO to use an identity that it (BPO) >>>>> doesn't own. >>>>>> These numbers in this scenario are always operational, just at a >>>>>> different place. >>>>>>=20 >>>>>> The same telemarketing operator would then outpulse multiple numbers >>>>>> for their multiple clients, none of these numbers belonging to the >>>>> telemarketer. >>>>>> BTW, we are using the term "telemarketing" in a very generic sense - >>>>>> this could just as easily be a public service announcement, >>>>>> fundraiser, >>>>> etc. >>>>>>=20 >>>>>> If the telemarketer happens to own the inbound call center as well, >>>>>> it=20 >>>>>> very likely owns the number as well and this would necessarily be a >>>>>> special case >>>>>> - it would fall under the same characteristics of any call center. >>>>>>=20 >>>>>> On a different note, it would help a lot of we standardized >>>>>> terminology. >>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it may be >>>>>> hard=20 >>>>>> for others to follow the discussion later. >>>>>>=20 >>>>>>=20 >>>>>>=20 >>>>>> (generic term for any type of outbound calling, including public >>>>>> service announcement, so don't think it's all about sales!) >>>>>>=20 >>>>>>=20 >>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>> wrote: >>>>>>=20 >>>>>>> There are some benefits from this approach, but also some scenarios >>>>>>> that need clarification how they could function. >>>>>>>=20 >>>>>>> The benefit is that the credential represents both the company >>>>>>> "responsible" for the sales campaign (the "company" in your >>>>>>> scenario)=20 >>>>>>> and the company operating the sales campaign (the call center in >>>>>>> your=20 >>>>>>> scenario). For the use in forensics (after the fact analysis) such >>>>>>> as pursuit of fraud investigation, we then can follow both paths. >>>>>>>=20 >>>>>>> However can you clarify the following - >>>>>>> - If a SP "signs" the call, is it attesting to the "responsible" >>>>>>> party for the telemarketing call or the party executing the >>>>>>> telemarketing campaign or both? >>>>>>>=20 >>>>>>> - How is the SP supposed to know all the parties that it is >>>>>>> attesting=20 >>>>>>> to >>>>>>> - the responsible party and/or executing party? >>>>>>>=20 >>>>>>> -It seems likely that some of the numbers assigned to a company in >>>>>>> your scenario will not be assigned to real telephones (or call >>>>>>> center=20 >>>>>>> trunk) until a telemarketing campaign is initiated or a call center >>>>>>> selected to execute the sales campaign, is it possible to have thes= e >>>>>>> unassigned or floating numbers when not in use for a telemarketing >>>>>>> campaign? Is it allowed under most national numbering regimes? >>>>>>>=20 >>>>>>> - How important is it to have a known or recognized phone number as >>>>>>> the caller id as part of a telemarketing campaign? I am assuming >>>>>>> that not all campaigns care about having a number that is known or >>>>> recognized. >>>>>>>=20 >>>>>>> -In other words for this last bit, if a call center (telemarketing >>>>>>> campaign operator) is using their own set of numbers but serve >>>>>>> multiple simultaneous telemarketing campaigns using the same >>>>>>> originating numbers, what will they sign? Will they just have a >>>>>>> credential representing the call center alone, or a different >>>>>>> credential per telemarketing campaign, or a different credential pe= r >>>>>>> responsible party (per client)? This will affect what is possible >>>>>>> for >>>>> any forensic activity. >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behal= f >>>>>>> Of Brian Rosen >>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>> To: Fernando Mousinho >>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> We have a requirement to support the BPO use case. >>>>>>>=20 >>>>>>> The notion we had is that the company contracting the call center >>>>>>> approves the use, and the call center, or the SP acting on its >>>>>>> behalf, signs. >>>>>>> Think of this as another level of delegation. An SP delegates >>>>>>> numbers to the company. The company "delegates" use of those >>>>>>> numbers=20 >>>>>>> to the call center. The call center calls, using that delegation. >>>>>>> The credentials of the call center would be different from those of >>>>>>> the company, but would cover the same number. Having multiple >>>>>>> credentials covering the same number will be very common due to the >>>>>>> way delegation happens. In order to allow SPs to sign, without >>>>>>> creating credential per TN, we allow credentials with ranges. The >>>>>>> ranges could overlap when delegation happens. >>>>>>>=20 >>>>>>> Consider the following complex US case: >>>>>>> The North American Number Plan Administrator delegates 202-555-xxxx >>>>>>> to the Pooling Administrator. The PA now has a credential covering >>>>>>> the entire 10K block. >>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP A has >>>>>>> a=20 >>>>>>> credential for the entire 1K block SP A resells 202-555-12xx to SP = B >>>>>>> . >>>>>>> SP B has a credential for a 100 TN block SP B delegates 202-555-123= x >>>>>>> to Company C. Company C has a credential for a 10 number block >>>>>>> Company C authorizes 202-555-1234 to BPO D. BPO D has credential >>>>>>> for=20 >>>>>>> a 1 number block >>>>>>>=20 >>>>>>> NANPA and the PA never are in a call path, so they would never sign >>>>>>> a=20 >>>>>>> call. >>>>>>>=20 >>>>>>> However, SP A or SP B could sign a call from either Company C or BP= O >>>>>>> D using the credential they have. >>>>>>>=20 >>>>>>> The SP for the call center could acquire credentials from the BPO >>>>>>> and=20 >>>>>>> sign on its behalf. I suspect than many service providers would be >>>>>>> reluctant to do so unless the numbers were from their own inventory >>>>>>> (that is, the company got its numbers from the same SP as the call >>>>> center). >>>>>>> Since that won't be the common case, the call center probably has t= o >>>>>>> do the signing itself. >>>>>>>=20 >>>>>>> Brian >>>>>>>=20 >>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh) >>>>>>> wrote: >>>>>>>=20 >>>>>>>> I agree, Hadriel. While large call centers (including BPOs, which >>>>>>>> provide services for other companies) may have special arrangement= s >>>>>>>> with SPs, the majority (small to mid-size) will probably rely on >>>>>>>> the SPs to do provide to vouch for their identity. This would >>>>>>>> probably be the case for the home analog caller anyway. This would >>>>>>>> imply that the "originating" SP's willingness to provide this >>>>>>>> signature is a critical success factor for the proposal's adoption= . >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> But back to the business process outsourcers (BPO) case - where a >>>>>>>> call center is providing service on behalf of multiple companies. = I >>>>>>>> can see the value of them sending different numbers based on the >>>>>>>> clients they represent. Wouldn't that create a billing issue thoug= h? >>>>>>>> This is not an area I understand well, but I would suspect that SP >>>>>>>> 1 allowing one of its subscribers to send an outbound call using a >>>>>>>> number registered to SP 2 could be a no-no. If this hypothesis is >>>>>>>> correct, then we are back to the case where the SP is signing all >>>>>>>> calls, >>>>>> even for BPOs. >>>>>>>>=20 >>>>>>>> Or maybe this is another problem we are trying to fix in the >>>>>>>> working group, in which case we perhaps should state as a goal or >>>>> benefit: >>>>>>>> "providing a reliable mechanism to let calls originated from one >>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>=20 >>>>>>>> Fernando >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>> wrote: >>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> Any of them could do it. My guess is service providers will do i= t >>>>>>>>> for most call centers, although larger call centers might do it >>>>>>>>> themselves... >>>>>>>>> especially ones which have trunks from multiple providers and can >>>>>>>>> source calls using the same number(s) out through multiple >>>>>>>>> providers on a call-by-call basis. >>>>>>>>>=20 >>>>>>>>> -hadriel >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh) >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> I'm catching up with the discussions in this working group, and >>>>>>>>>> am trying to understand some architecture implications in call >>>>>>>>>> centers (which is where my background is). It seems that many of >>>>>>>>>> the problems we are trying to fix are related to contact centers >>>>>>>>>> anyway, so it is probably a good idea to have everyone in the >>>>>>>>>> same >>>>>> page. >>>>>>>>>>=20 >>>>>>>>>> Forgive me if it is an obvious question, but which components in >>>>>>>>>> a "typical call center architecture" do you see signature and >>>>>>>>>> verification taking place? Such "typical" deployments have >>>>>>>>>> premises based equipment (PME), a session border controller (SBC= ) >>>>>>>>>> and of course a SIP service provider all three could potentiall= y >>>>>>>>>> be used throughout the authorization process. There are differen= t >>>>>>>>>> ramifications depending on where your mind is at. >>>>>>>>>>=20 >>>>>>>>>> Fernando Mousinho >>>>>>>>>> Cisco Systems >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>>>=20 >>>>>>> ________________________________ >>>>>>>=20 >>>>>>> This e-mail may contain Sprint proprietary information intended for >>>>>>> the sole use of the recipient(s). Any use by others is prohibited. >>>>>>> If=20 >>>>>>> you are not the intended recipient, please contact the sender and >>>>>>> delete all copies of the message. >>>>>>>=20 >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>=20 >>>>>> _______________________________________________ >>>>>> stir mailing list >>>>>> stir@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>> _______________________________________________ >>>>>> stir mailing list >>>>>> stir@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>> _______________________________________________ >>>>> stir mailing list >>>>> stir@ietf.org >>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>=20 >>>=20 >>=20 >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From br@brianrosen.net Mon Oct 21 06:18:23 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1577011E8587 for ; Mon, 21 Oct 2013 06:18:22 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.423 X-Spam-Level: X-Spam-Status: No, score=-103.423 tagged_above=-999 required=5 tests=[AWL=0.176, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id PdYGZrJJ5aVy for ; Mon, 21 Oct 2013 06:18:13 -0700 (PDT) Received: from mail-gg0-f173.google.com (mail-gg0-f173.google.com [209.85.161.173]) by ietfa.amsl.com (Postfix) with ESMTP id DE4EF11E8562 for ; Mon, 21 Oct 2013 06:15:49 -0700 (PDT) Received: by mail-gg0-f173.google.com with SMTP id e5so105978ggk.18 for ; Mon, 21 Oct 2013 06:15:48 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=cD6gJ+4cJL5ba62EwUnyRev3cC+EiGwIunwuMg+MnLY=; b=NA0sPHP/6b2/yJT6vWs1pvIF8SMxtfnoKokhezG6BvvjJQmnykjkoMLwhkP9QKUbrH X3haxpwwIT6aNWJUYBKo5YAaIT5GRWsO2Pd1XwSEHvX2Hz4TPnGjHStv1dhqntzIEW+T vgO9QipPJgbxa+RiZ7TQQ31bIJPEt3dbFrRTTlCNbCJ2by3A/oI3ir/AkLhQ1ssCNcMJ GoLxJtrAaDDwyY5K010wu/KT/69vGGn+vWgiE4RRyt9IwwdMRuLIUuLfbAWyWy4s8ORF Gl3UXVWiEvS2vjWhubnNb3WCsRIGhTgxKnI06ncymptpSlJd8qVKfv0QUeRtTEcOIwLc WJog== X-Gm-Message-State: ALoCoQkhqsSNMWBcnlA7jm0pnFmkAKlBs3F67tlly/t+zGuyLHhQSeEc93+0gW1Mm8bciFDMO/nF X-Received: by 10.236.139.198 with SMTP id c46mr997031yhj.78.1382361348707; Mon, 21 Oct 2013 06:15:48 -0700 (PDT) Received: from [10.33.192.35] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id 9sm26707510yhe.21.2013.10.21.06.15.47 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Mon, 21 Oct 2013 06:15:48 -0700 (PDT) Content-Type: text/plain; charset=iso-8859-2 Mime-Version: 1.0 (Mac OS X Mail 6.6 \(1510\)) From: Brian Rosen In-Reply-To: Date: Mon, 21 Oct 2013 09:15:46 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> References: <71E3420F5D11314D8D989D8B72D247E129FE2079@xmb-aln-x06.cisco.com> <1B06BEFF-E7AC-4B30-B9D5-844E1192B4CB@brianrosen.net> To: Cullen Jennings (fluffy) X-Mailer: Apple Mail (2.1510) Cc: "Gregory.Schumacher@sprint.com" , Richard Shockey , Henning Schulzrinne , "stir@ietf.org" , Alex Bobotek , Michael Hammer , "Fernando Mousinho \(fmousinh\)" Subject: Re: [stir] Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Oct 2013 13:18:23 -0000 We really need to give each BPO different keys I think. The notion = that we are sharing private keys among multiple competing entities who = provide services for a single enterprise strikes me as a VBI (Very Bad = Idea). I can't see any real difficulty in having more than one = authorized entity, each with it's own credentials. Who would have a = problem? We're already agreeing that there are multiple credentials for = a number, because the number gets delegated multiple times. Consider, = just as an example, the BPO and the contracting enterprise that was = actually delegated the number can both send calls from that number. You = certainly don't want the enterprise giving out IT'S key to it's = contractors. At best it's a key it authorizes to one or more of it's = BPOs. Brian On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy) = wrote: >=20 > What Fernando is saying makes sense to me a desirable property of the = solution and I agree that if we gave each BPO a different private key = that would solve it but that might be pretty hard to mange in other = ways. I like the requirements but the solution is not 100% obvious to = me.=20 >=20 >=20 > On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >=20 >> Sure. >>=20 >> Each BPO would have a different private/public key pair. >>=20 >> So you can trace which one placed the call. >>=20 >> Brian >>=20 >> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh) = wrote: >>=20 >>> Point taken on PAI, but am still struggling with this BPO model. = Apologies >>> upfront if this is obvious and I'm just failing to understand. >>>=20 >>> If the company hires several BPOs and authorizes all of them to sign = calls >>> on its behalf, is there a way to trace back the originator (specific = BPO) >>> later on? I suppose that at some level the actual caller must be = exposed >>> (perhaps to trace malicious activity, such as malicious person = infiltrated >>> in an otherwise legitimate BPO). >>>=20 >>> Via headers would be the obvious pick, but they don't survive the = plethora >>> of SBCs that the call is likely to transverse. Or maybe the certs >>> themselves can carry this type of data (actual caller identity). >>>=20 >>>=20 >>>=20 >>>=20 >>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>=20 >>>> Don't think that would work without related changes in the = networks. In >>>> some networks, PAI is used for called id. They would have to = change to >>>> use =46rom (if signed maybe). It also doesn't fit the definition = of PAI. >>>>=20 >>>> Brian >>>>=20 >>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh) >>>> wrote: >>>>=20 >>>>> Could a signed PAI be a potential solution to the BPO use case? = "From" >>>>> identifies the BPO, "PAI" the c >>>>> ompany hiring the BPO - based on the delegation process Rosen = mentions. >>>>> PAI's use is widespread, and it's main limitation is being = spoofable - >>>>> but this is exactly the problem we are trying to solve anyway. >>>>>=20 >>>>>=20 >>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey" = >>>>>> wrote: >>>>>>=20 >>>>>> Excellent point a profile or BCP to complement the work. >>>>>>=20 >>>>>> -----Original Message----- >>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>>> Of Alex >>>>>> Bobotek >>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; >>>>>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>> Cc: stir@ietf.org >>>>>> Subject: Re: [stir] Call Center Implications >>>>>>=20 >>>>>> +1 >>>>>> I've assumed that we are headed towards a "sign whatever extras = you >>>>>> wish, >>>>>> and indicate what your signature covers" mechanism. >>>>>>=20 >>>>>> Based on this, standards would need to identify only a minimal = subset >>>>>> of >>>>>> what shall/should be signed, and ensure that any required group = of >>>>>> signed >>>>>> items survives transit intact. >>>>>>=20 >>>>>> Best signing practices may be needed to complement the standard, = and an >>>>>> appropriate place for all but the most basic 'what to sign' >>>>>> recommendations. >>>>>>=20 >>>>>>=20 >>>>>>=20 >>>>>> Regards, >>>>>>=20 >>>>>> Alex >>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>>>> Of Henning Schulzrinne >>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>> To: Michael Hammer; fmousinh@cisco.com; = Gregory.Schumacher@sprint.com; >>>>>>> br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> I see no reason not to allow signing any number-related field in = the >>>>>>> SIP request. (Signing may well be done by different parties.) >>>>>>>=20 >>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't = conveyable >>>>>>> in=20 >>>>>>> legacy systems, however, so this may be of somewhat limited use = for a >>>>>> while. >>>>>>>=20 >>>>>>> ________________________________________ >>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf of >>>>>>> Michael Hammer [michael.hammer@yaanatech.com] >>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com; >>>>>>> br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> Don't we still want to know the true originator of the call, = even >>>>>>> when=20 >>>>>>> we have some token that says "Doctor so and so approved this = message." >>>>>>>=20 >>>>>>> Originating number, display number, and call-back number could = be 3 >>>>>>> different things. >>>>>>> Should all of them be verifiable? >>>>>>>=20 >>>>>>> Mike >>>>>>>=20 >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>>>> Of Fernando Mousinho (fmousinh) >>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> I believe the scenario telemarketing here is when a client hires = a >>>>>>> BPO=20 >>>>>>> to place outbound calls, but expect customers to return these = calls >>>>>>> to=20 >>>>>>> a different place (say, their own and operated call center). = This >>>>>>> way,=20 >>>>>>> this client is authorizing the BPO to use an identity that it = (BPO) >>>>>> doesn't own. >>>>>>> These numbers in this scenario are always operational, just at a >>>>>>> different place. >>>>>>>=20 >>>>>>> The same telemarketing operator would then outpulse multiple = numbers >>>>>>> for their multiple clients, none of these numbers belonging to = the >>>>>> telemarketer. >>>>>>> BTW, we are using the term "telemarketing" in a very generic = sense - >>>>>>> this could just as easily be a public service announcement, >>>>>>> fundraiser, >>>>>> etc. >>>>>>>=20 >>>>>>> If the telemarketer happens to own the inbound call center as = well, >>>>>>> it=20 >>>>>>> very likely owns the number as well and this would necessarily = be a >>>>>>> special case >>>>>>> - it would fall under the same characteristics of any call = center. >>>>>>>=20 >>>>>>> On a different note, it would help a lot of we standardized >>>>>>> terminology. >>>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it may = be >>>>>>> hard=20 >>>>>>> for others to follow the discussion later. >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> (generic term for any type of outbound calling, including public >>>>>>> service announcement, so don't think it's all about sales!) >>>>>>>=20 >>>>>>>=20 >>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>> wrote: >>>>>>>=20 >>>>>>>> There are some benefits from this approach, but also some = scenarios >>>>>>>> that need clarification how they could function. >>>>>>>>=20 >>>>>>>> The benefit is that the credential represents both the company >>>>>>>> "responsible" for the sales campaign (the "company" in your >>>>>>>> scenario)=20 >>>>>>>> and the company operating the sales campaign (the call center = in >>>>>>>> your=20 >>>>>>>> scenario). For the use in forensics (after the fact analysis) = such >>>>>>>> as pursuit of fraud investigation, we then can follow both = paths. >>>>>>>>=20 >>>>>>>> However can you clarify the following - >>>>>>>> - If a SP "signs" the call, is it attesting to the = "responsible" >>>>>>>> party for the telemarketing call or the party executing the >>>>>>>> telemarketing campaign or both? >>>>>>>>=20 >>>>>>>> - How is the SP supposed to know all the parties that it is >>>>>>>> attesting=20 >>>>>>>> to >>>>>>>> - the responsible party and/or executing party? >>>>>>>>=20 >>>>>>>> -It seems likely that some of the numbers assigned to a company = in >>>>>>>> your scenario will not be assigned to real telephones (or call >>>>>>>> center=20 >>>>>>>> trunk) until a telemarketing campaign is initiated or a call = center >>>>>>>> selected to execute the sales campaign, is it possible to have = these >>>>>>>> unassigned or floating numbers when not in use for a = telemarketing >>>>>>>> campaign? Is it allowed under most national numbering regimes? >>>>>>>>=20 >>>>>>>> - How important is it to have a known or recognized phone = number as >>>>>>>> the caller id as part of a telemarketing campaign? I am = assuming >>>>>>>> that not all campaigns care about having a number that is known = or >>>>>> recognized. >>>>>>>>=20 >>>>>>>> -In other words for this last bit, if a call center = (telemarketing >>>>>>>> campaign operator) is using their own set of numbers but serve >>>>>>>> multiple simultaneous telemarketing campaigns using the same >>>>>>>> originating numbers, what will they sign? Will they just have = a >>>>>>>> credential representing the call center alone, or a different >>>>>>>> credential per telemarketing campaign, or a different = credential per >>>>>>>> responsible party (per client)? This will affect what is = possible >>>>>>>> for >>>>>> any forensic activity. >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On = Behalf >>>>>>>> Of Brian Rosen >>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>> To: Fernando Mousinho >>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>=20 >>>>>>>> The notion we had is that the company contracting the call = center >>>>>>>> approves the use, and the call center, or the SP acting on its >>>>>>>> behalf, signs. >>>>>>>> Think of this as another level of delegation. An SP delegates >>>>>>>> numbers to the company. The company "delegates" use of those >>>>>>>> numbers=20 >>>>>>>> to the call center. The call center calls, using that = delegation. >>>>>>>> The credentials of the call center would be different from = those of >>>>>>>> the company, but would cover the same number. Having multiple >>>>>>>> credentials covering the same number will be very common due to = the >>>>>>>> way delegation happens. In order to allow SPs to sign, without >>>>>>>> creating credential per TN, we allow credentials with ranges. = The >>>>>>>> ranges could overlap when delegation happens. >>>>>>>>=20 >>>>>>>> Consider the following complex US case: >>>>>>>> The North American Number Plan Administrator delegates = 202-555-xxxx >>>>>>>> to the Pooling Administrator. The PA now has a credential = covering >>>>>>>> the entire 10K block. >>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP A = has >>>>>>>> a=20 >>>>>>>> credential for the entire 1K block SP A resells 202-555-12xx to = SP B >>>>>>>> . >>>>>>>> SP B has a credential for a 100 TN block SP B delegates = 202-555-123x >>>>>>>> to Company C. Company C has a credential for a 10 number block >>>>>>>> Company C authorizes 202-555-1234 to BPO D. BPO D has = credential >>>>>>>> for=20 >>>>>>>> a 1 number block >>>>>>>>=20 >>>>>>>> NANPA and the PA never are in a call path, so they would never = sign >>>>>>>> a=20 >>>>>>>> call. >>>>>>>>=20 >>>>>>>> However, SP A or SP B could sign a call from either Company C = or BPO >>>>>>>> D using the credential they have. >>>>>>>>=20 >>>>>>>> The SP for the call center could acquire credentials from the = BPO >>>>>>>> and=20 >>>>>>>> sign on its behalf. I suspect than many service providers = would be >>>>>>>> reluctant to do so unless the numbers were from their own = inventory >>>>>>>> (that is, the company got its numbers from the same SP as the = call >>>>>> center). >>>>>>>> Since that won't be the common case, the call center probably = has to >>>>>>>> do the signing itself. >>>>>>>>=20 >>>>>>>> Brian >>>>>>>>=20 >>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh) >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> I agree, Hadriel. While large call centers (including BPOs, = which >>>>>>>>> provide services for other companies) may have special = arrangements >>>>>>>>> with SPs, the majority (small to mid-size) will probably rely = on >>>>>>>>> the SPs to do provide to vouch for their identity. This would >>>>>>>>> probably be the case for the home analog caller anyway. This = would >>>>>>>>> imply that the "originating" SP's willingness to provide this >>>>>>>>> signature is a critical success factor for the proposal's = adoption. >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> But back to the business process outsourcers (BPO) case - = where a >>>>>>>>> call center is providing service on behalf of multiple = companies. I >>>>>>>>> can see the value of them sending different numbers based on = the >>>>>>>>> clients they represent. Wouldn't that create a billing issue = though? >>>>>>>>> This is not an area I understand well, but I would suspect = that SP >>>>>>>>> 1 allowing one of its subscribers to send an outbound call = using a >>>>>>>>> number registered to SP 2 could be a no-no. If this hypothesis = is >>>>>>>>> correct, then we are back to the case where the SP is signing = all >>>>>>>>> calls, >>>>>>> even for BPOs. >>>>>>>>>=20 >>>>>>>>> Or maybe this is another problem we are trying to fix in the >>>>>>>>> working group, in which case we perhaps should state as a goal = or >>>>>> benefit: >>>>>>>>> "providing a reliable mechanism to let calls originated from = one >>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>=20 >>>>>>>>> Fernando >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" = >>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> Any of them could do it. My guess is service providers will = do it >>>>>>>>>> for most call centers, although larger call centers might do = it >>>>>>>>>> themselves... >>>>>>>>>> especially ones which have trunks from multiple providers and = can >>>>>>>>>> source calls using the same number(s) out through multiple >>>>>>>>>> providers on a call-by-call basis. >>>>>>>>>>=20 >>>>>>>>>> -hadriel >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh) >>>>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>> I'm catching up with the discussions in this working group, = and >>>>>>>>>>> am trying to understand some architecture implications in = call >>>>>>>>>>> centers (which is where my background is). It seems that = many of >>>>>>>>>>> the problems we are trying to fix are related to contact = centers >>>>>>>>>>> anyway, so it is probably a good idea to have everyone in = the >>>>>>>>>>> same >>>>>>> page. >>>>>>>>>>>=20 >>>>>>>>>>> Forgive me if it is an obvious question, but which = components in >>>>>>>>>>> a "typical call center architecture" do you see signature = and >>>>>>>>>>> verification taking place? Such "typical" deployments have >>>>>>>>>>> premises based equipment (PME), a session border controller = (SBC) >>>>>>>>>>> and of course a SIP service provider all three could = potentially >>>>>>>>>>> be used throughout the authorization process. There are = different >>>>>>>>>>> ramifications depending on where your mind is at. >>>>>>>>>>>=20 >>>>>>>>>>> Fernando Mousinho >>>>>>>>>>> Cisco Systems >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> ________________________________ >>>>>>>>=20 >>>>>>>> This e-mail may contain Sprint proprietary information intended = for >>>>>>>> the sole use of the recipient(s). Any use by others is = prohibited. >>>>>>>> If=20 >>>>>>>> you are not the intended recipient, please contact the sender = and >>>>>>>> delete all copies of the message. >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>> _______________________________________________ >>>>>> stir mailing list >>>>>> stir@ietf.org >>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>=20 >>>>=20 >>>=20 >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 From richard@shockey.us Mon Oct 21 15:11:02 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AFD8011E873E for ; Mon, 21 Oct 2013 15:11:02 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -99.998 X-Spam-Level: X-Spam-Status: No, score=-99.998 tagged_above=-999 required=5 tests=[BAYES_50=0.001, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W49rp5lDnhZ5 for ; Mon, 21 Oct 2013 15:10:57 -0700 (PDT) Received: from qproxy1-pub.mail.unifiedlayer.com (qproxy1-pub.mail.unifiedlayer.com [173.254.64.10]) by ietfa.amsl.com (Postfix) with SMTP id D3A0A11E8776 for ; Mon, 21 Oct 2013 15:10:32 -0700 (PDT) Received: (qmail 26297 invoked by uid 0); 21 Oct 2013 22:10:10 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by qproxy1.mail.unifiedlayer.com with SMTP; 21 Oct 2013 22:10:10 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:To:From; bh=GYyNRbAWXOJkl2eFLZ55OZMcHnJkeXfliIZM43WseAg=; b=GasmxqPxYmgeww+IKBUuQKwJfDWiSIWL/nSQBhBalu0iD6Ztp75fF9pGL/loMJHHFM/GwuV3Ct5SgQNRSBdXAY3j8Wb+j5HV6GQzofbDJSmP0MTqOgdNslWTImbLtcjZ; Received: from [198.154.186.163] (port=54033 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VYNfu-0001Sl-L2 for stir@ietf.org; Mon, 21 Oct 2013 16:10:10 -0600 From: "Richard Shockey" To: Date: Mon, 21 Oct 2013 18:10:07 -0400 Message-ID: <014a01ceceaa$4dc7b960$e9572c20$@shockey.us> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_014B_01CECE88.C6B61960" X-Mailer: Microsoft Outlook 15.0 Thread-Index: Ac7OqkGMSl6vo2TWRKGNfU4q0GsBDA== Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 198.154.186.163 authed with richard@shockey.us} Subject: [stir] International enforcement agencies join forces to thwart caller identification spoofing X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 21 Oct 2013 22:11:02 -0000 This is a multipart message in MIME format. ------=_NextPart_000_014B_01CECE88.C6B61960 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit FYI . http://www.crtc.gc.ca/eng/com100/2013/r131021.htm#.UmWltlN8CaU Richard Shockey Shockey Consulting Chairman of the Board of Directors SIP Forum PSTN Mobile: +1 703.593.2683 < mailto:richard(at)shockey.us> skype-linkedin-facebook: rshockey101 http//www.sipforum.org "Money is the answer, what is the question?" tm ------=_NextPart_000_014B_01CECE88.C6B61960 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

 

FYI = …

 

http://www.crtc.gc.ca/eng/com100/2013/r131021.htm#.UmWl= tlN8CaU

 

Richard = Shockey
Shockey Consulting
Chairman of the Board of Directors SIP = Forum
PSTN Mobile: +1 703.593.2683
<mailto:richard(at)shockey.us>
skype= -linkedin-facebook: = rshockey101
http//www.sipforum.org

"Money is the answer, what is the question?" = tm

 

 

------=_NextPart_000_014B_01CECE88.C6B61960-- From rjsparks@nostrum.com Wed Oct 23 14:55:21 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B024F11E8265 for ; Wed, 23 Oct 2013 14:55:21 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.6 X-Spam-Level: X-Spam-Status: No, score=-102.6 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, SPF_PASS=-0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7W1Aj-GHC8tX for ; Wed, 23 Oct 2013 14:55:20 -0700 (PDT) Received: from shaman.nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by ietfa.amsl.com (Postfix) with ESMTP id 395AC11E81C7 for ; Wed, 23 Oct 2013 14:55:18 -0700 (PDT) Received: from unnumerable.local (pool-173-57-89-224.dllstx.fios.verizon.net [173.57.89.224]) (authenticated bits=0) by shaman.nostrum.com (8.14.3/8.14.3) with ESMTP id r9NLt1sK054888 (version=TLSv1/SSLv3 cipher=DHE-RSA-CAMELLIA256-SHA bits=256 verify=OK) for ; Wed, 23 Oct 2013 16:55:02 -0500 (CDT) (envelope-from rjsparks@nostrum.com) Message-ID: <526845B5.40400@nostrum.com> Date: Wed, 23 Oct 2013 16:55:01 -0500 From: Robert Sparks User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.8; rv:17.0) Gecko/20130801 Thunderbird/17.0.8 MIME-Version: 1.0 To: stir@ietf.org Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Received-SPF: pass (shaman.nostrum.com: 173.57.89.224 is authenticated by a trusted mechanism) Subject: [stir] Next level of agenda detail X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Oct 2013 21:55:21 -0000 Stir WG - Below is the next level of detail for the agenda in Vancouver. As we indicated before, we'll spend the first session concentrating on the threats and requirements, and the second starting to explore mechanism. As you can see from the repository, we've only had one update to the mechanism drafts. Rather than simply going through the drafts during the second session, lets try to work through some major questions in the context of those drafts. With that in mind, we propose the following agenda: Tuesday, 5 November 2013: 1300-1400 10m Chairs/Administrivia 20m Problem statement - Jon Peterson http://datatracker.ietf.org/doc/draft-ietf-stir-problem-statement/ draft-ietf-stir-problem-statement-00.txt 30m Threats - Jon Peterson http://datatracker.ietf.org/doc/draft-ietf-stir-threats/ draft-ietf-stir-threats-00.txt Wednesday, 6 November 2013, 1550-1720 5m Administrivia 25m Constraints on signature construction and validation: Jon Peterson - what fields are included in the signature? - should that list be configurable? 40m Credential Acquisition: Jon Peterson and Hadriel Kaplan - how can signers and verifiers obtain the appropriate credentials? - what does a verifier need to access credentials (a number, a number range, some other hint)? - is access to the credentials public or private? - are credentials associated with a single number, a range, or an arbitrary set? 20m Gatewaying: Hadriel Kaplan - what constraints do we have on signature construction so that the signature is likely to survive transition through other protocols (can we build something that can be passed through UUI?) Reading for the second session: http://datatracker.ietf.org/doc/draft-kaplan-stir-cider/ (draft-kaplan-stir-cider-00.txt) http://datatracker.ietf.org/doc/draft-kaplan-stir-ikes-out/ (draft-kaplan-stir-ikes-out-00.txt) http://datatracker.ietf.org/doc/draft-jennings-stir-rfc4474bis/ (draft-jennings-stir-rfc4474bis-00.txt) http://datatracker.ietf.org/doc/draft-rescorla-stir-fallback/ (draft-rescorla-stir-fallback-00.txt) From aallen@blackberry.com Thu Oct 24 09:09:36 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 235F111E83AB for ; Thu, 24 Oct 2013 09:09:36 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -0.406 X-Spam-Level: X-Spam-Status: No, score=-0.406 tagged_above=-999 required=5 tests=[BAYES_20=-0.74, HTML_MESSAGE=0.001, SARE_PRODUCT=0.333] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 97uwvQC4Awb7 for ; Thu, 24 Oct 2013 09:09:30 -0700 (PDT) Received: from smtp-p02.blackberry.com (smtp-p02.blackberry.com [208.65.78.89]) by ietfa.amsl.com (Postfix) with ESMTP id A2AB911E83B4 for ; Thu, 24 Oct 2013 09:02:56 -0700 (PDT) Received: from xct103ads.rim.net ([10.67.111.44]) by mhs215cnc.rim.net with ESMTP/TLS/AES128-SHA; 24 Oct 2013 12:02:52 -0400 Received: from XMB104ADS.rim.net ([fe80::2494:a63d:e3:723b]) by XCT103ADS.rim.net ([fe80::c8f6:ae2e:c42b:3614%21]) with mapi id 14.03.0123.003; Thu, 24 Oct 2013 11:02:51 -0500 From: Andrew Allen To: "stir@ietf.org" Thread-Topic: comments on draft-ietf-stir-problem-statement-00 Thread-Index: Ac7QUSi+XuSwVM/UQPSEhXox+oZw/g== Date: Thu, 24 Oct 2013 16:02:51 +0000 Message-ID: Accept-Language: en-CA, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.67.110.252] Content-Type: multipart/alternative; boundary="_000_BBF5DDFE515C3946BC18D733B20DAD2338E3BB2BXMB104ADSrimnet_" MIME-Version: 1.0 Subject: [stir] comments on draft-ietf-stir-problem-statement-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 24 Oct 2013 16:09:36 -0000 --_000_BBF5DDFE515C3946BC18D733B20DAD2338E3BB2BXMB104ADSrimnet_ Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable Some comments on draft-ietf-stir-problem-statement-00. I only just joined t= he list so apologies if I am duplicating any comments already given. General comment could we preface the references in the text with the RFC (or other document= identifier) [1} in isolation makes the document hard to read. Section 5.3 Due to its narrow scope of applicability, and the details of its implementa= tion, VIPR has some significant limitations. The most salient for the purp= oses of this document is that it only has bearing on repeated communication= s between entities: it has solution to the classic "robocall" problem, wher= e the target typically receives a call from a number that has never called = before. Shouldn't this be it has NO solution to the classic "robocall" problem"? Section 6.1 I think it is problematic to use as an example the Apple proprietary iMessa= ge service which I believe is restricted to just the iOS platform (and Macs= ) and which does not allow "iPhone users to send SMS messages to one anoth= er over the internet" (SMS is a specific text only messaging service). I = think we should not reference a single company's proprietary product as the= re are many instant messaging applications/services out there for smartphon= es many of which now support multiple smartphone OS platforms (including al= so now my own employers BlackBerry Messaging Service) and which basically s= hare similar characteristics in terms of out of band communications and cen= tralized trusted databases as iMessage. I would think that a multiple plat= form supporting messaging service is likely to be much more useful as the = basis for a solution than a system that is restricted to single vendor's pl= atform. I think this text should be generalized to talk about mobile instant messag= ing services in the abstract and not describe a single vendors product offe= ring. Potentially a plurality of instant messaging services from multiple v= endors could form a basis for a general solution if instant messaging ends = up being part of the solution. Another issue to consider (and it's not just relevant for the use of insta= nt messaging) is the use of SIM roaming or "plastic roaming" where users wh= o are travelling use either a SIM from pool of company provided local SIM c= ards or purchase a local prepaid SIM card in order to eliminate roaming cha= rges. This means that the E.164 number of the user has changed but potentia= lly the identity used by the instant messaging service remains the same as = many mobile IM services identities are independent of the E.164 number bein= g instead tied to email addresses or device identities. In many cases the s= martphone doesn't even know its E.164 number - it does with IMS though. Section 6.5 Due to roaming and countless other factors, calls on the PSTN may emerge fr= om administrative domains that have no relationship with the number assignee I am not convinced that roaming (at least in the traditional sense of cellu= lar roaming - and this will continue to be the case with IMS roaming) means= that calls will emerge from administrative domains that have no relationsh= ip with the number assignee. In cellular roaming there is a very close rela= tionship between the roamed to network and there are trust domains between= them and authentication of the mobile involving cooperation between the ho= me network that is the number assignee and the roamed to network. If roamin= g here means something else then please clarify. Section 7 Accommodating current practices: Must allow number portability among carri= ers and must support legitimate usage of number spoofing(doctor's office an= d call centers) I think the text in parenthesis should be prepended with e.g. Minimal payload overhead: Must lead to minimal expansion of SIP headers fi= elds to avoid fragmentation in deployments that use UDP. Is this really a MUST strength requirement? Whatever solution we come up wi= th that requires enhancement to SIP requires some enhancement. TCP is alway= s available to use if message sizes become too large and since the deployed= systems will need to be enhanced they can be (even should be) enhanced to = support TCP. I think in many cases SIP and SDP has already grown to such an= extent (ICE candidates, preconditions, SDP cap neg attributes, increasing = number of codecs and media lines etc...) that we are already at the point w= here we are perilously close to or already over the 1300 byte recommendatio= n in many scenarios. Any size increase at all may break the camel's back o= n the UDP fragmentation issue. I think at best this is guidance that messag= e size is a factor to consider in evaluating a solution not an overriding r= equirement Andrew --------------------------------------------------------------------- This transmission (including any attachments) may contain confidential info= rmation, privileged material (including material protected by the solicitor= -client or other applicable privileges), or constitute non-public informati= on. Any use of this information by anyone other than the intended recipient= is prohibited. If you have received this transmission in error, please imm= ediately reply to the sender and delete this information from your system. = Use, dissemination, distribution, or reproduction of this transmission by u= nintended recipients is not authorized and may be unlawful. --_000_BBF5DDFE515C3946BC18D733B20DAD2338E3BB2BXMB104ADSrimnet_ Content-Type: text/html; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: quoted-printable

 

 

Some comments on draf= t-ietf-stir-problem-statement-00. I only just joined the list so apologies = if I am duplicating any comments already given.

General comment

could we preface the references in the text with the= RFC (or other document identifier) [1} in isolation makes the document har= d to read.

 

Section 5.3

 

Due to its narrow scope of applicability, and the details of its impleme= ntation, VIPR has some significant limitations.  The most salient for = the purposes of this document is that it only has bearing on repeated communications between entities: it has solution to the classi= c "robocall" problem, where the target typically receives a call from a number that has never called before. 

 

Shouldn’t this be it has NO solution to the cl= assic “robocall” problem”?

 

Section 6.1

 

I think it is problematic to use as an example the A= pple proprietary iMessage service which I believe is restricted to just the= iOS platform (and Macs) and which does not allow “iPhone users to &n= bsp;send SMS messages to one another over the internet” (SMS is a specific  text only messaging service). &nb= sp;I think we should not reference a single company’s proprietary pro= duct as there are many instant messaging applications/services out there fo= r smartphones many of which now support multiple smartphone OS platforms (including also now my own employers BlackBerry Messaging Ser= vice) and which basically share similar characteristics in terms of out of = band communications and centralized trusted databases as iMessage.  I = would think that a multiple platform supporting messaging service is likely to be much more useful as  the= basis for a solution than a system that is restricted to single vendorR= 17;s platform.

 

I think this text should be generalized to talk abou= t mobile instant messaging services in the abstract and not describe a sing= le vendors product offering. Potentially a plurality of instant messaging s= ervices from multiple vendors could form a basis for a general solution if instant messaging ends up being par= t of the solution.

 

Another issue to consider (and it’s not just r= elevant for the  use of instant messaging) is the use of SIM roaming o= r “plastic roaming” where users who are travelling use either a= SIM from pool of company provided local SIM cards or purchase a local prepaid SIM card in order to eliminate roaming charges. This means= that the E.164 number of the user has changed but potentially the identity= used by the instant messaging service remains the same as many mobile IM s= ervices identities are independent of the E.164 number being instead tied to email addresses or device identi= ties. In many cases the smartphone doesn’t even know its E.164 number= – it does with IMS though.

 

Section 6.5

 

Due to roaming and countless other factors, calls on the PSTN may emerge= from administrative domains that have no relationship with the number assignee

 

I am not convinced that roaming (at = least in the traditional sense of cellular roaming - and this will continue= to be the case with IMS roaming) means that calls will emerge from administrative domains that have no relationship with the numb= er assignee. In cellular roaming there is a very close relationship between= the roamed  to network and there are trust domains between them and a= uthentication of the mobile involving cooperation between the home network that is the number assignee and the r= oamed to network. If roaming here means something else then please clarify.=

 

 

Section 7

 

Accommodating current practices:  Must allow number portabilit=
y among carriers and must support legitimate usage of number spoofing(docto=
r's office and call centers)
 
I think the text in parenthesis should be prepended with e.g.
 
 
Minimal payload overhead:  Must lead to minimal expansion of S=
IP headers fields to avoid fragmentation in deployments that use UDP.<=
/o:p>
 

Is this really a MUST strength requirement? Whatever solut= ion we come up with that requires enhancement to SIP requires some enhancem= ent. TCP is always available to use if message sizes become too large and since the deployed systems will need to be enha= nced they can be (even should be) enhanced to support TCP. I think in many = cases SIP and SDP has already grown to such an extent (ICE candidates, prec= onditions, SDP cap neg attributes, increasing number of codecs and media lines etc…) that we are alread= y at the point where we are perilously close to or already over the 1300 by= te recommendation in many scenarios.  Any size increase at all may bre= ak the camel’s back on the UDP fragmentation issue. I think at best this is guidance that message size is a factor to c= onsider in evaluating a solution not an overriding requirement

 

Andrew

---------------------------------------------------------------------
Th= is transmission (including any attachments) may contain confidential inform= ation, privileged material (including material protected by the solicitor-c= lient or other applicable privileges), or constitute non-public information= . Any use of this information by anyone other than the intended recipient i= s prohibited. If you have received this transmission in error, please immed= iately reply to the sender and delete this information from your system. Us= e, dissemination, distribution, or reproduction of this transmission by uni= ntended recipients is not authorized and may be unlawful.
--_000_BBF5DDFE515C3946BC18D733B20DAD2338E3BB2BXMB104ADSrimnet_-- From richard@shockey.us Fri Oct 25 10:28:49 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1B82C11E81BD for ; Fri, 25 Oct 2013 10:28:49 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.133 X-Spam-Level: X-Spam-Status: No, score=-101.133 tagged_above=-999 required=5 tests=[AWL=-0.727, BAYES_20=-0.74, HTML_MESSAGE=0.001, SARE_PRODUCT=0.333, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1YbKQ3hAWgWX for ; Fri, 25 Oct 2013 10:28:43 -0700 (PDT) Received: from oproxy17-pub.mail.unifiedlayer.com (oproxy17-pub.mail.unifiedlayer.com [74.220.201.171]) by ietfa.amsl.com (Postfix) with SMTP id 2E5EC11E81B6 for ; Fri, 25 Oct 2013 10:28:43 -0700 (PDT) Received: (qmail 7813 invoked by uid 0); 25 Oct 2013 17:28:32 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy17-pub.mail.unifiedlayer.com with SMTP; 25 Oct 2013 17:28:32 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=4KHkZPQFrxeFwhte6dCuEZyBy3g3dW1w4D1Wuolth2s=; b=Ae9lIeQSGmTkPcUvK0vyhR+4xfxOE2YZm+tyBL43PDWnStLOmHe+AAy06oc/P/u6sbQAfuo2l2h05AYhcg05EfvpUcZ9Z5szUMBuVQmLywShkmif9hb/sf1wX71nceWk; Received: from [71.114.100.16] (port=53924 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VZlBX-0000Vy-VT; Fri, 25 Oct 2013 11:28:32 -0600 From: "Richard Shockey" To: "'Andrew Allen'" , References: In-Reply-To: Date: Fri, 25 Oct 2013 13:28:29 -0400 Message-ID: <013b01ced1a7$9f3fb860$ddbf2920$@shockey.us> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_013C_01CED186.183125A0" X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQI9gjN/fAuY/x0/yPzWV56VayXcYpkoR+6Q Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 71.114.100.16 authed with richard@shockey.us} Subject: Re: [stir] comments on draft-ietf-stir-problem-statement-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Oct 2013 17:28:49 -0000 This is a multipart message in MIME format. ------=_NextPart_000_013C_01CED186.183125A0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit In line. From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Andrew Allen Sent: Thursday, October 24, 2013 12:03 PM To: stir@ietf.org Subject: [stir] comments on draft-ietf-stir-problem-statement-00 Some comments on draft-ietf-stir-problem-statement-00. I only just joined the list so apologies if I am duplicating any comments already given. General comment could we preface the references in the text with the RFC (or other document identifier) [1} in isolation makes the document hard to read. Section 5.3 Due to its narrow scope of applicability, and the details of its implementation, VIPR has some significant limitations. The most salient for the purposes of this document is that it only has bearing on repeated communications between entities: it has solution to the classic "robocall" problem, where the target typically receives a call from a number that has never called before. Shouldn't this be it has NO solution to the classic "robocall" problem"? [RS> ] +1 of course I'd argue that VIPR is no solution to anything. Personally I'd prefer any reference to VIPR should be eliminated since it has proven non deployable and generally useless. Section 6.1 I think it is problematic to use as an example the Apple proprietary iMessage service which I believe is restricted to just the iOS platform (and Macs) and which does not allow "iPhone users to send SMS messages to one another over the internet" (SMS is a specific text only messaging service). I think we should not reference a single company's proprietary product as there are many instant messaging applications/services out there for smartphones many of which now support multiple smartphone OS platforms (including also now my own employers BlackBerry Messaging Service) and which basically share similar characteristics in terms of out of band communications and centralized trusted databases as iMessage. I would think that a multiple platform supporting messaging service is likely to be much more useful as the basis for a solution than a system that is restricted to single vendor's platform. [RS> ] Yes thank you iMessage is not an existence proof. I think this text should be generalized to talk about mobile instant messaging services in the abstract and not describe a single vendors product offering. Potentially a plurality of instant messaging services from multiple vendors could form a basis for a general solution if instant messaging ends up being part of the solution. Another issue to consider (and it's not just relevant for the use of instant messaging) is the use of SIM roaming or "plastic roaming" where users who are travelling use either a SIM from pool of company provided local SIM cards or purchase a local prepaid SIM card in order to eliminate roaming charges. This means that the E.164 number of the user has changed but potentially the identity used by the instant messaging service remains the same as many mobile IM services identities are independent of the E.164 number being instead tied to email addresses or device identities. In many cases the smartphone doesn't even know its E.164 number - it does with IMS though. Section 6.5 Due to roaming and countless other factors, calls on the PSTN may emerge from administrative domains that have no relationship with the number assignee I am not convinced that roaming (at least in the traditional sense of cellular roaming - and this will continue to be the case with IMS roaming) means that calls will emerge from administrative domains that have no relationship with the number assignee. In cellular roaming there is a very close relationship between the roamed to network and there are trust domains between them and authentication of the mobile involving cooperation between the home network that is the number assignee and the roamed to network. If roaming here means something else then please clarify. Section 7 Accommodating current practices: Must allow number portability among carriers and must support legitimate usage of number spoofing(doctor's office and call centers) I think the text in parenthesis should be prepended with e.g. [RS> ] I dislike calling out examples of "legitimate" call spoofing. That is essentially a national regulatory matter of what is and is not acceptable. Minimal payload overhead: Must lead to minimal expansion of SIP headers fields to avoid fragmentation in deployments that use UDP. Is this really a MUST strength requirement? Whatever solution we come up with that requires enhancement to SIP requires some enhancement. TCP is always available to use if message sizes become too large and since the deployed systems will need to be enhanced they can be (even should be) enhanced to support TCP. I think in many cases SIP and SDP has already grown to such an extent (ICE candidates, preconditions, SDP cap neg attributes, increasing number of codecs and media lines etc.) that we are already at the point where we are perilously close to or already over the 1300 byte recommendation in many scenarios. Any size increase at all may break the camel's back on the UDP fragmentation issue. I think at best this is guidance that message size is a factor to consider in evaluating a solution not an overriding requirement [RS> ] Yes thank you ..The SIP headers are already out of control suggesting MUST is absurd. Andrew --------------------------------------------------------------------- This transmission (including any attachments) may contain confidential information, privileged material (including material protected by the solicitor-client or other applicable privileges), or constitute non-public information. Any use of this information by anyone other than the intended recipient is prohibited. If you have received this transmission in error, please immediately reply to the sender and delete this information from your system. Use, dissemination, distribution, or reproduction of this transmission by unintended recipients is not authorized and may be unlawful. ------=_NextPart_000_013C_01CED186.183125A0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

In line…

 

From: stir-bounces@ietf.org = [mailto:stir-bounces@ietf.org] On Behalf Of Andrew = Allen
Sent: Thursday, October 24, 2013 12:03 PM
To: = stir@ietf.org
Subject: [stir] comments on = draft-ietf-stir-problem-statement-00

 

 

 

Some comments on = draft-ietf-stir-problem-statement-00. I only just joined the list so = apologies if I am duplicating any comments already = given.

General comment =

could we preface the references in = the text with the RFC (or other document identifier) [1} in isolation = makes the document hard to read.

 

Section = 5.3

 

Due to = its narrow scope of applicability, and the details of its = implementation, VIPR has some significant limitations.  The most = salient for the purposes of this document is that it only has bearing on = repeated communications between entities: it has solution to the classic = "robocall" problem, where the target typically receives a = call = from a number that has never called before. 

 

Shouldn’t this be it has NO solution to the = classic “robocall” problem”?

 

 

[RS> ] =  +1  of course I’d argue that VIPR is no solution to = anything.  Personally I’d prefer any reference to VIPR should = be eliminated since it has proven non deployable and generally useless. =

 

 

Section 6.1 =

 

I think it is problematic to use as an example the = Apple proprietary iMessage service which I believe is restricted to just = the iOS platform (and Macs) and which does not allow “iPhone users = to  send SMS messages to one another over the internet” (SMS = is a specific  text only messaging service).  I think we = should not reference a single company’s proprietary product as = there are many instant messaging applications/services out there for = smartphones many of which now support multiple smartphone OS platforms = (including also now my own employers BlackBerry Messaging Service) and = which basically share similar characteristics in terms of out of band = communications and centralized trusted databases as iMessage.  I = would think that a multiple platform supporting messaging service is = likely to be much more useful as  the basis for a solution than a = system that is restricted to single vendor’s = platform.

 

[RS> ] Yes = thank you iMessage is not an existence proof. =

 

 

I think this = text should be generalized to talk about mobile instant messaging = services in the abstract and not describe a single vendors product = offering. Potentially a plurality of instant messaging services from = multiple vendors could form a basis for a general solution if instant = messaging ends up being part of the solution.

 

Another = issue to consider (and it’s not just relevant for the  use of = instant messaging) is the use of SIM roaming or “plastic = roaming” where users who are travelling use either a SIM from pool = of company provided local SIM cards or purchase a local prepaid SIM card = in order to eliminate roaming charges. This means that the E.164 number = of the user has changed but potentially the identity used by the instant = messaging service remains the same as many mobile IM services identities = are independent of the E.164 number being instead tied to email = addresses or device identities. In many cases the smartphone = doesn’t even know its E.164 number – it does with IMS = though.

 

Section 6.5

 

Due to roaming and countless other = factors, calls on the PSTN may emerge from administrative domains that = have no relationship with the number assignee

 

I am = not convinced that roaming (at least in the traditional sense of = cellular roaming - and this will continue to be the case with IMS = roaming) means that calls will emerge from administrative domains that = have no relationship with the number assignee. In cellular roaming there = is a very close relationship between the roamed  to network and = there are trust domains between them and authentication of the mobile = involving cooperation between the home network that is the number = assignee and the roamed to network. If roaming here means something else = then please clarify.

 

 

Section = 7

 

Accommodating current =
practices:  Must allow number portability among carriers and must =
support legitimate usage of number spoofing(doctor's office and call =
centers)
 
I think =
the text in parenthesis should be prepended with =
e.g.
[RS> ]  I dislike calling out examples of =
“legitimate” call spoofing. That is essentially a national =
regulatory matter of what is and is not acceptable. 
 
 
Minimal payload overhead:  Must lead to minimal =
expansion of SIP headers fields to avoid fragmentation in deployments =
that use UDP.
 

Is this really a MUST strength requirement? Whatever solution we = come up with that requires enhancement to SIP requires some enhancement. = TCP is always available to use if message sizes become too large and = since the deployed systems will need to be enhanced they can be (even = should be) enhanced to support TCP. I think in many cases SIP and SDP = has already grown to such an extent (ICE candidates, preconditions, SDP = cap neg attributes, increasing number of codecs and media lines = etc…) that we are already at the point where we are perilously = close to or already over the 1300 byte recommendation in many scenarios. =  Any size increase at all may break the camel’s back on the = UDP fragmentation issue. I think at best this is guidance that message = size is a factor to consider in evaluating a solution not an overriding = requirement

[RS> ] Yes thank you ..The SIP headers are = already out of control suggesting MUST is absurd.  =

 

 

Andrew

---------------------------------------------------------= ------------
This transmission (including any attachments) may = contain confidential information, privileged material (including = material protected by the solicitor-client or other applicable = privileges), or constitute non-public information. Any use of this = information by anyone other than the intended recipient is prohibited. = If you have received this transmission in error, please immediately = reply to the sender and delete this information from your system. Use, = dissemination, distribution, or reproduction of this transmission by = unintended recipients is not authorized and may be = unlawful.

------=_NextPart_000_013C_01CED186.183125A0-- From br@brianrosen.net Fri Oct 25 12:43:09 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5D1C611E81E9 for ; Fri, 25 Oct 2013 12:43:09 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.325 X-Spam-Level: X-Spam-Status: No, score=-103.325 tagged_above=-999 required=5 tests=[AWL=-0.060, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, SARE_PRODUCT=0.333, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E9m0+D9x5iln for ; Fri, 25 Oct 2013 12:43:03 -0700 (PDT) Received: from mail-qc0-f181.google.com (mail-qc0-f181.google.com [209.85.216.181]) by ietfa.amsl.com (Postfix) with ESMTP id C31C311E81DA for ; Fri, 25 Oct 2013 12:43:02 -0700 (PDT) Received: by mail-qc0-f181.google.com with SMTP id w4so2499644qcr.12 for ; Fri, 25 Oct 2013 12:43:02 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=7B+pOInUHFVTO7lhvNNZTf2sxlOVzIQYH5CT59sZKeg=; b=WB3O7qJysz095KOvwMir9Be75u3gk2F2H1eG00D3NlUUhCqaCHaZ61Ajh8K0NnNSLF mOU8aFGD9nw+ZolcWou8OEy1iVabznQHrDf6mdnel4CbvTdLroSzcVmBjXUkExWBz/Df CcD8RZ9s6buDPahH3okF+yBaHZEqPMKjzsd56SA5s1zTO0Ytz6FklDm4jS07rJ9espF2 3V48xa8hhl0c0ttyhLzTrHv+sqMqmXeNVpAYchOd7LFm8gpDUGTs7sjzW4abJwNy87Jw M2t6PU0qLuk3LpKwbGMQPDNNB6SWwCDtoLMBVi4kQlYOWT157hWbnmMvlmbZkYMaaDrT CmaA== X-Gm-Message-State: ALoCoQmPX04HA5yaJ8xtwz6JM9p99PYzmMyUgYctOyHzubKk1kO1fYq+yqI+ccDgvP0aNpEtF+PX X-Received: by 10.224.34.71 with SMTP id k7mr12837915qad.15.1382730182086; Fri, 25 Oct 2013 12:43:02 -0700 (PDT) Received: from [10.33.192.35] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id n7sm22723418qai.1.2013.10.25.12.43.00 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 25 Oct 2013 12:43:01 -0700 (PDT) Content-Type: multipart/alternative; boundary="Apple-Mail=_043A0A5A-7511-4B8C-AF6C-8D5E604B5CE7" Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\)) From: Brian Rosen In-Reply-To: Date: Fri, 25 Oct 2013 15:42:57 -0400 Message-Id: <23DBF40D-0208-4846-9E52-D4B9B59151C6@brianrosen.net> References: To: Andrew Allen X-Mailer: Apple Mail (2.1816) Cc: "stir@ietf.org" Subject: Re: [stir] comments on draft-ietf-stir-problem-statement-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 25 Oct 2013 19:43:09 -0000 --Apple-Mail=_043A0A5A-7511-4B8C-AF6C-8D5E604B5CE7 Content-Transfer-Encoding: quoted-printable Content-Type: text/plain; charset=windows-1252 Inline On Oct 24, 2013, at 12:02 PM, Andrew Allen = wrote: > =20 > =20 > Some comments on draft-ietf-stir-problem-statement-00. I only just = joined the list so apologies if I am duplicating any comments already = given. >=20 > General comment > could we preface the references in the text with the RFC (or other = document identifier) [1} in isolation makes the document hard to read. > =20 > Section 5.3 > =20 > Due to its narrow scope of applicability, and the details of its = implementation, VIPR has some significant limitations. The most salient = for the purposes of this document is that it only has bearing on = repeated communications between entities: it has solution to the classic = "robocall" problem, where the target typically receives a call from a = number that has never called before.=20 > =20 > Shouldn=92t this be it has NO solution to the classic =93robocall=94 = problem=94? > =20 > Section 6.1 > =20 > I think it is problematic to use as an example the Apple proprietary = iMessage service which I believe is restricted to just the iOS platform = (and Macs) and which does not allow =93iPhone users to send SMS = messages to one another over the internet=94 (SMS is a specific text = only messaging service). I think we should not reference a single = company=92s proprietary product as there are many instant messaging = applications/services out there for smartphones many of which now = support multiple smartphone OS platforms (including also now my own = employers BlackBerry Messaging Service) and which basically share = similar characteristics in terms of out of band communications and = centralized trusted databases as iMessage. I would think that a = multiple platform supporting messaging service is likely to be much more = useful as the basis for a solution than a system that is restricted to = single vendor=92s platform. > =20 > I think this text should be generalized to talk about mobile instant = messaging services in the abstract and not describe a single vendors = product offering. Potentially a plurality of instant messaging services = from multiple vendors could form a basis for a general solution if = instant messaging ends up being part of the solution. I disagree. First of all, it=92s an example, properly labeled, with = caveats. Secondly, most readers will understand that what happened in iMessage = was, at the time, unique, and illustrative - the existing messaging app = used for SMS was enhanced to have an IP interface, indistinguishable = from SMS from the user=92s point of view. Other services may have = copied that, but readers will know the significance of that service in = the context of the discussion. > =20 > Another issue to consider (and it=92s not just relevant for the use = of instant messaging) is the use of SIM roaming or =93plastic roaming=94 = where users who are travelling use either a SIM from pool of company = provided local SIM cards or purchase a local prepaid SIM card in order = to eliminate roaming charges. This means that the E.164 number of the = user has changed but potentially the identity used by the instant = messaging service remains the same as many mobile IM services identities = are independent of the E.164 number being instead tied to email = addresses or device identities. In many cases the smartphone doesn=92t = even know its E.164 number =96 it does with IMS though. I=92m having trouble understanding how this is relevant to stir. If the = network operator does the signing, then the fact that the phone changes = isn=92t relevant. The operator has the correct credentials for the = exchange. If the device does the signing, then it will need to know the = e.164, and it will need the key. That=92s potentially an issue = (multiple devices having the private key), but that=92s what you get = when you share SIMs. > =20 > Section 6.5 > =20 > Due to roaming and countless other factors, calls on the PSTN may = emerge from administrative domains that have no relationship with the = number assignee > =20 > I am not convinced that roaming (at least in the traditional sense of = cellular roaming - and this will continue to be the case with IMS = roaming) means that calls will emerge from administrative domains that = have no relationship with the number assignee. In cellular roaming there = is a very close relationship between the roamed to network and there = are trust domains between them and authentication of the mobile = involving cooperation between the home network that is the number = assignee and the roamed to network. If roaming here means something else = then please clarify. I see the point. Maybe we want to soften =93no relationship=94.=20 > =20 > =20 > Section 7 > =20 > Accommodating current practices: Must allow number portability among = carriers and must support legitimate usage of number spoofing(doctor's = office and call centers) > =20 > I think the text in parenthesis should be prepended with e.g. > =20 > =20 > Minimal payload overhead: Must lead to minimal expansion of SIP = headers fields to avoid fragmentation in deployments that use UDP. > =20 > Is this really a MUST strength requirement? Whatever solution we come = up with that requires enhancement to SIP requires some enhancement. TCP = is always available to use if message sizes become too large and since = the deployed systems will need to be enhanced they can be (even should = be) enhanced to support TCP. I think in many cases SIP and SDP has = already grown to such an extent (ICE candidates, preconditions, SDP cap = neg attributes, increasing number of codecs and media lines etc=85) that = we are already at the point where we are perilously close to or already = over the 1300 byte recommendation in many scenarios. Any size increase = at all may break the camel=92s back on the UDP fragmentation issue. I = think at best this is guidance that message size is a factor to consider = in evaluating a solution not an overriding requirement > =20 I=92m okay with dropping this to should. --Apple-Mail=_043A0A5A-7511-4B8C-AF6C-8D5E604B5CE7 Content-Transfer-Encoding: quoted-printable Content-Type: text/html; charset=windows-1252 Inline
On Oct 24, 2013, at 12:02 PM, = Andrew Allen <aallen@blackberry.com> = wrote:

 
 

Some comments on draft-ietf-stir-problem-statement-00. I = only just joined the list so apologies if I am duplicating any comments = already given.

General = comment
could we preface the = references in the text with the RFC (or other document identifier) [1} = in isolation makes the document hard to read.
 
Section 5.3
 
Due to its narrow scope of = applicability, and the details of its implementation, VIPR has some = significant limitations.  The most salient for the purposes of this = document is that it only has bearing on repeated communications between = entities: it has solution to the classic "robocall" problem, where the = target typically receives a call from a number that = has never called before. 
 
Shouldn=92t = this be it has NO solution to the classic =93robocall=94 = problem=94?
 
Section = 6.1
 
I think it is problematic to use as an example the = Apple proprietary iMessage service which I believe is restricted to just = the iOS platform (and Macs) and which does not allow =93iPhone users to =  send SMS messages to one another over the internet=94 (SMS is a = specific  text only messaging service).  I think we should not = reference a single company=92s proprietary product as there are many = instant messaging applications/services out there for smartphones many = of which now support multiple smartphone OS platforms (including also = now my own employers BlackBerry Messaging Service) and which basically = share similar characteristics in terms of out of band communications and = centralized trusted databases as iMessage.  I would think that a = multiple platform supporting messaging service is likely to be much more = useful as  the basis for a solution than a system that is = restricted to single vendor=92s platform.
 
I = think this text should be generalized to talk about mobile instant = messaging services in the abstract and not describe a single vendors = product offering. Potentially a plurality of instant messaging services = from multiple vendors could form a basis for a general solution if = instant messaging ends up being part of the = solution.
I disagree.  First of all, = it=92s an example, properly labeled, with = caveats.

Secondly, most readers will understand = that what happened in iMessage was, at the time, unique, and = illustrative - the existing messaging app used for SMS was enhanced to = have an IP interface, indistinguishable from SMS from the user=92s point = of view.  Other services may have copied that, but readers will = know the significance of that service in the context of the = discussion.

 
Another = issue to consider (and it=92s not just relevant for the  use of = instant messaging) is the use of SIM roaming or =93plastic roaming=94 = where users who are travelling use either a SIM from pool of company = provided local SIM cards or purchase a local prepaid SIM card in order = to eliminate roaming charges. This means that the E.164 number of the = user has changed but potentially the identity used by the instant = messaging service remains the same as many mobile IM services identities = are independent of the E.164 number being instead tied to email = addresses or device identities. In many cases the smartphone doesn=92t = even know its E.164 number =96 it does with IMS = though.
I=92m having trouble understanding = how this is relevant to stir.  If the network operator does the = signing, then the fact that the phone changes isn=92t relevant. =  The operator has the correct credentials for the exchange. =  If the device does the signing, then it will need to know the = e.164, and it will need the key.  That=92s potentially an issue = (multiple devices having the private key), but that=92s what you get = when you share SIMs.

 
Section = 6.5
 
Due = to roaming and countless other factors, calls on the PSTN may emerge = from administrative domains that have no relationship with the number = assignee
 
I am = not convinced that roaming (at least in the traditional sense of = cellular roaming - and this will continue to be the case with IMS = roaming) means that calls will emerge from administrative domains that = have no relationship with the number assignee. In cellular roaming there = is a very close relationship between the roamed  to network and = there are trust domains between them and authentication of the mobile = involving cooperation between the home network that is the number = assignee and the roamed to network. If roaming here means something else = then please clarify.
I see the = point.  Maybe we want to soften =93no = relationship=94. 

 
 
Section = 7
 
Accommodating current practices:  Must allow number =
portability among carriers and must support legitimate usage of number =
spoofing(doctor's office and call centers)
 
I think the =
text in parenthesis should be prepended with e.g.
 
 
Minimal =
payload overhead:  Must lead to minimal expansion of SIP headers =
fields to avoid fragmentation in deployments that use =
UDP.
 
Is this really a MUST strength requirement? Whatever solution we = come up with that requires enhancement to SIP requires some enhancement. = TCP is always available to use if message sizes become too large and = since the deployed systems will need to be enhanced they can be (even = should be) enhanced to support TCP. I think in many cases SIP and SDP = has already grown to such an extent (ICE candidates, preconditions, SDP = cap neg attributes, increasing number of codecs and media lines etc=85) = that we are already at the point where we are perilously close to or = already over the 1300 byte recommendation in many scenarios.  Any = size increase at all may break the camel=92s back on the UDP = fragmentation issue. I think at best this is guidance that message size = is a factor to consider in evaluating a solution not an overriding = requirement
 
I=92m okay with = dropping this to should.

= --Apple-Mail=_043A0A5A-7511-4B8C-AF6C-8D5E604B5CE7-- From york@isoc.org Tue Oct 29 14:10:38 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2837D11E82DC for ; Tue, 29 Oct 2013 14:10:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.427 X-Spam-Level: X-Spam-Status: No, score=-103.427 tagged_above=-999 required=5 tests=[AWL=0.172, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NWfO97wmUQrq for ; Tue, 29 Oct 2013 14:10:34 -0700 (PDT) Received: from na01-bl2-obe.outbound.protection.outlook.com (mail-bl2lp0206.outbound.protection.outlook.com [207.46.163.206]) by ietfa.amsl.com (Postfix) with ESMTP id 0ADC611E82A2 for ; Tue, 29 Oct 2013 14:10:03 -0700 (PDT) Received: from BLUPR06MB067.namprd06.prod.outlook.com (10.242.187.146) by BLUPR06MB067.namprd06.prod.outlook.com (10.242.187.146) with Microsoft SMTP Server (TLS) id 15.0.800.7; Tue, 29 Oct 2013 21:09:59 +0000 Received: from BLUPR06MB067.namprd06.prod.outlook.com ([169.254.16.179]) by BLUPR06MB067.namprd06.prod.outlook.com ([169.254.16.179]) with mapi id 15.00.0800.005; Tue, 29 Oct 2013 21:09:59 +0000 From: Dan York To: Brian Rosen , Cullen Jennings Thread-Topic: Application servers - Re: [stir] Call Center Implications Thread-Index: AQHOsuOJ4w3gYleEHUa5h7lxd4Kh+JnIiUoAgAFYvoCAABAsAIADgzEAgAAKWQCAAAm8AIAADeUAgAAA5QCAAANyAIAAPA0AgAAIGYCAE9vCAIAAB98AgBt8j4CAAhl7AIAM1BMA Date: Tue, 29 Oct 2013 21:09:58 +0000 Message-ID: In-Reply-To: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.255.101.4] x-forefront-prvs: 0014E2CF50 x-forefront-antispam-report: SFV:NSPM; SFS:(243025003)(52314003)(24454002)(479174003)(377454003)(13464003)(51704005)(189002)(199002)(80022001)(47446002)(74502001)(31966008)(74662001)(65816001)(63696002)(56816003)(77096001)(76796001)(76786001)(76176001)(4396001)(15202345003)(47976001)(36756003)(83072001)(49866001)(47736001)(50986001)(19580395003)(81342001)(51856001)(80976001)(81542001)(15395725003)(46102001)(74366001)(15975445006)(69226001)(19580405001)(83322001)(54316002)(74706001)(79102001)(77982001)(74876001)(81816001)(56776001)(85306002)(76482001)(81686001)(59766001)(561944002)(53806001)(54356001)(87266001)(579004); DIR:OUT; SFP:; SCL:1; SRVR:BLUPR06MB067; H:BLUPR06MB067.namprd06.prod.outlook.com; CLIP:10.255.101.4; FPR:; RD:InfoNoRecords; MX:1; A:1; LANG:en; Content-Type: text/plain; charset="iso-8859-2" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: isoc.org Cc: "Gregory.Schumacher@sprint.com" , Richard Shockey , "stir@ietf.org" , "Fernando Mousinho \(fmousinh\)" , Alex Bobotek , Michael Hammer , Henning Schulzrinne Subject: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Oct 2013 21:10:38 -0000 Getting caught up on some of the STIR discussions, I'd just note that when we talk about "call centers" or "BPOs" we also need to remember that we're not only talking about "traditional" call centers but also what I'll call "voice application service providers". They are generally automated platforms running applications that a company uses for some kind of outbound service. Examples include: - calling everyone in a school district with a weather-related cancellation (or, unfortunately, a school shooting or similar event) - calling patients to provide reminders of appointments or notifications of subscriptions available - calling customers to let them know that a package was delivered or could be picked up, etc. - calling people scheduled for a flight to let know they are going to be delayed - calling members of an organization with an automated survey about current issues - performing a call-back to provide an additional layer of authentication for some service There is a large (and growing) market for these kind of automated tools and services and the distinction between these calls and "robocalls" is really only one of intent and the fact that the recipient has "opted in" through some kind of system. Generally, though, many of the companies want the application to appear as if it is coming from their own phone number in the same way that they want an outbound call center to appear as if it is coming from one of their own phone numbers. You could think of these in the same way as "call centers", but I point this out because some of these new services are very automated and there are always new startups now emerging in this space. Some of them are very "self-service" where the customer does it all while others have teams of people involved. Some of the companies involved include Nuance, Microsoft Tellme, Voxeo (now Aspect, and also my former employer), Tropo, Twilio, Convergys and many more[1]. If STIR is to succeed, these kind of application platforms will also need to be able to make calls on behalf of the companies using those platforms. Dan [1] One report about this market: http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf -- Dan York Senior Content Strategist, Internet Society york@isoc.org +1-802-735-1624 Jabber: york@jabber.isoc.org Skype: danyork http://twitter.com/danyork http://www.internetsociety.org/deploy360/ On 10/21/13 9:15 AM, "Brian Rosen" wrote: >We really need to give each BPO different keys I think. The notion that >we are sharing private keys among multiple competing entities who provide >services for a single enterprise strikes me as a VBI (Very Bad Idea). I >can't see any real difficulty in having more than one authorized entity, >each with it's own credentials. Who would have a problem? We're already >agreeing that there are multiple credentials for a number, because the >number gets delegated multiple times. Consider, just as an example, the >BPO and the contracting enterprise that was actually delegated the number >can both send calls from that number. You certainly don't want the >enterprise giving out IT'S key to it's contractors. At best it's a key >it authorizes to one or more of it's BPOs. > >Brian > >On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy) >wrote: > >>=20 >> What Fernando is saying makes sense to me a desirable property of the >>solution and I agree that if we gave each BPO a different private key >>that would solve it but that might be pretty hard to mange in other >>ways. I like the requirements but the solution is not 100% obvious to >>me.=20 >>=20 >>=20 >> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>=20 >>> Sure. >>>=20 >>> Each BPO would have a different private/public key pair. >>>=20 >>> So you can trace which one placed the call. >>>=20 >>> Brian >>>=20 >>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh) >>> wrote: >>>=20 >>>> Point taken on PAI, but am still struggling with this BPO model. >>>>Apologies >>>> upfront if this is obvious and I'm just failing to understand. >>>>=20 >>>> If the company hires several BPOs and authorizes all of them to sign >>>>calls >>>> on its behalf, is there a way to trace back the originator (specific >>>>BPO) >>>> later on? I suppose that at some level the actual caller must be >>>>exposed >>>> (perhaps to trace malicious activity, such as malicious person >>>>infiltrated >>>> in an otherwise legitimate BPO). >>>>=20 >>>> Via headers would be the obvious pick, but they don't survive the >>>>plethora >>>> of SBCs that the call is likely to transverse. Or maybe the certs >>>> themselves can carry this type of data (actual caller identity). >>>>=20 >>>>=20 >>>>=20 >>>>=20 >>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>=20 >>>>> Don't think that would work without related changes in the networks. >>>>> In >>>>> some networks, PAI is used for called id. They would have to change >>>>>to >>>>> use From (if signed maybe). It also doesn't fit the definition of >>>>>PAI. >>>>>=20 >>>>> Brian >>>>>=20 >>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh) >>>>> wrote: >>>>>=20 >>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>"From" >>>>>> identifies the BPO, "PAI" the c >>>>>> ompany hiring the BPO - based on the delegation process Rosen >>>>>>mentions. >>>>>> PAI's use is widespread, and it's main limitation is being >>>>>>spoofable - >>>>>> but this is exactly the problem we are trying to solve anyway. >>>>>>=20 >>>>>>=20 >>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey" >>>>>>> wrote: >>>>>>>=20 >>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On >>>>>>>Behalf >>>>>>> Of Alex >>>>>>> Bobotek >>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; >>>>>>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> +1 >>>>>>> I've assumed that we are headed towards a "sign whatever extras you >>>>>>> wish, >>>>>>> and indicate what your signature covers" mechanism. >>>>>>>=20 >>>>>>> Based on this, standards would need to identify only a minimal >>>>>>>subset >>>>>>> of >>>>>>> what shall/should be signed, and ensure that any required group of >>>>>>> signed >>>>>>> items survives transit intact. >>>>>>>=20 >>>>>>> Best signing practices may be needed to complement the standard, >>>>>>>and an >>>>>>> appropriate place for all but the most basic 'what to sign' >>>>>>> recommendations. >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> Regards, >>>>>>>=20 >>>>>>> Alex >>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On >>>>>>>>Behalf >>>>>>>> Of Henning Schulzrinne >>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>> To: Michael Hammer; fmousinh@cisco.com; >>>>>>>>Gregory.Schumacher@sprint.com; >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I see no reason not to allow signing any number-related field in >>>>>>>>the >>>>>>>> SIP request. (Signing may well be done by different parties.) >>>>>>>>=20 >>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't >>>>>>>>conveyable >>>>>>>> in=20 >>>>>>>> legacy systems, however, so this may be of somewhat limited use >>>>>>>>for a >>>>>>> while. >>>>>>>>=20 >>>>>>>> ________________________________________ >>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf of >>>>>>>> Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com; >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> Don't we still want to know the true originator of the call, even >>>>>>>> when=20 >>>>>>>> we have some token that says "Doctor so and so approved this >>>>>>>>message." >>>>>>>>=20 >>>>>>>> Originating number, display number, and call-back number could be >>>>>>>>3 >>>>>>>> different things. >>>>>>>> Should all of them be verifiable? >>>>>>>>=20 >>>>>>>> Mike >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On >>>>>>>>Behalf >>>>>>>> Of Fernando Mousinho (fmousinh) >>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I believe the scenario telemarketing here is when a client hires a >>>>>>>> BPO=20 >>>>>>>> to place outbound calls, but expect customers to return these >>>>>>>>calls >>>>>>>> to=20 >>>>>>>> a different place (say, their own and operated call center). This >>>>>>>> way,=20 >>>>>>>> this client is authorizing the BPO to use an identity that it >>>>>>>>(BPO) >>>>>>> doesn't own. >>>>>>>> These numbers in this scenario are always operational, just at a >>>>>>>> different place. >>>>>>>>=20 >>>>>>>> The same telemarketing operator would then outpulse multiple >>>>>>>>numbers >>>>>>>> for their multiple clients, none of these numbers belonging to the >>>>>>> telemarketer. >>>>>>>> BTW, we are using the term "telemarketing" in a very generic >>>>>>>>sense - >>>>>>>> this could just as easily be a public service announcement, >>>>>>>> fundraiser, >>>>>>> etc. >>>>>>>>=20 >>>>>>>> If the telemarketer happens to own the inbound call center as >>>>>>>>well, >>>>>>>> it=20 >>>>>>>> very likely owns the number as well and this would necessarily be >>>>>>>>a >>>>>>>> special case >>>>>>>> - it would fall under the same characteristics of any call center. >>>>>>>>=20 >>>>>>>> On a different note, it would help a lot of we standardized >>>>>>>> terminology. >>>>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it may b= e >>>>>>>> hard=20 >>>>>>>> for others to follow the discussion later. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> (generic term for any type of outbound calling, including public >>>>>>>> service announcement, so don't think it's all about sales!) >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> There are some benefits from this approach, but also some >>>>>>>>>scenarios >>>>>>>>> that need clarification how they could function. >>>>>>>>>=20 >>>>>>>>> The benefit is that the credential represents both the company >>>>>>>>> "responsible" for the sales campaign (the "company" in your >>>>>>>>> scenario) >>>>>>>>> and the company operating the sales campaign (the call center in >>>>>>>>> your=20 >>>>>>>>> scenario). For the use in forensics (after the fact analysis) >>>>>>>>>such >>>>>>>>> as pursuit of fraud investigation, we then can follow both paths. >>>>>>>>>=20 >>>>>>>>> However can you clarify the following - >>>>>>>>> - If a SP "signs" the call, is it attesting to the "responsible" >>>>>>>>> party for the telemarketing call or the party executing the >>>>>>>>> telemarketing campaign or both? >>>>>>>>>=20 >>>>>>>>> - How is the SP supposed to know all the parties that it is >>>>>>>>> attesting >>>>>>>>> to >>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>=20 >>>>>>>>> -It seems likely that some of the numbers assigned to a company >>>>>>>>>in >>>>>>>>> your scenario will not be assigned to real telephones (or call >>>>>>>>> center=20 >>>>>>>>> trunk) until a telemarketing campaign is initiated or a call >>>>>>>>>center >>>>>>>>> selected to execute the sales campaign, is it possible to have >>>>>>>>>these >>>>>>>>> unassigned or floating numbers when not in use for a >>>>>>>>>telemarketing >>>>>>>>> campaign? Is it allowed under most national numbering regimes? >>>>>>>>>=20 >>>>>>>>> - How important is it to have a known or recognized phone number >>>>>>>>>as >>>>>>>>> the caller id as part of a telemarketing campaign? I am assuming >>>>>>>>> that not all campaigns care about having a number that is known >>>>>>>>>or >>>>>>> recognized. >>>>>>>>>=20 >>>>>>>>> -In other words for this last bit, if a call center >>>>>>>>>(telemarketing >>>>>>>>> campaign operator) is using their own set of numbers but serve >>>>>>>>> multiple simultaneous telemarketing campaigns using the same >>>>>>>>> originating numbers, what will they sign? Will they just have a >>>>>>>>> credential representing the call center alone, or a different >>>>>>>>> credential per telemarketing campaign, or a different credential >>>>>>>>>per >>>>>>>>> responsible party (per client)? This will affect what is >>>>>>>>>possible >>>>>>>>> for >>>>>>> any forensic activity. >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On >>>>>>>>>Behalf >>>>>>>>> Of Brian Rosen >>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>> To: Fernando Mousinho >>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>=20 >>>>>>>>> The notion we had is that the company contracting the call center >>>>>>>>> approves the use, and the call center, or the SP acting on its >>>>>>>>> behalf, signs. >>>>>>>>> Think of this as another level of delegation. An SP delegates >>>>>>>>> numbers to the company. The company "delegates" use of those >>>>>>>>> numbers=20 >>>>>>>>> to the call center. The call center calls, using that >>>>>>>>>delegation. >>>>>>>>> The credentials of the call center would be different from those >>>>>>>>>of >>>>>>>>> the company, but would cover the same number. Having multiple >>>>>>>>> credentials covering the same number will be very common due to >>>>>>>>>the >>>>>>>>> way delegation happens. In order to allow SPs to sign, without >>>>>>>>> creating credential per TN, we allow credentials with ranges. >>>>>>>>>The >>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>=20 >>>>>>>>> Consider the following complex US case: >>>>>>>>> The North American Number Plan Administrator delegates >>>>>>>>>202-555-xxxx >>>>>>>>> to the Pooling Administrator. The PA now has a credential >>>>>>>>>covering >>>>>>>>> the entire 10K block. >>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP A >>>>>>>>>has >>>>>>>>> a=20 >>>>>>>>> credential for the entire 1K block SP A resells 202-555-12xx to >>>>>>>>>SP B >>>>>>>>> . >>>>>>>>> SP B has a credential for a 100 TN block SP B delegates >>>>>>>>>202-555-123x >>>>>>>>> to Company C. Company C has a credential for a 10 number block >>>>>>>>> Company C authorizes 202-555-1234 to BPO D. BPO D has credential >>>>>>>>> for=20 >>>>>>>>> a 1 number block >>>>>>>>>=20 >>>>>>>>> NANPA and the PA never are in a call path, so they would never >>>>>>>>>sign >>>>>>>>> a=20 >>>>>>>>> call. >>>>>>>>>=20 >>>>>>>>> However, SP A or SP B could sign a call from either Company C or >>>>>>>>>BPO >>>>>>>>> D using the credential they have. >>>>>>>>>=20 >>>>>>>>> The SP for the call center could acquire credentials from the BPO >>>>>>>>> and=20 >>>>>>>>> sign on its behalf. I suspect than many service providers would >>>>>>>>>be >>>>>>>>> reluctant to do so unless the numbers were from their own >>>>>>>>>inventory >>>>>>>>> (that is, the company got its numbers from the same SP as the >>>>>>>>>call >>>>>>> center). >>>>>>>>> Since that won't be the common case, the call center probably >>>>>>>>>has to >>>>>>>>> do the signing itself. >>>>>>>>>=20 >>>>>>>>> Brian >>>>>>>>>=20 >>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh) >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs, >>>>>>>>>>which >>>>>>>>>> provide services for other companies) may have special >>>>>>>>>>arrangements >>>>>>>>>> with SPs, the majority (small to mid-size) will probably rely on >>>>>>>>>> the SPs to do provide to vouch for their identity. This would >>>>>>>>>> probably be the case for the home analog caller anyway. This >>>>>>>>>>would >>>>>>>>>> imply that the "originating" SP's willingness to provide this >>>>>>>>>> signature is a critical success factor for the proposal's >>>>>>>>>>adoption. >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> But back to the business process outsourcers (BPO) case - where >>>>>>>>>>a >>>>>>>>>> call center is providing service on behalf of multiple >>>>>>>>>>companies. I >>>>>>>>>> can see the value of them sending different numbers based on the >>>>>>>>>> clients they represent. Wouldn't that create a billing issue >>>>>>>>>>though? >>>>>>>>>> This is not an area I understand well, but I would suspect that >>>>>>>>>>SP >>>>>>>>>> 1 allowing one of its subscribers to send an outbound call >>>>>>>>>>using a >>>>>>>>>> number registered to SP 2 could be a no-no. If this hypothesis >>>>>>>>>>is >>>>>>>>>> correct, then we are back to the case where the SP is signing >>>>>>>>>>all >>>>>>>>>> calls, >>>>>>>> even for BPOs. >>>>>>>>>>=20 >>>>>>>>>> Or maybe this is another problem we are trying to fix in the >>>>>>>>>> working group, in which case we perhaps should state as a goal >>>>>>>>>>or >>>>>>> benefit: >>>>>>>>>> "providing a reliable mechanism to let calls originated from one >>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>=20 >>>>>>>>>> Fernando >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>> >>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> Any of them could do it. My guess is service providers will >>>>>>>>>>>do it >>>>>>>>>>> for most call centers, although larger call centers might do it >>>>>>>>>>> themselves... >>>>>>>>>>> especially ones which have trunks from multiple providers and >>>>>>>>>>>can >>>>>>>>>>> source calls using the same number(s) out through multiple >>>>>>>>>>> providers on a call-by-call basis. >>>>>>>>>>>=20 >>>>>>>>>>> -hadriel >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh) >>>>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>> I'm catching up with the discussions in this working group, >>>>>>>>>>>>and >>>>>>>>>>>> am trying to understand some architecture implications in call >>>>>>>>>>>> centers (which is where my background is). It seems that many >>>>>>>>>>>>of >>>>>>>>>>>> the problems we are trying to fix are related to contact >>>>>>>>>>>>centers >>>>>>>>>>>> anyway, so it is probably a good idea to have everyone in the >>>>>>>>>>>> same >>>>>>>> page. >>>>>>>>>>>>=20 >>>>>>>>>>>> Forgive me if it is an obvious question, but which components >>>>>>>>>>>>in >>>>>>>>>>>> a "typical call center architecture" do you see signature and >>>>>>>>>>>> verification taking place? Such "typical" deployments have >>>>>>>>>>>> premises based equipment (PME), a session border controller >>>>>>>>>>>>(SBC) >>>>>>>>>>>> and of course a SIP service provider all three could >>>>>>>>>>>>potentially >>>>>>>>>>>> be used throughout the authorization process. There are >>>>>>>>>>>>different >>>>>>>>>>>> ramifications depending on where your mind is at. >>>>>>>>>>>>=20 >>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>> Cisco Systems >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> ________________________________ >>>>>>>>>=20 >>>>>>>>> This e-mail may contain Sprint proprietary information intended >>>>>>>>>for >>>>>>>>> the sole use of the recipient(s). Any use by others is >>>>>>>>>prohibited. >>>>>>>>> If=20 >>>>>>>>> you are not the intended recipient, please contact the sender and >>>>>>>>> delete all copies of the message. >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>=20 >>>>=20 >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>=20 > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From Henning.Schulzrinne@fcc.gov Tue Oct 29 14:59:40 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2352821E8087 for ; Tue, 29 Oct 2013 14:59:40 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VRKuGy53dfPi for ; Tue, 29 Oct 2013 14:59:36 -0700 (PDT) Received: from DC-IP-2.fcc.gov (dc-ip-2.fcc.gov [192.104.54.91]) by ietfa.amsl.com (Postfix) with ESMTP id C1FC821E8093 for ; Tue, 29 Oct 2013 14:59:34 -0700 (PDT) Message-ID: From: Henning Schulzrinne To: 'Dan York' Thread-Topic: Application servers - Re: [stir] Call Center Implications Thread-Index: AQHOs6wM4w3gYleEHUa5h7lxd4Kh+JnNbOEggAAiDICAAEzNAIAADeUAgAAA5QCAAANyAP//6DzSgABb64CAE5iwgIAAOi0AgBt8j4CAAhl7AIANFyQA///ItnA= Date: Tue, 29 Oct 2013 21:59:32 +0000 References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Cc: "stir@ietf.org" Subject: Re: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 29 Oct 2013 21:59:40 -0000 One model is something like OAuth, where the holder of the number (i.e., th= e customer of the BPO or voice ASP) allows them to retrieve a key pair for = a number. A simpler version is that the number holder gets an app key, simi= lar to what Google does, and hands this to the VASP. That key can then be u= sed to submit the certificate signing request, e.g., via HTTPS with basic a= uthentication. My understanding is, however, that outfits like Twilio often provide those = numbers since most users don't really have good ways of getting their own a= nd many of these services handle inbound calls, not just outbound. But we c= learly need to support the "borrowed" number model. -----Original Message----- From: Dan York [mailto:york@isoc.org]=20 Sent: Tuesday, October 29, 2013 5:10 PM To: Brian Rosen; Cullen Jennings Cc: Gregory.Schumacher@sprint.com; Richard Shockey; Henning Schulzrinne; st= ir@ietf.org; Alex Bobotek; Michael Hammer; Fernando Mousinho (fmousinh) Subject: Application servers - Re: [stir] Call Center Implications Getting caught up on some of the STIR discussions, I'd just note that when = we talk about "call centers" or "BPOs" we also need to remember that we're = not only talking about "traditional" call centers but also what I'll call "= voice application service providers". They are generally automated platfor= ms running applications that a company uses for some kind of outbound servi= ce. Examples include: - calling everyone in a school district with a weather-related cancellation= (or, unfortunately, a school shooting or similar event) - calling patients to provide reminders of appointments or notifications of= subscriptions available - calling customers to let them know that a package was delivered or could = be picked up, etc. - calling people scheduled for a flight to let know they are going to be de= layed - calling members of an organization with an automated survey about current= issues - performing a call-back to provide an additional layer of authentication f= or some service There is a large (and growing) market for these kind of automated tools and= services and the distinction between these calls and "robocalls" is really= only one of intent and the fact that the recipient has "opted in" through some kind of system. Generally, though, many of the companies want the application to appear as = if it is coming from their own phone number in the same way that they want = an outbound call center to appear as if it is coming from one of their own = phone numbers. You could think of these in the same way as "call centers", but I point thi= s out because some of these new services are very automated and there are a= lways new startups now emerging in this space. Some of them are very "self= -service" where the customer does it all while others have teams of people = involved. Some of the companies involved include Nuance, Microsoft Tellme,= Voxeo (now Aspect, and also my former employer), Tropo, Twilio, Convergys = and many more[1]. If STIR is to succeed, these kind of application platforms will also need t= o be able to make calls on behalf of the companies using those platforms. Dan [1] One report about this market: http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf -- Dan York Senior Content Strategist, Internet Society york@isoc.org +1-802-735-1624 Jabber: york@jabber.isoc.org Skype: danyork http://twitter.com/danyork http://www.internetsociety.org/deploy360/ On 10/21/13 9:15 AM, "Brian Rosen" wrote: >We really need to give each BPO different keys I think. The notion that >we are sharing private keys among multiple competing entities who=20 >provide services for a single enterprise strikes me as a VBI (Very Bad=20 >Idea). I can't see any real difficulty in having more than one=20 >authorized entity, each with it's own credentials. Who would have a=20 >problem? We're already agreeing that there are multiple credentials=20 >for a number, because the number gets delegated multiple times. =20 >Consider, just as an example, the BPO and the contracting enterprise=20 >that was actually delegated the number can both send calls from that=20 >number. You certainly don't want the enterprise giving out IT'S key to=20 >it's contractors. At best it's a key it authorizes to one or more of it's= BPOs. > >Brian > >On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy)=20 > >wrote: > >>=20 >> What Fernando is saying makes sense to me a desirable property of the=20 >>solution and I agree that if we gave each BPO a different private key=20 >>that would solve it but that might be pretty hard to mange in other=20 >>ways. I like the requirements but the solution is not 100% obvious to=20 >>me. >>=20 >>=20 >> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>=20 >>> Sure. >>>=20 >>> Each BPO would have a different private/public key pair. >>>=20 >>> So you can trace which one placed the call. >>>=20 >>> Brian >>>=20 >>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh)=20 >>> wrote: >>>=20 >>>> Point taken on PAI, but am still struggling with this BPO model. >>>>Apologies >>>> upfront if this is obvious and I'm just failing to understand. >>>>=20 >>>> If the company hires several BPOs and authorizes all of them to=20 >>>>sign calls on its behalf, is there a way to trace back the=20 >>>>originator (specific >>>>BPO) >>>> later on? I suppose that at some level the actual caller must be=20 >>>>exposed (perhaps to trace malicious activity, such as malicious=20 >>>>person infiltrated in an otherwise legitimate BPO). >>>>=20 >>>> Via headers would be the obvious pick, but they don't survive the=20 >>>>plethora of SBCs that the call is likely to transverse. Or maybe=20 >>>>the certs themselves can carry this type of data (actual caller=20 >>>>identity). >>>>=20 >>>>=20 >>>>=20 >>>>=20 >>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>=20 >>>>> Don't think that would work without related changes in the networks. >>>>> In >>>>> some networks, PAI is used for called id. They would have to=20 >>>>>change to use From (if signed maybe). It also doesn't fit the=20 >>>>>definition of PAI. >>>>>=20 >>>>> Brian >>>>>=20 >>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh)=20 >>>>> wrote: >>>>>=20 >>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>"From" >>>>>> identifies the BPO, "PAI" the c >>>>>> ompany hiring the BPO - based on the delegation process Rosen=20 >>>>>>mentions. >>>>>> PAI's use is widespread, and it's main limitation is being=20 >>>>>>spoofable - but this is exactly the problem we are trying to=20 >>>>>>solve anyway. >>>>>>=20 >>>>>>=20 >>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey"=20 >>>>>>> >>>>>>> wrote: >>>>>>>=20 >>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>Behalf Of Alex Bobotek >>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; =20 >>>>>>>Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> +1 >>>>>>> I've assumed that we are headed towards a "sign whatever extras=20 >>>>>>> you wish, and indicate what your signature covers" mechanism. >>>>>>>=20 >>>>>>> Based on this, standards would need to identify only a minimal=20 >>>>>>>subset of what shall/should be signed, and ensure that any=20 >>>>>>>required group of signed items survives transit intact. >>>>>>>=20 >>>>>>> Best signing practices may be needed to complement the standard,=20 >>>>>>>and an appropriate place for all but the most basic 'what to=20 >>>>>>>sign' >>>>>>> recommendations. >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> Regards, >>>>>>>=20 >>>>>>> Alex >>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Henning Schulzrinne >>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>> To: Michael Hammer; fmousinh@cisco.com;=20 >>>>>>>>Gregory.Schumacher@sprint.com; >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I see no reason not to allow signing any number-related field=20 >>>>>>>>in the SIP request. (Signing may well be done by different=20 >>>>>>>>parties.) >>>>>>>>=20 >>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't=20 >>>>>>>>conveyable in legacy systems, however, so this may be of=20 >>>>>>>>somewhat limited use for a >>>>>>> while. >>>>>>>>=20 >>>>>>>> ________________________________________ >>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf=20 >>>>>>>> of Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com;=20 >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> Don't we still want to know the true originator of the call,=20 >>>>>>>>even when we have some token that says "Doctor so and so=20 >>>>>>>>approved this message." >>>>>>>>=20 >>>>>>>> Originating number, display number, and call-back number could=20 >>>>>>>>be >>>>>>>>3 >>>>>>>> different things. >>>>>>>> Should all of them be verifiable? >>>>>>>>=20 >>>>>>>> Mike >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Fernando Mousinho (fmousinh) >>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I believe the scenario telemarketing here is when a client=20 >>>>>>>>hires a BPO to place outbound calls, but expect customers to=20 >>>>>>>>return these calls to a different place (say, their own and=20 >>>>>>>>operated call center). This way, this client is authorizing=20 >>>>>>>>the BPO to use an identity that it >>>>>>>>(BPO) >>>>>>> doesn't own. >>>>>>>> These numbers in this scenario are always operational, just at=20 >>>>>>>> a different place. >>>>>>>>=20 >>>>>>>> The same telemarketing operator would then outpulse multiple=20 >>>>>>>>numbers for their multiple clients, none of these numbers=20 >>>>>>>>belonging to the >>>>>>> telemarketer. >>>>>>>> BTW, we are using the term "telemarketing" in a very generic=20 >>>>>>>>sense - this could just as easily be a public service=20 >>>>>>>>announcement, fundraiser, >>>>>>> etc. >>>>>>>>=20 >>>>>>>> If the telemarketer happens to own the inbound call center as=20 >>>>>>>>well, it very likely owns the number as well and this would=20 >>>>>>>>necessarily be a special case >>>>>>>> - it would fall under the same characteristics of any call center. >>>>>>>>=20 >>>>>>>> On a different note, it would help a lot of we standardized=20 >>>>>>>> terminology. >>>>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it may=20 >>>>>>>> be hard for others to follow the discussion later. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> (generic term for any type of outbound calling, including=20 >>>>>>>> public service announcement, so don't think it's all about=20 >>>>>>>> sales!) >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> There are some benefits from this approach, but also some=20 >>>>>>>>>scenarios that need clarification how they could function. >>>>>>>>>=20 >>>>>>>>> The benefit is that the credential represents both the company =20 >>>>>>>>>"responsible" for the sales campaign (the "company" in your >>>>>>>>> scenario) >>>>>>>>> and the company operating the sales campaign (the call center=20 >>>>>>>>>in your scenario). For the use in forensics (after the fact=20 >>>>>>>>>analysis) such as pursuit of fraud investigation, we then can=20 >>>>>>>>>follow both paths. >>>>>>>>>=20 >>>>>>>>> However can you clarify the following - >>>>>>>>> - If a SP "signs" the call, is it attesting to the "responsible" >>>>>>>>> party for the telemarketing call or the party executing the=20 >>>>>>>>> telemarketing campaign or both? >>>>>>>>>=20 >>>>>>>>> - How is the SP supposed to know all the parties that it is=20 >>>>>>>>> attesting to >>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>=20 >>>>>>>>> -It seems likely that some of the numbers assigned to a=20 >>>>>>>>>company in your scenario will not be assigned to real=20 >>>>>>>>>telephones (or call center >>>>>>>>> trunk) until a telemarketing campaign is initiated or a call=20 >>>>>>>>>center selected to execute the sales campaign, is it possible=20 >>>>>>>>>to have these unassigned or floating numbers when not in use=20 >>>>>>>>>for a telemarketing campaign? Is it allowed under most=20 >>>>>>>>>national numbering regimes? >>>>>>>>>=20 >>>>>>>>> - How important is it to have a known or recognized phone=20 >>>>>>>>>number as the caller id as part of a telemarketing campaign? =20 >>>>>>>>>I am assuming that not all campaigns care about having a=20 >>>>>>>>>number that is known or >>>>>>> recognized. >>>>>>>>>=20 >>>>>>>>> -In other words for this last bit, if a call center=20 >>>>>>>>>(telemarketing campaign operator) is using their own set of=20 >>>>>>>>>numbers but serve multiple simultaneous telemarketing=20 >>>>>>>>>campaigns using the same originating numbers, what will they=20 >>>>>>>>>sign? Will they just have a credential representing the call=20 >>>>>>>>>center alone, or a different credential per telemarketing=20 >>>>>>>>>campaign, or a different credential per responsible party (per=20 >>>>>>>>>client)? This will affect what is possible for >>>>>>> any forensic activity. >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>>Behalf Of Brian Rosen >>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>> To: Fernando Mousinho >>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>=20 >>>>>>>>> The notion we had is that the company contracting the call=20 >>>>>>>>>center approves the use, and the call center, or the SP acting=20 >>>>>>>>>on its behalf, signs. >>>>>>>>> Think of this as another level of delegation. An SP delegates =20 >>>>>>>>>numbers to the company. The company "delegates" use of those =20 >>>>>>>>>numbers to the call center. The call center calls, using that=20 >>>>>>>>>delegation. >>>>>>>>> The credentials of the call center would be different from=20 >>>>>>>>>those of the company, but would cover the same number. Having=20 >>>>>>>>>multiple credentials covering the same number will be very=20 >>>>>>>>>common due to the way delegation happens. In order to allow=20 >>>>>>>>>SPs to sign, without creating credential per TN, we allow=20 >>>>>>>>>credentials with ranges. >>>>>>>>>The >>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>=20 >>>>>>>>> Consider the following complex US case: >>>>>>>>> The North American Number Plan Administrator delegates=20 >>>>>>>>>202-555-xxxx to the Pooling Administrator. The PA now has a=20 >>>>>>>>>credential covering the entire 10K block. >>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP=20 >>>>>>>>>A has a credential for the entire 1K block SP A resells=20 >>>>>>>>>202-555-12xx to SP B . >>>>>>>>> SP B has a credential for a 100 TN block SP B delegates=20 >>>>>>>>>202-555-123x to Company C. Company C has a credential for a=20 >>>>>>>>>10 number block Company C authorizes 202-555-1234 to BPO D. =20 >>>>>>>>>BPO D has credential for a 1 number block >>>>>>>>>=20 >>>>>>>>> NANPA and the PA never are in a call path, so they would never=20 >>>>>>>>>sign a call. >>>>>>>>>=20 >>>>>>>>> However, SP A or SP B could sign a call from either Company C=20 >>>>>>>>>or BPO D using the credential they have. >>>>>>>>>=20 >>>>>>>>> The SP for the call center could acquire credentials from the=20 >>>>>>>>>BPO and sign on its behalf. I suspect than many service=20 >>>>>>>>>providers would be reluctant to do so unless the numbers were=20 >>>>>>>>>from their own inventory (that is, the company got its numbers=20 >>>>>>>>>from the same SP as the call >>>>>>> center). >>>>>>>>> Since that won't be the common case, the call center probably=20 >>>>>>>>>has to do the signing itself. >>>>>>>>>=20 >>>>>>>>> Brian >>>>>>>>>=20 >>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs,=20 >>>>>>>>>>which provide services for other companies) may have special=20 >>>>>>>>>>arrangements with SPs, the majority (small to mid-size) will=20 >>>>>>>>>>probably rely on the SPs to do provide to vouch for their=20 >>>>>>>>>>identity. This would probably be the case for the home analog=20 >>>>>>>>>>caller anyway. This would imply that the "originating" SP's=20 >>>>>>>>>>willingness to provide this signature is a critical success=20 >>>>>>>>>>factor for the proposal's adoption. >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> But back to the business process outsourcers (BPO) case -=20 >>>>>>>>>>where a call center is providing service on behalf of=20 >>>>>>>>>>multiple companies. I can see the value of them sending=20 >>>>>>>>>>different numbers based on the clients they represent.=20 >>>>>>>>>>Wouldn't that create a billing issue though? >>>>>>>>>> This is not an area I understand well, but I would suspect=20 >>>>>>>>>>that SP >>>>>>>>>> 1 allowing one of its subscribers to send an outbound call=20 >>>>>>>>>>using a number registered to SP 2 could be a no-no. If this=20 >>>>>>>>>>hypothesis is correct, then we are back to the case where the=20 >>>>>>>>>>SP is signing all calls, >>>>>>>> even for BPOs. >>>>>>>>>>=20 >>>>>>>>>> Or maybe this is another problem we are trying to fix in the =20 >>>>>>>>>>working group, in which case we perhaps should state as a goal=20 >>>>>>>>>>or >>>>>>> benefit: >>>>>>>>>> "providing a reliable mechanism to let calls originated from=20 >>>>>>>>>> one >>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>=20 >>>>>>>>>> Fernando >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>> >>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> Any of them could do it. My guess is service providers will=20 >>>>>>>>>>>do it for most call centers, although larger call centers=20 >>>>>>>>>>>might do it themselves... >>>>>>>>>>> especially ones which have trunks from multiple providers=20 >>>>>>>>>>>and can source calls using the same number(s) out through=20 >>>>>>>>>>>multiple providers on a call-by-call basis. >>>>>>>>>>>=20 >>>>>>>>>>> -hadriel >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>> I'm catching up with the discussions in this working group,=20 >>>>>>>>>>>>and am trying to understand some architecture implications=20 >>>>>>>>>>>>in call centers (which is where my background is). It seems=20 >>>>>>>>>>>>that many of the problems we are trying to fix are related=20 >>>>>>>>>>>>to contact centers anyway, so it is probably a good idea to=20 >>>>>>>>>>>>have everyone in the same >>>>>>>> page. >>>>>>>>>>>>=20 >>>>>>>>>>>> Forgive me if it is an obvious question, but which=20 >>>>>>>>>>>>components in a "typical call center architecture" do you=20 >>>>>>>>>>>>see signature and verification taking place? Such "typical"=20 >>>>>>>>>>>>deployments have premises based equipment (PME), a session=20 >>>>>>>>>>>>border controller >>>>>>>>>>>>(SBC) >>>>>>>>>>>> and of course a SIP service provider all three could=20 >>>>>>>>>>>>potentially be used throughout the authorization process.=20 >>>>>>>>>>>>There are different ramifications depending on where your=20 >>>>>>>>>>>>mind is at. >>>>>>>>>>>>=20 >>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>> Cisco Systems >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> ________________________________ >>>>>>>>>=20 >>>>>>>>> This e-mail may contain Sprint proprietary information=20 >>>>>>>>>intended for the sole use of the recipient(s). Any use by=20 >>>>>>>>>others is prohibited. >>>>>>>>> If >>>>>>>>> you are not the intended recipient, please contact the sender=20 >>>>>>>>>and delete all copies of the message. >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>=20 >>>>=20 >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>=20 > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From br@brianrosen.net Wed Oct 30 06:23:29 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5229321E80F1 for ; Wed, 30 Oct 2013 06:23:29 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.489 X-Spam-Level: X-Spam-Status: No, score=-103.489 tagged_above=-999 required=5 tests=[AWL=0.111, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a2FhGmLefMek for ; Wed, 30 Oct 2013 06:23:22 -0700 (PDT) Received: from mail-qc0-f177.google.com (mail-qc0-f177.google.com [209.85.216.177]) by ietfa.amsl.com (Postfix) with ESMTP id 2B3B221F9FC7 for ; Wed, 30 Oct 2013 06:22:51 -0700 (PDT) Received: by mail-qc0-f177.google.com with SMTP id u18so749129qcx.8 for ; Wed, 30 Oct 2013 06:22:50 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=n/dxDnrk+f+khVI0PONlsHan3ZgWGi0zKR7KoPNfGsQ=; b=WuSXj2/fzkcaegzCXWY5hcMb0XrU2vQC22kcOuTB5khYWaU47NdF3ezTX/dRIKV/cV xebOmr6lOUGTwgcrZ8B39TRmn4hsQpjHdSzuEq1ycypzG1k8spbyUue4p8Gm1PQ5vzxX F/S3v/crPf6ErF8IzrIYckCAyxT1S+GaHmY+Oa3IM1BlILc55+vt4kiMxebPyZ+6X5g/ UdP1YtkDvw0pG2/B6G0cUH2aE16nruZ1oxWHq02wM3fC5V9rwArzkiJM99+3dNFik/pF UEGdikx6+Aqh5DH/ELh05TpJVHbZDZvgXyvQJdFgoU/kZV3SbuL1Hz4VWEnMx2AS1e+V ZZMQ== X-Gm-Message-State: ALoCoQnbF7+7aH6wJgHS80yUT76CQ6oAFMRZlwg71vRsNdPuTh9PG+YXjpUmxeS5oDqy382SyqUB X-Received: by 10.224.138.4 with SMTP id y4mr7838824qat.65.1383139370484; Wed, 30 Oct 2013 06:22:50 -0700 (PDT) Received: from tvau-lt510.cis.neustar.com (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id x1sm76991235qai.6.2013.10.30.06.22.49 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 30 Oct 2013 06:22:49 -0700 (PDT) Content-Type: text/plain; charset=windows-1250 Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\)) From: Brian Rosen In-Reply-To: Date: Wed, 30 Oct 2013 09:22:48 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <60B2C28B-7574-49A9-9F09-2BA1DC75DF65@brianrosen.net> References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> To: Henning Schulzrinne X-Mailer: Apple Mail (2.1816) Cc: "stir@ietf.org" , Dan York Subject: Re: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 13:23:29 -0000 I look at these authorized uses as just another delegation. When you delegate, you don=92t lose the ability to sign for that number. = For example, if a service provider delegates a number to an end user, = the end user device or the service provider can sign. In these cases, = the end device, its delegates, or the service provider can sign. I = think once you get authorization to sign, you have a credential (to use = for signing). That credential can also be used to authorize further = delegation. I=92d make that =93can=94, to allow the possibility that a = service provider have a single, or small number of, credentials that it = uses to authorize delegations that are independent of the signing keys. = Using it means that the database doesn=92t need to have some identity = for delegates other than their signing keys. It could have some other = credential, but the simple solution is =93if you are authorized to place = a call and sign for that TN, then you are authorized to delegate signing = authority to anyone you trust=94. I suppose the service provider could = decide to limit that ability if it wanted to. That makes the mechanism simpler - we=92re not special-casing the = authorized additional user case.=20 I certainly don=92t like any notion of sharing private keys. Brian On Oct 29, 2013, at 5:59 PM, Henning Schulzrinne = wrote: > One model is something like OAuth, where the holder of the number = (i.e., the customer of the BPO or voice ASP) allows them to retrieve a = key pair for a number. A simpler version is that the number holder gets = an app key, similar to what Google does, and hands this to the VASP. = That key can then be used to submit the certificate signing request, = e.g., via HTTPS with basic authentication. >=20 > My understanding is, however, that outfits like Twilio often provide = those numbers since most users don't really have good ways of getting = their own and many of these services handle inbound calls, not just = outbound. But we clearly need to support the "borrowed" number model. >=20 > -----Original Message----- > From: Dan York [mailto:york@isoc.org]=20 > Sent: Tuesday, October 29, 2013 5:10 PM > To: Brian Rosen; Cullen Jennings > Cc: Gregory.Schumacher@sprint.com; Richard Shockey; Henning = Schulzrinne; stir@ietf.org; Alex Bobotek; Michael Hammer; Fernando = Mousinho (fmousinh) > Subject: Application servers - Re: [stir] Call Center Implications >=20 > Getting caught up on some of the STIR discussions, I'd just note that = when we talk about "call centers" or "BPOs" we also need to remember = that we're not only talking about "traditional" call centers but also = what I'll call "voice application service providers". They are = generally automated platforms running applications that a company uses = for some kind of outbound service. Examples include: >=20 > - calling everyone in a school district with a weather-related = cancellation (or, unfortunately, a school shooting or similar event) > - calling patients to provide reminders of appointments or = notifications of subscriptions available > - calling customers to let them know that a package was delivered or = could be picked up, etc. > - calling people scheduled for a flight to let know they are going to = be delayed > - calling members of an organization with an automated survey about = current issues > - performing a call-back to provide an additional layer of = authentication for some service >=20 > There is a large (and growing) market for these kind of automated = tools and services and the distinction between these calls and = "robocalls" is really only one of intent and the fact that the recipient = has "opted in" > through some kind of system. >=20 > Generally, though, many of the companies want the application to = appear as if it is coming from their own phone number in the same way = that they want an outbound call center to appear as if it is coming from = one of their own phone numbers. >=20 > You could think of these in the same way as "call centers", but I = point this out because some of these new services are very automated and = there are always new startups now emerging in this space. Some of them = are very "self-service" where the customer does it all while others have = teams of people involved. Some of the companies involved include = Nuance, Microsoft Tellme, Voxeo (now Aspect, and also my former = employer), Tropo, Twilio, Convergys and many more[1]. >=20 > If STIR is to succeed, these kind of application platforms will also = need to be able to make calls on behalf of the companies using those = platforms. >=20 > Dan >=20 > [1] One report about this market: > http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf >=20 >=20 > -- > Dan York > Senior Content Strategist, Internet Society > york@isoc.org +1-802-735-1624 > Jabber: york@jabber.isoc.org > Skype: danyork http://twitter.com/danyork >=20 > http://www.internetsociety.org/deploy360/ >=20 >=20 >=20 >=20 > On 10/21/13 9:15 AM, "Brian Rosen" wrote: >=20 >> We really need to give each BPO different keys I think. The notion = that >> we are sharing private keys among multiple competing entities who=20 >> provide services for a single enterprise strikes me as a VBI (Very = Bad=20 >> Idea). I can't see any real difficulty in having more than one=20 >> authorized entity, each with it's own credentials. Who would have a=20= >> problem? We're already agreeing that there are multiple credentials=20= >> for a number, because the number gets delegated multiple times. =20 >> Consider, just as an example, the BPO and the contracting enterprise=20= >> that was actually delegated the number can both send calls from that=20= >> number. You certainly don't want the enterprise giving out IT'S key = to=20 >> it's contractors. At best it's a key it authorizes to one or more of = it's BPOs. >>=20 >> Brian >>=20 >> On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy)=20 >> >> wrote: >>=20 >>>=20 >>> What Fernando is saying makes sense to me a desirable property of = the=20 >>> solution and I agree that if we gave each BPO a different private = key=20 >>> that would solve it but that might be pretty hard to mange in other=20= >>> ways. I like the requirements but the solution is not 100% obvious = to=20 >>> me. >>>=20 >>>=20 >>> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>>=20 >>>> Sure. >>>>=20 >>>> Each BPO would have a different private/public key pair. >>>>=20 >>>> So you can trace which one placed the call. >>>>=20 >>>> Brian >>>>=20 >>>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh)=20 >>>> wrote: >>>>=20 >>>>> Point taken on PAI, but am still struggling with this BPO model. >>>>> Apologies >>>>> upfront if this is obvious and I'm just failing to understand. >>>>>=20 >>>>> If the company hires several BPOs and authorizes all of them to=20 >>>>> sign calls on its behalf, is there a way to trace back the=20 >>>>> originator (specific >>>>> BPO) >>>>> later on? I suppose that at some level the actual caller must be=20= >>>>> exposed (perhaps to trace malicious activity, such as malicious=20= >>>>> person infiltrated in an otherwise legitimate BPO). >>>>>=20 >>>>> Via headers would be the obvious pick, but they don't survive the=20= >>>>> plethora of SBCs that the call is likely to transverse. Or maybe=20= >>>>> the certs themselves can carry this type of data (actual caller=20= >>>>> identity). >>>>>=20 >>>>>=20 >>>>>=20 >>>>>=20 >>>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>>=20 >>>>>> Don't think that would work without related changes in the = networks. >>>>>> In >>>>>> some networks, PAI is used for called id. They would have to=20 >>>>>> change to use =46rom (if signed maybe). It also doesn't fit the=20= >>>>>> definition of PAI. >>>>>>=20 >>>>>> Brian >>>>>>=20 >>>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh)=20 >>>>>> wrote: >>>>>>=20 >>>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>> "From" >>>>>>> identifies the BPO, "PAI" the c >>>>>>> ompany hiring the BPO - based on the delegation process Rosen=20 >>>>>>> mentions. >>>>>>> PAI's use is widespread, and it's main limitation is being=20 >>>>>>> spoofable - but this is exactly the problem we are trying to=20 >>>>>>> solve anyway. >>>>>>>=20 >>>>>>>=20 >>>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey"=20 >>>>>>>> >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>> Behalf Of Alex Bobotek >>>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; =20= >>>>>>>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> +1 >>>>>>>> I've assumed that we are headed towards a "sign whatever extras=20= >>>>>>>> you wish, and indicate what your signature covers" mechanism. >>>>>>>>=20 >>>>>>>> Based on this, standards would need to identify only a minimal=20= >>>>>>>> subset of what shall/should be signed, and ensure that any=20 >>>>>>>> required group of signed items survives transit intact. >>>>>>>>=20 >>>>>>>> Best signing practices may be needed to complement the = standard,=20 >>>>>>>> and an appropriate place for all but the most basic 'what to=20= >>>>>>>> sign' >>>>>>>> recommendations. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> Regards, >>>>>>>>=20 >>>>>>>> Alex >>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>>> Behalf Of Henning Schulzrinne >>>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>>> To: Michael Hammer; fmousinh@cisco.com;=20 >>>>>>>>> Gregory.Schumacher@sprint.com; >>>>>>>>> br@brianrosen.net >>>>>>>>> Cc: stir@ietf.org >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> I see no reason not to allow signing any number-related field=20= >>>>>>>>> in the SIP request. (Signing may well be done by different=20 >>>>>>>>> parties.) >>>>>>>>>=20 >>>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't=20 >>>>>>>>> conveyable in legacy systems, however, so this may be of=20 >>>>>>>>> somewhat limited use for a >>>>>>>> while. >>>>>>>>>=20 >>>>>>>>> ________________________________________ >>>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf=20= >>>>>>>>> of Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com;=20 >>>>>>>>> br@brianrosen.net >>>>>>>>> Cc: stir@ietf.org >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> Don't we still want to know the true originator of the call,=20= >>>>>>>>> even when we have some token that says "Doctor so and so=20 >>>>>>>>> approved this message." >>>>>>>>>=20 >>>>>>>>> Originating number, display number, and call-back number could=20= >>>>>>>>> be >>>>>>>>> 3 >>>>>>>>> different things. >>>>>>>>> Should all of them be verifiable? >>>>>>>>>=20 >>>>>>>>> Mike >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>>> Behalf Of Fernando Mousinho (fmousinh) >>>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>>> Cc: stir@ietf.org >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> I believe the scenario telemarketing here is when a client=20 >>>>>>>>> hires a BPO to place outbound calls, but expect customers to=20= >>>>>>>>> return these calls to a different place (say, their own and=20= >>>>>>>>> operated call center). This way, this client is authorizing=20= >>>>>>>>> the BPO to use an identity that it >>>>>>>>> (BPO) >>>>>>>> doesn't own. >>>>>>>>> These numbers in this scenario are always operational, just at=20= >>>>>>>>> a different place. >>>>>>>>>=20 >>>>>>>>> The same telemarketing operator would then outpulse multiple=20= >>>>>>>>> numbers for their multiple clients, none of these numbers=20 >>>>>>>>> belonging to the >>>>>>>> telemarketer. >>>>>>>>> BTW, we are using the term "telemarketing" in a very generic=20= >>>>>>>>> sense - this could just as easily be a public service=20 >>>>>>>>> announcement, fundraiser, >>>>>>>> etc. >>>>>>>>>=20 >>>>>>>>> If the telemarketer happens to own the inbound call center as=20= >>>>>>>>> well, it very likely owns the number as well and this would=20= >>>>>>>>> necessarily be a special case >>>>>>>>> - it would fall under the same characteristics of any call = center. >>>>>>>>>=20 >>>>>>>>> On a different note, it would help a lot of we standardized=20 >>>>>>>>> terminology. >>>>>>>>> Telemarketing, BPO, call center, end customer, clients=8A it = may=20 >>>>>>>>> be hard for others to follow the discussion later. >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> (generic term for any type of outbound calling, including=20 >>>>>>>>> public service announcement, so don't think it's all about=20 >>>>>>>>> sales!) >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> There are some benefits from this approach, but also some=20 >>>>>>>>>> scenarios that need clarification how they could function. >>>>>>>>>>=20 >>>>>>>>>> The benefit is that the credential represents both the = company =20 >>>>>>>>>> "responsible" for the sales campaign (the "company" in your >>>>>>>>>> scenario) >>>>>>>>>> and the company operating the sales campaign (the call center=20= >>>>>>>>>> in your scenario). For the use in forensics (after the = fact=20 >>>>>>>>>> analysis) such as pursuit of fraud investigation, we then = can=20 >>>>>>>>>> follow both paths. >>>>>>>>>>=20 >>>>>>>>>> However can you clarify the following - >>>>>>>>>> - If a SP "signs" the call, is it attesting to the = "responsible" >>>>>>>>>> party for the telemarketing call or the party executing the=20= >>>>>>>>>> telemarketing campaign or both? >>>>>>>>>>=20 >>>>>>>>>> - How is the SP supposed to know all the parties that it is=20= >>>>>>>>>> attesting to >>>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>>=20 >>>>>>>>>> -It seems likely that some of the numbers assigned to a=20 >>>>>>>>>> company in your scenario will not be assigned to real=20 >>>>>>>>>> telephones (or call center >>>>>>>>>> trunk) until a telemarketing campaign is initiated or a call=20= >>>>>>>>>> center selected to execute the sales campaign, is it = possible=20 >>>>>>>>>> to have these unassigned or floating numbers when not in use=20= >>>>>>>>>> for a telemarketing campaign? Is it allowed under most=20 >>>>>>>>>> national numbering regimes? >>>>>>>>>>=20 >>>>>>>>>> - How important is it to have a known or recognized phone=20 >>>>>>>>>> number as the caller id as part of a telemarketing campaign? = =20 >>>>>>>>>> I am assuming that not all campaigns care about having a=20 >>>>>>>>>> number that is known or >>>>>>>> recognized. >>>>>>>>>>=20 >>>>>>>>>> -In other words for this last bit, if a call center=20 >>>>>>>>>> (telemarketing campaign operator) is using their own set of=20= >>>>>>>>>> numbers but serve multiple simultaneous telemarketing=20 >>>>>>>>>> campaigns using the same originating numbers, what will they=20= >>>>>>>>>> sign? Will they just have a credential representing the = call=20 >>>>>>>>>> center alone, or a different credential per telemarketing=20 >>>>>>>>>> campaign, or a different credential per responsible party = (per=20 >>>>>>>>>> client)? This will affect what is possible for >>>>>>>> any forensic activity. >>>>>>>>>>=20 >>>>>>>>>> -----Original Message----- >>>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>>>> Behalf Of Brian Rosen >>>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>>> To: Fernando Mousinho >>>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>>=20 >>>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>>=20 >>>>>>>>>> The notion we had is that the company contracting the call=20 >>>>>>>>>> center approves the use, and the call center, or the SP = acting=20 >>>>>>>>>> on its behalf, signs. >>>>>>>>>> Think of this as another level of delegation. An SP = delegates =20 >>>>>>>>>> numbers to the company. The company "delegates" use of those = =20 >>>>>>>>>> numbers to the call center. The call center calls, using = that=20 >>>>>>>>>> delegation. >>>>>>>>>> The credentials of the call center would be different from=20 >>>>>>>>>> those of the company, but would cover the same number. = Having=20 >>>>>>>>>> multiple credentials covering the same number will be very=20= >>>>>>>>>> common due to the way delegation happens. In order to allow=20= >>>>>>>>>> SPs to sign, without creating credential per TN, we allow=20 >>>>>>>>>> credentials with ranges. >>>>>>>>>> The >>>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>>=20 >>>>>>>>>> Consider the following complex US case: >>>>>>>>>> The North American Number Plan Administrator delegates=20 >>>>>>>>>> 202-555-xxxx to the Pooling Administrator. The PA now has a=20= >>>>>>>>>> credential covering the entire 10K block. >>>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP=20= >>>>>>>>>> A has a credential for the entire 1K block SP A resells=20 >>>>>>>>>> 202-555-12xx to SP B . >>>>>>>>>> SP B has a credential for a 100 TN block SP B delegates=20 >>>>>>>>>> 202-555-123x to Company C. Company C has a credential for a=20= >>>>>>>>>> 10 number block Company C authorizes 202-555-1234 to BPO D. =20= >>>>>>>>>> BPO D has credential for a 1 number block >>>>>>>>>>=20 >>>>>>>>>> NANPA and the PA never are in a call path, so they would = never=20 >>>>>>>>>> sign a call. >>>>>>>>>>=20 >>>>>>>>>> However, SP A or SP B could sign a call from either Company C=20= >>>>>>>>>> or BPO D using the credential they have. >>>>>>>>>>=20 >>>>>>>>>> The SP for the call center could acquire credentials from the=20= >>>>>>>>>> BPO and sign on its behalf. I suspect than many service=20 >>>>>>>>>> providers would be reluctant to do so unless the numbers = were=20 >>>>>>>>>> from their own inventory (that is, the company got its = numbers=20 >>>>>>>>>> from the same SP as the call >>>>>>>> center). >>>>>>>>>> Since that won't be the common case, the call center probably=20= >>>>>>>>>> has to do the signing itself. >>>>>>>>>>=20 >>>>>>>>>> Brian >>>>>>>>>>=20 >>>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs,=20= >>>>>>>>>>> which provide services for other companies) may have = special=20 >>>>>>>>>>> arrangements with SPs, the majority (small to mid-size) = will=20 >>>>>>>>>>> probably rely on the SPs to do provide to vouch for their=20= >>>>>>>>>>> identity. This would probably be the case for the home = analog=20 >>>>>>>>>>> caller anyway. This would imply that the "originating" SP's=20= >>>>>>>>>>> willingness to provide this signature is a critical success=20= >>>>>>>>>>> factor for the proposal's adoption. >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> But back to the business process outsourcers (BPO) case -=20 >>>>>>>>>>> where a call center is providing service on behalf of=20 >>>>>>>>>>> multiple companies. I can see the value of them sending=20 >>>>>>>>>>> different numbers based on the clients they represent.=20 >>>>>>>>>>> Wouldn't that create a billing issue though? >>>>>>>>>>> This is not an area I understand well, but I would suspect=20= >>>>>>>>>>> that SP >>>>>>>>>>> 1 allowing one of its subscribers to send an outbound call=20= >>>>>>>>>>> using a number registered to SP 2 could be a no-no. If this=20= >>>>>>>>>>> hypothesis is correct, then we are back to the case where = the=20 >>>>>>>>>>> SP is signing all calls, >>>>>>>>> even for BPOs. >>>>>>>>>>>=20 >>>>>>>>>>> Or maybe this is another problem we are trying to fix in the = =20 >>>>>>>>>>> working group, in which case we perhaps should state as a = goal=20 >>>>>>>>>>> or >>>>>>>> benefit: >>>>>>>>>>> "providing a reliable mechanism to let calls originated from=20= >>>>>>>>>>> one >>>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>>=20 >>>>>>>>>>> Fernando >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>>> >>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>>=20 >>>>>>>>>>>> Any of them could do it. My guess is service providers = will=20 >>>>>>>>>>>> do it for most call centers, although larger call centers=20= >>>>>>>>>>>> might do it themselves... >>>>>>>>>>>> especially ones which have trunks from multiple providers=20= >>>>>>>>>>>> and can source calls using the same number(s) out through=20= >>>>>>>>>>>> multiple providers on a call-by-call basis. >>>>>>>>>>>>=20 >>>>>>>>>>>> -hadriel >>>>>>>>>>>>=20 >>>>>>>>>>>>=20 >>>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh)=20= >>>>>>>>>>>> wrote: >>>>>>>>>>>>=20 >>>>>>>>>>>>> I'm catching up with the discussions in this working = group,=20 >>>>>>>>>>>>> and am trying to understand some architecture = implications=20 >>>>>>>>>>>>> in call centers (which is where my background is). It = seems=20 >>>>>>>>>>>>> that many of the problems we are trying to fix are = related=20 >>>>>>>>>>>>> to contact centers anyway, so it is probably a good idea = to=20 >>>>>>>>>>>>> have everyone in the same >>>>>>>>> page. >>>>>>>>>>>>>=20 >>>>>>>>>>>>> Forgive me if it is an obvious question, but which=20 >>>>>>>>>>>>> components in a "typical call center architecture" do you=20= >>>>>>>>>>>>> see signature and verification taking place? Such = "typical"=20 >>>>>>>>>>>>> deployments have premises based equipment (PME), a = session=20 >>>>>>>>>>>>> border controller >>>>>>>>>>>>> (SBC) >>>>>>>>>>>>> and of course a SIP service provider all three could=20 >>>>>>>>>>>>> potentially be used throughout the authorization process.=20= >>>>>>>>>>>>> There are different ramifications depending on where your=20= >>>>>>>>>>>>> mind is at. >>>>>>>>>>>>>=20 >>>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>>> Cisco Systems >>>>>>>>>>>=20 >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> stir mailing list >>>>>>>>>>> stir@ietf.org >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> ________________________________ >>>>>>>>>>=20 >>>>>>>>>> This e-mail may contain Sprint proprietary information=20 >>>>>>>>>> intended for the sole use of the recipient(s). Any use by=20 >>>>>>>>>> others is prohibited. >>>>>>>>>> If >>>>>>>>>> you are not the intended recipient, please contact the sender=20= >>>>>>>>>> and delete all copies of the message. >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>=20 >>>>>=20 >>>>=20 >>>> _______________________________________________ >>>> stir mailing list >>>> stir@ietf.org >>>> https://www.ietf.org/mailman/listinfo/stir >>>=20 >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From kent@bbn.com Wed Oct 30 07:56:17 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D156011E822D for ; Wed, 30 Oct 2013 07:56:17 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.518 X-Spam-Level: X-Spam-Status: No, score=-106.518 tagged_above=-999 required=5 tests=[AWL=0.081, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 57qlAw34ywCe for ; Wed, 30 Oct 2013 07:56:12 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id F2E7511E812D for ; Wed, 30 Oct 2013 07:56:11 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:51823) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1VbXBr-0004yO-Bo for stir@ietf.org; Wed, 30 Oct 2013 10:56:11 -0400 Message-ID: <52711E0B.50901@bbn.com> Date: Wed, 30 Oct 2013 10:56:11 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: "stir@ietf.org" Content-Type: text/plain; charset=ISO-8859-1; format=flowed Content-Transfer-Encoding: 7bit Subject: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 14:56:17 -0000 Jon, Cullen and Eric: In reading this doc I noted that it devotes a lot of text to describing support for what seems to be AoR-style SIP IDs, rather than just the TEL SIP ID. I thought that the WG had decided to put off discussion of the former, and focus only on the latter ID type, initially. By trying to make this doc incorporate both types of IDs it seems to dilute the focus, and make for a much more complex discussion. Steve From jon.peterson@neustar.biz Wed Oct 30 09:42:39 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E88211E828A for ; Wed, 30 Oct 2013 09:42:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -105.586 X-Spam-Level: X-Spam-Status: No, score=-105.586 tagged_above=-999 required=5 tests=[AWL=0.460, BAYES_00=-2.599, HELO_MISMATCH_COM=0.553, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id XKXQ+C1PVblZ for ; Wed, 30 Oct 2013 09:42:01 -0700 (PDT) Received: from neustar.com (keys.neustar.biz [156.154.17.104]) by ietfa.amsl.com (Postfix) with ESMTP id 7CA3221E8135 for ; Wed, 30 Oct 2013 09:40:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383151419; x=1698510261; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=qb7rKf148m 1g5nAPCcT0w7D3KbMxdrFEFroX0kjlwAc=; b=VzOwwB/qtMZMOHePKN8ljAtm4F XLzPs3OPYjJbDRvT2nPMvvniQOOshHPcqOHo2dTYACkBLyoWIxoFgESD2CgQ== Received: from ([10.31.58.70]) by stihiron2.va.neustar.com with ESMTP with TLS id J041124103.32949676; Wed, 30 Oct 2013 12:43:38 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc11.cis.neustar.com ([::1]) with mapi id 14.02.0342.003; Wed, 30 Oct 2013 12:40:49 -0400 From: "Peterson, Jon" To: Stephen Kent , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOA Date: Wed, 30 Oct 2013 16:40:48 +0000 Message-ID: In-Reply-To: <52711E0B.50901@bbn.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: p0yVweOz69ghYSmE402s7g== Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 16:42:39 -0000 This is mostly legacy text from the original RFC4474, with some new connecting text added as we try to break up the components of the mechanism and make the pieces more modular. I'd say the state of this -00 points in the direction we want to go with that, but there's still more surgery required, pending WG agreement on the direction. I will further say though that I think it will be tough to describe a system for providing identity for telephone numbers that is not at least aware of non-TN URIs and capable of differentiating them - not always a trivial thing, actually. Whether or not the logic gate that points us down the TN/non-TN paths is strictly in STIR's scope, we will need it for this to actually work. I moreover think that the behavior of verifiers in terms of how they check fields, acquire credentials and so on will have significant overlap in the two cases. I also suspect there's widespread agreement about how to approach the non-TN case. So I'm hesitant to erect barriers that will completely wall off the non-TN path from the specifications here. But I won't deny that the -00 could do a better job of organizing all this. Jon Peterson Neustar, Inc. On 10/30/13 7:56 AM, "Stephen Kent" wrote: >Jon, Cullen and Eric: > >In reading this doc I noted that it devotes a lot of text to describing >support >for what seems to be AoR-style SIP IDs, rather than just the TEL SIP ID. >I thought >that the WG had decided to put off discussion of the former, and focus >only on the >latter ID type, initially. By trying to make this doc incorporate both >types of IDs >it seems to dilute the focus, and make for a much more complex discussion. > >Steve >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From kent@bbn.com Wed Oct 30 09:58:10 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D5F8421F9FB4 for ; Wed, 30 Oct 2013 09:57:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.523 X-Spam-Level: X-Spam-Status: No, score=-106.523 tagged_above=-999 required=5 tests=[AWL=0.076, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id K2P1o5-kO2mb for ; Wed, 30 Oct 2013 09:57:42 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 905CB21F9BC2 for ; Wed, 30 Oct 2013 09:57:24 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:52575) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1VbZ4n-00068x-TZ; Wed, 30 Oct 2013 12:57:02 -0400 Message-ID: <52713A5D.3090601@bbn.com> Date: Wed, 30 Oct 2013 12:57:01 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: "Peterson, Jon" , "stir@ietf.org" References: In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 16:58:10 -0000 Jon, My concern is that we seem to understand how one can manage authorization for telephone numbers as IDs, in a fashion that does not go down the path of the browser PKI, and all its problems. If the names for which we vouch are scoped by DNS, and if we use DANE, I am comfortable with that too. But, if we have to make this discussion very abstract, in order to accommodate caller ID models that do not derive from authoritative ID sources, then I am very worried. Frankly, as a security guy, I was getting lost in the discussion, but maybe that's a presentation/exposition issue more than a technical issue. Steve From michael.hammer@yaanatech.com Wed Oct 30 10:45:21 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 864C611E82AB for ; Wed, 30 Oct 2013 10:45:13 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.001, BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0ePPe9EpyghF for ; Wed, 30 Oct 2013 10:45:09 -0700 (PDT) Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id 45ABB21F8415 for ; Wed, 30 Oct 2013 10:44:07 -0700 (PDT) Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Wed, 30 Oct 2013 10:43:43 -0700 From: Michael Hammer To: "jon.peterson@neustar.biz" , "kent@bbn.com" , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YAyy39cKRpA40uHN/L9rrP0UJoN5+oA//+cE5A= Date: Wed, 30 Oct 2013 17:43:41 +0000 Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEF43CB@sc9-ex2k10mb1.corp.yaanatech.com> References: <52711E0B.50901@bbn.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.17.100.106] Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_00EC_01CED576.0AA3FEA0" MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 17:45:21 -0000 ------=_NextPart_000_00EC_01CED576.0AA3FEA0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit And who is the authority (to act as trust anchor) for those non-TN URIs? Mike -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Peterson, Jon Sent: Wednesday, October 30, 2013 12:41 PM To: Stephen Kent; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 This is mostly legacy text from the original RFC4474, with some new connecting text added as we try to break up the components of the mechanism and make the pieces more modular. I'd say the state of this -00 points in the direction we want to go with that, but there's still more surgery required, pending WG agreement on the direction. I will further say though that I think it will be tough to describe a system for providing identity for telephone numbers that is not at least aware of non-TN URIs and capable of differentiating them - not always a trivial thing, actually. Whether or not the logic gate that points us down the TN/non-TN paths is strictly in STIR's scope, we will need it for this to actually work. I moreover think that the behavior of verifiers in terms of how they check fields, acquire credentials and so on will have significant overlap in the two cases. I also suspect there's widespread agreement about how to approach the non-TN case. So I'm hesitant to erect barriers that will completely wall off the non-TN path from the specifications here. But I won't deny that the -00 could do a better job of organizing all this. Jon Peterson Neustar, Inc. On 10/30/13 7:56 AM, "Stephen Kent" wrote: >Jon, Cullen and Eric: > >In reading this doc I noted that it devotes a lot of text to describing >support for what seems to be AoR-style SIP IDs, rather than just the >TEL SIP ID. >I thought >that the WG had decided to put off discussion of the former, and focus >only on the latter ID type, initially. By trying to make this doc >incorporate both types of IDs it seems to dilute the focus, and make >for a much more complex discussion. > >Steve >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir ------=_NextPart_000_00EC_01CED576.0AA3FEA0 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIRPzCCBBow ggMCAhEAi1t1VoRUhQsAz684SM6xpDANBgkqhkiG9w0BAQUFADCByjELMAkGA1UEBhMCVVMxFzAV BgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTow OAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5 MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24g QXV0aG9yaXR5IC0gRzMwHhcNOTkxMDAxMDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDd hNS5tPmn2PMEeJzePdxsExbZet0kUWbAxyZZDawGCMKU0TMf8IM1H24byN6qbhVOVCfvxG0a7Avj DvBEpVfHQFgeo0cfcexg9m2UyBg57f5CGFbf5ExJEHhOAXY1YxI23Wa8AQQ2o1Vo1aI2CayrISZU Bq0/yhTgrMqtBh2V4vid8eBg/8J/dStMzNr+h5kh6rr+PlTX0ll42zxuz6ATABq4J6HkvmeWyqDF s5zdyXWe6zCaX6PN2a54GT8j6VzbKb2tVcgbVIxj9uim6sc3ElyjKR4C2dsfO7TXD1ZHgRUESq+D J9HFWIjB3faqp6MY2miqbRFR4b9la5+WdtE9AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAKtmjdez useatuZV0AXxnzGNWqrZqkYmD3Htpa1TVmIBRypE6f4/dAsTm7n0TRuy0V+yttKIXLOfzcvUp9lg lYQ6+ME3HWHK57DF5ZHaVKasMYGul97NCKy4wJeAf25ypOdpE5VlH8STPP15jwTUPk/q957OzWd8 T2UC/5GFVHPH/zb3hi3s0F5P/xGfcgbWuBrxTA0mZeJEgB7Hn+Pd6Ara7KUggGlooU9+4WvPB0H6 g468ON2wLhGxa7JCzJq8+UgieUoZD7IcPiB02WrDvvIoeBNWeU9tUOobsLVXsTdmWCPz3A/fCofE 74YF1TgUYJmjS94GlnEs8tu2H6TvP+4wggZCMIIFKqADAgECAhA4qwAv/66Wt1b/OVr7XecbMA0G CSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAd BgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNz IDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzAeFw0xMTA5MDEw MDAwMDBaFw0yMTA4MzEyMzU5NTlaMIGmMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMg Q29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxHjAcBgNVBAsTFVBl cnNvbmEgTm90IFZhbGlkYXRlZDE3MDUGA1UEAxMuU3ltYW50ZWMgQ2xhc3MgMSBJbmRpdmlkdWFs IFN1YnNjcmliZXIgQ0EgLSBHNDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbsJ/0d Y/Q7HYrB0xzIyIKGtrhKhpKqgVxyyjANL55BIlcwISWQmqP0rCrGiBeGYXITdi7sA8snm48ggDfg 5IraVaZQD/y5XCNpiUKhuh+v7w75pMkK8fg3ssbZkkqufd+4RB+buj+MBv7YI09IUSNqYISo7icv YN+W8hoqjDyPAMxPy/ogjrw19uHwmrYF8/wdP8YUew7a8gXk04MCpsVpcLSp5Fbp2x1c9KY24mu1 Hiot3L677joEsDAIrV9obMa9BpaIhOfmqWQtvDgwu4gmw2dmZrS0d/nAoccOcu9m4uW5yuDzhXc1 mN7UHLD+ZnHiOMtufE9AVeuX2agYHu0CAwEAAaOCAkQwggJAMDgGCCsGAQUFBwEBBCwwKjAoBggr BgEFBQcwAYYcaHR0cDovL3BraS1vY3NwLnZlcmlzaWduLmNvbTASBgNVHRMBAf8ECDAGAQH/AgEA MGwGA1UdIARlMGMwYQYLYIZIAYb4RQEHFwEwUjAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5zeW1h dXRoLmNvbS9jcHMwKAYIKwYBBQUHAgIwHBoaaHR0cDovL3d3dy5zeW1hdXRoLmNvbS9ycGEwNAYD VR0fBC0wKzApoCegJYYjaHR0cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMS1nMy5jcmwwDgYDVR0P AQH/BAQDAgEGMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFWZXJpU2lnbk1QS0ktMi05NzAdBgNV HQ4EFgQUrfnDk3IttbkoYeSk12DVxApeGgEwgfEGA1UdIwSB6TCB5qGB0KSBzTCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzOCEQCLW3VWhFSFCwDPrzhIzrGkMA0GCSqGSIb3DQEBBQUA A4IBAQDWj8Ham4jys2xNH1gvugFRXXTBRujDuHuf1kDx7/8yuolrwA40Q5+kmeak8F1IM2KFhWH+ I4gijGCbK5xlSZTEojgkSKVcpVBLaOliIqeT6Jkibj1buxBCDh9MdUc0VgmP+L2MPPNcu9KWcFRw Yk3v0RC+nUgsXuyGaweC8D3hJScoLOAWdh6z/eViltKKPV8rrvtcwhO3ZWPLNHZDn9aHmaturZXB AD9GJ4H/Nd4jDkPcFF8y+cop78JSMPWZ3bmB+DolII2CaPK5IYV0ZgThhjkWMvIt1iqoyd7ZAAJP 4xggxaWBVraV3tOCrfh7Jb5kfC6gunAs+Pl14nRNB22EMIIG1zCCBb+gAwIBAgIQEB3dROkPDT0Q 6QYEc74tcjANBgkqhkiG9w0BAQUFADCBpjELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVj IENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQ ZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMTLlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVh bCBTdWJzY3JpYmVyIENBIC0gRzQwHhcNMTMwNDAxMDAwMDAwWhcNMTQwNDAyMjM1OTU5WjCBzjEu MCwGA1UEAwwlUGVyc29uYSBOb3QgVmFsaWRhdGVkIC0gMTM2NDg0MjY5NDQ0MzErMCkGCSqGSIb3 DQEJARYcbWljaGFlbC5oYW1tZXJAeWFhbmF0ZWNoLmNvbTEPMA0GA1UECwwGUy9NSU1FMR4wHAYD VQQLDBVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxHzAdBgNVBAsMFlN5bWFudGVjIFRydXN0IE5ldHdv cmsxHTAbBgNVBAoMFFN5bWFudGVjIENvcnBvcmF0aW9uMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAh2AtKQNowI8ILmNvdcY16moA8CH7hjSvGDNofwWsh4quEfZ6VQGtDhhOjUmW6JVq 719MH8FNJcVr8oAiVaK3nNeJTL2wO68LpgX6tcZ/z22pJoz98wHzgfWf3pfEUYrCqYg2V3m6oe0t kd+OaeY8DmPVSpG7as0rkoEzeNwCtmpYjkm96mBO6/AQwsowSLbSuqkEGykp1k47KiPBtxhbp2um IReh94vPrr1O9zXau9oGMvABJjigYQ2e5AhhhDdK8qOkhgkMAJN2nvLqY+VFrnFIsb5noQ/tP2M/ ct9qwRZ5kUaumRqE/XzV3rH8PoacZW/YvcwAp8Gr1ZaHCMRl+wIDAQABo4IC1TCCAtEwDAYDVR0T AQH/BAIwADAOBgNVHQ8BAf8EBAMCBaAwIAYDVR0lAQH/BBYwFAYIKwYBBQUHAwQGCCsGAQUFBwMC MB0GA1UdDgQWBBTlvYUx4PMlUy6uvceJkDMK4jBDZjAnBgNVHREEIDAegRxtaWNoYWVsLmhhbW1l ckB5YWFuYXRlY2guY29tMB8GA1UdIwQYMBaAFK35w5NyLbW5KGHkpNdg1cQKXhoBMIIBKwYIKwYB BQUHAQEEggEdMIIBGTCCARUGCCsGAQUFBzAChoIBB2xkYXA6Ly9kaXJlY3RvcnkudmVyaXNpZ24u Y29tL0NOJTIwJTNEJTIwU3ltYW50ZWMlMjBDbGFzcyUyMDElMjBJbmRpdmlkdWFsJTIwU3Vic2Ny aWJlciUyMENBJTIwLSUyMEc0JTJDJTIwT1UlMjAlM0QlMjBQZXJzb25hJTIwTm90JTIwVmFsaWRh dGVkJTJDJTIwT1UlMjAlM0QlMjBTeW1hbnRlYyUyMFRydXN0JTIwTmV0d29yayUyQyUyME8lMjAl M0QlMjBTeW1hbnRlYyUyMENvcnBvcmF0aW9uJTJDJTIwQyUyMCUzRCUyMFVTP2NBQ2VydGlmaWNh dGU7YmluYXJ5MF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9wa2ktY3JsLnN5bWF1dGguY29tL2Nh XzU2MWMxMDM2OTBjOTdhNjkyNDdhMGVmMDcxYWM4MWFmL0xhdGVzdENSTC5jcmwwbAYDVR0gBGUw YzBhBgtghkgBhvhFAQcXATBSMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LnN5bWF1dGguY29tL2Nw czAoBggrBgEFBQcCAjAcGhpodHRwOi8vd3d3LnN5bWF1dGguY29tL3JwYTAqBgpghkgBhvhFARAD BBwwGgYRYIZIAYb4RQEQAQICBAGGsxcWBTEwOTIyMA0GCSqGSIb3DQEBBQUAA4IBAQAae/er4pfB TpqK6c/uJ9D8dVJzzNX26akkB8z/29totzbkpFAIlXRh02iNVK+GnsgS1gwu3FOvjgT5M4i+cNxD vTJVcnZNXns75JUGX3UsWQbtSySrVzQx8lMtwW6nXHM5GlEaY8/jKVpambG2q9OHjmwMTz7I4A+y KiiGCGdhE23dFOvku6t/oiwqFnXJmb4o75kbVevKEOd34MIj0P7Q8+1mZcNYEUTYKadoPXFyTWnO 2HTMvFcGgdLFKcqb13clWeW3/B5WjdBimpMjbvwi8ZbrhFdp7Y3NLKFSRH8W29rt0LW7zULxii0z 34NGsBkW9w95PLzTsqmKD4Yv5AkIMYIEkjCCBI4CAQEwgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYD VQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29y azEeMBwGA1UECxMVUGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFz cyAxIEluZGl2aWR1YWwgU3Vic2NyaWJlciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMAkGBSsO AwIaBQCgggKrMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEzMTAz MDE3NDM0MFowIwYJKoZIhvcNAQkEMRYEFLI9iNfpzMuP0F8XTbnlKg4NVTWiMIGrBgkqhkiG9w0B CQ8xgZ0wgZowCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBFjAKBggqhkiG9w0DBzALBglghkgBZQME AQIwDgYIKoZIhvcNAwICAgCAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgFAMA0GCCqGSIb3DQMCAgEo MAcGBSsOAwIaMAsGCWCGSAFlAwQCAzALBglghkgBZQMEAgIwCwYJYIZIAWUDBAIBMIHMBgkrBgEE AYI3EAQxgb4wgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlv bjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEeMBwGA1UECxMVUGVyc29uYSBOb3Qg VmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2NyaWJl ciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMIHOBgsqhkiG9w0BCRACCzGBvqCBuzCBpjELMAkG A1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRl YyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMT LlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVhbCBTdWJzY3JpYmVyIENBIC0gRzQCEBAd3UTpDw09 EOkGBHO+LXIwDQYJKoZIhvcNAQEBBQAEggEAf8R8qAONl9cUa4ot7j/EDM/ol57VVSBXDM9l0V1L pOIFfN+5R6lwAxrz92lzqg+kLJq28oj6IUQLb4/95bHMHR5rdrRuZreffx74ArgWhc+Zqa1YYeLq hGV+ahFhMAWQuBRKR2yLi+OaqGQNj0W7yoti1//atuzl/+23AhxesZU82nFndFesgbKZX1NXUWIf PdF+w21+jSuGn+EMLHVxxTe8MfwRvmv1VdWGcNSmMZ7nCL9unAI1IsHvylc9aq+7Z4jt9vlQauRh 3WBw7GAcyWMLIKj/pKARhXJUMS9LzRrh0eQ1RyyhlM6671wtwEA9quC7uXAKu+m+oRVBG6h0SQAA AAAAAA== ------=_NextPart_000_00EC_01CED576.0AA3FEA0-- From br@brianrosen.net Wed Oct 30 11:17:52 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D353C11E82DD for ; Wed, 30 Oct 2013 11:17:52 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.494 X-Spam-Level: X-Spam-Status: No, score=-103.494 tagged_above=-999 required=5 tests=[AWL=0.105, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nQf8eY2oPclA for ; Wed, 30 Oct 2013 11:17:48 -0700 (PDT) Received: from mail-qe0-f44.google.com (mail-qe0-f44.google.com [209.85.128.44]) by ietfa.amsl.com (Postfix) with ESMTP id 3E6FE11E82D8 for ; Wed, 30 Oct 2013 11:17:43 -0700 (PDT) Received: by mail-qe0-f44.google.com with SMTP id 6so1086711qeb.3 for ; Wed, 30 Oct 2013 11:17:42 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=zEbacFHLKx/2v1bU8lLFN/zQ19v2wVkRpK0quYHX9Rk=; b=Aboa47HuyvV1DTDYRazXUtW4KEFkIZTW5WAExZjKzmTiL2NE70wW9QF35gWBwb72kg 1zitdQXS2U5wbCQRlRM7DUVuqRK8cGWEOGXm4v+CL0h/Y5dJbOujWA2AJpS/fgIuY1cW VZySeYm5oY7YupNx8um9gK9rFy5YiYetWEsadY4Ti+rXceOkGViLpTF6fPqCMWU9rXZv y7vjoBOtxxKMDLwe5xmiUQ9C/YMIvHQc8bfT6GzHTl+Yo6YnHywkYWmq7Q3rc8U4sNm3 dyjZOY1znICRK40P/pz53ACPjwoIx9dyALmrcdwYkZ2FMYyOqe0qh2g2O4S09ibsNJRn 0MCw== X-Gm-Message-State: ALoCoQl0Zelzonq4GZWBTLfgWAU/uF3ZCmlD13WUclnoyog3ppw5FcnbyTZetKsbhfj3oloG98ln X-Received: by 10.224.54.66 with SMTP id p2mr9808993qag.87.1383157062793; Wed, 30 Oct 2013 11:17:42 -0700 (PDT) Received: from [10.33.192.35] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id x1sm79610375qai.6.2013.10.30.11.17.40 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 30 Oct 2013 11:17:40 -0700 (PDT) Content-Type: text/plain; charset=windows-1252 Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\)) From: Brian Rosen In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF43CB@sc9-ex2k10mb1.corp.yaanatech.com> Date: Wed, 30 Oct 2013 14:17:38 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <7E4E057F-7D7D-4795-8C48-53D7ADAAE630@brianrosen.net> References: <52711E0B.50901@bbn.com> <00C069FD01E0324C9FFCADF539701DB3BBEF43CB@sc9-ex2k10mb1.corp.yaanatech.com> To: Michael Hammer X-Mailer: Apple Mail (2.1816) Cc: "stir@ietf.org" , "kent@bbn.com" , Jon Peterson Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 18:17:53 -0000 That one is easy. If you are placing a call from alice@example.com, = then example.com is the trust anchor.=20 Since we=92re using DNS to resolve example.com, then something DANE like = would suffice to make sure that it really is example.com that is sending = the call. Brian On Oct 30, 2013, at 1:43 PM, Michael Hammer = wrote: > And who is the authority (to act as trust anchor) for those non-TN = URIs? >=20 > Mike >=20 >=20 > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf = Of > Peterson, Jon > Sent: Wednesday, October 30, 2013 12:41 PM > To: Stephen Kent; stir@ietf.org > Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 >=20 >=20 > This is mostly legacy text from the original RFC4474, with some new > connecting text added as we try to break up the components of the = mechanism > and make the pieces more modular. I'd say the state of this -00 points = in > the direction we want to go with that, but there's still more surgery > required, pending WG agreement on the direction. >=20 > I will further say though that I think it will be tough to describe a = system > for providing identity for telephone numbers that is not at least = aware of > non-TN URIs and capable of differentiating them - not always a trivial > thing, actually. Whether or not the logic gate that points us down the > TN/non-TN paths is strictly in STIR's scope, we will need it for this = to > actually work. I moreover think that the behavior of verifiers in = terms of > how they check fields, acquire credentials and so on will have = significant > overlap in the two cases. I also suspect there's widespread agreement = about > how to approach the non-TN case. So I'm hesitant to erect barriers = that will > completely wall off the non-TN path from the specifications here. But = I > won't deny that the -00 could do a better job of organizing all this. >=20 > Jon Peterson > Neustar, Inc. >=20 > On 10/30/13 7:56 AM, "Stephen Kent" wrote: >=20 >> Jon, Cullen and Eric: >>=20 >> In reading this doc I noted that it devotes a lot of text to = describing=20 >> support for what seems to be AoR-style SIP IDs, rather than just the=20= >> TEL SIP ID. >> I thought >> that the WG had decided to put off discussion of the former, and = focus=20 >> only on the latter ID type, initially. By trying to make this doc=20 >> incorporate both types of IDs it seems to dilute the focus, and make=20= >> for a much more complex discussion. >>=20 >> Steve >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From jon.peterson@neustar.biz Wed Oct 30 11:24:26 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7608E21E8133 for ; Wed, 30 Oct 2013 11:24:26 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -105.92 X-Spam-Level: X-Spam-Status: No, score=-105.92 tagged_above=-999 required=5 tests=[AWL=0.679, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FIt2kz+rbCdX for ; Wed, 30 Oct 2013 11:24:22 -0700 (PDT) Received: from neustar.com (mx2.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id 056DB21F9E54 for ; Wed, 30 Oct 2013 11:24:13 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383157407; x=1698515301; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=kAy0LM/tZ4 dIjjzi+mbZOZmoxsAKhLn1rNiPUEPj8YY=; b=N0ViVbPvaZsh1iQT7bGswwPqOA z5Zt5EuXLEgF1RD/4Z5esbj3uCwy+koH8wj1Anha+jQ26L+cJJutsUfzWXvw== Received: from ([10.31.58.70]) by chihiron1.nc.neustar.com with ESMTP with TLS id J041123128.26869071; Wed, 30 Oct 2013 14:23:26 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc11.cis.neustar.com ([::1]) with mapi id 14.02.0342.003; Wed, 30 Oct 2013 14:24:03 -0400 From: "Peterson, Jon" To: Michael Hammer , "kent@bbn.com" , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOAgACG74D//5XoAA== Date: Wed, 30 Oct 2013 18:24:03 +0000 Message-ID: In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF43CB@sc9-ex2k10mb1.corp.yaanatech.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: COyMvXKJ0lCZi5hgl4oYaw== Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 18:24:26 -0000 Well, in RFC4474 it was browser PKI, effectively. Today we might want an option for DANE. But that is indeed why modularity seems increasingly important to me here. I think we've got a couple different pieces of mechanism in our solution space that we might want to click together in different ways. We know we need signatures over some fields of a SIP request, and those fields don't depend on whether the identifier is a TN or a SIP URI. This is a piece we can nail down independently of where we get keying material from and who constitutes a trust anchor. While it would be great if we could have a single trust anchor that would serve all of SIP's identity needs, I think the deployment environment is complex enough that we may be looking at more than one.=20 I don't think introducing points of modularity makes the discussion more abstract, I think it makes it more tractable. This is one of the main things I want to talk about in the YVR second session. We definitely don't want to incur additional complexity as we make this modular, but we also don't want to lock ourselves into vertical silo when we can't predict exactly what the market will accept. Jon Peterson Neustar, Inc. On 10/30/13 10:43 AM, "Michael Hammer" wrote: >And who is the authority (to act as trust anchor) for those non-TN URIs? > >Mike > > >-----Original Message----- >From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >Peterson, Jon >Sent: Wednesday, October 30, 2013 12:41 PM >To: Stephen Kent; stir@ietf.org >Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 > > >This is mostly legacy text from the original RFC4474, with some new >connecting text added as we try to break up the components of the >mechanism >and make the pieces more modular. I'd say the state of this -00 points in >the direction we want to go with that, but there's still more surgery >required, pending WG agreement on the direction. > >I will further say though that I think it will be tough to describe a >system >for providing identity for telephone numbers that is not at least aware of >non-TN URIs and capable of differentiating them - not always a trivial >thing, actually. Whether or not the logic gate that points us down the >TN/non-TN paths is strictly in STIR's scope, we will need it for this to >actually work. I moreover think that the behavior of verifiers in terms of >how they check fields, acquire credentials and so on will have significant >overlap in the two cases. I also suspect there's widespread agreement >about >how to approach the non-TN case. So I'm hesitant to erect barriers that >will >completely wall off the non-TN path from the specifications here. But I >won't deny that the -00 could do a better job of organizing all this. > >Jon Peterson >Neustar, Inc. > >On 10/30/13 7:56 AM, "Stephen Kent" wrote: > >>Jon, Cullen and Eric: >> >>In reading this doc I noted that it devotes a lot of text to describing >>support for what seems to be AoR-style SIP IDs, rather than just the >>TEL SIP ID. >>I thought >>that the WG had decided to put off discussion of the former, and focus >>only on the latter ID type, initially. By trying to make this doc >>incorporate both types of IDs it seems to dilute the focus, and make >>for a much more complex discussion. >> >>Steve >>_______________________________________________ >>stir mailing list >>stir@ietf.org >>https://www.ietf.org/mailman/listinfo/stir > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 11:25:35 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0409F11E8192 for ; Wed, 30 Oct 2013 11:25:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.431 X-Spam-Level: X-Spam-Status: No, score=-102.431 tagged_above=-999 required=5 tests=[AWL=0.166, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sXaYJ1CQo03S for ; Wed, 30 Oct 2013 11:25:29 -0700 (PDT) Received: from outbound-ss-782.hostmonster.com (outbound-ss-782.hostmonster.com [74.220.223.59]) by ietfa.amsl.com (Postfix) with SMTP id 04ACF21E8133 for ; Wed, 30 Oct 2013 11:25:08 -0700 (PDT) Received: (qmail 23572 invoked by uid 0); 30 Oct 2013 18:25:08 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy4.mail.unifiedlayer.com with SMTP; 30 Oct 2013 18:25:08 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Type:MIME-Version:Message-ID:Date:Subject:To:From; bh=If46eWW5tPdLGpxEB0QG4jKQZyqUHvuZ0y5fJh+WCOY=; b=g5FtOlcHs2VnNgCSRcHdfSRWPN2WcWG7z5ZXztX5aKg9eIsXJnpUnTfmPN+ypzgC17+YONDySpgSjUzsx8/j+LINDEzV9+E16+g1+z3ztHO+QM3yyFt8fcpNqrouM+sz; Received: from [173.79.179.104] (port=53466 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbaS3-0000mC-Oh for stir@ietf.org; Wed, 30 Oct 2013 12:25:07 -0600 From: "Richard Shockey" To: Date: Wed, 30 Oct 2013 14:25:06 -0400 Message-ID: <01eb01ced59d$5c847750$158d65f0$@shockey.us> MIME-Version: 1.0 Content-Type: multipart/alternative; boundary="----=_NextPart_000_01EC_01CED57B.D5745DF0" X-Mailer: Microsoft Outlook 15.0 Thread-Index: Ac7VnVQeL8ek1VCcR565+8+T3AQL2A== Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: [stir] Apologies .. the gods of email are not similing on me this AM X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 18:25:35 -0000 This is a multipart message in MIME format. ------=_NextPart_000_01EC_01CED57B.D5745DF0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit +1 -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Stephen Kent Sent: Wednesday, October 30, 2013 10:56 AM To: stir@ietf.org Subject: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, Cullen and Eric: In reading this doc I noted that it devotes a lot of text to describing support for what seems to be AoR-style SIP IDs, rather than just the TEL SIP ID. I thoughtthat the WG had decided to put off discussion of the former, and focus only on the latter ID type, initially. By trying to make this doc incorporate both types of IDs it seems to dilute the focus, and make for a much more complex discussion. Steve Richard Shockey Shockey Consulting Chairman of the Board of Directors SIP Forum PSTN Mobile: +1 703.593.2683 < mailto:richard(at)shockey.us> skype-linkedin-facebook: rshockey101 http//www.sipforum.org "Money is the answer, what is the question?" tm ------=_NextPart_000_01EC_01CED57B.D5745DF0 Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

+1

 

-----Original Message-----

From: stir-bounces@ietf.org = [mailto:stir-bounces@ietf.org] On Behalf Of Stephen = Kent

Sent: Wednesday, October 30, = 2013 10:56 AM

To: = stir@ietf.org

Subject: [stir] comment = on draft-jennings-stir-rfc4474bis-00

 

Jon, Cullen = and Eric:

 

In reading this doc I noted that it devotes a lot of = text to describing support for what seems to be AoR-style SIP IDs, = rather than just the TEL SIP ID.

I = thoughtthat the WG had decided to put off discussion of the former, and = focus only on the latter ID type, initially. By trying to make this doc = incorporate both types of IDs it seems to dilute the focus, and make for = a much more complex discussion.

 

Steve

 

Richard = Shockey
Shockey Consulting
Chairman of the Board of Directors SIP = Forum
PSTN Mobile: +1 703.593.2683
<mailto:richard(at)shockey.us>
skype= -linkedin-facebook: = rshockey101
http//www.sipforum.org

"Money is the answer, what is the question?" = tm

 

 

------=_NextPart_000_01EC_01CED57B.D5745DF0-- From richard@shockey.us Wed Oct 30 11:26:51 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB5CC21E813A for ; Wed, 30 Oct 2013 11:26:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.515 X-Spam-Level: X-Spam-Status: No, score=-102.515 tagged_above=-999 required=5 tests=[AWL=0.084, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dbE36miotbDp for ; Wed, 30 Oct 2013 11:26:47 -0700 (PDT) Received: from outbound-ss-782.hostmonster.com (outbound-ss-782.hostmonster.com [74.220.223.59]) by ietfa.amsl.com (Postfix) with SMTP id E304F11E81A8 for ; Wed, 30 Oct 2013 11:26:46 -0700 (PDT) Received: (qmail 27412 invoked by uid 0); 30 Oct 2013 18:26:46 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy4.mail.unifiedlayer.com with SMTP; 30 Oct 2013 18:26:46 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=uQFDXS7JV+V73SGq6e85v0E28ynjn8VI4l1Srtz0XRw=; b=cV4i3MkbkBMVFMBP5kDTaIEkHAyvEOtM4joyv2T3lgyBFKzHBSNTp+ZEyBISca64pku3U01c4s1RkmwNDDMMS6DHeyM1SH4/6NES4D8ZVCZoc7lX6XUWFfOHtw++liCk; Received: from [173.79.179.104] (port=53476 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbaTe-0001x9-9r for stir@ietf.org; Wed, 30 Oct 2013 12:26:46 -0600 From: "Richard Shockey" To: References: <52713A5D.3090601@bbn.com> In-Reply-To: <52713A5D.3090601@bbn.com> Date: Wed, 30 Oct 2013 14:26:45 -0400 Message-ID: <01fa01ced59d$97436040$c5ca20c0$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQJ9u5bFtPZZaok737EQ6xixEMn6NwIjHR0amJ6ZvHA= Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 18:26:51 -0000 I would put it more succinctly ... can we just fix one thing at a time. We should not preclude the use of alternative identifiers in the future but the immediate problem is telephone numbers. -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Stephen Kent Sent: Wednesday, October 30, 2013 12:57 PM To: Peterson, Jon; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, My concern is that we seem to understand how one can manage authorization for telephone numbers as IDs, in a fashion that does not go down the path of the browser PKI, and all its problems. If the names for which we vouch are scoped by DNS, and if we use DANE, I am comfortable with that too. But, if we have to make this discussion very abstract, in order to accommodate caller ID models that do not derive from authoritative ID sources, then I am very worried. Frankly, as a security guy, I was getting lost in the discussion, but maybe that's a presentation/exposition issue more than a technical issue. Steve _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From jon.peterson@neustar.biz Wed Oct 30 11:48:43 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3610211E818B for ; Wed, 30 Oct 2013 11:48:42 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -105.996 X-Spam-Level: X-Spam-Status: No, score=-105.996 tagged_above=-999 required=5 tests=[AWL=0.603, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xbceWMeq8HZx for ; Wed, 30 Oct 2013 11:48:31 -0700 (PDT) Received: from neustar.com (mx2.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id 3458621E8092 for ; Wed, 30 Oct 2013 11:47:51 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383158899; x=1698515527; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=Sc44zK97rn sGqaklxUrlsnjE90JazdmxN1yCyYKyaQo=; b=mtHd2adyxEvF3vbZaWmHLGBWTb NhesZdUDIUr+6z7OI8YKB7bIFszcCNl7AeSWMH/AtZBs9emRg2mmhkASiRPg== Received: from ([10.31.58.69]) by chihiron2.nc.neustar.com with ESMTP with TLS id J041123125.27909701; Wed, 30 Oct 2013 14:48:18 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc10.cis.neustar.com ([169.254.4.132]) with mapi id 14.02.0342.003; Wed, 30 Oct 2013 14:47:45 -0400 From: "Peterson, Jon" To: Richard Shockey , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOAgAB55YCAABkSgP//kH6A Date: Wed, 30 Oct 2013 18:47:44 +0000 Message-ID: In-Reply-To: <01fa01ced59d$97436040$c5ca20c0$@shockey.us> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: kI1HRS+23sicHCKxHjHhzg== Content-Type: text/plain; charset="us-ascii" Content-ID: <8077913939B82F45B6BB78D46B4882FF@neustar.biz> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 18:48:44 -0000 No disagreement that telephone numbers are the immediate problem, but it isn't trivially easy to decouple the work on non-TN identifiers, it isn't clear how much new work on non-TN identifiers needs to be done beyond what RFC4474 already did, and it certainly isn't just rfc4474bis in this WG that proposes to address both: strikes-out does as well (see section 4.1 of that draft, say). I think we'll find that any solution we build for this is going to be able to address non-TN identifiers too, and I think it would be a tough sell to argue that we should delete any such text, as necessarily any verifier is going to have to look at a From header field value and ascertain whether it contains a TN or not. Once you've gone that far down the path, if the signature verification is the same, and the credential acquisition potentially the same as well, it's just not going to save us any effort to keep non-TN identifiers out of these drafts. Jon Peterson Neustar, Inc. On 10/30/13 11:26 AM, "Richard Shockey" wrote: > >I would put it more succinctly ... can we just fix one thing at a time. >We >should not preclude the use of alternative identifiers in the future but >the >immediate problem is telephone numbers. > >-----Original Message----- >From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >Stephen Kent >Sent: Wednesday, October 30, 2013 12:57 PM >To: Peterson, Jon; stir@ietf.org >Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 > >Jon, > >My concern is that we seem to understand how one can manage authorization >for telephone numbers as IDs, in a fashion that does not go down the path >of >the browser PKI, and all its problems. If the names for which we vouch are >scoped by DNS, and if we use DANE, I am comfortable with that too. But, if >we have to make this discussion very abstract, in order to accommodate >caller ID models that do not derive from authoritative ID sources, then I >am >very worried. > >Frankly, as a security guy, I was getting lost in the discussion, but >maybe >that's a presentation/exposition issue more than a technical issue. > >Steve > > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 12:05:38 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8C7BD11E8155 for ; Wed, 30 Oct 2013 12:05:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.376 X-Spam-Level: X-Spam-Status: No, score=-102.376 tagged_above=-999 required=5 tests=[AWL=-0.111, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zXiRilUu0P9v for ; Wed, 30 Oct 2013 12:05:34 -0700 (PDT) Received: from oproxy7-pub.mail.unifiedlayer.com (oproxy7-pub.mail.unifiedlayer.com [67.222.55.9]) by ietfa.amsl.com (Postfix) with SMTP id 4D50B11E818E for ; Wed, 30 Oct 2013 12:05:32 -0700 (PDT) Received: (qmail 7384 invoked by uid 0); 30 Oct 2013 19:05:08 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy7.mail.unifiedlayer.com with SMTP; 30 Oct 2013 19:05:08 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=D+9DwneMdmbBT1A65npOlWgax2CoZ7nVhRfulDNtWtE=; b=g59U827aRFk9IPjguZLuEPbnE9AytAJvlu4t3RoqIebHJW7sA8BsIpqISOlQuxPfdyg8vxrD5nDk8GngJNJ2TMIRncGBUGCftDZd6Yy4Rb0/Na1wpb1RfBOEqM2e8QYX; Received: from [173.79.179.104] (port=53586 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1Vbb4l-0006ah-Vn for stir@ietf.org; Wed, 30 Oct 2013 13:05:08 -0600 From: "Richard Shockey" To: References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> In-Reply-To: Date: Wed, 30 Oct 2013 15:05:06 -0400 Message-ID: <024001ced5a2$f3268810$d9739830$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQLC46Egqaoyw2i6zUEn13TyfC6DWZgkHKig Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 19:05:38 -0000 Dan great post. I couldn't agree more. There needs to be some rules = here. Some may be regulatory some may be technical. First the voice application service providers need to provide the terminating CUA, "an accurate and truthful" Caller-ID for the call even = if it is originated from a source that is not directly associated with the business entity for whom the call is being made. That could be an 800 number for instance but I won't bore you with the issues with SMS800 RESPORGS. If the originating UA can prove/assert it is legally authorized to use = such an identity on behalf of a customer then that is step one. The = presumption after that is there is some contractual obligation between the service provider and the network about the use of such identities. The network = can then "validate" such an assertion.=20 There is something larger here to consider. Though the focus of STIR is validation of a Caller-ID number at some point the RAI area should take = a look at the other side of the coin so to speak. =20 CNAM. That is NOT something STIR can do but I do believe there is an emerging requirement that under some cases the calling party wants to or should provide more substantive information about themselves to the = called party and frankly 15 character ASCII is not enough. Consumers or = businesses should be able to see more complete and validated information about the session in order to make an better and informed decision on whether to accept the 'call' or not. Regulators may want to require telemarketing firms to display NG CNAM or CNAM + like data as a condition of doing business. All of the examples you cite are excellent examples where such verbose calling party identification could be displayed. I certainly want to = answer a call from my doctor on my test results just as I wish to ignore a call from Bill Clinton begging me to vote in the Virginia Governors election = next Tuesday. This is a case where annominity is not a good idea.=20 All you need now is a little standardization. Technically this should is very easy to understand in SIP. It would probably a reasonable modification of the Call INFO header in SIP with something like a XML based VCARD or JCARD URI whatever and probably 3GPP would need to look at how such data is displayed on the mobile VoLTE handsets. The network operators would have to understand not to modify = the contents of such a URI and its source validated but that is a task for another day.=20 -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of = Dan York Sent: Tuesday, October 29, 2013 5:10 PM To: Brian Rosen; Cullen Jennings Cc: Gregory.Schumacher@sprint.com; Richard Shockey; stir@ietf.org; = Fernando Mousinho (fmousinh); Alex Bobotek; Michael Hammer; Henning Schulzrinne Subject: [stir] Application servers - Re: Call Center Implications Getting caught up on some of the STIR discussions, I'd just note that = when we talk about "call centers" or "BPOs" we also need to remember that = we're not only talking about "traditional" call centers but also what I'll = call "voice application service providers". They are generally automated platforms running applications that a company uses for some kind of = outbound service. Examples include: - calling everyone in a school district with a weather-related = cancellation (or, unfortunately, a school shooting or similar event) - calling patients to provide reminders of appointments or notifications = of subscriptions available - calling customers to let them know that a package was delivered or = could be picked up, etc. - calling people scheduled for a flight to let know they are going to be delayed - calling members of an organization with an automated survey about = current issues - performing a call-back to provide an additional layer of = authentication for some service There is a large (and growing) market for these kind of automated tools = and services and the distinction between these calls and "robocalls" is = really only one of intent and the fact that the recipient has "opted in" through some kind of system. Generally, though, many of the companies want the application to appear = as if it is coming from their own phone number in the same way that they = want an outbound call center to appear as if it is coming from one of their = own phone numbers. You could think of these in the same way as "call centers", but I point = this out because some of these new services are very automated and there are always new startups now emerging in this space. Some of them are very "self-service" where the customer does it all while others have teams of people involved. Some of the companies involved include Nuance, = Microsoft Tellme, Voxeo (now Aspect, and also my former employer), Tropo, Twilio, Convergys and many more[1]. If STIR is to succeed, these kind of application platforms will also = need to be able to make calls on behalf of the companies using those platforms. Dan [1] One report about this market: http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf -- Dan York Senior Content Strategist, Internet Society york@isoc.org +1-802-735-1624 Jabber: york@jabber.isoc.org Skype: danyork http://twitter.com/danyork http://www.internetsociety.org/deploy360/ On 10/21/13 9:15 AM, "Brian Rosen" wrote: >We really need to give each BPO different keys I think. The notion = that >we are sharing private keys among multiple competing entities who=20 >provide services for a single enterprise strikes me as a VBI (Very Bad=20 >Idea). I can't see any real difficulty in having more than one=20 >authorized entity, each with it's own credentials. Who would have a=20 >problem? We're already agreeing that there are multiple credentials=20 >for a number, because the number gets delegated multiple times. =20 >Consider, just as an example, the BPO and the contracting enterprise=20 >that was actually delegated the number can both send calls from that=20 >number. You certainly don't want the enterprise giving out IT'S key to = >it's contractors. At best it's a key it authorizes to one or more of = it's BPOs. > >Brian > >On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy)=20 > >wrote: > >>=20 >> What Fernando is saying makes sense to me a desirable property of the = >>solution and I agree that if we gave each BPO a different private key = >>that would solve it but that might be pretty hard to mange in other=20 >>ways. I like the requirements but the solution is not 100% obvious to=20 >>me. >>=20 >>=20 >> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>=20 >>> Sure. >>>=20 >>> Each BPO would have a different private/public key pair. >>>=20 >>> So you can trace which one placed the call. >>>=20 >>> Brian >>>=20 >>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh)=20 >>> wrote: >>>=20 >>>> Point taken on PAI, but am still struggling with this BPO model. >>>>Apologies >>>> upfront if this is obvious and I'm just failing to understand. >>>>=20 >>>> If the company hires several BPOs and authorizes all of them to=20 >>>>sign calls on its behalf, is there a way to trace back the=20 >>>>originator (specific >>>>BPO) >>>> later on? I suppose that at some level the actual caller must be=20 >>>>exposed (perhaps to trace malicious activity, such as malicious=20 >>>>person infiltrated in an otherwise legitimate BPO). >>>>=20 >>>> Via headers would be the obvious pick, but they don't survive the=20 >>>>plethora of SBCs that the call is likely to transverse. Or maybe=20 >>>>the certs themselves can carry this type of data (actual caller=20 >>>>identity). >>>>=20 >>>>=20 >>>>=20 >>>>=20 >>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>=20 >>>>> Don't think that would work without related changes in the = networks. >>>>> In >>>>> some networks, PAI is used for called id. They would have to=20 >>>>>change to use From (if signed maybe). It also doesn't fit the=20 >>>>>definition of PAI. >>>>>=20 >>>>> Brian >>>>>=20 >>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh)=20 >>>>> wrote: >>>>>=20 >>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>"From" >>>>>> identifies the BPO, "PAI" the c >>>>>> ompany hiring the BPO - based on the delegation process Rosen=20 >>>>>>mentions. >>>>>> PAI's use is widespread, and it's main limitation is being=20 >>>>>>spoofable - but this is exactly the problem we are trying to=20 >>>>>>solve anyway. >>>>>>=20 >>>>>>=20 >>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey"=20 >>>>>>> >>>>>>> wrote: >>>>>>>=20 >>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>Behalf Of Alex Bobotek >>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; =20 >>>>>>>Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> +1 >>>>>>> I've assumed that we are headed towards a "sign whatever extras=20 >>>>>>> you wish, and indicate what your signature covers" mechanism. >>>>>>>=20 >>>>>>> Based on this, standards would need to identify only a minimal=20 >>>>>>>subset of what shall/should be signed, and ensure that any=20 >>>>>>>required group of signed items survives transit intact. >>>>>>>=20 >>>>>>> Best signing practices may be needed to complement the standard, = >>>>>>>and an appropriate place for all but the most basic 'what to=20 >>>>>>>sign' >>>>>>> recommendations. >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> Regards, >>>>>>>=20 >>>>>>> Alex >>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Henning Schulzrinne >>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>> To: Michael Hammer; fmousinh@cisco.com;=20 >>>>>>>>Gregory.Schumacher@sprint.com; >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I see no reason not to allow signing any number-related field=20 >>>>>>>>in the SIP request. (Signing may well be done by different=20 >>>>>>>>parties.) >>>>>>>>=20 >>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't=20 >>>>>>>>conveyable in legacy systems, however, so this may be of=20 >>>>>>>>somewhat limited use for a >>>>>>> while. >>>>>>>>=20 >>>>>>>> ________________________________________ >>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf=20 >>>>>>>> of Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com;=20 >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> Don't we still want to know the true originator of the call,=20 >>>>>>>>even when we have some token that says "Doctor so and so=20 >>>>>>>>approved this message." >>>>>>>>=20 >>>>>>>> Originating number, display number, and call-back number could=20 >>>>>>>>be >>>>>>>>3 >>>>>>>> different things. >>>>>>>> Should all of them be verifiable? >>>>>>>>=20 >>>>>>>> Mike >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Fernando Mousinho (fmousinh) >>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I believe the scenario telemarketing here is when a client=20 >>>>>>>>hires a BPO to place outbound calls, but expect customers to=20 >>>>>>>>return these calls to a different place (say, their own and=20 >>>>>>>>operated call center). This way, this client is authorizing=20 >>>>>>>>the BPO to use an identity that it >>>>>>>>(BPO) >>>>>>> doesn't own. >>>>>>>> These numbers in this scenario are always operational, just at=20 >>>>>>>> a different place. >>>>>>>>=20 >>>>>>>> The same telemarketing operator would then outpulse multiple=20 >>>>>>>>numbers for their multiple clients, none of these numbers=20 >>>>>>>>belonging to the >>>>>>> telemarketer. >>>>>>>> BTW, we are using the term "telemarketing" in a very generic=20 >>>>>>>>sense - this could just as easily be a public service=20 >>>>>>>>announcement, fundraiser, >>>>>>> etc. >>>>>>>>=20 >>>>>>>> If the telemarketer happens to own the inbound call center as=20 >>>>>>>>well, it very likely owns the number as well and this would=20 >>>>>>>>necessarily be a special case >>>>>>>> - it would fall under the same characteristics of any call = center. >>>>>>>>=20 >>>>>>>> On a different note, it would help a lot of we standardized=20 >>>>>>>> terminology. >>>>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it = may=20 >>>>>>>> be hard for others to follow the discussion later. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> (generic term for any type of outbound calling, including=20 >>>>>>>> public service announcement, so don't think it's all about=20 >>>>>>>> sales!) >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> There are some benefits from this approach, but also some=20 >>>>>>>>>scenarios that need clarification how they could function. >>>>>>>>>=20 >>>>>>>>> The benefit is that the credential represents both the company = =20 >>>>>>>>>"responsible" for the sales campaign (the "company" in your >>>>>>>>> scenario) >>>>>>>>> and the company operating the sales campaign (the call center=20 >>>>>>>>>in your scenario). For the use in forensics (after the fact=20 >>>>>>>>>analysis) such as pursuit of fraud investigation, we then can=20 >>>>>>>>>follow both paths. >>>>>>>>>=20 >>>>>>>>> However can you clarify the following - >>>>>>>>> - If a SP "signs" the call, is it attesting to the = "responsible" >>>>>>>>> party for the telemarketing call or the party executing the=20 >>>>>>>>> telemarketing campaign or both? >>>>>>>>>=20 >>>>>>>>> - How is the SP supposed to know all the parties that it is=20 >>>>>>>>> attesting to >>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>=20 >>>>>>>>> -It seems likely that some of the numbers assigned to a=20 >>>>>>>>>company in your scenario will not be assigned to real=20 >>>>>>>>>telephones (or call center >>>>>>>>> trunk) until a telemarketing campaign is initiated or a call=20 >>>>>>>>>center selected to execute the sales campaign, is it possible=20 >>>>>>>>>to have these unassigned or floating numbers when not in use=20 >>>>>>>>>for a telemarketing campaign? Is it allowed under most=20 >>>>>>>>>national numbering regimes? >>>>>>>>>=20 >>>>>>>>> - How important is it to have a known or recognized phone=20 >>>>>>>>>number as the caller id as part of a telemarketing campaign? =20 >>>>>>>>>I am assuming that not all campaigns care about having a=20 >>>>>>>>>number that is known or >>>>>>> recognized. >>>>>>>>>=20 >>>>>>>>> -In other words for this last bit, if a call center=20 >>>>>>>>>(telemarketing campaign operator) is using their own set of=20 >>>>>>>>>numbers but serve multiple simultaneous telemarketing=20 >>>>>>>>>campaigns using the same originating numbers, what will they=20 >>>>>>>>>sign? Will they just have a credential representing the call=20 >>>>>>>>>center alone, or a different credential per telemarketing=20 >>>>>>>>>campaign, or a different credential per responsible party (per = >>>>>>>>>client)? This will affect what is possible for >>>>>>> any forensic activity. >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>>Behalf Of Brian Rosen >>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>> To: Fernando Mousinho >>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>=20 >>>>>>>>> The notion we had is that the company contracting the call=20 >>>>>>>>>center approves the use, and the call center, or the SP acting = >>>>>>>>>on its behalf, signs. >>>>>>>>> Think of this as another level of delegation. An SP delegates = =20 >>>>>>>>>numbers to the company. The company "delegates" use of those =20 >>>>>>>>>numbers to the call center. The call center calls, using that = >>>>>>>>>delegation. >>>>>>>>> The credentials of the call center would be different from=20 >>>>>>>>>those of the company, but would cover the same number. Having = >>>>>>>>>multiple credentials covering the same number will be very=20 >>>>>>>>>common due to the way delegation happens. In order to allow=20 >>>>>>>>>SPs to sign, without creating credential per TN, we allow=20 >>>>>>>>>credentials with ranges. >>>>>>>>>The >>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>=20 >>>>>>>>> Consider the following complex US case: >>>>>>>>> The North American Number Plan Administrator delegates=20 >>>>>>>>>202-555-xxxx to the Pooling Administrator. The PA now has a=20 >>>>>>>>>credential covering the entire 10K block. >>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP=20 >>>>>>>>>A has a credential for the entire 1K block SP A resells=20 >>>>>>>>>202-555-12xx to SP B . >>>>>>>>> SP B has a credential for a 100 TN block SP B delegates=20 >>>>>>>>>202-555-123x to Company C. Company C has a credential for a=20 >>>>>>>>>10 number block Company C authorizes 202-555-1234 to BPO D. =20 >>>>>>>>>BPO D has credential for a 1 number block >>>>>>>>>=20 >>>>>>>>> NANPA and the PA never are in a call path, so they would never = >>>>>>>>>sign a call. >>>>>>>>>=20 >>>>>>>>> However, SP A or SP B could sign a call from either Company C=20 >>>>>>>>>or BPO D using the credential they have. >>>>>>>>>=20 >>>>>>>>> The SP for the call center could acquire credentials from the=20 >>>>>>>>>BPO and sign on its behalf. I suspect than many service=20 >>>>>>>>>providers would be reluctant to do so unless the numbers were=20 >>>>>>>>>from their own inventory (that is, the company got its numbers = >>>>>>>>>from the same SP as the call >>>>>>> center). >>>>>>>>> Since that won't be the common case, the call center probably=20 >>>>>>>>>has to do the signing itself. >>>>>>>>>=20 >>>>>>>>> Brian >>>>>>>>>=20 >>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs,=20 >>>>>>>>>>which provide services for other companies) may have special=20 >>>>>>>>>>arrangements with SPs, the majority (small to mid-size) will=20 >>>>>>>>>>probably rely on the SPs to do provide to vouch for their=20 >>>>>>>>>>identity. This would probably be the case for the home analog = >>>>>>>>>>caller anyway. This would imply that the "originating" SP's=20 >>>>>>>>>>willingness to provide this signature is a critical success=20 >>>>>>>>>>factor for the proposal's adoption. >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> But back to the business process outsourcers (BPO) case -=20 >>>>>>>>>>where a call center is providing service on behalf of=20 >>>>>>>>>>multiple companies. I can see the value of them sending=20 >>>>>>>>>>different numbers based on the clients they represent.=20 >>>>>>>>>>Wouldn't that create a billing issue though? >>>>>>>>>> This is not an area I understand well, but I would suspect=20 >>>>>>>>>>that SP >>>>>>>>>> 1 allowing one of its subscribers to send an outbound call=20 >>>>>>>>>>using a number registered to SP 2 could be a no-no. If this=20 >>>>>>>>>>hypothesis is correct, then we are back to the case where the = >>>>>>>>>>SP is signing all calls, >>>>>>>> even for BPOs. >>>>>>>>>>=20 >>>>>>>>>> Or maybe this is another problem we are trying to fix in the = >>>>>>>>>>working group, in which case we perhaps should state as a goal = >>>>>>>>>>or >>>>>>> benefit: >>>>>>>>>> "providing a reliable mechanism to let calls originated from=20 >>>>>>>>>> one >>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>=20 >>>>>>>>>> Fernando >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>> >>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> Any of them could do it. My guess is service providers will = >>>>>>>>>>>do it for most call centers, although larger call centers=20 >>>>>>>>>>>might do it themselves... >>>>>>>>>>> especially ones which have trunks from multiple providers=20 >>>>>>>>>>>and can source calls using the same number(s) out through=20 >>>>>>>>>>>multiple providers on a call-by-call basis. >>>>>>>>>>>=20 >>>>>>>>>>> -hadriel >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>> I'm catching up with the discussions in this working group, = >>>>>>>>>>>>and am trying to understand some architecture implications=20 >>>>>>>>>>>>in call centers (which is where my background is). It seems = >>>>>>>>>>>>that many of the problems we are trying to fix are related=20 >>>>>>>>>>>>to contact centers anyway, so it is probably a good idea to = >>>>>>>>>>>>have everyone in the same >>>>>>>> page. >>>>>>>>>>>>=20 >>>>>>>>>>>> Forgive me if it is an obvious question, but which=20 >>>>>>>>>>>>components in a "typical call center architecture" do you=20 >>>>>>>>>>>>see signature and verification taking place? Such "typical" = >>>>>>>>>>>>deployments have premises based equipment (PME), a session=20 >>>>>>>>>>>>border controller >>>>>>>>>>>>(SBC) >>>>>>>>>>>> and of course a SIP service provider all three could=20 >>>>>>>>>>>>potentially be used throughout the authorization process.=20 >>>>>>>>>>>>There are different ramifications depending on where your=20 >>>>>>>>>>>>mind is at. >>>>>>>>>>>>=20 >>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>> Cisco Systems >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> ________________________________ >>>>>>>>>=20 >>>>>>>>> This e-mail may contain Sprint proprietary information=20 >>>>>>>>>intended for the sole use of the recipient(s). Any use by=20 >>>>>>>>>others is prohibited. >>>>>>>>> If >>>>>>>>> you are not the intended recipient, please contact the sender=20 >>>>>>>>>and delete all copies of the message. >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>=20 >>>>=20 >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>=20 > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From br@brianrosen.net Wed Oct 30 12:21:30 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB5E221E8160 for ; Wed, 30 Oct 2013 12:21:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.499 X-Spam-Level: X-Spam-Status: No, score=-103.499 tagged_above=-999 required=5 tests=[AWL=0.100, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NK+rhsYK8oK0 for ; Wed, 30 Oct 2013 12:21:26 -0700 (PDT) Received: from mail-qc0-f176.google.com (mail-qc0-f176.google.com [209.85.216.176]) by ietfa.amsl.com (Postfix) with ESMTP id 30F9021E8091 for ; Wed, 30 Oct 2013 12:21:22 -0700 (PDT) Received: by mail-qc0-f176.google.com with SMTP id s19so1058874qcw.7 for ; Wed, 30 Oct 2013 12:21:11 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=2Y5LJ43t7IoU5u/t2QNSTIWosr7FmXLpmMrp4S/nyX8=; b=dtUhI8v9JFcNAFCzsw26IIi7BgFB+0AdSCo3FRYWHW69wP9/fgRnvwgtqQEcrHeB1/ BOFzlIOEvF3UgMo7g1dvlYuILkiDDL5bcOEBzDGoMLF/+lQTifyF5i2eEg+PSo406+oO Ge1n752O3B2PvH4BujVpcfHysm0/M/5IohWGJf2tBOOqnQ+w8HUH7MRi8/1mPgArWsKe 13cpQZwJhucOGgaKLvSxBRs5iJEpbu720ll8/ZHr6PaQjOm7i+yqpdEzXOytrnxh0zK8 kVczGATJ8wMrfx7tFSMGFUrS/1UJiUyOYuCaWt3EVjO8oWKPsS/0kyxEOoqbKd0rQyxm w99Q== X-Gm-Message-State: ALoCoQlfGs2Z+Bi3j6YXFuBXAudBlTrLF8lS1Sk88719FUCwCwoOpRGpD9rCL3KPO+FqHwmq1ryM X-Received: by 10.49.98.1 with SMTP id ee1mr9091618qeb.28.1383160871596; Wed, 30 Oct 2013 12:21:11 -0700 (PDT) Received: from [10.33.192.35] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id v19sm391554qaw.0.2013.10.30.12.21.05 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 30 Oct 2013 12:21:10 -0700 (PDT) Content-Type: text/plain; charset=windows-1250 Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\)) From: Brian Rosen In-Reply-To: <024001ced5a2$f3268810$d9739830$@shockey.us> Date: Wed, 30 Oct 2013 15:21:03 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <91B44B86-A2B6-48A4-8B8B-3C17571028BF@brianrosen.net> References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> <024001ced5a2$f3268810$d9739830$@shockey.us> To: Richard Shockey X-Mailer: Apple Mail (2.1816) Cc: "stir@ietf.org List" Subject: Re: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 19:21:30 -0000 We have a separate list for caller name (cnit). I don=92t see any difference between these authorized users of a TN and = a BPO. The customer can get a credential authorized by the service = provider who delegated the TN to him. The customer can then =93delegate=94= the BPO or the mass calling service provider to use that number on its = behalf. There is no difference from our point of view why the = authorized entity is placing the call, what kind of service it offers, = or how many calls it places. If it=92s authorized by the subscriber to = use the TN, then the contractor can use the TN and sign for it. Brian On Oct 30, 2013, at 3:05 PM, Richard Shockey wrote: > Dan great post. I couldn't agree more. There needs to be some rules = here. > Some may be regulatory some may be technical. >=20 > First the voice application service providers need to provide the > terminating CUA, "an accurate and truthful" Caller-ID for the call = even if > it is originated from a source that is not directly associated with = the > business entity for whom the call is being made. That could be an = 800 > number for instance but I won't bore you with the issues with SMS800 > RESPORGS. >=20 > If the originating UA can prove/assert it is legally authorized to use = such > an identity on behalf of a customer then that is step one. The = presumption > after that is there is some contractual obligation between the service > provider and the network about the use of such identities. The network = can > then "validate" such an assertion.=20 >=20 > There is something larger here to consider. Though the focus of STIR = is > validation of a Caller-ID number at some point the RAI area should = take a > look at the other side of the coin so to speak. =20 >=20 > CNAM. That is NOT something STIR can do but I do believe there is an > emerging requirement that under some cases the calling party wants to = or > should provide more substantive information about themselves to the = called > party and frankly 15 character ASCII is not enough. Consumers or = businesses > should be able to see more complete and validated information about = the > session in order to make an better and informed decision on whether to > accept the 'call' or not. Regulators may want to require = telemarketing > firms to display NG CNAM or CNAM + like data as a condition of doing > business. >=20 > All of the examples you cite are excellent examples where such verbose > calling party identification could be displayed. I certainly want to = answer > a call from my doctor on my test results just as I wish to ignore a = call > from Bill Clinton begging me to vote in the Virginia Governors = election next > Tuesday. This is a case where annominity is not a good idea.=20 >=20 >=20 > All you need now is a little standardization. > Technically this should is very easy to understand in SIP. It would > probably a reasonable modification of the Call INFO header in SIP with > something like a XML based VCARD or JCARD URI whatever and probably = 3GPP > would need to look at how such data is displayed on the mobile VoLTE > handsets. The network operators would have to understand not to modify = the > contents of such a URI and its source validated but that is a task for > another day.=20 >=20 >=20 >=20 > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf = Of Dan > York > Sent: Tuesday, October 29, 2013 5:10 PM > To: Brian Rosen; Cullen Jennings > Cc: Gregory.Schumacher@sprint.com; Richard Shockey; stir@ietf.org; = Fernando > Mousinho (fmousinh); Alex Bobotek; Michael Hammer; Henning Schulzrinne > Subject: [stir] Application servers - Re: Call Center Implications >=20 > Getting caught up on some of the STIR discussions, I'd just note that = when > we talk about "call centers" or "BPOs" we also need to remember that = we're > not only talking about "traditional" call centers but also what I'll = call > "voice application service providers". They are generally automated > platforms running applications that a company uses for some kind of = outbound > service. Examples include: >=20 > - calling everyone in a school district with a weather-related = cancellation > (or, unfortunately, a school shooting or similar event) > - calling patients to provide reminders of appointments or = notifications of > subscriptions available > - calling customers to let them know that a package was delivered or = could > be picked up, etc. > - calling people scheduled for a flight to let know they are going to = be > delayed > - calling members of an organization with an automated survey about = current > issues > - performing a call-back to provide an additional layer of = authentication > for some service >=20 > There is a large (and growing) market for these kind of automated = tools and > services and the distinction between these calls and "robocalls" is = really > only one of intent and the fact that the recipient has "opted in" > through some kind of system. >=20 > Generally, though, many of the companies want the application to = appear as > if it is coming from their own phone number in the same way that they = want > an outbound call center to appear as if it is coming from one of their = own > phone numbers. >=20 > You could think of these in the same way as "call centers", but I = point this > out because some of these new services are very automated and there = are > always new startups now emerging in this space. Some of them are very > "self-service" where the customer does it all while others have teams = of > people involved. Some of the companies involved include Nuance, = Microsoft > Tellme, Voxeo (now Aspect, and also my former employer), Tropo, = Twilio, > Convergys and many more[1]. >=20 > If STIR is to succeed, these kind of application platforms will also = need to > be able to make calls on behalf of the companies using those = platforms. >=20 > Dan >=20 > [1] One report about this market: > http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf >=20 >=20 > -- > Dan York > Senior Content Strategist, Internet Society > york@isoc.org +1-802-735-1624 > Jabber: york@jabber.isoc.org > Skype: danyork http://twitter.com/danyork >=20 > http://www.internetsociety.org/deploy360/ >=20 >=20 >=20 >=20 > On 10/21/13 9:15 AM, "Brian Rosen" wrote: >=20 >> We really need to give each BPO different keys I think. The notion = that >> we are sharing private keys among multiple competing entities who=20 >> provide services for a single enterprise strikes me as a VBI (Very = Bad=20 >> Idea). I can't see any real difficulty in having more than one=20 >> authorized entity, each with it's own credentials. Who would have a=20= >> problem? We're already agreeing that there are multiple credentials=20= >> for a number, because the number gets delegated multiple times. =20 >> Consider, just as an example, the BPO and the contracting enterprise=20= >> that was actually delegated the number can both send calls from that=20= >> number. You certainly don't want the enterprise giving out IT'S key = to=20 >> it's contractors. At best it's a key it authorizes to one or more of = it's > BPOs. >>=20 >> Brian >>=20 >> On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy)=20 >> >> wrote: >>=20 >>>=20 >>> What Fernando is saying makes sense to me a desirable property of = the=20 >>> solution and I agree that if we gave each BPO a different private = key=20 >>> that would solve it but that might be pretty hard to mange in other=20= >>> ways. I like the requirements but the solution is not 100% obvious = to=20 >>> me. >>>=20 >>>=20 >>> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>>=20 >>>> Sure. >>>>=20 >>>> Each BPO would have a different private/public key pair. >>>>=20 >>>> So you can trace which one placed the call. >>>>=20 >>>> Brian >>>>=20 >>>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh)=20 >>>> wrote: >>>>=20 >>>>> Point taken on PAI, but am still struggling with this BPO model. >>>>> Apologies >>>>> upfront if this is obvious and I'm just failing to understand. >>>>>=20 >>>>> If the company hires several BPOs and authorizes all of them to=20 >>>>> sign calls on its behalf, is there a way to trace back the=20 >>>>> originator (specific >>>>> BPO) >>>>> later on? I suppose that at some level the actual caller must be=20= >>>>> exposed (perhaps to trace malicious activity, such as malicious=20= >>>>> person infiltrated in an otherwise legitimate BPO). >>>>>=20 >>>>> Via headers would be the obvious pick, but they don't survive the=20= >>>>> plethora of SBCs that the call is likely to transverse. Or maybe=20= >>>>> the certs themselves can carry this type of data (actual caller=20= >>>>> identity). >>>>>=20 >>>>>=20 >>>>>=20 >>>>>=20 >>>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>>=20 >>>>>> Don't think that would work without related changes in the = networks. >>>>>> In >>>>>> some networks, PAI is used for called id. They would have to=20 >>>>>> change to use =46rom (if signed maybe). It also doesn't fit the=20= >>>>>> definition of PAI. >>>>>>=20 >>>>>> Brian >>>>>>=20 >>>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh)=20 >>>>>> wrote: >>>>>>=20 >>>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>> "From" >>>>>>> identifies the BPO, "PAI" the c >>>>>>> ompany hiring the BPO - based on the delegation process Rosen=20 >>>>>>> mentions. >>>>>>> PAI's use is widespread, and it's main limitation is being=20 >>>>>>> spoofable - but this is exactly the problem we are trying to=20 >>>>>>> solve anyway. >>>>>>>=20 >>>>>>>=20 >>>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey"=20 >>>>>>>> >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>> Behalf Of Alex Bobotek >>>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; =20= >>>>>>>> Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> +1 >>>>>>>> I've assumed that we are headed towards a "sign whatever extras=20= >>>>>>>> you wish, and indicate what your signature covers" mechanism. >>>>>>>>=20 >>>>>>>> Based on this, standards would need to identify only a minimal=20= >>>>>>>> subset of what shall/should be signed, and ensure that any=20 >>>>>>>> required group of signed items survives transit intact. >>>>>>>>=20 >>>>>>>> Best signing practices may be needed to complement the = standard,=20 >>>>>>>> and an appropriate place for all but the most basic 'what to=20= >>>>>>>> sign' >>>>>>>> recommendations. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> Regards, >>>>>>>>=20 >>>>>>>> Alex >>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>>> Behalf Of Henning Schulzrinne >>>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>>> To: Michael Hammer; fmousinh@cisco.com;=20 >>>>>>>>> Gregory.Schumacher@sprint.com; >>>>>>>>> br@brianrosen.net >>>>>>>>> Cc: stir@ietf.org >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> I see no reason not to allow signing any number-related field=20= >>>>>>>>> in the SIP request. (Signing may well be done by different=20 >>>>>>>>> parties.) >>>>>>>>>=20 >>>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't=20 >>>>>>>>> conveyable in legacy systems, however, so this may be of=20 >>>>>>>>> somewhat limited use for a >>>>>>>> while. >>>>>>>>>=20 >>>>>>>>> ________________________________________ >>>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf=20= >>>>>>>>> of Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com;=20 >>>>>>>>> br@brianrosen.net >>>>>>>>> Cc: stir@ietf.org >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> Don't we still want to know the true originator of the call,=20= >>>>>>>>> even when we have some token that says "Doctor so and so=20 >>>>>>>>> approved this message." >>>>>>>>>=20 >>>>>>>>> Originating number, display number, and call-back number could=20= >>>>>>>>> be >>>>>>>>> 3 >>>>>>>>> different things. >>>>>>>>> Should all of them be verifiable? >>>>>>>>>=20 >>>>>>>>> Mike >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>>> Behalf Of Fernando Mousinho (fmousinh) >>>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>>> Cc: stir@ietf.org >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> I believe the scenario telemarketing here is when a client=20 >>>>>>>>> hires a BPO to place outbound calls, but expect customers to=20= >>>>>>>>> return these calls to a different place (say, their own and=20= >>>>>>>>> operated call center). This way, this client is authorizing=20= >>>>>>>>> the BPO to use an identity that it >>>>>>>>> (BPO) >>>>>>>> doesn't own. >>>>>>>>> These numbers in this scenario are always operational, just at=20= >>>>>>>>> a different place. >>>>>>>>>=20 >>>>>>>>> The same telemarketing operator would then outpulse multiple=20= >>>>>>>>> numbers for their multiple clients, none of these numbers=20 >>>>>>>>> belonging to the >>>>>>>> telemarketer. >>>>>>>>> BTW, we are using the term "telemarketing" in a very generic=20= >>>>>>>>> sense - this could just as easily be a public service=20 >>>>>>>>> announcement, fundraiser, >>>>>>>> etc. >>>>>>>>>=20 >>>>>>>>> If the telemarketer happens to own the inbound call center as=20= >>>>>>>>> well, it very likely owns the number as well and this would=20= >>>>>>>>> necessarily be a special case >>>>>>>>> - it would fall under the same characteristics of any call = center. >>>>>>>>>=20 >>>>>>>>> On a different note, it would help a lot of we standardized=20 >>>>>>>>> terminology. >>>>>>>>> Telemarketing, BPO, call center, end customer, clients=8A it = may=20 >>>>>>>>> be hard for others to follow the discussion later. >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> (generic term for any type of outbound calling, including=20 >>>>>>>>> public service announcement, so don't think it's all about=20 >>>>>>>>> sales!) >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> There are some benefits from this approach, but also some=20 >>>>>>>>>> scenarios that need clarification how they could function. >>>>>>>>>>=20 >>>>>>>>>> The benefit is that the credential represents both the = company =20 >>>>>>>>>> "responsible" for the sales campaign (the "company" in your >>>>>>>>>> scenario) >>>>>>>>>> and the company operating the sales campaign (the call center=20= >>>>>>>>>> in your scenario). For the use in forensics (after the = fact=20 >>>>>>>>>> analysis) such as pursuit of fraud investigation, we then = can=20 >>>>>>>>>> follow both paths. >>>>>>>>>>=20 >>>>>>>>>> However can you clarify the following - >>>>>>>>>> - If a SP "signs" the call, is it attesting to the = "responsible" >>>>>>>>>> party for the telemarketing call or the party executing the=20= >>>>>>>>>> telemarketing campaign or both? >>>>>>>>>>=20 >>>>>>>>>> - How is the SP supposed to know all the parties that it is=20= >>>>>>>>>> attesting to >>>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>>=20 >>>>>>>>>> -It seems likely that some of the numbers assigned to a=20 >>>>>>>>>> company in your scenario will not be assigned to real=20 >>>>>>>>>> telephones (or call center >>>>>>>>>> trunk) until a telemarketing campaign is initiated or a call=20= >>>>>>>>>> center selected to execute the sales campaign, is it = possible=20 >>>>>>>>>> to have these unassigned or floating numbers when not in use=20= >>>>>>>>>> for a telemarketing campaign? Is it allowed under most=20 >>>>>>>>>> national numbering regimes? >>>>>>>>>>=20 >>>>>>>>>> - How important is it to have a known or recognized phone=20 >>>>>>>>>> number as the caller id as part of a telemarketing campaign? = =20 >>>>>>>>>> I am assuming that not all campaigns care about having a=20 >>>>>>>>>> number that is known or >>>>>>>> recognized. >>>>>>>>>>=20 >>>>>>>>>> -In other words for this last bit, if a call center=20 >>>>>>>>>> (telemarketing campaign operator) is using their own set of=20= >>>>>>>>>> numbers but serve multiple simultaneous telemarketing=20 >>>>>>>>>> campaigns using the same originating numbers, what will they=20= >>>>>>>>>> sign? Will they just have a credential representing the = call=20 >>>>>>>>>> center alone, or a different credential per telemarketing=20 >>>>>>>>>> campaign, or a different credential per responsible party = (per=20 >>>>>>>>>> client)? This will affect what is possible for >>>>>>>> any forensic activity. >>>>>>>>>>=20 >>>>>>>>>> -----Original Message----- >>>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20= >>>>>>>>>> Behalf Of Brian Rosen >>>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>>> To: Fernando Mousinho >>>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>>=20 >>>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>>=20 >>>>>>>>>> The notion we had is that the company contracting the call=20 >>>>>>>>>> center approves the use, and the call center, or the SP = acting=20 >>>>>>>>>> on its behalf, signs. >>>>>>>>>> Think of this as another level of delegation. An SP = delegates =20 >>>>>>>>>> numbers to the company. The company "delegates" use of those = =20 >>>>>>>>>> numbers to the call center. The call center calls, using = that=20 >>>>>>>>>> delegation. >>>>>>>>>> The credentials of the call center would be different from=20 >>>>>>>>>> those of the company, but would cover the same number. = Having=20 >>>>>>>>>> multiple credentials covering the same number will be very=20= >>>>>>>>>> common due to the way delegation happens. In order to allow=20= >>>>>>>>>> SPs to sign, without creating credential per TN, we allow=20 >>>>>>>>>> credentials with ranges. >>>>>>>>>> The >>>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>>=20 >>>>>>>>>> Consider the following complex US case: >>>>>>>>>> The North American Number Plan Administrator delegates=20 >>>>>>>>>> 202-555-xxxx to the Pooling Administrator. The PA now has a=20= >>>>>>>>>> credential covering the entire 10K block. >>>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP=20= >>>>>>>>>> A has a credential for the entire 1K block SP A resells=20 >>>>>>>>>> 202-555-12xx to SP B . >>>>>>>>>> SP B has a credential for a 100 TN block SP B delegates=20 >>>>>>>>>> 202-555-123x to Company C. Company C has a credential for a=20= >>>>>>>>>> 10 number block Company C authorizes 202-555-1234 to BPO D. =20= >>>>>>>>>> BPO D has credential for a 1 number block >>>>>>>>>>=20 >>>>>>>>>> NANPA and the PA never are in a call path, so they would = never=20 >>>>>>>>>> sign a call. >>>>>>>>>>=20 >>>>>>>>>> However, SP A or SP B could sign a call from either Company C=20= >>>>>>>>>> or BPO D using the credential they have. >>>>>>>>>>=20 >>>>>>>>>> The SP for the call center could acquire credentials from the=20= >>>>>>>>>> BPO and sign on its behalf. I suspect than many service=20 >>>>>>>>>> providers would be reluctant to do so unless the numbers = were=20 >>>>>>>>>> from their own inventory (that is, the company got its = numbers=20 >>>>>>>>>> from the same SP as the call >>>>>>>> center). >>>>>>>>>> Since that won't be the common case, the call center probably=20= >>>>>>>>>> has to do the signing itself. >>>>>>>>>>=20 >>>>>>>>>> Brian >>>>>>>>>>=20 >>>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs,=20= >>>>>>>>>>> which provide services for other companies) may have = special=20 >>>>>>>>>>> arrangements with SPs, the majority (small to mid-size) = will=20 >>>>>>>>>>> probably rely on the SPs to do provide to vouch for their=20= >>>>>>>>>>> identity. This would probably be the case for the home = analog=20 >>>>>>>>>>> caller anyway. This would imply that the "originating" SP's=20= >>>>>>>>>>> willingness to provide this signature is a critical success=20= >>>>>>>>>>> factor for the proposal's adoption. >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> But back to the business process outsourcers (BPO) case -=20 >>>>>>>>>>> where a call center is providing service on behalf of=20 >>>>>>>>>>> multiple companies. I can see the value of them sending=20 >>>>>>>>>>> different numbers based on the clients they represent.=20 >>>>>>>>>>> Wouldn't that create a billing issue though? >>>>>>>>>>> This is not an area I understand well, but I would suspect=20= >>>>>>>>>>> that SP >>>>>>>>>>> 1 allowing one of its subscribers to send an outbound call=20= >>>>>>>>>>> using a number registered to SP 2 could be a no-no. If this=20= >>>>>>>>>>> hypothesis is correct, then we are back to the case where = the=20 >>>>>>>>>>> SP is signing all calls, >>>>>>>>> even for BPOs. >>>>>>>>>>>=20 >>>>>>>>>>> Or maybe this is another problem we are trying to fix in the = =20 >>>>>>>>>>> working group, in which case we perhaps should state as a = goal=20 >>>>>>>>>>> or >>>>>>>> benefit: >>>>>>>>>>> "providing a reliable mechanism to let calls originated from=20= >>>>>>>>>>> one >>>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>>=20 >>>>>>>>>>> Fernando >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>>> >>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>>=20 >>>>>>>>>>>> Any of them could do it. My guess is service providers = will=20 >>>>>>>>>>>> do it for most call centers, although larger call centers=20= >>>>>>>>>>>> might do it themselves... >>>>>>>>>>>> especially ones which have trunks from multiple providers=20= >>>>>>>>>>>> and can source calls using the same number(s) out through=20= >>>>>>>>>>>> multiple providers on a call-by-call basis. >>>>>>>>>>>>=20 >>>>>>>>>>>> -hadriel >>>>>>>>>>>>=20 >>>>>>>>>>>>=20 >>>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh)=20= >>>>>>>>>>>> wrote: >>>>>>>>>>>>=20 >>>>>>>>>>>>> I'm catching up with the discussions in this working = group,=20 >>>>>>>>>>>>> and am trying to understand some architecture = implications=20 >>>>>>>>>>>>> in call centers (which is where my background is). It = seems=20 >>>>>>>>>>>>> that many of the problems we are trying to fix are = related=20 >>>>>>>>>>>>> to contact centers anyway, so it is probably a good idea = to=20 >>>>>>>>>>>>> have everyone in the same >>>>>>>>> page. >>>>>>>>>>>>>=20 >>>>>>>>>>>>> Forgive me if it is an obvious question, but which=20 >>>>>>>>>>>>> components in a "typical call center architecture" do you=20= >>>>>>>>>>>>> see signature and verification taking place? Such = "typical"=20 >>>>>>>>>>>>> deployments have premises based equipment (PME), a = session=20 >>>>>>>>>>>>> border controller >>>>>>>>>>>>> (SBC) >>>>>>>>>>>>> and of course a SIP service provider all three could=20 >>>>>>>>>>>>> potentially be used throughout the authorization process.=20= >>>>>>>>>>>>> There are different ramifications depending on where your=20= >>>>>>>>>>>>> mind is at. >>>>>>>>>>>>>=20 >>>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>>> Cisco Systems >>>>>>>>>>>=20 >>>>>>>>>>> _______________________________________________ >>>>>>>>>>> stir mailing list >>>>>>>>>>> stir@ietf.org >>>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> ________________________________ >>>>>>>>>>=20 >>>>>>>>>> This e-mail may contain Sprint proprietary information=20 >>>>>>>>>> intended for the sole use of the recipient(s). Any use by=20 >>>>>>>>>> others is prohibited. >>>>>>>>>> If >>>>>>>>>> you are not the intended recipient, please contact the sender=20= >>>>>>>>>> and delete all copies of the message. >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>=20 >>>>>=20 >>>>=20 >>>> _______________________________________________ >>>> stir mailing list >>>> stir@ietf.org >>>> https://www.ietf.org/mailman/listinfo/stir >>>=20 >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 16:11:46 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A67A611E81C8 for ; Wed, 30 Oct 2013 16:11:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.332 X-Spam-Level: X-Spam-Status: No, score=-102.332 tagged_above=-999 required=5 tests=[AWL=-0.067, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mA5sCjTT-WAk for ; Wed, 30 Oct 2013 16:11:42 -0700 (PDT) Received: from oproxy9-pub.mail.unifiedlayer.com (oproxy9-pub.mail.unifiedlayer.com [69.89.24.6]) by ietfa.amsl.com (Postfix) with SMTP id D237821E8093 for ; Wed, 30 Oct 2013 16:11:40 -0700 (PDT) Received: (qmail 29833 invoked by uid 0); 30 Oct 2013 17:42:28 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy9.mail.unifiedlayer.com with SMTP; 30 Oct 2013 17:42:28 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=D+9DwneMdmbBT1A65npOlWgax2CoZ7nVhRfulDNtWtE=; b=lEV8gGjxGLenWNwqOoFy8iaMw+e7nlTBfUZ2iKQ4Io4OcPu3i8LLnN7CrnxBdxfBaVpc3BW98R6TiMvZREXxku+qj+q8RQ2hzDh976wcqY7EoKyPNd5eka+429gHBA2Z; Received: from [173.79.179.104] (port=53357 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbZml-00005H-7s; Wed, 30 Oct 2013 11:42:27 -0600 From: "Richard Shockey" To: "'Dan York'" , "'Brian Rosen'" , "'Cullen Jennings'" References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> In-Reply-To: Date: Wed, 30 Oct 2013 13:42:25 -0400 Message-ID: <01ab01ced597$66568fd0$3303af70$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQLC46Egqaoyw2i6zUEn13TyfC6DWZgkHKig Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Cc: Gregory.Schumacher@sprint.com, stir@ietf.org, "'Fernando Mousinho \(fmousinh\)'" , 'Alex Bobotek' , 'Michael Hammer' , 'Henning Schulzrinne' Subject: Re: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 23:11:46 -0000 Dan great post. I couldn't agree more. There needs to be some rules = here. Some may be regulatory some may be technical. First the voice application service providers need to provide the terminating CUA, "an accurate and truthful" Caller-ID for the call even = if it is originated from a source that is not directly associated with the business entity for whom the call is being made. That could be an 800 number for instance but I won't bore you with the issues with SMS800 RESPORGS. If the originating UA can prove/assert it is legally authorized to use = such an identity on behalf of a customer then that is step one. The = presumption after that is there is some contractual obligation between the service provider and the network about the use of such identities. The network = can then "validate" such an assertion.=20 There is something larger here to consider. Though the focus of STIR is validation of a Caller-ID number at some point the RAI area should take = a look at the other side of the coin so to speak. =20 CNAM. That is NOT something STIR can do but I do believe there is an emerging requirement that under some cases the calling party wants to or should provide more substantive information about themselves to the = called party and frankly 15 character ASCII is not enough. Consumers or = businesses should be able to see more complete and validated information about the session in order to make an better and informed decision on whether to accept the 'call' or not. Regulators may want to require telemarketing firms to display NG CNAM or CNAM + like data as a condition of doing business. All of the examples you cite are excellent examples where such verbose calling party identification could be displayed. I certainly want to = answer a call from my doctor on my test results just as I wish to ignore a call from Bill Clinton begging me to vote in the Virginia Governors election = next Tuesday. This is a case where annominity is not a good idea.=20 All you need now is a little standardization. Technically this should is very easy to understand in SIP. It would probably a reasonable modification of the Call INFO header in SIP with something like a XML based VCARD or JCARD URI whatever and probably 3GPP would need to look at how such data is displayed on the mobile VoLTE handsets. The network operators would have to understand not to modify = the contents of such a URI and its source validated but that is a task for another day.=20 -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of = Dan York Sent: Tuesday, October 29, 2013 5:10 PM To: Brian Rosen; Cullen Jennings Cc: Gregory.Schumacher@sprint.com; Richard Shockey; stir@ietf.org; = Fernando Mousinho (fmousinh); Alex Bobotek; Michael Hammer; Henning Schulzrinne Subject: [stir] Application servers - Re: Call Center Implications Getting caught up on some of the STIR discussions, I'd just note that = when we talk about "call centers" or "BPOs" we also need to remember that = we're not only talking about "traditional" call centers but also what I'll = call "voice application service providers". They are generally automated platforms running applications that a company uses for some kind of = outbound service. Examples include: - calling everyone in a school district with a weather-related = cancellation (or, unfortunately, a school shooting or similar event) - calling patients to provide reminders of appointments or notifications = of subscriptions available - calling customers to let them know that a package was delivered or = could be picked up, etc. - calling people scheduled for a flight to let know they are going to be delayed - calling members of an organization with an automated survey about = current issues - performing a call-back to provide an additional layer of = authentication for some service There is a large (and growing) market for these kind of automated tools = and services and the distinction between these calls and "robocalls" is = really only one of intent and the fact that the recipient has "opted in" through some kind of system. Generally, though, many of the companies want the application to appear = as if it is coming from their own phone number in the same way that they = want an outbound call center to appear as if it is coming from one of their = own phone numbers. You could think of these in the same way as "call centers", but I point = this out because some of these new services are very automated and there are always new startups now emerging in this space. Some of them are very "self-service" where the customer does it all while others have teams of people involved. Some of the companies involved include Nuance, = Microsoft Tellme, Voxeo (now Aspect, and also my former employer), Tropo, Twilio, Convergys and many more[1]. If STIR is to succeed, these kind of application platforms will also = need to be able to make calls on behalf of the companies using those platforms. Dan [1] One report about this market: http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf -- Dan York Senior Content Strategist, Internet Society york@isoc.org +1-802-735-1624 Jabber: york@jabber.isoc.org Skype: danyork http://twitter.com/danyork http://www.internetsociety.org/deploy360/ On 10/21/13 9:15 AM, "Brian Rosen" wrote: >We really need to give each BPO different keys I think. The notion = that >we are sharing private keys among multiple competing entities who=20 >provide services for a single enterprise strikes me as a VBI (Very Bad=20 >Idea). I can't see any real difficulty in having more than one=20 >authorized entity, each with it's own credentials. Who would have a=20 >problem? We're already agreeing that there are multiple credentials=20 >for a number, because the number gets delegated multiple times. =20 >Consider, just as an example, the BPO and the contracting enterprise=20 >that was actually delegated the number can both send calls from that=20 >number. You certainly don't want the enterprise giving out IT'S key to = >it's contractors. At best it's a key it authorizes to one or more of = it's BPOs. > >Brian > >On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy)=20 > >wrote: > >>=20 >> What Fernando is saying makes sense to me a desirable property of the = >>solution and I agree that if we gave each BPO a different private key = >>that would solve it but that might be pretty hard to mange in other=20 >>ways. I like the requirements but the solution is not 100% obvious to=20 >>me. >>=20 >>=20 >> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>=20 >>> Sure. >>>=20 >>> Each BPO would have a different private/public key pair. >>>=20 >>> So you can trace which one placed the call. >>>=20 >>> Brian >>>=20 >>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh)=20 >>> wrote: >>>=20 >>>> Point taken on PAI, but am still struggling with this BPO model. >>>>Apologies >>>> upfront if this is obvious and I'm just failing to understand. >>>>=20 >>>> If the company hires several BPOs and authorizes all of them to=20 >>>>sign calls on its behalf, is there a way to trace back the=20 >>>>originator (specific >>>>BPO) >>>> later on? I suppose that at some level the actual caller must be=20 >>>>exposed (perhaps to trace malicious activity, such as malicious=20 >>>>person infiltrated in an otherwise legitimate BPO). >>>>=20 >>>> Via headers would be the obvious pick, but they don't survive the=20 >>>>plethora of SBCs that the call is likely to transverse. Or maybe=20 >>>>the certs themselves can carry this type of data (actual caller=20 >>>>identity). >>>>=20 >>>>=20 >>>>=20 >>>>=20 >>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>=20 >>>>> Don't think that would work without related changes in the = networks. >>>>> In >>>>> some networks, PAI is used for called id. They would have to=20 >>>>>change to use From (if signed maybe). It also doesn't fit the=20 >>>>>definition of PAI. >>>>>=20 >>>>> Brian >>>>>=20 >>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh)=20 >>>>> wrote: >>>>>=20 >>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>"From" >>>>>> identifies the BPO, "PAI" the c >>>>>> ompany hiring the BPO - based on the delegation process Rosen=20 >>>>>>mentions. >>>>>> PAI's use is widespread, and it's main limitation is being=20 >>>>>>spoofable - but this is exactly the problem we are trying to=20 >>>>>>solve anyway. >>>>>>=20 >>>>>>=20 >>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey"=20 >>>>>>> >>>>>>> wrote: >>>>>>>=20 >>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>Behalf Of Alex Bobotek >>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; =20 >>>>>>>Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> +1 >>>>>>> I've assumed that we are headed towards a "sign whatever extras=20 >>>>>>> you wish, and indicate what your signature covers" mechanism. >>>>>>>=20 >>>>>>> Based on this, standards would need to identify only a minimal=20 >>>>>>>subset of what shall/should be signed, and ensure that any=20 >>>>>>>required group of signed items survives transit intact. >>>>>>>=20 >>>>>>> Best signing practices may be needed to complement the standard, = >>>>>>>and an appropriate place for all but the most basic 'what to=20 >>>>>>>sign' >>>>>>> recommendations. >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> Regards, >>>>>>>=20 >>>>>>> Alex >>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Henning Schulzrinne >>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>> To: Michael Hammer; fmousinh@cisco.com;=20 >>>>>>>>Gregory.Schumacher@sprint.com; >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I see no reason not to allow signing any number-related field=20 >>>>>>>>in the SIP request. (Signing may well be done by different=20 >>>>>>>>parties.) >>>>>>>>=20 >>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't=20 >>>>>>>>conveyable in legacy systems, however, so this may be of=20 >>>>>>>>somewhat limited use for a >>>>>>> while. >>>>>>>>=20 >>>>>>>> ________________________________________ >>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf=20 >>>>>>>> of Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com;=20 >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> Don't we still want to know the true originator of the call,=20 >>>>>>>>even when we have some token that says "Doctor so and so=20 >>>>>>>>approved this message." >>>>>>>>=20 >>>>>>>> Originating number, display number, and call-back number could=20 >>>>>>>>be >>>>>>>>3 >>>>>>>> different things. >>>>>>>> Should all of them be verifiable? >>>>>>>>=20 >>>>>>>> Mike >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Fernando Mousinho (fmousinh) >>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I believe the scenario telemarketing here is when a client=20 >>>>>>>>hires a BPO to place outbound calls, but expect customers to=20 >>>>>>>>return these calls to a different place (say, their own and=20 >>>>>>>>operated call center). This way, this client is authorizing=20 >>>>>>>>the BPO to use an identity that it >>>>>>>>(BPO) >>>>>>> doesn't own. >>>>>>>> These numbers in this scenario are always operational, just at=20 >>>>>>>> a different place. >>>>>>>>=20 >>>>>>>> The same telemarketing operator would then outpulse multiple=20 >>>>>>>>numbers for their multiple clients, none of these numbers=20 >>>>>>>>belonging to the >>>>>>> telemarketer. >>>>>>>> BTW, we are using the term "telemarketing" in a very generic=20 >>>>>>>>sense - this could just as easily be a public service=20 >>>>>>>>announcement, fundraiser, >>>>>>> etc. >>>>>>>>=20 >>>>>>>> If the telemarketer happens to own the inbound call center as=20 >>>>>>>>well, it very likely owns the number as well and this would=20 >>>>>>>>necessarily be a special case >>>>>>>> - it would fall under the same characteristics of any call = center. >>>>>>>>=20 >>>>>>>> On a different note, it would help a lot of we standardized=20 >>>>>>>> terminology. >>>>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it = may=20 >>>>>>>> be hard for others to follow the discussion later. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> (generic term for any type of outbound calling, including=20 >>>>>>>> public service announcement, so don't think it's all about=20 >>>>>>>> sales!) >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> There are some benefits from this approach, but also some=20 >>>>>>>>>scenarios that need clarification how they could function. >>>>>>>>>=20 >>>>>>>>> The benefit is that the credential represents both the company = =20 >>>>>>>>>"responsible" for the sales campaign (the "company" in your >>>>>>>>> scenario) >>>>>>>>> and the company operating the sales campaign (the call center=20 >>>>>>>>>in your scenario). For the use in forensics (after the fact=20 >>>>>>>>>analysis) such as pursuit of fraud investigation, we then can=20 >>>>>>>>>follow both paths. >>>>>>>>>=20 >>>>>>>>> However can you clarify the following - >>>>>>>>> - If a SP "signs" the call, is it attesting to the = "responsible" >>>>>>>>> party for the telemarketing call or the party executing the=20 >>>>>>>>> telemarketing campaign or both? >>>>>>>>>=20 >>>>>>>>> - How is the SP supposed to know all the parties that it is=20 >>>>>>>>> attesting to >>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>=20 >>>>>>>>> -It seems likely that some of the numbers assigned to a=20 >>>>>>>>>company in your scenario will not be assigned to real=20 >>>>>>>>>telephones (or call center >>>>>>>>> trunk) until a telemarketing campaign is initiated or a call=20 >>>>>>>>>center selected to execute the sales campaign, is it possible=20 >>>>>>>>>to have these unassigned or floating numbers when not in use=20 >>>>>>>>>for a telemarketing campaign? Is it allowed under most=20 >>>>>>>>>national numbering regimes? >>>>>>>>>=20 >>>>>>>>> - How important is it to have a known or recognized phone=20 >>>>>>>>>number as the caller id as part of a telemarketing campaign? =20 >>>>>>>>>I am assuming that not all campaigns care about having a=20 >>>>>>>>>number that is known or >>>>>>> recognized. >>>>>>>>>=20 >>>>>>>>> -In other words for this last bit, if a call center=20 >>>>>>>>>(telemarketing campaign operator) is using their own set of=20 >>>>>>>>>numbers but serve multiple simultaneous telemarketing=20 >>>>>>>>>campaigns using the same originating numbers, what will they=20 >>>>>>>>>sign? Will they just have a credential representing the call=20 >>>>>>>>>center alone, or a different credential per telemarketing=20 >>>>>>>>>campaign, or a different credential per responsible party (per = >>>>>>>>>client)? This will affect what is possible for >>>>>>> any forensic activity. >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>>Behalf Of Brian Rosen >>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>> To: Fernando Mousinho >>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>=20 >>>>>>>>> The notion we had is that the company contracting the call=20 >>>>>>>>>center approves the use, and the call center, or the SP acting = >>>>>>>>>on its behalf, signs. >>>>>>>>> Think of this as another level of delegation. An SP delegates = =20 >>>>>>>>>numbers to the company. The company "delegates" use of those =20 >>>>>>>>>numbers to the call center. The call center calls, using that = >>>>>>>>>delegation. >>>>>>>>> The credentials of the call center would be different from=20 >>>>>>>>>those of the company, but would cover the same number. Having = >>>>>>>>>multiple credentials covering the same number will be very=20 >>>>>>>>>common due to the way delegation happens. In order to allow=20 >>>>>>>>>SPs to sign, without creating credential per TN, we allow=20 >>>>>>>>>credentials with ranges. >>>>>>>>>The >>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>=20 >>>>>>>>> Consider the following complex US case: >>>>>>>>> The North American Number Plan Administrator delegates=20 >>>>>>>>>202-555-xxxx to the Pooling Administrator. The PA now has a=20 >>>>>>>>>credential covering the entire 10K block. >>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP=20 >>>>>>>>>A has a credential for the entire 1K block SP A resells=20 >>>>>>>>>202-555-12xx to SP B . >>>>>>>>> SP B has a credential for a 100 TN block SP B delegates=20 >>>>>>>>>202-555-123x to Company C. Company C has a credential for a=20 >>>>>>>>>10 number block Company C authorizes 202-555-1234 to BPO D. =20 >>>>>>>>>BPO D has credential for a 1 number block >>>>>>>>>=20 >>>>>>>>> NANPA and the PA never are in a call path, so they would never = >>>>>>>>>sign a call. >>>>>>>>>=20 >>>>>>>>> However, SP A or SP B could sign a call from either Company C=20 >>>>>>>>>or BPO D using the credential they have. >>>>>>>>>=20 >>>>>>>>> The SP for the call center could acquire credentials from the=20 >>>>>>>>>BPO and sign on its behalf. I suspect than many service=20 >>>>>>>>>providers would be reluctant to do so unless the numbers were=20 >>>>>>>>>from their own inventory (that is, the company got its numbers = >>>>>>>>>from the same SP as the call >>>>>>> center). >>>>>>>>> Since that won't be the common case, the call center probably=20 >>>>>>>>>has to do the signing itself. >>>>>>>>>=20 >>>>>>>>> Brian >>>>>>>>>=20 >>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs,=20 >>>>>>>>>>which provide services for other companies) may have special=20 >>>>>>>>>>arrangements with SPs, the majority (small to mid-size) will=20 >>>>>>>>>>probably rely on the SPs to do provide to vouch for their=20 >>>>>>>>>>identity. This would probably be the case for the home analog = >>>>>>>>>>caller anyway. This would imply that the "originating" SP's=20 >>>>>>>>>>willingness to provide this signature is a critical success=20 >>>>>>>>>>factor for the proposal's adoption. >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> But back to the business process outsourcers (BPO) case -=20 >>>>>>>>>>where a call center is providing service on behalf of=20 >>>>>>>>>>multiple companies. I can see the value of them sending=20 >>>>>>>>>>different numbers based on the clients they represent.=20 >>>>>>>>>>Wouldn't that create a billing issue though? >>>>>>>>>> This is not an area I understand well, but I would suspect=20 >>>>>>>>>>that SP >>>>>>>>>> 1 allowing one of its subscribers to send an outbound call=20 >>>>>>>>>>using a number registered to SP 2 could be a no-no. If this=20 >>>>>>>>>>hypothesis is correct, then we are back to the case where the = >>>>>>>>>>SP is signing all calls, >>>>>>>> even for BPOs. >>>>>>>>>>=20 >>>>>>>>>> Or maybe this is another problem we are trying to fix in the = >>>>>>>>>>working group, in which case we perhaps should state as a goal = >>>>>>>>>>or >>>>>>> benefit: >>>>>>>>>> "providing a reliable mechanism to let calls originated from=20 >>>>>>>>>> one >>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>=20 >>>>>>>>>> Fernando >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>> >>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> Any of them could do it. My guess is service providers will = >>>>>>>>>>>do it for most call centers, although larger call centers=20 >>>>>>>>>>>might do it themselves... >>>>>>>>>>> especially ones which have trunks from multiple providers=20 >>>>>>>>>>>and can source calls using the same number(s) out through=20 >>>>>>>>>>>multiple providers on a call-by-call basis. >>>>>>>>>>>=20 >>>>>>>>>>> -hadriel >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>> I'm catching up with the discussions in this working group, = >>>>>>>>>>>>and am trying to understand some architecture implications=20 >>>>>>>>>>>>in call centers (which is where my background is). It seems = >>>>>>>>>>>>that many of the problems we are trying to fix are related=20 >>>>>>>>>>>>to contact centers anyway, so it is probably a good idea to = >>>>>>>>>>>>have everyone in the same >>>>>>>> page. >>>>>>>>>>>>=20 >>>>>>>>>>>> Forgive me if it is an obvious question, but which=20 >>>>>>>>>>>>components in a "typical call center architecture" do you=20 >>>>>>>>>>>>see signature and verification taking place? Such "typical" = >>>>>>>>>>>>deployments have premises based equipment (PME), a session=20 >>>>>>>>>>>>border controller >>>>>>>>>>>>(SBC) >>>>>>>>>>>> and of course a SIP service provider all three could=20 >>>>>>>>>>>>potentially be used throughout the authorization process.=20 >>>>>>>>>>>>There are different ramifications depending on where your=20 >>>>>>>>>>>>mind is at. >>>>>>>>>>>>=20 >>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>> Cisco Systems >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> ________________________________ >>>>>>>>>=20 >>>>>>>>> This e-mail may contain Sprint proprietary information=20 >>>>>>>>>intended for the sole use of the recipient(s). Any use by=20 >>>>>>>>>others is prohibited. >>>>>>>>> If >>>>>>>>> you are not the intended recipient, please contact the sender=20 >>>>>>>>>and delete all copies of the message. >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>=20 >>>>=20 >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>=20 > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 16:59:38 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C915F11E8285 for ; Wed, 30 Oct 2013 16:59:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.321 X-Spam-Level: X-Spam-Status: No, score=-102.321 tagged_above=-999 required=5 tests=[AWL=-0.056, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F-hS8gDbzNjc for ; Wed, 30 Oct 2013 16:59:34 -0700 (PDT) Received: from oproxy13-pub.mail.unifiedlayer.com (oproxy13-pub.mail.unifiedlayer.com [69.89.16.30]) by ietfa.amsl.com (Postfix) with SMTP id 902F211E81B1 for ; Wed, 30 Oct 2013 16:59:28 -0700 (PDT) Received: (qmail 29484 invoked by uid 0); 30 Oct 2013 18:32:27 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy13.mail.unifiedlayer.com with SMTP; 30 Oct 2013 18:32:27 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=D+9DwneMdmbBT1A65npOlWgax2CoZ7nVhRfulDNtWtE=; b=Z5ytOWGcHBP7qicwb5j2QnKHXjC/g2F1fm/SkLUj/0w4ihErEu+xfr/OB0/6HHz3sdfVGgdLfmtVL0lKjOqRIYgZ2/f0vxFvofdLRWURp768//96QuYQ1QT3MvvTy1YI; Received: from [173.79.179.104] (port=53497 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbaZ8-0006l6-KY for stir@ietf.org; Wed, 30 Oct 2013 12:32:27 -0600 From: "Richard Shockey" To: References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net> In-Reply-To: Date: Wed, 30 Oct 2013 14:32:25 -0400 Message-ID: <020001ced59e$621addc0$26509940$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="iso-8859-2" Content-Transfer-Encoding: quoted-printable X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQLC46Egqaoyw2i6zUEn13TyfC6DWZgkHKig Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] Application servers - Re: Call Center Implications X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 30 Oct 2013 23:59:38 -0000 Dan great post. I couldn't agree more. There needs to be some rules = here. Some may be regulatory some may be technical. First the voice application service providers need to provide the terminating CUA, "an accurate and truthful" Caller-ID for the call even = if it is originated from a source that is not directly associated with the business entity for whom the call is being made. That could be an 800 number for instance but I won't bore you with the issues with SMS800 RESPORGS. If the originating UA can prove/assert it is legally authorized to use = such an identity on behalf of a customer then that is step one. The = presumption after that is there is some contractual obligation between the service provider and the network about the use of such identities. The network = can then "validate" such an assertion.=20 There is something larger here to consider. Though the focus of STIR is validation of a Caller-ID number at some point the RAI area should take = a look at the other side of the coin so to speak. =20 CNAM. That is NOT something STIR can do but I do believe there is an emerging requirement that under some cases the calling party wants to or should provide more substantive information about themselves to the = called party and frankly 15 character ASCII is not enough. Consumers or = businesses should be able to see more complete and validated information about the session in order to make an better and informed decision on whether to accept the 'call' or not. Regulators may want to require telemarketing firms to display NG CNAM or CNAM + like data as a condition of doing business. All of the examples you cite are excellent examples where such verbose calling party identification could be displayed. I certainly want to = answer a call from my doctor on my test results just as I wish to ignore a call from Bill Clinton begging me to vote in the Virginia Governors election = next Tuesday. This is a case where annominity is not a good idea.=20 All you need now is a little standardization. Technically this should is very easy to understand in SIP. It would probably a reasonable modification of the Call INFO header in SIP with something like a XML based VCARD or JCARD URI whatever and probably 3GPP would need to look at how such data is displayed on the mobile VoLTE handsets. The network operators would have to understand not to modify = the contents of such a URI and its source validated but that is a task for another day.=20 -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of = Dan York Sent: Tuesday, October 29, 2013 5:10 PM To: Brian Rosen; Cullen Jennings Cc: Gregory.Schumacher@sprint.com; Richard Shockey; stir@ietf.org; = Fernando Mousinho (fmousinh); Alex Bobotek; Michael Hammer; Henning Schulzrinne Subject: [stir] Application servers - Re: Call Center Implications Getting caught up on some of the STIR discussions, I'd just note that = when we talk about "call centers" or "BPOs" we also need to remember that = we're not only talking about "traditional" call centers but also what I'll = call "voice application service providers". They are generally automated platforms running applications that a company uses for some kind of = outbound service. Examples include: - calling everyone in a school district with a weather-related = cancellation (or, unfortunately, a school shooting or similar event) - calling patients to provide reminders of appointments or notifications = of subscriptions available - calling customers to let them know that a package was delivered or = could be picked up, etc. - calling people scheduled for a flight to let know they are going to be delayed - calling members of an organization with an automated survey about = current issues - performing a call-back to provide an additional layer of = authentication for some service There is a large (and growing) market for these kind of automated tools = and services and the distinction between these calls and "robocalls" is = really only one of intent and the fact that the recipient has "opted in" through some kind of system. Generally, though, many of the companies want the application to appear = as if it is coming from their own phone number in the same way that they = want an outbound call center to appear as if it is coming from one of their = own phone numbers. You could think of these in the same way as "call centers", but I point = this out because some of these new services are very automated and there are always new startups now emerging in this space. Some of them are very "self-service" where the customer does it all while others have teams of people involved. Some of the companies involved include Nuance, = Microsoft Tellme, Voxeo (now Aspect, and also my former employer), Tropo, Twilio, Convergys and many more[1]. If STIR is to succeed, these kind of application platforms will also = need to be able to make calls on behalf of the companies using those platforms. Dan [1] One report about this market: http://www.voxeo.com/pdf/OvumDecisionMatrix-2011.pdf -- Dan York Senior Content Strategist, Internet Society york@isoc.org +1-802-735-1624 Jabber: york@jabber.isoc.org Skype: danyork http://twitter.com/danyork http://www.internetsociety.org/deploy360/ On 10/21/13 9:15 AM, "Brian Rosen" wrote: >We really need to give each BPO different keys I think. The notion = that >we are sharing private keys among multiple competing entities who=20 >provide services for a single enterprise strikes me as a VBI (Very Bad=20 >Idea). I can't see any real difficulty in having more than one=20 >authorized entity, each with it's own credentials. Who would have a=20 >problem? We're already agreeing that there are multiple credentials=20 >for a number, because the number gets delegated multiple times. =20 >Consider, just as an example, the BPO and the contracting enterprise=20 >that was actually delegated the number can both send calls from that=20 >number. You certainly don't want the enterprise giving out IT'S key to = >it's contractors. At best it's a key it authorizes to one or more of = it's BPOs. > >Brian > >On Oct 20, 2013, at 1:12 AM, Cullen Jennings (fluffy)=20 > >wrote: > >>=20 >> What Fernando is saying makes sense to me a desirable property of the = >>solution and I agree that if we gave each BPO a different private key = >>that would solve it but that might be pretty hard to mange in other=20 >>ways. I like the requirements but the solution is not 100% obvious to=20 >>me. >>=20 >>=20 >> On Oct 2, 2013, at 10:27 AM, Brian Rosen wrote: >>=20 >>> Sure. >>>=20 >>> Each BPO would have a different private/public key pair. >>>=20 >>> So you can trace which one placed the call. >>>=20 >>> Brian >>>=20 >>> On Oct 2, 2013, at 12:59 PM, Fernando Mousinho (fmousinh)=20 >>> wrote: >>>=20 >>>> Point taken on PAI, but am still struggling with this BPO model. >>>>Apologies >>>> upfront if this is obvious and I'm just failing to understand. >>>>=20 >>>> If the company hires several BPOs and authorizes all of them to=20 >>>>sign calls on its behalf, is there a way to trace back the=20 >>>>originator (specific >>>>BPO) >>>> later on? I suppose that at some level the actual caller must be=20 >>>>exposed (perhaps to trace malicious activity, such as malicious=20 >>>>person infiltrated in an otherwise legitimate BPO). >>>>=20 >>>> Via headers would be the obvious pick, but they don't survive the=20 >>>>plethora of SBCs that the call is likely to transverse. Or maybe=20 >>>>the certs themselves can carry this type of data (actual caller=20 >>>>identity). >>>>=20 >>>>=20 >>>>=20 >>>>=20 >>>> On 9/19/13 9:43 PM, "Brian Rosen" wrote: >>>>=20 >>>>> Don't think that would work without related changes in the = networks. >>>>> In >>>>> some networks, PAI is used for called id. They would have to=20 >>>>>change to use From (if signed maybe). It also doesn't fit the=20 >>>>>definition of PAI. >>>>>=20 >>>>> Brian >>>>>=20 >>>>> On Sep 19, 2013, at 9:14 PM, Fernando Mousinho (fmousinh)=20 >>>>> wrote: >>>>>=20 >>>>>> Could a signed PAI be a potential solution to the BPO use case? >>>>>>"From" >>>>>> identifies the BPO, "PAI" the c >>>>>> ompany hiring the BPO - based on the delegation process Rosen=20 >>>>>>mentions. >>>>>> PAI's use is widespread, and it's main limitation is being=20 >>>>>>spoofable - but this is exactly the problem we are trying to=20 >>>>>>solve anyway. >>>>>>=20 >>>>>>=20 >>>>>>> On Sep 19, 2013, at 5:39 PM, "Richard Shockey"=20 >>>>>>> >>>>>>> wrote: >>>>>>>=20 >>>>>>> Excellent point a profile or BCP to complement the work. >>>>>>>=20 >>>>>>> -----Original Message----- >>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>Behalf Of Alex Bobotek >>>>>>> Sent: Thursday, September 19, 2013 5:27 PM >>>>>>> To: Henning Schulzrinne; Michael Hammer; fmousinh@cisco.com; =20 >>>>>>>Gregory.Schumacher@sprint.com; br@brianrosen.net >>>>>>> Cc: stir@ietf.org >>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>=20 >>>>>>> +1 >>>>>>> I've assumed that we are headed towards a "sign whatever extras=20 >>>>>>> you wish, and indicate what your signature covers" mechanism. >>>>>>>=20 >>>>>>> Based on this, standards would need to identify only a minimal=20 >>>>>>>subset of what shall/should be signed, and ensure that any=20 >>>>>>>required group of signed items survives transit intact. >>>>>>>=20 >>>>>>> Best signing practices may be needed to complement the standard, = >>>>>>>and an appropriate place for all but the most basic 'what to=20 >>>>>>>sign' >>>>>>> recommendations. >>>>>>>=20 >>>>>>>=20 >>>>>>>=20 >>>>>>> Regards, >>>>>>>=20 >>>>>>> Alex >>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Henning Schulzrinne >>>>>>>> Sent: Thursday, September 19, 2013 2:24 PM >>>>>>>> To: Michael Hammer; fmousinh@cisco.com;=20 >>>>>>>>Gregory.Schumacher@sprint.com; >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I see no reason not to allow signing any number-related field=20 >>>>>>>>in the SIP request. (Signing may well be done by different=20 >>>>>>>>parties.) >>>>>>>>=20 >>>>>>>> As far as I know, callback numbers (SIP Reply-To) aren't=20 >>>>>>>>conveyable in legacy systems, however, so this may be of=20 >>>>>>>>somewhat limited use for a >>>>>>> while. >>>>>>>>=20 >>>>>>>> ________________________________________ >>>>>>>> From: stir-bounces@ietf.org [stir-bounces@ietf.org] on behalf=20 >>>>>>>> of Michael Hammer [michael.hammer@yaanatech.com] >>>>>>>> Sent: Thursday, September 19, 2013 4:34 PM >>>>>>>> To: fmousinh@cisco.com; Gregory.Schumacher@sprint.com;=20 >>>>>>>> br@brianrosen.net >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> Don't we still want to know the true originator of the call,=20 >>>>>>>>even when we have some token that says "Doctor so and so=20 >>>>>>>>approved this message." >>>>>>>>=20 >>>>>>>> Originating number, display number, and call-back number could=20 >>>>>>>>be >>>>>>>>3 >>>>>>>> different things. >>>>>>>> Should all of them be verifiable? >>>>>>>>=20 >>>>>>>> Mike >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> -----Original Message----- >>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>Behalf Of Fernando Mousinho (fmousinh) >>>>>>>> Sent: Thursday, September 19, 2013 4:00 PM >>>>>>>> To: Schumacher, Gregory [CTO]; Brian Rosen >>>>>>>> Cc: stir@ietf.org >>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>=20 >>>>>>>> I believe the scenario telemarketing here is when a client=20 >>>>>>>>hires a BPO to place outbound calls, but expect customers to=20 >>>>>>>>return these calls to a different place (say, their own and=20 >>>>>>>>operated call center). This way, this client is authorizing=20 >>>>>>>>the BPO to use an identity that it >>>>>>>>(BPO) >>>>>>> doesn't own. >>>>>>>> These numbers in this scenario are always operational, just at=20 >>>>>>>> a different place. >>>>>>>>=20 >>>>>>>> The same telemarketing operator would then outpulse multiple=20 >>>>>>>>numbers for their multiple clients, none of these numbers=20 >>>>>>>>belonging to the >>>>>>> telemarketer. >>>>>>>> BTW, we are using the term "telemarketing" in a very generic=20 >>>>>>>>sense - this could just as easily be a public service=20 >>>>>>>>announcement, fundraiser, >>>>>>> etc. >>>>>>>>=20 >>>>>>>> If the telemarketer happens to own the inbound call center as=20 >>>>>>>>well, it very likely owns the number as well and this would=20 >>>>>>>>necessarily be a special case >>>>>>>> - it would fall under the same characteristics of any call = center. >>>>>>>>=20 >>>>>>>> On a different note, it would help a lot of we standardized=20 >>>>>>>> terminology. >>>>>>>> Telemarketing, BPO, call center, end customer, clients=A9 it = may=20 >>>>>>>> be hard for others to follow the discussion later. >>>>>>>>=20 >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> (generic term for any type of outbound calling, including=20 >>>>>>>> public service announcement, so don't think it's all about=20 >>>>>>>> sales!) >>>>>>>>=20 >>>>>>>>=20 >>>>>>>> On 9/19/13 3:22 PM, "Schumacher, Gregory [CTO]" >>>>>>>> wrote: >>>>>>>>=20 >>>>>>>>> There are some benefits from this approach, but also some=20 >>>>>>>>>scenarios that need clarification how they could function. >>>>>>>>>=20 >>>>>>>>> The benefit is that the credential represents both the company = =20 >>>>>>>>>"responsible" for the sales campaign (the "company" in your >>>>>>>>> scenario) >>>>>>>>> and the company operating the sales campaign (the call center=20 >>>>>>>>>in your scenario). For the use in forensics (after the fact=20 >>>>>>>>>analysis) such as pursuit of fraud investigation, we then can=20 >>>>>>>>>follow both paths. >>>>>>>>>=20 >>>>>>>>> However can you clarify the following - >>>>>>>>> - If a SP "signs" the call, is it attesting to the = "responsible" >>>>>>>>> party for the telemarketing call or the party executing the=20 >>>>>>>>> telemarketing campaign or both? >>>>>>>>>=20 >>>>>>>>> - How is the SP supposed to know all the parties that it is=20 >>>>>>>>> attesting to >>>>>>>>> - the responsible party and/or executing party? >>>>>>>>>=20 >>>>>>>>> -It seems likely that some of the numbers assigned to a=20 >>>>>>>>>company in your scenario will not be assigned to real=20 >>>>>>>>>telephones (or call center >>>>>>>>> trunk) until a telemarketing campaign is initiated or a call=20 >>>>>>>>>center selected to execute the sales campaign, is it possible=20 >>>>>>>>>to have these unassigned or floating numbers when not in use=20 >>>>>>>>>for a telemarketing campaign? Is it allowed under most=20 >>>>>>>>>national numbering regimes? >>>>>>>>>=20 >>>>>>>>> - How important is it to have a known or recognized phone=20 >>>>>>>>>number as the caller id as part of a telemarketing campaign? =20 >>>>>>>>>I am assuming that not all campaigns care about having a=20 >>>>>>>>>number that is known or >>>>>>> recognized. >>>>>>>>>=20 >>>>>>>>> -In other words for this last bit, if a call center=20 >>>>>>>>>(telemarketing campaign operator) is using their own set of=20 >>>>>>>>>numbers but serve multiple simultaneous telemarketing=20 >>>>>>>>>campaigns using the same originating numbers, what will they=20 >>>>>>>>>sign? Will they just have a credential representing the call=20 >>>>>>>>>center alone, or a different credential per telemarketing=20 >>>>>>>>>campaign, or a different credential per responsible party (per = >>>>>>>>>client)? This will affect what is possible for >>>>>>> any forensic activity. >>>>>>>>>=20 >>>>>>>>> -----Original Message----- >>>>>>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On=20 >>>>>>>>>Behalf Of Brian Rosen >>>>>>>>> Sent: Tuesday, September 17, 2013 9:44 AM >>>>>>>>> To: Fernando Mousinho >>>>>>>>> Cc: stir@ietf.org; Hadriel Kaplan >>>>>>>>> Subject: Re: [stir] Call Center Implications >>>>>>>>>=20 >>>>>>>>> We have a requirement to support the BPO use case. >>>>>>>>>=20 >>>>>>>>> The notion we had is that the company contracting the call=20 >>>>>>>>>center approves the use, and the call center, or the SP acting = >>>>>>>>>on its behalf, signs. >>>>>>>>> Think of this as another level of delegation. An SP delegates = =20 >>>>>>>>>numbers to the company. The company "delegates" use of those =20 >>>>>>>>>numbers to the call center. The call center calls, using that = >>>>>>>>>delegation. >>>>>>>>> The credentials of the call center would be different from=20 >>>>>>>>>those of the company, but would cover the same number. Having = >>>>>>>>>multiple credentials covering the same number will be very=20 >>>>>>>>>common due to the way delegation happens. In order to allow=20 >>>>>>>>>SPs to sign, without creating credential per TN, we allow=20 >>>>>>>>>credentials with ranges. >>>>>>>>>The >>>>>>>>> ranges could overlap when delegation happens. >>>>>>>>>=20 >>>>>>>>> Consider the following complex US case: >>>>>>>>> The North American Number Plan Administrator delegates=20 >>>>>>>>>202-555-xxxx to the Pooling Administrator. The PA now has a=20 >>>>>>>>>credential covering the entire 10K block. >>>>>>>>> The Pooling Administrator delegates 202-555-1xxx to SP A. SP=20 >>>>>>>>>A has a credential for the entire 1K block SP A resells=20 >>>>>>>>>202-555-12xx to SP B . >>>>>>>>> SP B has a credential for a 100 TN block SP B delegates=20 >>>>>>>>>202-555-123x to Company C. Company C has a credential for a=20 >>>>>>>>>10 number block Company C authorizes 202-555-1234 to BPO D. =20 >>>>>>>>>BPO D has credential for a 1 number block >>>>>>>>>=20 >>>>>>>>> NANPA and the PA never are in a call path, so they would never = >>>>>>>>>sign a call. >>>>>>>>>=20 >>>>>>>>> However, SP A or SP B could sign a call from either Company C=20 >>>>>>>>>or BPO D using the credential they have. >>>>>>>>>=20 >>>>>>>>> The SP for the call center could acquire credentials from the=20 >>>>>>>>>BPO and sign on its behalf. I suspect than many service=20 >>>>>>>>>providers would be reluctant to do so unless the numbers were=20 >>>>>>>>>from their own inventory (that is, the company got its numbers = >>>>>>>>>from the same SP as the call >>>>>>> center). >>>>>>>>> Since that won't be the common case, the call center probably=20 >>>>>>>>>has to do the signing itself. >>>>>>>>>=20 >>>>>>>>> Brian >>>>>>>>>=20 >>>>>>>>> On Sep 17, 2013, at 8:46 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>> wrote: >>>>>>>>>=20 >>>>>>>>>> I agree, Hadriel. While large call centers (including BPOs,=20 >>>>>>>>>>which provide services for other companies) may have special=20 >>>>>>>>>>arrangements with SPs, the majority (small to mid-size) will=20 >>>>>>>>>>probably rely on the SPs to do provide to vouch for their=20 >>>>>>>>>>identity. This would probably be the case for the home analog = >>>>>>>>>>caller anyway. This would imply that the "originating" SP's=20 >>>>>>>>>>willingness to provide this signature is a critical success=20 >>>>>>>>>>factor for the proposal's adoption. >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> But back to the business process outsourcers (BPO) case -=20 >>>>>>>>>>where a call center is providing service on behalf of=20 >>>>>>>>>>multiple companies. I can see the value of them sending=20 >>>>>>>>>>different numbers based on the clients they represent.=20 >>>>>>>>>>Wouldn't that create a billing issue though? >>>>>>>>>> This is not an area I understand well, but I would suspect=20 >>>>>>>>>>that SP >>>>>>>>>> 1 allowing one of its subscribers to send an outbound call=20 >>>>>>>>>>using a number registered to SP 2 could be a no-no. If this=20 >>>>>>>>>>hypothesis is correct, then we are back to the case where the = >>>>>>>>>>SP is signing all calls, >>>>>>>> even for BPOs. >>>>>>>>>>=20 >>>>>>>>>> Or maybe this is another problem we are trying to fix in the = >>>>>>>>>>working group, in which case we perhaps should state as a goal = >>>>>>>>>>or >>>>>>> benefit: >>>>>>>>>> "providing a reliable mechanism to let calls originated from=20 >>>>>>>>>> one >>>>>>>>>> SP1 to outpulse numbers that belong to another". >>>>>>>>>>=20 >>>>>>>>>> Fernando >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>>=20 >>>>>>>>>> On 9/16/13 12:12 PM, "Hadriel Kaplan" >>>>>>>>>> >>>>>>>> wrote: >>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> Any of them could do it. My guess is service providers will = >>>>>>>>>>>do it for most call centers, although larger call centers=20 >>>>>>>>>>>might do it themselves... >>>>>>>>>>> especially ones which have trunks from multiple providers=20 >>>>>>>>>>>and can source calls using the same number(s) out through=20 >>>>>>>>>>>multiple providers on a call-by-call basis. >>>>>>>>>>>=20 >>>>>>>>>>> -hadriel >>>>>>>>>>>=20 >>>>>>>>>>>=20 >>>>>>>>>>> On Sep 16, 2013, at 9:49 AM, Fernando Mousinho (fmousinh)=20 >>>>>>>>>>> wrote: >>>>>>>>>>>=20 >>>>>>>>>>>> I'm catching up with the discussions in this working group, = >>>>>>>>>>>>and am trying to understand some architecture implications=20 >>>>>>>>>>>>in call centers (which is where my background is). It seems = >>>>>>>>>>>>that many of the problems we are trying to fix are related=20 >>>>>>>>>>>>to contact centers anyway, so it is probably a good idea to = >>>>>>>>>>>>have everyone in the same >>>>>>>> page. >>>>>>>>>>>>=20 >>>>>>>>>>>> Forgive me if it is an obvious question, but which=20 >>>>>>>>>>>>components in a "typical call center architecture" do you=20 >>>>>>>>>>>>see signature and verification taking place? Such "typical" = >>>>>>>>>>>>deployments have premises based equipment (PME), a session=20 >>>>>>>>>>>>border controller >>>>>>>>>>>>(SBC) >>>>>>>>>>>> and of course a SIP service provider all three could=20 >>>>>>>>>>>>potentially be used throughout the authorization process.=20 >>>>>>>>>>>>There are different ramifications depending on where your=20 >>>>>>>>>>>>mind is at. >>>>>>>>>>>>=20 >>>>>>>>>>>> Fernando Mousinho >>>>>>>>>>>> Cisco Systems >>>>>>>>>>=20 >>>>>>>>>> _______________________________________________ >>>>>>>>>> stir mailing list >>>>>>>>>> stir@ietf.org >>>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>>=20 >>>>>>>>>=20 >>>>>>>>> ________________________________ >>>>>>>>>=20 >>>>>>>>> This e-mail may contain Sprint proprietary information=20 >>>>>>>>>intended for the sole use of the recipient(s). Any use by=20 >>>>>>>>>others is prohibited. >>>>>>>>> If >>>>>>>>> you are not the intended recipient, please contact the sender=20 >>>>>>>>>and delete all copies of the message. >>>>>>>>>=20 >>>>>>>>> _______________________________________________ >>>>>>>>> stir mailing list >>>>>>>>> stir@ietf.org >>>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>>=20 >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>> _______________________________________________ >>>>>>>> stir mailing list >>>>>>>> stir@ietf.org >>>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>> _______________________________________________ >>>>>>> stir mailing list >>>>>>> stir@ietf.org >>>>>>> https://www.ietf.org/mailman/listinfo/stir >>>>>>>=20 >>>>>=20 >>>>=20 >>>=20 >>> _______________________________________________ >>> stir mailing list >>> stir@ietf.org >>> https://www.ietf.org/mailman/listinfo/stir >>=20 > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 17:02:46 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 27E9521E80A8 for ; Wed, 30 Oct 2013 17:02:46 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.313 X-Spam-Level: X-Spam-Status: No, score=-102.313 tagged_above=-999 required=5 tests=[AWL=-0.048, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IJEP1b35NEMJ for ; Wed, 30 Oct 2013 17:02:41 -0700 (PDT) Received: from oproxy13-pub.mail.unifiedlayer.com (oproxy13-pub.mail.unifiedlayer.com [69.89.16.30]) by ietfa.amsl.com (Postfix) with SMTP id 4126321E8094 for ; Wed, 30 Oct 2013 17:02:41 -0700 (PDT) Received: (qmail 7281 invoked by uid 0); 30 Oct 2013 16:55:40 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy13.mail.unifiedlayer.com with SMTP; 30 Oct 2013 16:55:40 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=n82R6Tb3g9y+mN8HpinxE/xeLdsEAwSNEH+QMzxw4vI=; b=L2x4sNMEcp41D74dkIrkQuWCS8NEj9Mh00FRa9Ao38jEKSrKypK8TeoAcxWS2kijFbOj0Px8cAcLLbFmTI3reAVtDrDHh8w81D63coREHp03qqiArR12eiP4ag3PVbdO; Received: from [173.79.179.104] (port=52103 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbZ3Q-0004xx-Ne for stir@ietf.org; Wed, 30 Oct 2013 10:55:36 -0600 From: "Richard Shockey" To: References: <52711E0B.50901@bbn.com> In-Reply-To: <52711E0B.50901@bbn.com> Date: Wed, 30 Oct 2013 12:55:32 -0400 Message-ID: <018e01ced590$db278410$91768c30$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQJa7YDgvZQIG5WhCjUrB/W2+dsu3Jj1ML7Q Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 00:02:46 -0000 +1 -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Stephen Kent Sent: Wednesday, October 30, 2013 10:56 AM To: stir@ietf.org Subject: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, Cullen and Eric: In reading this doc I noted that it devotes a lot of text to describing support for what seems to be AoR-style SIP IDs, rather than just the TEL SIP ID. I thought that the WG had decided to put off discussion of the former, and focus only on the latter ID type, initially. By trying to make this doc incorporate both types of IDs it seems to dilute the focus, and make for a much more complex discussion. Steve _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 17:31:33 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EB7CE11E81B5 for ; Wed, 30 Oct 2013 17:31:33 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.307 X-Spam-Level: X-Spam-Status: No, score=-102.307 tagged_above=-999 required=5 tests=[AWL=-0.042, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IT20mqahrQ5S for ; Wed, 30 Oct 2013 17:31:29 -0700 (PDT) Received: from oproxy9-pub.mail.unifiedlayer.com (oproxy9-pub.mail.unifiedlayer.com [69.89.24.6]) by ietfa.amsl.com (Postfix) with SMTP id C6EA011E82E1 for ; Wed, 30 Oct 2013 17:31:24 -0700 (PDT) Received: (qmail 8213 invoked by uid 0); 30 Oct 2013 19:03:42 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy9.mail.unifiedlayer.com with SMTP; 30 Oct 2013 19:03:42 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=m4y8y2C6gsxZnbVnZd1ak5a3cIepdtUJbc+ZQamXk4k=; b=RxVdK7rGVTVprs6RL/NAMxxQ6OrMRN9yUk0ZDt1jf7Hxy0YxbQqr4ldW4bd+jc4NVgmjA4nlM0DAeQ8yqL23DCko5SybbzbPglt7ggsB0MNrOyMq12Sah8IKr2kFk9nM; Received: from [173.79.179.104] (port=53577 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1Vbb3O-0005VH-89; Wed, 30 Oct 2013 13:03:42 -0600 From: "Richard Shockey" To: "'Peterson, Jon'" , References: <01fa01ced59d$97436040$c5ca20c0$@shockey.us> In-Reply-To: Date: Wed, 30 Oct 2013 15:03:41 -0400 Message-ID: <023b01ced5a2$c00d04e0$40270ea0$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQJJY7V7l5ksJ/7+PHgCdk2zVBQEwpkYfbSQ Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 00:31:34 -0000 Well we will just have to agree to disagree here. Personally I think keeping text on non-TN identifiers AT THIS TIME is a distraction. -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Peterson, Jon Sent: Wednesday, October 30, 2013 2:48 PM To: Richard Shockey; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 No disagreement that telephone numbers are the immediate problem, but it isn't trivially easy to decouple the work on non-TN identifiers, it isn't clear how much new work on non-TN identifiers needs to be done beyond what RFC4474 already did, and it certainly isn't just rfc4474bis in this WG that proposes to address both: strikes-out does as well (see section 4.1 of that draft, say). I think we'll find that any solution we build for this is going to be able to address non-TN identifiers too, and I think it would be a tough sell to argue that we should delete any such text, as necessarily any verifier is going to have to look at a From header field value and ascertain whether it contains a TN or not. Once you've gone that far down the path, if the signature verification is the same, and the credential acquisition potentially the same as well, it's just not going to save us any effort to keep non-TN identifiers out of these drafts. Jon Peterson Neustar, Inc. On 10/30/13 11:26 AM, "Richard Shockey" wrote: > >I would put it more succinctly ... can we just fix one thing at a time. >We >should not preclude the use of alternative identifiers in the future >but the immediate problem is telephone numbers. > >-----Original Message----- >From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >Stephen Kent >Sent: Wednesday, October 30, 2013 12:57 PM >To: Peterson, Jon; stir@ietf.org >Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 > >Jon, > >My concern is that we seem to understand how one can manage >authorization for telephone numbers as IDs, in a fashion that does not >go down the path of the browser PKI, and all its problems. If the names >for which we vouch are scoped by DNS, and if we use DANE, I am >comfortable with that too. But, if we have to make this discussion very >abstract, in order to accommodate caller ID models that do not derive >from authoritative ID sources, then I am very worried. > >Frankly, as a security guy, I was getting lost in the discussion, but >maybe that's a presentation/exposition issue more than a technical >issue. > >Steve > > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Wed Oct 30 17:33:51 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 92A4811E81D9 for ; Wed, 30 Oct 2013 17:33:51 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.302 X-Spam-Level: X-Spam-Status: No, score=-102.302 tagged_above=-999 required=5 tests=[AWL=-0.037, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aBDJw9Z-07CI for ; Wed, 30 Oct 2013 17:33:46 -0700 (PDT) Received: from oproxy13-pub.mail.unifiedlayer.com (oproxy13-pub.mail.unifiedlayer.com [69.89.16.30]) by ietfa.amsl.com (Postfix) with SMTP id EDC1921E809B for ; Wed, 30 Oct 2013 17:33:33 -0700 (PDT) Received: (qmail 32065 invoked by uid 0); 30 Oct 2013 17:26:31 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy13.mail.unifiedlayer.com with SMTP; 30 Oct 2013 17:26:31 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=uQFDXS7JV+V73SGq6e85v0E28ynjn8VI4l1Srtz0XRw=; b=EGSWrBSSzlVP8/zmnDsCwAN1cxSUHbwCBycygBxHnqT/qGTzT5KPsxSyhqUm601gLiwCeUPOJFtwNNnO4E0I93xhfaFkdQAMLST+cu9aHpG1SPCIbG/fv3jOdIOxXaOt; Received: from [173.79.179.104] (port=53316 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbZXK-0004cX-KY; Wed, 30 Oct 2013 11:26:30 -0600 From: "Richard Shockey" To: "'Stephen Kent'" , "'Peterson, Jon'" , References: <52713A5D.3090601@bbn.com> In-Reply-To: <52713A5D.3090601@bbn.com> Date: Wed, 30 Oct 2013 13:26:29 -0400 Message-ID: <01aa01ced595$2c274ea0$8475ebe0$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQJ9u5bFtPZZaok737EQ6xixEMn6NwIjHR0amJ6ZvHA= Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 00:33:51 -0000 I would put it more succinctly ... can we just fix one thing at a time. We should not preclude the use of alternative identifiers in the future but the immediate problem is telephone numbers. -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Stephen Kent Sent: Wednesday, October 30, 2013 12:57 PM To: Peterson, Jon; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, My concern is that we seem to understand how one can manage authorization for telephone numbers as IDs, in a fashion that does not go down the path of the browser PKI, and all its problems. If the names for which we vouch are scoped by DNS, and if we use DANE, I am comfortable with that too. But, if we have to make this discussion very abstract, in order to accommodate caller ID models that do not derive from authoritative ID sources, then I am very worried. Frankly, as a security guy, I was getting lost in the discussion, but maybe that's a presentation/exposition issue more than a technical issue. Steve _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From md3135@att.com Wed Oct 30 17:35:41 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 548E811E82E3 for ; Wed, 30 Oct 2013 17:35:41 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -4.772 X-Spam-Level: X-Spam-Status: No, score=-4.772 tagged_above=-999 required=5 tests=[AWL=1.827, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tnJRy1YoHlsi for ; Wed, 30 Oct 2013 17:35:33 -0700 (PDT) Received: from nbfkord-smmo05.seg.att.com (nbfkord-smmo05.seg.att.com [209.65.160.92]) by ietfa.amsl.com (Postfix) with ESMTP id 3F79811E8295 for ; Wed, 30 Oct 2013 17:35:26 -0700 (PDT) Received: from unknown [144.160.229.24] (EHLO alpi155.enaf.aldc.att.com) by nbfkord-smmo05.seg.att.com(mxl_mta-6.15.0-1) over TLS secured channel with ESMTP id 8c5a1725.0.531555.00-476.1505173.nbfkord-smmo05.seg.att.com (envelope-from ); Thu, 31 Oct 2013 00:35:26 +0000 (UTC) X-MXL-Hash: 5271a5ce599063bd-681c825045cd64d0570f4648eb73ece7b4a1bb71 Received: from enaf.aldc.att.com (localhost [127.0.0.1]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id r9V0ZKIs001695; Wed, 30 Oct 2013 20:35:20 -0400 Received: from mlpi408.sfdc.sbc.com (mlpi408.sfdc.sbc.com [130.9.128.240]) by alpi155.enaf.aldc.att.com (8.14.5/8.14.5) with ESMTP id r9V0ZEIp001673 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Wed, 30 Oct 2013 20:35:18 -0400 Received: from MISOUT7MSGHUB9F.ITServices.sbc.com (MISOUT7MSGHUB9F.itservices.sbc.com [144.151.223.71]) by mlpi408.sfdc.sbc.com (RSA Interceptor); Thu, 31 Oct 2013 00:35:07 GMT Received: from MISOUT7MSGUSR9I.ITServices.sbc.com ([144.151.223.56]) by MISOUT7MSGHUB9F.ITServices.sbc.com ([144.151.223.71]) with mapi id 14.03.0158.001; Wed, 30 Oct 2013 20:35:07 -0400 From: "DOLLY, MARTIN C" To: Richard Shockey Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQJ9u5bFy39cKRpA40uHN/L9rrP0UAIjHR0amJ6ZvHCAAFpFAIAABHWAgAAZitE= Date: Thu, 31 Oct 2013 00:35:06 +0000 Message-ID: <2B78E831-B98C-4847-B2EB-D6910DBB3A49@att.com> References: <01fa01ced59d$97436040$c5ca20c0$@shockey.us> , <023b01ced5a2$c00d04e0$40270ea0$@shockey.us> In-Reply-To: <023b01ced5a2$c00d04e0$40270ea0$@shockey.us> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-RSA-Inspected: yes X-RSA-Classifications: public X-Spam: [F=0.2000000000; CM=0.500; S=0.200(2010122901)] X-MAIL-FROM: X-SOURCE-IP: [144.160.229.24] X-AnalysisOut: [v=2.0 cv=HdWjuF48 c=1 sm=0 a=dhB6nF3YHL5t/Ixux6cINA==:17 a] X-AnalysisOut: [=c-gL6cwWnPoA:10 a=ofMgfj31e3cA:10 a=BLceEmwcHowA:10 a=kj9] X-AnalysisOut: [zAlcOel0A:10 a=zQP7CpKOAAAA:8 a=cpFH7iso9awA:10 a=48vgC7mU] X-AnalysisOut: [AAAA:8 a=WOoBezHO_OeO91hw3EwA:9 a=CjuIK1q_8ugA:10 a=qM39co] X-AnalysisOut: [r4HRgA:10 a=Hz7IrDYlS0cA:10 a=vRAbILRZcFsA:10 a=lZB815dzVv] X-AnalysisOut: [QA:10 a=dNmv2DJiPOmcFr0D:21 a=FT0AY3OLJhGlA4KF:21] Cc: "stir@ietf.org" , "Peterson, Jon" Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 00:35:41 -0000 Major distraction and out of scope Martin Dolly Lead Member of Technical Staff Core Network & Gov't/Regulatory Standards =20 AT&T Standards and Industry Alliances +1-609-903-3360 md3135@att.com > On Oct 30, 2013, at 8:31 PM, "Richard Shockey" wrote= : >=20 >=20 > Well we will just have to agree to disagree here. Personally I think > keeping text on non-TN identifiers AT THIS TIME is a distraction. =20 >=20 > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of > Peterson, Jon > Sent: Wednesday, October 30, 2013 2:48 PM > To: Richard Shockey; stir@ietf.org > Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 >=20 >=20 > No disagreement that telephone numbers are the immediate problem, but it > isn't trivially easy to decouple the work on non-TN identifiers, it isn't > clear how much new work on non-TN identifiers needs to be done beyond wha= t > RFC4474 already did, and it certainly isn't just rfc4474bis in this WG th= at > proposes to address both: strikes-out does as well (see section 4.1 of th= at > draft, say). >=20 > I think we'll find that any solution we build for this is going to be abl= e > to address non-TN identifiers too, and I think it would be a tough sell t= o > argue that we should delete any such text, as necessarily any verifier is > going to have to look at a From header field value and ascertain whether = it > contains a TN or not. Once you've gone that far down the path, if the > signature verification is the same, and the credential acquisition > potentially the same as well, it's just not going to save us any effort t= o > keep non-TN identifiers out of these drafts. >=20 > Jon Peterson > Neustar, Inc. >=20 >> On 10/30/13 11:26 AM, "Richard Shockey" wrote: >>=20 >>=20 >> I would put it more succinctly ... can we just fix one thing at a time. >> We >> should not preclude the use of alternative identifiers in the future=20 >> but the immediate problem is telephone numbers. >>=20 >> -----Original Message----- >> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of= =20 >> Stephen Kent >> Sent: Wednesday, October 30, 2013 12:57 PM >> To: Peterson, Jon; stir@ietf.org >> Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 >>=20 >> Jon, >>=20 >> My concern is that we seem to understand how one can manage=20 >> authorization for telephone numbers as IDs, in a fashion that does not=20 >> go down the path of the browser PKI, and all its problems. If the names= =20 >> for which we vouch are scoped by DNS, and if we use DANE, I am=20 >> comfortable with that too. But, if we have to make this discussion very= =20 >> abstract, in order to accommodate caller ID models that do not derive=20 >> from authoritative ID sources, then I am very worried. >>=20 >> Frankly, as a security guy, I was getting lost in the discussion, but=20 >> maybe that's a presentation/exposition issue more than a technical=20 >> issue. >>=20 >> Steve >>=20 >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >>=20 >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir >=20 > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From michael.hammer@yaanatech.com Thu Oct 31 06:11:37 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9291B11E8203 for ; Thu, 31 Oct 2013 06:11:37 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ztYxw8Os-PxC for ; Thu, 31 Oct 2013 06:11:23 -0700 (PDT) Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id 0A3A111E8333 for ; Thu, 31 Oct 2013 06:11:22 -0700 (PDT) Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Thu, 31 Oct 2013 06:11:22 -0700 From: Michael Hammer To: "br@brianrosen.net" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YAyy39cKRpA40uHN/L9rrP0UJoN5+oA//+cE5CAAH78AIAAxqPg Date: Thu, 31 Oct 2013 13:11:20 +0000 Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEF46A1@sc9-ex2k10mb1.corp.yaanatech.com> References: <52711E0B.50901@bbn.com> <00C069FD01E0324C9FFCADF539701DB3BBEF43CB@sc9-ex2k10mb1.corp.yaanatech.com> <7E4E057F-7D7D-4795-8C48-53D7ADAAE630@brianrosen.net> In-Reply-To: <7E4E057F-7D7D-4795-8C48-53D7ADAAE630@brianrosen.net> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.17.100.113] Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0007_01CED619.27D32AC0" MIME-Version: 1.0 Cc: "stir@ietf.org" , "kent@bbn.com" , "jon.peterson@neustar.biz" Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 13:11:37 -0000 ------=_NextPart_000_0007_01CED619.27D32AC0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Yeah, except when that domain name is chasebank-not-really.com (but not that obvious). There are so many variations on spelling, I generally don't *trust* any of them. What 3rd party that I can trust is verifying those DNS domains??? Mike -----Original Message----- From: Brian Rosen [mailto:br@brianrosen.net] Sent: Wednesday, October 30, 2013 2:18 PM To: Michael Hammer Cc: Jon Peterson; kent@bbn.com; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 That one is easy. If you are placing a call from alice@example.com, then example.com is the trust anchor. Since we're using DNS to resolve example.com, then something DANE like would suffice to make sure that it really is example.com that is sending the call. Brian On Oct 30, 2013, at 1:43 PM, Michael Hammer wrote: > And who is the authority (to act as trust anchor) for those non-TN URIs? > > Mike > > > -----Original Message----- > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf > Of Peterson, Jon > Sent: Wednesday, October 30, 2013 12:41 PM > To: Stephen Kent; stir@ietf.org > Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 > > > This is mostly legacy text from the original RFC4474, with some new > connecting text added as we try to break up the components of the > mechanism and make the pieces more modular. I'd say the state of this > -00 points in the direction we want to go with that, but there's still > more surgery required, pending WG agreement on the direction. > > I will further say though that I think it will be tough to describe a > system for providing identity for telephone numbers that is not at > least aware of non-TN URIs and capable of differentiating them - not > always a trivial thing, actually. Whether or not the logic gate that > points us down the TN/non-TN paths is strictly in STIR's scope, we > will need it for this to actually work. I moreover think that the > behavior of verifiers in terms of how they check fields, acquire > credentials and so on will have significant overlap in the two cases. > I also suspect there's widespread agreement about how to approach the > non-TN case. So I'm hesitant to erect barriers that will completely > wall off the non-TN path from the specifications here. But I won't deny that the -00 could do a better job of organizing all this. > > Jon Peterson > Neustar, Inc. > > On 10/30/13 7:56 AM, "Stephen Kent" wrote: > >> Jon, Cullen and Eric: >> >> In reading this doc I noted that it devotes a lot of text to >> describing support for what seems to be AoR-style SIP IDs, rather >> than just the TEL SIP ID. >> I thought >> that the WG had decided to put off discussion of the former, and >> focus only on the latter ID type, initially. By trying to make this >> doc incorporate both types of IDs it seems to dilute the focus, and >> make for a much more complex discussion. >> >> Steve >> _______________________________________________ >> stir mailing list >> stir@ietf.org >> https://www.ietf.org/mailman/listinfo/stir > > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir ------=_NextPart_000_0007_01CED619.27D32AC0 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIRPzCCBBow ggMCAhEAi1t1VoRUhQsAz684SM6xpDANBgkqhkiG9w0BAQUFADCByjELMAkGA1UEBhMCVVMxFzAV BgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTow OAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5 MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24g QXV0aG9yaXR5IC0gRzMwHhcNOTkxMDAxMDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDd hNS5tPmn2PMEeJzePdxsExbZet0kUWbAxyZZDawGCMKU0TMf8IM1H24byN6qbhVOVCfvxG0a7Avj DvBEpVfHQFgeo0cfcexg9m2UyBg57f5CGFbf5ExJEHhOAXY1YxI23Wa8AQQ2o1Vo1aI2CayrISZU Bq0/yhTgrMqtBh2V4vid8eBg/8J/dStMzNr+h5kh6rr+PlTX0ll42zxuz6ATABq4J6HkvmeWyqDF s5zdyXWe6zCaX6PN2a54GT8j6VzbKb2tVcgbVIxj9uim6sc3ElyjKR4C2dsfO7TXD1ZHgRUESq+D J9HFWIjB3faqp6MY2miqbRFR4b9la5+WdtE9AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAKtmjdez useatuZV0AXxnzGNWqrZqkYmD3Htpa1TVmIBRypE6f4/dAsTm7n0TRuy0V+yttKIXLOfzcvUp9lg lYQ6+ME3HWHK57DF5ZHaVKasMYGul97NCKy4wJeAf25ypOdpE5VlH8STPP15jwTUPk/q957OzWd8 T2UC/5GFVHPH/zb3hi3s0F5P/xGfcgbWuBrxTA0mZeJEgB7Hn+Pd6Ara7KUggGlooU9+4WvPB0H6 g468ON2wLhGxa7JCzJq8+UgieUoZD7IcPiB02WrDvvIoeBNWeU9tUOobsLVXsTdmWCPz3A/fCofE 74YF1TgUYJmjS94GlnEs8tu2H6TvP+4wggZCMIIFKqADAgECAhA4qwAv/66Wt1b/OVr7XecbMA0G CSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAd BgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNz IDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzAeFw0xMTA5MDEw MDAwMDBaFw0yMTA4MzEyMzU5NTlaMIGmMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMg Q29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxHjAcBgNVBAsTFVBl cnNvbmEgTm90IFZhbGlkYXRlZDE3MDUGA1UEAxMuU3ltYW50ZWMgQ2xhc3MgMSBJbmRpdmlkdWFs IFN1YnNjcmliZXIgQ0EgLSBHNDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbsJ/0d Y/Q7HYrB0xzIyIKGtrhKhpKqgVxyyjANL55BIlcwISWQmqP0rCrGiBeGYXITdi7sA8snm48ggDfg 5IraVaZQD/y5XCNpiUKhuh+v7w75pMkK8fg3ssbZkkqufd+4RB+buj+MBv7YI09IUSNqYISo7icv YN+W8hoqjDyPAMxPy/ogjrw19uHwmrYF8/wdP8YUew7a8gXk04MCpsVpcLSp5Fbp2x1c9KY24mu1 Hiot3L677joEsDAIrV9obMa9BpaIhOfmqWQtvDgwu4gmw2dmZrS0d/nAoccOcu9m4uW5yuDzhXc1 mN7UHLD+ZnHiOMtufE9AVeuX2agYHu0CAwEAAaOCAkQwggJAMDgGCCsGAQUFBwEBBCwwKjAoBggr BgEFBQcwAYYcaHR0cDovL3BraS1vY3NwLnZlcmlzaWduLmNvbTASBgNVHRMBAf8ECDAGAQH/AgEA MGwGA1UdIARlMGMwYQYLYIZIAYb4RQEHFwEwUjAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5zeW1h dXRoLmNvbS9jcHMwKAYIKwYBBQUHAgIwHBoaaHR0cDovL3d3dy5zeW1hdXRoLmNvbS9ycGEwNAYD VR0fBC0wKzApoCegJYYjaHR0cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMS1nMy5jcmwwDgYDVR0P AQH/BAQDAgEGMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFWZXJpU2lnbk1QS0ktMi05NzAdBgNV HQ4EFgQUrfnDk3IttbkoYeSk12DVxApeGgEwgfEGA1UdIwSB6TCB5qGB0KSBzTCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzOCEQCLW3VWhFSFCwDPrzhIzrGkMA0GCSqGSIb3DQEBBQUA A4IBAQDWj8Ham4jys2xNH1gvugFRXXTBRujDuHuf1kDx7/8yuolrwA40Q5+kmeak8F1IM2KFhWH+ I4gijGCbK5xlSZTEojgkSKVcpVBLaOliIqeT6Jkibj1buxBCDh9MdUc0VgmP+L2MPPNcu9KWcFRw Yk3v0RC+nUgsXuyGaweC8D3hJScoLOAWdh6z/eViltKKPV8rrvtcwhO3ZWPLNHZDn9aHmaturZXB AD9GJ4H/Nd4jDkPcFF8y+cop78JSMPWZ3bmB+DolII2CaPK5IYV0ZgThhjkWMvIt1iqoyd7ZAAJP 4xggxaWBVraV3tOCrfh7Jb5kfC6gunAs+Pl14nRNB22EMIIG1zCCBb+gAwIBAgIQEB3dROkPDT0Q 6QYEc74tcjANBgkqhkiG9w0BAQUFADCBpjELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVj IENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQ ZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMTLlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVh bCBTdWJzY3JpYmVyIENBIC0gRzQwHhcNMTMwNDAxMDAwMDAwWhcNMTQwNDAyMjM1OTU5WjCBzjEu MCwGA1UEAwwlUGVyc29uYSBOb3QgVmFsaWRhdGVkIC0gMTM2NDg0MjY5NDQ0MzErMCkGCSqGSIb3 DQEJARYcbWljaGFlbC5oYW1tZXJAeWFhbmF0ZWNoLmNvbTEPMA0GA1UECwwGUy9NSU1FMR4wHAYD VQQLDBVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxHzAdBgNVBAsMFlN5bWFudGVjIFRydXN0IE5ldHdv cmsxHTAbBgNVBAoMFFN5bWFudGVjIENvcnBvcmF0aW9uMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAh2AtKQNowI8ILmNvdcY16moA8CH7hjSvGDNofwWsh4quEfZ6VQGtDhhOjUmW6JVq 719MH8FNJcVr8oAiVaK3nNeJTL2wO68LpgX6tcZ/z22pJoz98wHzgfWf3pfEUYrCqYg2V3m6oe0t kd+OaeY8DmPVSpG7as0rkoEzeNwCtmpYjkm96mBO6/AQwsowSLbSuqkEGykp1k47KiPBtxhbp2um IReh94vPrr1O9zXau9oGMvABJjigYQ2e5AhhhDdK8qOkhgkMAJN2nvLqY+VFrnFIsb5noQ/tP2M/ ct9qwRZ5kUaumRqE/XzV3rH8PoacZW/YvcwAp8Gr1ZaHCMRl+wIDAQABo4IC1TCCAtEwDAYDVR0T AQH/BAIwADAOBgNVHQ8BAf8EBAMCBaAwIAYDVR0lAQH/BBYwFAYIKwYBBQUHAwQGCCsGAQUFBwMC MB0GA1UdDgQWBBTlvYUx4PMlUy6uvceJkDMK4jBDZjAnBgNVHREEIDAegRxtaWNoYWVsLmhhbW1l ckB5YWFuYXRlY2guY29tMB8GA1UdIwQYMBaAFK35w5NyLbW5KGHkpNdg1cQKXhoBMIIBKwYIKwYB BQUHAQEEggEdMIIBGTCCARUGCCsGAQUFBzAChoIBB2xkYXA6Ly9kaXJlY3RvcnkudmVyaXNpZ24u Y29tL0NOJTIwJTNEJTIwU3ltYW50ZWMlMjBDbGFzcyUyMDElMjBJbmRpdmlkdWFsJTIwU3Vic2Ny aWJlciUyMENBJTIwLSUyMEc0JTJDJTIwT1UlMjAlM0QlMjBQZXJzb25hJTIwTm90JTIwVmFsaWRh dGVkJTJDJTIwT1UlMjAlM0QlMjBTeW1hbnRlYyUyMFRydXN0JTIwTmV0d29yayUyQyUyME8lMjAl M0QlMjBTeW1hbnRlYyUyMENvcnBvcmF0aW9uJTJDJTIwQyUyMCUzRCUyMFVTP2NBQ2VydGlmaWNh dGU7YmluYXJ5MF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9wa2ktY3JsLnN5bWF1dGguY29tL2Nh XzU2MWMxMDM2OTBjOTdhNjkyNDdhMGVmMDcxYWM4MWFmL0xhdGVzdENSTC5jcmwwbAYDVR0gBGUw YzBhBgtghkgBhvhFAQcXATBSMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LnN5bWF1dGguY29tL2Nw czAoBggrBgEFBQcCAjAcGhpodHRwOi8vd3d3LnN5bWF1dGguY29tL3JwYTAqBgpghkgBhvhFARAD BBwwGgYRYIZIAYb4RQEQAQICBAGGsxcWBTEwOTIyMA0GCSqGSIb3DQEBBQUAA4IBAQAae/er4pfB TpqK6c/uJ9D8dVJzzNX26akkB8z/29totzbkpFAIlXRh02iNVK+GnsgS1gwu3FOvjgT5M4i+cNxD vTJVcnZNXns75JUGX3UsWQbtSySrVzQx8lMtwW6nXHM5GlEaY8/jKVpambG2q9OHjmwMTz7I4A+y KiiGCGdhE23dFOvku6t/oiwqFnXJmb4o75kbVevKEOd34MIj0P7Q8+1mZcNYEUTYKadoPXFyTWnO 2HTMvFcGgdLFKcqb13clWeW3/B5WjdBimpMjbvwi8ZbrhFdp7Y3NLKFSRH8W29rt0LW7zULxii0z 34NGsBkW9w95PLzTsqmKD4Yv5AkIMYIEkjCCBI4CAQEwgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYD VQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29y azEeMBwGA1UECxMVUGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFz cyAxIEluZGl2aWR1YWwgU3Vic2NyaWJlciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMAkGBSsO AwIaBQCgggKrMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEzMTAz MTEzMTExN1owIwYJKoZIhvcNAQkEMRYEFF6/kJ3b6VfhEeUjwnX4FMXtYt/nMIGrBgkqhkiG9w0B CQ8xgZ0wgZowCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBFjAKBggqhkiG9w0DBzALBglghkgBZQME AQIwDgYIKoZIhvcNAwICAgCAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgFAMA0GCCqGSIb3DQMCAgEo MAcGBSsOAwIaMAsGCWCGSAFlAwQCAzALBglghkgBZQMEAgIwCwYJYIZIAWUDBAIBMIHMBgkrBgEE AYI3EAQxgb4wgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlv bjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEeMBwGA1UECxMVUGVyc29uYSBOb3Qg VmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2NyaWJl ciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMIHOBgsqhkiG9w0BCRACCzGBvqCBuzCBpjELMAkG A1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRl YyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMT LlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVhbCBTdWJzY3JpYmVyIENBIC0gRzQCEBAd3UTpDw09 EOkGBHO+LXIwDQYJKoZIhvcNAQEBBQAEggEAaVCessQrvw+LsUXqum355vbmnMyKD6SyhlCV1+1B 9x63LGF1M6fnMu6SbKjpWvPnw9JRKXMn51VIphyATMDxr9zlp9oonZnnzUAchM5M/exr45W87Msp pv6fW8PRg2EAF6BmgDoc1dpp2Yh7N7cXmXaePNnUn+ilK1dVXTlwMZb/SDKMFqiSqYOphz573oVf 1QFaamdq5me2sCJrH/KRioxKZ+iVFRMArwqaHkEAqIqss5ACeB2/BjxW+S/016EVzwKRfoiRiZKF 9Uz5paucgG9cwX1MLhuj3LXOO8eRQYsHF6WM9ctdVPSffJgkkqLLizF3FTCUHe5PS3V89ceAigAA AAAAAA== ------=_NextPart_000_0007_01CED619.27D32AC0-- From kent@bbn.com Thu Oct 31 07:17:53 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EF09911E8172 for ; Thu, 31 Oct 2013 07:17:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.527 X-Spam-Level: X-Spam-Status: No, score=-106.527 tagged_above=-999 required=5 tests=[AWL=0.072, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id A1diClTdq237 for ; Thu, 31 Oct 2013 07:17:48 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 2268B11E8147 for ; Thu, 31 Oct 2013 07:17:48 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:49290) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1Vbt4E-000Ciz-PX; Thu, 31 Oct 2013 10:17:46 -0400 Message-ID: <5272668B.6020709@bbn.com> Date: Thu, 31 Oct 2013 10:17:47 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: Brian Rosen , "stir@ietf.org" References: <52711E0B.50901@bbn.com> <00C069FD01E0324C9FFCADF539701DB3BBEF43CB@sc9-ex2k10mb1.corp.yaanatech.com> <7E4E057F-7D7D-4795-8C48-53D7ADAAE630@brianrosen.net> In-Reply-To: <7E4E057F-7D7D-4795-8C48-53D7ADAAE630@brianrosen.net> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 14:17:54 -0000 Brian, I think DANE needs to be noted here explicitly. It is an example of what I noted, i.e., an authoritative source for DNS-based credentials. If we are silent on this point folks may assume that the current, browser PKI (aka WebPKI) is suitable. Steve > That one is easy. If you are placing a call from alice@example.com, then example.com is the trust anchor. > > Since we’re using DNS to resolve example.com, then something DANE like would suffice to make sure that it really is example.com that is sending the call. > > Brian > > On Oct 30, 2013, at 1:43 PM, Michael Hammer wrote: > >> And who is the authority (to act as trust anchor) for those non-TN URIs? >> >> Mike >> >> From kent@bbn.com Thu Oct 31 07:55:45 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BB9F11E8125 for ; Thu, 31 Oct 2013 07:55:45 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.528 X-Spam-Level: X-Spam-Status: No, score=-106.528 tagged_above=-999 required=5 tests=[AWL=0.071, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oBAT3O-dvY6z for ; Thu, 31 Oct 2013 07:55:33 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 4D8AB11E8149 for ; Thu, 31 Oct 2013 07:55:22 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:49298) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1VbteY-000DG0-Cg; Thu, 31 Oct 2013 10:55:18 -0400 Message-ID: <52726F56.1000002@bbn.com> Date: Thu, 31 Oct 2013 10:55:18 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: "Peterson, Jon" , Michael Hammer , "stir@ietf.org" References: In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 14:55:45 -0000 Jon, I must respectfully disagree on this point. The WebPKI is not, from s secruity perspective, comparable to use of DANE (for DNS-based names) or a telephone-number-based PKI based on national-level authorities. If modularity is intended to blur the distinctions among all of these, we are doing a disservice to readers, implementers, etc. Steve From jon.peterson@neustar.biz Thu Oct 31 08:52:09 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 268AE11E822A for ; Thu, 31 Oct 2013 08:52:09 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.056 X-Spam-Level: X-Spam-Status: No, score=-106.056 tagged_above=-999 required=5 tests=[AWL=0.543, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qGjOXh-HUYmT for ; Thu, 31 Oct 2013 08:52:05 -0700 (PDT) Received: from neustar.com (smartmail.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id 66F3D11E8232 for ; Thu, 31 Oct 2013 08:52:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383234753; x=1698581906; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=n6E56cdRaH NqhnpqFH25Wfs/wNCxeOCHRFAFfotWu64=; b=b6rDD22Y9nbefwBdQE6AbcX94f wGnUqFWPLkrgJmd0keM+wtaQspCARdN5Bpxn94Ns32TC1oG412n3Nn5EGDBQ== Received: from ([10.31.58.69]) by chihiron2.nc.neustar.com with ESMTP with TLS id J041123125.27965143; Thu, 31 Oct 2013 11:52:31 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc10.cis.neustar.com ([169.254.4.132]) with mapi id 14.02.0342.003; Thu, 31 Oct 2013 11:52:00 -0400 From: "Peterson, Jon" To: Richard Shockey , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOAgAB55YCAABkSgP//kH6AgAB51ICAAOdrAA== Date: Thu, 31 Oct 2013 15:52:00 +0000 Message-ID: In-Reply-To: <023b01ced5a2$c00d04e0$40270ea0$@shockey.us> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: JgZOEgEbntKAFOGnLjc8dg== Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 15:52:09 -0000 You are of course entitled to your opinion, but I think you need to beyond saying "there's new work that we'd have to do only in support non-TNs" and identify what that work actually is. Jon Peterson Neustar, Inc. On 10/30/13 12:03 PM, "Richard Shockey" wrote: > >Well we will just have to agree to disagree here. Personally I think >keeping text on non-TN identifiers AT THIS TIME is a distraction. > >-----Original Message----- >From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >Peterson, Jon >Sent: Wednesday, October 30, 2013 2:48 PM >To: Richard Shockey; stir@ietf.org >Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 > > >No disagreement that telephone numbers are the immediate problem, but it >isn't trivially easy to decouple the work on non-TN identifiers, it isn't >clear how much new work on non-TN identifiers needs to be done beyond what >RFC4474 already did, and it certainly isn't just rfc4474bis in this WG >that >proposes to address both: strikes-out does as well (see section 4.1 of >that >draft, say). > >I think we'll find that any solution we build for this is going to be able >to address non-TN identifiers too, and I think it would be a tough sell to >argue that we should delete any such text, as necessarily any verifier is >going to have to look at a From header field value and ascertain whether >it >contains a TN or not. Once you've gone that far down the path, if the >signature verification is the same, and the credential acquisition >potentially the same as well, it's just not going to save us any effort to >keep non-TN identifiers out of these drafts. > >Jon Peterson >Neustar, Inc. > >On 10/30/13 11:26 AM, "Richard Shockey" wrote: > >> >>I would put it more succinctly ... can we just fix one thing at a time. >>We >>should not preclude the use of alternative identifiers in the future >>but the immediate problem is telephone numbers. >> >>-----Original Message----- >>From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >>Stephen Kent >>Sent: Wednesday, October 30, 2013 12:57 PM >>To: Peterson, Jon; stir@ietf.org >>Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 >> >>Jon, >> >>My concern is that we seem to understand how one can manage >>authorization for telephone numbers as IDs, in a fashion that does not >>go down the path of the browser PKI, and all its problems. If the names >>for which we vouch are scoped by DNS, and if we use DANE, I am >>comfortable with that too. But, if we have to make this discussion very >>abstract, in order to accommodate caller ID models that do not derive >>from authoritative ID sources, then I am very worried. >> >>Frankly, as a security guy, I was getting lost in the discussion, but >>maybe that's a presentation/exposition issue more than a technical >>issue. >> >>Steve >> >> >>_______________________________________________ >>stir mailing list >>stir@ietf.org >>https://www.ietf.org/mailman/listinfo/stir >> >>_______________________________________________ >>stir mailing list >>stir@ietf.org >>https://www.ietf.org/mailman/listinfo/stir > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir > From jon.peterson@neustar.biz Thu Oct 31 09:06:48 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6CD7511E8298 for ; Thu, 31 Oct 2013 09:06:47 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.105 X-Spam-Level: X-Spam-Status: No, score=-106.105 tagged_above=-999 required=5 tests=[AWL=0.494, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qR4Q2A4Z4PJY for ; Thu, 31 Oct 2013 09:06:43 -0700 (PDT) Received: from neustar.com (mx1.neustar.com [156.154.17.104]) by ietfa.amsl.com (Postfix) with ESMTP id DEC6921F9E8D for ; Thu, 31 Oct 2013 09:06:35 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383236189; x=1698586087; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=E7PqGaon8e EmS0M4uE+lMzjo1kbImjc9xqVPn+rIpJw=; b=LzA3iK9LmqCNNw91oNleY0VogO hA8P3M+OYNwEVKkiCytITb1B/DJUf1ZwyFqp91TpIFCrLYX6Sp3UCW3YaYpw== Received: from ([10.31.58.71]) by stihiron1.va.neustar.com with ESMTP with TLS id J041124052.34668259; Thu, 31 Oct 2013 12:16:28 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc12.cis.neustar.com ([::1]) with mapi id 14.02.0342.003; Thu, 31 Oct 2013 12:06:23 -0400 From: "Peterson, Jon" To: Stephen Kent , Michael Hammer , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOAgACG74D//5XoAIABzWEA//+egAA= Date: Thu, 31 Oct 2013 16:06:22 +0000 Message-ID: In-Reply-To: <52726F56.1000002@bbn.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: oK+6rAj3Zq26UqwkjL18vQ== Content-Type: text/plain; charset="us-ascii" Content-ID: <50ACB06759FA1847ACF5A3AB31D2C10B@neustar.biz> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 16:06:48 -0000 I certainly don't suggest to blur that distinction between credentials with different strengths. What I do suggest though is that there is room here to make a clear break between: 1) the process by which we sign/verify with credentials 2) the process by which we acquire credentials and ascertain their authority over an ID That is true, and I would argue useful for us in a divide-and-conquer work flow, whether or not there are multiple ways of doing (2). But I think the fact that there are upcoming technologies that aren't yet prime time, like DANE, indicates that there might need to be multiple ways to do (2). Even if we assume a world that is all certificates, there may still be multiple ways for a verifier to acquire them: a cert might be tacked on to a SIP request itself, found in the verifier cache, downloaded using any of a number of protocols. What I'm concerned about is assuming a vertical "one true way" at this stage in our process. Jon Peterson Neustar, Inc. On 10/31/13 7:55 AM, "Stephen Kent" wrote: >Jon, > >I must respectfully disagree on this point. > >The WebPKI is not, from s secruity perspective, comparable to use of DANE >(for DNS-based names) or a telephone-number-based PKI based on >national-level >authorities. If modularity is intended to blur the distinctions among >all of these, >we are doing a disservice to readers, implementers, etc. > >Steve > > From michael.hammer@yaanatech.com Thu Oct 31 09:27:31 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C828121F9DCF for ; Thu, 31 Oct 2013 09:27:30 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -2.599 X-Spam-Level: X-Spam-Status: No, score=-2.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id oMZTVjBWJsUk for ; Thu, 31 Oct 2013 09:27:25 -0700 (PDT) Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id 61CFB21F9D22 for ; Thu, 31 Oct 2013 09:27:18 -0700 (PDT) Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Thu, 31 Oct 2013 09:27:18 -0700 From: Michael Hammer To: "jon.peterson@neustar.biz" , "kent@bbn.com" , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YAyy39cKRpA40uHN/L9rrP0UJoN5+oA//+cE5CAAIDHgIABWAEAgAAT2wD//5A1QA== Date: Thu, 31 Oct 2013 16:27:16 +0000 Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEF4B80@sc9-ex2k10mb1.corp.yaanatech.com> References: <52726F56.1000002@bbn.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: yes X-MS-TNEF-Correlator: x-originating-ip: [10.17.100.113] Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0147_01CED634.8885DA00" MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 16:27:31 -0000 ------=_NextPart_000_0147_01CED634.8885DA00 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Jon, Understand being flexible and covering all fronts. But, if it gets watered down to a least common denominator that doesn't meet the requirements for TN, I think that would be a failure. Mike -----Original Message----- From: Peterson, Jon [mailto:jon.peterson@neustar.biz] Sent: Thursday, October 31, 2013 12:06 PM To: Stephen Kent; Michael Hammer; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 I certainly don't suggest to blur that distinction between credentials with different strengths. What I do suggest though is that there is room here to make a clear break between: 1) the process by which we sign/verify with credentials 2) the process by which we acquire credentials and ascertain their authority over an ID That is true, and I would argue useful for us in a divide-and-conquer work flow, whether or not there are multiple ways of doing (2). But I think the fact that there are upcoming technologies that aren't yet prime time, like DANE, indicates that there might need to be multiple ways to do (2). Even if we assume a world that is all certificates, there may still be multiple ways for a verifier to acquire them: a cert might be tacked on to a SIP request itself, found in the verifier cache, downloaded using any of a number of protocols. What I'm concerned about is assuming a vertical "one true way" at this stage in our process. Jon Peterson Neustar, Inc. On 10/31/13 7:55 AM, "Stephen Kent" wrote: >Jon, > >I must respectfully disagree on this point. > >The WebPKI is not, from s secruity perspective, comparable to use of >DANE (for DNS-based names) or a telephone-number-based PKI based on >national-level authorities. If modularity is intended to blur the >distinctions among all of these, we are doing a disservice to readers, >implementers, etc. > >Steve > > ------=_NextPart_000_0147_01CED634.8885DA00 Content-Type: application/pkcs7-signature; name="smime.p7s" Content-Transfer-Encoding: base64 Content-Disposition: attachment; filename="smime.p7s" MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIRPzCCBBow ggMCAhEAi1t1VoRUhQsAz684SM6xpDANBgkqhkiG9w0BAQUFADCByjELMAkGA1UEBhMCVVMxFzAV BgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTow OAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5 MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24g QXV0aG9yaXR5IC0gRzMwHhcNOTkxMDAxMDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDd hNS5tPmn2PMEeJzePdxsExbZet0kUWbAxyZZDawGCMKU0TMf8IM1H24byN6qbhVOVCfvxG0a7Avj DvBEpVfHQFgeo0cfcexg9m2UyBg57f5CGFbf5ExJEHhOAXY1YxI23Wa8AQQ2o1Vo1aI2CayrISZU Bq0/yhTgrMqtBh2V4vid8eBg/8J/dStMzNr+h5kh6rr+PlTX0ll42zxuz6ATABq4J6HkvmeWyqDF s5zdyXWe6zCaX6PN2a54GT8j6VzbKb2tVcgbVIxj9uim6sc3ElyjKR4C2dsfO7TXD1ZHgRUESq+D J9HFWIjB3faqp6MY2miqbRFR4b9la5+WdtE9AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAKtmjdez useatuZV0AXxnzGNWqrZqkYmD3Htpa1TVmIBRypE6f4/dAsTm7n0TRuy0V+yttKIXLOfzcvUp9lg lYQ6+ME3HWHK57DF5ZHaVKasMYGul97NCKy4wJeAf25ypOdpE5VlH8STPP15jwTUPk/q957OzWd8 T2UC/5GFVHPH/zb3hi3s0F5P/xGfcgbWuBrxTA0mZeJEgB7Hn+Pd6Ara7KUggGlooU9+4WvPB0H6 g468ON2wLhGxa7JCzJq8+UgieUoZD7IcPiB02WrDvvIoeBNWeU9tUOobsLVXsTdmWCPz3A/fCofE 74YF1TgUYJmjS94GlnEs8tu2H6TvP+4wggZCMIIFKqADAgECAhA4qwAv/66Wt1b/OVr7XecbMA0G CSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAd BgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNz IDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzAeFw0xMTA5MDEw MDAwMDBaFw0yMTA4MzEyMzU5NTlaMIGmMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMg Q29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxHjAcBgNVBAsTFVBl cnNvbmEgTm90IFZhbGlkYXRlZDE3MDUGA1UEAxMuU3ltYW50ZWMgQ2xhc3MgMSBJbmRpdmlkdWFs IFN1YnNjcmliZXIgQ0EgLSBHNDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbsJ/0d Y/Q7HYrB0xzIyIKGtrhKhpKqgVxyyjANL55BIlcwISWQmqP0rCrGiBeGYXITdi7sA8snm48ggDfg 5IraVaZQD/y5XCNpiUKhuh+v7w75pMkK8fg3ssbZkkqufd+4RB+buj+MBv7YI09IUSNqYISo7icv YN+W8hoqjDyPAMxPy/ogjrw19uHwmrYF8/wdP8YUew7a8gXk04MCpsVpcLSp5Fbp2x1c9KY24mu1 Hiot3L677joEsDAIrV9obMa9BpaIhOfmqWQtvDgwu4gmw2dmZrS0d/nAoccOcu9m4uW5yuDzhXc1 mN7UHLD+ZnHiOMtufE9AVeuX2agYHu0CAwEAAaOCAkQwggJAMDgGCCsGAQUFBwEBBCwwKjAoBggr BgEFBQcwAYYcaHR0cDovL3BraS1vY3NwLnZlcmlzaWduLmNvbTASBgNVHRMBAf8ECDAGAQH/AgEA MGwGA1UdIARlMGMwYQYLYIZIAYb4RQEHFwEwUjAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5zeW1h dXRoLmNvbS9jcHMwKAYIKwYBBQUHAgIwHBoaaHR0cDovL3d3dy5zeW1hdXRoLmNvbS9ycGEwNAYD VR0fBC0wKzApoCegJYYjaHR0cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMS1nMy5jcmwwDgYDVR0P AQH/BAQDAgEGMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFWZXJpU2lnbk1QS0ktMi05NzAdBgNV HQ4EFgQUrfnDk3IttbkoYeSk12DVxApeGgEwgfEGA1UdIwSB6TCB5qGB0KSBzTCByjELMAkGA1UE BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp ZmljYXRpb24gQXV0aG9yaXR5IC0gRzOCEQCLW3VWhFSFCwDPrzhIzrGkMA0GCSqGSIb3DQEBBQUA A4IBAQDWj8Ham4jys2xNH1gvugFRXXTBRujDuHuf1kDx7/8yuolrwA40Q5+kmeak8F1IM2KFhWH+ I4gijGCbK5xlSZTEojgkSKVcpVBLaOliIqeT6Jkibj1buxBCDh9MdUc0VgmP+L2MPPNcu9KWcFRw Yk3v0RC+nUgsXuyGaweC8D3hJScoLOAWdh6z/eViltKKPV8rrvtcwhO3ZWPLNHZDn9aHmaturZXB AD9GJ4H/Nd4jDkPcFF8y+cop78JSMPWZ3bmB+DolII2CaPK5IYV0ZgThhjkWMvIt1iqoyd7ZAAJP 4xggxaWBVraV3tOCrfh7Jb5kfC6gunAs+Pl14nRNB22EMIIG1zCCBb+gAwIBAgIQEB3dROkPDT0Q 6QYEc74tcjANBgkqhkiG9w0BAQUFADCBpjELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVj IENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQ ZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMTLlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVh bCBTdWJzY3JpYmVyIENBIC0gRzQwHhcNMTMwNDAxMDAwMDAwWhcNMTQwNDAyMjM1OTU5WjCBzjEu MCwGA1UEAwwlUGVyc29uYSBOb3QgVmFsaWRhdGVkIC0gMTM2NDg0MjY5NDQ0MzErMCkGCSqGSIb3 DQEJARYcbWljaGFlbC5oYW1tZXJAeWFhbmF0ZWNoLmNvbTEPMA0GA1UECwwGUy9NSU1FMR4wHAYD VQQLDBVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxHzAdBgNVBAsMFlN5bWFudGVjIFRydXN0IE5ldHdv cmsxHTAbBgNVBAoMFFN5bWFudGVjIENvcnBvcmF0aW9uMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A MIIBCgKCAQEAh2AtKQNowI8ILmNvdcY16moA8CH7hjSvGDNofwWsh4quEfZ6VQGtDhhOjUmW6JVq 719MH8FNJcVr8oAiVaK3nNeJTL2wO68LpgX6tcZ/z22pJoz98wHzgfWf3pfEUYrCqYg2V3m6oe0t kd+OaeY8DmPVSpG7as0rkoEzeNwCtmpYjkm96mBO6/AQwsowSLbSuqkEGykp1k47KiPBtxhbp2um IReh94vPrr1O9zXau9oGMvABJjigYQ2e5AhhhDdK8qOkhgkMAJN2nvLqY+VFrnFIsb5noQ/tP2M/ ct9qwRZ5kUaumRqE/XzV3rH8PoacZW/YvcwAp8Gr1ZaHCMRl+wIDAQABo4IC1TCCAtEwDAYDVR0T AQH/BAIwADAOBgNVHQ8BAf8EBAMCBaAwIAYDVR0lAQH/BBYwFAYIKwYBBQUHAwQGCCsGAQUFBwMC MB0GA1UdDgQWBBTlvYUx4PMlUy6uvceJkDMK4jBDZjAnBgNVHREEIDAegRxtaWNoYWVsLmhhbW1l ckB5YWFuYXRlY2guY29tMB8GA1UdIwQYMBaAFK35w5NyLbW5KGHkpNdg1cQKXhoBMIIBKwYIKwYB BQUHAQEEggEdMIIBGTCCARUGCCsGAQUFBzAChoIBB2xkYXA6Ly9kaXJlY3RvcnkudmVyaXNpZ24u Y29tL0NOJTIwJTNEJTIwU3ltYW50ZWMlMjBDbGFzcyUyMDElMjBJbmRpdmlkdWFsJTIwU3Vic2Ny aWJlciUyMENBJTIwLSUyMEc0JTJDJTIwT1UlMjAlM0QlMjBQZXJzb25hJTIwTm90JTIwVmFsaWRh dGVkJTJDJTIwT1UlMjAlM0QlMjBTeW1hbnRlYyUyMFRydXN0JTIwTmV0d29yayUyQyUyME8lMjAl M0QlMjBTeW1hbnRlYyUyMENvcnBvcmF0aW9uJTJDJTIwQyUyMCUzRCUyMFVTP2NBQ2VydGlmaWNh dGU7YmluYXJ5MF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9wa2ktY3JsLnN5bWF1dGguY29tL2Nh XzU2MWMxMDM2OTBjOTdhNjkyNDdhMGVmMDcxYWM4MWFmL0xhdGVzdENSTC5jcmwwbAYDVR0gBGUw YzBhBgtghkgBhvhFAQcXATBSMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LnN5bWF1dGguY29tL2Nw czAoBggrBgEFBQcCAjAcGhpodHRwOi8vd3d3LnN5bWF1dGguY29tL3JwYTAqBgpghkgBhvhFARAD BBwwGgYRYIZIAYb4RQEQAQICBAGGsxcWBTEwOTIyMA0GCSqGSIb3DQEBBQUAA4IBAQAae/er4pfB TpqK6c/uJ9D8dVJzzNX26akkB8z/29totzbkpFAIlXRh02iNVK+GnsgS1gwu3FOvjgT5M4i+cNxD vTJVcnZNXns75JUGX3UsWQbtSySrVzQx8lMtwW6nXHM5GlEaY8/jKVpambG2q9OHjmwMTz7I4A+y KiiGCGdhE23dFOvku6t/oiwqFnXJmb4o75kbVevKEOd34MIj0P7Q8+1mZcNYEUTYKadoPXFyTWnO 2HTMvFcGgdLFKcqb13clWeW3/B5WjdBimpMjbvwi8ZbrhFdp7Y3NLKFSRH8W29rt0LW7zULxii0z 34NGsBkW9w95PLzTsqmKD4Yv5AkIMYIEkjCCBI4CAQEwgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYD VQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29y azEeMBwGA1UECxMVUGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFz cyAxIEluZGl2aWR1YWwgU3Vic2NyaWJlciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMAkGBSsO AwIaBQCgggKrMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEzMTAz MTE2MjcxNVowIwYJKoZIhvcNAQkEMRYEFDQvnKKX07gf3ZNDw/Au1J6hh53MMIGrBgkqhkiG9w0B CQ8xgZ0wgZowCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBFjAKBggqhkiG9w0DBzALBglghkgBZQME AQIwDgYIKoZIhvcNAwICAgCAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgFAMA0GCCqGSIb3DQMCAgEo MAcGBSsOAwIaMAsGCWCGSAFlAwQCAzALBglghkgBZQMEAgIwCwYJYIZIAWUDBAIBMIHMBgkrBgEE AYI3EAQxgb4wgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlv bjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEeMBwGA1UECxMVUGVyc29uYSBOb3Qg VmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2NyaWJl ciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMIHOBgsqhkiG9w0BCRACCzGBvqCBuzCBpjELMAkG A1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRl YyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMT LlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVhbCBTdWJzY3JpYmVyIENBIC0gRzQCEBAd3UTpDw09 EOkGBHO+LXIwDQYJKoZIhvcNAQEBBQAEggEAAN7F0G+gRH8KQVFHJIOq8uwLUIeMXGd7dftv5Mpe 4RPLW9Ok7MEa686P0M1Jb5RqjUGphH7Ud55mATPTYuJehpgryWJIBgOtHZr8q4lgkekgqkVV0r9n jmjdUgK+b0M8J5u8bTGR8AkdViHmUrCm7mncHkbrvLBUv16AaqCshm7UiIihkksMoj6yX2qC/Isz 9t4+65vWYrX9PIimOZhQbkc901fkTS5UN7lLPYguneInMKLi/8QuiDAdIQNl9rG4sCyoy5HKp1zN YzuS4U8UcdXsWMlvdW/NZY3bLbvibWjjAh+rI07Y0wiRnK9JROIZlGpRnKCK4IGS1upCN4GZkAAA AAAAAA== ------=_NextPart_000_0147_01CED634.8885DA00-- From richard@shockey.us Thu Oct 31 10:24:20 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5CF8521E80FC for ; Thu, 31 Oct 2013 10:24:20 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.488 X-Spam-Level: X-Spam-Status: No, score=-102.488 tagged_above=-999 required=5 tests=[AWL=0.111, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Jsmv34kJka3d for ; Thu, 31 Oct 2013 10:24:15 -0700 (PDT) Received: from oproxy17-pub.mail.unifiedlayer.com (oproxy17-pub.mail.unifiedlayer.com [74.220.201.171]) by ietfa.amsl.com (Postfix) with SMTP id BB1A821F9BA4 for ; Thu, 31 Oct 2013 10:24:05 -0700 (PDT) Received: (qmail 1021 invoked by uid 0); 30 Oct 2013 20:27:55 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy17-pub.mail.unifiedlayer.com with SMTP; 30 Oct 2013 20:27:55 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=MsJIqAWdp1cz83tmHIcjoWPYpMhHO+UYhlX71GkGWwU=; b=nKnkjNaDe8dQxmBOf2cU+ZBC6PUXXyq7hKD5+c06Anr8nQVn4BZfs7m7hMc0RfVXd8rMZnwcVhO2/AO50lVGpwUd3bYivn8TZ+Jq8F848Q9uEZfPhZLSydsfD1sTCE0v; Received: from [173.79.179.104] (port=54140 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1VbbH1-0007rj-B1 for stir@ietf.org; Wed, 30 Oct 2013 13:17:47 -0600 From: "Richard Shockey" To: References: <01fa01ced59d$97436040$c5ca20c0$@shockey.us> In-Reply-To: Date: Wed, 30 Oct 2013 15:17:46 -0400 Message-ID: <024101ced5a4$b7c24c80$2746e580$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Thread-Index: AQJJY7V7l5ksJ/7+PHgCdk2zVBQEwpkYfbSQ Content-Language: en-us X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 17:24:20 -0000 Well we will just have to agree to disagree here. Personally I think keeping text on non-TN identifiers AT THIS TIME is a distraction. RAI does not have a good track record with overreaching requirements. I would prefer such text along with deleted but it seems the chances of having that opinion considered consensus is nil. -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Peterson, Jon Sent: Wednesday, October 30, 2013 2:48 PM To: Richard Shockey; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 No disagreement that telephone numbers are the immediate problem, but it isn't trivially easy to decouple the work on non-TN identifiers, it isn't clear how much new work on non-TN identifiers needs to be done beyond what RFC4474 already did, and it certainly isn't just rfc4474bis in this WG that proposes to address both: strikes-out does as well (see section 4.1 of that draft, say). I think we'll find that any solution we build for this is going to be able to address non-TN identifiers too, and I think it would be a tough sell to argue that we should delete any such text, as necessarily any verifier is going to have to look at a From header field value and ascertain whether it contains a TN or not. Once you've gone that far down the path, if the signature verification is the same, and the credential acquisition potentially the same as well, it's just not going to save us any effort to keep non-TN identifiers out of these drafts. Jon Peterson Neustar, Inc. On 10/30/13 11:26 AM, "Richard Shockey" wrote: > >I would put it more succinctly ... can we just fix one thing at a time. >We >should not preclude the use of alternative identifiers in the future >but the immediate problem is telephone numbers. > >-----Original Message----- >From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of >Stephen Kent >Sent: Wednesday, October 30, 2013 12:57 PM >To: Peterson, Jon; stir@ietf.org >Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 > >Jon, > >My concern is that we seem to understand how one can manage >authorization for telephone numbers as IDs, in a fashion that does not >go down the path of the browser PKI, and all its problems. If the names >for which we vouch are scoped by DNS, and if we use DANE, I am >comfortable with that too. But, if we have to make this discussion very >abstract, in order to accommodate caller ID models that do not derive >from authoritative ID sources, then I am very worried. > >Frankly, as a security guy, I was getting lost in the discussion, but >maybe that's a presentation/exposition issue more than a technical >issue. > >Steve > > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir > >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From kent@bbn.com Thu Oct 31 10:51:35 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 62E1411E823D for ; Thu, 31 Oct 2013 10:51:35 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.531 X-Spam-Level: X-Spam-Status: No, score=-106.531 tagged_above=-999 required=5 tests=[AWL=0.068, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 86dvddeC3Snk for ; Thu, 31 Oct 2013 10:51:29 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id A808B11E81D2 for ; Thu, 31 Oct 2013 10:51:28 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:49494) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1VbwP1-000Eyg-H1 for stir@ietf.org; Thu, 31 Oct 2013 13:51:27 -0400 Message-ID: <5272989F.2050901@bbn.com> Date: Thu, 31 Oct 2013 13:51:27 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: stir@ietf.org References: In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 17:51:35 -0000 Jon, > I certainly don't suggest to blur that distinction between credentials > with different strengths. What I do suggest though is that there is room > here to make a clear break between: > > 1) the process by which we sign/verify with credentials > 2) the process by which we acquire credentials and ascertain their > authority over an ID I agree that these are distinct. > That is true, and I would argue useful for us in a divide-and-conquer work > flow, whether or not there are multiple ways of doing (2). But I think the > fact that there are upcoming technologies that aren't yet prime time, like > DANE, indicates that there might need to be multiple ways to do (2). If this is a suggestion to rely on the WebPKI approach, I would disagree. It would be too easy for folks to make use of that broken model and not make the effort to move to a better approach, e.g., DANE. We ought not be silent on this, methinks :-). > Even > if we assume a world that is all certificates, there may still be multiple > ways for a verifier to acquire them: a cert might be tacked on to a SIP > request itself, found in the verifier cache, downloaded using any of a > number of protocols. What I'm concerned about is assuming a vertical "one > true way" at this stage in our process. > I agree that there ought to be explicit support for multiple ways for an RP to acquire credentials. But, we also need to document or more ways to do this, lest we have gap that may be filled in non-interoperable ways. Steve From jon.peterson@neustar.biz Thu Oct 31 11:23:14 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E49F511E824A for ; Thu, 31 Oct 2013 11:23:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.147 X-Spam-Level: X-Spam-Status: No, score=-106.147 tagged_above=-999 required=5 tests=[AWL=0.453, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bm7G2sCq3J1Q for ; Thu, 31 Oct 2013 11:23:11 -0700 (PDT) Received: from neustar.com (mx1.neustar.com [156.154.17.104]) by ietfa.amsl.com (Postfix) with ESMTP id 986DB11E824F for ; Thu, 31 Oct 2013 11:23:06 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383243943; x=1698600004; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=zakt0r99O7 BNTY806rU83PcyflUBZMv35nuzW4OsTTE=; b=svvjRVF2KPDmooYV5BaFNSqgcn RjuJ8FV/G7RtlvkcCYQh30OomKTVmcIXJ8opsaD4MhUpP2TovBFB3cEgN7pw== Received: from ([10.31.58.71]) by stihiron2.va.neustar.com with ESMTP with TLS id J041124103.33030956; Thu, 31 Oct 2013 14:25:42 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc12.cis.neustar.com ([::1]) with mapi id 14.02.0342.003; Thu, 31 Oct 2013 14:22:52 -0400 From: "Peterson, Jon" To: Stephen Kent , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOAgACG74D//5XoAIABzWEA//+egACAAJK3gP//k2kA Date: Thu, 31 Oct 2013 18:22:51 +0000 Message-ID: In-Reply-To: <5272989F.2050901@bbn.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: 6dn8v8MzPolVz2xtQOXrxg== Content-Type: text/plain; charset="us-ascii" Content-ID: Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 18:23:15 -0000 I think we're mostly on the same page here, though the question of whether something like web PKI is still relevant largely depends on how real we think DANE is. No question that it would be better, and that the warts of web PKI grow increasingly ugly. But I haven't heard a lot of enthusiasm from browser vendors, say, about DANE (I haven't taken this temperature super recently, though, so that may just be stale information). I also think that despite its warts, the world is still better off with web PKI today than it would be if it all went away with nothing to replace it. I'm not sure I could predict with total certainty where the market is going to go with all this. When I'm in that position, I tend to favor a certain amount of flexibility rather than gambling it all on one number on the roulette wheel. Jon Peterson Neustar, Inc. On 10/31/13 10:51 AM, "Stephen Kent" wrote: >Jon, > >> I certainly don't suggest to blur that distinction between credentials >> with different strengths. What I do suggest though is that there is room >> here to make a clear break between: >> >> 1) the process by which we sign/verify with credentials >> 2) the process by which we acquire credentials and ascertain their >> authority over an ID >I agree that these are distinct. >> That is true, and I would argue useful for us in a divide-and-conquer >>work >> flow, whether or not there are multiple ways of doing (2). But I think >>the >> fact that there are upcoming technologies that aren't yet prime time, >>like >> DANE, indicates that there might need to be multiple ways to do (2). >If this is a suggestion to rely on the WebPKI approach, I would disagree. >It would be too easy for folks to make use of that broken model and not >make the effort to move to a better approach, e.g., DANE. We ought not >be silent on this, methinks :-). >> Even >> if we assume a world that is all certificates, there may still be >>multiple >> ways for a verifier to acquire them: a cert might be tacked on to a SIP >> request itself, found in the verifier cache, downloaded using any of a >> number of protocols. What I'm concerned about is assuming a vertical >>"one >> true way" at this stage in our process. >> >I agree that there ought to be explicit support for multiple ways for an >RP to acquire credentials. But, we also need to document or more ways >to do this, lest we have gap that may be filled in non-interoperable ways. > >Steve >_______________________________________________ >stir mailing list >stir@ietf.org >https://www.ietf.org/mailman/listinfo/stir From Pierce.Gorman@sprint.com Thu Oct 31 11:40:07 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE4CD21F9FED for ; Thu, 31 Oct 2013 11:39:54 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -3.949 X-Spam-Level: X-Spam-Status: No, score=-3.949 tagged_above=-999 required=5 tests=[AWL=-0.350, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xsGDMlokoqkV for ; Thu, 31 Oct 2013 11:39:48 -0700 (PDT) Received: from co1outboundpool.messaging.microsoft.com (co1ehsobe001.messaging.microsoft.com [216.32.180.184]) by ietfa.amsl.com (Postfix) with ESMTP id 2628F11E817A for ; Thu, 31 Oct 2013 11:39:36 -0700 (PDT) Received: from mail93-co1-R.bigfish.com (10.243.78.230) by CO1EHSOBE026.bigfish.com (10.243.66.89) with Microsoft SMTP Server id 14.1.225.22; Thu, 31 Oct 2013 18:39:35 +0000 Received: from mail93-co1 (localhost [127.0.0.1]) by mail93-co1-R.bigfish.com (Postfix) with ESMTP id A60B8A00137; Thu, 31 Oct 2013 18:39:35 +0000 (UTC) X-Forefront-Antispam-Report: CIP:144.230.168.25; KIP:(null); UIP:(null); IPV:NLI; H:plsasdm1.corp.sprint.com; RD:smtpls1.sprint.com; EFVD:NLI X-SpamScore: -26 X-BigFish: VS-26(zzbb2dI98dI9371I542I1432I1418Izz1f42h208ch1ee6h1de0h1fdah2073h2146h1202h1e76h1d1ah1d2ah1fc6hzz1de098h1033IL8275bh8275dh1de097hz2fh2a8h839h944hd25hf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h1b0ah1d0ch1d2eh1d3fh1dfeh1dffh1e1dh1fe8h1ff5h2216h1155h) Received-SPF: pass (mail93-co1: domain of sprint.com designates 144.230.168.25 as permitted sender) client-ip=144.230.168.25; envelope-from=Pierce.Gorman@sprint.com; helo=plsasdm1.corp.sprint.com ; p.sprint.com ; Received: from mail93-co1 (localhost.localdomain [127.0.0.1]) by mail93-co1 (MessageSwitch) id 1383244773257169_16548; Thu, 31 Oct 2013 18:39:33 +0000 (UTC) Received: from CO1EHSMHS011.bigfish.com (unknown [10.243.78.250]) by mail93-co1.bigfish.com (Postfix) with ESMTP id 311B94C0040; Thu, 31 Oct 2013 18:39:33 +0000 (UTC) Received: from plsasdm1.corp.sprint.com (144.230.168.25) by CO1EHSMHS011.bigfish.com (10.243.66.21) with Microsoft SMTP Server (TLS) id 14.16.227.3; Thu, 31 Oct 2013 18:39:33 +0000 Received: from PLSWEH04.ad.sprint.com (plsweh04.corp.sprint.com [144.226.251.22]) by plsasdm1.corp.sprint.com (Sentrion-MTA-4.2.2/Sentrion-MTA-4.2.2) with ESMTP id r9VIdV6o029788 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 31 Oct 2013 13:39:31 -0500 Received: from pdawm10a.ad.sprint.com ([169.254.2.186]) by PLSWEH04.ad.sprint.com ([144.226.251.22]) with mapi id 14.03.0123.003; Thu, 31 Oct 2013 13:39:31 -0500 From: "Gorman, Pierce A [NTK]" To: Michael Hammer , "jon.peterson@neustar.biz" , "kent@bbn.com" , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1l4P21u22ZmpgESG/etOyXJUt5oPIMcQ Date: Thu, 31 Oct 2013 18:39:30 +0000 Message-ID: References: <52726F56.1000002@bbn.com> <00C069FD01E0324C9FFCADF539701DB3BBEF4B80@sc9-ex2k10mb1.corp.yaanatech.com> In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF4B80@sc9-ex2k10mb1.corp.yaanatech.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.122.53.23] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: sprint.com X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn% Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 18:40:08 -0000 I heard a remark from the panel at an Acme Packet Interconnect conference a= few years ago (by Richard Shockey?) that E.164 numbers are an internationa= l language that do not require multiple character sets or PUNYcode. I agree study of non-TN authentication is valuable but a solution specific = to TNs seems cardinal. Best regards, Pierce Gorman Voice Architecture Core Planning/Sprint 913-439-4368 (Desk) -----Original Message----- From: Michael Hammer [mailto:michael.hammer@yaanatech.com] Sent: October 31, 2013 11:27 AM To: jon.peterson@neustar.biz; kent@bbn.com; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, Understand being flexible and covering all fronts. But, if it gets watered down to a least common denominator that doesn't meet the requirements for TN, I think that would be a failure. Mike -----Original Message----- From: Peterson, Jon [mailto:jon.peterson@neustar.biz] Sent: Thursday, October 31, 2013 12:06 PM To: Stephen Kent; Michael Hammer; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 I certainly don't suggest to blur that distinction between credentials with different strengths. What I do suggest though is that there is room here to make a clear break between: 1) the process by which we sign/verify with credentials 2) the process by which we acquire credentials and ascertain their authorit= y over an ID That is true, and I would argue useful for us in a divide-and-conquer work flow, whether or not there are multiple ways of doing (2). But I think the fact that there are upcoming technologies that aren't yet prime time, like DANE, indicates that there might need to be multiple ways to do (2). Even i= f we assume a world that is all certificates, there may still be multiple way= s for a verifier to acquire them: a cert might be tacked on to a SIP request itself, found in the verifier cache, downloaded using any of a number of protocols. What I'm concerned about is assuming a vertical "one true way" a= t this stage in our process. Jon Peterson Neustar, Inc. On 10/31/13 7:55 AM, "Stephen Kent" wrote: >Jon, > >I must respectfully disagree on this point. > >The WebPKI is not, from s secruity perspective, comparable to use of >DANE (for DNS-based names) or a telephone-number-based PKI based on >national-level authorities. If modularity is intended to blur the >distinctions among all of these, we are doing a disservice to readers, >implementers, etc. > >Steve > > ________________________________ This e-mail may contain Sprint proprietary information intended for the sol= e use of the recipient(s). Any use by others is prohibited. If you are not = the intended recipient, please contact the sender and delete all copies of = the message. From kent@bbn.com Thu Oct 31 13:16:53 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9EBEB11E8155 for ; Thu, 31 Oct 2013 13:16:53 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.533 X-Spam-Level: X-Spam-Status: No, score=-106.533 tagged_above=-999 required=5 tests=[AWL=0.066, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id a3rsgTbhykqq for ; Thu, 31 Oct 2013 13:16:46 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id DD9F111E8166 for ; Thu, 31 Oct 2013 13:16:37 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:51291) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1VbyfT-000I0o-Ot; Thu, 31 Oct 2013 16:16:35 -0400 Message-ID: <5272BAA3.4040401@bbn.com> Date: Thu, 31 Oct 2013 16:16:35 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: "Peterson, Jon" , "stir@ietf.org" References: In-Reply-To: Content-Type: text/plain; charset=us-ascii; format=flowed Content-Transfer-Encoding: 7bit Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 20:16:53 -0000 Jon, > I think we're mostly on the same page here, though the question of whether > something like web PKI is still relevant largely depends on how real we > think DANE is. No question that it would be better, and that the warts of > web PKI grow increasingly ugly. But I haven't heard a lot of enthusiasm > from browser vendors, say, about DANE (I haven't taken this temperature > super recently, though, so that may just be stale information). I also > think that despite its warts, the world is still better off with web PKI > today than it would be if it all went away with nothing to replace it. > > I'm not sure I could predict with total certainty where the market is > going to go with all this. When I'm in that position, I tend to favor a > certain amount of flexibility rather than gambling it all on one number on > the roulette wheel. > How about a compromise; we strong recommend DANE, and characterize the WebPKI as a fallback, with caveats. Steve From jon.peterson@neustar.biz Thu Oct 31 13:42:38 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3E91111E8231 for ; Thu, 31 Oct 2013 13:42:38 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.181 X-Spam-Level: X-Spam-Status: No, score=-106.181 tagged_above=-999 required=5 tests=[AWL=0.418, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id F5qQAAkxtAah for ; Thu, 31 Oct 2013 13:42:34 -0700 (PDT) Received: from neustar.com (mx2.neustar.com [156.154.25.104]) by ietfa.amsl.com (Postfix) with ESMTP id 400A811E81D0 for ; Thu, 31 Oct 2013 13:42:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.biz; s=neustarbiz; t=1383252180; x=1698603716; q=dns/txt; h=From:Subject:Date:Message-ID:Content-Language: Content-Type:Content-ID:Content-Transfer-Encoding; bh=Xzxe3GzhQ/ FHJit1ai1zRUY5HQpaXMZlI/re4Ytn5lI=; b=OAz6KICBwni/2TrNxmaKUj28OM MwuIQvkcBo8Z/sNpaGfZObD1Y04FW17+s089OrIaTaP7UVOKjEkCaS0ZaBkg== Received: from ([10.31.58.70]) by chihiron2.nc.neustar.com with ESMTP with TLS id J041123125.27985102; Thu, 31 Oct 2013 16:42:59 -0400 Received: from STNTEXMB10.cis.neustar.com ([169.254.5.60]) by stntexhc11.cis.neustar.com ([::1]) with mapi id 14.02.0342.003; Thu, 31 Oct 2013 16:42:23 -0400 From: "Peterson, Jon" To: Stephen Kent , "stir@ietf.org" Thread-Topic: [stir] comment on draft-jennings-stir-rfc4474bis-00 Thread-Index: AQHO1YA+rzAZsOMgK0iWox7fcLd6G5oNQEOAgACG74D//5XoAIABzWEA//+egACAAJK3gP//k2kAABKkhID//5HZAA== Date: Thu, 31 Oct 2013 20:42:22 +0000 Message-ID: In-Reply-To: <5272BAA3.4040401@bbn.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: user-agent: Microsoft-MacOutlook/14.3.6.130613 x-originating-ip: [192.168.129.16] x-ems-proccessed: R64IxjzeHPwwd+efoj3ZcA== x-ems-stamp: hiJyTKo4sThaHGvV2NG9DQ== Content-Type: text/plain; charset="us-ascii" Content-ID: <50432079F91A76479DD76664FF6209F3@neustar.biz> Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 20:42:38 -0000 I wouldn't have any objection to ending up with that recommendation for handling non-TN identities - but I'm still just trying to take the first baby steps in the direction of a solution here. Jon Peterson Neustar, Inc. On 10/31/13 1:16 PM, "Stephen Kent" wrote: >Jon, > >> I think we're mostly on the same page here, though the question of >>whether >> something like web PKI is still relevant largely depends on how real we >> think DANE is. No question that it would be better, and that the warts >>of >> web PKI grow increasingly ugly. But I haven't heard a lot of enthusiasm >> from browser vendors, say, about DANE (I haven't taken this temperature >> super recently, though, so that may just be stale information). I also >> think that despite its warts, the world is still better off with web PKI >> today than it would be if it all went away with nothing to replace it. >> >> I'm not sure I could predict with total certainty where the market is >> going to go with all this. When I'm in that position, I tend to favor a >> certain amount of flexibility rather than gambling it all on one number >>on >> the roulette wheel. >> >How about a compromise; we strong recommend DANE, and characterize >the WebPKI as a fallback, with caveats. > >Steve From br@brianrosen.net Thu Oct 31 13:53:05 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8432011E81B9 for ; Thu, 31 Oct 2013 13:53:05 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -103.474 X-Spam-Level: X-Spam-Status: No, score=-103.474 tagged_above=-999 required=5 tests=[AWL=0.125, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id cngtnYa6vAla for ; Thu, 31 Oct 2013 13:53:00 -0700 (PDT) Received: from mail-qe0-f42.google.com (mail-qe0-f42.google.com [209.85.128.42]) by ietfa.amsl.com (Postfix) with ESMTP id E5AF411E81B0 for ; Thu, 31 Oct 2013 13:52:58 -0700 (PDT) Received: by mail-qe0-f42.google.com with SMTP id gc15so2109662qeb.29 for ; Thu, 31 Oct 2013 13:52:58 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=OnVaNVeJ5iPKywxQt+9kxbT0qo5mUUT9NkklSQUMZSI=; b=CjSITZ3taTdHMAwoR8pzBViUuTfxtJMAqcnERSQf6mgu923COuI6lmLmBQXBiC89H2 EqUjjq7w6imfP6tb3eCHPW44f4XNOZw5muUW9s57Ak1x8xGFPlnCAXgyVaUzTuWkic1r aUF9HPVXI1Rd6u5ZKD42h3AwAIM7OUs1NSMYSYD6YzelR54WxKsIP/dlokHrMcL5TzIn 7AE4GJPffSdaZ7bZWxlOnRd0w8njxhNlpOtcHFnpw4YCdeB6ZGd511lVMuu7iw5zYa/b jOjF7gAmIgV1doaiFm4Tt2i0gqZMQGqgTgt23zitOawgkWWlOw+t+NuXzIU1NykYZLw6 I/HQ== X-Gm-Message-State: ALoCoQnRgsP5UFcf4BsaFc/MY/4dg8ZdxL2GQ/tBlpPK4SneVLDF2BXrFoUHULBPqCWMFzneFL10 X-Received: by 10.224.67.66 with SMTP id q2mr5378769qai.122.1383252778362; Thu, 31 Oct 2013 13:52:58 -0700 (PDT) Received: from [10.33.192.35] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id 4sm13132790qak.11.2013.10.31.13.52.57 for (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 31 Oct 2013 13:52:57 -0700 (PDT) Content-Type: text/plain; charset=windows-1252 Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\)) From: Brian Rosen In-Reply-To: <5272BAA3.4040401@bbn.com> Date: Thu, 31 Oct 2013 16:52:55 -0400 Content-Transfer-Encoding: quoted-printable Message-Id: <53607A01-B2EA-4C6A-85AE-5070085E423B@brianrosen.net> References: <5272BAA3.4040401@bbn.com> To: Stephen Kent X-Mailer: Apple Mail (2.1816) Cc: "stir@ietf.org" , Jon Peterson Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 20:53:05 -0000 I=92m not necessarily opposed, but let=92s spend a bit of time thinking = about this. If we assume, as we have so far, that we have a database that holds = credentials, and everyone gets the credentials from the database, then a = lot of the WebPKI problems don=92t occur. We don=92t really care who signed the cert if the right cert is in the = database for the TN. It could be self signed, and it would be okay. = Not ideal, but okay. Our vulnerabilities are who can change the record in the database, and = what kind of MITM mischief could occur in fetching an entry from the = database. Improperly issuing a cert or even a whole lot of them, isn=92t = a problem per se. Even something as really bad as leaking the private key of the CA = wouldn=92t take us down. We=92d get worried about recent entries, but = as long as we=92re sure the entity writing to the database is who we = think it is, it=92s not a big problem, right? What are the WebPKI problems do you think we care about? Brian On Oct 31, 2013, at 4:16 PM, Stephen Kent wrote: > Jon, >=20 >> I think we're mostly on the same page here, though the question of = whether >> something like web PKI is still relevant largely depends on how real = we >> think DANE is. No question that it would be better, and that the = warts of >> web PKI grow increasingly ugly. But I haven't heard a lot of = enthusiasm >> from browser vendors, say, about DANE (I haven't taken this = temperature >> super recently, though, so that may just be stale information). I = also >> think that despite its warts, the world is still better off with web = PKI >> today than it would be if it all went away with nothing to replace = it. >>=20 >> I'm not sure I could predict with total certainty where the market is >> going to go with all this. When I'm in that position, I tend to favor = a >> certain amount of flexibility rather than gambling it all on one = number on >> the roulette wheel. >>=20 > How about a compromise; we strong recommend DANE, and characterize > the WebPKI as a fallback, with caveats. >=20 > Steve > _______________________________________________ > stir mailing list > stir@ietf.org > https://www.ietf.org/mailman/listinfo/stir From kent@bbn.com Thu Oct 31 14:35:45 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C732C11E818E for ; Thu, 31 Oct 2013 14:35:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -106.534 X-Spam-Level: X-Spam-Status: No, score=-106.534 tagged_above=-999 required=5 tests=[AWL=0.065, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CcudPk+wtJrh for ; Thu, 31 Oct 2013 14:35:31 -0700 (PDT) Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id 031CF21F9EED for ; Thu, 31 Oct 2013 14:35:18 -0700 (PDT) Received: from dhcp89-089-218.bbn.com ([128.89.89.218]:52342) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from ) id 1Vbztb-000JBT-06; Thu, 31 Oct 2013 17:35:15 -0400 Message-ID: <5272CD12.50802@bbn.com> Date: Thu, 31 Oct 2013 17:35:14 -0400 From: Stephen Kent User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0 MIME-Version: 1.0 To: Brian Rosen References: <5272BAA3.4040401@bbn.com> <53607A01-B2EA-4C6A-85AE-5070085E423B@brianrosen.net> In-Reply-To: <53607A01-B2EA-4C6A-85AE-5070085E423B@brianrosen.net> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Cc: "stir@ietf.org" Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 21:35:45 -0000 Brian, > I’m not necessarily opposed, but let’s spend a bit of time thinking about this. > > If we assume, as we have so far, that we have a database that holds credentials, and everyone gets the credentials from the database, then a lot of the WebPKI problems don’t occur. > We don’t really care who signed the cert if the right cert is in the database for the TN. It could be self signed, and it would be okay. Not ideal, but okay. I did not realize that the model we were specifying had the properties you describe. I though that a caller (or an intermediary acting on its behalf) might send a signed token as part of call setup, and the callee (or an intermediary acting on its behalf) would acquire a credential to verify that token. Whether that credential comes from "a database" or is fetched using a URL passed as part of call setup, or whatever was not clear to me. Also, if one makes use of PKI technology, the database need not, itself, be trusted, so the fact that a credential comes form a database does not ensure that it's valid, of authoritative for the asserted caller ID. > Our vulnerabilities are who can change the record in the database, and what kind of MITM mischief could occur in fetching an entry from the database. Improperly issuing a cert or even a whole lot of them, isn’t a problem per se. It sounds as though you have a very specific DB model in mind, which I didn't see as an intrinsic part of the spec Jon et al. were writing. > Even something as really bad as leaking the private key of the CA wouldn’t take us down. We’d get worried about recent entries, but as long as we’re sure the entity writing to the database is who we think it is, it’s not a big problem, right? ibid. > What are the WebPKI problems do you think we care about? > The biggest problem with the WebPKI is that is enables ANY trust anchor to issue a cert for ANY subject, and the cert will be accepted. This means that a secruity breach at ANY TA is very bad. Steve From richard@shockey.us Thu Oct 31 15:20:14 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2749F21F9F20 for ; Thu, 31 Oct 2013 15:20:14 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -101.949 X-Spam-Level: X-Spam-Status: No, score=-101.949 tagged_above=-999 required=5 tests=[AWL=0.316, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6pzS5-JLoNjN for ; Thu, 31 Oct 2013 15:20:09 -0700 (PDT) Received: from oproxy7-pub.mail.unifiedlayer.com (oproxy7-pub.mail.unifiedlayer.com [67.222.55.9]) by ietfa.amsl.com (Postfix) with SMTP id B2AD911E81EB for ; Thu, 31 Oct 2013 15:20:05 -0700 (PDT) Received: (qmail 2824 invoked by uid 0); 31 Oct 2013 22:19:38 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy7.mail.unifiedlayer.com with SMTP; 31 Oct 2013 22:19:38 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=xbPCmFOrGdZhTcfxQ45ceVRd2e2GNgyaGBF1xCSwEro=; b=Vu0orDnWNWWXHL6S+RRZUcz+ten10zKiJ8Hwu8nbJdnvpuHddQBOMIczu+ibuOpguf1PmR4G4QNkOrJbzmpWrr8p/Jla5ZjTD+48kr5dgWrzh0LTR7CUay0F6JagPWZ7; Received: from [173.79.179.104] (port=54652 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1Vc0aX-00074o-Sm; Thu, 31 Oct 2013 16:19:38 -0600 From: "Richard Shockey" To: "'Gorman, Pierce A [NTK]'" , "'Michael Hammer'" , , , References: <52726F56.1000002@bbn.com> <00C069FD01E0324C9FFCADF539701DB3BBEF4B80@sc9-ex2k10mb1.corp.yaanatech.com> In-Reply-To: Date: Thu, 31 Oct 2013 18:19:37 -0400 Message-ID: <024301ced687$49be4b60$dd3ae220$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Content-Language: en-us Thread-Index: AQLzdbJUyILWLur+SY/15zn9Mwkp5AFN59pwAi0psv0BdJXDEpeepJeA X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 22:20:14 -0000 Guilty as charged. Digits travel well. And +1 to the rest of your sentiment here. -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Gorman, Pierce A [NTK] Sent: Thursday, October 31, 2013 2:40 PM To: Michael Hammer; jon.peterson@neustar.biz; kent@bbn.com; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 I heard a remark from the panel at an Acme Packet Interconnect conference a few years ago (by Richard Shockey?) that E.164 numbers are an international language that do not require multiple character sets or PUNYcode. I agree study of non-TN authentication is valuable but a solution specific to TNs seems cardinal. Best regards, Pierce Gorman Voice Architecture Core Planning/Sprint 913-439-4368 (Desk) -----Original Message----- From: Michael Hammer [mailto:michael.hammer@yaanatech.com] Sent: October 31, 2013 11:27 AM To: jon.peterson@neustar.biz; kent@bbn.com; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, Understand being flexible and covering all fronts. But, if it gets watered down to a least common denominator that doesn't meet the requirements for TN, I think that would be a failure. Mike -----Original Message----- From: Peterson, Jon [mailto:jon.peterson@neustar.biz] Sent: Thursday, October 31, 2013 12:06 PM To: Stephen Kent; Michael Hammer; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 I certainly don't suggest to blur that distinction between credentials with different strengths. What I do suggest though is that there is room here to make a clear break between: 1) the process by which we sign/verify with credentials 2) the process by which we acquire credentials and ascertain their authority over an ID That is true, and I would argue useful for us in a divide-and-conquer work flow, whether or not there are multiple ways of doing (2). But I think the fact that there are upcoming technologies that aren't yet prime time, like DANE, indicates that there might need to be multiple ways to do (2). Even if we assume a world that is all certificates, there may still be multiple ways for a verifier to acquire them: a cert might be tacked on to a SIP request itself, found in the verifier cache, downloaded using any of a number of protocols. What I'm concerned about is assuming a vertical "one true way" at this stage in our process. Jon Peterson Neustar, Inc. On 10/31/13 7:55 AM, "Stephen Kent" wrote: >Jon, > >I must respectfully disagree on this point. > >The WebPKI is not, from s secruity perspective, comparable to use of >DANE (for DNS-based names) or a telephone-number-based PKI based on >national-level authorities. If modularity is intended to blur the >distinctions among all of these, we are doing a disservice to readers, >implementers, etc. > >Steve > > ________________________________ This e-mail may contain Sprint proprietary information intended for the sole use of the recipient(s). Any use by others is prohibited. If you are not the intended recipient, please contact the sender and delete all copies of the message. _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir From richard@shockey.us Thu Oct 31 15:28:44 2013 Return-Path: X-Original-To: stir@ietfa.amsl.com Delivered-To: stir@ietfa.amsl.com Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B5EB311E81EB for ; Thu, 31 Oct 2013 15:28:44 -0700 (PDT) X-Virus-Scanned: amavisd-new at amsl.com X-Spam-Flag: NO X-Spam-Score: -102.043 X-Spam-Level: X-Spam-Status: No, score=-102.043 tagged_above=-999 required=5 tests=[AWL=0.556, BAYES_00=-2.599, USER_IN_WHITELIST=-100] Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5P7sVFGRFuOJ for ; Thu, 31 Oct 2013 15:28:40 -0700 (PDT) Received: from qproxy1-pub.mail.unifiedlayer.com (qproxy1-pub.mail.unifiedlayer.com [173.254.64.10]) by ietfa.amsl.com (Postfix) with SMTP id 119D311E8255 for ; Thu, 31 Oct 2013 15:28:39 -0700 (PDT) Received: (qmail 22068 invoked by uid 0); 31 Oct 2013 22:28:15 -0000 Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by qproxy1.mail.unifiedlayer.com with SMTP; 31 Oct 2013 22:28:15 -0000 DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:To:From; bh=Wkt4qColWLvqBGKQ6wzAm0BEFIu5dCWcq/18l6ZC1kk=; b=V9g0O1iTyn2gp+GXYcJObnrdg+GobnzSIwKtyq3upJCnF1DhTS4LEnJ3leMVpJRiU1BD7YbRYShKYblfjZ3eJEBZ5E/6txvE67K+llmlJduZiaV6JXZDiAMKDXbiSzLW; Received: from [173.79.179.104] (port=54706 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from ) id 1Vc0it-0005Pn-EU; Thu, 31 Oct 2013 16:28:15 -0600 From: "Richard Shockey" To: "'Stephen Kent'" , "'Peterson, Jon'" , References: <5272BAA3.4040401@bbn.com> In-Reply-To: <5272BAA3.4040401@bbn.com> Date: Thu, 31 Oct 2013 18:28:14 -0400 Message-ID: <024a01ced688$7e3a9d70$7aafd850$@shockey.us> MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit X-Mailer: Microsoft Outlook 15.0 Content-Language: en-us Thread-Index: AQHRmxqDsub22j0LlNRMHccWUskYcwJ9x8RYmfXqRiA= X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us} Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 X-BeenThere: stir@ietf.org X-Mailman-Version: 2.1.12 Precedence: list List-Id: Secure Telephone Identity Revisited List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 31 Oct 2013 22:28:44 -0000 I would strongly caution that issues surrounding the E.164 numbering plan and the databases that enable them are in fact national specific issues enabled in law. We only may be able to make Recommendations on implementation of STIR key management structures we may not be able to impose them. This is a fluid situation at this point. To be blunt I'm not sure what is the best recommendation or course of action we can make to the NRA's. As you point out the record on PKI is mixed. That said number assignment authorities and those that receive the resource are a more limited and restricted subset and that may actually work to our advantage. -----Original Message----- From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Stephen Kent Sent: Thursday, October 31, 2013 4:17 PM To: Peterson, Jon; stir@ietf.org Subject: Re: [stir] comment on draft-jennings-stir-rfc4474bis-00 Jon, > I think we're mostly on the same page here, though the question of > whether something like web PKI is still relevant largely depends on > how real we think DANE is. No question that it would be better, and > that the warts of web PKI grow increasingly ugly. But I haven't heard > a lot of enthusiasm from browser vendors, say, about DANE (I haven't > taken this temperature super recently, though, so that may just be > stale information). I also think that despite its warts, the world is > still better off with web PKI today than it would be if it all went away with nothing to replace it. > > I'm not sure I could predict with total certainty where the market is > going to go with all this. When I'm in that position, I tend to favor > a certain amount of flexibility rather than gambling it all on one > number on the roulette wheel. > How about a compromise; we strong recommend DANE, and characterize the WebPKI as a fallback, with caveats. Steve _______________________________________________ stir mailing list stir@ietf.org https://www.ietf.org/mailman/listinfo/stir