Re: [cnit] CNIT Charter bashing..

"Dwight, Timothy M (Tim)" <timothy.dwight@verizon.com> Sat, 13 June 2015 22:47 UTC

Return-Path: <timothy.dwight@verizon.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 861711B3171 for <cnit@ietfa.amsl.com>; Sat, 13 Jun 2015 15:47:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.101
X-Spam-Level:
X-Spam-Status: No, score=-4.101 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, GB_I_LETTER=-2, J_CHICKENPOX_56=0.6, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jfYjNMQ3luYW for <cnit@ietfa.amsl.com>; Sat, 13 Jun 2015 15:47:40 -0700 (PDT)
Received: from omzsmtpe01.verizonbusiness.com (omzsmtpe01.verizonbusiness.com [199.249.25.210]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B229A1B3170 for <cnit@ietf.org>; Sat, 13 Jun 2015 15:47:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=verizon.com; i=@verizon.com; q=dns/txt; s=corp; t=1434235659; x=1465771659; h=from:to:cc:date:subject:message-id:references: in-reply-to:content-transfer-encoding:mime-version; bh=xcMBDz4P4hSh9iJtBDA4kQ8Jw2vgpxmw1+JFzj8SACU=; b=lDUBmjzsnUY2/Pxms/EaEmbxGSNyDxkV/Itc8nD2P9GyQOfPZiMOLPw3 GHl2LNS8oFYIvCdWovFceCdd9VhKbdi1AApu0t202VhCIQafxbbr84c68 Mhs7vFcz+LCGGiliBdLltADFmI1vwp/3CRlbIIlTp3XCJvnhmwbO6zsIy k=;
X-IronPort-Anti-Spam-Filtered: false
Received: from unknown (HELO fldsmtpi01.verizon.com) ([166.68.71.143]) by omzsmtpe01.verizonbusiness.com with ESMTP; 13 Jun 2015 22:47:37 +0000
From: "Dwight, Timothy M (Tim)" <timothy.dwight@verizon.com>
X-IronPort-AV: E=Sophos;i="5.13,610,1427760000"; d="scan'208";a="35394104"
Received: from fhdp1lumxc7hb05.verizon.com (HELO FHDP1LUMXC7HB05.us.one.verizon.com) ([166.68.59.192]) by fldsmtpi01.verizon.com with ESMTP; 13 Jun 2015 22:47:37 +0000
Received: from FHDP1LUMXC7V31.us.one.verizon.com ([166.68.125.32]) by FHDP1LUMXC7HB05.us.one.verizon.com ([166.68.59.192]) with mapi; Sat, 13 Jun 2015 18:47:36 -0400
To: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>, Brian Rosen <br@brianrosen.net>
Date: Sat, 13 Jun 2015 18:47:35 -0400
Thread-Topic: [cnit] CNIT Charter bashing..
Thread-Index: AQHQpF27t1IjTQnD9Ee6If5FuC7/752nvtOAgAAcbYD//73Z54ABUaEAgAA9LQD//8LlU4AARHQAgAAZ6QCAAArCAIAAB9cAgAAPTgCAABkwgP//7x3tADGHMBA=
Message-ID: <2B0F677F0B95454297753F58D4A07FA30279326E8D@FHDP1LUMXC7V31.us.one.verizon.com>
References: <D19F23AD.26CEA%richard@shockey.us> <E42CCDDA6722744CB241677169E8365603614617@MISOUT7MSGUSRDB.ITServices.sbc.com> <9588_1434045613_5579CCAD_9588_574_1_fki5dyxdmgyv92b6hugpfuoy.1434045608655@email.android.com> <E6A16181E5FD2F46B962315BB05962D07D354C94@fcc.gov> <9384_1434103912_557AB068_9384_7221_1_B5939C6860701C49AA39C5DA5189448B14C216E0@OPEXCLILM42.corporate.adroot.infra.ftgroup> <D1A05A04.26E84%richard@shockey.us> <E6A16181E5FD2F46B962315BB05962D07D355543@fcc.gov> <557AE9E4.5030205@cs.tcd.ie> <D1A0761F.26EE1%richard@shockey.us> <15E9AA29-E9F1-4DA6-ADA4-E201F8F07B7A@brianrosen.net> <2B0F677F0B95454297753F58D4A07FA30279326B72@FHDP1LUMXC7V31.us.one.verizon.com> <53A932AB-5E5D-41C0-895F-21EC1D4B17D5@brianrosen.net>, <2B0F677F0B95454297753F58D4A07FA30279326CB7@FHDP1LUMXC7V31.us.one.verizon.com> <E6A16181E5FD2F46B962315BB05962D07D3558A5@fcc.gov>
In-Reply-To: <E6A16181E5FD2F46B962315BB05962D07D3558A5@fcc.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
acceptlanguage: en-US
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Archived-At: <http://mailarchive.ietf.org/arch/msg/cnit/D7JeNaGHOjHJAaFi2jeT2Y_C1oA>
Cc: "philippe.fouquart@orange.com" <philippe.fouquart@orange.com>, Stephen Farrell <stephen.farrell@cs.tcd.ie>, Richard Shockey <richard@shockey.us>, "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] CNIT Charter bashing..
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit/>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 13 Jun 2015 22:47:42 -0000

Henning,

I appreciate, and mostly agree with, your comments below.  Please see additional thoughts inline.

tim

-----Original Message-----
From: cnit [mailto:cnit-bounces@ietf.org] On Behalf Of Henning Schulzrinne
Sent: Friday, June 12, 2015 5:28 PM
To: Dwight, Timothy M (Tim); Brian Rosen
Cc: philippe.fouquart@orange.com; cnit@ietf.org; Stephen Farrell; Richard Shockey
Subject: Re: [cnit] CNIT Charter bashing..

Today's CNAM display has three problems:

(1) It is unclear to the recipient how the data got inserted and by whom. There is no realistic way for the callee to find out - good luck calling your phone company consumer support line and asking about CNAM database dips.

[tmd] People do call their service provider's "support line" about issues with calling name, and we do help them.  Nobody will claim that that's easy though.  The information can be obtained in various ways from various sources.  The proliferation of non-authoritative calling name databases sometimes leads to disputes over "whose data is correct", which can delay resolution.


(2) The caller has no idea what will be shown to any given called party - depending on the destination CNAM service, it could be the correct name, nothing, just "Florida", or maybe the name of the person who had the same number six months ago and hopefully didn't sell adult entertainment.

[tmd] I agree that the caller generally cannot know what will be shown to any given called party.  I don't agree that this is always a function of the _destination_ CNAM service, though.  In "conventional" CNAM services (ref: GR-1188) the terminating exchange does a TCAP query to obtain calling name information from the originating network.  The result is in that case dictated by the caller's service provider, since it is they (or a 3rd party to whom they subcontract this service) who reply to the query. 


(3) For some numbers, bad actors can insert any random information they choose, again with problem #1.

Even unsigned SIP display or Call-Info information, with some modicum of common behavior among carriers, will address all three problems, even if not perfectly, then most of the time. I may have no idea what validation Verizon uses to assure that their customers are indeed John Smith, but at least I know that I can tell who created the entry. A lawyer will know where to address the cease&desist letter if needed.

[tmd] That would be a clever lawyer.  As noted above, when incorrect calling name information is being displayed, it can be difficult to determine why.  I wish it were as simple as "if the caller is a Verizon customer, it must be Verizon's fault".  But it isn't.  Consider customers A and B.  A is a Verizon customer.  B is a CarrierB customer.  CarrierB uses 3rdPartyCnamLike service to obtain calling name information for incoming calls.  When A calls B, the name displayed to B doesn't come from Verizon. 


________________________________________
From: Dwight, Timothy M (Tim) [timothy.dwight@verizon.com]
Sent: Friday, June 12, 2015 3:21 PM
To: Brian Rosen
Cc: Richard Shockey; philippe.fouquart@orange.com; Henning Schulzrinne; cnit@ietf.org; Stephen Farrell
Subject: RE: [cnit] CNIT Charter bashing..

I guess as long as the derivation of the name (who is asserting it to be a valid representation of the caller, and from where did they get it) is clear to the receiving network, I guess this is OK.  I still have my doubts whether such a value will prove useful, given that its computation is not standardized.  But in some contexts, it might.

Tim


-----Original Message-----
From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Friday, June 12, 2015 12:51 PM
To: Dwight, Timothy M (Tim)
Cc: Richard Shockey; philippe.fouquart@orange.com; Henning Schulzrinne; cnit@ietf.org; Stephen Farrell
Subject: Re: [cnit] CNIT Charter bashing..

Yes, it would be assigned by the entity that signed the name.

It's not true that it would always be the highest possible value.  If the entity that provided it did that, the receiving entity might not believe it, and choose to use an alternative name source (or at least check another service to see what it thought).  Modern systems that collect names subject user data with verification sources that are getting very accurate, but those services have scoring systems that don't result in black/white results.  Older systems blithely accept whatever the customer says, and those are not accurate.  Some services have something simpler, like the name has to match a credit card name, but we know those are pretty spoofable these days.  Real systems use external verification services that provide scores for this kind of thing.

I'm simply proposing that we allow an optional confidence, in the range of 0-100, and that it be part of the data signed by the data provider.  No one has to send it, no one has to look at it.  But it represents what is state of the art these days on asserting names and I think it's valuable.

Brian
> On Jun 12, 2015, at 9:56 AM, Dwight, Timothy M (Tim) <timothy.dwight@verizon.com> wrote:
>
> Who would assign the confidence value?  If it's assigned by the entity that operates the calling name database, why would it ever be less than the highest possible value?  If it's set by some other entity, on what basis do they determine the value they assign?  It seems like we're going to stumble over business issues.
>
> Tim
>
>
> -----Original Message-----
> From: cnit [mailto:cnit-bounces@ietf.org] On Behalf Of Brian Rosen
> Sent: Friday, June 12, 2015 11:28 AM
> To: Richard Shockey
> Cc: philippe.fouquart@orange.com; Henning Schulzrinne; cnit@ietf.org; 
> Stephen Farrell
> Subject: Re: [cnit] CNIT Charter bashing..
>
> One possible extra bit is that we need to know WHO signed.  That could be easy (identity in a cert for the signature), but it's a requirement.
>
> I still want an optional confidence value, because the source is often not authoritative.
>
> If we're thinking we're using the existing display name, and coming up with a way to sign it, then, like stir, the termination side can decide what it wants to do if it gets a display name but no signature.  The sender has the option to provide the name or not, and provide the signature or not.
>
> We COULD consider a new header that would contain the name encrypted for a destination TN (To:).  That would afford privacy to the name to middle boxes that we would not have today with display name.  I would not be opposed to that.  This would work like the offline stir proposal, where the sender obtains the public key of the recipient and encrypts the name for the recipient.
>
> Brian
>
>> On Jun 12, 2015, at 8:49 AM, Richard Shockey <richard@shockey.us> wrote:
>>
>>
>> Henning is right. No one is forcing anything. Existing anonymous 
>> calling protections still apply.
>>
>>
>> Again my point is that is a great many cases Interconnected SIP 
>> between NA carriers are covered by other security mechanisms.
>>
>> Right now your Facetime session is totally in the clear. My concern 
>> is we end up going down the rat hole of trying to create perfect end 
>> to end security nothing will get done.
>>
>>
>>
>> On 6/12/15, 10:17 AM, "Stephen Farrell" <stephen.farrell@cs.tcd.ie> wrote:
>>
>>>
>>>
>>> On 12/06/15 15:13, Henning Schulzrinne wrote:
>>>> In almost all cases of interest, the calling party *wants* to 
>>>> disclose accurate information to the called party, so the privacy 
>>>> issues don't seem to arise. They would only arise if there was 
>>>> forced disclosure; I don't think anybody is proposing that.
>>>
>>> Privacy issues could also arise if a middlebox could now see 
>>> sensitive information that it previously could not see. I think that 
>>> is independent of whether disclosure is desired by either of the 
>>> endpoints.
>>>
>>> S.
>>>
>>> _______________________________________________
>>> cnit mailing list
>>> cnit@ietf.org
>>> https://www.ietf.org/mailman/listinfo/cnit
>>
>>
>> _______________________________________________
>> cnit mailing list
>> cnit@ietf.org
>> https://www.ietf.org/mailman/listinfo/cnit
>
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit


_______________________________________________
cnit mailing list
cnit@ietf.org
https://www.ietf.org/mailman/listinfo/cnit