Re: [cnit] CNIT Charter bashing..

Richard Shockey <richard@shockey.us> Fri, 12 June 2015 21:42 UTC

Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 20DC01B2B44 for <cnit@ietfa.amsl.com>; Fri, 12 Jun 2015 14:42:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2
X-Spam-Level:
X-Spam-Status: No, score=-2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8_cFyLH0UPqM for <cnit@ietfa.amsl.com>; Fri, 12 Jun 2015 14:42:36 -0700 (PDT)
Received: from qproxy1-pub.mail.unifiedlayer.com (qproxy1-pub.mail.unifiedlayer.com [173.254.64.10]) by ietfa.amsl.com (Postfix) with SMTP id 8CD311B2AF8 for <cnit@ietf.org>; Fri, 12 Jun 2015 14:42:36 -0700 (PDT)
Received: (qmail 23256 invoked by uid 0); 12 Jun 2015 21:42:34 -0000
Received: from unknown (HELO CMOut01) (10.0.90.82) by qproxy1.mail.unifiedlayer.com with SMTP; 12 Jun 2015 21:42:34 -0000
Received: from box462.bluehost.com ([74.220.219.62]) by CMOut01 with id fZC81q00M1MNPNq01ZCBPN; Fri, 12 Jun 2015 15:12:13 -0600
X-Authority-Analysis: v=2.1 cv=GeGEw2nL c=1 sm=1 tr=0 a=jTEj1adHphCQ5SwrTAOQMg==:117 a=jTEj1adHphCQ5SwrTAOQMg==:17 a=cNaOj0WVAAAA:8 a=f5113yIGAAAA:8 a=j1VUBDpLDLYA:10 a=IkcTkHD0fZMA:10 a=MKtGQD3n3ToA:10 a=1oJP67jkp3AA:10 a=ZZnuYtJkoWoA:10 a=8WrITzYgnNwA:10 a=-h4zUWlAkX4A:10 a=XAFQembCKUMA:10 a=ZsyXEVtvAAAA:8 a=48vgC7mUAAAA:8 a=z9tbli-vAAAA:8 a=N-o-GFsCB7nXL0PJcZYA:9 a=L4t86ZUlS2-xI8Jf:21 a=GWvnqYzpQXeMEOCQ:21 a=QEXdDO2ut3YA:10
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default; h=Content-transfer-encoding:Content-type:Mime-version:In-Reply-To:References:Message-ID:To:From:Subject:Date; bh=rygIzk6pMvb0WqrtUKupcJt/SrjhjWxgmpgjDMvYa8A=; b=nsfaKvrZ5vzhXjlobiukpfsJdKd1fOQEMO5CVpemgUTdRdDOozRm4KHE5imibwzoCbU8GniL0GrIzGaAgTf95UAg/5GsYDx0CUkjQo3MzuNF2ASCxoszk67y+Q9PIT35;
Received: from [108.56.131.149] (port=52257 helo=[192.168.1.11]) by box462.bluehost.com with esmtpa (Exim 4.84) (envelope-from <richard@shockey.us>) id 1Z3WPF-0005dT-Bp; Fri, 12 Jun 2015 15:22:29 -0600
User-Agent: Microsoft-MacOutlook/14.5.1.150515
Date: Fri, 12 Jun 2015 17:22:25 -0400
From: Richard Shockey <richard@shockey.us>
To: "Dwight, Timothy M (Tim)" <timothy.dwight@verizon.com>, cnit@ietf.org
Message-ID: <D1A0C073.26F5F%richard@shockey.us>
Thread-Topic: [cnit] CNIT Charter bashing..
References: <D19F23AD.26CEA%richard@shockey.us> <E42CCDDA6722744CB241677169E8365603614617@MISOUT7MSGUSRDB.ITServices.sbc.com> <9588_1434045613_5579CCAD_9588_574_1_fki5dyxdmgyv92b6hugpfuoy.1434045608655@email.android.com> <E6A16181E5FD2F46B962315BB05962D07D354C94@fcc.gov> <9384_1434103912_557AB068_9384_7221_1_B5939C6860701C49AA39C5DA5189448B14C216E0@OPEXCLILM42.corporate.adroot.infra.ftgroup> <D1A05A04.26E84%richard@shockey.us> <E6A16181E5FD2F46B962315BB05962D07D355543@fcc.gov> <557AE9E4.5030205@cs.tcd.ie> <D1A0761F.26EE1%richard@shockey.us> <15E9AA29-E9F1-4DA6-ADA4-E201F8F07B7A@brianrosen.net> <2B0F677F0B95454297753F58D4A07FA30279326B72@FHDP1LUMXC7V31.us.one.verizon.com> <D1A0B222.26F46%richard@shockey.us> <2B0F677F0B95454297753F58D4A07FA30279326D6D@FHDP1LUMXC7V31.us.one.verizon.com>
In-Reply-To: <2B0F677F0B95454297753F58D4A07FA30279326D6D@FHDP1LUMXC7V31.us.one.verizon.com>
Mime-version: 1.0
Content-type: text/plain; charset="UTF-8"
Content-transfer-encoding: quoted-printable
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 108.56.131.149 authed with richard+shockey.us}
Archived-At: <http://mailarchive.ietf.org/arch/msg/cnit/HupITNGanjUhx3ibdgzAT-N1IUk>
Subject: Re: [cnit] CNIT Charter bashing..
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit/>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 12 Jun 2015 21:42:39 -0000

Yes Tim.  Thank you very very much. You cut to the chase of the problem
here.  Its not technology its policy and no matter how you end up looking
at this its National Policy.

KISS I just want to define the CNIT object and SIP headers and NOTHING
ELSE.  IF this should progress in the IETF that needs to be understood.

That said and this is not the carrier business case mailing list.  We all
know the problem has advanced to the point of degrading the value
proposition of the realtime communications service in North America. I’ve
argued endlessly in talks that “Protect what you have” makes sense and as
Henning correctly points out there is a business case for adding value
here to SIP based realtime communications across all the access platforms
including VoLTE and definitely enterprise and there is a real and
important Public Safety component here as well.

We know how this should work.  My Doctor wants to talk to me ASAP about my
medical test results. She wants to display to me that she is exactly who
she says she is and that should be possible so I don’t instantly drop the
call to voice mail or worse.  Her office is served by VZ my mobile is
served by ATT. My ATT VoLTE CUA should be able to trust…by multiple means
(including big yellow optical cable) that the INVITE is actually coming
from VZ.  I see some data on my phone etc I run out of what ever room I’m
in and take the call because I trust the SIP session.

BTW this is equally relevant if the call is initiated by Fairfax County
Public safety.

<begin non relevant rant>

We are trying to protect a 150+ Billion dollar business for SP’s which
represents voice across all the access platforms. I’m not going to support
third party business issues. We all want point to point video and it can
work if we can display who the heck is calling.

OTT is not a issue. Believe me. Get the Telegeography data on OTT
penetration in NA and its stunning once N America went to near flat rate
on voice the threat subsided. OK margins got shot but so did OPEX on
transport.  Our European friends are totally insane.  They are still
addicted to the drug of calling party pays and insane translation costs
then whine to the EU Commission about WhatsAPP etc. They need rehab.

That said our Congresscritter friends are one bunch of pissed off puppies
and at some point they will do some really really stupid if we don’t come
up with a plan. 




On 6/12/15, 4:42 PM, "Dwight, Timothy M (Tim)"
<timothy.dwight@verizon.com> wrote:

>Yes, it's a business issue.  Brian wants the protocols to allow him to
>insert an unverifiable advertisement that his data is "good".
>
>If allowing this moves us forward, fine.  There's always some noise in
>the system.  But if this becomes a big topic of debate we need to take it
>out.  It's clearly not essential, and probably not even useful.
>
>Tim
>
>
>-----Original Message-----
>From: Richard Shockey [mailto:richard@shockey.us]
>Sent: Friday, June 12, 2015 3:01 PM
>To: Dwight, Timothy M (Tim)
>Subject: Re: [cnit] CNIT Charter bashing..
>
>
>
>On 6/12/15, 12:56 PM, "Dwight, Timothy M (Tim)"
><timothy.dwight@verizon.com> wrote:
>
>>Who would assign the confidence value?
>
>Tinker bellŠ.the tooth fairy. :-)
>
>This could get really ugly and spawn endless lawsuits but its a
>reasonable idea if someone has a appropriate bayesian algorithm to apply
>to this at the terminating SBC.
>
>
>>If it's assigned by the entity that operates the calling name database,
>>why would it ever be less than the highest possible value?  If it's set
>>by some other entity, on what basis do they determine the value they
>>assign?  It seems like we're going to stumble over business issues.
>>
>>Tim
>>
>>
>>-----Original Message-----
>>From: cnit [mailto:cnit-bounces@ietf.org] On Behalf Of Brian Rosen
>>Sent: Friday, June 12, 2015 11:28 AM
>>To: Richard Shockey
>>Cc: philippe.fouquart@orange.com; Henning Schulzrinne; cnit@ietf.org;
>>Stephen Farrell
>>Subject: Re: [cnit] CNIT Charter bashing..
>>
>>One possible extra bit is that we need to know WHO signed.  That could
>>be easy (identity in a cert for the signature), but it¹s a requirement.
>>
>>I still want an optional confidence value, because the source is often
>>not authoritative.
>>
>>If we¹re thinking we¹re using the existing display name, and coming up
>>with a way to sign it, then, like stir, the termination side can decide
>>what it wants to do if it gets a display name but no signature.  The
>>sender has the option to provide the name or not, and provide the
>>signature or not.
>>
>>We COULD consider a new header that would contain the name encrypted
>>for a destination TN (To:).  That would afford privacy to the name to
>>middle boxes that we would not have today with display name.  I would
>>not be opposed to that.  This would work like the offline stir
>>proposal, where the sender obtains the public key of the recipient and
>>encrypts the name for the recipient.
>>
>>Brian
>>
>>> On Jun 12, 2015, at 8:49 AM, Richard Shockey <richard@shockey.us>
>>>wrote:
>>> 
>>> 
>>> Henning is right. No one is forcing anything. Existing anonymous
>>> calling protections still apply.
>>> 
>>> 
>>> Again my point is that is a great many cases Interconnected SIP
>>> between NA carriers are covered by other security mechanisms.
>>> 
>>> Right now your Facetime session is totally in the clear. My concern
>>> is we end up going down the rat hole of trying to create perfect end
>>> to end security nothing will get done.
>>> 
>>> 
>>> 
>>> On 6/12/15, 10:17 AM, "Stephen Farrell" <stephen.farrell@cs.tcd.ie>
>>>wrote:
>>> 
>>>> 
>>>> 
>>>> On 12/06/15 15:13, Henning Schulzrinne wrote:
>>>>> In almost all cases of interest, the calling party *wants* to
>>>>> disclose accurate information to the called party, so the privacy
>>>>> issues don't seem to arise. They would only arise if there was
>>>>> forced disclosure; I don't think anybody is proposing that.
>>>> 
>>>> Privacy issues could also arise if a middlebox could now see
>>>> sensitive information that it previously could not see. I think that
>>>> is independent of whether disclosure is desired by either of the
>>>> endpoints.
>>>> 
>>>> S.
>>>> 
>>>> _______________________________________________
>>>> cnit mailing list
>>>> cnit@ietf.org
>>>> https://www.ietf.org/mailman/listinfo/cnit
>>> 
>>> 
>>> _______________________________________________
>>> cnit mailing list
>>> cnit@ietf.org
>>> https://www.ietf.org/mailman/listinfo/cnit
>>
>>_______________________________________________
>>cnit mailing list
>>cnit@ietf.org
>>https://www.ietf.org/mailman/listinfo/cnit
>>_______________________________________________
>>cnit mailing list
>>cnit@ietf.org
>>https://www.ietf.org/mailman/listinfo/cnit
>
>