Re: [dispatch] New I-D - SPIN - on voice/video interop between app providers

Eric Rescorla <ekr@rtfm.com> Sun, 24 July 2022 14:52 UTC

Return-Path: <ekr@rtfm.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FB8AC16ED01 for <dispatch@ietfa.amsl.com>; Sun, 24 Jul 2022 07:52:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.804
X-Spam-Level:
X-Spam-Status: No, score=-1.804 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=rtfm-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lHUwYo3U-ueq for <dispatch@ietfa.amsl.com>; Sun, 24 Jul 2022 07:52:25 -0700 (PDT)
Received: from mail-io1-xd32.google.com (mail-io1-xd32.google.com [IPv6:2607:f8b0:4864:20::d32]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 72281C16ECF0 for <dispatch@ietf.org>; Sun, 24 Jul 2022 07:52:25 -0700 (PDT)
Received: by mail-io1-xd32.google.com with SMTP id q14so6970945iod.3 for <dispatch@ietf.org>; Sun, 24 Jul 2022 07:52:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=rtfm-com.20210112.gappssmtp.com; s=20210112; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=XQKCg5UdYpTaol8pQOGqNufqVXDRZMx4m+Cq4FXsw+w=; b=QaY21h1w0bvxsCxSkYY8u78u5sDZ5gQZyfhQ2aM3YrUidVE0876F1LssNubGvV9LzE y4Fh7WoKXgMBgvRBCtObrLvl/jYqQSaRpOtBWGPyYwhCoC+7U40CBXHZa8azfUBWmWIf zVUd0pxM/lUduMzwQcFvSJL+kpaQrcXFD7qjbOG+ekYjE8+ldnYuipndJuWtZmnCpa/z APenFIB0NMZ5Q5+i41T4fSpazuGK8a7RI0OcPHGVnKNo7MGevi9kmLzIck6ld+ytceAQ gboLwIEpMNmERI8bwLUNN3XcS0/UkoVqK1ODO3b0XQeAfZVWi22E349BYcikK4hgyQlY xaGQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=XQKCg5UdYpTaol8pQOGqNufqVXDRZMx4m+Cq4FXsw+w=; b=z1nZdlGi26sLuKBW/iJn2M2vgJjqAY2eLPz+CsshmjEJA0zPDp8WCu4EpgdekzRvsh 0WfZo29ci46yhHdeh/uU2Dt9zDzMxaSqr3EftOhZgiCBkYMNl1Wc7U8m5EC0/s7j8RLE KwUWjc5WumEZ2LI1thWTvh9jIHbwRcaTKiB0zAKOfzR25jy3KcviJScfWgl2wiPeI3fy /qFfE9GRXfdz4wCgXARuzrLXtMzXQYoyQgM85rxQlIIqqviDGqHWY0WLLIQ231MOI1P9 XgdDVJpH8jsjZvlvvO1qOeA/pGhgAVhBIb4Hso89Up2jNZeoAMZq0nzzAd5zn0cOuo7+ ywpQ==
X-Gm-Message-State: AJIora+1ArANgeh82iSjmeUpWZBqtpUUpwPMepLLf9t5v6MVAP2cuIJX hzNxjminExMS+cTA3yiJL7cwNjnd1x+f1wWi2kDyJ6vl1rg=
X-Google-Smtp-Source: AGRyM1vQYkDsOgkwK34UT1YuFXad4Mm+Q1SeT06jVw/nVnfHGTxPWqjRgATfgdJnl/Y7Xag1BTiLNs6WIQc79A37gDY=
X-Received: by 2002:a6b:794d:0:b0:66c:ec39:7d83 with SMTP id j13-20020a6b794d000000b0066cec397d83mr3022774iop.199.1658674344780; Sun, 24 Jul 2022 07:52:24 -0700 (PDT)
MIME-Version: 1.0
References: <CA+23+fFReP7fi2XmhGoxmeUph8F7HcABsFwriXPzBvuBPBXLMg@mail.gmail.com> <CABcZeBME68imZqnOqc3hE7OOHWsTgRz+c1y9NKTT6vUHfSCLsQ@mail.gmail.com> <CA+23+fECuFKC9KPiJD0rugw4TWwDEsJr6MtGPVdLmsr4iopAjQ@mail.gmail.com> <CABcZeBNWqY3z4TCwpg6f0hTdDwc_rD+ReJ0M8Nyz_v5EUcUmow@mail.gmail.com> <BD6088D2-5C18-49F6-BB01-694102749E8B@shockey.us> <D6696BD1-8BC1-4408-9F62-3F56A1FEBF90@team.neustar> <CABcZeBPZqgayzsiT2HNnqqq5_kKtQfZHhCMSDdYV93xp+2DdhQ@mail.gmail.com> <FF67A8A2-AA17-4B69-94F5-EB72B6DED54F@team.neustar>
In-Reply-To: <FF67A8A2-AA17-4B69-94F5-EB72B6DED54F@team.neustar>
From: Eric Rescorla <ekr@rtfm.com>
Date: Sun, 24 Jul 2022 07:51:48 -0700
Message-ID: <CABcZeBMc8p6R_qXC9R7UGfxyyCeJ5S2_v_WNdGGC0Q0GR8u=kw@mail.gmail.com>
To: "Peterson, Jon" <jon.peterson@team.neustar>
Cc: Richard Shockey <richard@shockey.us>, Jonathan Rosenberg <jdrosen@jdrosen.net>, DISPATCH <dispatch@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001e89f905e48e3737"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/Ep5v4c3-tTkPXXazq3d3KoDlZ5k>
Subject: Re: [dispatch] New I-D - SPIN - on voice/video interop between app providers
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Jul 2022 14:52:29 -0000

On Sun, Jul 24, 2022 at 7:36 AM Peterson, Jon <jon.peterson@team.neustar>
wrote:

>
>
> I do want to clarify that I'm not suggesting that applications should
> vouch for themselves. Rather, I am suggesting that there be a set of
> certificate authorities which require applications to do proof of
> possession and then issue them a credential which is publicly verifiable.
>
>
>
> Understood – I meant just that it’s then up to the applications themselves
> to conduct their own proof-of-possession, to exercise the routing system to
> reach themselves (at the time etc. of their choosing), versus having the
> peer who wants to communicate with them exercise the routing system. Of
> course the result will be some kind of token/credential that rolls up to a
> trust anchor, maybe a STIR-ish one; my point was more that we could
> profitably focus on who secures that token and what is secured in it, and
> then compare different architectures for distribution/discovery of such
> tokens.
>
>
Maybe a topic for live conversation, but as I understand the SPIN
architecture:

1. The originator conducts the PoP and gets a token as you describe above.
2. It used that token to sign a message that it sends to the responder via
SMS.
3. The  responder responds, proving by the fact that it does so that it
received the message in (2).

Do I have that right?
-Ekr


>



> Jon Peterson
>
> Neustar (a TransUnion company)
>
> dispatch mailing list dispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/dispatch
> <https://urldefense.com/v3/__https:/www.ietf.org/mailman/listinfo/dispatch__;!!N14HnBHF!_TYntjGyg5uNCLSI_-nlD2HuOE9K-OLN5D_G2jWixsWT84fvv6ZIsEO4aFCBWl0enMPpdcIFAoY9yafOU56I$>
>
>