From nobody Sun Jul 24 14:25:26 2022
Return-Path: <rohan.mahy@wire.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1])
 by ietfa.amsl.com (Postfix) with ESMTP id 2663AC16ED04
 for <dispatch@ietfa.amsl.com>; Sun, 24 Jul 2022 14:25:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.805
X-Spam-Level: 
X-Spam-Status: No, score=-6.805 tagged_above=-999 required=5
 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1,
 HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5,
 RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001,
 SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001,
 URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001]
 autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key)
 header.d=wire-com.20210112.gappssmtp.com
Received: from mail.ietf.org ([50.223.129.194])
 by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024)
 with ESMTP id hsE6JXReT0LE for <dispatch@ietfa.amsl.com>;
 Sun, 24 Jul 2022 14:25:19 -0700 (PDT)
Received: from mail-lf1-x135.google.com (mail-lf1-x135.google.com
 [IPv6:2a00:1450:4864:20::135])
 (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits)
 key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256)
 (No client certificate requested)
 by ietfa.amsl.com (Postfix) with ESMTPS id 8E8FCC136304
 for <dispatch@ietf.org>; Sun, 24 Jul 2022 14:25:19 -0700 (PDT)
Received: by mail-lf1-x135.google.com with SMTP id bf9so15360502lfb.13
 for <dispatch@ietf.org>; Sun, 24 Jul 2022 14:25:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=wire-com.20210112.gappssmtp.com; s=20210112;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=0W80LyK5BvPdeMSpoEF1STkJ6oSM2J5+ZojcVAWoD1w=;
 b=M1HE5mO2KtoGpI+qf7QJGi2SuE2lbZJXP3m2MXnvjtGoYHHvvpunRMQ2yhA1adBpCA
 qTyAVhQ/6cO/q08ts3nE08edXsjFNYzGOqo03GwMvSru2bqO/UTKWQd7ioiTCLPLOsdf
 iq3M0RdvoHFda530ZbJcD5yiuZzJkigMNbXGl1IDj9GA4nLjgl5UdBeKwmMOakzmoyX5
 j1+Ue+1ooSbjXSyfRpkI2zi+/53d0iYQ2lrDgz0t4zxAoS+RyU5PiBdV0fG8AgCrj0kS
 PDJBaR4BxfzfHxK69vQpFJMu0ZpQrOqDAgOcoGaLFbwUHsXdtzwa5t+lNROcLxjRM/JD
 FQNA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20210112;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=0W80LyK5BvPdeMSpoEF1STkJ6oSM2J5+ZojcVAWoD1w=;
 b=PB+UzoUForQWnijXJiSMDjt29fIDUHbBeY1JA/cYNgTa/gw6Qup5MeQkGsOhSaQlsE
 VI06CGuh+Dw4g/mAJE2r6hZYlnVrZzIIz4GuyX56vtL7jNAA3jmhvtNg/G538Fuh3RXI
 du/2gNcS7HqvlybohV2Ehozj1psL+hs/if8cIK5XCNue+h+VuytmjbLEoYXIG6YeRfIH
 q3vg2Ir+j1ywG3oGLKO3EsJznC86KrCxrWxmXdP4JLHDpUKBhxD6nAfMS+/b6rI6tvR9
 Y0Z3zOnBUKN1NsZaoowSsditjfB8ODPqQUogHEviFIaecIsvI8vp6g1QXi03BMfDgHnC
 Wrdw==
X-Gm-Message-State: AJIora8Yx0zT5+fdQ1d7RnxFTo6gtE+pcZi03hJFRFbJPFHVgpsnDm3l
 pGu7f1k0R6MfA8ee0vYnauoQ7jQkD66FLcGL2vNuOg==
X-Google-Smtp-Source: AGRyM1szy5XM0mEMJ01qVjI57uGR8Qezacl0VKAZgYzxafmSiACKbSCT+fmwC+I92D2seKdJxs7mnlz2yIgwIqV/ULY=
X-Received: by 2002:a19:6449:0:b0:47f:86b3:f87b with SMTP id
 b9-20020a196449000000b0047f86b3f87bmr3397305lfj.644.1658697916849; Sun, 24
 Jul 2022 14:25:16 -0700 (PDT)
MIME-Version: 1.0
References: <CA+23+fFReP7fi2XmhGoxmeUph8F7HcABsFwriXPzBvuBPBXLMg@mail.gmail.com>
 <CABcZeBME68imZqnOqc3hE7OOHWsTgRz+c1y9NKTT6vUHfSCLsQ@mail.gmail.com>
 <CA+23+fECuFKC9KPiJD0rugw4TWwDEsJr6MtGPVdLmsr4iopAjQ@mail.gmail.com>
 <CABcZeBNWqY3z4TCwpg6f0hTdDwc_rD+ReJ0M8Nyz_v5EUcUmow@mail.gmail.com>
 <BD6088D2-5C18-49F6-BB01-694102749E8B@shockey.us>
 <BL0PR06MB44991E3E2770B267EA8433E2FB939@BL0PR06MB4499.namprd06.prod.outlook.com>
In-Reply-To: <BL0PR06MB44991E3E2770B267EA8433E2FB939@BL0PR06MB4499.namprd06.prod.outlook.com>
From: Rohan Mahy <rohan.mahy@wire.com>
Date: Sun, 24 Jul 2022 17:25:07 -0400
Message-ID: <CACW8--PYfbJ7DjZy1yby65e9BYY576R1wk0imZ+C5D7FSqz2xA@mail.gmail.com>
To: Jonathan Rosenberg <jdrosen@five9.com>
Cc: Richard Shockey <richard@shockey.us>, Eric Rescorla <ekr@rtfm.com>, 
 Jonathan Rosenberg <jdrosen@jdrosen.net>, DISPATCH <dispatch@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001fbd1a05e493b470"
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/p9lNMY-UlfyMhiW9LrsESjXrWdo>
Subject: Re: [dispatch] New I-D - SPIN - on voice/video interop between app
 providers
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>,
 <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>,
 <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 24 Jul 2022 21:25:24 -0000

--0000000000001fbd1a05e493b470
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Re: discussing SPIN in MIMI

The MIMI bar bof is only an hour. I also have two drafts I would love to
talk about, but we likely won't have time to discuss any specific drafts.
We should figure out scope/requirements and do some BoF proposal bashing.

Thanks,
-rohan

On Sat, Jul 23, 2022, 18:18 Jonathan Rosenberg <jdrosen@five9.com> wrote:

> Not currently on dispatch agenda. I was planning to discuss it at the mim=
i
> bof on Monday.
>
> Get Outlook for iOS <https://aka.ms/o0ukef>
> ------------------------------
> *From:* dispatch <dispatch-bounces@ietf.org> on behalf of Richard Shockey
> <richard@shockey.us>
> *Sent:* Saturday, July 23, 2022 3:30:47 PM
> *To:* Eric Rescorla <ekr@rtfm.com>; Jonathan Rosenberg <
> jdrosen@jdrosen.net>
> *Cc:* DISPATCH <dispatch@ietf.org>
> *Subject:* Re: [dispatch] New I-D - SPIN - on voice/video interop between
> app providers
>
>
>
>
> This is part of dispatch on Monday right? Ok this should be fun and
> Jonathan I did find my Dynamicsoft cap.
>
>
>
> Ok but I do want to make abundantly clear that I have no objections for
> this work to go forward.  I do have some experience in the issues involvi=
ng
> discovery <cough cough> =E2=80=A6 BTW I=E2=80=99ve been anxious for Broth=
er Peterson to
> chime in here. =E2=98=BA
>
>
>
> Its just I=E2=80=99m enough of an old curmudgeon to understand the very v=
ery
> significant headwinds you are going to run into.
>
>
>
> It is a great discussion BTW.
>
>
>
> =E2=80=94
>
> Richard Shockey
>
> Shockey Consulting LLC
>
> Chairman of the Board SIP Forum
>
> www.shockey.us
> <https://protect-us.mimecast.com/s/6uh-C5yVlksMp4LYTzsKYN?domain=3Dshocke=
y.us>
>
> www.sipforum.org
> <https://protect-us.mimecast.com/s/V4MECjR5vjtYGPQ1hxn_5N?domain=3Dsipfor=
um.org>
>
> www.sipnoc.org
> <https://protect-us.mimecast.com/s/EiuSCkRBwktkX1z3F0Wymz?domain=3Dsipnoc=
.org>
>  (2022)
>
> richard<at>shockey.us
> <https://protect-us.mimecast.com/s/RsxEC82WonSXPLp8UM6_rg?domain=3Dshocke=
y.us>
>
> Skype-Linkedin-Facebook =E2=80=93Twitter  rshockey101
>
> PSTN +1 703-593-2683
>
>
>
>
>
> *From: *dispatch <dispatch-bounces@ietf.org> on behalf of Eric Rescorla <
> ekr@rtfm.com>
> *Date: *Saturday, July 23, 2022 at 11:30 AM
> *To: *Jonathan Rosenberg <jdrosen@jdrosen.net>
> *Cc: *DISPATCH <dispatch@ietf.org>
> *Subject: *Re: [dispatch] New I-D - SPIN - on voice/video interop between
> app providers
>
>
>
> > Lots of good thoughts in here. I'll start with two initial reactions
> > to your comments (and hoping we can discuss further at mimi on
> > Monday):
> >
> > You are correct that the current SPIN protocol design does require
> > both parties to be concurrently online. Since the originating party is
> > the one initiating communications, this means they'll be online
> > anyway. So the issue is that of the receiving party. Practically
> > speaking, since this is targeted at mobile, the amount of time these
> > devices are on and connected to the Internet is very high.
>
> This rather to be fitting the problem statement to the solution
> rather than the solution to the problem statement. AFAICT the
> DMA doesn't limit interop requirements to mobile and there are
> plenty of people connected to messengers on desktop. Similar
> comments apply to the limitation to E.164 numbers and not e-mail
> addresses, as sftcd observed.
>
>
> > And that is my second comment - that it requires some kind of central
> > authority (the RS or "Richard SHockey" ;) in your proposal). This
> > central authority will have a full catalog of phone numbers for all
> > users globally along with their communications applications. That is
> > worrisome from a privacy perspective, but also a practical perspective
> > of - who would be willing to run such a service, how does it monetize
> > to justify costs, etc? With SPIN, there is no new actor that needs to
> > be introduced. SPIN also doenst require the user's contact information
> > to ever be stored in the cloud by Apple or Google; the real-time
> > nature of the address resolution means it can be stored locally
> > on-device. I think this provides a higher degree of privacy and doesnt
> > require the OS vendors to do something they arent already doing,
> > reducing the barrier to deployment. Apple/Google dont need to run a
> > new cloud service, they just need to add another preference stored
> > on-device.
>
> I would make several points here.
>
> First, it's a mistake to think that Google and Apple don't need to run
> a new cloud service. In SPIN the originator has a credential from the
> OS vendor, which effectively makes the OS vendor a CA. CAs need high
> availability to handle new issuance, revocation, etc. I suppose you
> could redesign the system to have two-way online SMS verification,
> but that's not how it looks now, and that would come with some
> new potential problems.
>
> Second, as I observed in my email, if we're willing to deal with a
> very small number of mobile device vendors--which is inherent in the
> current SPIN design--then each device vendor can just run its own
> database and callers can try both. Note that by assumption the device
> vendor already knows your number and as a practical matter they at
> least know which messaging apps you have installed, even if not which
> ones you have accounts on (via the app store).
>
> WRT the overhead of the service, I think you're rather overestimating
> the investent here: we have a sense of what it costs to run something
> of about this scale in the form of Let's Encrypt and we're talking on
> the order of 10 million/year. If it's the OS vendors who do it, it's
> not like they don't have much larger services already. It's true that
> it isn't necessarily in their interest to do so, but the whole premise
> of this work is that they are subject to a regulatory mandate, so I
> don't think that's really dispositive. Even if it's to be third party
> service, it doesn't seem like it need be that hard to fund, given
> that, again, this is the result of a government mandate. One could
> also imagine user fees paid by messenger apps, etc.
>
> I do think the privacy point is a very real concern, especially if
> it's not run by the device vendors, who, as I say, largely have this
> information already. There are really two concerns here:
>
> 1. The existence of the database.
> 2. The ability of entities to query it.
>
> The existence seems like it's addressable in a number of ways.  For
> example, you could have a central service which you query which only
> knows which vendor is associated with which device, and then queries
> the vendor on your behalf (insert crypto handwaving here).
>
> The existence of a query interface at all seems somewhat more
> challenging.  However, I would note that many of these systems already
> effectively have such an interface (for instance if you can try to add
> someone to your buddy list and it behaves differently if they exist or
> not), and need to have rate limiting and other anti-scraping measures.
> We might be able to repurpose these techniques here. Finally, I
> would note that SPIN actually provides the same interface in
> the form of the phone and so will need its own anti-probing
> mechanisms, except that those have to be distributed, whereas
> these can be decentralized.
>
> Anyway, looking forward to the discussion next week.
>
> -Ekr
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
>
> On Sat, Jul 23, 2022 at 7:26 AM Jonathan Rosenberg <jdrosen@jdrosen.net>
> wrote:
>
> Lots of good thoughts in here. I'll start with two initial reactions to
> your comments (and hoping we can discuss further at mimi on Monday):
>
>
>
> You are correct that the current SPIN protocol design does require both
> parties to be concurrently online. Since the originating party is the one
> initiating communications, this means they'll be online anyway. So the
> issue is that of the receiving party. Practically speaking, since this is
> targeted at mobile, the amount of time these devices are on and connected
> to the Internet is very high. As such, I dont know that its worth
> optimizing for the remaining small percentage when they are not. If this
> didnt come with tradeoffs, it certainly is a limitation worth addressing.
> But, I do worry about the tradeoff.
>
>
>
> And that is my second comment - that it requires some kind of central
> authority (the RS or "Richard SHockey" ;) in your proposal). This central
> authority will have a full catalog of phone numbers for all users globall=
y
> along with their communications applications. That is worrisome from a
> privacy perspective, but also a practical perspective of - who would be
> willing to run such a service, how does it monetize to justify costs, etc=
?
> With SPIN, there is no new actor that needs to be introduced. SPIN also
> doenst require the user's contact information to ever be stored in the
> cloud by Apple or Google; the real-time nature of the address resolution
> means it can be stored locally on-device. I think this provides a higher
> degree of privacy and doesnt require the OS vendors to do something they
> arent already doing, reducing the barrier to deployment. Apple/Google don=
t
> need to run a new cloud service, they just need to add another preference
> stored on-device.
>
>
>
> Thx,
>
> Jonathan R.
>
>
>
>
>
> On Fri, Jul 22, 2022 at 11:22 AM Eric Rescorla <ekr@rtfm.com> wrote:
>
> Thanks for starting this conversation.
>
> I agree with a number of the the assumptions underlying
> this proposal, specifically:
>
> - What makes this potentially possible where previous efforts have
>   failed is the force of regulation, specifically the DMA.
>
> - Forward message routing is the most practical way
>   to establish who is entitled to a specific number.
>
> However, it seems to me that the specific design you describe
> has a number of suboptimal properties. In particular:
>
> - It requires the sending and receiving endpoints to be jointly
>   online. This is not unreasonable for voice calling but is
>   undesirable for messaging.
>
> - It makes the OS vendors certificate authorities, which (a) they may
>   not to be (b) gives users no real choices in their trust decisions
>   (specifically, even if I am an Apple user, I need to trust Android!)
>   and (c) is incompatible with purely open source systems.
>
> - It requires each individual relying party (caller) to make their own
>   verification, which makes the kinds of transparency mechanisms we
>   ordinarily use to detect impersonation or misissuance/misrouting
>   much more difficult, if not impossible [0].
>
> It seems to me that there are alternative designs which do not have
> this problem.
>
> As an intuition pump, consider a system in which we have a single
> central Resolution Service (RS).
>
> - When a user installs a communications application on their device,
>   that application contacts the RS, demonstrates control of the relevant
>   number via SMS answerback (i.e., the RS sends them a challenge via
>   SMS) [1]. The application is then able to store a record at the
>   RS with the relevant contact information. If there are multiple
>   applications, there would be multiple records.
>
> - The RS issues Alice a credential (e.g., a certificate) which she can
>   use to authenticate ownership of her number.
>
> - When Alice wants to call Bob, she (or rather the calling/messaging
>   application) looks up Bob's phone number in the registration
>   service, retrieves the appropriate records, and is able to select
>   whichever one is appropriate to complete the communication.  Alice
>   uses her credential to authenticate the call.
>
>
> This system addresses most of my objections above. Specifically:
>
> - It doesn't require the endpoints to be jointly online.
>
> - It is fully compatible with open source because it doesn't
>   require trusting the OS or OS vendor on the other end.
>   It doesn't give the user choices about who to trust because
>   they have to trust the RS (but see below).
>
> - It doesn't require online user verification, and so is
>   compatible with Certificate Transparency type systems,
>   audit of the RS, etc.
>
> I do want to flag one potential privacy issue with this class of
> design, which is that it allows the calling party to determine which
> messaging/calling applications a given user uses.  By contrast, a
> design like the one in SPIN allows for filitering on the receiving
> side (though that doesn't seem to be in the document). I'm not sure
> how big an issue this is, given that you can often join each service
> and then try to connect, but it's not ideal.  I do have some handwavy
> ideas for how to address this (e.g., ACLs uploaded the RS), but
> they're not fully fleshed out. I do think it's possible to address,
> however.
>
> Obviously, one giant RS isn't that desirable (although as I understand
> it, this is effectively how Local Number Portability works in the
> NANP). With that said, one view of the current SPIN proposal is that
> it has two big RSes, one run by Apple and one by Google: as described
> in S 5, the originating party has already done effectively the
> registration flow I describe above:
>
>    There are two ways in which the originating OS can obtain such a
>    certificate.  In one approach, the mobile OS would perform SMS
>    verification (again, invisibly, by absorbing the SMS it sends to
>    itself), and add an additional check of comparing it agaisnt the
>    mobile numnber the user claimed they owned during provisioning time
>    of the device.  The mobile OS vendor would be a valid CA, and then
>    generte a certificate valid for that individual phone number.  In an
>    alternative model, the telco uses certificate delegation [RFC9060],
>    and generates a certificate that is handed to the phone during device
>    provisioning.  The latter approach is more secure in some ways (as it
>    would no longer depend on SMS forward routability for authentication
>    of a user), but is much harder to deploy.
>
> In fact, one could design something with roughly similar security
> properties to the current draft by simply having Apple and Google
> expose an RS API for the endpoints which had already registered as
> above. The caller could then look up the target number in both Apple
> and Google APIs and skip the forward SMS pieces entirely. This seems
> less desirable than a single RS, but it would have a number of the
> same advantages, such as not requiring both endpoints to be online
> and being compatible with transparency mechanisms.
>
>
> With that said, we can also do better than a single central RS.  I
> don't have a complete design, but some thoughts are below.
>
> First, it seems like authentication and discovery are separate
> services, so we could have multiple CAs for telephone numbers that
> each do SMS verification (a similar structure to the WebPKI) but a
> single directory service. This would allow users (or really client
> applications) to make their own decisions about who to trust.
>
> One could also imagine having multiple RSes which stored phone number
> records as long as there was some mechanism for determining which RS
> had a given number. That mapping could then be on a single service or
> just replicated to each application vendor (it's really not that
> big). This would allow a diversity of RSs but with a single central
> reference point so the originating party wouldn't need to poll all of
> them.
>
> At any rate, I think this type of architecture is worth considering
> as an alternative to the design in this specification.
>
> -Ekr
>
>
> [0] As an example of this point, consider a nation-state attacker who
> controls the PSTN and wishes to covertly intercept Alice and Bob's
> communications: it reroutes the SMS messages from their communication
> and then completes the call itself. In the analogous context in the
> WebPKI, this creates a record in the CT log which can then be
> detected, but that is not the case here.
>
> [1] This might require some OS affordances, but I don't think
> they would be that hard to design.
>
>
>
>
> On Tue, Jul 12, 2022 at 7:13 AM Jonathan Rosenberg <jdrosen@jdrosen.net>
> wrote:
>
> Hi fellow dispatchers -
>
>
>
> I wanted to call attention to the following draft submitted yesterday:
>
> https://www.ietf.org/archive/id/draft-rosenberg-dispatch-spin-00.txt
> <https://protect-us.mimecast.com/s/zrWFC9rGpoSzN9EVCPeIjN?domain=3Dietf.o=
rg>
>
>
>
> Abstract:
>
> This document introduces a framework and a protocol for facilitating
>
>    voice, video and messaging interoperability between application
>
>    providers.  This work is motivated by the recent passage of
>
>    regulation in the European Union - the Digital Markets Act (DMA) -
>
>    which, amongst many other provisions, requires that vendors of
>
>    applications with a large number of users enable interoperability
>
>    with applications made by other vendors.  While such interoperability
>
>    is broadly present within the public switched telephone network, it
>
>    is not yet commonplace between over-the-top applications, such as
>
>    Facetime, WhatsApp, and Facebook Messenger.  This document
>
>    specifically defines the Simple Protocol for Inviting Numbers (SPIN)
>
>    which is used to deliver invitations to mobile phone numbers that can
>
>    bootstrap subsequent communications over the Internet.
>
>
>
> Right now, we're looking to see if there is interest in working on this.
> Comments welcome.
>
>
>
> Thx,
>
> Jonathan R.
>
>
>
> --
>
> Jonathan Rosenberg, Ph.D.
> jdrosen@jdrosen.net
> http://www.jdrosen.net
> <https://protect-us.mimecast.com/s/Vbm-C0RE2NtkgZw0F3V7Le?domain=3Djdrose=
n.net/>
>
> _______________________________________________
> dispatch mailing list
> dispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/dispatch
> <https://protect-us.mimecast.com/s/J12sCgJ8xOfqwpZ5cZUHyI?domain=3Dietf.o=
rg>
>
> _______________________________________________ dispatch mailing list
> dispatch@ietf.org https://www.ietf.org/mailman/listinfo/dispatch
> <https://protect-us.mimecast.com/s/J12sCgJ8xOfqwpZ5cZUHyI?domain=3Dietf.o=
rg>
>
> ------------------------------
>
> CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain
> confidential information of Five9 and/or its affiliated entities. Access =
by
> the intended recipient only is authorized. Any liability arising from any
> party acting, or refraining from acting, on any information contained in
> this e-mail is hereby excluded. If you are not the intended recipient,
> please notify the sender immediately, destroy the original transmission a=
nd
> its attachments and do not disclose the contents to any other person, use
> it for any purpose, or store or copy the information in any medium.
> Copyright in this e-mail and any attachments belongs to Five9 and/or its
> affiliated entities.
> _______________________________________________
> dispatch mailing list
> dispatch@ietf.org
> https://www.ietf.org/mailman/listinfo/dispatch
>

--0000000000001fbd1a05e493b470
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"auto"><div dir=3D"auto">Re: discussing SPIN in MIMI</div><div d=
ir=3D"auto"><br></div>The MIMI bar bof is only an hour. I also have two dra=
fts I would love to talk about, but we likely won&#39;t have time to discus=
s any specific drafts. We should figure out scope/requirements and do some =
BoF proposal bashing.<div dir=3D"auto"><br></div><div dir=3D"auto">Thanks,<=
/div><div dir=3D"auto">-rohan</div></div><br><div class=3D"gmail_quote"><di=
v dir=3D"ltr" class=3D"gmail_attr">On Sat, Jul 23, 2022, 18:18 Jonathan Ros=
enberg &lt;<a href=3D"mailto:jdrosen@five9.com">jdrosen@five9.com</a>&gt; w=
rote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0 0 0 .8ex=
;border-left:1px #ccc solid;padding-left:1ex">



<div>
<div dir=3D"ltr">
<div></div>
<div>
<div dir=3D"ltr">Not currently on dispatch agenda. I was planning to discus=
s it at the mimi bof on Monday.=C2=A0<span></span></div>
<div id=3D"m_5603191088351422190ms-outlook-mobile-signature">
<div><br>
</div>
Get <a href=3D"https://aka.ms/o0ukef" target=3D"_blank" rel=3D"noreferrer">=
Outlook for iOS</a></div>
</div>
</div>
<hr style=3D"display:inline-block;width:98%">
<div id=3D"m_5603191088351422190divRplyFwdMsg" dir=3D"ltr"><font face=3D"Ca=
libri, sans-serif" style=3D"font-size:11pt" color=3D"#000000"><b>From:</b> =
dispatch &lt;<a href=3D"mailto:dispatch-bounces@ietf.org" target=3D"_blank"=
 rel=3D"noreferrer">dispatch-bounces@ietf.org</a>&gt; on behalf of Richard =
Shockey &lt;<a href=3D"mailto:richard@shockey.us" target=3D"_blank" rel=3D"=
noreferrer">richard@shockey.us</a>&gt;<br>
<b>Sent:</b> Saturday, July 23, 2022 3:30:47 PM<br>
<b>To:</b> Eric Rescorla &lt;<a href=3D"mailto:ekr@rtfm.com" target=3D"_bla=
nk" rel=3D"noreferrer">ekr@rtfm.com</a>&gt;; Jonathan Rosenberg &lt;<a href=
=3D"mailto:jdrosen@jdrosen.net" target=3D"_blank" rel=3D"noreferrer">jdrose=
n@jdrosen.net</a>&gt;<br>
<b>Cc:</b> DISPATCH &lt;<a href=3D"mailto:dispatch@ietf.org" target=3D"_bla=
nk" rel=3D"noreferrer">dispatch@ietf.org</a>&gt;<br>
<b>Subject:</b> Re: [dispatch] New I-D - SPIN - on voice/video interop betw=
een app providers</font>
<div>=C2=A0</div>
</div>

<div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" style=3D"word-wrap:break=
-word">
<div>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<p><span style=3D"font-size:12.0pt">This is part of dispatch on Monday righ=
t? Ok this should be fun and Jonathan I did find my Dynamicsoft cap.</span>=
</p>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<p><span style=3D"font-size:12.0pt">Ok but I do want to make abundantly cle=
ar that I have no objections for this work to go forward.=C2=A0 I do have s=
ome experience in the issues involving discovery &lt;cough cough&gt; =E2=80=
=A6 BTW I=E2=80=99ve been anxious for Brother
 Peterson to chime in here. </span><span style=3D"font-size:12.0pt;font-fam=
ily:&quot;Apple Color Emoji&quot;">=E2=98=BA</span><span style=3D"font-size=
:12.0pt">
</span></p>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<p><span style=3D"font-size:12.0pt">Its just I=E2=80=99m enough of an old c=
urmudgeon to understand the very very significant headwinds you are going t=
o run into.</span></p>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<p><span style=3D"font-size:12.0pt">It is a great discussion BTW.</span></p=
>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<div>
<p style=3D"margin-right:0in;margin-bottom:1.0pt;margin-left:0in">
<span style=3D"font-size:8.0pt;color:black">=E2=80=94=C2=A0</span></p>
<div>
<p><span style=3D"font-size:8.0pt;color:black">Richard Shockey</span></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black">Shockey Consulting LLC</span=
></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black">Chairman of the Board SIP Fo=
rum</span></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black"><a href=3D"https://protect-u=
s.mimecast.com/s/6uh-C5yVlksMp4LYTzsKYN?domain=3Dshockey.us" target=3D"_bla=
nk" rel=3D"noreferrer">www.shockey.us</a></span></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black"><a href=3D"https://protect-u=
s.mimecast.com/s/V4MECjR5vjtYGPQ1hxn_5N?domain=3Dsipforum.org" target=3D"_b=
lank" rel=3D"noreferrer"><span style=3D"color:#0563c1">www.sipforum.org</sp=
an></a></span></p>
<p><span style=3D"font-size:8.0pt;color:black"><a href=3D"https://protect-u=
s.mimecast.com/s/EiuSCkRBwktkX1z3F0Wymz?domain=3Dsipnoc.org" target=3D"_bla=
nk" rel=3D"noreferrer"><span style=3D"color:#0563c1">www.sipnoc.org</span><=
/a> =C2=A0(2022)</span></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black">richard&lt;at&gt;<a href=3D"=
https://protect-us.mimecast.com/s/RsxEC82WonSXPLp8UM6_rg?domain=3Dshockey.u=
s" target=3D"_blank" rel=3D"noreferrer">shockey.us</a></span></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black">Skype-Linkedin-Facebook =E2=
=80=93Twitter =C2=A0rshockey101</span></p>
</div>
<div>
<p><span style=3D"font-size:8.0pt;color:black">PSTN +1 703-593-2683</span><=
/p>
</div>
</div>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<p><span style=3D"font-size:12.0pt">=C2=A0</span></p>
<div style=3D"border:none;border-top:solid #b5c4df 1.0pt;padding:3.0pt 0in =
0in 0in">
<p><b><span style=3D"font-size:12.0pt;color:black">From: </span>
</b><span style=3D"font-size:12.0pt;color:black">dispatch &lt;<a href=3D"ma=
ilto:dispatch-bounces@ietf.org" target=3D"_blank" rel=3D"noreferrer">dispat=
ch-bounces@ietf.org</a>&gt; on behalf of Eric Rescorla &lt;<a href=3D"mailt=
o:ekr@rtfm.com" target=3D"_blank" rel=3D"noreferrer">ekr@rtfm.com</a>&gt;<b=
r>
<b>Date: </b>Saturday, July 23, 2022 at 11:30 AM<br>
<b>To: </b>Jonathan Rosenberg &lt;<a href=3D"mailto:jdrosen@jdrosen.net" ta=
rget=3D"_blank" rel=3D"noreferrer">jdrosen@jdrosen.net</a>&gt;<br>
<b>Cc: </b>DISPATCH &lt;<a href=3D"mailto:dispatch@ietf.org" target=3D"_bla=
nk" rel=3D"noreferrer">dispatch@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [dispatch] New I-D - SPIN - on voice/video interop betw=
een app providers</span></p>
</div>
<div>
<p>=C2=A0</p>
</div>
<div>
<p style=3D"margin-bottom:12.0pt">&gt; Lots of good thoughts in here. I&#39=
;ll start with two initial reactions<br>
&gt; to your comments (and hoping we can discuss further at mimi on<br>
&gt; Monday):<br>
&gt; <br>
&gt; You are correct that the current SPIN protocol design does require<br>
&gt; both parties to be concurrently online. Since the originating party is=
<br>
&gt; the one initiating communications, this means they&#39;ll be online<br=
>
&gt; anyway. So the issue is that of the receiving party. Practically<br>
&gt; speaking, since this is targeted at mobile, the amount of time these<b=
r>
&gt; devices are on and connected to the Internet is very high.<br>
<br>
This rather to be fitting the problem statement to the solution<br>
rather than the solution to the problem statement. AFAICT the<br>
DMA doesn&#39;t limit interop requirements to mobile and there are<br>
plenty of people connected to messengers on desktop. Similar<br>
comments apply to the limitation to E.164 numbers and not e-mail<br>
addresses, as sftcd observed.<br>
<br>
<br>
&gt; And that is my second comment - that it requires some kind of central<=
br>
&gt; authority (the RS or &quot;Richard SHockey&quot; ;) in your proposal).=
 This<br>
&gt; central authority will have a full catalog of phone numbers for all<br=
>
&gt; users globally along with their communications applications. That is<b=
r>
&gt; worrisome from a privacy perspective, but also a practical perspective=
<br>
&gt; of - who would be willing to run such a service, how does it monetize<=
br>
&gt; to justify costs, etc? With SPIN, there is no new actor that needs to<=
br>
&gt; be introduced. SPIN also doenst require the user&#39;s contact informa=
tion<br>
&gt; to ever be stored in the cloud by Apple or Google; the real-time<br>
&gt; nature of the address resolution means it can be stored locally<br>
&gt; on-device. I think this provides a higher degree of privacy and doesnt=
<br>
&gt; require the OS vendors to do something they arent already doing,<br>
&gt; reducing the barrier to deployment. Apple/Google dont need to run a<br=
>
&gt; new cloud service, they just need to add another preference stored<br>
&gt; on-device.<br>
<br>
I would make several points here.<br>
<br>
First, it&#39;s a mistake to think that Google and Apple don&#39;t need to =
run<br>
a new cloud service. In SPIN the originator has a credential from the<br>
OS vendor, which effectively makes the OS vendor a CA. CAs need high<br>
availability to handle new issuance, revocation, etc. I suppose you<br>
could redesign the system to have two-way online SMS verification,<br>
but that&#39;s not how it looks now, and that would come with some<br>
new potential problems.<br>
<br>
Second, as I observed in my email, if we&#39;re willing to deal with a<br>
very small number of mobile device vendors--which is inherent in the<br>
current SPIN design--then each device vendor can just run its own<br>
database and callers can try both. Note that by assumption the device<br>
vendor already knows your number and as a practical matter they at<br>
least know which messaging apps you have installed, even if not which<br>
ones you have accounts on (via the app store).<br>
<br>
WRT the overhead of the service, I think you&#39;re rather overestimating<b=
r>
the investent here: we have a sense of what it costs to run something<br>
of about this scale in the form of Let&#39;s Encrypt and we&#39;re talking =
on<br>
the order of 10 million/year. If it&#39;s the OS vendors who do it, it&#39;=
s<br>
not like they don&#39;t have much larger services already. It&#39;s true th=
at<br>
it isn&#39;t necessarily in their interest to do so, but the whole premise<=
br>
of this work is that they are subject to a regulatory mandate, so I<br>
don&#39;t think that&#39;s really dispositive. Even if it&#39;s to be third=
 party<br>
service, it doesn&#39;t seem like it need be that hard to fund, given<br>
that, again, this is the result of a government mandate. One could<br>
also imagine user fees paid by messenger apps, etc.<br>
<br>
I do think the privacy point is a very real concern, especially if<br>
it&#39;s not run by the device vendors, who, as I say, largely have this<br=
>
information already. There are really two concerns here:<br>
<br>
1. The existence of the database.<br>
2. The ability of entities to query it.<br>
<br>
The existence seems like it&#39;s addressable in a number of ways.=C2=A0 Fo=
r<br>
example, you could have a central service which you query which only<br>
knows which vendor is associated with which device, and then queries<br>
the vendor on your behalf (insert crypto handwaving here).<br>
<br>
The existence of a query interface at all seems somewhat more<br>
challenging.=C2=A0 However, I would note that many of these systems already=
<br>
effectively have such an interface (for instance if you can try to add<br>
someone to your buddy list and it behaves differently if they exist or<br>
not), and need to have rate limiting and other anti-scraping measures.<br>
We might be able to repurpose these techniques here. Finally, I<br>
would note that SPIN actually provides the same interface in<br>
the form of the phone and so will need its own anti-probing<br>
mechanisms, except that those have to be distributed, whereas<br>
these can be decentralized.<br>
<br>
Anyway, looking forward to the discussion next week.<br>
<br>
-Ekr<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
</p>
</div>
<p>=C2=A0</p>
<div>
<div>
<p>On Sat, Jul 23, 2022 at 7:26 AM Jonathan Rosenberg &lt;<a href=3D"mailto=
:jdrosen@jdrosen.net" target=3D"_blank" rel=3D"noreferrer">jdrosen@jdrosen.=
net</a>&gt; wrote:</p>
</div>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<div>
<p>Lots of good thoughts in here. I&#39;ll start with two initial reactions=
 to your comments (and hoping we can discuss further at mimi on Monday):</p=
>
</div>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>You are correct that the current SPIN protocol design does require both =
parties to be concurrently online. Since the originating party is the one i=
nitiating communications, this means they&#39;ll be online anyway. So the i=
ssue is that of
 the receiving party. Practically speaking, since this is targeted at mobil=
e, the amount of time these devices are on and connected to the Internet is=
 very high. As such, I dont=C2=A0know that its worth optimizing for the rem=
aining small percentage when they are
 not. If this didnt=C2=A0come with tradeoffs, it certainly is a limitation =
worth addressing. But, I do worry about the tradeoff.</p>
</div>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>And that is my second comment - that it requires some kind of central au=
thority (the RS or &quot;Richard SHockey&quot; ;) in your proposal). This c=
entral authority will have a full catalog of phone numbers for all users gl=
obally along with their
 communications applications. That is worrisome from a privacy perspective,=
 but also a practical perspective of - who would be willing to run such a s=
ervice, how does it monetize to justify costs, etc? With SPIN, there is no =
new actor that needs to be introduced.
 SPIN also doenst require the user&#39;s contact information to ever be sto=
red in the cloud by Apple or Google; the real-time nature of the address re=
solution means it can be stored locally on-device. I think this provides a =
higher degree of privacy and doesnt
 require the OS vendors to do something they arent already doing, reducing =
the barrier to deployment. Apple/Google dont need to run a new cloud servic=
e, they just need to add another preference stored on-device.</p>
</div>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>Thx,</p>
</div>
<div>
<p>Jonathan R.</p>
</div>
<div>
<p>=C2=A0</p>
</div>
<p>=C2=A0</p>
<div>
<div>
<p>On Fri, Jul 22, 2022 at 11:22 AM Eric Rescorla &lt;<a href=3D"mailto:ekr=
@rtfm.com" target=3D"_blank" rel=3D"noreferrer">ekr@rtfm.com</a>&gt; wrote:=
</p>
</div>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<p style=3D"margin-bottom:12.0pt">Thanks for starting this conversation.<br=
>
<br>
I agree with a number of the the assumptions underlying<br>
this proposal, specifically:<br>
<br>
- What makes this potentially possible where previous efforts have<br>
=C2=A0 failed is the force of regulation, specifically the DMA.<br>
<br>
- Forward message routing is the most practical way<br>
=C2=A0 to establish who is entitled to a specific number.<br>
<br>
However, it seems to me that the specific design you describe<br>
has a number of suboptimal properties. In particular:<br>
<br>
- It requires the sending and receiving endpoints to be jointly<br>
=C2=A0 online. This is not unreasonable for voice calling but is<br>
=C2=A0 undesirable for messaging.<br>
<br>
- It makes the OS vendors certificate authorities, which (a) they may<br>
=C2=A0 not to be (b) gives users no real choices in their trust decisions<b=
r>
=C2=A0 (specifically, even if I am an Apple user, I need to trust Android!)=
<br>
=C2=A0 and (c) is incompatible with purely open source systems.<br>
<br>
- It requires each individual relying party (caller) to make their own<br>
=C2=A0 verification, which makes the kinds of transparency mechanisms we<br=
>
=C2=A0 ordinarily use to detect impersonation or misissuance/misrouting<br>
=C2=A0 much more difficult, if not impossible [0].<br>
<br>
It seems to me that there are alternative designs which do not have<br>
this problem.<br>
<br>
As an intuition pump, consider a system in which we have a single<br>
central Resolution Service (RS).<br>
<br>
- When a user installs a communications application on their device,<br>
=C2=A0 that application contacts the RS, demonstrates control of the releva=
nt<br>
=C2=A0 number via SMS answerback (i.e., the RS sends them a challenge via<b=
r>
=C2=A0 SMS) [1]. The application is then able to store a record at the<br>
=C2=A0 RS with the relevant contact information. If there are multiple<br>
=C2=A0 applications, there would be multiple records. <br>
<br>
- The RS issues Alice a credential (e.g., a certificate) which she can<br>
=C2=A0 use to authenticate ownership of her number.<br>
<br>
- When Alice wants to call Bob, she (or rather the calling/messaging<br>
=C2=A0 application) looks up Bob&#39;s phone number in the registration<br>
=C2=A0 service, retrieves the appropriate records, and is able to select<br=
>
=C2=A0 whichever one is appropriate to complete the communication.=C2=A0 Al=
ice<br>
=C2=A0 uses her credential to authenticate the call.<br>
<br>
<br>
This system addresses most of my objections above. Specifically:<br>
<br>
- It doesn&#39;t require the endpoints to be jointly online.<br>
<br>
- It is fully compatible with open source because it doesn&#39;t<br>
=C2=A0 require trusting the OS or OS vendor on the other end.<br>
=C2=A0 It doesn&#39;t give the user choices about who to trust because<br>
=C2=A0 they have to trust the RS (but see below).<br>
<br>
- It doesn&#39;t require online user verification, and so is<br>
=C2=A0 compatible with Certificate Transparency type systems,<br>
=C2=A0 audit of the RS, etc.<br>
<br>
I do want to flag one potential privacy issue with this class of<br>
design, which is that it allows the calling party to determine which<br>
messaging/calling applications a given user uses.=C2=A0 By contrast, a<br>
design like the one in SPIN allows for filitering on the receiving<br>
side (though that doesn&#39;t seem to be in the document). I&#39;m not sure=
<br>
how big an issue this is, given that you can often join each service<br>
and then try to connect, but it&#39;s not ideal.=C2=A0 I do have some handw=
avy<br>
ideas for how to address this (e.g., ACLs uploaded the RS), but<br>
they&#39;re not fully fleshed out. I do think it&#39;s possible to address,=
<br>
however.<br>
<br>
Obviously, one giant RS isn&#39;t that desirable (although as I understand<=
br>
it, this is effectively how Local Number Portability works in the<br>
NANP). With that said, one view of the current SPIN proposal is that<br>
it has two big RSes, one run by Apple and one by Google: as described<br>
in S 5, the originating party has already done effectively the<br>
registration flow I describe above:<br>
<br>
=C2=A0 =C2=A0There are two ways in which the originating OS can obtain such=
 a<br>
=C2=A0 =C2=A0certificate.=C2=A0 In one approach, the mobile OS would perfor=
m SMS<br>
=C2=A0 =C2=A0verification (again, invisibly, by absorbing the SMS it sends =
to<br>
=C2=A0 =C2=A0itself), and add an additional check of comparing it agaisnt t=
he<br>
=C2=A0 =C2=A0mobile numnber the user claimed they owned during provisioning=
 time<br>
=C2=A0 =C2=A0of the device.=C2=A0 The mobile OS vendor would be a valid CA,=
 and then<br>
=C2=A0 =C2=A0generte a certificate valid for that individual phone number.=
=C2=A0 In an<br>
=C2=A0 =C2=A0alternative model, the telco uses certificate delegation [RFC9=
060],<br>
=C2=A0 =C2=A0and generates a certificate that is handed to the phone during=
 device<br>
=C2=A0 =C2=A0provisioning.=C2=A0 The latter approach is more secure in some=
 ways (as it<br>
=C2=A0 =C2=A0would no longer depend on SMS forward routability for authenti=
cation<br>
=C2=A0 =C2=A0of a user), but is much harder to deploy.<br>
<br>
In fact, one could design something with roughly similar security<br>
properties to the current draft by simply having Apple and Google<br>
expose an RS API for the endpoints which had already registered as<br>
above. The caller could then look up the target number in both Apple<br>
and Google APIs and skip the forward SMS pieces entirely. This seems<br>
less desirable than a single RS, but it would have a number of the<br>
same advantages, such as not requiring both endpoints to be online<br>
and being compatible with transparency mechanisms.<br>
<br>
<br>
With that said, we can also do better than a single central RS. =C2=A0I<br>
don&#39;t have a complete design, but some thoughts are below.<br>
<br>
First, it seems like authentication and discovery are separate<br>
services, so we could have multiple CAs for telephone numbers that<br>
each do SMS verification (a similar structure to the WebPKI) but a<br>
single directory service. This would allow users (or really client<br>
applications) to make their own decisions about who to trust.<br>
<br>
One could also imagine having multiple RSes which stored phone number<br>
records as long as there was some mechanism for determining which RS<br>
had a given number. That mapping could then be on a single service or<br>
just replicated to each application vendor (it&#39;s really not that<br>
big). This would allow a diversity of RSs but with a single central<br>
reference point so the originating party wouldn&#39;t need to poll all of<b=
r>
them.<br>
<br>
At any rate, I think this type of architecture is worth considering<br>
as an alternative to the design in this specification.<br>
<br>
-Ekr<br>
<br>
<br>
[0] As an example of this point, consider a nation-state attacker who<br>
controls the PSTN and wishes to covertly intercept Alice and Bob&#39;s<br>
communications: it reroutes the SMS messages from their communication<br>
and then completes the call itself. In the analogous context in the<br>
WebPKI, this creates a record in the CT log which can then be<br>
detected, but that is not the case here.<br>
<br>
[1] This might require some OS affordances, but I don&#39;t think<br>
they would be that hard to design.<br>
<br>
<br>
</p>
</div>
<p>=C2=A0</p>
<div>
<div>
<p>On Tue, Jul 12, 2022 at 7:13 AM Jonathan Rosenberg &lt;<a href=3D"mailto=
:jdrosen@jdrosen.net" target=3D"_blank" rel=3D"noreferrer">jdrosen@jdrosen.=
net</a>&gt; wrote:</p>
</div>
<blockquote style=3D"border:none;border-left:solid #cccccc 1.0pt;padding:0i=
n 0in 0in 6.0pt;margin-left:4.8pt;margin-right:0in">
<div>
<p>Hi fellow dispatchers -=C2=A0</p>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>I wanted to call attention to the following draft submitted yesterday:</=
p>
</div>
<div>
<p><a href=3D"https://protect-us.mimecast.com/s/zrWFC9rGpoSzN9EVCPeIjN?doma=
in=3Dietf.org" target=3D"_blank" rel=3D"noreferrer">https://www.ietf.org/ar=
chive/id/draft-rosenberg-dispatch-spin-00.txt</a></p>
</div>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>Abstract:</p>
</div>
<div>
<pre style=3D"white-space:pre-wrap"><span style=3D"color:black">This docume=
nt introduces a framework and a protocol for facilitating</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 voice, video and messaging in=
teroperability between application</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 providers.=C2=A0 This work is=
 motivated by the recent passage of</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 regulation in the European Un=
ion - the Digital Markets Act (DMA) -</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 which, amongst many other pro=
visions, requires that vendors of</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 applications with a large num=
ber of users enable interoperability</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 with applications made by oth=
er vendors.=C2=A0 While such interoperability</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 is broadly present within the=
 public switched telephone network, it</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 is not yet commonplace betwee=
n over-the-top applications, such as</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 Facetime, WhatsApp, and Faceb=
ook Messenger.=C2=A0 This document</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 specifically defines the Simp=
le Protocol for Inviting Numbers (SPIN)</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 which is used to deliver invi=
tations to mobile phone numbers that can</span></pre>
<pre><span style=3D"color:black">=C2=A0=C2=A0 bootstrap subsequent communic=
ations over the Internet.</span></pre>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>Right now, we&#39;re looking to see if there is interest in working on t=
his. Comments welcome.</p>
</div>
<div>
<p>=C2=A0</p>
</div>
<div>
<p>Thx,</p>
</div>
<div>
<p>Jonathan R.</p>
</div>
<div>
<p>=C2=A0</p>
</div>
<p>-- </p>
<div>
<div>
<div>
<div>
<p><span style=3D"color:#222222">Jonathan Rosenberg, Ph.D.<br>
<a href=3D"mailto:jdrosen@jdrosen.net" target=3D"_blank" rel=3D"noreferrer"=
><span style=3D"color:#1155cc">jdrosen@jdrosen.net</span></a><br>
<a href=3D"https://protect-us.mimecast.com/s/Vbm-C0RE2NtkgZw0F3V7Le?domain=
=3Djdrosen.net/" target=3D"_blank" rel=3D"noreferrer"><span style=3D"color:=
#1155cc">http://www.jdrosen.net</span></a></span></p>
</div>
</div>
</div>
</div>
</div>
</div>
<p>_______________________________________________<br>
dispatch mailing list<br>
<a href=3D"mailto:dispatch@ietf.org" target=3D"_blank" rel=3D"noreferrer">d=
ispatch@ietf.org</a><br>
<a href=3D"https://protect-us.mimecast.com/s/J12sCgJ8xOfqwpZ5cZUHyI?domain=
=3Dietf.org" target=3D"_blank" rel=3D"noreferrer">https://www.ietf.org/mail=
man/listinfo/dispatch</a></p>
</blockquote>
</div>
</blockquote>
</div>
</div>
</blockquote>
</div>
<p>_______________________________________________ dispatch mailing list <a=
 href=3D"mailto:dispatch@ietf.org" target=3D"_blank" rel=3D"noreferrer">dis=
patch@ietf.org</a>
<a href=3D"https://protect-us.mimecast.com/s/J12sCgJ8xOfqwpZ5cZUHyI?domain=
=3Dietf.org" target=3D"_blank" rel=3D"noreferrer">
https://www.ietf.org/mailman/listinfo/dispatch</a> </p>
</div>
</div>
<br>
<hr>
<font face=3D"Arial" color=3D"Gray" size=3D"1"><br>
CONFIDENTIALITY NOTICE: This e-mail and any files attached may contain conf=
idential information of Five9 and/or its affiliated entities. Access by the=
 intended recipient only is authorized. Any liability arising from any part=
y acting, or refraining from acting,
 on any information contained in this e-mail is hereby excluded. If you are=
 not the intended recipient, please notify the sender immediately, destroy =
the original transmission and its attachments and do not disclose the conte=
nts to any other person, use it
 for any purpose, or store or copy the information in any medium. Copyright=
 in this e-mail and any attachments belongs to Five9 and/or its affiliated =
entities.<br>
</font>
<div></div>
<div></div>
</div>

_______________________________________________<br>
dispatch mailing list<br>
<a href=3D"mailto:dispatch@ietf.org" target=3D"_blank" rel=3D"noreferrer">d=
ispatch@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/dispatch" rel=3D"noreferre=
r noreferrer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/dispa=
tch</a><br>
</blockquote></div>

--0000000000001fbd1a05e493b470--

