Document Action: 'Secure Telephone Identity Threat Model' to Informational RFC (draft-ietf-stir-threats-04.txt)

The IESG <> Wed, 13 August 2014 15:24 UTC

Return-Path: <>
Received: from localhost ( []) by (Postfix) with ESMTP id 322BF1A0886; Wed, 13 Aug 2014 08:24:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9] autolearn=ham
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id pS-rYmD1GnJi; Wed, 13 Aug 2014 08:24:50 -0700 (PDT)
Received: from (localhost [IPv6:::1]) by (Postfix) with ESMTP id 2A4821A088D; Wed, 13 Aug 2014 08:24:47 -0700 (PDT)
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: The IESG <>
To: IETF-Announce <>
Subject: Document Action: 'Secure Telephone Identity Threat Model' to Informational RFC (draft-ietf-stir-threats-04.txt)
X-Test-IDTracker: no
X-IETF-IDTracker: 5.6.2.p5
Auto-Submitted: auto-generated
Precedence: bulk
Message-ID: <>
Date: Wed, 13 Aug 2014 08:24:47 -0700
Cc: stir mailing list <>, stir chair <>, RFC Editor <>
X-Mailman-Version: 2.1.15
List-Id: "IETF announcement list. No discussions." <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Wed, 13 Aug 2014 15:24:56 -0000

The IESG has approved the following document:
- 'Secure Telephone Identity Threat Model'
  (draft-ietf-stir-threats-04.txt) as Informational RFC

This document is the product of the Secure Telephone Identity Revisited
Working Group.

The IESG contact persons are Richard Barnes and Alissa Cooper.

A URL of this Internet Draft is:

Technical Summary

   As the Internet and the telephone network have become increasingly
   interconnected and interdependent, attackers can impersonate or
   obscure calling party numbers when orchestrating bulk commercial
   calling schemes, hacking voicemail boxes or even circumventing multi-
   factor authentication systems trusted by banks.  This document
   analyzes threats in the resulting system, enumerating actors,
   reviewing the capabilities available to and used by attackers, and
   describing scenarios in which attacks are launched.

Working Group Summary

  This document is a product of the STIR working group. 

Document Quality

  This document was developed in parallel with the problem statement.
  It has received significant cross-area review.


  Robert Sparks is the document shepherd. 
  Richard Barnes is the Responsible AD.