[Last-Call] [stir] Last Call: <draft-ietf-stir-passport-divert-07.txt> (PASSporT Extension for Diverted Calls) to Proposed Standard

"David Frankel" <dfrankel@zipdx.com> Fri, 10 January 2020 06:02 UTC

Return-Path: <dfrankel@zipdx.com>
X-Original-To: last-call@ietfa.amsl.com
Delivered-To: last-call@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0FBFA12024E for <last-call@ietfa.amsl.com>; Thu, 9 Jan 2020 22:02:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level:
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=zipdx.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CV4U7fbRXJmT for <last-call@ietfa.amsl.com>; Thu, 9 Jan 2020 22:02:21 -0800 (PST)
Received: from xdev1sjc.zipdx.com (sjc-e-66.zipdx.com [166.88.23.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0B91D120169 for <last-call@ietf.org>; Thu, 9 Jan 2020 22:02:21 -0800 (PST)
Received: from DPFENVY (c-76-103-222-167.hsd1.ca.comcast.net [76.103.222.167]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) (Authenticated sender: dfrankel) by xdev1sjc.zipdx.com (Postfix) with ESMTPSA id CD14D1B80161 for <last-call@ietf.org>; Thu, 9 Jan 2020 22:02:19 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=zipdx.com; s=default; t=1578636139; bh=qrUpn4NSq8t8hb02mnfXo37ZtLTWAu+rryv4kBrTLZk=; h=From:To:References:In-Reply-To:Subject:Date:From; b=nYumKszX8NguyHv6RX8ueBbvFPGoeNAs41B5YzovOn6cnBOBKlt1+F6RleFMmG0TS bgVtvzPh79wvaWhQ1FVM1jK8RuXl5W+9LBlF+64Wy2WkIK8HEVNDxVmztoSgqtC3R7 zcpM/iclROorGejUdu540mfrcd7TmLyyBb48dcTA=
From: David Frankel <dfrankel@zipdx.com>
To: last-call@ietf.org
References: <157406977007.14082.10854236608944411427.idtracker@ietfa.amsl.com>
In-Reply-To: <157406977007.14082.10854236608944411427.idtracker@ietfa.amsl.com>
Date: Thu, 09 Jan 2020 22:02:19 -0800
Organization: ZipDX LLC
Message-ID: <0d9301d5c77b$84804000$8d80c000$@zipdx.com>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 16.0
Thread-Index: AQHnWL8H0/xasfWxdEqbwe4jCq0iewJUms/8
Content-Language: en-us
Archived-At: <https://mailarchive.ietf.org/arch/msg/last-call/Pac2nsAhwjD87I7pMu6-8wh0I6E>
Subject: [Last-Call] [stir] Last Call: <draft-ietf-stir-passport-divert-07.txt> (PASSporT Extension for Diverted Calls) to Proposed Standard
X-BeenThere: last-call@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: IETF Last Calls <last-call.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/last-call>, <mailto:last-call-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/last-call/>
List-Post: <mailto:last-call@ietf.org>
List-Help: <mailto:last-call-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/last-call>, <mailto:last-call-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 10 Jan 2020 06:02:23 -0000

I tried sending this in early December and it disappeared. Given that there
are still some comments floating around on this draft, I'm trying again.

A few last-minute thoughts:

Typo in 1. Introduction, "There are a number of potential ways for
intermediaries to indicate that such a forwarding OPERATION has taken
place."

Regarding the discussion in the Introduction, there is an alternative
perspective regarding a call initially directed to one number that is then
forwarded to another. The current text implies that this is ONE call (from A
to B and then forwarded to C.) Some would argue that traditional call
forwarding results in the creation of a second, new call, at least in terms
of the billing for both calls. The first call is from A to B and terminates
at B. The new second call, from B to C, is created with a DIVERSION header
containing B's number to show that it initiated the forwarding. The FROM
header (and/or P-ASSERTED-IDENTITY) in the second (B to C) call is
constructed from the original call (with A's number) specifically so that
the call recipient (at the forwarded-to endpoint C) sees the original
calling party (A) as the caller.

The current text says "The SIP Diversion header field [RFC5806], though
historic, is still used for this purpose by some operators today." My
experience is that the Diversion header is used by virtually every public
network operator, not just in the US but globally. Most properly-configured
VoIP PBX's also insert the Diversion header when they forward a call.

A call can trigger multiple forwards, so a call from A to B, which then
forwards to C and then D, would result in three distinct calls across the
network.

The comments above don't call for changes in the technical steps described
in the subsequent text. It might be helpful, though, to clarify how things
actually work, and to perhaps say something like: "When establishing a new
call in response to an incoming original call that the retargeting entity is
forwarding, that entity will copy (unaltered) the original Identity
header(s) contained in the original INVITE into a new INVITE, and will add a
new Identity header with a "div" PASSporT."

Typo in 3. "If the canonical form of the "dest" IDENTIFIER is not changed
during retargeting"

At 4.1, the text says: "The retargeting entity SHOULD act as a verification
service and validate the existing Identity header field value(s) in the
request before proceeding; in some high-volume environments, it may instead
put that burden of validating the chain entirely on the terminating
verification service." The text does not indicate what the different
outcomes would be in the three possible cases (retargeting entity acts as
verification service and the verification is successful; retargeting entry
acts as verification service and verification fails; retargeting entity does
not verify). If the call handling is the same in all these cases, then is
there a reason that the retargeting entity SHOULD act as a verification
service?

At 4.2, verification steps are detailed. It might be worth adding that if
the Diversion header is used for call processing, then the Verification
Service SHOULD insure that the value(s) in the Diversion header(s) match the
div values in the div PASSporT(s). My point here is that most voicemail
systems use the Diversion header to determine what subscriber voicemailbox
is being accessed; that number should be one that is actually in the
verified chain according to the PASSporTs.

This document doesn't discuss attestation level (or origid). I realize those
are SHAKEN extensions and perhaps not relevant in a "generic" document like
this. At some point, though, it will have to be determined how these notions
are propagated in forwarded-call scenarios. Today Diversion and Redirecting
Number are interworked between SIP and ISUP respectively so there will be
some interesting interactions.

David Frankel
ZipDXR LLC
Monte Sereno, CA USA
Tel: 1-800-FRANKEL (1-800-372-6535)
Visit My Robocall Blog at www.legalcallsonly.org