Re: [sipcore] draft-ietf-sipcore-callinfo-04 (call-reason)

Chris Wendt <chris-ietf@chriswendt.net> Fri, 18 March 2022 21:17 UTC

Return-Path: <chris-ietf@chriswendt.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 15C6F3A11BC for <sipcore@ietfa.amsl.com>; Fri, 18 Mar 2022 14:17:47 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.906
X-Spam-Level:
X-Spam-Status: No, score=-1.906 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=chriswendt-net.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id O2c_wFxJxAMV for <sipcore@ietfa.amsl.com>; Fri, 18 Mar 2022 14:17:42 -0700 (PDT)
Received: from mail-qk1-x72e.google.com (mail-qk1-x72e.google.com [IPv6:2607:f8b0:4864:20::72e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5A96D3A119D for <sipcore@ietf.org>; Fri, 18 Mar 2022 14:17:42 -0700 (PDT)
Received: by mail-qk1-x72e.google.com with SMTP id i65so1871073qkd.7 for <sipcore@ietf.org>; Fri, 18 Mar 2022 14:17:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chriswendt-net.20210112.gappssmtp.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=xuUUFdDZYJnfuxT+7V2PM6J280qazhzDfZ+xSQysbf4=; b=jZk8NU8V4ZeLJERQbg4NCjhzleGGyBaQDp4tWPbvYRZnMsrBtjFiFPDh/UDp/ZTnmV RXLnPePfhnL7X4HJ4yl0/siTyErqm09vHOwjnFoepZBeDXh63NLTgo+OsJlkkBjcJZDM XJ7xjFk779zwPxt1afQECpQHd5RwaAQvXCcD+pAykOK0Iq7Ytv73ZM41RhWCGXVyYcQm cv8xS6C8zPRio+6LyXNpLjlyfHVeemuUjKoMJwu0zsUXIVWkaTtlFUnec+EVKM6I7FDH R6MXlGh9OMi6JHBud9XwmioTlgzu7v37ziAkWTD1wNriQARX4je7ynt5BXfYcp638VbF G2lw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=xuUUFdDZYJnfuxT+7V2PM6J280qazhzDfZ+xSQysbf4=; b=YCGAvoShFXtZMLwdY650D05YUS68froY2cA3lqpI/OeVYXWXmMbb5lqMWw651yaL9L yHXXy3c6Zy6IShzr70K7IP9Oiwo72Tn8LWdfZNm9b3qUpI9vFtu1ay+Z1h0rm3170lCa OH0WJ2+BOol8bBa7h1cE4icNrpufZLmINQAg5ry1AMQidVyHen4Uz07qfFBOVH9R1Hx3 hUP2BbYW54QVzRmCq2QCd3b/DF16rGeaR+u+/ptu2ACYX290njioT4BeT//DBpSUFDbO gwWd3++u2VFL+e1vV6rm3Houyn8DvyuEqZDSBsT/Zd75TP0mMYE0NuNs9vTsgjpFBwIM LRkg==
X-Gm-Message-State: AOAM530ZeLKyUTN3SYQGCZPUio1SXL5wQGartJ1y39B5GQC7BX0yyQr/ FbjpAYmtql1L9WE95Mxx13SdzA==
X-Google-Smtp-Source: ABdhPJzSaqe1Yzpwj6yimHNtXRMi4mO0T0tg+TveyCCALr+76Ap3wPsDwvGMKfdP4ZD1KvMXTS30mQ==
X-Received: by 2002:a05:620a:28d1:b0:67d:9eb8:d5e9 with SMTP id l17-20020a05620a28d100b0067d9eb8d5e9mr6907357qkp.715.1647638260942; Fri, 18 Mar 2022 14:17:40 -0700 (PDT)
Received: from smtpclient.apple (static-72-92-88-219.phlapa.fios.verizon.net. [72.92.88.219]) by smtp.gmail.com with ESMTPSA id g21-20020ac85815000000b002e06e2623a7sm6371275qtg.0.2022.03.18.14.17.40 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Fri, 18 Mar 2022 14:17:40 -0700 (PDT)
From: Chris Wendt <chris-ietf@chriswendt.net>
Message-Id: <51718867-9092-4423-B895-8069A8AF3D07@chriswendt.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_41295B99-3CBC-4796-BFB2-C159AB0AED8B"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
Date: Fri, 18 Mar 2022 17:17:39 -0400
In-Reply-To: <CACgrgBYVi2rJv0BCFf3UxmjtSJHXRuFw+gbHsQm0Uo0Dr3J8Mw@mail.gmail.com>
Cc: SIPCORE <sipcore@ietf.org>, stir@ietf.org
To: Henning Schulzrinne <hgs@cs.columbia.edu>
References: <CACgrgBbUASA4HTukPwZL9V=8XOMTx_keZcDh-pVc0eSJYtVS8w@mail.gmail.com> <86BE36F5-7CFE-48BE-B0A7-7458B67EB208@chriswendt.net> <CACgrgBYVi2rJv0BCFf3UxmjtSJHXRuFw+gbHsQm0Uo0Dr3J8Mw@mail.gmail.com>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/SfPsjVgTATbVpyFg9tX0oQLkTkM>
Subject: Re: [sipcore] draft-ietf-sipcore-callinfo-04 (call-reason)
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 18 Mar 2022 21:17:47 -0000

Hi Henning,

I understand what you are saying.  I do however think there is reasons to protect call-reason/Subject of call.  I think these situations are mostly in the context of delegation to perhaps a call center, where you have authorized them to represent your company in particular ways, including not only your identity, but for different context of calls that you have authorized them to represent you.  We all know there is some call centers that use call identities with good reputation for customers that may exploit that reputation for other customers.  I would look at this as similar situation.

There is also potential for future of Subject/call-reason to be more than just a text string.

I’m struggling a bit on your point that we should sign some data but not other data because it is less likely to be manipulated.  Is that the bar we should be striving for here? Seems to conflict with my understanding of some of the goals.

Why not have the framework that we can do that.  You are free to protect or not protect data depending on your own policy. 

I guess i want to be sure whether you are reacting to us not using Subject vs call-info as a common container for “rich call data” related info or that we have both call-info and ‘rcd’ as a container for Rich Call Data more generally?  I think there is many reasons why we landed there, we can re-hash that in the context of call-info vs subject.  I would be less excited about re-hashing it for passport/rcd.

I do believe both of these frameworks need to be extensible, i don’t think we are finished.  We can define more passport extensions, but at the same time, do we want to redefine “rcd” and “rcdi” for new passport extensions?

-Chris

> On Mar 18, 2022, at 4:23 PM, Henning Schulzrinne <hgs@cs.columbia.edu> wrote:
> 
> I missed one important point of yours: It isn't quite clear what it means to protect the call reason (or Subject, for that matter). The likelihood that somebody downstream will insert a bogus call reason or Subject seems very low - there's no real incentive. The carrier, for the reasons mentioned, probably doesn't want anything to do with certifying the call purpose as "signing" could be seen as endorsement. After all, the whole point of STIR PaSSporT attestation is not just some random cryptographic signature like in TLS, but indeed an attestation of veracity or responsibility (for gateway attestation). The user is unlikely to have a way to sign the call purpose on their own, except maybe for enterprises, but this again seems not all that helpful.
> 
> (In the US, Section 230 and similar laws probably protect them from liability, but this may not be true everywhere.)
> 
> As mentioned, this is different from signing RCD, which indeed has some notion of attestation. ("I, as the originating carrier, attest that this is the business address I have on file for this customer." or "I, enterprise, attest that this is indeed my employee, Jane Talker.")
> 
> My general argument is: The call-purpose field raises all kinds of operational issues, doesn't seem necessary for RCD, seems unlikely to be used widely and can, if desired, be introduced as a new Call-Info purpose. I think we should generally err on the side of minimalism - all of this stuff is already complex enough. (See the 603/607/608 debate of what happens otherwise...)
> 
> Henning
> 
> On Fri, Mar 18, 2022 at 10:16 AM Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
> 
> Beyond your point, but related and maybe just validation for me, do we want to protect call-reason as part of RCD?  I think we sort of said, yes why not protect/sign it because we view RCD as an extensible set of claims, as long as we make that a claim that is not part of the “rcd” claim that is specifically about the calling party identity, which we did with “crn”.
>