[stir] Re: [art] Re: For those of you who follow this kind of stuff.

Chris Wendt <chris-ietf@chriswendt.net> Wed, 08 October 2025 16:41 UTC

Return-Path: <chris-ietf@chriswendt.net>
X-Original-To: stir@mail2.ietf.org
Delivered-To: stir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 7D4276F7F12A for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 09:41:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.193
X-Spam-Level:
X-Spam-Status: No, score=-1.193 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=chriswendt.net
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x0ipJymlGBjQ for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 09:41:36 -0700 (PDT)
Received: from cyan.elm.relay.mailchannels.net (cyan.elm.relay.mailchannels.net [23.83.212.47]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 51F9A6F7F123 for <stir@ietf.org>; Wed, 8 Oct 2025 09:41:36 -0700 (PDT)
X-Sender-Id: dreamhost|x-authsender|chris-ietf@chriswendt.net
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 286867C030E; Wed, 08 Oct 2025 16:41:29 +0000 (UTC)
Received: from pdx1-sub0-mail-a287.dreamhost.com (trex-green-9.trex.outbound.svc.cluster.local [100.115.140.78]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id D35917C376C; Wed, 08 Oct 2025 16:41:23 +0000 (UTC)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1759941683; a=rsa-sha256; cv=none; b=qlK9DvJK2Ll0BFBgSOluvbQ0gw1YTdv9AHbYiFaMLqUopAxXNsrzX9eESl2pnLqROySThM AEko58t+eyiSZZZG7h9vyYYAlyoduDJjB/s8TAcyx+rBH/Pg43xHWxzMNomCDviM4FmIMq KsSImC049hIpzcvXe2zxBdLb4Vt1RG6Stu/XkzhknbqXzwSRZMVcW3Ql426QiX6CwRRXm7 nP+2MUzcyKr+uQohsg/sYg6P6doGXYOrqPJDRmvDd62hBcmmqhzGAb0vYrykkVbnSGXFWd uGXd6m4g/AWciDyZ0TQA1/cceIIsAt7mSNuFUmQEt4kr3XwmgS+SKvjTbzDwRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=mailchannels.net; s=arc-2022; t=1759941683; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=lQ7pfKZ/AANjT8hFnCasVUzgYy3+jLFvvHhnrSGP6/g=; b=KNu0RdNlPeH5Vow+rAWp4O0enbz5uuO7HJsv+0mvP7htykvtL/fd6pbw4EGPNc8xXWqZQc I3WUSFOniPEQJil6jKL+8u64uRJ6P0taBt7OyXQSuQdQG50vlYJWgothOOM6apNDrS4g+u cQp9/9/qE04wSpdR1nCniiECF2gqdlW9yKXTQQBqbEGcx4cF6ApZnbwVJZUeVrAfxaA6Nn 7IlwKBcM2LRJyr9GZXDAhPX0PNCa1NJ9ub6y1/7D04dGDkPjBE7oXpne+N0xecIHIDJqHK 9+8tQl9EH2K6yrSPuZzzeu5G0xWHLc3W1a/xNu/pHXWJ/o+sEfeGvqbZ0A1+6Q==
ARC-Authentication-Results: i=1; rspamd-777888ddf6-svl9l; auth=pass smtp.auth=dreamhost smtp.mailfrom=chris-ietf@chriswendt.net
X-Sender-Id: dreamhost|x-authsender|chris-ietf@chriswendt.net
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|chris-ietf@chriswendt.net
X-MailChannels-Auth-Id: dreamhost
X-Exultant-Unite: 0fb6871010b6b961_1759941688977_3842012566
X-MC-Loop-Signature: 1759941688977:2270897534
X-MC-Ingress-Time: 1759941688977
Received: from pdx1-sub0-mail-a287.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384) by 100.115.140.78 (trex/7.1.3); Wed, 08 Oct 2025 16:41:28 +0000
Received: from smtpclient.apple (unknown [45.88.222.56]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: chris-ietf@chriswendt.net) by pdx1-sub0-mail-a287.dreamhost.com (Postfix) with ESMTPSA id 4chf0L3tbLz7h; Wed, 8 Oct 2025 09:41:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chriswendt.net; s=dreamhost; t=1759941683; bh=lQ7pfKZ/AANjT8hFnCasVUzgYy3+jLFvvHhnrSGP6/g=; h=Content-Type:Content-Transfer-Encoding:From:Subject:Date:Cc:To; b=rTJfGE08fuA+7p24acETAkniUsLn0pzJ5gwiB72744DbtMQJjg7KeR2BQ46csoRak qnALHLTOCQzshoDJkRrSi4ZEOQKKwahKvaDIFu2O7kBkePNTwD/OoEAMljz8z2saVQ 0LkUNXxYbW4ky5/5mUdvB+LSHUdXa3nx7Pd1khYRlTzGH6USeTe2KCPIUmxkl2vxU3 pqUlL8NFyfoNtKY/dRnC6wVPsye5DxywLf6qIooiX9LA+ior0TNiVh2JrQnKCFUY6U guC+q0XZVew/ZWPv5LL0SZZoBldwPncoD5tQaoXBimF/8bbDvwkUh+uTFEkFNld7V+ WL03OSJDTRNOg==
Content-Type: multipart/alternative; boundary="Apple-Mail-7DEDBAA1-589B-4B91-A71A-9D1EC7C14EC7"
Content-Transfer-Encoding: 7bit
From: Chris Wendt <chris-ietf@chriswendt.net>
Mime-Version: 1.0 (1.0)
Date: Wed, 08 Oct 2025 11:41:01 -0500
Message-Id: <8D66E72E-567D-4E88-93CE-CA22A3E420EB@chriswendt.net>
References: <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com>
In-Reply-To: <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com>
To: Roman Shpount <roman@telurix.com>
X-Mailer: iPad Mail (23A355)
Message-ID-Hash: QOD2GYYWVLGJYHZGIC7YPSKYMUD2ZRQP
X-Message-ID-Hash: QOD2GYYWVLGJYHZGIC7YPSKYMUD2ZRQP
X-MailFrom: chris-ietf@chriswendt.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-stir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Pierce Gorman <Pierce.Gorman@numeracle.com>, Brett Nemeroff <Brett.Nemeroff@numeracle.com>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff.
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/Ez6HfPOe_jKZFuEqLzQJb0bTE_s>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Owner: <mailto:stir-owner@ietf.org>
List-Post: <mailto:stir@ietf.org>
List-Subscribe: <mailto:stir-join@ietf.org>
List-Unsubscribe: <mailto:stir-leave@ietf.org>

I appreciate all of the concerns and realities of where we are in the telecom world, believe me.  Business incentives for some reason seem to speak louder than implementing security/authentication protocols?!? (Confused IETF protocol person)  But yet the need for an end-to-end security/authentication protocol is required to move forward. As we have seen in many cases on the web and other examples, these things don’t get implemented consistently or comprehensively and there are those that want to get around the rules or delay for various reasons.  I applaud the FCC for taking a slow and steady approach to incrementally moving us forward, with vigorous industry and public feedback (as obviously demonstrated on this list as well) a specific set of rules that break a lot of the bad practices that the industry, for good and bad reasons have made mainstream.  To continue to move forward and rely only on blocking/labeling as our only tool without end-to-end authentication is not a valid answer. 

We want as an industry to keep the flexibility to originate calls/messages from many different platforms/services as one of the key innovations that VoIP has enabled for the ecosystem. Spoofing without authentication and the obvious lack of security/authentication has lead to where we are.  This is the opportunity to fix that and I believe we are moving closer toward that than it may appear, but we are not yet at the point that true end-to-end authentication is enabled. We are at least all working with identity headers in the network, that is an accomplishment in itself whether we want to admit that is progress or not. Of course, more steps to go, more to discuss and rationalize, this public discussion enabled and perhaps “forcibly facilitated” by FCC will hopefully take us towards the next step in that journey.  I view that as good for us all, even though i appreciate the pain and consternation and frustration expressed, that is valuable discussion as well.

On Oct 8, 2025, at 10:44 AM, Roman Shpount <roman@telurix.com> wrote:


Pierce,

I never called STIR/SHAKEN a success.

If you look at it as a mechanism to reduce the number of robocalls, it failed completely. It can easily be used to combat robocalls, but I don't know if anyone implementing it actually cares about it. It was always more about going through the motions, regulatory compliance, and possible deniability.

If you look at it from the point of view of ease of deployment, it was horribly designed with complete disregard for how current carrier networks operate. It is a networking, implementation, and administrative nightmare. I would not blame this group for creating a sub-par standard, but it was driven more by political necessity than by reasonable design considerations.

If you consider it in terms of providing helpful information in combating robocalls, it has clear utility. The most useful information is the information about the certificate used by the signer. It can easily be used to limit valid signers for phone numbers, preventing call spoofing. CNAM can be used for this with minimal effort. Adding a campaign registry to register high-volume originating numbers will provide a way for legitimate call centers to whitelist their calls and for terminating carriers to throttle the traffic. Snowshoeing would still be an issue, but I am unsure how to address this without conducting a content analysis.

I think the primary reason for the Rich Call Data push is not to combat robocalls or to present end users with the identity of the remote party. It is a financial incentive for the wireless carriers, which can charge for presenting Rich Call Data from the call originator, versus paying for a CNAM database dip. Wireless carriers attempted to charge their customers for displaying the caller's identity, but were unsuccessful in selling this feature. So, they pushed for a new network protocol where they can charge the call originator for this feature. In my case, I can send a SIP call with call data directly to a wireless carrier. The wireless carrier deliberately strips the caller's identity from this call. They are asking for money (not the caller KYC) to keep it. So, this is not about users. It is about revenue.

I believe a lot of people in this group are driven by their best intentions, but it ends up in an administrative quagmire and telecom revenue fiefdom anyway.

Best regards,
_____________
Roman Shpount


On Wed, Oct 8, 2025 at 9:53 AM Pierce Gorman <Pierce.Gorman@numeracle.com> wrote:

Well, this is a lively STIR discussion!

 

Dear Roman,

 

I will offer my view as the network design engineer that led the implementation of STIR/SHAKEN at Sprint, and former active participant of the FCC’s Call Authentication Trust Anchor working groups of the North American Numbering Council.  The fundamental reason STIR/SHAKEN exists is because unethical, immoral, or inept service providers are admitting illegal robocalls into the PSTN.  RCD, alone, will not change that.

 

During the first CATA wg I warned Henning Schulzrinne when he was CTO of the FCC that the TRACED Act and STIR/SHAKEN would not be successful in bringing about a material decline in illegal robocalls unless the US could accomplish “critical mass” of signing and verification.

 

I didn’t give a specific metric for critical mass in the context of STIR/SHAKEN but suggested something north of 90% of all call originations needed to be successfully signed and verified.  Even then success presumed analytics meaningfully identified bad calls, traceback based on analytics determinations was automated, and that the FCC Enforcement Bureau and/or other law enforcement agencies used the information to act swiftly and decisively.

 

Obviously, that has not happened, and I question whether it ever can.  I believe it is impractical to make significant headway against illegal robocalling using cryptography and punitive measures alone. 

 

STIR/SHAKEN as conceived and implemented based on legislative and regulatory mandates is a costly and so far, failed, experiment.

 

All that said, the TRACED Act and STIR/SHAKEN proved call authentication in the PSTN can be successfully accomplished, at scale.  That is very good, however, the misses still are:

1. We should have started with an Out-Of-Band (OOB) approach, possibly not even based on SIP, so that we could avoid the problems caused by transit networking and heterogenous inband call paths.

 

2. We should have focused on the sources of illegal robocalls, not ALL calls.  i.e., we should have focused our efforts on caller identification from call centers, as well as service providers (although the definition of “service provider” has proved damnably difficult.  Nobody, including and especially the FCC, knows how many VoIP call originators exist or how many originators aren’t even aware they would be considered a “service provider”).

 

3. Caller identification of non-service provider organizations should be done by professional KYC vetters who cryptographically attest as to the identity of the caller which is what iconective does when issuing an SPC token to a registered SP.  This reduces the possibility of collusion between service providers and their enterprise customers, and reduces the field of vetters that need to be accredited/authorized and held accountable by analytics, traceback, etc.

 

4. Caller identification schema need to recognize and accommodate the layered identities of modern telecommunications.  Few companies operate their own call center, but instead outsource the work to call center providers.  Digital identity and trust attribute (e.g., licensed? Insured?) credentials can expose the layers of identities and authorizations.  And, privacy-preserving proofs are possible where needed.

 

5. We should have lowered the barrier (as you also recognize) to permit callers (mostly call centers, but also enterprise mobiles, etc.) to register and access STI certificates attesting to their domain-verified identity (as a minimum).  Self-registered callers’ calls could be signed with RCD, not for the purpose of branded calling, but for the purpose of voluntarily identifying themselves as a measure to assist analytics providers more than anything to protect those callers’ calls from accidental labeling or blocking.  Further, with the identity of the caller (at least, and their service provider or providers, plural), robocall mitigation takes on a whole new level of capability.

 

Respectfully,

 

Pierce Gorman

 


CONFIDENTIAL

From: Chris Wendt <chris-ietf@chriswendt.net>
Sent: Wednesday, October 8, 2025 1:44 AM
To: Roman Shpount <roman@telurix.com>
Cc: Brett Nemeroff <Brett.Nemeroff@numeracle.com>; Richard Shockey <richard@shockey.us>; IETF STIR Mail List <stir@ietf.org>
Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff.

 

Removing art mailing list and only keeping stir mailing list on cc.  Let’s keep this on stir list only to avoid spamming art participants.

 

RCD, I’m a fan, i guess the party is really kicking in to gear.

 

-Chris



On Oct 8, 2025, at 12:19AM, Roman Shpount <roman@telurix.com> wrote:



Brett,

 

FCC was very deliberate in not specifying the KYC requirements. This being said, all carriers introducing traffic to the US phone network should have a KYC policy described in the RMD database. Carriers that did not provide an adequate policy have been removed from the RMD database and are no longer permitted to originate traffic. Additionally, if, as a carrier, I can set the A-level attestation for the call based on my KYC policy, I should be able to specify the Rich Call Data accordingly, especially if this is required when A-level attestation is provided.

 

I have a strong feeling that certain providers care more about creating new sources of revenue for themselves through regulatory arbitrage than about creating a healthy infrastructure to prevent robocalls. A glaring example is iConnectiv providing SPC tokens, but not the signing certificates, which artificially creates business for specialized certificate authorities. Ironically, this business opportunity is so small and labour-intensive that no one actually wants to do it, trying to shepherd carriers towards the hosted signing solution.

 

To summarize, if, as a carrier, I am entrusted with an SPC token, I should be trusted to provide the Rich Call Data. If I am not trusted to provide Rich Call Data into the network, I should not be introducing any traffic into it. If the FCC mandates Rich Call Data, it should mandate that carriers accept it without creating walled gardens, with each carrier charging a fee to actually accept the data.

 

Finally, if we intend to mandate the transmission of personally identifiable data with every call, we need to update SIP with a scalable and secure transport protocol. Most current carrier SIP implementations still use UDP. SIP-over-TLS suffers from head-of-the-line congestion issues. SIP is in dire need of a secure datagram-based protocol, such as QUIC. I am surprised that no one from the STIR group brought this to the SIPCore, so that a more scalable and secure protocol capable of carrying Rich Call Data could be standardized.

 

Best Regards,

_____________
Roman Shpount

 

 

On Tue, Oct 7, 2025 at 8:42PM Brett Nemeroff <Brett.Nemeroff@numeracle.com> wrote:

Hello Roman,

 

In my opinion, US Carriers are unlikely to accept vanilla RCD data because of the lack of defined KYC.  RCD is a very good vehicle for delivering the RCD, but it depends upon implicit trust of the originating service provider. “Vanilla” RCD offered like this to terminating service providers gives no assurance to the terminating service provider that the originator performed any specific KYC.

 

CTIA’s BCID is based on RCD but details an ecosystem with specific KYC requirements. Participating in this ecosystem will allow for the delivery and native presentation of RCD. 

 

It’s worth noting that without a defined ecosystem for RCD such as BCID, RCD provides little (trust)  benefit over traditional CNAM other than the fingerprints of the originating service provider for enforcement purposes. 

 

-Brett

 

 

 

Brett Nemeroff
VP of Engineering - Voice
Brett.Nemeroff@numeracle.com | 1-512-203-3884

https://www.numeracle.com/" target="_blank" rel="nofollow">

https://www.numeracle.com/" target="_blank" rel="nofollow"><C2_signature_logo_ccb8cfe8-4171-4801-978c-931782d067de.png>

 

Empowering Calls with
https://www.numeracle.com/insights/entity-identity-management-to-empower-your-calls" target="_blank" rel="nofollow">Identity Management 

 

CONFIDENTIAL

From: Roman Shpount <roman@telurix.com>
Date: Tuesday, October 7, 2025 at 7:24
PM
To: Richard Shockey <richard@shockey.us>
Cc: IETF STIR Mail List <stir@ietf.org>, art@ietf.org <art@ietf.org>
Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff.

You don't often get email from roman@telurix.com. https://aka.ms/LearnAboutSenderIdentification" target="_blank" rel="nofollow"> Learn why this is important

In my day job, I see a lot of robocalls coming through the LEC local switches as TDM, as local re-origination with spoofed ANI. 

 

I would also love to sign Rich Call Data with my SPC token and not have wireless carriers discard this data. If I provide the information about my customer, I am unsure why I need to pay someone else to sign this information.

_____________
Roman Shpount

 

 

On Tue, Oct 7, 2025 at 8:11PM Richard Shockey <richard@shockey.us> wrote:

 

It wont . You mean the legacy TDM/SS7 crap…this is the beginning of mandating all SIP in the US realtime US voice network as the British have done.

 

I would not want to own a Tandem Access network.

 

The US industry is pretty clear on this.  You only need to read the FCC 17-97 docket at the FCC ECFS website to understand where the players actually are.

 

This again is my day job.

 

 

Richard Shockey

Shockey Consulting LLC

Chairman of the Board SIP Forum

http://www.shockey.us/" target="_blank" rel="nofollow">www.shockey.us

http://www.sipforum.org/" target="_blank" rel="nofollow">www.sipforum.org

richard<at>http://shockey.us/" target="_blank" rel="nofollow">shockey.us

Skype-Linkedin-Facebook –Twitter  rshockey101

PSTN +1 703-593-2683

 

 

From: Roman Shpount <roman@telurix.com>
Date: Tuesday, October 7, 2025 at 7:37 PM
To: Richard Shockey <richard@shockey.us>
Cc: IETF STIR Mail List <stir@ietf.org>, <art@ietf.org>
Subject: [art] Re: [stir] For those of you who follow this kind of stuff.

 

How would this work with PSTN links?

_____________
Roman Shpount

 

 

On Tue, Oct 7, 2025 at 6:59PM Richard Shockey <richard@shockey.us> wrote:


The United States government is going to mandate Rich Call Data in the network.

https://docs.fcc.gov/public/attachments/DOC-415059A1.pdf" target="_blank" rel="nofollow">https://docs.fcc.gov/public/attachments/DOC-415059A1.pdf


Richard Shockey
Shockey Consulting LLC
Chairman of the Board SIP Forum
http://www.shockey.us/" target="_blank" rel="nofollow">www.shockey.us <http://www.shockey.us/" target="_blank" rel="nofollow">http://www.shockey.us>
http://www.sipforum.org/" target="_blank" rel="nofollow">www.sipforum.org

richard<at>http://shockey.us/" target="_blank" rel="nofollow">shockey.us
Skype-Linkedin-Facebook –Twitter rshockey101
PSTN +1 703-593-2683






_______________________________________________
stir mailing list -- stir@ietf.org
To unsubscribe send an email to stir-leave@ietf.org

_______________________________________________ art mailing list -- art@ietf.org To unsubscribe send an email to art-leave@ietf.org

_______________________________________________
art mailing list -- art@ietf.org
To unsubscribe send an email to art-leave@ietf.org