[stir] Re: [art] Re: For those of you who follow this kind of stuff.
Chris Wendt <chris-ietf@chriswendt.net> Wed, 08 October 2025 16:41 UTC
Return-Path: <chris-ietf@chriswendt.net>
X-Original-To: stir@mail2.ietf.org
Delivered-To: stir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 7D4276F7F12A for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 09:41:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.193
X-Spam-Level:
X-Spam-Status: No, score=-1.193 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, MIME_HTML_ONLY=0.1, MIME_HTML_ONLY_MULTI=0.001, MIME_QP_LONG_LINE=0.001, MPART_ALT_DIFF=0.79, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=no autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=chriswendt.net
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id x0ipJymlGBjQ for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 09:41:36 -0700 (PDT)
Received: from cyan.elm.relay.mailchannels.net (cyan.elm.relay.mailchannels.net [23.83.212.47]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 51F9A6F7F123 for <stir@ietf.org>; Wed, 8 Oct 2025 09:41:36 -0700 (PDT)
X-Sender-Id: dreamhost|x-authsender|chris-ietf@chriswendt.net
Received: from relay.mailchannels.net (localhost [127.0.0.1]) by relay.mailchannels.net (Postfix) with ESMTP id 286867C030E; Wed, 08 Oct 2025 16:41:29 +0000 (UTC)
Received: from pdx1-sub0-mail-a287.dreamhost.com (trex-green-9.trex.outbound.svc.cluster.local [100.115.140.78]) (Authenticated sender: dreamhost) by relay.mailchannels.net (Postfix) with ESMTPA id D35917C376C; Wed, 08 Oct 2025 16:41:23 +0000 (UTC)
ARC-Seal: i=1; s=arc-2022; d=mailchannels.net; t=1759941683; a=rsa-sha256; cv=none; b=qlK9DvJK2Ll0BFBgSOluvbQ0gw1YTdv9AHbYiFaMLqUopAxXNsrzX9eESl2pnLqROySThM AEko58t+eyiSZZZG7h9vyYYAlyoduDJjB/s8TAcyx+rBH/Pg43xHWxzMNomCDviM4FmIMq KsSImC049hIpzcvXe2zxBdLb4Vt1RG6Stu/XkzhknbqXzwSRZMVcW3Ql426QiX6CwRRXm7 nP+2MUzcyKr+uQohsg/sYg6P6doGXYOrqPJDRmvDd62hBcmmqhzGAb0vYrykkVbnSGXFWd uGXd6m4g/AWciDyZ0TQA1/cceIIsAt7mSNuFUmQEt4kr3XwmgS+SKvjTbzDwRw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=mailchannels.net; s=arc-2022; t=1759941683; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references:dkim-signature; bh=lQ7pfKZ/AANjT8hFnCasVUzgYy3+jLFvvHhnrSGP6/g=; b=KNu0RdNlPeH5Vow+rAWp4O0enbz5uuO7HJsv+0mvP7htykvtL/fd6pbw4EGPNc8xXWqZQc I3WUSFOniPEQJil6jKL+8u64uRJ6P0taBt7OyXQSuQdQG50vlYJWgothOOM6apNDrS4g+u cQp9/9/qE04wSpdR1nCniiECF2gqdlW9yKXTQQBqbEGcx4cF6ApZnbwVJZUeVrAfxaA6Nn 7IlwKBcM2LRJyr9GZXDAhPX0PNCa1NJ9ub6y1/7D04dGDkPjBE7oXpne+N0xecIHIDJqHK 9+8tQl9EH2K6yrSPuZzzeu5G0xWHLc3W1a/xNu/pHXWJ/o+sEfeGvqbZ0A1+6Q==
ARC-Authentication-Results: i=1; rspamd-777888ddf6-svl9l; auth=pass smtp.auth=dreamhost smtp.mailfrom=chris-ietf@chriswendt.net
X-Sender-Id: dreamhost|x-authsender|chris-ietf@chriswendt.net
X-MC-Relay: Neutral
X-MailChannels-SenderId: dreamhost|x-authsender|chris-ietf@chriswendt.net
X-MailChannels-Auth-Id: dreamhost
X-Exultant-Unite: 0fb6871010b6b961_1759941688977_3842012566
X-MC-Loop-Signature: 1759941688977:2270897534
X-MC-Ingress-Time: 1759941688977
Received: from pdx1-sub0-mail-a287.dreamhost.com (pop.dreamhost.com [64.90.62.162]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384) by 100.115.140.78 (trex/7.1.3); Wed, 08 Oct 2025 16:41:28 +0000
Received: from smtpclient.apple (unknown [45.88.222.56]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) (Authenticated sender: chris-ietf@chriswendt.net) by pdx1-sub0-mail-a287.dreamhost.com (Postfix) with ESMTPSA id 4chf0L3tbLz7h; Wed, 8 Oct 2025 09:41:22 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chriswendt.net; s=dreamhost; t=1759941683; bh=lQ7pfKZ/AANjT8hFnCasVUzgYy3+jLFvvHhnrSGP6/g=; h=Content-Type:Content-Transfer-Encoding:From:Subject:Date:Cc:To; b=rTJfGE08fuA+7p24acETAkniUsLn0pzJ5gwiB72744DbtMQJjg7KeR2BQ46csoRak qnALHLTOCQzshoDJkRrSi4ZEOQKKwahKvaDIFu2O7kBkePNTwD/OoEAMljz8z2saVQ 0LkUNXxYbW4ky5/5mUdvB+LSHUdXa3nx7Pd1khYRlTzGH6USeTe2KCPIUmxkl2vxU3 pqUlL8NFyfoNtKY/dRnC6wVPsye5DxywLf6qIooiX9LA+ior0TNiVh2JrQnKCFUY6U guC+q0XZVew/ZWPv5LL0SZZoBldwPncoD5tQaoXBimF/8bbDvwkUh+uTFEkFNld7V+ WL03OSJDTRNOg==
Content-Type: multipart/alternative; boundary="Apple-Mail-7DEDBAA1-589B-4B91-A71A-9D1EC7C14EC7"
Content-Transfer-Encoding: 7bit
From: Chris Wendt <chris-ietf@chriswendt.net>
Mime-Version: 1.0 (1.0)
Date: Wed, 08 Oct 2025 11:41:01 -0500
Message-Id: <8D66E72E-567D-4E88-93CE-CA22A3E420EB@chriswendt.net>
References: <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com>
In-Reply-To: <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com>
To: Roman Shpount <roman@telurix.com>
X-Mailer: iPad Mail (23A355)
Message-ID-Hash: QOD2GYYWVLGJYHZGIC7YPSKYMUD2ZRQP
X-Message-ID-Hash: QOD2GYYWVLGJYHZGIC7YPSKYMUD2ZRQP
X-MailFrom: chris-ietf@chriswendt.net
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-stir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Pierce Gorman <Pierce.Gorman@numeracle.com>, Brett Nemeroff <Brett.Nemeroff@numeracle.com>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff.
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/Ez6HfPOe_jKZFuEqLzQJb0bTE_s>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Owner: <mailto:stir-owner@ietf.org>
List-Post: <mailto:stir@ietf.org>
List-Subscribe: <mailto:stir-join@ietf.org>
List-Unsubscribe: <mailto:stir-leave@ietf.org>
On Oct 8, 2025, at 10:44 AM, Roman Shpount <roman@telurix.com> wrote:
Pierce,I never called STIR/SHAKEN a success.If you look at it as a mechanism to reduce the number of robocalls, it failed completely. It can easily be used to combat robocalls, but I don't know if anyone implementing it actually cares about it. It was always more about going through the motions, regulatory compliance, and possible deniability.If you look at it from the point of view of ease of deployment, it was horribly designed with complete disregard for how current carrier networks operate. It is a networking, implementation, and administrative nightmare. I would not blame this group for creating a sub-par standard, but it was driven more by political necessity than by reasonable design considerations.If you consider it in terms of providing helpful information in combating robocalls, it has clear utility. The most useful information is the information about the certificate used by the signer. It can easily be used to limit valid signers for phone numbers, preventing call spoofing. CNAM can be used for this with minimal effort. Adding a campaign registry to register high-volume originating numbers will provide a way for legitimate call centers to whitelist their calls and for terminating carriers to throttle the traffic. Snowshoeing would still be an issue, but I am unsure how to address this without conducting a content analysis.I think the primary reason for the Rich Call Data push is not to combat robocalls or to present end users with the identity of the remote party. It is a financial incentive for the wireless carriers, which can charge for presenting Rich Call Data from the call originator, versus paying for a CNAM database dip. Wireless carriers attempted to charge their customers for displaying the caller's identity, but were unsuccessful in selling this feature. So, they pushed for a new network protocol where they can charge the call originator for this feature. In my case, I can send a SIP call with call data directly to a wireless carrier. The wireless carrier deliberately strips the caller's identity from this call. They are asking for money (not the caller KYC) to keep it. So, this is not about users. It is about revenue.I believe a lot of people in this group are driven by their best intentions, but it ends up in an administrative quagmire and telecom revenue fiefdom anyway.Best regards,_____________
Roman ShpountWell, this is a lively STIR discussion!
Dear Roman,
I will offer my view as the network design engineer that led the implementation of STIR/SHAKEN at Sprint, and former active participant of the FCC’s Call Authentication Trust Anchor working groups of the North American Numbering Council. The fundamental reason STIR/SHAKEN exists is because unethical, immoral, or inept service providers are admitting illegal robocalls into the PSTN. RCD, alone, will not change that.
During the first CATA wg I warned Henning Schulzrinne when he was CTO of the FCC that the TRACED Act and STIR/SHAKEN would not be successful in bringing about a material decline in illegal robocalls unless the US could accomplish “critical mass” of signing and verification.
I didn’t give a specific metric for critical mass in the context of STIR/SHAKEN but suggested something north of 90% of all call originations needed to be successfully signed and verified. Even then success presumed analytics meaningfully identified bad calls, traceback based on analytics determinations was automated, and that the FCC Enforcement Bureau and/or other law enforcement agencies used the information to act swiftly and decisively.
Obviously, that has not happened, and I question whether it ever can. I believe it is impractical to make significant headway against illegal robocalling using cryptography and punitive measures alone.
STIR/SHAKEN as conceived and implemented based on legislative and regulatory mandates is a costly and so far, failed, experiment.
All that said, the TRACED Act and STIR/SHAKEN proved call authentication in the PSTN can be successfully accomplished, at scale. That is very good, however, the misses still are:
1. We should have started with an Out-Of-Band (OOB) approach, possibly not even based on SIP, so that we could avoid the problems caused by transit networking and heterogenous inband call paths.
2. We should have focused on the sources of illegal robocalls, not ALL calls. i.e., we should have focused our efforts on caller identification from call centers, as well as service providers (although the definition of “service provider” has proved damnably difficult. Nobody, including and especially the FCC, knows how many VoIP call originators exist or how many originators aren’t even aware they would be considered a “service provider”).
3. Caller identification of non-service provider organizations should be done by professional KYC vetters who cryptographically attest as to the identity of the caller which is what iconective does when issuing an SPC token to a registered SP. This reduces the possibility of collusion between service providers and their enterprise customers, and reduces the field of vetters that need to be accredited/authorized and held accountable by analytics, traceback, etc.
4. Caller identification schema need to recognize and accommodate the layered identities of modern telecommunications. Few companies operate their own call center, but instead outsource the work to call center providers. Digital identity and trust attribute (e.g., licensed? Insured?) credentials can expose the layers of identities and authorizations. And, privacy-preserving proofs are possible where needed.
5. We should have lowered the barrier (as you also recognize) to permit callers (mostly call centers, but also enterprise mobiles, etc.) to register and access STI certificates attesting to their domain-verified identity (as a minimum). Self-registered callers’ calls could be signed with RCD, not for the purpose of branded calling, but for the purpose of voluntarily identifying themselves as a measure to assist analytics providers more than anything to protect those callers’ calls from accidental labeling or blocking. Further, with the identity of the caller (at least, and their service provider or providers, plural), robocall mitigation takes on a whole new level of capability.
Respectfully,
Pierce Gorman
CONFIDENTIAL
From: Chris Wendt <chris-ietf@chriswendt.net>
Sent: Wednesday, October 8, 2025 1:44 AM
To: Roman Shpount <roman@telurix.com>
Cc: Brett Nemeroff <Brett.Nemeroff@numeracle.com>; Richard Shockey <richard@shockey.us>; IETF STIR Mail List <stir@ietf.org>
Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff.
Removing art mailing list and only keeping stir mailing list on cc. Let’s keep this on stir list only to avoid spamming art participants.
RCD, I’m a fan, i guess the party is really kicking in to gear.
-Chris
On Oct 8, 2025, at 12:19 AM, Roman Shpount <roman@telurix.com> wrote:
Brett,
FCC was very deliberate in not specifying the KYC requirements. This being said, all carriers introducing traffic to the US phone network should have a KYC policy described in the RMD database. Carriers that did not provide an adequate policy have been removed from the RMD database and are no longer permitted to originate traffic. Additionally, if, as a carrier, I can set the A-level attestation for the call based on my KYC policy, I should be able to specify the Rich Call Data accordingly, especially if this is required when A-level attestation is provided.
I have a strong feeling that certain providers care more about creating new sources of revenue for themselves through regulatory arbitrage than about creating a healthy infrastructure to prevent robocalls. A glaring example is iConnectiv providing SPC tokens, but not the signing certificates, which artificially creates business for specialized certificate authorities. Ironically, this business opportunity is so small and labour-intensive that no one actually wants to do it, trying to shepherd carriers towards the hosted signing solution.
To summarize, if, as a carrier, I am entrusted with an SPC token, I should be trusted to provide the Rich Call Data. If I am not trusted to provide Rich Call Data into the network, I should not be introducing any traffic into it. If the FCC mandates Rich Call Data, it should mandate that carriers accept it without creating walled gardens, with each carrier charging a fee to actually accept the data.
Finally, if we intend to mandate the transmission of personally identifiable data with every call, we need to update SIP with a scalable and secure transport protocol. Most current carrier SIP implementations still use UDP. SIP-over-TLS suffers from head-of-the-line congestion issues. SIP is in dire need of a secure datagram-based protocol, such as QUIC. I am surprised that no one from the STIR group brought this to the SIPCore, so that a more scalable and secure protocol capable of carrying Rich Call Data could be standardized.
Best Regards,
_____________
Roman Shpount
On Tue, Oct 7, 2025 at 8:42 PM Brett Nemeroff <Brett.Nemeroff@numeracle.com> wrote:
Hello Roman,
In my opinion, US Carriers are unlikely to accept vanilla RCD data because of the lack of defined KYC. RCD is a very good vehicle for delivering the RCD, but it depends upon implicit trust of the originating service provider. “Vanilla” RCD offered like this to terminating service providers gives no assurance to the terminating service provider that the originator performed any specific KYC.
CTIA’s BCID is based on RCD but details an ecosystem with specific KYC requirements. Participating in this ecosystem will allow for the delivery and native presentation of RCD.
It’s worth noting that without a defined ecosystem for RCD such as BCID, RCD provides little (trust) benefit over traditional CNAM other than the fingerprints of the originating service provider for enforcement purposes.
-Brett
Brett Nemeroff
VP of Engineering - Voice
Brett.Nemeroff@numeracle.com | 1-512-203-3884
https://www.numeracle.com/" target="_blank" rel="nofollow">
https://www.numeracle.com/" target="_blank" rel="nofollow"><C2_signature_logo_ccb8cfe8-4171-4801-978c-931782d067de.png>
Empowering Calls with
https://www.numeracle.com/insights/entity-identity-management-to-empower-your-calls" target="_blank" rel="nofollow">Identity Management_______________________________________________
art mailing list -- art@ietf.org
To unsubscribe send an email to art-leave@ietf.org
- [stir] For those of you who follow this kind of s… Richard Shockey
- [stir] Re: For those of you who follow this kind … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Richard Shockey
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: Re: Re: For those of you who… Tim Bray
- [stir] Re: [art] Re: Re: Re: For those of you who… Brett Nemeroff
- [stir] Re: [art] Re: For those of you who follow … Richard Shockey
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Chris Wendt
- [stir] Re: [art] Re: For those of you who follow … Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Verifiable Voice Protocol (VVP) Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Andy Newton
- [stir] Re: Verifiable Voice Protocol (VVP) Daniel Hardman
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: Verifiable Voice Protocol (VVP) Russ Housley
- [stir] Re: [art] Re: Re: Re: For those of you who… Richard Shockey
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: [art] Re: Re: Re: For those of you who… Henning Schulzrinne
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: [art] Re: Re: Re: For those of you who… Pierce Gorman
- [stir] Re: Verifiable Voice Protocol (VVP) Orie
- [stir] Re: Verifiable Voice Protocol (VVP) Peterson, Jon
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: Re: Re: For those of you who… Richard Shockey
- [stir] Re: Verifiable Voice Protocol (VVP) Daniel Hardman
- [stir] Re: [art] Re: For those of you who follow … Chris Wendt
- [stir] Re: Verifiable Voice Protocol (VVP) Brett Nemeroff