[stir] Re: [art] Re: Re: Re: For those of you who follow this kind of stuff.

Roman Shpount <roman@telurix.com> Thu, 09 October 2025 03:56 UTC

Return-Path: <roman@telurix.com>
X-Original-To: stir@mail2.ietf.org
Delivered-To: stir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 0985C6FCF8D7 for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 20:56:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level:
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_FONT_LOW_CONTRAST=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, TRACKER_ID=0.1] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (1024-bit key) header.d=telurix.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dnHAtTtlOAnf for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 20:56:31 -0700 (PDT)
Received: from mail-lf1-x136.google.com (mail-lf1-x136.google.com [IPv6:2a00:1450:4864:20::136]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 828E86FCF8CD for <stir@ietf.org>; Wed, 8 Oct 2025 20:56:30 -0700 (PDT)
Received: by mail-lf1-x136.google.com with SMTP id 2adb3069b0e04-58120c35d47so95057e87.1 for <stir@ietf.org>; Wed, 08 Oct 2025 20:56:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=telurix.com; s=google; t=1759982183; x=1760586983; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=DNf5J4BURw2rxqKHg+pkQh8osoPk75zyRYTCytODFjI=; b=W9nLUqiZ+5NXt1IKErCTCoV/eqy1+Hz6OR8DwM7CM1q5LERwQ5i18yGFMCV4ibjW0U SRqih6ZigOF4llXLQIKCxJBGGbqOTouyF45h8mlvJfkAQb/IlN0y110UXIlIw4jDg4gN QyrqKZmJiN3ycMyrLLMq8i7R4IJd2b9vmYG9A=
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1759982183; x=1760586983; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=DNf5J4BURw2rxqKHg+pkQh8osoPk75zyRYTCytODFjI=; b=qup5EY0mu7si/EWVJhPRKZbbxziwhcq2dPRdDZjBwybkvzKYypdIxysCWdnTxOkuNJ fsOee2UjPuV7yqIMy/DPZ9BI6///E6L4ZFzBHyPENoWskLzg1SGXP7wWbF2fcqv437QE 5QRtIPSz1ZXRztDUlVdZyhY3JnSnUZhl3O+3m51pneSR7h+QCVCw8Q1fGLJ6Ku5VDqve cviLyUCP4XQuT2G0AKdCxAs9xGYuAc3NNtRH6vHtDyafVLpowe1V+hq/tdAKJUGCYtEd vXOY/htf0psonXkE9TKCuzrLLsgP/bQbXNk5rO92q6QI5seiAQClpV26NbL97coA6Zt2 BDVA==
X-Forwarded-Encrypted: i=1; AJvYcCXm3a5QHW575x5xA7ypkcy5q2ZHVn4fgHNQmmJVom2xdG6iI/1fMCiJKSBL/5wzhQPT8VbA@ietf.org
X-Gm-Message-State: AOJu0YxZCewGZK46CPyhevZ8gIALeT6BTt5f15pu6lz5mHXo8zRTde4H T/5N/EDNdbA2KKWAYz+YY2mnSN2OU6Te5D+NeXQXPbkWpIDVqNM73NWxZqFs0qBAayx6+UukG12 sOAStalI=
X-Gm-Gg: ASbGncvmX4VbXLxz8XREBlGVNfW3paX4F3n3/GftWMo3htTEDxOHHmhF3104DumLZNU Xf5/OhZBXp0YBATNXwi69al+L8J6xYzVwQdRUTypyRpJsWOoCLlR1ZlGfTNP9P5Ei71+N7ca+LF DHstj605UrgJ/Aam/fWRtvs4EpP/OzYGsfF16FtzQimVcm2T5nNMxVKgXS/ssMhqsktyFsZPVnT fEXw+1ROYYc3e91fHKKC1Dp6K6OVqQihWMSCs/6uK2c9d1O/GoVjvE6q+eTCXgcebLyxaYhipiF eTPqchlUaA1S3t0wBiEDZRK+AyaUd53bcxRnv66gMo6S1yk2hmiOPgrlAce2QYuVtALsBi2Z4nv kFDCJrvt64yXF7OLRiAQKhMI4yh95KcK1WAVNsVPWpCx3mdW4DUxnxvXHDrDdBoHH4K901OqGWm eLoDorOjxW
X-Google-Smtp-Source: AGHT+IEziWcqdC0K+ICjAzPOwOoEibR77IgP4VfWXxkaemLGZVP7M8CW/mymJjx0eN+ydhAVLtYJyg==
X-Received: by 2002:a05:6512:3b22:b0:586:15ea:53c8 with SMTP id 2adb3069b0e04-5906d76d180mr896253e87.2.1759982182491; Wed, 08 Oct 2025 20:56:22 -0700 (PDT)
Received: from mail-lj1-f181.google.com (mail-lj1-f181.google.com. [209.85.208.181]) by smtp.gmail.com with ESMTPSA id 2adb3069b0e04-5907ac0cfc8sm667013e87.32.2025.10.08.20.56.21 for <stir@ietf.org> (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Wed, 08 Oct 2025 20:56:21 -0700 (PDT)
Received: by mail-lj1-f181.google.com with SMTP id 38308e7fff4ca-36a6a397477so4384221fa.3 for <stir@ietf.org>; Wed, 08 Oct 2025 20:56:21 -0700 (PDT)
X-Forwarded-Encrypted: i=1; AJvYcCWabYv5nDDHgFaOLKcLFRthjm3lGbqy7O+j6UiP5eh3Z/sDC5FXYYHFgHzG+Wib3Dm/kKQv@ietf.org
X-Received: by 2002:a05:651c:1588:b0:36c:47c8:b618 with SMTP id 38308e7fff4ca-37609da0dffmr15225571fa.18.1759982181060; Wed, 08 Oct 2025 20:56:21 -0700 (PDT)
MIME-Version: 1.0
References: <BDE3EA55-E1F7-4575-9251-874BD0CEFD37@shockey.us> <CAD5OKxsXX-+QcJCN_ymdO1XC_jEtbUcZq81oiPo7+DOnV2R+VA@mail.gmail.com> <49BE4C2A-DC24-4445-A296-A8E26689DA2A@shockey.us> <CAD5OKxvVwVyeF1AYY72rCEhFNkYuxB=D8EOt+1iDSB5LyMLwLQ@mail.gmail.com> <DM6PR13MB406762742DB674A370055AAB9AE1A@DM6PR13MB4067.namprd13.prod.outlook.com> <CAD5OKxsCDRA_TWfqBNQjpoACntFfqOS98cVHL8aWNR8YKvjR+Q@mail.gmail.com> <CACgrgBa-uVBWbidDuC6yGMkgnGmWro34KpB+yFxGFQOsw-2iYg@mail.gmail.com>
In-Reply-To: <CACgrgBa-uVBWbidDuC6yGMkgnGmWro34KpB+yFxGFQOsw-2iYg@mail.gmail.com>
From: Roman Shpount <roman@telurix.com>
Date: Wed, 08 Oct 2025 23:56:06 -0400
X-Gmail-Original-Message-ID: <CAD5OKxutvSJDuh9T=tJEyAz_CYW6EBQp_FULzRzrcYuDU93nCw@mail.gmail.com>
X-Gm-Features: AS18NWArWKd2LhU5v1wB78TFDk_zAp8xM-Jue6LKlrwPkxagUTaAtt5wI_u_yuY
Message-ID: <CAD5OKxutvSJDuh9T=tJEyAz_CYW6EBQp_FULzRzrcYuDU93nCw@mail.gmail.com>
To: Henning Schulzrinne <hgs@cs.columbia.edu>
Content-Type: multipart/related; boundary="000000000000b6afa00640b1c8eb"
Message-ID-Hash: 3VNJKUJDPPZENGVKZOCKDEJPGPIM6A6B
X-Message-ID-Hash: 3VNJKUJDPPZENGVKZOCKDEJPGPIM6A6B
X-MailFrom: roman@telurix.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-stir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Brett Nemeroff <Brett.Nemeroff@numeracle.com>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [stir] Re: [art] Re: Re: Re: For those of you who follow this kind of stuff.
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/G3p7dxl29m87wkoFkkbdzLptTUw>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Owner: <mailto:stir-owner@ietf.org>
List-Post: <mailto:stir@ietf.org>
List-Subscribe: <mailto:stir-join@ietf.org>
List-Unsubscribe: <mailto:stir-leave@ietf.org>

At the same time, every bank is able to establish whether it is talking to
a legitimate business representative without any issues when opening an
account. The Campaign Registry undergoes this process every time a new SMS
campaign is registered, before a single SMS message is sent. There is no
reason why a business that manages a large inventory of phone numbers or
initiates a lot of calls cannot go through a verification process and be
issued a security token, which they can use to sign calls initiated by
them. This will bring the whole process on par with SMS messaging campaigns.

This, of course, only makes sense for high-call-volume business customers.
For a low-volume caller, the carrier should be able to provide the user's
data based on their KYC process, which already requires them to establish
the end-user's identity before issuing the phone number.
_____________
Roman Shpount


On Wed, Oct 8, 2025 at 9:52 PM Henning Schulzrinne <hgs@cs.columbia.edu>
wrote:

> Verifying that you (carrier) has assigned a number to a customer (A
> attestation) seems much simpler than verifying that the company is
> authorized to use a particular DBA trade name. Anybody can submit a
> corporate registration PDF - proving that this is your company is
> unfortunately harder. (Much of this could be simplified if the state
> secretaries were to provide the equivalent of proof-of-control in ACME, but
> that's a separate issue.)
>
> On Wed, Oct 8, 2025 at 1:19 AM Roman Shpount <roman@telurix.com> wrote:
>
>> Brett, FCC was very deliberate in not specifying the KYC requirements.
>> This being said, all carriers introducing traffic to the US phone network
>> should have a KYC policy described in the RMD database. Carriers that did
>> not provide an adequate
>> ZjQcmQRYFpfptBannerStart
>>
>> ZjQcmQRYFpfptBannerEnd
>> Brett,
>>
>> FCC was very deliberate in not specifying the KYC requirements. This
>> being said, all carriers introducing traffic to the US phone network should
>> have a KYC policy described in the RMD database. Carriers that did not
>> provide an adequate policy have been removed from the RMD database and are
>> no longer permitted to originate traffic. Additionally, if, as a carrier, I
>> can set the A-level attestation for the call based on my KYC policy, I
>> should be able to specify the Rich Call Data accordingly, especially if
>> this is required when A-level attestation is provided.
>>
>> I have a strong feeling that certain providers care more about creating
>> new sources of revenue for themselves through regulatory arbitrage than
>> about creating a healthy infrastructure to prevent robocalls. A glaring
>> example is iConnectiv providing SPC tokens, but not the signing
>> certificates, which artificially creates business for specialized
>> certificate authorities. Ironically, this business opportunity is so small
>> and labour-intensive that no one actually wants to do it, trying to
>> shepherd carriers towards the hosted signing solution.
>>
>> To summarize, if, as a carrier, I am entrusted with an SPC token, I
>> should be trusted to provide the Rich Call Data. If I am not trusted to
>> provide Rich Call Data into the network, I should not be introducing any
>> traffic into it. If the FCC mandates Rich Call Data, it should mandate that
>> carriers accept it without creating walled gardens, with each carrier
>> charging a fee to actually accept the data.
>>
>> Finally, if we intend to mandate the transmission of personally
>> identifiable data with every call, we need to update SIP with a scalable
>> and secure transport protocol. Most current carrier SIP implementations
>> still use UDP. SIP-over-TLS suffers from head-of-the-line congestion
>> issues. SIP is in dire need of a secure datagram-based protocol, such as
>> QUIC. I am surprised that no one from the STIR group brought this to the
>> SIPCore, so that a more scalable and secure protocol capable of carrying
>> Rich Call Data could be standardized.
>>
>> Best Regards,
>> _____________
>> Roman Shpount
>>
>>
>> On Tue, Oct 7, 2025 at 8:42 PM Brett Nemeroff <
>> Brett.Nemeroff@numeracle.com> wrote:
>>
>>> Hello Roman,
>>>
>>> In my opinion, US Carriers are unlikely to accept vanilla RCD data
>>> because of the lack of defined KYC.  RCD is a very good vehicle for
>>> delivering the RCD, but it depends upon implicit trust of the originating
>>> service provider. “Vanilla” RCD offered like this to terminating service
>>> providers gives no assurance to the terminating service provider that the
>>> originator performed any specific KYC.
>>>
>>> CTIA’s BCID is based on RCD but details an ecosystem with specific KYC
>>> requirements. Participating in this ecosystem will allow for the delivery
>>> and native presentation of RCD.
>>>
>>> It’s worth noting that without a defined ecosystem for RCD such as BCID,
>>> RCD provides little (trust)  benefit over traditional CNAM other than the
>>> fingerprints of the originating service provider for enforcement purposes.
>>>
>>> -Brett
>>>
>>>
>>>
>>> Brett Nemeroff
>>> VP of Engineering - Voice
>>> Brett.Nemeroff@numeracle.com <%7BE-mail%7D> | 1-512-203-3884
>>>
>>> [image: Logo.png]
>>> <https://urldefense.com/v3/__https://www.numeracle.com/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxNBXJUgl$>
>>>
>>> Empowering Calls with
>>> Identity Management
>>> <https://urldefense.com/v3/__https://www.numeracle.com/insights/entity-identity-management-to-empower-your-calls__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxGDI1Gsq$>
>>>
>>>
>>>
>>> * CONFIDENTIAL From: *Roman Shpount <roman@telurix.com>
>>> *Date: *Tuesday, October 7, 2025 at 7:24 PM
>>> *To: *Richard Shockey <richard@shockey.us>
>>> *Cc: *IETF STIR Mail List <stir@ietf.org>, art@ietf.org <art@ietf.org>
>>> *Subject: *[stir] Re: [art] Re: For those of you who follow this kind
>>> of stuff.
>>>
>>> You don't often get email from roman@telurix.com. Learn why this is
>>> important
>>> <https://urldefense.com/v3/__https://aka.ms/LearnAboutSenderIdentification__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxHkIpe8T$>
>>> In my day job, I see a lot of robocalls coming through the LEC local
>>> switches as TDM, as local re-origination with spoofed ANI.
>>>
>>> I would also love to sign Rich Call Data with my SPC token and not have
>>> wireless carriers discard this data. If I provide the information about my
>>> customer, I am unsure why I need to pay someone else to sign this
>>> information.
>>> _____________
>>> Roman Shpount
>>>
>>>
>>> On Tue, Oct 7, 2025 at 8:11 PM Richard Shockey <richard@shockey.us>
>>> wrote:
>>>
>>>
>>>
>>> It wont . You mean the legacy TDM/SS7 crap…this is the beginning of
>>> mandating all SIP in the US realtime US voice network as the British have
>>> done.
>>>
>>>
>>>
>>> I would not want to own a Tandem Access network.
>>>
>>>
>>>
>>> The US industry is pretty clear on this.  You only need to read the FCC
>>> 17-97 docket at the FCC ECFS website to understand where the players
>>> actually are.
>>>
>>>
>>>
>>> This again is my day job.
>>>
>>>
>>>
>>>
>>>
>>> Richard Shockey
>>>
>>> Shockey Consulting LLC
>>>
>>> Chairman of the Board SIP Forum
>>>
>>> www.shockey.us
>>> <https://urldefense.com/v3/__http://www.shockey.us/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxLLsp087$>
>>>
>>> www.sipforum.org
>>> <https://urldefense.com/v3/__http://www.sipforum.org/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxJnbiopn$>
>>>
>>> richard<at>shockey.us
>>> <https://urldefense.com/v3/__http://shockey.us/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxDCzfs2p$>
>>>
>>> Skype-Linkedin-Facebook –Twitter  rshockey101
>>>
>>> PSTN +1 703-593-2683
>>>
>>>
>>>
>>>
>>>
>>> *From: *Roman Shpount <roman@telurix.com>
>>> *Date: *Tuesday, October 7, 2025 at 7:37 PM
>>> *To: *Richard Shockey <richard@shockey.us>
>>> *Cc: *IETF STIR Mail List <stir@ietf.org>, <art@ietf.org>
>>> *Subject: *[art] Re: [stir] For those of you who follow this kind of
>>> stuff.
>>>
>>>
>>>
>>> How would this work with PSTN links?
>>>
>>> _____________
>>> Roman Shpount
>>>
>>>
>>>
>>>
>>>
>>> On Tue, Oct 7, 2025 at 6:59 PM Richard Shockey <richard@shockey.us>
>>> wrote:
>>>
>>>
>>> The United States government is going to mandate Rich Call Data in the
>>> network.
>>>
>>> https://docs.fcc.gov/public/attachments/DOC-415059A1.pdf
>>> <https://urldefense.com/v3/__https://docs.fcc.gov/public/attachments/DOC-415059A1.pdf__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxAnK5mca$>
>>>
>>>
>>> Richard Shockey
>>> Shockey Consulting LLC
>>> Chairman of the Board SIP Forum
>>> www.shockey.us
>>> <https://urldefense.com/v3/__http://www.shockey.us/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxLLsp087$>
>>>  <http://www.shockey.us
>>> <https://urldefense.com/v3/__http://www.shockey.us/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxLLsp087$>
>>> >
>>> www.sipforum.org
>>> <https://urldefense.com/v3/__http://www.sipforum.org/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxJnbiopn$>
>>>
>>> richard<at>shockey.us
>>> <https://urldefense.com/v3/__http://shockey.us/__;!!BDUfV1Et5lrpZQ!QDrvH8RGmwgdq0eGUrODxeCbQzE9qRykBPR4UctnUWg8MFJgbte4yU8MWTx2VyUeS30HYLsbxDCzfs2p$>
>>> Skype-Linkedin-Facebook –Twitter rshockey101
>>> PSTN +1 703-593-2683
>>>
>>>
>>>
>>>
>>>
>>>
>>> _______________________________________________
>>> stir mailing list -- stir@ietf.org
>>> To unsubscribe send an email to stir-leave@ietf.org
>>>
>>> _______________________________________________ art mailing list --
>>> art@ietf.org To unsubscribe send an email to art-leave@ietf.org
>>>
>>> _______________________________________________
>> art mailing list -- art@ietf.org
>> To unsubscribe send an email to art-leave@ietf.org
>>
>