Re: [stir] [E] RCD vs "div"

Chris Wendt <chris-ietf@chriswendt.net> Thu, 10 March 2022 21:48 UTC

Return-Path: <chris-ietf@chriswendt.net>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 383573A1C4E for <stir@ietfa.amsl.com>; Thu, 10 Mar 2022 13:48:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.806
X-Spam-Level:
X-Spam-Status: No, score=-1.806 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=chriswendt-net.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 9kmI_zNe2AHy for <stir@ietfa.amsl.com>; Thu, 10 Mar 2022 13:48:18 -0800 (PST)
Received: from mail-qt1-x832.google.com (mail-qt1-x832.google.com [IPv6:2607:f8b0:4864:20::832]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DCE163A1C4C for <stir@ietf.org>; Thu, 10 Mar 2022 13:48:17 -0800 (PST)
Received: by mail-qt1-x832.google.com with SMTP id c4so5875914qtx.1 for <stir@ietf.org>; Thu, 10 Mar 2022 13:48:17 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chriswendt-net.20210112.gappssmtp.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=b1j/RthFtRgcM1Y99fOpQX3iVD2u2UW4+OzSlcM2fKo=; b=JUrzzHGbffgmnVsKH5mDboevk3bup7Cihh+BMQUEkb61tJ5GdszLyu7MyEQBEeY2hz WHL32ze55MmUPmVhbjB2pOfqTfyTvrTAzt2bzwMyT0uy9iScYal3ScnnY/tbn1v3IJKt E/8irZeb9hk5MxPNnZW5j4IYzSpq3Rhaz6NZoZXVKDv+DQJUoZI1KjMcdR6vvPjLn58M RFIkAZlO3/YLCGeihYsGChMXe7m2XdPdJNu3+iyugfY57XovTpRG53npixB1Ijyk9toT NdOQkFDXs0JJd9aUHv+7LwuRjnIvwIkOoiRPmaT6gmaIj08FqRcQ38kgLh1iqjC7uviE FsqA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=b1j/RthFtRgcM1Y99fOpQX3iVD2u2UW4+OzSlcM2fKo=; b=olET4yn1NJJ5727Zv2I5+1lp1HvOG0DaGXFYI8KlTnmOGhMbwSSyFCCypJPfZvOffB 7zimlzXzKIZXM3MfuSsKvPzDr0dCMRfuWMzPbtoF5hYTX4StnzoYbt1x2RLW2c0wlprF DYDW9E/eWlpYlXlAN6J0IBXyKZ+zK3ZfDoLXRrcOTKMeymJp+fmzoXKaFiu2q6virXsf djjbtwj9uhBoXxl114y75U6cn4qHIwdz2YIvcTgmVuuYRuvl6V3Cn+g77NFxUrVMHhk/ wgXLgFJm9OmFe8flPnYCUKOcf8hmrBC0hBOEWlsDs2TESg3gQs+Faiwo9MRDKakZoM5j fBbA==
X-Gm-Message-State: AOAM533zoN6KEgtP9JRQLXebhEeYyQmIn5Pgq3LtRaU/2yIfSqIkdDFJ HjFNrLg3QNQtkpwn2gMCTMOCcg==
X-Google-Smtp-Source: ABdhPJyFQ1C+nzG+cB8a9y9BX88dM5wAX0c6W+wcxWhsV2OuKVpQIyi1n1JrM3/9yvh3ZiXFK2sqYw==
X-Received: by 2002:a05:622a:1044:b0:2de:2db0:3c01 with SMTP id f4-20020a05622a104400b002de2db03c01mr5834906qte.365.1646948896471; Thu, 10 Mar 2022 13:48:16 -0800 (PST)
Received: from smtpclient.apple (c-69-242-46-71.hsd1.pa.comcast.net. [69.242.46.71]) by smtp.gmail.com with ESMTPSA id v12-20020a05622a130c00b002e1b3ccd9adsm1561047qtk.79.2022.03.10.13.48.15 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Thu, 10 Mar 2022 13:48:16 -0800 (PST)
From: Chris Wendt <chris-ietf@chriswendt.net>
Message-Id: <B10D720D-2790-4C08-B04B-EA61D798D7C5@chriswendt.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_72C1F0E6-1274-4171-8AFB-A9C6977DC665"
Mime-Version: 1.0 (Mac OS X Mail 15.0 \(3693.60.0.1.1\))
Date: Thu, 10 Mar 2022 16:48:13 -0500
In-Reply-To: <B2BF40CE-DC3C-4786-880C-4825978C2909@chriswendt.net>
Cc: Mary Barnes <mary.ietf.barnes@gmail.com>, Ben Campbell <ben@nostrum.com>, David Hancock <davidhancock.ietf@gmail.com>, Jack Rickard <jack.rickard@microsoft.com>, "Holmes, David" <David.Holmes@t-mobile.com>, IETF STIR Mail List <stir@ietf.org>, "Peterson, Jon" <jon.peterson@team.neustar>
To: "Dwight, Timothy M (Tim)" <timothy.dwight@verizon.com>
References: <AM5PR83MB03551FF7294607C44221E3F188099@AM5PR83MB0355.EURPRD83.prod.outlook.com> <F4FA7DD6-CE68-4853-98C6-31221777E937@nostrum.com> <314BE4BC-8987-41A8-9306-D3B3A950CCE9@chriswendt.net> <CA1747A5-70EF-4C26-A721-14D55D320663@nostrum.com> <MWHPR02MB2878748F5B0B2C97020060A8AC099@MWHPR02MB2878.namprd02.prod.outlook.com> <CAM7yphaxegpvuMQB_hLVG4qn+iXWfGb5_LRjVJ1vUPrxsZ-eqQ@mail.gmail.com> <C9C1FA84-B65F-4E59-BC46-ABF45C6A2731@chriswendt.net> <CAHBDyN7VUYEF2FWLb3+LPrxgBNCGcD6B_-7=K6pKOXje4ijf2g@mail.gmail.com> <CAM7yphZG7V2xO_yOHbTRL53B642Vz9mngJb=9idHvWwT-eWgpw@mail.gmail.com> <4EA3A4D4-11AB-4920-A0FD-A1DB0B07AA43@chriswendt.net> <CAHBDyN7X2t1iiZ7s0NaEgVt9uaPC2Bv0-52gkgfNX-qASuezFg@mail.gmail.com> <D19AD41B-D648-4553-8171-55EE76B9406F@chriswendt.net> <EA73A277-5493-4DC4-A7D6-D4A467A244AF@chriswendt.net> <CA+NjDsg76jd8J-WcDV4C=-PTbqV_8s3P=N6Gk5_sL0tyaxkMqA@mail.gmail.com> <6860E214-3504-4750-80AA-0B73972F93BB@chriswendt.net> <CA+NjDshi8P5GbWeGMbL62etXRz1f+BKmCCfqxJneyupjonDHrQ@mail.gmail.com> <B2BF40CE-DC3C-4786-880C-4825978C2909@chriswendt.net>
X-Mailer: Apple Mail (2.3693.60.0.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/Gfqe_5bpbPOnXSAJEBGUcoNBcxA>
Subject: Re: [stir] [E] RCD vs "div"
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 10 Mar 2022 21:48:23 -0000

I do recognize i am speaking a bit abstractly, but that is how we built the specs and how they relate.  STIR is the core protocols and PKI definition, SHAKEN is the set of specifications based on STIR, but with North American or maybe more generally telephone service provider deployment model in mind, where the SP represents the user with a telephone number vs. a private SIP deployment that might use STIR that may have a different deployment model.  So, we very intentionally do not want to build the base specs to address any telephone number usage policies or anything specific to a deployment.  Hopefully that explains things a bit better.

So for a consumer to “prove” they have right to use a number, in North America and probably most place, you and I know that can’t happen in order to general STIR certificate base credentials to prove that.  The service provider can perhaps do that on a users behalf based on having the proper customer relationship, etc.  vetting/KYC whatever you want.  But in STIR specs, we don’t address any of this, very much intentionally.

-Chris

> On Mar 10, 2022, at 4:37 PM, Chris Wendt <chris-ietf@chriswendt.net> wrote:
> 
> STIR doesn’t address that, SHAKEN doesn’t even specifically address that quite yet, but we are talking about vetting/TN validation/KYC concepts that allow those types of use cases to be addressed in a way that is compatible with policies.
> 
> -Chris
> 
>> On Mar 10, 2022, at 4:22 PM, Dwight, Timothy M (Tim) <timothy.dwight@verizon.com <mailto:timothy.dwight@verizon.com>> wrote:
>> 
>> Can't say as I understand that response.
>> 
>> Would you answer my 2 questions differently than I did?
>> 
>> tim
>> 
>> On Thu, Mar 10, 2022 at 3:00 PM Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>> Hi Tim,
>> 
>> I think you need to sort of separate the STIR concept of identity and the SHAKEN concept of a specific implementation of STIR that is in the context of policies and other things.  In SHAKEN, we assume a model that yes consumers directly can’t assert their identity.  I think that is common model, but i think STIR doesn’t assume any policy rather focuses on protocol and PKI model.
>> 
>> -Chris
>> 
>>> On Mar 10, 2022, at 2:04 PM, Dwight, Timothy M (Tim) <timothy.dwight@verizon.com <mailto:timothy.dwight@verizon.com>> wrote:
>>> 
>>> OK, so then 2 questions.  
>>> How does a consumer (or their device) "prove" they have the right to use a number?  What "evidence" do they present, and to whom?
>>> 
>>> Who grants the consumer this "right"?  What form does the grant take?  
>>> 
>>> I think they're silly questions because the answers are (1) they can't, and (2) nobody.
>>> 
>>> As I understand it, there is nothing "on the wire" that would prove such a right-to-use was valid.  Instead we "implicitly trust" the identity in the P-Asserted-Identity header.  If it's not a number the originating device is authorized to use, the originating carrier made a mistake.  STIR / SHAKEN provides a means to hold carriers responsible if they make such mistakes.
>>> 
>>> STIR / SHAKEN will not AFAIK stop a call from the furnace repairman presenting as its CPN the toll free number of Home Depot's service center.  For that to happen, Home Depot had to have worked with their carrier to provide the numbers of their technicians, and authorized their carrier to modify the PAID header in this way.  The carrier should have "signed its work" so if there's any question whether it was appropriate, we have an audit trail.
>>> 
>>> The interesting follow-on question is what RCD gets presented in such a case.  ISTM it might combine information about Home Depot (e.g., address, logo, hours) and information about the repairman (e.g., his name, what he looks like, what kind of car he drives).  If that's a desired end result, are there standards needed to make it possible?
>>> 
>>> tim
>>> 
>>> 
>>> On Thu, Mar 10, 2022 at 11:23 AM Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>>> Sorry, clarification “spoofing” and what we want to remove is the act of using an identity you haven’t proven you have the right-to-use.
>>> 
>>>> On Mar 10, 2022, at 12:21 PM, Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>>>> 
>>>> This is an important concept we need to agree, “spoofing” is the act of saying who you are not.  STIR should eliminate that concept, you can only assert your own identity, not an identity you do not have the right-to-use.  So i would disagree with you.
>>>> 
>>>>> On Mar 10, 2022, at 11:33 AM, Mary Barnes <mary.ietf.barnes@gmail.com <mailto:mary.ietf.barnes@gmail.com>> wrote:
>>>>> 
>>>>> We are trying to eliminate "illegal" spoofing. There is also legal spoofing that we shouldn't be eliminating.
>>>>> 
>>>>> On Thu, Mar 10, 2022 at 10:10 AM Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>>>>> Wouldn’t you essentially treat that as a new call with new caller-id and start from scratch anyway?  I’m a bit afraid of any of this scenario because it implies some sort of spoofing of the caller that we are trying to eliminate with STIR in the first place.
>>>>> 
>>>>>> On Mar 9, 2022, at 5:58 PM, David Hancock <davidhancock.ietf@gmail.com <mailto:davidhancock.ietf@gmail.com>> wrote:
>>>>>> 
>>>>>> Hi Mary -- comment on your following comment...
>>>>>> 
>>>>>> "For example, there may be call forwarding scenarios where you want to display the number for the first retargeting as the calling party and not the original calling party."
>>>>>> 
>>>>>> I vaguely remember hearing about call scenarios where the retargeting identity is displayed to the called user, instead of or in addition to the original calling identity. Are these cases documented anywhere?
>>>>>> 
>>>>>> If the TSP is displaying the number for the first retargeting entity to the called user instead of the original calling identity, then would there be value in also being able to display rich call data associated with the first retargeting entity? This gets back to my suggestion that an "rcd" claim in a div PASSporT describes the rich call data of the "div" claim identity. If there are legitimate scenarios where the "div" claim identity becomes the calling identity, then maybe my suggestion has merit? Just want to understand what we're leaving on/off the table with what we decide here.
>>>>>> 
>>>>>> Thanks,
>>>>>> David
>>>>>> 
>>>>>> On Wed, Mar 9, 2022 at 3:14 PM Mary Barnes <mary.ietf.barnes@gmail.com <mailto:mary.ietf.barnes@gmail.com>> wrote:
>>>>>> Both Diversion Header and History-Info header have information as to why the call was diverted.  And, History-Info includes the type of retarget that is useful for some services.  There are services that can involve retargeting where the calling party number matters.  For example, there may be call forwarding scenarios where you want to display the number for the first retargeting as the calling party and not the original calling party.  The whole purpose for Diversion and History-Info header fields is to provide information to services and there is not a single way they are handled by the called party.  
>>>>>> 
>>>>>> On Wed, Mar 9, 2022 at 2:14 PM Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>>>>>> No, the identity header is all about the calling party, should not represent anything else. I think we even say that explicitly many times, hopefully “div” specs donot imply that it represents anything besides the fact that the call has been redirected from the original destination party.
>>>>>> 
>>>>>>> On Mar 9, 2022, at 2:44 PM, David Hancock <davidhancock.ietf@gmail.com <mailto:davidhancock.ietf@gmail.com>> wrote:
>>>>>>> 
>>>>>>> Adding rich call data to a div PASSporT does seem to me to go above and beyond the original intent of the div PASSporT RFC. However, if we think someone might want to do this, then would it make sense to have a rule that the rich call data in the "rcd" claim of a div PASSporT must be associated with the "div" claim identity, not the "orig" claim identity. The logic being – the div authentication service is authoritative for the identity in the "div" claim, but has no relationship with the identity in the "orig" claim. I’m not sure if this would be a useful capability; e.g., might there be a case where the diverting entity wants to provide its rich call data to the diverted-to user? But in any case this would avoid creating the situation where there is conflicting rcd info between an inner PASSporT and the div PASSporT(s). 
>>>>>>> 
>>>>>>> 
>>>>>>> On Tue, Mar 8, 2022 at 1:00 PM Holmes, David <David.Holmes@t-mobile.com <mailto:David.Holmes@t-mobile.com>> wrote:
>>>>>>> The bottom line is going to be which passport comes from the most trusted entity (from the perspective of the terminating carrier and/recipient) and/or which allows a better assessment of the caller’s reputation to be made (if needed).  Obviously issues way beyond scope of any SDO, but ripe for someone to create a relevant “Code of practice”.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> BR/David
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> From: stir <stir-bounces@ietf.org <mailto:stir-bounces@ietf.org>> On Behalf Of Ben Campbell
>>>>>>> Sent: Tuesday, March 8, 2022 9:29 AM
>>>>>>> To: Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>>
>>>>>>> Cc: Peterson, Jon <jon.peterson@team.neustar <mailto:jon.peterson@team.neustar>>; Mary Barnes <mary.ietf.barnes@gmail.com <mailto:mary.ietf.barnes@gmail.com>>; Jack Rickard <jack.rickard@microsoft.com <mailto:jack.rickard@microsoft.com>>; IETF STIR Mail List <stir@ietf.org <mailto:stir@ietf.org>>
>>>>>>> Subject: Re: [stir] RCD vs "div"
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> [External]
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> On Mar 8, 2022, at 11:24 AM, Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I think putting “rcd” on a “div” identity header would be simply a fundamental misunderstanding of what “div” represents regarding the calling party identity.  I would hope we don’t need to spell that out.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I guess the real question is interoperability. If people think this is obvious enough that people won’t screw it up, I’m okay with it.
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I’m not sure if this was your intention but i wouldn’t say there is an “explicit association with a chain of earlier PASSporTs”  I think the opposite is true, there is a relationship with orig and dest of PASSporT(s) and new destination of “div” PASSporTs.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I didn’t mean to imply any semantics to the association other than that the linkage exists. I guess two RCD passports with the same orig and dest would have the same association—which I guess supports Jack’s argument that there is nothing special about RCD in “div” passports.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Ben.
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> -Chris
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> On Mar 8, 2022, at 12:11 PM, Ben Campbell <ben@nostrum.com <mailto:ben@nostrum.com>> wrote:
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Hi Jack,
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I understand you could get multiple passports with RCD in them even without div, and have to figure out what to use. But since a “div” passport has an explicit association with a chain of earlier passports, I wonder what it would mean to put RCD claims in a “div” passport if an innermost passport already had RCD. That seems semantically different from getting two passports with RCD that are only related by the fact they are in the same INVITE request.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> A simple answer could be “don’t do that.”
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Thanks!
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Ben.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> On Mar 8, 2022, at 11:03 AM, Jack Rickard <jack.rickard@microsoft.com <mailto:jack.rickard@microsoft.com>> wrote:
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I think you may be overcomplicating it: there’s nothing preventing you from putting 2 different valid RCD passports on the same call, so you’re going to have to be able to deal with conflicting RCD information no matter what. I believe the idea is that you just gather all of the RCD information you consider valid (which may have come from SHAKEN, RCD, or even DIV passports) and deal with it however you want to.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Given that I think the answers are:
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Would a retargeted call inherit any RCD claims in the innermost passport?
>>>>>>> 
>>>>>>> Yes, but the RCD claims would remain only in the innermost passport, the div passport won’t need them because the original passport is still valid.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> What happens if someone adds RCD claims to a “div” passport, especially if they conflict with any claims from earlier in the chain?
>>>>>>> 
>>>>>>> You deal with however you see fit. I’d guess most people will have them take lower priority than the original ones but I’m not sure.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Is the answer the same for RCD passports vs other passport types with RCD claims?
>>>>>>> 
>>>>>>> I don’t think there’s any real distinction between RCD information in RCD passports vs in any other type of passport.
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> Jack
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> From: stir <stir-bounces@ietf.org <mailto:stir-bounces@ietf.org>> On Behalf Of Ben Campbell
>>>>>>> Sent: 08 March 2022 15:40
>>>>>>> To: Mary Barnes <mary.ietf.barnes@gmail.com <mailto:mary.ietf.barnes@gmail.com>>; Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>>
>>>>>>> Cc: Peterson, Jon <jon.peterson@team.neustar <mailto:jon.peterson@team.neustar>>; IETF STIR Mail List <stir@ietf.org <mailto:stir@ietf.org>>
>>>>>>> Subject: [EXTERNAL] Re: [stir] RCD vs "div"
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I’m willing to believe that the RCD draft doesn’t need to talk about “div” passports. But just to check my understanding:
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> - A “div” passport would not copy forward RCD claims from an inner passport. This is covered in RFC 8946, where it says no other claims are copied forward.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> - A single “div” passport can chain back to multiple inner passports with matching orig/dest, e.g. if you have a separate SHAKEN and RCD passport in the original INVITE request. Also covered in 8946.
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> - Can we also assume that no one would ever add _new_ RCD claims to a “div” passport? That seems to make sense, but is it documented somewhere?
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Thanks!
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Ben.
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> 
>>>>>>> On Mar 7, 2022, at 2:48 PM, Mary Barnes <mary.ietf.barnes@gmail.com <mailto:mary.ietf.barnes@gmail.com>> wrote:
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> I would agree with that in general.  IMHO, we really need a call flow document to show examples of all of this.  I worked on one a long while back  (no RCD - it was focused on DIV) and no one was interested in progressing.  
>>>>>>> 
>>>>>>> https://www.ietf.org/archive/id/draft-barnes-stir-passport-div-hi-callflows-02.txt <https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Farchive-252Fid-252Fdraft-2Dbarnes-2Dstir-2Dpassport-2Ddiv-2Dhi-2Dcallflows-2D02.txt-26data-3D04-257C01-257Cdavid.holmes-2540t-2Dmobile.com-257C11d4aa0d70ec4a7cfb7408da01292bef-257Cbe0f980bdd994b19bd7bbc71a09b026c-257C0-257C0-257C637823573598265762-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C3000-26sdata-3Dwp86b64trt9hVVKjAoA6MlBkeFZu8gpOshEWty7kjis-253D-26reserved-3D0&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=c_Kmr0d7wYbLjRgLlHhXDviBK0s0URNX8Rv57YMgUiA&m=GvnHPrfC3PsLJXplKXyXqK6mGtduWtTybUpETLN0oqjjin1oz9J9GUSgUqxIa1W5&s=zhMTOg29rgCq8KsjWnXyZ_582kT7zpmyLEmycFMOWtQ&e=>
>>>>>>>  
>>>>>>> 
>>>>>>> It's way too much work to do on my own.  But, if anyone is interested, let me know.   
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> Regards,
>>>>>>> 
>>>>>>> Mary. 
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> On Mon, Mar 7, 2022 at 2:32 PM Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>>>>>>> 
>>>>>>> Hi Ben,
>>>>>>> 
>>>>>>> I think the way i'd like to think about it is that “div” rules apply to all PASSporTs and you don’t need multiple “div”s if you have multiple PASSporT types.  So, to the extent possible i’d like to keep that line of distinction.  In other words, i’d prefer to not have to discuss all of the other PASSporT types in subsequent PASSporT type specifications to the extent possible.
>>>>>>> 
>>>>>>> A simpler answer would be that i don’t believe “rcd” has any implications specific to “div” other than someone adding new “div”s and following the general rules.
>>>>>>> 
>>>>>>> -Chris
>>>>>>> 
>>>>>>> > On Mar 7, 2022, at 3:25 PM, Ben Campbell <ben@nostrum.com <mailto:ben@nostrum.com>> wrote:
>>>>>>> > 
>>>>>>> > Hi,
>>>>>>> > 
>>>>>>> > (Apologies for bringing this up late in the process for RCD, but I just thought about it over the weekend.)
>>>>>>> > 
>>>>>>> > Does the RCD passport draft need to talk about interactions with “div” passports?
>>>>>>> > 
>>>>>>> > For example, would a retargeted call inherit any RCD claims in the innermost passport? What happens if someone adds RCD claims to a “div” passport, especially if they conflict with any claims from earlier in the chain? Is the answer the same for RCD passports vs other passport types with RCD claims?
>>>>>>> > 
>>>>>>> > Thanks!
>>>>>>> > 
>>>>>>> > Ben.
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> stir mailing list
>>>>>>> stir@ietf.org <mailto:stir@ietf.org>
>>>>>>> https://www.ietf.org/mailman/listinfo/stir <https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Fmailman-252Flistinfo-252Fstir-26data-3D04-257C01-257Cdavid.holmes-2540t-2Dmobile.com-257C11d4aa0d70ec4a7cfb7408da01292bef-257Cbe0f980bdd994b19bd7bbc71a09b026c-257C0-257C0-257C637823573598265762-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C3000-26sdata-3DQx7nrpVtUpR52LwSr5fJ0HyD7RpUNOyFiXnzJwJlSqM-253D-26reserved-3D0&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=c_Kmr0d7wYbLjRgLlHhXDviBK0s0URNX8Rv57YMgUiA&m=GvnHPrfC3PsLJXplKXyXqK6mGtduWtTybUpETLN0oqjjin1oz9J9GUSgUqxIa1W5&s=Ny0S_IVz5OJQ3WTT8hBPOhB33PeNbOhnPye9sPWGB1g&e=>
>>>>>>> _______________________________________________
>>>>>>> stir mailing list
>>>>>>> stir@ietf.org <mailto:stir@ietf.org>
>>>>>>> https://www.ietf.org/mailman/listinfo/stir <https://urldefense.proofpoint.com/v2/url?u=https-3A__nam02.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Fwww.ietf.org-252Fmailman-252Flistinfo-252Fstir-26data-3D04-257C01-257Cdavid.holmes-2540t-2Dmobile.com-257C11d4aa0d70ec4a7cfb7408da01292bef-257Cbe0f980bdd994b19bd7bbc71a09b026c-257C0-257C0-257C637823573598265762-257CUnknown-257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0-253D-257C3000-26sdata-3DQx7nrpVtUpR52LwSr5fJ0HyD7RpUNOyFiXnzJwJlSqM-253D-26reserved-3D0&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=c_Kmr0d7wYbLjRgLlHhXDviBK0s0URNX8Rv57YMgUiA&m=GvnHPrfC3PsLJXplKXyXqK6mGtduWtTybUpETLN0oqjjin1oz9J9GUSgUqxIa1W5&s=Ny0S_IVz5OJQ3WTT8hBPOhB33PeNbOhnPye9sPWGB1g&e=>
>>>>>>>  
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>>  
>>>>>>> 
>>>>>>> _______________________________________________
>>>>>>> stir mailing list
>>>>>>> stir@ietf.org <mailto:stir@ietf.org>
>>>>>>> https://www.ietf.org/mailman/listinfo/stir <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_stir&d=DwMFaQ&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=c_Kmr0d7wYbLjRgLlHhXDviBK0s0URNX8Rv57YMgUiA&m=GvnHPrfC3PsLJXplKXyXqK6mGtduWtTybUpETLN0oqjjin1oz9J9GUSgUqxIa1W5&s=cGHwLGDrBZcVLymefoh2JE2UZ5Fv7EbQBMA1OXIhMhg&e=>
>>>>>> 
>>>>> 
>>>> 
>>> 
>>> _______________________________________________
>>> stir mailing list
>>> stir@ietf.org <mailto:stir@ietf.org>
>>> https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_stir&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=c_Kmr0d7wYbLjRgLlHhXDviBK0s0URNX8Rv57YMgUiA&m=GvnHPrfC3PsLJXplKXyXqK6mGtduWtTybUpETLN0oqjjin1oz9J9GUSgUqxIa1W5&s=cGHwLGDrBZcVLymefoh2JE2UZ5Fv7EbQBMA1OXIhMhg&e= <https://urldefense.proofpoint.com/v2/url?u=https-3A__www.ietf.org_mailman_listinfo_stir&d=DwICAg&c=udBTRvFvXC5Dhqg7UHpJlPps3mZ3LRxpb6__0PomBTQ&r=c_Kmr0d7wYbLjRgLlHhXDviBK0s0URNX8Rv57YMgUiA&m=GvnHPrfC3PsLJXplKXyXqK6mGtduWtTybUpETLN0oqjjin1oz9J9GUSgUqxIa1W5&s=cGHwLGDrBZcVLymefoh2JE2UZ5Fv7EbQBMA1OXIhMhg&e=> 
>> 
>