[stir] Re: Verifiable Voice Protocol (VVP)
Daniel Hardman <daniel.hardman@gmail.com> Tue, 14 October 2025 16:59 UTC
Return-Path: <daniel.hardman@gmail.com>
X-Original-To: stir@mail2.ietf.org
Delivered-To: stir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 92BAF735EAEA for <stir@mail2.ietf.org>; Tue, 14 Oct 2025 09:59:09 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level:
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZY7TBFrnXDer for <stir@mail2.ietf.org>; Tue, 14 Oct 2025 09:59:08 -0700 (PDT)
Received: from mail-ej1-x62f.google.com (mail-ej1-x62f.google.com [IPv6:2a00:1450:4864:20::62f]) (using TLSv1.3 with cipher TLS_AES_128_GCM_SHA256 (128/128 bits) key-exchange X25519 server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id 85325735E9E1 for <stir@ietf.org>; Tue, 14 Oct 2025 09:58:29 -0700 (PDT)
Received: by mail-ej1-x62f.google.com with SMTP id a640c23a62f3a-b40f11a1027so998329666b.2 for <stir@ietf.org>; Tue, 14 Oct 2025 09:58:29 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1760461108; x=1761065908; darn=ietf.org; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=zHLDarEDEw+GBxFseB0yi4a4Yj2QDZ7pV7qdgN44nXY=; b=goXYLzuIxdIWlvueMwrjb3aVKORsbGOF0l4rFcZsXtRany6dKVBHzliA9cr2AOxI3y F2kMeiy34y0bO5HsoaFt4Ku3XxMfAvTPQH0p8L5655qLYnH2XVF2+akElfUvZy2uon87 huEUw+zpDyUesKXKriug/24keDrW5MgoCHxkfjEXgAhz7mNVS4oAOUwhV+tRGWOVuY6x YMXqKz4w7ZbFPBe38hp2vNj+/59gg6hJDEVhBP/f5uoAZvRRGLkWbU/Rf2aDCPeK+PHW tgYXrakRSorDmRR96TahycOGxWys/yyDORGvCytISfYz8W6j9UExk0beO+oLmWC+cuhB +9Tw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1760461108; x=1761065908; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=zHLDarEDEw+GBxFseB0yi4a4Yj2QDZ7pV7qdgN44nXY=; b=cNldSNFQVLcDTpIVMSMuUX1HZoScbssrfMLk0uZBQzt86jnqX1BMaOlYAhePU+Fc6T VyM+CkngypElmf7WiqeIpRe6VQrAmhcGs7fh+nQuL+bO+BPA6mRfTans1H76rHrrPTcR bFIFH61wL1Od9hjfow/4O9q9JCIDYXodhl2jSLveNfjZqSp2TrOxexRz0W5KUwGgzsQm /962l9d3mdTweZjtR2ReAs0Tgo8hHSGy3b5xmYOfDe6OBm4llCG61QElVuaFrA3rOOQM xuOzbnUEBJDHUB4T7oAQOlb2Ne7UCppacxWFYuHRhyVzTQcLqiiCRIwqoKFYt1W5Fc3T q2iA==
X-Forwarded-Encrypted: i=1; AJvYcCWdLuK8BLkCks9wiXRoZHRD8B1yzWo6P3MHaVbNHUt7P+j1mcgHsCVgbU1AcGPKnZ9H1XEh@ietf.org
X-Gm-Message-State: AOJu0YzjNl0A7hkr93IT8+B6lC3oStm4OyaAYJEPqrsLA1E+4jRWSDzX 5L0GB7MpX2S1TSYbSey2SH6vqk9u7HfQn2byrDqBRdweJeRhzB2prbnvJahNtmypFGrff5laeH+ XWP6B9FSGBgT+VQRj0kwgW5PIPktZb8M=
X-Gm-Gg: ASbGnctBuoSejz8sjlxNBKa45s5/Zr0ozsMYanXRJ2FwkRaMOqb/dvzWRth7AwZ8rFO wR8SJjogDjhZPSiAu6EyK5V9cD2eRsBvb07LNc/e3d1VEDcxFQwut4jLoBYCueEejlh86Ri1Ajt sxuP2JtXvDUJdEozQaPWzVUjfedewD1aXRmr2BAPII69Xa0ztpwgJYj0/Wa2nYIh3THOLvPiFqs ysAD6zzvG6ZWq3i1gpdE1whKDQXgdHSdRUgrM9TwCMg0Tb8eMVl6JaixKCGQE/X2M6XBqGPegbL sBswiZTHdyq9Yl52GrtqMkZR41JN5JpbbND+PoT/vTp7PdDyJB8eB2Q=
X-Google-Smtp-Source: AGHT+IEW1kYIPvKcHdpLo/ar7RwAbKZRrbidiQjbAf2arFG8XRJOys60rbdpD+v0i1taOwao842hn7VVk2qpUdwg4C0=
X-Received: by 2002:a17:907:809:b0:b45:b078:c534 with SMTP id a640c23a62f3a-b50ac5cf768mr2775565866b.45.1760461108081; Tue, 14 Oct 2025 09:58:28 -0700 (PDT)
MIME-Version: 1.0
References: <CAD5OKxsCDRA_TWfqBNQjpoACntFfqOS98cVHL8aWNR8YKvjR+Q@mail.gmail.com> <0687B06D-E2A6-4461-8486-91D6DF64CF85@chriswendt.net> <CH3PR13MB67474A4BBA37A797BD655CD9E1E1A@CH3PR13MB6747.namprd13.prod.outlook.com> <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com> <CH3PR13MB6747A843414CC671AA4588BFE1E1A@CH3PR13MB6747.namprd13.prod.outlook.com> <D3BB43A7-4249-4BB9-8237-16118933E742@vigilsec.com> <CAMzqgoysSOsXTzn6xH2ok_bx7yjpbONQVSzyj25tfZ2E2oeUaQ@mail.gmail.com> <CO6PR17MB49786AE19F3623ED479CCBD6FDEBA@CO6PR17MB4978.namprd17.prod.outlook.com>
In-Reply-To: <CO6PR17MB49786AE19F3623ED479CCBD6FDEBA@CO6PR17MB4978.namprd17.prod.outlook.com>
From: Daniel Hardman <daniel.hardman@gmail.com>
Date: Tue, 14 Oct 2025 10:58:15 -0600
X-Gm-Features: AS18NWAZkYdF1bId8Wm1ouBmenQilRmbHprvdF-GoRzdOahBnNekMnweln1mJ20
Message-ID: <CACU_chkY84xFHYLeNcjgPFq7rFdTb+oWzYHD2iFEe7YGOAGQhw@mail.gmail.com>
To: "Peterson, Jon" <Jon.Peterson=40transunion.com@dmarc.ietf.org>
Content-Type: multipart/alternative; boundary="000000000000fcf6ca0641214aef"
Message-ID-Hash: Z4WKFEC5N54M3GKJBBCAEXRRT2CBASZX
X-Message-ID-Hash: Z4WKFEC5N54M3GKJBBCAEXRRT2CBASZX
X-MailFrom: daniel.hardman@gmail.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-stir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Orie <orie@or13.io>, Russ Housley <housley@vigilsec.com>, Pierce Gorman <Pierce.Gorman@numeracle.com>, Chris Wendt <chris-ietf@chriswendt.net>, Brett Nemeroff <Brett.Nemeroff@numeracle.com>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [stir] Re: Verifiable Voice Protocol (VVP)
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/HX4-EJp1P1Ti654Msoii5-GdE_U>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Owner: <mailto:stir-owner@ietf.org>
List-Post: <mailto:stir@ietf.org>
List-Subscribe: <mailto:stir-join@ietf.org>
List-Unsubscribe: <mailto:stir-leave@ietf.org>
Hi there, Jon. Thank you so much for having a look, and for providing some smart feedback. Thank you as well for the pointer on connected identity (RFC 4916-update). How to communicate callee identity back the other direction was the part of VVP I was least confident of, so I'll definitely go study that. VVP doesn't attempt to replace OP signing with caller signing; it wants both, and it bifurcates the evidence into two parts. There's ephemeral evidence (the passport that travels with the SIP signals), but it is linked to evidence with a much broader scope and a longer lifespan. The caller assembles this long-lived evidence, and signs the subset of that evidence that embodies their intentions; the OP signs the ephemeral passport. The long-lived evidence includes a statement from the caller signaling their intention to let the OP sign their passports, which links the two together. The long-lived evidence does cover a lot of the same territory as RCD, but it goes beyond the specific remit of RCD, because it can prove arbitrarily complex propositions, including: - the identity of the caller as a legal entity (Coca Cola Holdings UK Ltd, not "Coca Cola"), using an LEI which is unambiguous in all jurisdictions -- important for legal and regulatory accountability of the caller instead of the OP - the caller has the right to use the CLI (and how that right traces back through a carrier, possibly via wholesalers and suballocations, to a national regulatory authority) - the caller has the right to use brand assets or any other attributes that would appear in a jcard (as in RCD) - the caller is working with a particular call center or BPO that has the delegated right to represent them and use their brand when making outbound calls (and the constraints under which that authority may be exercised, such as limiting by geo, call purpose, time of day, etc.) - the identity of the call center or BPO as a legal entity - the caller has delegated signing authority to a particular OP (and the constraints under which that authority may be exercised, such as limiting by geo, call purpose, time of day, etc.) - the caller is a human instead of an AI (or alternatively, the caller is an AI agent that has formally delegated authority from the calling org to represent it in outbound calls) - the caller has a settlement contract with a particular settlement provider and is willing to pay a particular price for branded calling info to appear on the handset - the person or org making a call has one or more certifications, memberships, or other background (e.g., a licensed CPA, lawyer, or doctor) Essentially the same information can move the other way, as in cases where a consumer calls a call center and wants assurance about similar facts. Carrying all of this info in a passport is not heavy, because it travels by hyperlink, not by direct embedding. And it is eminently cacheable; only revocation status needs rechecking, and that can be optimized dramatically. VVP is not attempting to replace RCD; it is trying to enrich the evidence that is available to decision-makers. This opens up possibilities like bridging from a jurisdiction that doesn't use RCD, into one that does. Same for BCID. Same for SHAKEN. Essentially, we want a payload to be lossless WRT verifiable information content, and WRT to time (same info can be verified minutes, days, or years later). VVP is also lossless WRT channel/context, because the same information can be attached to a TLV in an SMS, or to the profile of a participant in a Zoom meeting or RCS or vCon, or to a post on social media. No need to re-assemble the evidence over and over. Then, if a communication enters a context where less information is needed, a simpler passport can be derived on demand -- kind of like a graphic artist derives a JPG from a lossless image on demand. There's nothing wrong with JPGs -- they're great. They just optimize for a different problem than the lossless raw form. You're totally right that the long-lived evidence is certificate-like. However, there are some reasons why we're not using certificates, which I'd like a chance to explain to the group. Not sure if it's better to explain it over email or in a meeting? --Daniel On Tue, Oct 14, 2025 at 6:17 AM Peterson, Jon <Jon.Peterson= 40transunion.com@dmarc.ietf.org> wrote: > > I took an initial look at this. Broadly, I’d probably embed most of the > information in the proposed new PASSporT headers/claims into either > subelements of rcd (a lot of this overlaps with what RCD does) or into STIR > certs themselves. RCD is supposed to provide externally verifiable data > about the calling party, data that you trust because you trust the party > signing it - architecturally, it should be a sufficient wrapper for the > sort of dossier the draft is linking to STIR. > > In most STIR deployments today, the OP (as the draft calls it) is the > entity signing the PASSporT. If we could snap our fingers and make it the > TNU (as the draft calls it) that signs PASSporTs today, I imagine the bulk > of the problems this draft is trying to address would already be solved > without the addition of any new headers. STIR has always strongly favored > making the security association here (caller-callee) as end-to-end as > possible. > > Also, transmitting this sort of assurance back from the callee to the > caller is the problem we call “connected identity,” there is a mature draft > describing it (4916-update). I would not recommend using an SDP field to > pass such information in the backwards direction. > > Jon Peterson > TransUnion > > *From: *Orie <orie@or13.io> > *Date: *Friday, October 10, 2025 at 9:19 AM > *To: *Russ Housley <housley@vigilsec.com> > *Cc: *Pierce Gorman <Pierce.Gorman@numeracle.com>, Chris Wendt < > chris-ietf@chriswendt.net>, Brett Nemeroff <Brett.Nemeroff@numeracle.com>, > Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org> > *Subject: *[stir] Re: Verifiable Voice Protocol (VVP) > > This Message Originated from Outside of the Organization > Do not click links or open attachments unless you can confirm the sender > and know the content is safe. > Report Suspicious > <https://us-phishalarm-ewt.proofpoint.com/EWT/v1/GX53klZ1TQ0!Y2Oq2O7wX37ubKekr-dBgYAjreGWKEVVDeLxjlKzsFDxWCESADeCsixwdZGWnG05ljc6pG33AO2U8owwJZgxbQXbV9GaVEd_2XRVawHgoC6IXX370JXaPMwhHPbUM9MVKg$> > > Hi Daniel ! & STIR, > > First time seeing this draft : ) > > There have been some STIR presentations of applicability of the "Issuer, > Holder / Presenter, Verifier" model for verifiable credentials to STIR WG, > at previous IETFs. > For folks less familiar with Verifiable Credentials, they are sorta like > https://datatracker.ietf.org/doc/html/rfc5755 > <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/html/rfc5755__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5X6QogRIo$> > They are also worked on in OAUTH and SPICE, with primitives coming from > JOSE / COSE (or other security mechanisms like > https://www.w3.org/TR/vc-data-integrity/ > <https://urldefense.com/v3/__https://www.w3.org/TR/vc-data-integrity/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5Xos8Xu3M$>, > or https://trustoverip.github.io/tswg-acdc-specification/ > <https://urldefense.com/v3/__https://trustoverip.github.io/tswg-acdc-specification/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XKCbTM4c$> > ) > > Here are some related drafts to consider: > > - https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/ > <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-ietf-oauth-sd-jwt-vc/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XvE9nRZY$> > - https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/ > <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-wendt-stir-vesper/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5X3AEU4Ec$> > > The security technology "ACDCs" have also been proposed in this draft: > > - https://datatracker.ietf.org/doc/draft-smith-satp-vlei-binding/ > <https://urldefense.com/v3/__https://datatracker.ietf.org/doc/draft-smith-satp-vlei-binding/__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XhyF--Oo$> > > I'll leave it to the STIR chairs to handle the agenda discussions, just > thought I would share some background on this topic. > > Regards, > > OS, ART AD > > > > > > On Wed, Oct 8, 2025 at 12:44 PM Russ Housley <housley@vigilsec.com> wrote: > > Pierce: > > For historical reasons, the tooling fills in “Network Working Group“ if > the author does not specify a working group. The final RFC is approved, > will just indicate "IETF" > > Russ > > > On Oct 8, 2025, at 12:14 PM, Pierce Gorman <Pierce.Gorman@numeracle.com> > wrote: > > Is anyone aware of an effort to bring VVP into the STIR working group? > > The protocol specification posted in the IETF archive under the “Network > Working Group“ (?) defines a new kind of STIR PASSporT using numerous > non-STI verifiable credentials. > > *Verifiable Voice Protocol > <https://urldefense.com/v3/__https://www.ietf.org/archive/id/draft-hardman-verifiable-voice-protocol-00.html__;!!GX53klZ1TQ0!1v_DDAI_jfLPL72FRmRJh69uINmJYOn_UrvcBB1jcjoeIJD9EyrHtg3omFjBzF5qZHoF-E5v8w5XDdDnQzc$>* > > Pierce > > > _______________________________________________ > stir mailing list -- stir@ietf.org > To unsubscribe send an email to stir-leave@ietf.org > > _______________________________________________ > stir mailing list -- stir@ietf.org > To unsubscribe send an email to stir-leave@ietf.org >
- [stir] For those of you who follow this kind of s… Richard Shockey
- [stir] Re: For those of you who follow this kind … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Richard Shockey
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: Re: Re: For those of you who… Tim Bray
- [stir] Re: [art] Re: Re: Re: For those of you who… Brett Nemeroff
- [stir] Re: [art] Re: For those of you who follow … Richard Shockey
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Chris Wendt
- [stir] Re: [art] Re: For those of you who follow … Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Verifiable Voice Protocol (VVP) Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Andy Newton
- [stir] Re: Verifiable Voice Protocol (VVP) Daniel Hardman
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: Verifiable Voice Protocol (VVP) Russ Housley
- [stir] Re: [art] Re: Re: Re: For those of you who… Richard Shockey
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: [art] Re: Re: Re: For those of you who… Henning Schulzrinne
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: [art] Re: Re: Re: For those of you who… Pierce Gorman
- [stir] Re: Verifiable Voice Protocol (VVP) Orie
- [stir] Re: Verifiable Voice Protocol (VVP) Peterson, Jon
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: Re: Re: For those of you who… Richard Shockey
- [stir] Re: Verifiable Voice Protocol (VVP) Daniel Hardman
- [stir] Re: [art] Re: For those of you who follow … Chris Wendt
- [stir] Re: Verifiable Voice Protocol (VVP) Brett Nemeroff