Re: [stir] current draft charter

Brian Rosen <br@brianrosen.net> Thu, 13 June 2013 14:08 UTC

Return-Path: <br@brianrosen.net>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 97E9A21F9AEC for <stir@ietfa.amsl.com>; Thu, 13 Jun 2013 07:08:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -100.391
X-Spam-Level:
X-Spam-Status: No, score=-100.391 tagged_above=-999 required=5 tests=[AWL=0.046, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_NET=0.611, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id c+MB7+PmAxvz for <stir@ietfa.amsl.com>; Thu, 13 Jun 2013 07:08:19 -0700 (PDT)
Received: from mm2.idig.net (unknown [70.33.247.98]) by ietfa.amsl.com (Postfix) with ESMTP id 4E1D821F9AE7 for <stir@ietf.org>; Thu, 13 Jun 2013 07:08:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=brianrosen.net; s=default; h=To:References:Message-Id:Content-Transfer-Encoding:Cc:Date:In-Reply-To:From:Subject:Mime-Version:Content-Type; bh=bjh48NNXvHqSLxALmnVcQsSyFkVbM0DzzCahrXDGyes=; b=kV+o6ZW/23g+nJCx1GA6WShil7dkAZ277Y70+4FjvKveZp3kpM75xR3BThtvjRkNYbXs6XSOHAASdOa5aaDine6xcyNhoEO61SELkK0ytpfhlE0wFv9SSq2nQcDiCx1s6LiuEL+v5BGfGGiJIzq1Mxs3gT4n0aoxcoBVzfOTEhI=;
Received: from neustargw.va.neustar.com ([209.173.53.233]:37276 helo=[10.33.193.6]) by mm2.idig.net with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.80.1) (envelope-from <br@brianrosen.net>) id 1Un8CH-0007ha-2i; Thu, 13 Jun 2013 10:08:17 -0400
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.3 \(1503\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <1E0475FDD84F0C42A9F46570BB946FD94121FCFA@PACDCEXMB01.cable.comcast.com>
Date: Thu, 13 Jun 2013 10:08:15 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <BEBF7B2F-997E-4428-B6CE-2F77B5F910E4@brianrosen.net>
References: <CDDF354D.DD9A%york@isoc.org> <1E0475FDD84F0C42A9F46570BB946FD94121FCFA@PACDCEXMB01.cable.comcast.com>
To: "Wendt, Chris" <Chris_Wendt@cable.comcast.com>
X-Mailer: Apple Mail (2.1503)
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - mm2.idig.net
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Get-Message-Sender-Via: mm2.idig.net: authenticated_id: br@brianrosen.net
Cc: Dan York <york@isoc.org>, "Peterson, Jon" <jon.peterson@neustar.biz>, Hadriel Kaplan <hadriel.kaplan@oracle.com>, "stir@ietf.org" <stir@ietf.org>, Dave Crocker <dcrocker@bbiw.net>, Henning Schulzrinne <hgs@cs.columbia.edu>, Stephen Farrell <stephen.farrell@cs.tcd.ie>
Subject: Re: [stir] current draft charter
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/stir>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Jun 2013 14:08:23 -0000

The IETF is starting a new effort on routing,  see the TERQ work.  If you have ideas on routing, that would be the place to bring them.

I think the problem we have here is trying to decide who is a "good guy".  Most of the service providers who would would call "pink" in this context would claim they are good guys.  Trying to create a mechanism to separate good guys from bad guys is very hard.

I'm not sure why protecting TNs individually is more complex then the view you have of routing, especially because we have tried what you are suggesting, although we did not have DNSSEC.  Dealing with the privacy issues, just to start, would be the first real barrier.

Let's say we got beyond that.  We then need someone, probably someone like Neustar, to maintain a per country portion of the database.  How would it do that?

Basically, every time a number was delegated, it would change the domain of the entry to reflect the delegation.  That could work.  What it means is that delegation of any kind has to be recorded in the new database.  If you note, certs follow delegation, with you inserting "domain" in the middle (domain follows delegation).  The twist is that instead of a 2nd level reseller issuing a cert to a 3rd level reseller, the 2nd level reseller goes to the new database and has them effectively do the same thing.   

Having databases that associate a domain with a TN might help things like finding a cert, but it doesn't affect the basic issue of how you avoid spoofing.  Do you think the approach we have suggested here (signing of From/To/Time/Session Id) with a cert traceable to the identity is appropriate?

If you are "simply" suggesting the cert is located via DANE in the domain of the caller, then for user@domain, I think we're probably saying the same thing.  Where we seem to differ is that you suggest we have a DNS entry for the TN that has the domain in it, and then you use that to find the cert used for signing.  In the basic case, we're suggesting a URI to the cert in the signaling, which seems simpler.  What matters however is how the DNS tree for the TNs is maintained.

So, my response is the same as I have given before: the privacy and operational issues of putting per TN information in the public DNS are overwhelming.  We have tried it, and it has failed.  

Unlike Hadriel, you really do want to disclose domain with TN.  That has been a non-starter for many carriers.

Brian


On Jun 13, 2013, at 9:37 AM, "Wendt, Chris" <Chris_Wendt@cable.comcast.com> wrote:

> Hi Folks,
> 
> I believe it couldn't be a better time to start discussing public routing.  While this is a little beyond the scope of protecting caller-id, I think the effort is highly complimentary, and solving both together will provide a better path to get things implemented in service provider networks.
> 
> IP communications is evolving whether you want to get on the train or not.  I applaud Henning's efforts to push the ball forward.
> 
> Moving more to an internet model for routing is inevitable, IMHO.  There is questions about how relevant TN is or will be in the near future.  For the sake of having any chance of success, let's simplify the effort and focus on the future.  There will be a transition process to get there, no doubt, but let's focus on the end goal, and not focus on fixing problems of the past.  We are already in a world of multiple private peering arrangements, LCR, and managing multiple egress points anyway, so the transition should not be that difficult.
> 
> I believe a common routing mechanism for both user@domain and TN/e164 based identities should be the focus.  Treat both as first class citizens for IP communications.
> 
> Use DNS and domain based routing for all.  Use DNSEC to validate and cryptographically associate TN/caller-id with a domain (for good guys) and do domain routing from there.  
> Forget about trying to protect TN's individually, that is too complex.
> 
> It's up to the consumer service providers to enforce and block bad things from bad domains.
> It's up to wholesale/trunking providers to allow customers to assert their own domain, or be responsible for asserting domains on their behalf at the risk of being considered a "bad guy".
> 
> This is high level, and perhaps a sunny day view of the world, but I don't think unrealistic.  Frankly, if there is any chance of a common federated communications system continuing to be relevant, I believe a simple approach that matches the internet model is the only choice.
> 
> You should see more concrete opinions from Comcast in the future, but I wanted to take the opportunity to express these thoughts and would love feedback on why this should or should not be the model going forward.
> 
> If there is agreement, I believe some of this should be addressed in the charter, because I think some of the assumptions may not enable this path. 
> 
> -Chris
> 
> 
> 
> 
> On Jun 13, 2013, at 8:51 AM, Dan York <york@isoc.org> wrote:
> 
>> Hadriel,
>> 
>> On 6/12/13 5:38 PM, "Hadriel Kaplan" <hadriel.kaplan@oracle.com> wrote:
>> 
>>> That begs the question of what issues you think made Public ENUM fail,
>>> and why we won't hit the same issues in whatever model we choose.
>> 
>> Since you addressed this question to me, I feel compelled to answer... but
>> in the meantime both Brian and Jon have given much more detailed answers
>> with which I mostly agree.
>> 
>> I saw security/privacy issues as the main issues that made Public ENUM not
>> work, i.e. Brian's points 4, 5 and 6:
>> 
>>> 4. Any public database that was able to show any information about a
>>> telephone number was considered a privacy issue, requiring a lot of "sign
>>> off", which never happened.
>>> 5. Everyone objected to being able to determine what numbers were "live"
>>> 6. Carriers objected to a public database that told competitors what
>>> numbers they controlled
>> 
>> 
>> The potential for spam was also high.  Five or six years ago there was at
>> least one tool circulating around that would walk an ENUM tree, generate a
>> list of all potential phone numbers and then send SIP INVITEs to all of
>> those numbers.  I remember either seeing a video or reading about how
>> someone did this with all the public ENUM numbers published for Germany
>> (at that time). So using Public ENUM could be a fantastic way to
>> potentially get yourself on the calling lists for telemarketers.
>> 
>> Ideally, I think a public service *would* be a useful way to enable
>> ubiquitous usage. I'm just not sure how to get there without also opening
>> a solution up to these same kind of security/privacy issues.
>> 
>> Dan
>> 
>> --
>> Dan York
>> Senior Content Strategist, Internet Society
>> york@isoc.org <mailto:york@isoc.org>   +1-802-735-1624
>> Jabber: york@jabber.isoc.org <mailto:york@jabber.isoc.org>
>> Skype: danyork   http://twitter.com/danyork
>> 
>> http://www.internetsociety.org/deploy360/
>> 
>> _______________________________________________
>> stir mailing list
>> stir@ietf.org
>> https://www.ietf.org/mailman/listinfo/stir
> 
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir