Re: [stir] current draft charter

Hadriel Kaplan <hadriel.kaplan@oracle.com> Mon, 17 June 2013 16:59 UTC

Return-Path: <hadriel.kaplan@oracle.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 87E8521F9D7A for <stir@ietfa.amsl.com>; Mon, 17 Jun 2013 09:59:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.561
X-Spam-Level:
X-Spam-Status: No, score=-6.561 tagged_above=-999 required=5 tests=[AWL=0.037, BAYES_00=-2.599, NORMAL_HTTP_TO_IP=0.001, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0FACSY9as2ls for <stir@ietfa.amsl.com>; Mon, 17 Jun 2013 09:59:13 -0700 (PDT)
Received: from userp1040.oracle.com (userp1040.oracle.com [156.151.31.81]) by ietfa.amsl.com (Postfix) with ESMTP id F32AC21F9D79 for <stir@ietf.org>; Mon, 17 Jun 2013 09:58:59 -0700 (PDT)
Received: from ucsinet22.oracle.com (ucsinet22.oracle.com [156.151.31.94]) by userp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r5HGwiM0032611 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Mon, 17 Jun 2013 16:58:45 GMT
Received: from aserz7022.oracle.com (aserz7022.oracle.com [141.146.126.231]) by ucsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r5HGwkX1001470 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 17 Jun 2013 16:58:46 GMT
Received: from abhmt115.oracle.com (abhmt115.oracle.com [141.146.116.67]) by aserz7022.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r5HGwjoe015342; Mon, 17 Jun 2013 16:58:45 GMT
Received: from [10.1.21.23] (/10.5.21.23) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Mon, 17 Jun 2013 09:58:45 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Hadriel Kaplan <hadriel.kaplan@oracle.com>
In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3A03DD0D4@ex2k10mb2.corp.yaanatech.com>
Date: Mon, 17 Jun 2013 12:58:43 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <6DE5EBA2-1033-4348-B9CC-2521698941AD@oracle.com>
References: <CDE38BC3.20F76%jon.peterson@neustar.biz> <6BAABF96-8892-4C50-BB30-5F1FC05BDFD8@oracle.com> <F5C27090-FF39-4FBC-BC7E-F2ACFA5A4E6F@cs.columbia.edu> <00C069FD01E0324C9FFCADF539701DB3A03DD0D4@ex2k10mb2.corp.yaanatech.com>
To: Michael Hammer <michael.hammer@yaanatech.com>
X-Mailer: Apple Mail (2.1508)
X-Source-IP: ucsinet22.oracle.com [156.151.31.94]
Cc: "stir@ietf.org" <stir@ietf.org>, "dcrocker@bbiw.net" <dcrocker@bbiw.net>, "jon.peterson@neustar.biz" <jon.peterson@neustar.biz>, "hgs@cs.columbia.edu" <hgs@cs.columbia.edu>
Subject: Re: [stir] current draft charter
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/stir>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2013 16:59:19 -0000

On Jun 17, 2013, at 12:04 PM, Michael Hammer <michael.hammer@yaanatech.com> wrote:

> First point:  This is about E.164 number delegation and proof of ownership.
> So, I find much of the discussion that seems to rely on DNS structure or
> Domain name structuring to be a distraction.
> How you prove proof of ownership of a domain is a separate, albeit twin
> problem.
> But, I think that is out of scope.  I do not believe the answer here is to
> ask my evil twin if he owns the E.164.


There've been a bunch of emails so you've probably missed it, or maybe it wasn't made clear, but the idea behind the DNS proposal is to use reverse-number dotted notation for the E.164.  So an E.164 of '+16035551212' becomes the domain name '2.1.2.1.5.5.5.3.0.6.1.cid.arpa'.

The authority for .cid.arpa is the ITU, and they delegate the country-codes within it to the national number admins for each country (ie, exactly what they do for E.164 numbers).  At that point each nation decides what they want to do, whether to have their whole country-code number tree under one admin authority, or to have it split up.

Oh, and this would all use DNSSEC, which might mean we don't even need to store full certs in this tree, but can just store public keys. (because the DNSSEC info is the same as would be in the certs)


> Second point:  The delegation of E.164 numbers down the tree inextricable
> defines who owns the number, 
> so any collection of certs into an authoritative repository MUST follow the
> same path back up, or you lose sight of that ownership.
> E.164 is already the hierarchy, so no second hierarchy is needed.

Right, and the DNS proposal follows the E.164 ownership hierarchy.


> The recipient of a number block or an individual number may need to receive
> the private key, 
> else the carrier signs and inserts the signature on the path out from that
> user.

No, the recipient of the number block creates their own private/public key pair, and upload the public key to the DNS admin for their E.164 number.  In the DNS it gets signed by the number authority.  So the number authority (ie the DNS) never knows the private key - only the actual user of the private key does.



> (Note, still need to determine how many bytes constitute the signature such
> that it fits into an existing SS7 parameter.
> Perhaps the answer is to include an indicator in SS7 that the gateway to SIP
> must perform the signature outbound.
> But, that may limit this to a single hop, else need to trust follow-on SS7
> networks to sign properly, but that may be acceptable.)

If we can use a SS7 param, I believe the Identity signature can fit - if I'm doing my math right, it's 128 bytes binary (or 172 bytes if base64 encoded ascii).
You'd need to include some other info as well to make this work, but I'm pretty sure we could fit it all in the 255 bytes of an ISUP param.  Unless we have to include a URL, in which case all bets are off.

-hadriel