Re: [stir] certificates: short-lived or status

Richard Shockey <> Thu, 16 March 2017 14:39 UTC

Return-Path: <>
Received: from localhost (localhost []) by (Postfix) with ESMTP id E62A2129519 for <>; Thu, 16 Mar 2017 07:39:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: 0.57
X-Spam-Status: No, score=0.57 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, MIME_QP_LONG_LINE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H3=-0.01, RCVD_IN_MSPIKE_WL=-0.01, RCVD_IN_SORBS_SPAM=0.5, SPF_PASS=-0.001] autolearn=no autolearn_force=no
Authentication-Results: (amavisd-new); dkim=pass (768-bit key)
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id YJpa53FnTk_f for <>; Thu, 16 Mar 2017 07:39:33 -0700 (PDT)
Received: from ( []) by (Postfix) with SMTP id F124F1294E7 for <>; Thu, 16 Mar 2017 07:39:32 -0700 (PDT)
Received: (qmail 15985 invoked by uid 0); 16 Mar 2017 14:39:31 -0000
Received: from unknown (HELO cmgw3) ( by with SMTP; 16 Mar 2017 14:39:31 -0000
Received: from ([]) by cmgw3 with id weaU1u00J1MNPNq01eaX8p; Thu, 16 Mar 2017 08:34:31 -0600
X-Authority-Analysis: v=2.1 cv=WOnsABcR c=1 sm=1 tr=0 a=jTEj1adHphCQ5SwrTAOQMg==:117 a=jTEj1adHphCQ5SwrTAOQMg==:17 a=L9H7d07YOLsA:10 a=9cW_t1CCXrUA:10 a=s5jvgZ67dGcA:10 a=1oJP67jkp3AA:10 a=6Iz7jQTuP9IA:10 a=ZZnuYtJkoWoA:10 a=PeFO9FbFhS32YxYntvkA:9 a=48vgC7mUAAAA:8 a=izV7ms69AAAA:8 a=VfgTrTGYAAAA:8 a=zQP7CpKOAAAA:8 a=hGBaWAWWAAAA:8 a=ll-iCDY8AAAA:8 a=M0OflfRGAAAA:8 a=RpNjiQI2AAAA:8 a=lVjQ08T8XFcOpAPmAp4A:9 a=jpIH26JlB8aEU1M81S3jpgcb7nU=:19 a=kRGILsAsuTvGDjPH:21 a=nSj_SHRX3-cIGZyE:21 a=QEXdDO2ut3YA:10 a=ivbTfD_dPm4A:10 a=qM39cor4HRgA:10 a=vVYegOKhf4wA:10 a=K2lU_Ab98eoA:10 a=yMhMjlubAAAA:8 a=SSmOFEACAAAA:8 a=OYioE1wyuvI5lVApBJQA:9 a=nSVy-pQ9rJiVcUEi:21 a=xEQHGoVEnGkuACqF:21 a=lRhYVxdyrjfLBqlj:21 a=gKO2Hq4RSVkA:10 a=UiCQ7L4-1S4A:10 a=hTZeC7Yk6K0A:10 a=frz4AuCg-hUA:10 a=w1C3t2QeGrPiZgrLijVG:22 a=jg1oa_xp17rrhcbVgaY4:22 a=ORFRI7aeUVbPhtmlmiRh:22 a=obGFCI3_7AGB19sD6zJV:22 a=Q-ofuW86YyylptHqTH-7:22 a=VpyrLIdO_Ztbr3SWPBuH:22 a=6yl0mh0s51TKORVA8GqK:22 a=vJuR_VyAocOa-HWBgGQO:22 a=BKKCjISod1eDJeS0ORpz:22 a=zjWhRoSqWz9hl55Hdlzg:22
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed;; s=default; h=Content-type:Mime-version:In-Reply-To:References:Message-ID:CC: To:From:Subject:Date:Sender:Reply-To:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:List-Id:List-Help:List-Unsubscribe:List-Subscribe: List-Post:List-Owner:List-Archive; bh=fZK5QaZhCydL3SMF8ZbRYraFQXGnWdl57Bw5ZHG9Rxs=; b=X3jIY9nwUS2x1bQZ32FtTJoklF sXpmhCW6iboL/zRL0td9BVsB+MM8N8lKYMg8DBY3dM/G0iLbs5oC52m6rpmqq1/XMdJK+lAIsCGWJ ArjHiAAJ3aa2fa5YkgbCiuFPu;
Received: from ([]:50850 helo=[]) by with esmtpa (Exim 4.87) (envelope-from <>) id 1coWTz-0006vb-Qg; Thu, 16 Mar 2017 08:34:28 -0600
User-Agent: Microsoft-MacOutlook/f.20.0.170309
Date: Thu, 16 Mar 2017 10:34:26 -0400
From: Richard Shockey <>
To: "Gorman, Pierce A [CTO]" <>, Alex Bobotek <>, Richard Barnes <>, "DOLLY, MARTIN C" <>
CC: "" <>, "Peterson, Jon" <>
Message-ID: <>
Thread-Topic: [stir] certificates: short-lived or status
References: <> <> <> <> <> <> <>
In-Reply-To: <>
Mime-version: 1.0
Content-type: multipart/alternative; boundary="B_3572505268_1144474834"
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname -
X-AntiAbuse: Original Domain -
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain -
X-BWhitelist: no
X-Exim-ID: 1coWTz-0006vb-Qg
X-Source-Sender: ([]) []:50850
X-Email-Count: 5
X-Source-Cap: c2hvY2tleXU7c2hvY2tleXU7Ym94NDYyLmJsdWVob3N0LmNvbQ==
Archived-At: <>
Subject: Re: [stir] certificates: short-lived or status
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Secure Telephone Identity Revisited <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
X-List-Received-Date: Thu, 16 Mar 2017 14:39:36 -0000


+1 as well.   No one is going to lack for work in the months and years ahead. But we have to start somewhere.


From: stir <> on behalf of "" <>
Date: Thursday, March 16, 2017 at 9:48 AM
To: Alex Bobotek <>, Richard Shockey <>, Richard Barnes <>, "DOLLY, MARTIN C" <>
Cc: "" <>, "Peterson, Jon" <>
Subject: Re: [stir] certificates: short-lived or status




From: Alex Bobotek [] 
Sent: March 16, 2017 1:07 AM
To: Richard Shockey <>; Richard Barnes <>; DOLLY, MARTIN C <>
Cc:; Peterson, Jon <>
Subject: Re: [stir] certificates: short-lived or status


It would be a mistake to consider even all _national_ authorities trustworthy.  Analytics systems will need to consider issuer chain as well as individual certificate reputation trustworthiness.  There are too many stories of bought passports.  






From: stir [] On Behalf Of Richard Shockey
Sent: Wednesday, March 15, 2017 5:26 PM
To: Richard Barnes <>; DOLLY, MARTIN C <>
Cc:; Peterson, Jon <>
Subject: Re: [stir] certificates: short-lived or status



With limited exceptions I don’t see issuing certificates for individual TN’s at least not for the immediate future.



Richard Shockey

Shockey Consulting LLC

Chairman of the Board SIP Forum


Skype-Linkedin-Facebook –Twitter  rshockey101

PSTN +1 703-593-2683



From: stir <> on behalf of Richard Barnes <>
Date: Wednesday, March 15, 2017 at 7:47 PM
Cc: "" <>, "Peterson, Jon" <>
Subject: Re: [stir] certificates: short-lived or status


So you're trusting the folks issuing certificates to be perfectly reliable, and service providers never to use a cert for a number that's been ported away?


On Wed, Mar 15, 2017 at 7:42 PM, DOLLY, MARTIN C <> wrote:

I do not see the need for short lived certs for a TN call setup service

Martin C. Dolly

Lead Member of Technical Staff

Core & Government/Regulatory Standards


Cell: +1.609.903.3360



On Mar 15, 2017, at 7:37 PM, Richard Barnes <> wrote:

I would note that "freshness" is but one aspect of a certificate that you need OCSP for.  The far more common use in the WebPKI is when the CA simply screws up.


In any case, to recap the experience from the Web PKI, the trade-off space has basically the following shape:

1. Do a live query [draft-ietf-stir-certificates-ocsp]

2. Make something with a short lifetime

2.a. Mandatory OCSP stapling

2.b. Short-lived certificates [draft-peterson-stir-certificates-shortlived]

The trade-off is basically between the sender/signer having to do queries (to refresh OCSP or get a new cert) and recipient/verifier having to do queries (to fetch OCSP).  (2.a) is a bad deal unless you have some legacy need to use OCSP; otherwise it's just bloat relative to (2.b).

If you ask web people, you're likely to get a pretty strong preference for (2), i.e., putting the burden on the sender, because (a) it's more predictable and (b) it's offline with respect to call time, and thus much less performance sensitive.  The web started out with (1) and it has turned out to be totally unworkable, because the CAs can't operate OCSP servers that are good enough to avoid seriously degrading the performance of browsing experience.

The main push-back we get from server operators about (2) is that it requires outbound connections from web servers -- load and downtime never come up as issues.  Outbound connections shouldn't be an issue for STIR signers, since they're likely to be making outbound connections all the time anyway.  Even if not, it's a simple firewall rule to write to let out connections to your CA.



On Wed, Mar 15, 2017 at 4:33 PM, Peterson, Jon <> wrote:


In reaction to the IESG review, and as well, to our own general sense that we're still not ready to mandate any particular direction, we ended up pulling the real-time status check of OCSP out of the last version of stir-certificates. Figuring out how we want to manage certificate freshness, especially in light of certificates assigned to telephone numbers, is probably the last bit about the core STIR work, before we go on to extensions and so forth, that we need to tackle.


I'd like to spend some meeting time talking about two approaches, as well as any better ideas anybody comes up with for this. The first is roughly what was in the stir-certificates document previously, which is now captured in:


The other is an approach based on short-lived certificates, which would likely rely on ACME or something similar. I've mocked up a discussion draft for that:


... though it is still fairly content-free at the moment. 


I think reviewing what we've done with stir-certs and these two approaches warrants some face-time discussion. Thoughts here on the list beforehand are welcome too.




Jon Peterson

Neustar, Inc.



stir mailing list


stir mailing list 


_______________________________________________ stir mailing list 


This e-mail may contain Sprint proprietary information intended for the sole use of the recipient(s). Any use by others is prohibited. If you are not the intended recipient, please contact the sender and delete all copies of the message.
_______________________________________________ stir mailing list