Re: [stir] SHAKEN but not STIRred means 666 can cause collateral damage

Brian Rosen <br@brianrosen.net> Thu, 17 November 2016 01:34 UTC

Return-Path: <br@brianrosen.net>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D29B1295FB for <stir@ietfa.amsl.com>; Wed, 16 Nov 2016 17:34:33 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_LOW=-0.7] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=brianrosen-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WlIeJjuuC2QH for <stir@ietfa.amsl.com>; Wed, 16 Nov 2016 17:34:32 -0800 (PST)
Received: from mail-qk0-x22c.google.com (mail-qk0-x22c.google.com [IPv6:2607:f8b0:400d:c09::22c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 59C081296E3 for <stir@ietf.org>; Wed, 16 Nov 2016 17:34:24 -0800 (PST)
Received: by mail-qk0-x22c.google.com with SMTP id q130so200118659qke.1 for <stir@ietf.org>; Wed, 16 Nov 2016 17:34:24 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brianrosen-net.20150623.gappssmtp.com; s=20150623; h=mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=RlxjXhkLxU2LWXBhDHf4olmtkv9kqhzq6i+WTuReNEs=; b=h9sxkebhyDQ5QSa8ImPNbH/JKJ/HEkTcfKc+gGwLOepoLvcIJF4Hng0skdKYVuVB2S b8CfZfJ1BDXtJGIuwxVHEfyEoPDKjpw0t/+a80QW1XmpIPhru/11Y0W/Fg/oDCGrS7i+ XwqYBH/AOIa5tpx0QB2+REExqoEOGKGfkcDIFQdMkdJ8+DsFcU9R9Tu5Wzcht+5/n92l /eUo6PVhbEeQYxr5SU6FKjV7mIwH5Lzw80LtsO1EshAOlNK/oHR9dWM2/+A33B5SuerG osdqVV+hZNwCX68kwW6dDss1TG1YgwxfN8GWfA4Kp51JzMUAXndfODTq0PZuaPsxWH6j SLFA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date :content-transfer-encoding:message-id:references:to; bh=RlxjXhkLxU2LWXBhDHf4olmtkv9kqhzq6i+WTuReNEs=; b=aJpFvwsufrk3BCCPnY7QxU8htPKAA8/z+xrJLZBPIjWWplkjrMnfe2k7WRoR3Dgg/T miqkKD3M73zvQTR3vJ4nbufEpoyUe7aJNAszdCjbkU/pUqqgUWcQO3NcyjG0l4T8YIdr CGQMuCysdp1rp7OlqfT4yCMaqoxjZh+toWtRjP6O4vRUfMLjMqr4mhp68R0kGNhlPuH6 KHg+546c2Yszs+EIcWdrlZ9okXGTnPvUvnPFYSKz2pJ2QqRtPij2qXfEs3dbV4L+20Lb bRPvhA8SDwOoVyL8kqv3TOFM0I6Rt8WETPsyv6eAz5uZ/nxgPZLv9qFbYiFFMiiu6tm4 WIEw==
X-Gm-Message-State: AKaTC03ht3Cdpvoo7K6fQNQGnMJPmqQAskFCJ2Mgk9lMI8A2dLUBAW3DMbjz2cEf+b0SvA==
X-Received: by 10.55.134.1 with SMTP id i1mr607089qkd.219.1479346463160; Wed, 16 Nov 2016 17:34:23 -0800 (PST)
Received: from [10.96.8.226] ([156.154.81.54]) by smtp.gmail.com with ESMTPSA id z7sm341610qkz.7.2016.11.16.17.34.21 for <stir@ietf.org> (version=TLS1 cipher=ECDHE-RSA-AES128-SHA bits=128/128); Wed, 16 Nov 2016 17:34:21 -0800 (PST)
Content-Type: text/plain; charset="utf-8"
Mime-Version: 1.0 (Mac OS X Mail 9.3 \(3124\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <AE9EB3D9-1F5C-4CA4-8F8C-66D4993D2318@brianrosen.net>
Date: Thu, 17 Nov 2016 10:34:17 +0900
Content-Transfer-Encoding: quoted-printable
Message-Id: <BD5F76E2-A29D-4B86-9CFF-F596415DEBDD@brianrosen.net>
References: <AE9EB3D9-1F5C-4CA4-8F8C-66D4993D2318@brianrosen.net>
To: IETF STIR Mail List <stir@ietf.org>
X-Mailer: Apple Mail (2.3124)
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/SH6hk1NJ38Vn4C5tU3vQnbEbC-A>
Subject: Re: [stir] SHAKEN but not STIRred means 666 can cause collateral damage
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 17 Nov 2016 01:34:33 -0000

Ah, I have over-reached.  SHAKEN has a number of possible claims.  The “highest” of those is roughly equivalent to what original stir proposed to do.  The net effect should be that 666 on that claim should not cause damage. On the “lesser” claims, it could.

Brian

> On Nov 17, 2016, at 10:14 AM, Brian Rosen <br@brianrosen.net> wrote:
> 
> I’ve sent this to stir, even though it has not been decided where the 666 draft will land, and SHAKEN is not even in the IETF.
> 
> The original idea of stir is that the credential used to sign is granted as a result of delegation of the telephone number.  When used as envisioned, a valid signature will (mostly) guarantee that the calling party number has not been spoofed.  If we then implement 666, which is a mechanism to create a black list, then numbers reported as spam come from the actual TN they were placed with, or the signature wouldn’t be valid and we get what we want.
> 
> SHAKEN doesn’t do that.  It doesn’t check the TN, it only states that the service provider who signed it is willing to say something about the call.  It has a very desirable capability to lead authorities to the source of spoofed calls.  It will very clearly help us cut down on spoofed calls.
> 
> However, when used with 666, SHAKEN has the problem that spoofing is still allowed - it’s just that we can better trace it to its source.  But if a user reports SPAM with a SHAKEN signed claim, the spoofed TN is marked as a spam source.  That means the legitimate owner of the TN may have trouble placing calls.  666 creates collateral damage.
> 
> Brian