[stir] Re: [art] Re: For those of you who follow this kind of stuff.
Pierce Gorman <Pierce.Gorman@numeracle.com> Wed, 08 October 2025 16:00 UTC
Return-Path: <Pierce.Gorman@numeracle.com>
X-Original-To: stir@mail2.ietf.org
Delivered-To: stir@mail2.ietf.org
Received: from localhost (localhost [127.0.0.1]) by mail2.ietf.org (Postfix) with ESMTP id 8F6066F79C48 for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 09:00:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at ietf.org
X-Spam-Flag: NO
X-Spam-Score: -2.087
X-Spam-Level:
X-Spam-Status: No, score=-2.087 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=0.001, RCVD_IN_VALIDITY_RPBL_BLOCKED=0.001, RCVD_IN_VALIDITY_SAFE_BLOCKED=0.001, SPF_PASS=-0.001, T_KAM_HTML_FONT_INVALID=0.01] autolearn=ham autolearn_force=no
Authentication-Results: mail2.ietf.org (amavisd-new); dkim=pass (2048-bit key) header.d=numeracle.com
Received: from mail2.ietf.org ([166.84.6.31]) by localhost (mail2.ietf.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1CUh9dTs3Apu for <stir@mail2.ietf.org>; Wed, 8 Oct 2025 09:00:18 -0700 (PDT)
Received: from CY3PR05CU001.outbound.protection.outlook.com (mail-westcentralusazon11023121.outbound.protection.outlook.com [40.93.201.121]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange ECDHE (P-384) server-signature ECDSA (P-256) server-digest SHA256) (No client certificate requested) by mail2.ietf.org (Postfix) with ESMTPS id E44B96F79C38 for <stir@ietf.org>; Wed, 8 Oct 2025 09:00:17 -0700 (PDT)
ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=lmbMIODp/hGGRj5Bkznj5Pfd4nacqYsx96tjef+tLSz9C8akusQLNSFfZ70+Qmrfmz4UkTmxeq1P2OCSlg2U7FeMbQ+oqap1BRtEHslIT9ZNtKne80J8T0SWJZdO4CPYdzaVmgD1MnIXLZXtU+Ar4bcXjO/0YwbErWnjXUwkwonLzDTDEj1x6Q9L6AZcKmyQ9pYy0K/77RZX3bXCo0ruMlhMxVgUn5Bbu0kSmSTHln6LyRVbT9s3BDoQ/D89ER9A0qI3eU447XCfpUxJq1ORauDHVJdOx0VG3L1PfF4uA3odTf9cXrCrAZ8DAvvDfQG3wyPZ3ESdDlMrydAzwvfTNA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=nJEEIQD5bsI0ic5haJ96iHWokNS+n6RJI/EJKDBdo7s=; b=tUBu721M3j/KwZPzXYBTrLWoRfLHL1+qqnbLVAZOryiLEznKAtBNU4mVIc03maxo6wLBdt4e5+gE/JPTBo7IRb39GWjJS4kMaa02nPHvqJNSc6wtPauB/z8Wij3MeW2Ymyf2vutrUsMCnnCIEbwPRAEEH8qPPhFVbKrxuGJrxLsGf5TkyW8O+7OsSmTKKS7MM1z3eHKKaoXlAS+ncrtNPaDueFhYWZ4akGfMoPudFILT/tpI7aalQDK9Muud9kDzQbidbV4aTC8e2fiOd4mp2ZaxFjLtQdgxhkxJlIxcojr1/CS1qSxKFM37l6P89U/n4hL2sqFauKK9oCLMo4pHOA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=numeracle.com; dmarc=pass action=none header.from=numeracle.com; dkim=pass header.d=numeracle.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=numeracle.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nJEEIQD5bsI0ic5haJ96iHWokNS+n6RJI/EJKDBdo7s=; b=n/rgNG6gntwCoFGDs/g3RnLw/fJq+VY1oyzXVrH7zEWV95oU/zQ4yLN/yepKL3F1gdsdOcJ2UHS+YGwRUaZFQY2lAb0WmmO3AqIw0mx8Whu9Fdjz91ITxVA4x8ldq5ShCX//XBN6BbDAbLdV7DXikXA7/Xm+wD+8WUNd83hhvW++xrBwpvQ6DyEub4twd+VknpiHOzI9Nsb19nRJd73mT7Uv7B5CXXc/xz2wfsQvlZsBZSqeMH0KfUXfrDIaIGFX3pYXG1mvVKG1B/UIpRaJXZzklqxuHbewHnCnILTfuuj8w1dnvYIAM/RXVxzdWlRW4M5t9Hu8vxvjMuTHUl3FJw==
Received: from CH3PR13MB6747.namprd13.prod.outlook.com (2603:10b6:610:1e4::5) by CH3PR13MB6745.namprd13.prod.outlook.com (2603:10b6:610:1d7::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.9182.20; Wed, 8 Oct 2025 16:00:04 +0000
Received: from CH3PR13MB6747.namprd13.prod.outlook.com ([fe80::82a1:4f47:ded9:b8e5]) by CH3PR13MB6747.namprd13.prod.outlook.com ([fe80::82a1:4f47:ded9:b8e5%3]) with mapi id 15.20.9182.017; Wed, 8 Oct 2025 16:00:04 +0000
From: Pierce Gorman <Pierce.Gorman@numeracle.com>
To: Roman Shpount <roman@telurix.com>
Thread-Topic: [stir] Re: [art] Re: For those of you who follow this kind of stuff.
Thread-Index: AQHcOFPUroyKnFFiZk+eWED6oRCbzrS4OaawgAAqdYCAAAEm8A==
Date: Wed, 08 Oct 2025 16:00:03 +0000
Message-ID: <CH3PR13MB6747587962DFDF598A314F03E1E1A@CH3PR13MB6747.namprd13.prod.outlook.com>
References: <CAD5OKxsCDRA_TWfqBNQjpoACntFfqOS98cVHL8aWNR8YKvjR+Q@mail.gmail.com> <0687B06D-E2A6-4461-8486-91D6DF64CF85@chriswendt.net> <CH3PR13MB67474A4BBA37A797BD655CD9E1E1A@CH3PR13MB6747.namprd13.prod.outlook.com> <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com>
In-Reply-To: <CAD5OKxsDrC9r-skA_h+=hiNcFELONEKncvz-woiN2wwOs9JcvQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
msip_labels: MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Enabled=True;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_SiteId=b807d15e-47b0-447f-a656-f397dba6285c;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_SetDate=2025-10-08T15:48:13.0000000Z;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Name=Confidential;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_ContentBits=3;MSIP_Label_15e9b572-a956-451d-b5da-feb99663c3d1_Method=Standard
x-codetwoprocessed: true
x-codetwo-clientsignature-inserted: true
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=numeracle.com;
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: CH3PR13MB6747:EE_|CH3PR13MB6745:EE_
x-ms-office365-filtering-correlation-id: db329872-6818-4d05-0e22-08de0683be7b
x-ms-exchange-atpmessageproperties: SA
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;ARA:13230040|376014|4022899009|1800799024|10070799003|366016|8096899003|13003099007|38070700021;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:CH3PR13MB6747.namprd13.prod.outlook.com;PTR:;CAT:NONE;SFS:(13230040)(376014)(4022899009)(1800799024)(10070799003)(366016)(8096899003)(13003099007)(38070700021);DIR:OUT;SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_CH3PR13MB6747587962DFDF598A314F03E1E1ACH3PR13MB6747namp_"
MIME-Version: 1.0
X-OriginatorOrg: numeracle.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: CH3PR13MB6747.namprd13.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: db329872-6818-4d05-0e22-08de0683be7b
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 Oct 2025 16:00:03.8529 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: b807d15e-47b0-447f-a656-f397dba6285c
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: Bsxiv6gsMJ45SQxWBbdQxajritZRgZm06dwIgXtZ68ozF3MBuKfCKYhR2LZB3BuKxpIGqsDDrbZBYFDckr/Op5xhhO1BoEK7abzLbeK5xIo=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR13MB6745
Message-ID-Hash: VES3OCRIIZLRLSRBHHWWKAFJSYG7G3BC
X-Message-ID-Hash: VES3OCRIIZLRLSRBHHWWKAFJSYG7G3BC
X-MailFrom: Pierce.Gorman@numeracle.com
X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; header-match-stir.ietf.org-0; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header
CC: Chris Wendt <chris-ietf@chriswendt.net>, Brett Nemeroff <Brett.Nemeroff@numeracle.com>, Richard Shockey <richard@shockey.us>, IETF STIR Mail List <stir@ietf.org>
X-Mailman-Version: 3.3.9rc6
Precedence: list
Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff.
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/SieEUiZ3nzq-5kCNMJO-OmprtFo>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Owner: <mailto:stir-owner@ietf.org>
List-Post: <mailto:stir@ietf.org>
List-Subscribe: <mailto:stir-join@ietf.org>
List-Unsubscribe: <mailto:stir-leave@ietf.org>
I love a good e-mail thread. Beats the daylights out of the foo-fer-rah going on in the IETF.ORG distribution. Oy. I think tying “identity” to telephone numbers has always been a mistake. It is an unhelpful abstraction. TNs are fantastically valuable for routing phone calls to anyone on the planet, but suck as a source of identity. Large enterprises have 10s or even 100s of thousands of telephone numbers and multiple service providers, and trying to encode that in certificate constraints and using the right certificate for the right number is almost a complete waste of time. The WWW operates perfectly fine on domain-validated identity in certs. It is trivial and cheap to get those certs. We should make it the same way for callers who wish to identify themselves, and no TNs in the cert are needed. The benefit to them is analytics providers at the termination of the call can identify their calls with very low effort, and protect those calls from accidental mislabeling or call blocking. If those calls deserve labeling and blocking, that can happen too, and there is a clear indicator of who that is applied to without having to get their originating service provider(s) involved either to identity them or to issue them certs with TNs. Organizations, agencies, enterprises will, eventually, understand that they want and must have a vetted digital identity that they control to authenticate digital transactions of every sort. Take a look at the eIDAS 2.0 law passed by the European Commission last year affecting more than 400 million EU citizens and organizations. Just like STIR/SHAKEN created the foundation for authenticated call signaling, the eIDAS laws and the EU Digital Identity (EUDI) Wallet program are going to transform digital communications of every sort, not just driver’s licenses, e-Passports, and age verification for gambling and getting into bars. We in the telecom industry should be paying attention to and leveraging how digital identity was established decades ago for the World Wide Web, and understanding and using how it is evolving globally, especially in the EU. Kind regards, Pierce CONFIDENTIAL From: Roman Shpount <roman@telurix.com> Sent: Wednesday, October 8, 2025 10:44 AM To: Pierce Gorman <Pierce.Gorman@numeracle.com> Cc: Chris Wendt <chris-ietf@chriswendt.net>; Brett Nemeroff <Brett.Nemeroff@numeracle.com>; Richard Shockey <richard@shockey.us>; IETF STIR Mail List <stir@ietf.org> Subject: Re: [stir] Re: [art] Re: For those of you who follow this kind of stuff. You don't often get email from roman@telurix.com<mailto:roman@telurix.com>. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification> Pierce, I never called STIR/SHAKEN a success. If you look at it as a mechanism to reduce the number of robocalls, it failed completely. It can easily be used to combat robocalls, but I don't know if anyone implementing it actually cares about it. It was always more about going through the motions, regulatory compliance, and possible deniability. If you look at it from the point of view of ease of deployment, it was horribly designed with complete disregard for how current carrier networks operate. It is a networking, implementation, and administrative nightmare. I would not blame this group for creating a sub-par standard, but it was driven more by political necessity than by reasonable design considerations. If you consider it in terms of providing helpful information in combating robocalls, it has clear utility. The most useful information is the information about the certificate used by the signer. It can easily be used to limit valid signers for phone numbers, preventing call spoofing. CNAM can be used for this with minimal effort. Adding a campaign registry to register high-volume originating numbers will provide a way for legitimate call centers to whitelist their calls and for terminating carriers to throttle the traffic. Snowshoeing would still be an issue, but I am unsure how to address this without conducting a content analysis. I think the primary reason for the Rich Call Data push is not to combat robocalls or to present end users with the identity of the remote party. It is a financial incentive for the wireless carriers, which can charge for presenting Rich Call Data from the call originator, versus paying for a CNAM database dip. Wireless carriers attempted to charge their customers for displaying the caller's identity, but were unsuccessful in selling this feature. So, they pushed for a new network protocol where they can charge the call originator for this feature. In my case, I can send a SIP call with call data directly to a wireless carrier. The wireless carrier deliberately strips the caller's identity from this call. They are asking for money (not the caller KYC) to keep it. So, this is not about users. It is about revenue. I believe a lot of people in this group are driven by their best intentions, but it ends up in an administrative quagmire and telecom revenue fiefdom anyway. Best regards, _____________ Roman Shpount On Wed, Oct 8, 2025 at 9:53 AM Pierce Gorman <Pierce.Gorman@numeracle.com<mailto:Pierce.Gorman@numeracle.com>> wrote: Well, this is a lively STIR discussion! Dear Roman, I will offer my view as the network design engineer that led the implementation of STIR/SHAKEN at Sprint, and former active participant of the FCC’s Call Authentication Trust Anchor working groups of the North American Numbering Council. The fundamental reason STIR/SHAKEN exists is because unethical, immoral, or inept service providers are admitting illegal robocalls into the PSTN. RCD, alone, will not change that. During the first CATA wg I warned Henning Schulzrinne when he was CTO of the FCC that the TRACED Act and STIR/SHAKEN would not be successful in bringing about a material decline in illegal robocalls unless the US could accomplish “critical mass” of signing and verification. I didn’t give a specific metric for critical mass in the context of STIR/SHAKEN but suggested something north of 90% of all call originations needed to be successfully signed and verified. Even then success presumed analytics meaningfully identified bad calls, traceback based on analytics determinations was automated, and that the FCC Enforcement Bureau and/or other law enforcement agencies used the information to act swiftly and decisively. Obviously, that has not happened, and I question whether it ever can. I believe it is impractical to make significant headway against illegal robocalling using cryptography and punitive measures alone. STIR/SHAKEN as conceived and implemented based on legislative and regulatory mandates is a costly and so far, failed, experiment. All that said, the TRACED Act and STIR/SHAKEN proved call authentication in the PSTN can be successfully accomplished, at scale. That is very good, however, the misses still are: 1. We should have started with an Out-Of-Band (OOB) approach, possibly not even based on SIP, so that we could avoid the problems caused by transit networking and heterogenous inband call paths. 2. We should have focused on the sources of illegal robocalls, not ALL calls. i.e., we should have focused our efforts on caller identification from call centers, as well as service providers (although the definition of “service provider” has proved damnably difficult. Nobody, including and especially the FCC, knows how many VoIP call originators exist or how many originators aren’t even aware they would be considered a “service provider”). 3. Caller identification of non-service provider organizations should be done by professional KYC vetters who cryptographically attest as to the identity of the caller which is what iconective does when issuing an SPC token to a registered SP. This reduces the possibility of collusion between service providers and their enterprise customers, and reduces the field of vetters that need to be accredited/authorized and held accountable by analytics, traceback, etc. 4. Caller identification schema need to recognize and accommodate the layered identities of modern telecommunications. Few companies operate their own call center, but instead outsource the work to call center providers. Digital identity and trust attribute (e.g., licensed? Insured?) credentials can expose the layers of identities and authorizations. And, privacy-preserving proofs are possible where needed. 5. We should have lowered the barrier (as you also recognize) to permit callers (mostly call centers, but also enterprise mobiles, etc.) to register and access STI certificates attesting to their domain-verified identity (as a minimum). Self-registered callers’ calls could be signed with RCD, not for the purpose of branded calling, but for the purpose of voluntarily identifying themselves as a measure to assist analytics providers more than anything to protect those callers’ calls from accidental labeling or blocking. Further, with the identity of the caller (at least, and their service provider or providers, plural), robocall mitigation takes on a whole new level of capability. Respectfully, Pierce Gorman CONFIDENTIAL From: Chris Wendt <chris-ietf@chriswendt.net<mailto:chris-ietf@chriswendt.net>> Sent: Wednesday, October 8, 2025 1:44 AM To: Roman Shpount <roman@telurix.com<mailto:roman@telurix.com>> Cc: Brett Nemeroff <Brett.Nemeroff@numeracle.com<mailto:Brett.Nemeroff@numeracle.com>>; Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>; IETF STIR Mail List <stir@ietf.org<mailto:stir@ietf.org>> Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff. Removing art mailing list and only keeping stir mailing list on cc. Let’s keep this on stir list only to avoid spamming art participants. RCD, I’m a fan, i guess the party is really kicking in to gear. -Chris On Oct 8, 2025, at 12:19 AM, Roman Shpount <roman@telurix.com<mailto:roman@telurix.com>> wrote: Brett, FCC was very deliberate in not specifying the KYC requirements. This being said, all carriers introducing traffic to the US phone network should have a KYC policy described in the RMD database. Carriers that did not provide an adequate policy have been removed from the RMD database and are no longer permitted to originate traffic. Additionally, if, as a carrier, I can set the A-level attestation for the call based on my KYC policy, I should be able to specify the Rich Call Data accordingly, especially if this is required when A-level attestation is provided. I have a strong feeling that certain providers care more about creating new sources of revenue for themselves through regulatory arbitrage than about creating a healthy infrastructure to prevent robocalls. A glaring example is iConnectiv providing SPC tokens, but not the signing certificates, which artificially creates business for specialized certificate authorities. Ironically, this business opportunity is so small and labour-intensive that no one actually wants to do it, trying to shepherd carriers towards the hosted signing solution. To summarize, if, as a carrier, I am entrusted with an SPC token, I should be trusted to provide the Rich Call Data. If I am not trusted to provide Rich Call Data into the network, I should not be introducing any traffic into it. If the FCC mandates Rich Call Data, it should mandate that carriers accept it without creating walled gardens, with each carrier charging a fee to actually accept the data. Finally, if we intend to mandate the transmission of personally identifiable data with every call, we need to update SIP with a scalable and secure transport protocol. Most current carrier SIP implementations still use UDP. SIP-over-TLS suffers from head-of-the-line congestion issues. SIP is in dire need of a secure datagram-based protocol, such as QUIC. I am surprised that no one from the STIR group brought this to the SIPCore, so that a more scalable and secure protocol capable of carrying Rich Call Data could be standardized. Best Regards, _____________ Roman Shpount On Tue, Oct 7, 2025 at 8:42 PM Brett Nemeroff <Brett.Nemeroff@numeracle.com<mailto:Brett.Nemeroff@numeracle.com>> wrote: Hello Roman, In my opinion, US Carriers are unlikely to accept vanilla RCD data because of the lack of defined KYC. RCD is a very good vehicle for delivering the RCD, but it depends upon implicit trust of the originating service provider. “Vanilla” RCD offered like this to terminating service providers gives no assurance to the terminating service provider that the originator performed any specific KYC. CTIA’s BCID is based on RCD but details an ecosystem with specific KYC requirements. Participating in this ecosystem will allow for the delivery and native presentation of RCD. It’s worth noting that without a defined ecosystem for RCD such as BCID, RCD provides little (trust) benefit over traditional CNAM other than the fingerprints of the originating service provider for enforcement purposes. -Brett Brett Nemeroff VP of Engineering - Voice Brett.Nemeroff@numeracle.com<mailto:%7BE-mail%7D> | 1-512-203-3884 <C2_signature_logo_ccb8cfe8-4171-4801-978c-931782d067de.png><https://www.numeracle.com/> Empowering Calls with Identity Management<https://www.numeracle.com/insights/entity-identity-management-to-empower-your-calls> CONFIDENTIAL From: Roman Shpount <roman@telurix.com<mailto:roman@telurix.com>> Date: Tuesday, October 7, 2025 at 7:24 PM To: Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>> Cc: IETF STIR Mail List <stir@ietf.org<mailto:stir@ietf.org>>, art@ietf.org<mailto:art@ietf.org> <art@ietf.org<mailto:art@ietf.org>> Subject: [stir] Re: [art] Re: For those of you who follow this kind of stuff. You don't often get email from roman@telurix.com<mailto:roman@telurix.com>. Learn why this is important<https://aka.ms/LearnAboutSenderIdentification> In my day job, I see a lot of robocalls coming through the LEC local switches as TDM, as local re-origination with spoofed ANI. I would also love to sign Rich Call Data with my SPC token and not have wireless carriers discard this data. If I provide the information about my customer, I am unsure why I need to pay someone else to sign this information. _____________ Roman Shpount On Tue, Oct 7, 2025 at 8:11 PM Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>> wrote: It wont . You mean the legacy TDM/SS7 crap…this is the beginning of mandating all SIP in the US realtime US voice network as the British have done. I would not want to own a Tandem Access network. The US industry is pretty clear on this. You only need to read the FCC 17-97 docket at the FCC ECFS website to understand where the players actually are. This again is my day job. Richard Shockey Shockey Consulting LLC Chairman of the Board SIP Forum www.shockey.us<http://www.shockey.us/> www.sipforum.org<http://www.sipforum.org/> richard<at>shockey.us<http://shockey.us/> Skype-Linkedin-Facebook –Twitter rshockey101 PSTN +1 703-593-2683 From: Roman Shpount <roman@telurix.com<mailto:roman@telurix.com>> Date: Tuesday, October 7, 2025 at 7:37 PM To: Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>> Cc: IETF STIR Mail List <stir@ietf.org<mailto:stir@ietf.org>>, <art@ietf.org<mailto:art@ietf.org>> Subject: [art] Re: [stir] For those of you who follow this kind of stuff. How would this work with PSTN links? _____________ Roman Shpount On Tue, Oct 7, 2025 at 6:59 PM Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>> wrote: The United States government is going to mandate Rich Call Data in the network. https://docs.fcc.gov/public/attachments/DOC-415059A1.pdf Richard Shockey Shockey Consulting LLC Chairman of the Board SIP Forum www.shockey.us<http://www.shockey.us/> <http://www.shockey.us<http://www.shockey.us/>> www.sipforum.org<http://www.sipforum.org/> richard<at>shockey.us<http://shockey.us/> Skype-Linkedin-Facebook –Twitter rshockey101 PSTN +1 703-593-2683 _______________________________________________ stir mailing list -- stir@ietf.org<mailto:stir@ietf.org> To unsubscribe send an email to stir-leave@ietf.org<mailto:stir-leave@ietf.org> _______________________________________________ art mailing list -- art@ietf.org<mailto:art@ietf.org> To unsubscribe send an email to art-leave@ietf.org<mailto:art-leave@ietf.org> _______________________________________________ art mailing list -- art@ietf.org<mailto:art@ietf.org> To unsubscribe send an email to art-leave@ietf.org<mailto:art-leave@ietf.org>
- [stir] For those of you who follow this kind of s… Richard Shockey
- [stir] Re: For those of you who follow this kind … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Richard Shockey
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: Re: Re: For those of you who… Tim Bray
- [stir] Re: [art] Re: Re: Re: For those of you who… Brett Nemeroff
- [stir] Re: [art] Re: For those of you who follow … Richard Shockey
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Re: [art] Re: For those of you who follow … Chris Wendt
- [stir] Re: [art] Re: For those of you who follow … Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: For those of you who follow … Roman Shpount
- [stir] Verifiable Voice Protocol (VVP) Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Pierce Gorman
- [stir] Re: [art] Re: For those of you who follow … Andy Newton
- [stir] Re: Verifiable Voice Protocol (VVP) Daniel Hardman
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: Verifiable Voice Protocol (VVP) Russ Housley
- [stir] Re: [art] Re: Re: Re: For those of you who… Richard Shockey
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: [art] Re: Re: Re: For those of you who… Henning Schulzrinne
- [stir] Re: [art] Re: Re: Re: For those of you who… Roman Shpount
- [stir] Re: [art] Re: Re: Re: For those of you who… Pierce Gorman
- [stir] Re: Verifiable Voice Protocol (VVP) Orie
- [stir] Re: Verifiable Voice Protocol (VVP) Peterson, Jon
- [stir] Re: [art] Re: For those of you who follow … Brett Nemeroff
- [stir] Re: [art] Re: Re: Re: For those of you who… Richard Shockey
- [stir] Re: Verifiable Voice Protocol (VVP) Daniel Hardman
- [stir] Re: [art] Re: For those of you who follow … Chris Wendt
- [stir] Re: Verifiable Voice Protocol (VVP) Brett Nemeroff