Re: [stir] I-D Action: draft-kaplan-stir-ikes-out-00.txt

Hadriel Kaplan <hadriel.kaplan@oracle.com> Thu, 25 July 2013 05:23 UTC

Return-Path: <hadriel.kaplan@oracle.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8FDA521F85E0 for <stir@ietfa.amsl.com>; Wed, 24 Jul 2013 22:23:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.557
X-Spam-Level:
X-Spam-Status: No, score=-6.557 tagged_above=-999 required=5 tests=[AWL=0.042, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Thd9PYsnqQgQ for <stir@ietfa.amsl.com>; Wed, 24 Jul 2013 22:22:57 -0700 (PDT)
Received: from aserp1040.oracle.com (aserp1040.oracle.com [141.146.126.69]) by ietfa.amsl.com (Postfix) with ESMTP id 00B5121F85D1 for <stir@ietf.org>; Wed, 24 Jul 2013 22:22:56 -0700 (PDT)
Received: from acsinet22.oracle.com (acsinet22.oracle.com [141.146.126.238]) by aserp1040.oracle.com (Sentrion-MTA-4.3.1/Sentrion-MTA-4.3.1) with ESMTP id r6P5MsLI010358 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 25 Jul 2013 05:22:55 GMT
Received: from userz7021.oracle.com (userz7021.oracle.com [156.151.31.85]) by acsinet22.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r6P5Mqe8003684 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 25 Jul 2013 05:22:53 GMT
Received: from abhmt105.oracle.com (abhmt105.oracle.com [141.146.116.57]) by userz7021.oracle.com (8.14.4+Sun/8.14.4) with ESMTP id r6P5MpdK006522; Thu, 25 Jul 2013 05:22:51 GMT
Received: from [10.232.150.69] (/217.41.237.32) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Wed, 24 Jul 2013 22:22:51 -0700
Content-Type: text/plain; charset="us-ascii"
Mime-Version: 1.0 (Mac OS X Mail 6.5 \(1508\))
From: Hadriel Kaplan <hadriel.kaplan@oracle.com>
In-Reply-To: <17414_1374680796_51EFF6DC_17414_333_1_B5939C6860701C49AA39C5DA5189448B0B5956@PEXCVZYM12.corporate.adroot.infra.ftgroup>
Date: Thu, 25 Jul 2013 01:22:48 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <A0EFAA3C-9A6C-4EF0-B3F0-2302006C4858@oracle.com>
References: <20130712043221.11767.74779.idtracker@ietfa.amsl.com> <1F4B4D44-BD3E-4995-876A-147832C925F9@oracle.com> <19893_1374596593_51EEADF1_19893_9071_1_B5939C6860701C49AA39C5DA5189448B0B55A6@PEXCVZYM12.corporate.adroot.infra.ftgroup> <15BB6D07-F5D4-4945-80B9-0648CB32A6CA@oracle.com> <7699_1374659827_51EFA4F3_7699_4570_1_B5939C6860701C49AA39C5DA5189448B0B576C@PEXCVZYM12.corporate.adroot.infra.ftgroup> <4380BD56-E3E5-4CBD-B329-2D9964F91E01@oracle.com> <17414_1374680796_51EFF6DC_17414_333_1_B5939C6860701C49AA39C5DA5189448B0B5956@PEXCVZYM12.corporate.adroot.infra.ftgroup>
To: philippe.fouquart@orange.com
X-Mailer: Apple Mail (2.1508)
X-Source-IP: acsinet22.oracle.com [141.146.126.238]
Cc: "stir@ietf.org" <stir@ietf.org>
Subject: Re: [stir] I-D Action: draft-kaplan-stir-ikes-out-00.txt
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/stir>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 25 Jul 2013 05:23:03 -0000

On Jul 24, 2013, at 11:46 AM, <philippe.fouquart@orange.com> wrote:

> Right, but the "threat" for STIR is that someone receiving a INVITE/IAM gets a calling party number that it uses for caller-id display (or whatever) and the number is being maliciously misrepresented.  Obviously we don't know when it's being maliciously misrepresented or just an honest mistake/error, and many INVITES/IAMs won't be signed at all at least in the beginning, so we likely won't be able to block such calls for a very long time if ever.  Instead we'll either anonymize the calling number (block number display), or check with some other policy engine, or log it for later analysis, or send it to an IVR, or whatever - it's a local policy decision really.
> 
> So assume you get a INVITE/IAM with a RFC 6567 UUI.  It would be a local policy decision what to do.  You can decide that the destination subscriber doesn't have a UUI service, for example a mobile/home phone wouldn't, and thus treat it as an unsigned call and anonymize the calling number or block it or whatever.  Or you can decide that the SIP Trunk to an Enterprise has such UUI "service", and pass the INVITE/IAM on to it unchanged as you do today.  The IP-PBX is then responsible for deciding whether the INVITE/IAM with such a UUI is valid/allowed - for example if it's from a branch office or whatever.  That's what it has to decide already today, and we don't seem to have a spoofed caller problem for those cases today. 
> The danger with letting a RFC 6567 UUI trump an IKES UUI is that malicious sources could just start 
> adding RFC 6567 UUIs to their INVITEs.  We can easily detect and block that for destinations that don't 
> expect to get 6567 UUIs.                   ^^^^^^^^^^^^^^^^^^^^^^^^^^^^ 
> 
> [PhF] I'm missing something here: how does an interconnect point detect that a particular end site expect UUI or not? Suppose one of your malicious source adds those RFC 6567 UUIs to get through, how would you possibly know upstream whether it is legitimate or not, as you said it's a local policy? 

Sorry, I didn't mean the ingress point (SBC/IBCF) of a carrier could block it - I just meant the carrier could block it somewhere, for example in the S-CSCF that routes the call to the IP-PBX's trunk, or an SBC connecting to the IP-PBX trunk, or whatever.


> The hard part is how to block it for IP-PBXs that do expect 6567 UUIs.  
> [PhF] It seems to me that part of the problem is precisely that you don't know which do and which don't.  

As far as I know, the carriers know if a PBX-trunk/Enterprise-customer has UUI support or not.  For example it's in the service contract/agreement with the Enterprise for SIP trunk service.  Is that not the case? (I could easily be wrong about that - it was just what I heard)


> If it becomes a problem, there are some potential solutions.  One solution is to only support 6567 UUI for inter-branch calls that stay SIP along the whole path (since the IKES info is in a SIP header, it can be used at the same time as 6567 UUI for SIP).  That's not unreasonable, because as far as I know such inter-branch calls typically only work within the same carrier, or only within a small set of fixed/known/pre-arranged set of carriers in a country.  
> If that's true, then it's not unreasonable to expect the small set of carriers to support SIP interconnect, 
> 
> [PhF] As an aside, even if they did support SIP interconnect, this seems to assume that you don't have ISUP or some encapsulation of it in parallel/addition to "full SIP". 

Sorry I should have been clearer.  I meant the IKES info is still in a SIP header, even if there's an ISUP mime body in the SIP message.  So for SIP-SIP scenarios, you can leave the RFC 6567 UUI alone, while still having IKES.  IT should probably be clearer about that in the draft.

-hadriel