Re: [stir] I-D Action: draft-ietf-stir-passport-rcd-15.txt

Chris Wendt <chris-ietf@chriswendt.net> Tue, 19 April 2022 20:38 UTC

Return-Path: <chris-ietf@chriswendt.net>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 509CF3A12A0 for <stir@ietfa.amsl.com>; Tue, 19 Apr 2022 13:38:36 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.904
X-Spam-Level:
X-Spam-Status: No, score=-1.904 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=chriswendt-net.20210112.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z_eB5Wz2Ml4h for <stir@ietfa.amsl.com>; Tue, 19 Apr 2022 13:38:31 -0700 (PDT)
Received: from mail-qt1-x82a.google.com (mail-qt1-x82a.google.com [IPv6:2607:f8b0:4864:20::82a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3DEBC3A129C for <stir@ietf.org>; Tue, 19 Apr 2022 13:38:31 -0700 (PDT)
Received: by mail-qt1-x82a.google.com with SMTP id x12so1996820qtp.9 for <stir@ietf.org>; Tue, 19 Apr 2022 13:38:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=chriswendt-net.20210112.gappssmtp.com; s=20210112; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=yI/apRPzGXdAvMVFPI1t5syDue5wP6OYhRT9wQvAV7Q=; b=0fpR9Op7xCoTldcTQrrZ2SV/PWnLmVC6lylzDk48e06lATBhHEBeMHo/ZGQygZ+BXj OJnV8lWwkRDAk3/i3B5+RpQFDXdznUYFm1z0OyDJLFfhfdQbpe4ZyHNct2QARjlh1Wkh 0lcOuDd/9XNy4Bs9sLamFOqioY1cAPUkls7xYifDbwgzn7dRNOYyCu2G21s8QvzGXIl9 X+lClx63R/Kg3IO2T3Ees4/bK10mwUjpm1xwkTXDrQ1dBIrF5+98xliGeGgco5q1noFW +xE66bmdJ0E44tDwScxC/k3Gkwdjo2DzVCjfGM9fywnvxvZuI+Q3x+fTvDfTIKy3UR47 X6/Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=yI/apRPzGXdAvMVFPI1t5syDue5wP6OYhRT9wQvAV7Q=; b=aAEUXmeuWgQV57LxvYt2CiA9tPkRyb338TNPWxa7RcSMacbHuyWIC3Bh1y9m08xFXv NFIBb4MoeL9yJILwxj72igZgBvS79a/m4BLm8iCq/RbfpjaLI5CnYlTj53WJHjIK+4M3 VvkwzWI7C6q49EWvH457r4x7uU5mjFxwgU1sPBJXAXrektBjPv/z9aNK3R1uHwyxJRwT cP9dOu0O8T9JDZTbz3bLAe4aYCrYgZNFji3RT6bxwI8RLY6UOtG0hFuNn+VdIPBeAwNR WryBjfqJ/Lq2YPzHKmg5syBWGYDQ61m8ifUyfJEhi/mb5TnU5UfogVVgzgRkDI/IY5Dh pL6Q==
X-Gm-Message-State: AOAM532Nl6cWbuC9jzkOS71xjLPjS6WlFwtOj4jnIN3WdHR8YR+r4xGy GWxMXwZUYL/7YImBut6OBAt2oMPJ0Tssl648
X-Google-Smtp-Source: ABdhPJwqjuVXe8kENdnmy6FgP3DZEsiaSeE4/u1vBdVPLnF2lRVxaej0ofPqMCz1dwLTro3zNk6PgA==
X-Received: by 2002:ac8:7f90:0:b0:2f3:38ef:46fb with SMTP id z16-20020ac87f90000000b002f338ef46fbmr2878155qtj.174.1650400710031; Tue, 19 Apr 2022 13:38:30 -0700 (PDT)
Received: from smtpclient.apple ([2601:41:c400:1ad:2494:74a6:1151:5492]) by smtp.gmail.com with ESMTPSA id t125-20020a372d83000000b0069c1df12422sm510177qkh.84.2022.04.19.13.38.29 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 19 Apr 2022 13:38:29 -0700 (PDT)
From: Chris Wendt <chris-ietf@chriswendt.net>
Message-Id: <FC39A7EC-40D8-4D1B-812A-33D6A95C42B3@chriswendt.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_8E276F04-CF22-4B0D-8A74-1723255DC55C"
Mime-Version: 1.0 (Mac OS X Mail 16.0 \(3696.80.82.1.1\))
Date: Tue, 19 Apr 2022 16:38:28 -0400
In-Reply-To: <54F4C471-CCD8-45C7-9109-A6D148C12A38@nostrum.com>
Cc: Jack Rickard <jack.rickard@microsoft.com>, IETF STIR Mail List <stir@ietf.org>
To: Ben Campbell <ben@nostrum.com>
References: <AM5PR83MB0355EEAD40D7BDAD596EB9B5880A9@AM5PR83MB0355.EURPRD83.prod.outlook.com> <D6282D32-1187-47A2-B1CD-CF5E269A96D3@chriswendt.net> <54F4C471-CCD8-45C7-9109-A6D148C12A38@nostrum.com>
X-Mailer: Apple Mail (2.3696.80.82.1.1)
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/XaAntl3Dhht1Z0WlLXsLSa220cE>
Subject: Re: [stir] I-D Action: draft-ietf-stir-passport-rcd-15.txt
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 19 Apr 2022 20:38:36 -0000

Hi Ben,

Something that has become clearer to me, and i think i’m not the only one saying it, is that for RCD vs shaken, and this is not about delegate certificates used for “A” attestation, this is for RCD being received at the TSP, the RCD information needs to be signed by a party that the TSP can trust. Whether that is 3rd party service, or delegate certificate that has constraints by the vetting party, or whatever the model, even if it is an OSP that is signing the information, the bar has to be consistent for RCD information, and the bar needs to be high.

Whether you are the biggest OSP in the world, or the smallest, we can’t rely on SPC level “shaken” signing model to trust RCD data.  So, this is what i’m trying to get to.

-Chris

> On Apr 19, 2022, at 3:22 PM, Ben Campbell <ben@nostrum.com> wrote:
> 
> 
> 
>> On Apr 19, 2022, at 1:33 PM, Chris Wendt <chris-ietf@chriswendt.net <mailto:chris-ietf@chriswendt.net>> wrote:
>> 
>>> 
>>> 
>>> Section 15
>>> The second paragraph seems to be suggesting that only certificates containing JWTClaimsConstraints should be trusted to add rcd information (without some other trust relationship), but I don't understand why this is the case? Surely, you either trust the entity that added the RCD information or you don't, why should extra constraints on the certificate have any impact on that? I expected this section to say something like "The verifier must validate that the signer is trusted to provide Rich Call Data, in addition to having authority over the originating address".
>>> 
>>> This also raises the question of whether an RCD passport authenticates the originator like a base passport? I don't think there's any text to suggest that it doesn't, but that would prevent intermediaries who have no authenticated relationship with the originator from adding RCD information.
>> 
>> An intermediary can add an RCD PASSporT.  Authenticated relationships are a “shaken” concept not an “rcd” concept, RCD information should be vetted and signed by a party the destination can trust did that validation specific to RCD for a given telephone number(s).  This is the key to what i am trying to clarify.  How can i have an SPC level “shaken” certificate for RCD information with integrity, it makes no sense.  
>> I didn’t remove the ability to put “rcd” infomation in other PASSporTs, but it’s not something i think we should be recommending for mainstream cases.
>> 
> 
> I have to disagree here. I think it’s perfectly reasonable that an OSP could properly vet RCD information and that a relying party could trust its SHAKEN-credential signature over the RCD claims. I don’t see why that is harder to believe than to believe that the issuer of a delegate cert could properly vet RCD values to create claim constraints in the certificate. In both cases, the relying party must decide who to trust.
> 
> I think this really comes down to two cases of authority (and liability)
> 1) RCD signed with a delegate-cert with JWTClaimConstraints -- The certificate issuer is the RCD on the hook for vetting RCD
> 2) RCD signed with a cert with no JWTClaimConstraints (e.g. SHAKEN cert): The passport signer is on the hook for vetting RCD.
> 
> For case 2, I don’t expect anyone to trust the signature of a typical caller that signs its own calls. But I think it highly likely people will trust an established OSP. Especially if they already trust that OSP to attest to the calling-number validity.
> 
> Don’t get me wrong, I like the delegate-cert with claim constraints models better. But I fully expect that some OSPs will prefer to put RCD claims in SHAKEN passport. (I also expect some won’t).
> 
> Ben.
>