Re: [stir] Review of draft-ietf-stir-rph-emergency-services

Brian Rosen <br@brianrosen.net> Tue, 18 August 2020 21:30 UTC

Return-Path: <br@brianrosen.net>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7EA273A0D05 for <stir@ietfa.amsl.com>; Tue, 18 Aug 2020 14:30:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.887
X-Spam-Level:
X-Spam-Status: No, score=-1.887 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, T_SPF_PERMERROR=0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=brianrosen-net.20150623.gappssmtp.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GK-z1RcF7eKH for <stir@ietfa.amsl.com>; Tue, 18 Aug 2020 14:30:35 -0700 (PDT)
Received: from mail-io1-xd2a.google.com (mail-io1-xd2a.google.com [IPv6:2607:f8b0:4864:20::d2a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2904E3A0D01 for <stir@ietf.org>; Tue, 18 Aug 2020 14:30:35 -0700 (PDT)
Received: by mail-io1-xd2a.google.com with SMTP id v6so22570330iow.11 for <stir@ietf.org>; Tue, 18 Aug 2020 14:30:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=brianrosen-net.20150623.gappssmtp.com; s=20150623; h=from:message-id:mime-version:subject:date:in-reply-to:cc:to :references; bh=ojnR54SqThJXQpCDe6BAhqnrBHpIRdYZUrVNvaZTBe4=; b=hoPvbDgd4V32nHAjlDQQXqGbME+p5PzevTi8KugFYQr3BfJ0YoOWuvwpAXSB6mS28U ZLr9JHoSNJueF5fYOUQ+PwkGQHYrspqrocGOJQspodvcsWZh08+68tMzYpHWh8Ak0DW2 eXsiT3CVrXBDnvXM4oyOYRyrsxswYpF+MQHBaPivn2/1Q2SomX3m/k2aaYj1Sap4+fEl nz6ogiNzdiuY7MHvHlcQoWm/5UvmXzzbB/lXAXSEbsoj6zvUyxNnYytRA0U03ZXnemBs luA/JrYgU13laCWRkVQrPcVIUe4Tw7/N8vPcESyPexPEYHZAIW2dhytRWcyK5u/Merfy MnTA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:message-id:mime-version:subject:date :in-reply-to:cc:to:references; bh=ojnR54SqThJXQpCDe6BAhqnrBHpIRdYZUrVNvaZTBe4=; b=NOPvKCH5nPrHm81cgWEPSsw6KSEJ2afxZfd+7Xg6OHo6tkLXafOpnrgkUk1d7CaLzK TS1BqJP3bH79ZLFL+IvYMkW8oxbr9+WVouPo6mz+kxot7lqKhem3fnU+o6mmr3VvsDee jbFYrXKZf1o1lUN8fwYg6GF+T5EvoK7G9mE617JZx6ykCqdvBEOBEtML7kZr/spg+60k MxOLhysiH+L8wWq0vxBw7TfLy1UP9i7lUipqOh9h3hBa0vGqVNQ38LDSrkIX1fN5K0HB fZ2h4jWkUUHVcSpq63c+aPWzOtDYwmnNAXekiuW0l9TvlqBGyeYbAZQz1YUK14PKaX+E rd2w==
X-Gm-Message-State: AOAM531MAkeGXgTjl9GQ2Nf6H0/zdulmQw1SV1Wl0Bc8wNM6VsBgJDs5 YrsyEACgDxmSwG7T9jKR0JeAzQ==
X-Google-Smtp-Source: ABdhPJyD6h5h9FoMDBJOisPpCQU9B0DT34+kLQp2uVsb2m5LLWraSwxcQUVKRLtNkwv9lfjXj7pp4g==
X-Received: by 2002:a02:84c1:: with SMTP id f59mr21121532jai.106.1597786234203; Tue, 18 Aug 2020 14:30:34 -0700 (PDT)
Received: from brians-mbp-2871.lan (dynamic-acs-24-154-119-158.zoominternet.net. [24.154.119.158]) by smtp.gmail.com with ESMTPSA id r3sm12170596iov.22.2020.08.18.14.30.33 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 18 Aug 2020 14:30:33 -0700 (PDT)
From: Brian Rosen <br@brianrosen.net>
Message-Id: <AB059D94-9BCA-4794-BCD4-211D7E8E80F2@brianrosen.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_77435808-EA6D-48BC-AA6A-8D74B0029E8F"
Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.80.23.2.2\))
Date: Tue, 18 Aug 2020 17:30:32 -0400
In-Reply-To: <BYAPR02MB51891E95480910389FE0FDC7F3400@BYAPR02MB5189.namprd02.prod.outlook.com>
Cc: "draft-ietf-stir-rph-emergency-services@ietf.org" <draft-ietf-stir-rph-emergency-services@ietf.org>, "stir@ietf.org" <stir@ietf.org>
To: Jack Rickard <Jack.Rickard=40metaswitch.com@dmarc.ietf.org>
References: <BYAPR02MB51891E95480910389FE0FDC7F3400@BYAPR02MB5189.namprd02.prod.outlook.com>
X-Mailer: Apple Mail (2.3608.80.23.2.2)
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/a63FItu7e2uAHSdKOJYmGzOIzkQ>
Subject: Re: [stir] Review of draft-ietf-stir-rph-emergency-services
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 18 Aug 2020 21:30:37 -0000

Let’s keep the two use cases separate:
ESorig is an emergency call (user to authority).
EScallback is a call from authority to user.

For ESorg, the call is marked with a Request-URI of urn:service:sos.  The “To” field is ignored in routing and handling the call.  That’s how you know this is an emergency call.   For stir purposes, the From is an ordinary identifier, and gets treated in the normal way.  However, the rph value can only be used by a valid emergency call, and a valid emergency call is a Request URI of urn:service:sos, and a valid From.  So you don’t have any knowledge of emergency services identifiers, only the Request URI of urn:service:sos.   

For EScallback, the marking is a distinguished value in SIP Priority.  If a call has that value, it’s a call back.  The originating service provider knows who are the authorities who are allowed to place call backs, so the check is what is in SIP Priority, and one of the allowed authorities in From.  As a practical matter, in most cases, the call will be signed by the emergency authorities themselves, who will be able to get appropriate credentials for this purpose.  In most cases I’m aware of, the To in an emergency call won’t match the From in a Callback, but it’s possible for that to happen, and we want to allow it.

Esnet is a Resource Priority Header namespace, not a SIP Priority value.  We’re allowing emergency calls and call backs to use rph, and we’re protecting against malicious use of it.  So unless the call has urn:service:sos in Request URI, or the right SIP Priority in a call back (and from an authorized authority) they can’t use rph with the esnet namespace.  Generally, unless under attack, emergency calls go through even if there isn’t a passport.  Many networks won’t offer actual priority to emergency calls, but the emergency services networks (ESInets) will.  

If a call arrives anywhere with an rph using esnet, and isn’t an emergency call, with the appropriate passport,  any intermediary can refuse to give it any priority,  The emergency authorities may accept a call without a valid passport, but they might treat it with much more suspicion than they would any other call.

For call backs, the network may have special behavior.  For example, it may send the call to the device that placed the emergency call, rather than, for example, voice mail.  The network has to be able to trust that SIP Priority is set appropriately.  It will also have rph using esnet, and the network can grant it appropriate priority if it has that capability, and would not allow esnet otherwise.

The only value in covering other uses of SIP Priority is to protect against middle boxes modifying it.  We don’t really have use cases for that.  It probably wouldn’t hurt to allow it though.

Does that help?

Brian


> On Aug 14, 2020, at 1:21 PM, Jack Rickard <Jack.Rickard=40metaswitch.com@dmarc.ietf.org> wrote:
> 
> I have reviewed draft-ietf-stir-rph-emergency-services-02 and have some concerns and questions. I don't believe this spec is implementable in its current form.
>  
> Thanks,
> Jack
>  
> Why are "ESorig" and "EScallback" distinct?
> They seem to serve a very similar purpose with the only difference being whether orig or dest should be the emergency services. I don't believe there's any check that can be done to validate:
>    When using "ESorig" as the "rph" assertion value, the "orig" claim of
>    the PASSporT MUST represent the calling party number that initiates
>    the call to emergency services.
> This (and the equivalent statement for EScallback) don't seem possible to me to check (barring the standard orig/dest checking)..
> This would make the check "at least one of the parties should be the emergency services" enough to validate that this was a reasonable call.
>  
>  
> Why have them at all rather than just using auth?
> This is very possibly an issue with my understanding, but I'm not clear on why "ESorig" and "EScallback" even need to exist. "esnet.0" etc. are SIP Resource Priority headers, so should be included in the "auth" field anyway by the RPH spec. This spec appears to apply extra constraints (that a one of the callers must be the emergency services) for the "esnet" namespace but it's not clear why entirely separate claims are needed.
>  
> In a similar vein, what should a verifier do if it receives a call containing an invalid "ESorig" or "EScallback" value or the passport is invalid/untrusted, I'm assuming the behaviour is the same as for auth but this isn't clear. Although stripping the fact that this is an emergency call is potentially dangerous..
>  
>  
> Specify the type of the "ESorig" and "EScallback" claims.
> This specification currently doesn't specify the type of the new fields, there are only examples and this isn't enough. It looks like they both follow the same scheme as the rph "auth" claim, however "esnet,x" doesn't quite fit into that due to the comma and that x isn't a valid priority value.
>  
>  
> Why is sph limited to psap-callback? What should the verifier do if it isn't that? What should it do if it is?
> I'm not entirely clear on the purpose of the sph claim, however, it seems odd that it doesn't cover the full range of possible values for the SIP Priority Header. Is there a reason that it doesn't cover the "non-urgent", "normal", "urgent", or "emergency" values?
> There is also no verifier behaviour defined here, should the verifier remove the Priority header if it receives an invite with no passports signing for it? That seems dangerous to me but would be consistent with rph. Alternatively, what should the verifier do if it receives an invite with a valid passport claiming sph but with no Priority header should it add it in? I'm not sure the spec needs to be too prescriptive here, however some mention of verifier behaviour and the associated security considerations would be useful.
> 
> 
> Should the spec be stronger about the compact form?
> Section 3 currently states
>    The use of the compact form of PASSporT is not specified in this
>    document.
> However, a compact-form passport following this spec would be hard to verify as it introduces multiple possible rph variants, I think this spec could go further and say you shouldn't/mustn't.
> 
> 
> What is the requirement of these new parameters.
> As I understand it, the passport spec allows you to create a passport containing whatever JWT fields you want and verifiers should just ignore any fields they don't understand. Unless the "ppt" claim is set, which indicates that verifiers should discard it if they don't recognise that passport type. As this spec adds additional fields to an existing passport type it isn't immediately clear what the behaviour should be. Specifically, is an rph passport containing only "rph.ESorig" valid now (where it wouldn't be before because auth isn't present), is an rph passport containing no rph and only sph valid, and what does a non-rph passport with sph or ESorig set mean?
>  
> _______________________________________________
> stir mailing list
> stir@ietf.org <mailto:stir@ietf.org>
> https://www.ietf.org/mailman/listinfo/stir <https://www.ietf.org/mailman/listinfo/stir>