Re: [stir] current draft charter

Michael Hammer <michael.hammer@yaanatech.com> Mon, 17 June 2013 17:52 UTC

Return-Path: <michael.hammer@yaanatech.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE07C21F9D99 for <stir@ietfa.amsl.com>; Mon, 17 Jun 2013 10:52:57 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.556
X-Spam-Level:
X-Spam-Status: No, score=-2.556 tagged_above=-999 required=5 tests=[AWL=0.042, BAYES_00=-2.599, NORMAL_HTTP_TO_IP=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tSBEqGscIRLV for <stir@ietfa.amsl.com>; Mon, 17 Jun 2013 10:52:48 -0700 (PDT)
Received: from email1.corp.yaanatech.com (email1.corp.yaanatech.com [205.140.198.134]) by ietfa.amsl.com (Postfix) with ESMTP id 418F621F9D88 for <stir@ietf.org>; Mon, 17 Jun 2013 10:52:47 -0700 (PDT)
Received: from EX2K10MB2.corp.yaanatech.com ([fe80::5d11:66a1:e508:6871]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Mon, 17 Jun 2013 10:52:44 -0700
From: Michael Hammer <michael.hammer@yaanatech.com>
To: "hadriel.kaplan@oracle.com" <hadriel.kaplan@oracle.com>
Thread-Topic: [stir] current draft charter
Thread-Index: AQHOZwiVGT8OWD09JUqSfli80C7Gm5kxxKUAgAAL0QCAAIQGAIAAcu6AgAADDoCAABCAAIAAJmCAgAAQaYCAAADrAIAABUwAgABko4CAAOCpgIAAU3yAgAA76wCABBp2gIAAEOyAgABhfICAAHK0AIAAY22A///AmdCAAI7dgP//lC9w
Date: Mon, 17 Jun 2013 17:52:43 +0000
Message-ID: <00C069FD01E0324C9FFCADF539701DB3A03DD74B@ex2k10mb2.corp.yaanatech.com>
References: <CDE38BC3.20F76%jon.peterson@neustar.biz> <6BAABF96-8892-4C50-BB30-5F1FC05BDFD8@oracle.com> <F5C27090-FF39-4FBC-BC7E-F2ACFA5A4E6F@cs.columbia.edu> <00C069FD01E0324C9FFCADF539701DB3A03DD0D4@ex2k10mb2.corp.yaanatech.com> <6DE5EBA2-1033-4348-B9CC-2521698941AD@oracle.com>
In-Reply-To: <6DE5EBA2-1033-4348-B9CC-2521698941AD@oracle.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.17.100.180]
Content-Type: multipart/signed; micalg="SHA1"; protocol="application/x-pkcs7-signature"; boundary="----=_NextPart_000_0295_01CE6B61.EFF16EE0"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "dcrocker@bbiw.net" <dcrocker@bbiw.net>, "jon.peterson@neustar.biz" <jon.peterson@neustar.biz>, "hgs@cs.columbia.edu" <hgs@cs.columbia.edu>
Subject: Re: [stir] current draft charter
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/stir>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2013 17:52:59 -0000

Inline...

-----Original Message-----
From: Hadriel Kaplan [mailto:hadriel.kaplan@oracle.com] 
Sent: Monday, June 17, 2013 12:59 PM
To: Michael Hammer
Cc: hgs@cs.columbia.edu; stir@ietf.org; dcrocker@bbiw.net;
jon.peterson@neustar.biz
Subject: Re: [stir] current draft charter


On Jun 17, 2013, at 12:04 PM, Michael Hammer <michael.hammer@yaanatech.com>
wrote:

> First point:  This is about E.164 number delegation and proof of
ownership.
> So, I find much of the discussion that seems to rely on DNS structure 
> or Domain name structuring to be a distraction.
> How you prove proof of ownership of a domain is a separate, albeit 
> twin problem.
> But, I think that is out of scope.  I do not believe the answer here 
> is to ask my evil twin if he owns the E.164.


There've been a bunch of emails so you've probably missed it, or maybe it
wasn't made clear, but the idea behind the DNS proposal is to use
reverse-number dotted notation for the E.164.  So an E.164 of '+16035551212'
becomes the domain name '2.1.2.1.5.5.5.3.0.6.1.cid.arpa'.

The authority for .cid.arpa is the ITU, and they delegate the country-codes
within it to the national number admins for each country (ie, exactly what
they do for E.164 numbers).  At that point each nation decides what they
want to do, whether to have their whole country-code number tree under one
admin authority, or to have it split up.

Oh, and this would all use DNSSEC, which might mean we don't even need to
store full certs in this tree, but can just store public keys. (because the
DNSSEC info is the same as would be in the certs)

MH> I didn't miss any and saw the ENUM-style discussion.  That is an
inheritance.  My point is that SPs were able to do number string analysis
without the reverse tree building, so something more like a CIDR reading of
an E.164 would be sufficient.  I don't object to the above per se, but the
key is who is allowed to populate that tree and how do you enforce that?  I
assume that the DNSSEC would need to do that.  You would have to define how
any delegation is enforced with DNSSEC.  Also, explain how the called user
(even on PTSN) is going know he is not being spoofed by DNS.


> Second point:  The delegation of E.164 numbers down the tree 
> inextricable defines who owns the number, so any collection of certs 
> into an authoritative repository MUST follow the same path back up, or 
> you lose sight of that ownership.
> E.164 is already the hierarchy, so no second hierarchy is needed.

Right, and the DNS proposal follows the E.164 ownership hierarchy.


> The recipient of a number block or an individual number may need to 
> receive the private key, else the carrier signs and inserts the 
> signature on the path out from that user.

No, the recipient of the number block creates their own private/public key
pair, and upload the public key to the DNS admin for their E.164 number.  In
the DNS it gets signed by the number authority.  So the number authority (ie
the DNS) never knows the private key - only the actual user of the private
key does.

MH>  Not worded so well apparently.  Yes, I was implying that the individual
number user would need to generate the key pair, or that the carrier could
do that for them.  Also, if the numbers were aggregated, i.e. blocks, the
carrier could generate and report up the chain the key pair.  So, we are
saying the same thing.


> (Note, still need to determine how many bytes constitute the signature 
> such that it fits into an existing SS7 parameter.
> Perhaps the answer is to include an indicator in SS7 that the gateway 
> to SIP must perform the signature outbound.
> But, that may limit this to a single hop, else need to trust follow-on 
> SS7 networks to sign properly, but that may be acceptable.)

If we can use a SS7 param, I believe the Identity signature can fit - if I'm
doing my math right, it's 128 bytes binary (or 172 bytes if base64 encoded
ascii).
You'd need to include some other info as well to make this work, but I'm
pretty sure we could fit it all in the 255 bytes of an ISUP param.  Unless
we have to include a URL, in which case all bets are off.

MH> Still waiting on the specifics of that.


-hadriel