[stir] PASSporT Diverted: implications of nesting

Eric Burger <eburger@standardstrack.com> Wed, 18 July 2018 16:12 UTC

Return-Path: <eburger@standardstrack.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 72C4A1311CE for <stir@ietfa.amsl.com>; Wed, 18 Jul 2018 09:12:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.78
X-Spam-Level:
X-Spam-Status: No, score=-1.78 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, RCVD_IN_DNSWL_NONE=-0.0001, T_DKIM_INVALID=0.01, T_SPF_PERMERROR=0.01] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=neutral reason="invalid (public key: not available)" header.d=standardstrack.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id chBpC1yYZBhg for <stir@ietfa.amsl.com>; Wed, 18 Jul 2018 09:12:39 -0700 (PDT)
Received: from biz221.inmotionhosting.com (biz221.inmotionhosting.com [23.235.223.233]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 63F931311C7 for <stir@ietf.org>; Wed, 18 Jul 2018 09:12:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=standardstrack.com; s=default; h=To:Date:Message-Id:Subject:Mime-Version: Content-Type:From:Sender:Reply-To:Cc:Content-Transfer-Encoding:Content-ID: Content-Description:Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc :Resent-Message-ID:In-Reply-To:References:List-Id:List-Help:List-Unsubscribe: List-Subscribe:List-Post:List-Owner:List-Archive; bh=iS9SUv6NEdtlAzMVEbbUcFdGgVUhBcJcLvusAnbzm5w=; b=R06fu/BKKm38pb/r5PrHSQl3nq 0IVMtgPy9MYXCFLfISDnu/WgQnp3ijC4U8hNiVUS5gfGHUXGNpDrJ2sPU+f4XHZC0+qlQa4Hb8HCw PzDoqZIgpW0+IYgZZl84mrgbsf235YTMWQi+yy+slTRjrUiZpOs+oKRgNQcAyNyanN3A=;
Received: from dhcp-8fec.meeting.ietf.org ([31.133.143.236]:60765) by biz221.inmotionhosting.com with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.91) (envelope-from <eburger@standardstrack.com>) id 1ffp43-0077sA-C7 for stir@ietf.org; Wed, 18 Jul 2018 09:12:36 -0700
From: Eric Burger <eburger@standardstrack.com>
Content-Type: multipart/signed; boundary="Apple-Mail=_73F3CFCD-7886-4E55-B8B7-E4A33A0157BB"; protocol="application/pgp-signature"; micalg="pgp-sha256"
Mime-Version: 1.0 (Mac OS X Mail 10.3 \(3273\))
Message-Id: <5DD79F73-6A69-42AC-90EE-1EF12AD23291@standardstrack.com>
Date: Wed, 18 Jul 2018 11:21:40 -0400
To: stir@ietf.org
X-Mailer: Apple Mail (2.3273)
X-OutGoing-Spam-Status: No, score=-1.0
X-AntiAbuse: This header was added to track abuse, please include it with any abuse report
X-AntiAbuse: Primary Hostname - biz221.inmotionhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [47 12] / [47 12]
X-AntiAbuse: Sender Address Domain - standardstrack.com
X-Get-Message-Sender-Via: biz221.inmotionhosting.com: authenticated_id: eburger+standardstrack.com/only user confirmed/virtual account not confirmed
X-Authenticated-Sender: biz221.inmotionhosting.com: eburger@standardstrack.com
X-Source:
X-Source-Args:
X-Source-Dir:
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/gwXTrzD1vZLTrwEuxXDiGqqs0Gg>
Subject: [stir] PASSporT Diverted: implications of nesting
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.27
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 18 Jul 2018 16:12:44 -0000

I was thinking about nesting PASSporTs that represent diversion versus listing PASSporTs. What got me thinking was the statement in draft-ietf-stir-passport-divert-03 that says:

	However, nested PASSPorTs could result in lengthy Identity headers, and some operational experience is needed to ascertain how viable multiple layers of nesting will be.

My immediate thought was, “That is OK, so long as the expected status for the draft will be Experimental, not Proposed Standard.” Of course, that thought did not sit well with me. The idea that we are going to standardize something we *hope* will work does not sound responsible.

That got me thinking with my Evil Hat(tm) on: it would be pretty trivial to setup a call forwarding chain to build a VERY long Identity header. Given how software gets done, I could imagine a rather nice and easy denial of service attack vector being created here.

Then I looked at the rationale for the nested object in the first place: for storage for out-of-band Call Placement Service.

How about this: instead of nested PASSporTs to support OOB, with the concomitant risk for DoS, we say we will standardize on a list of Identity headers. STIR OOB then could define how to package the list of identity headers into a single object for OOB. I would offer the issues are orthogonal. While it is ‘nice’ to have the same object bits for OOB as for the rest of the STIR ecosystem, how an OOB-aware system packages and stores the objects need not impact STIR itself.

A zero-order model for OOB might be to ZIP the headers first, sign them, and then store them at the CPS. When retrieved, the CPS would send the compressed object to the requestor, who by definition would know how to unzip and order the Identity headers.

Just a thought.