Re: [stir] draft-ietf-stir-servprovider-oob-03 feedback

"Peterson, Jon" <jon.peterson@team.neustar> Mon, 13 March 2023 14:50 UTC

Return-Path: <prvs=0436dc0eb8=jon.peterson@team.neustar>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9A443C137393 for <stir@ietfa.amsl.com>; Mon, 13 Mar 2023 07:50:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.493
X-Spam-Level:
X-Spam-Status: No, score=-6.493 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_HI=-5, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, URI_NOVOWEL=0.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=team.neustar header.b="BAN1VyPQ"; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=neustar.onmicrosoft.com header.b="wBEAvmVM"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id G-yGdJx77Qg4 for <stir@ietfa.amsl.com>; Mon, 13 Mar 2023 07:50:16 -0700 (PDT)
Received: from mx0b-0018ba01.pphosted.com (mx0b-0018ba01.pphosted.com [67.231.157.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8F0FBC14F6EC for <stir@ietf.org>; Mon, 13 Mar 2023 07:50:16 -0700 (PDT)
Received: from pps.filterd (m0078668.ppops.net [127.0.0.1]) by mx0b-0018ba01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 32D3hi1B006800 for <stir@ietf.org>; Mon, 13 Mar 2023 10:50:15 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=team.neustar; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=team-neustar; bh=ywpTIACw0e/opmU7yiAJw0wK4N95ZmchLwNhQ6aXkjs=; b=BAN1VyPQaKKW4dbua5Ys+jXTeaniRfIntxFFfMBQuh/oSBUaD13lTvD65YLV2SrRHcpe 8Qf/C1E7XzeOoMLH69z4kVWCxbSd8Ug7N/4499RjdOe4Nhx5ia8x3kIdZE7ew0ifk1bH SnpLI0UW5kP3hQG4Pg/ehCGk6K95478xo957lag5Bt1VkLkZFVZZoXIhcW67/NYkkqSf OjlTjwyuE0iM1wepeMict5jlMdVjEY/XM7+CcuHPeOR25qqKk43tn++J+n29l7UbvVRj rhO5z3WIYNp+mrlb75xeaQQSjQAqIZEUlWBHnB2vckR60eph0Hxtpe1OHpujhi1KN3qn AA==
Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-0018ba01.pphosted.com (PPS) with ESMTPS id 3p8naub1cx-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <stir@ietf.org>; Mon, 13 Mar 2023 10:50:15 -0400
Received: from m0078668.ppops.net (m0078668.ppops.net [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 32DEfgko031334 for <stir@ietf.org>; Mon, 13 Mar 2023 10:50:14 -0400
Received: from nam11-co1-obe.outbound.protection.outlook.com (mail-co1nam11lp2168.outbound.protection.outlook.com [104.47.56.168]) by mx0b-0018ba01.pphosted.com (PPS) with ESMTPS id 3p8naub1cv-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 13 Mar 2023 10:50:14 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=mIAQSWCUT1J5lyz63oafJnl1w3D/xQ7c8+VmvbqK4wcOzqnWqIU/ZjjUPkUTGwnI5Zzj821DApbobnKL/obVSlyuTeWGRA8lUT4pO08wZkjedLQZRHVT4E0+840kjeVoEaHIry9lwl+XTrt19UcXxiaM2o8nto/6qc1TTlkYp55v9txvdFyUk2jvKwpva0t+C2lE8I3UX134v7tzJzEWF0FygudzN2GF2/w78QgAJzxKYZiyg2ElxYwkjDRg33q9SKpXQSzBRTpS5UQPrtllo0xKIKKzOOt8F1S5TFaGPY1mRdwejeyf7cwnVhHrmJWwiZZld1mu1QeNRdTIjDls7A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=/l4O+eShGRgz7qH2G2E8yuz8uYZbrNaiQaiGDh89wBk=; b=NCCSf40MtPKOU9SBUVv9FV7rzJThsYHCEZkDuEjPCVA6A8yO2xLlmZnO6/LU3gw+WtUEqkX2y5brq4kPQr1HDUf5Rr96OTr/daQqNrz7HNJcK+0F2GXkjPYST6VskFRm+3AG4+xpb23A1T/dZWv0i7bmU3Rkfgr7lLhGDVrUjzzm5H5vVcSKUFYzuLOlxcU6B12rPxAqoJOuIFgTnHqA/xvT3X4MoqpoDPb6lAzHp4UkP/n80ME448s8X5QFbgo1L42ynjb/5yRy8Zkru4QacHWH+OzS3dGOUytj02iFJRt+xiVc0Bg2wC2OIL5mBs8993+MtRji0M5C5K3IukzCtg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=team.neustar; dmarc=pass action=none header.from=team.neustar; dkim=pass header.d=team.neustar; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.onmicrosoft.com; s=selector1-neustar-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/l4O+eShGRgz7qH2G2E8yuz8uYZbrNaiQaiGDh89wBk=; b=wBEAvmVMSPeHZHgntHGr+ohldwnv5atUPVS/iTJrBIw21j9ujc+izMVTzS5ZdcZ6reCC+iuQynVIioY6UcU1+1RrsH3dQki/94LTJOGoCDdSdRSwmy6FbKSflqn6TtnhCX32rsWVo1DEomy3xrOzKOKTQrAVF29+AY8thaqHc00=
Received: from BY5PR17MB3569.namprd17.prod.outlook.com (2603:10b6:a03:1b9::20) by DS7PR17MB6609.namprd17.prod.outlook.com (2603:10b6:8:ea::18) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.24; Mon, 13 Mar 2023 14:50:11 +0000
Received: from BY5PR17MB3569.namprd17.prod.outlook.com ([fe80::2984:192b:c466:5d0]) by BY5PR17MB3569.namprd17.prod.outlook.com ([fe80::2984:192b:c466:5d0%4]) with mapi id 15.20.6178.024; Mon, 13 Mar 2023 14:50:10 +0000
From: "Peterson, Jon" <jon.peterson@team.neustar>
To: Simon Castle <simoncastle@microsoft.com>, IETF STIR Mail List <stir@ietf.org>
CC: Jack Rickard <jack.rickard@microsoft.com>
Thread-Topic: draft-ietf-stir-servprovider-oob-03 feedback
Thread-Index: Adkh8xSf5wZ3biXXT5SzuAI7x1G8ygzJiKIz
Date: Mon, 13 Mar 2023 14:50:10 +0000
Message-ID: <BY5PR17MB3569BFFB0725265894E0797DE2B89@BY5PR17MB3569.namprd17.prod.outlook.com>
References: <VI1PR83MB0432C10B93AAF278FA9406C1BBFB9@VI1PR83MB0432.EURPRD83.prod.outlook.com>
In-Reply-To: <VI1PR83MB0432C10B93AAF278FA9406C1BBFB9@VI1PR83MB0432.EURPRD83.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR17MB3569:EE_|DS7PR17MB6609:EE_
x-ms-office365-filtering-correlation-id: 765df2d8-bfc0-4712-9c51-08db23d23eeb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR17MB3569.namprd17.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(366004)(136003)(39850400004)(346002)(396003)(376002)(451199018)(5660300002)(83380400001)(186003)(478600001)(6506007)(26005)(71200400001)(9686003)(7696005)(64756008)(52536014)(166002)(91956017)(38070700005)(4326008)(66446008)(66476007)(76116006)(33656002)(55016003)(66946007)(9326002)(8676002)(66556008)(41300700001)(8936002)(86362001)(316002)(110136005)(38100700002)(122000001)(2906002)(46492015); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR17MB3569BFFB0725265894E0797DE2B89BY5PR17MB3569namp_"
X-OriginatorOrg: team.neustar
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR17MB3569.namprd17.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 765df2d8-bfc0-4712-9c51-08db23d23eeb
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Mar 2023 14:50:10.8321 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 73a2bbc1-f307-47c4-8f94-5f379c68bc30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: MMhr45CCaSziq9mBsw6gh/fNi/iLM/9ymS2RfPpueizp9S4QNFD+t77Pt5OmEikTFDy/0tpjsXJI1mr1+Uoj/X9dDACY5aZBRJWdMStk69c=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS7PR17MB6609
X-Proofpoint-ORIG-GUID: KrqBlgJ1VmbZSsLzG0oWfg5V_xBzkNIf
X-Proofpoint-GUID: KrqBlgJ1VmbZSsLzG0oWfg5V_xBzkNIf
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-03-13_07,2023-03-13_02,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 phishscore=0 bulkscore=0 suspectscore=0 spamscore=0 lowpriorityscore=0 mlxlogscore=727 impostorscore=0 adultscore=0 priorityscore=1501 mlxscore=0 clxscore=1011 malwarescore=0 classifier=spam adjust=0 reason=mlx scancount=2 engine=8.12.0-2212070000 definitions=main-2303130115
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/oLsnkJYefEVMCWG9c8dJf1WyMvI>
Subject: Re: [stir] draft-ietf-stir-servprovider-oob-03 feedback
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 13 Mar 2023 14:50:21 -0000

Hi Simon,

Reaching back through the sands of time here… thanks for your notes on this draft, they are helpful.


-          The AS must select which CPS to send the signed identity to.  The suggestion is that the choice of CPS can be made based on associating the TnAuthList to the CPS URI based on the received advertisements.  However, if the CPS uses SPCs to advertise itself, as opposed to TN Ranges, there is no way proposed for the AS to correlate a call’s destination number to the destination.

The AS would in that case need access to some other means of mapping TNs to SPCs. In some environments, those exist, and in others they don’t – in places where they don’t, it might make more sense to advertise TNs than SPCs. Clearly this isn’t a mechanism that would work in places where the AS has no way to determine how to find a CPS. Alternative architectures, where for example the CPS is associated with the origination rather than the terminating domain, ultimately have similar discovery problems.


o   I wasn’t clear if this is what is being referred to in Section 10 (Security Considerations) with the comment “determining whether a given SPC entitles a service provider to access PASSporTs for a given telephone number is not trivial, but is a necessary component of this CPS architecture” or if that was referring to the AS being able to authenticate the CPS; either way, this gap feels like it should be highlighted in Section 4 with the core advertisement proposal (if only to say something like “CPSs must advertise their TN Ranges rather than an SPC value, or else determine another method by which AS recipients can identify the numbers they have authority for”).

That language in Section 10 is indeed basically saying what I said above. I don’t think this is swept under the rug in earlier text, but I’ve added some language to that effect to the “Advertising a CPS” section.


-          TNAuthLists provide no method of describing URIs, which can also be the recipient of calls, unless through an (undefined) association with an SPC.  Should this document provide support for OoB calls to destination URIs as well as to TNs?

This is a really a scope issue for STIR certificates overall: of course, regular certificates can advertise domains, and if you have a domain, you can just use a regular certificate. The language in Section 4 kind of takes this into account, but on balance I agree there should be a caveat for this domain-based case as well, which I’ll add (basically just identifying it as a subject for future work if people want to go there).


-          The example in-line `{ "1234":"https://urldefense.com/v3/__https://cps.example.com__;!!N14HnBHF!6WJJjDxR_kBbf4lyiBrBoxqgY3l1RRLH4oTA7tcUfcoUFt99I-T5MVbOWxT9UoRhR8OrN-8FGQSkIW5l8EoquA$ <https://urldefense.com/v3/__https:/nam06.safelinks.protection.outlook.com/?url=https*3A*2F*2Fcps.example.com*2F&data=05*7C01*7Csimoncastle*40microsoft.com*7Cc86b8fbfdf514e506ef908dade94657d*7C72f988bf86f141af91ab2d7cd011db47*7C1*7C0*7C638067026224047968*7CUnknown*7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0*3D*7C3000*7C*7C*7C&sdata=4iT31sZ8mz67C07hmAXj6pvcbDtpVirANuNiKu0e28I*3D&reserved=0__;JSUlJSUlJSUlJSUlJSUlJSUlJSU!!N14HnBHF!9vfO4jdcBsrNpKOm649JCICJYp-YiT44LnpywoK86lm3TUvfMuWDXkgaUyxAhpAQRSLMNMeQEn6XTD_vVThzKCDtT47gYA$>" }` is incomplete; the key should be a TnAuthList but in the example there’d be no way to distinguish “1234” between being an SPC or a TN (although the length suggests it’s intended as an SPC).

I’d be willing to add a prefix delimiter to disambiguate that, sure. Seems like the TNEntry values from RFC8226 would probably be the best choice, as they explicitly separate individual TNs from TN ranges as well. Sound good?

Jon Peterson
Neustar (a TransUnion company)