Re: [stir] Roman Danyliw's Discuss on draft-ietf-stir-messaging-06: (with DISCUSS and COMMENT)

"Peterson, Jon" <jon.peterson@team.neustar> Sun, 12 March 2023 19:29 UTC

Return-Path: <prvs=0435e9622d=jon.peterson@team.neustar>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 078AEC151551 for <stir@ietfa.amsl.com>; Sun, 12 Mar 2023 12:29:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.992
X-Spam-Level:
X-Spam-Status: No, score=-1.992 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=0.1, RCVD_IN_DNSWL_BLOCKED=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_HELO_NONE=0.001, SPF_NONE=0.001, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=team.neustar header.b="W6VM833d"; dkim=fail (1024-bit key) reason="fail (body has been altered)" header.d=neustar.onmicrosoft.com header.b="tAZLTsag"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QkJ2DfN2AptQ for <stir@ietfa.amsl.com>; Sun, 12 Mar 2023 12:29:37 -0700 (PDT)
Received: from mx0b-0018ba01.pphosted.com (mx0b-0018ba01.pphosted.com [67.231.157.90]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83DBDC1524AA for <stir@ietf.org>; Sun, 12 Mar 2023 12:29:05 -0700 (PDT)
Received: from pps.filterd (m0049401.ppops.net [127.0.0.1]) by mx0b-0018ba01.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 32CFwumB024869 for <stir@ietf.org>; Sun, 12 Mar 2023 15:29:04 -0400
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=team.neustar; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : mime-version; s=team-neustar; bh=SlEkzFiN0JfqaRAXjfpJv/tQEBB5u4h7nSraAuuAopQ=; b=W6VM833drowEiQDTWmyrjmMIrCgbbsAiEOI+p5Q3lXkNsTsLdcO9xZWNynZwWCQ5h3fx rFwIWegP9asDESAZ/+RIqLwyg+0DKx3WIn+DzZxQLrk8AUE+v0FABjNoyXKd1O1FjkKp EQZoCnRVYi+urzJ7qoZJAk4c3jQDRQW4+loPz/H2tbxDOa2qs7xPmN3um2Zw9PX9LCcG MpEKR2d7As5fTBEltAVtVzQ9esZIG4Q7r5YbVEDGDMWi+rHThlQWiZP2jlTIkxnhw2f7 0opexxDjNm/uua8FqtOhwjYoCHxaTn0VL9w3mdxUTmFCHNKQ+OuUmavjZfoykIMqObBo uw==
Received: from pps.reinject (localhost [127.0.0.1]) by mx0b-0018ba01.pphosted.com (PPS) with ESMTPS id 3p8puhsx09-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT) for <stir@ietf.org>; Sun, 12 Mar 2023 15:29:04 -0400
Received: from m0049401.ppops.net (m0049401.ppops.net [127.0.0.1]) by pps.reinject (8.17.1.5/8.17.1.5) with ESMTP id 32CJT38e009164 for <stir@ietf.org>; Sun, 12 Mar 2023 15:29:04 -0400
Received: from nam10-bn7-obe.outbound.protection.outlook.com (mail-bn7nam10lp2108.outbound.protection.outlook.com [104.47.70.108]) by mx0b-0018ba01.pphosted.com (PPS) with ESMTPS id 3p8puhsx04-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Sun, 12 Mar 2023 15:29:03 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=lrRxq+VR3V9dCD2XmJpBCqL9E8I2gwFDyy+eD3aAxOJlNgT72zf17xLeWAwlVBm8pnio6/E7FVjGYhEBceetYEk7CaU6Dw2/30DYvJqTMCf/Ut8uTHJ4r0RCLJPZxJR3GSvleu55q17P7/OUyEMnAOGrVSP/pvkoQIvzLY69RvuZCusBVFTrgiEkwen+R1mqLKuhkUMUzShFf2a8JXhfAEkCQxptaw4Cem1uLH6XwGzW6uKDfn5m2e/AXACqHxQBaxCqQtnnVuat3B47jt4cDDanrKlNXFteVyieEzgCM2ZjFt0XgtwWXz32lFCFnss4DFgnXto/wZieSn8kA2weDA==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZrPWH+2MAPWfBfFxP0yYJF6pIUYHyn32T7oAATKjkTs=; b=HV+E1slX2aXY5SfLpOKquwKw62EWbJJkMJQmL2USOScgNtoqLIAfwCcbaTZoHYDVYXFudAllDDJez3lrXPlK5KhaJwkNi2m/KjL4Utg2TP1H54b67OirVf+DZ3hd4CYIBWG0y6mZ2SgxkztpBDI06nAXdnqdW3Yr7+O8WqBhnSrc/XaSyGMsr0h0uzVm/wP1P0t9ofg/sGTPNCLzp6VBun9lWW1oi8JsBd9apiQAiDTfI5ggZRmfE2oI40gBa9BPO1Pwlub2EjaAxdC9JQZ8G8pWaDJxewfxhyiV0sUTMEBoxiJudJAvw3ul/0ssi70WbQ0XmC27y+14pBvtBuLBCA==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=team.neustar; dmarc=pass action=none header.from=team.neustar; dkim=pass header.d=team.neustar; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=neustar.onmicrosoft.com; s=selector1-neustar-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZrPWH+2MAPWfBfFxP0yYJF6pIUYHyn32T7oAATKjkTs=; b=tAZLTsag7keUA2++fVhv/HRct8iFpCs5hH53n6hAy60ASlGa0eVEI46KOijygrAI4BBwFpQn3SguYvZ+LIMs8sKVHmybwox/xlvbluCRSKCDpXSBu5eTBqWY9gTGOYw4sF0BLvlr/HlSDNLfq0EkETnobByksBKalausVuLx4fM=
Received: from BY5PR17MB3569.namprd17.prod.outlook.com (2603:10b6:a03:1b9::20) by DS0PR17MB6376.namprd17.prod.outlook.com (2603:10b6:8:136::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6178.24; Sun, 12 Mar 2023 19:28:59 +0000
Received: from BY5PR17MB3569.namprd17.prod.outlook.com ([fe80::2984:192b:c466:5d0]) by BY5PR17MB3569.namprd17.prod.outlook.com ([fe80::2984:192b:c466:5d0%4]) with mapi id 15.20.6178.024; Sun, 12 Mar 2023 19:28:58 +0000
From: "Peterson, Jon" <jon.peterson@team.neustar>
To: Roman Danyliw <rdd@cert.org>, The IESG <iesg@ietf.org>
CC: "draft-ietf-stir-messaging@ietf.org" <draft-ietf-stir-messaging@ietf.org>, "stir-chairs@ietf.org" <stir-chairs@ietf.org>, "stir@ietf.org" <stir@ietf.org>, "ben@nostrum.com" <ben@nostrum.com>
Thread-Topic: [stir] Roman Danyliw's Discuss on draft-ietf-stir-messaging-06: (with DISCUSS and COMMENT)
Thread-Index: AQHY/uR6nHq0879qB0KTZ+LP8T8yJ674BiNi
Date: Sun, 12 Mar 2023 19:28:58 +0000
Message-ID: <BY5PR17MB3569ED088874E0B233C16063E2B89@BY5PR17MB3569.namprd17.prod.outlook.com>
References: <166917101616.19946.1476951083329713038@ietfa.amsl.com>
In-Reply-To: <166917101616.19946.1476951083329713038@ietfa.amsl.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: BY5PR17MB3569:EE_|DS0PR17MB6376:EE_
x-ms-office365-filtering-correlation-id: 3e3d67ae-37ee-452e-cefb-08db233006cb
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BY5PR17MB3569.namprd17.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230025)(4636009)(396003)(136003)(346002)(376002)(366004)(39850400004)(451199018)(9686003)(186003)(6506007)(26005)(52536014)(66899018)(83380400001)(9326002)(8936002)(38070700005)(38100700002)(5660300002)(966005)(66446008)(66476007)(91956017)(66556008)(55016003)(64756008)(33656002)(4326008)(8676002)(7696005)(2906002)(76116006)(166002)(71200400001)(66946007)(41300700001)(122000001)(316002)(478600001)(110136005)(86362001)(54906003)(46492015); DIR:OUT; SFP:1102;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_BY5PR17MB3569ED088874E0B233C16063E2B89BY5PR17MB3569namp_"
X-OriginatorOrg: team.neustar
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: BY5PR17MB3569.namprd17.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3e3d67ae-37ee-452e-cefb-08db233006cb
X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Mar 2023 19:28:58.2167 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 73a2bbc1-f307-47c4-8f94-5f379c68bc30
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: nYvMI3HxPiK0hHllCLWYmauXl6OQbA8RgBDuo0IcZVMjFT0tVAb8jOpQCZvEiRKCvBdtXgeaOXd3QMTfsc7ike/wdyIo6TbN2DeKxjHhKyc=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DS0PR17MB6376
X-Proofpoint-ORIG-GUID: M9S4Wacxobcg4frKrq4yau7av7bSBd-N
X-Proofpoint-GUID: M9S4Wacxobcg4frKrq4yau7av7bSBd-N
MIME-Version: 1.0
X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.254,Aquarius:18.0.942,Hydra:6.0.573,FMLib:17.11.170.22 definitions=2023-03-12_06,2023-03-10_01,2023-02-09_01
X-Proofpoint-Spam-Details: rule=outbound_notspam policy=outbound score=0 malwarescore=0 priorityscore=1501 adultscore=0 impostorscore=0 bulkscore=0 lowpriorityscore=0 clxscore=1011 mlxlogscore=999 phishscore=0 spamscore=0 mlxscore=0 suspectscore=0 classifier=spam adjust=0 reason=mlx scancount=2 engine=8.12.0-2212070000 definitions=main-2303120169
Archived-At: <https://mailarchive.ietf.org/arch/msg/stir/vihHkjckKDHTPNFdCC18g_eHPe0>
Subject: Re: [stir] Roman Danyliw's Discuss on draft-ietf-stir-messaging-06: (with DISCUSS and COMMENT)
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/stir/>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 12 Mar 2023 19:29:42 -0000

Hi Roman,

Thanks for these notes, you have some good catches here. There’s a new version of the i-D with fixes detailed below.



----------------------------------------------------------------------
DISCUSS:
----------------------------------------------------------------------

** Section 3.2.  The format of the msgi claim is defined by a single example.
Is the format ‘{“sha256”,”sha384”,”sha512”} <hyphen> <hex encoded hash>’?
Please specify it more formally.

Okay, I added some text.


** Section 4.
   Thus any store-and-forward messaging
   system relying on PASSporTs must take into account the possibility
   that the certificate that signed the PASSporT, though valid at the
   time the PASSporT was generated, could expire before a user reads the
   message.  This might require storing some indicator of the validity
   of the signature and certificate at the time the message was
   received, or securely storing the certificate along with the
   PASSporT, so that the "iat" field can be compared the expiry window
   of the certificate prior to validation.

Please correct me here if I am misunderstanding the deployed STIR architecture:

Upfront, this text is not describing on-the-wire protocol behavior, but is anticipating potential implementation environments that differ from the typical deployed STIR architecture, and is therefore just kind of sketching some approaches that might be helpful.

-- Why is the time the user reads the message relevant?  Isn’t the verification
done by either the proxy or UA at the time of receipt (irrespective of when it
is read)?


It would be relevant if, for example, the verification service functions were executed on the user’s endpoint. Not the usual deployed architecture, but also not something I’d rule out.


-- How would the verification process work if the certificate was expired?  As
some short-lived certificates are used instead of revocation, how would a
verifier distinguish that.

I believe the final clause of the second sentence above explains how it would work if the certificate was expired.


-- Who is the guidance of storing additional state directed at – all verifiers?
verification proxies?

At a store-and-forward messaging system, per the stat of the paragraph.



----------------------------------------------------------------------
COMMENT:
----------------------------------------------------------------------

** idnits returned:
  == Unused Reference: 'RFC4474' is defined on line 392, but no explicit
     reference was found in the text

  == Unused Reference: 'RFC7159' is defined on line 398, but no explicit
     reference was found in the text

  == Unused Reference: 'RFC3311' is defined on line 437, but no explicit
     reference was found in the text

  == Unused Reference: 'RFC4916' is defined on line 445, but no explicit
     reference was found in the text

Okay, I cut those.


** Section 3.1.  In the spirit of inclusive language, please rephrase
“man-in-the-middle attacks”.

Used “machine-in-the-middle”.


** Section 3.2.  Please provide a bit more explanation on a “cut-and-paste
attack” either inline or with citation.  Perhaps “A cut-and-paste attack is one
where the Identity header field from a legitimate request for one user is
reused into a request for a different user.” (from RFC8224)

Okay, added.


** Section 3.2.
   The interaction of [RFC8226] STIR certificates with S/
   MIME for messaging applications requires some further explication;
   and additionally,

Where is using STIR certificates with S/MIME explained?

Well, I mean, it’s not, which is what that sentence is trying to say (RFC8591 says that its interaction with STIR is out of scope). Changing this to “would require further specification.”


** Section 3.2.  Editorial.
   In order to differentiate a PASSporT for an individual message from a
   PASSporT used to secure a telephone call or message stream, this
   document defines a new "msg" PASSporT Type

It would be helpful to clarify that the behavior being described here is
extending PASSporT via a “ppt” claim set to “msg”

“ppt” is short for “PASSporT Type”, I’m not sure it is less ambiguous to put it that way…


** Section 3.2.  What is the expected approach for hash algorithm agility?

In the formal description you requested above, I added some text about that (but the short answer is, new spec required).


** Section 3.2.

   Any such environment would require a profile of
   this specification that reduces the scope of protection only to the
   CPIM payload, as discussed in [RFC8946] Section 9.1.

Section 9.1 of RFC8946 doesn’t explain any CPIM mechanism or a way to reduce
the scope of a protection.

Good catch – I meant RFC8591 there. Fixed.


** Section 3.2.
   The
   potential for replay attacks can, however, be largely mitigated by
   the timestamp in PASSporTs; duplicate messages are easily detected,
   and the timestamp can order mesages displayed to the user inbox in a
   way that precludes showing stale messages as fresh.

-- Can the approach by which replay attacks are mitigated be clarified?  It
looks like the text is saying deliver all messages, sort them by timestamp and
by human inspection the “replay attack” is mitigated. -- Typo.
s/mesages/messages/

I think that’s an implementation-specific matter, rather than a protocol matter. That’s why I’m putting it a bit vaguely. I don’t think it’s our job to prescribe the user experience. I’m just trying to suggest what tools the protocol as it stands would offer to implementations.

(typo fixed)


** Section 3.2.  When in the hash conveyed in the msgi claim checked relative
to the verification procedures of Section 6.2 of RFC8224?  What is the expected
error handling if the hash does not match?

Well, what the text says now is that if the PASSporT is being conveyed via SIP in an Identity header, then it is checked by the VS as it would be in RFC8224. If it’s not, but instead conveyed by some out-of-band or store-and-forward system, it’s presumably done at the same time as the verification of the rest of the PASSporT, but I don’t really want to be too prescriptive. Bear in mind that verification is something that more than one entity in a signaling path can perform – you could have an intermediary perform it, say, and then some entity closer to the terminating party do it again.

Broadly, in the SIP context, a 438 “Invalid Identity Header” would be the most appropriate response. I added some text to that effect, but again, it is really up to the local policy of the recipient to determine whether an error is sent in the backwards direction when STIR verification fails (e.g., in some environments, a successful verification results in a “check mark” by the telephone number in the U/X, whereas an unsuccessful verification results in the call still going through but without a check mark – rather than the call being blocked or what have you).


** Section 3.2.  Editorial. In this discussion of messaging, it would be
helpful to clearly state the applicability/scope of the new ppt=”msg”
extension.  I think it intended only for messaged conveyed via SIP via the
MESSAGE method.

No, it’s intended to apply to out of band methods as well.


** Section 3.2.
   In such cases, the expiry timers recommended by
   [RFC8224] may be too strict, as routine behavior might dictate the
   delivery of a MESSAGE minutes or hours after it was sent.

I couldn’t find a use of the term “timer” in RFC8224.  Is this text referring
to Step 4 of Section 6.2 of RFC8224 which notes the need for checking whether a
message meets freshness according to local policy and RECOMMENDS 60 seconds? If
so, please make the language more consistent (and/or provide a reference into
RFC8224).

Changed “timer” to “freshness window”..


** Section 3.2.1.   Editorial. Note that using PASSporT for any protocols other
than SIP is also out of scope (the same way support for MMS with SMTP is out of
scope)

It it the interaction of STIR with DMARC that is out of scope here, not the notion that it is possible to convey a PASSporT to work with MMS, if someone wanted to do so.


** Section 3.2.1. Is the “SMPP” referenced here “Short Message Peer-to-Peer
Protocol”?  Can this be expanded and cited?

Expanded (and a ref added).


** Section 4.  Editorial.
... so that the "iat" field can be compared the expiry window
   of the certificate prior to validation.

There is a missing word here.

Added a “with”.


** Section 8. The second paragraph appears to be commenting on behavior not
described by this document.  Is it needed?


I’m not sure where that rumor got started, but this specification is not SIP-specific, any more than STIR itself is.

Jon Peterson
Neustar (a TransUnion company)


_______________________________________________
stir mailing list
stir@ietf.org
https://urldefense.com/v3/__https://www.ietf.org/mailman/listinfo/stir__;!!N14HnBHF!7p4qMgqK95c6As9xa9-cIxwa6vmdEUTWkRnxZmcSgbLIa1ky_JRHBBeN7F3pHWvrkWukiWWrtm-Sr5JNOfkd5Q$