Re: [stir] current draft charter

Michael Hammer <michael.hammer@yaanatech.com> Mon, 17 June 2013 20:15 UTC

Return-Path: <michael.hammer@yaanatech.com>
X-Original-To: stir@ietfa.amsl.com
Delivered-To: stir@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 54D5A21F9476 for <stir@ietfa.amsl.com>; Mon, 17 Jun 2013 13:15:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.572
X-Spam-Level:
X-Spam-Status: No, score=-2.572 tagged_above=-999 required=5 tests=[AWL=0.027, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id nUhpezKnkTJH for <stir@ietfa.amsl.com>; Mon, 17 Jun 2013 13:15:34 -0700 (PDT)
Received: from email1.corp.yaanatech.com (email1.corp.yaanatech.com [205.140.198.134]) by ietfa.amsl.com (Postfix) with ESMTP id 7FEE121F938E for <stir@ietf.org>; Mon, 17 Jun 2013 13:15:34 -0700 (PDT)
Received: from EX2K10MB2.corp.yaanatech.com ([fe80::5d11:66a1:e508:6871]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Mon, 17 Jun 2013 13:15:34 -0700
From: Michael Hammer <michael.hammer@yaanatech.com>
To: "york@isoc.org" <york@isoc.org>, "hadriel.kaplan@oracle.com" <hadriel.kaplan@oracle.com>
Thread-Topic: [stir] current draft charter
Thread-Index: AQHOZwiVGT8OWD09JUqSfli80C7Gm5kxxKUAgAAL0QCAAIQGAIAAcu6AgAADDoCAABCAAIAAJmCAgAAQaYCAAADrAIAABUwAgABko4CAAOCpgIAAU3yAgAA76wCABBp2gIAAEOyAgABhfICAAHK0AIAAY22A///AmdCAAIsegP//l1vAgAB4+4D//4/xgAASmQ6AAA4e9lA=
Date: Mon, 17 Jun 2013 20:15:33 +0000
Message-ID: <00C069FD01E0324C9FFCADF539701DB3A03DDD4A@ex2k10mb2.corp.yaanatech.com>
References: <00C069FD01E0324C9FFCADF539701DB3A03DD801@ex2k10mb2.corp.yaanatech.com> <CDE4C972.E47B%york@isoc.org>
In-Reply-To: <CDE4C972.E47B%york@isoc.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
x-originating-ip: [10.17.100.180]
Content-Type: multipart/signed; micalg="SHA1"; protocol="application/x-pkcs7-signature"; boundary="----=_NextPart_000_0469_01CE6B75.E3F2D110"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "richard@shockey.us" <richard@shockey.us>
Subject: Re: [stir] current draft charter
X-BeenThere: stir@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Secure Telephone Identity Revisited <stir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/stir>, <mailto:stir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/stir>
List-Post: <mailto:stir@ietf.org>
List-Help: <mailto:stir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/stir>, <mailto:stir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Jun 2013 20:15:38 -0000

Thanks for that clarification.

The crux still seems to be the linking of a domain node to an E.164
delegation node point.
So, DNSSEC would require ENUM style domain structure to some level.
Note, that will lead to the usual root wars.
Possible, but likely need to get everyone on the same tree.

Mike


-----Original Message-----
From: Dan York [mailto:york@isoc.org] 
Sent: Monday, June 17, 2013 3:55 PM
To: Michael Hammer; hadriel.kaplan@oracle.com
Cc: stir@ietf.org; richard@shockey.us
Subject: Re: [stir] current draft charter

Mike,


On 6/17/13 2:05 PM, "Michael Hammer" <michael.hammer@yaanatech.com> wrote:

>But, clarify one thing for me.  Does DNSSEC ensure both:
>-  that the uploading of information is authentic,

DNSSEC ensures that the information the recipient is retrieving from DNS is
the same information that was put into DNS by the entity operating the DNS
servers for that domain (and signing the records).  It provides an integrity
check on the data received in a DNS query.

It can make no assertions about the quality or authenticity of the data that
was uploaded into the DNS servers.  All it can say is that the data you are
receiving matches the data that was served by the DNS servers (based on the
cryptographic signatures).  If an attacker compromised the DNS servers,
including the ability to generate DNSSEC signatures, he or she would be able
to upload bogus data - but if this happens there are probably larger issues
for the operator of the servers to worry about.

In the STIR example, if we were to use DNS we would need to assume a certain
level of trust in the entities putting the phone numbers and corresponding
identities into the DNS.  As you mentioned this is probably the CC numbering
authority in many/most cases.

>-  attempts to read the data actually get to that secure entry?

DNSSEC has a concept of a "global chain of trust" that links the individual
records and their signatures up to an ultimate trust anchor, which, in the
case of public DNSSEC would be the root of the DNS.
Essentially, you have a DNSKEY record with your public key.  There is then a
Delegation Signer (DS) record in the parent zone that is a hash of the
DNSKEY[1]. This continues on up to the TLDs and to the root.

If STIR were to use DNS/DNSSEC, the entity (server, IP-PBX, SBC, endpoint,
whatever) performing the DNSSEC validation for the call would know that it
was reaching the secure entry because:

1. the info for the telephone number identifier (cert, text record,
whatever) would be cryptographically signed by the zone's public key
(carried in the matching RRSIG record).

2. the entity would be able to use the DS records to walk back up the global
chain of trust to be sure that it was using the correct key for validation.

If either of these cases failed (a bad (or nonexistent) signature or an
inability to verify the chain of trust), the entity performing validation
would know that it had probably NOT been able to get to that secure entry.

Note that this assumes that DNSSEC would *always* be used so that a
nonexistent signature would also cause a warning.

Dan


[1] And yes, I'm simplifying this a bit for the purpose of illustration.
Those who want more gory details can see RFC 6781 -
http://tools.ietf.org/html/rfc6781

--
Dan York
Senior Content Strategist, Internet Society york@isoc.org  +1-802-735-1624
Jabber: york@jabber.isoc.org
Skype: danyork   http://twitter.com/danyork

http://www.internetsociety.org/deploy360/