[VIPR] Minutes for 2011/10/14 conference call

Marc Petit-Huguenin <petithug@acm.org> Mon, 17 October 2011 15:46 UTC

Return-Path: <petithug@acm.org>
X-Original-To: vipr@ietfa.amsl.com
Delivered-To: vipr@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CB36521F84FD for <vipr@ietfa.amsl.com>; Mon, 17 Oct 2011 08:46:17 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.955
X-Spam-Level:
X-Spam-Status: No, score=-101.955 tagged_above=-999 required=5 tests=[AWL=0.645, BAYES_00=-2.599, NO_RELAYS=-0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WoKWfGJ93v0o for <vipr@ietfa.amsl.com>; Mon, 17 Oct 2011 08:46:15 -0700 (PDT)
Received: from implementers.org (implementers.org [IPv6:2604:3400:dc1:41:216:3eff:fe5b:8240]) by ietfa.amsl.com (Postfix) with ESMTP id A429021F8BAD for <vipr@ietf.org>; Mon, 17 Oct 2011 08:46:15 -0700 (PDT)
Received: from [IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08] (shalmaneser.org [IPv6:2001:470:1f05:616:213:d4ff:fe04:3e08]) (using TLSv1 with cipher AES256-SHA (256/256 bits)) (Client CN "petithug", Issuer "implementers.org" (verified OK)) by implementers.org (Postfix) with ESMTPS id 43ABF2025C for <vipr@ietf.org>; Mon, 17 Oct 2011 15:38:27 +0000 (UTC)
Message-ID: <4E9C4DC4.9080901@acm.org>
Date: Mon, 17 Oct 2011 08:46:12 -0700
From: Marc Petit-Huguenin <petithug@acm.org>
User-Agent: Mozilla/5.0 (X11; U; Linux x86_64; en-US; rv:1.9.2.23) Gecko/20111010 Iceowl/1.0b2 Icedove/3.1.15
MIME-Version: 1.0
To: "vipr@ietf.org" <vipr@ietf.org>
X-Enigmail-Version: 1.1.2
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 7bit
Subject: [VIPR] Minutes for 2011/10/14 conference call
X-BeenThere: vipr@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Verification Involving PSTN Reachability working group <vipr.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/vipr>, <mailto:vipr-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/vipr>
List-Post: <mailto:vipr@ietf.org>
List-Help: <mailto:vipr-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/vipr>, <mailto:vipr-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 17 Oct 2011 15:46:18 -0000

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

VIPR Design Team conference call on Friday October 14th, from 9:05am to 9:50am PST.

o Attendees:
  Daryl Malas
  Hakim Mehmood
  Muthu Arul Mozhi Perumal
  Jon Peterson
  Marc Petit-Huguenin
  Michael Procter
  Dean Willis

o Regrets:
  Mary Barnes
  John Ward

o Agenda

- - Replacement ticket by client certificate (10 min)
- - PVP method priority and registration (10 min)
- - PVP privacy (10 min)
- - PVP method entropy (10 min)
- - Ticket renewal (10 min)
- - Infrastructure overlays (5 min)

o Action items

- - Add template for IANA registration for PVP methods, with priority.
- - Work on new method inverting the selector with the secret.
- - Send an email in the list detailing the entropy solutions (client-side vs
server-side).

o Minutes

- - Replacement ticket by client certificate

Marc: The goal of this meeting is to discuss items that are not discussed in the
mailing-list, and as there is good discussions on the mailing-list about this
item, I propose to skip it for this conference call.

- - PVP method priority and registration

Marc: There is currently two PVP methods defined in the draft: method "a' which
use the caller and callee number, and method "b" which uses the callee number
and the time in the middle of the call.  But there is more methods that can be
used (fingerprint, DTMF, SMS, etc...).  The first part of the proposal is to
establish a IANA registry for new methods and to assign a priority to each
method.  The second part of the proposal is to advertize the methods supported
by the PVP server in the RELOAD database, to accelerate the validation process.
 The third part of the proposal is to move the PVP algorithm into -framework and
to keep only the description of the methods in -pvp.

Hakim: So the proposal is to put the priority of the methods for PVP.

Marc: I was proposing to put only the list of methods supported.  I am not sure
it is interesting to put also the priority in the RELOAD database.

Hakim: OK, its just a list of methods supported for this particular resource.

Marc: Yes, and this should not be an issue for security.

Jon: It would matter if one method was weaker than another and a domain was
claiming it prefers it.

Marc: That's a good reason to not put the priority in the RELOAD database.

Jon: From an administrative point view, you do not have to move out the current
methods to provide a template.  Also how an implementation knows if Caller-ID is
going to work or not?  That maybe specific to the method, so can you really say
at the registry level that a method will work or not?

Marc: If a domain will never ever receive the Caller-ID, then it should not
advertize method "a".  But if there is a chance that method "a" succeed, then it
should advertize.

Jon: So anything that could work, you will ask to try it.

Marc: Yes, but the advantage is that methods we are absolutely sure that will
not work, like SMS on a non mobile connection, can be excluded.  If you have no
access to the audio stream, then a method using fingerprint can also be excluded.

Jon: OK, there is language that can capture that.

Marc: And what about priority in the IANA registry?

Hakim: That's fine.

Jon: The more methods we have, the more an attacker will be able to choose the
weakest.  So I think that what it will come down to what we think our
requirements a method has to meet to validate.  Until we understand that, it
will be tough to say that all these methods are secure.

Marc: In the framework document, I will list exactly what should be in the
document defining a method.

- - PVP privacy

The problem, reported by Michael Procter, is that the Caller-ID is send in clear
in method "a".  I proposed three additional definitions, to make the discussion
on this topic easier.  The PVP selector, which is sent in clear, is used to
select the call record on the server side. In method "a" the selector is the
called number and the Caller-ID, in method "b", it is the called number and the
time in the middle of the call.  The PVP parameters are a set of parameters that
are also sent in clear, for example the rounding value for "a" and "b".  The PVP
secret is what is verified, and cannot be discovered if the verification fails.
 For the two methods, it is the beginning and end of the audio call. The privacy
problem here is that someone can register a phone number and knows who is
calling this phone number.  There was a discussion on the mailing between
Michael and Cullen Jennings, where the idea was to hash the phone numbers. But
perhaps that instead of fixing methods "a" and "b" we should just create new
methods.  So a first new method is to use the same than "a", but hashing with
something like bcrypt.  A second new method would be to invert the selector and
the secret.

Hakim: If I understand correctly, the problem here is that someone can learn who
calls.

Marc: Yes

Jon: Hashing is a speed bump, but I suspect not worth enough to do it.  The idea
of inverting the secret with the selector is interesting.  I agree that the call
start and stop is not sufficiently unique and it has the property that the more
people are using VIPR the more likely there will be collision.  But it can be
combined with part of the numbers, i.e. area code or area code and prefixes that
are longer.

Hakim: Method "a" is more secure than method "b", but method "b" is not exposing
the Caller-ID at all, so domains that have concerns over privacy simply do not
advertize method "a".

Marc: The problem is that method "b" probably does not have enough entropy.

Hakim: Yes, it does circumvent to some extend the security concerns.

Marc: So do we want to fix the two methods, or keep them as they are and define
new methods?

Hakim: Invent new methods.

Jon: The problem is that if we invent new things that are less secure, then
people will use them.

Hakim: I do not disagree with that.

Marc: True, but "b" is already not very secure.  We cannot make something less
secure than "b", and we can simply say that we cannot have a method less secure
than "b".

Jon: Let's figure how secure "b" is first.  If we find that "b" is unacceptable,
then we may not want to do that.

Michael: We need to understand what the tradeoff are between have enough entropy
for a reliable call identification compared to leaking too much information.

Marc: I am personally on working on new methods and put explanations on the
security section of the current methods saying, do not use this.

- - PVP method entropy

Marc: Method "b" provides less entropy than method "a", which itself provides
less entropy than the future methods.  The idea is to accumulate entropy, so a
domain can require more than one validation before sending back a route and a
ticket.  Instead of sending back a route and ticket, the server sends back a
temporary ticket that contains the entropy accumulated, which is sent during the
next attempt at validation.  It fits well with what we talked before, priority,
and the fact that some methods have less security than other.  We can put in the
IANA registry the entropy that a specific method would accumulate.

Jon: I do not understand the way entropy is calculated but someone should figure
out if that actually works.

Marc: But is it a direction we want to go to?

Jon: The goal of VIPR is to reduce as much as possible the number of calls to
the PSTN, so something that would require more of those is undesirable.  We need
to evaluate what we get in return.  Is there alternative that accomplish the
same thing?  We can use probe calls during off hours.  If we decide to do this,
we really need to decide what the goals are.

Marc: The goal is to make method "b" better than what it is, because it is will
the best that some domains will be able to do.  I not would like to exclude
method "b" because it would exclude a lot of domains from VIPR.

Jon: Do we have a sense of how many people are excluded by this today?

Marc: This is all the cases where we do not have the Caller-ID.

Jon: How many things that we think will participate in VIPR have PRI?

Hakim: The problem is not necessarily not having access to Caller-ID, but how
enterprise domains send Caller-IDs that are the Caller-Id of the enterprise
versus the calling entity.

Jon: But for VIPR purpose it still works.

Hakim: No it does not because it would create an issue when you match the ticket.

Jon: What I am asking is about the 80/20 rule.  Does it happen 20% of the time,
1% of the time or 0.1% of the time?

Hakim: It's in the 20%.

Dean: The majority of PBXs send their trunk number, so we are talking about how
many PBXs versus SOHO devices.

Jon: If it's 20% we need to do something, if it's 1% we should do something, if
it's less than 1%, I do not care.

Hakim: For sure it's not 1%, but somewhere close.

Michael: For people that are making international calls, like videocalls to
grandma, then using the CLI will fail more often than it succeeds.

Daryl: Good point.

Michael: If you are talking of calls between enterprises, then yes Caller-Id
will work most of the time.

Jon: I am not really sure that this is for grandmas, because things for grandmas
do not have this property that VIPR has.  But point taken about the
international call issues.

Marc: One thing I would like to add is that we are not reducing the user
experience, because the 3 calls are at the beginning.  So doing this is
acceptable.  What is unacceptable would be to switch back to PSTN after having
video.

Jon: I do think that it is a problem.  It's not unacceptable, but it's
undesirable. It's not just video, it's wideband audio, it's presence, and it's
our job here to find the quickest way to enable this.  And if the way is to have
3 PSTN calls, it's definitively undesirable.

Hakim: I agree.  It's the #1 complaint I see today.  That it takes 24 hours, all
these things.

Marc:  I agree that we need to design methods that does this faster. But we
still need to have a bottom line which is method "b" because this is how we will
have many people in the overlay.  We should not require an SS7 connection to
participate in VIPR.

Marc: We need to decide if we want to talk about entropy or not at all.

Hakim: Is it possible to keep the guidance here, and let the implementers decide?

Marc: We still need a way to manage the entropy.  It can be a PVP server side
thing, where the server keeps a log of all the calls.  Or it can be done on the
PVP client side, in which case we have to define what is exchanged.

Hakim:  My preference would be server-side.

Marc: My preference is client side.

Jon: We need to think more about what we need to accomplish.

Dean: Post the question on the mailing-list.

Marc:  OK, I'll do that.

- -- 
Marc Petit-Huguenin
Personal email: marc@petit-huguenin.org
Professional email: petithug@acm.org
Blog: http://blog.marc.petit-huguenin.org
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.11 (GNU/Linux)

iEYEARECAAYFAk6cTbgACgkQ9RoMZyVa61d1GwCfZdYZAScs6i5RddfNN54JVidQ
HnUAn3i+Dg4F62dEaPyziwUTV5F5V69+
=XiDY
-----END PGP SIGNATURE-----