STI Interworking with SIP-PBXs

Slides:



Advertisements
Similar presentations
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
Advertisements

SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Zero Touch Provisioning for NETCONF/RESTCONF Call Home draft-ietf-netconf-zerotouch-02 NETCONF WG IETF #92 Dallas, TX, USA.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
1 Key Establishment Symmetric key problem: How do two entities establish shared secret key over network? Solution: trusted key distribution center (KDC)
A Heterogeneous Network Access Service based on PERMIS and SAML Gabriel López Millán University of Murcia EuroPKI Workshop 2005.
Digital Certificates Made Easy Sam Lutgring Director of Informational Technology Services Calhoun Intermediate School District.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
7/6/20061 Speermint Use Case for Cable IETF 66 Yiu L. Lee JULY 2006.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
Extending ISA/IAG beyond the limit. AGAT Security suite - introduction AGAT Security suite is a set of unique components that allow extending ISA / IAG.
Academia Sinica Grid Computing Certification Authority (ASGCCA) Jinny Chien.
Pkiuniversity.com. Alice Bob Honest Abe’s CA Simple PKI hierarchy.
Fall 2006CS 395: Computer Security1 Key Management.
Cryptography and Network Security Chapter 14 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
Host Identifier Revocation in HIP draft-irtf-hiprg-revocation-01 Dacheng Zhang IETF 79.
Digital Certificates Presented by: Matt Weaver. What is a digital certificate? Trusted ID cards in electronic format that bind to a public key; ex. Drivers.
OPS Requirements Specification and Analysis Dustin Larson Bryan Campbell Charles Sears.
Chapter 5 Network Security Protocols in Practice Part I
SFS-HTTP: Securing the Web with Self-Certifying URLs
Secure Proxy ND Support for SEND draft-krishnan-csi-proxy-send-00
TN Proof-of-Possession and Number Portability
Authentication, Authorisation and Security
SSL Certificates for Secure Websites
Digital Signatures Cryptographic technique analogous to hand-written signatures. sender (Bob) digitally signs document, establishing he is document owner/creator.
EDC Process Proposal Brian Brandaw Manager of IT Common Platforms
Practicals on VOMS and MyProxy
Cryptography and Network Security
e-Health Platform End 2 End encryption
CRC exercises Not happy with the way the document for testbed architecture is progressing More a collection of contributions from the mware groups rather.
Grid Security Jinny Chien Academia Sinica Grid Computing.
Chris Wendt, David Hancock (Comcast)
Local MAC Address Protocol
Class 2 Digital Signature Certificate Noida
Verstat Related Best Practices
Reference Architecture and Call Flow Example for SIP RPH Signing
RFC PASSporT Construction 6.2 Verifier Behavior
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Public-Key Certificates
APNIC Trial of Certification of IP Addresses and ASes
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
Enterprise Scenarios August 2018.
Multi-party Authentication in Web Services
Cryptographic Usage Mask
SIP RPH and TN Signing Cross Relationship
Protocol ap1.0: Alice says “I am Alice”
Created by : Ashish Shah, J.M. PATEL COLLEGE OF COMMERCE
TN-PoP Scenarios Jim McEachern Principal Technologist ATIS August 2018.
User to User Key Signaling Protocols
ROA Content Proposal November 2006 Geoff Huston.
RFC Verifier Behavior Step 4: Check the Freshness of Date
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Issuing delegate certs to Customer AF using Cross-Certification
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Advanced Computer Networks
Doug Bellows – Inteliquent 3/18/2019
Hyperledger Fabric 소개 및 튜토리얼
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Use Cases and A-Level Attestation
Proposed Changes to STI-VS "iat" freshness check
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
Presentation transcript:

STI Interworking with SIP-PBXs Chris Wendt (Comcast) David Hancock (CableLabs)

Applying STI to Multi-homed SIP-PBX Service Provider 1 Service Provider 2 3 Service Provider x INVITE TN-x PAI:TN-1; To:TN-x; Date: t Identity: ??? SP-1 TNs SP-2 TNs 2 INVITE TN-x 1 PAI:TN-1; To:TN-x; Date: t Problem Description SP-1 and SP-2 each assign a set of TNs to PBX PBX initiates a call via SP-2 with calling TN belonging to SP-1 SP-2 sends INVITE on to SP-x owner of called TN-x Problem: In step-3, how does SP-2 create Identity signature for a calling TN that it does not own? TN-1 TN-2 TN-3 … TN-a TN-b TN-c … SIP-PBX

One Solution Approach – have PBX sign calling identity Service Provider 1 Service Provider 2 3 Service Provider x INVITE TN-x PAI:TN-1; To:TN-x; Date: t Identity: ppt=shaken attest=full orig/dest/date=1/x/t signature=E(1,x,t) info = SPa-cert-URL  SP-1 TNs SP-2 TNs 1 Solution Description SP-1 and SP-2 allocate TNs to PBX. PBX adds Identity header containing signature of calling TN-1 in INVITE to SP-2. SP-2 verifies received Identity signature, and if valid, it replaces received Identity with new Identity containing SP-a generated signature of calling TN-1. Question: How does PBX generate signature for calling TN? 2 INVITE TN-x PAI:TN-1; To:TN-x; Date: t Identity: TN-1 TN-2 TN-3 … TN-a TN-b TN-c … ppt=shaken attest=full orig/dest/date=1/x/t signature=E(1,x,t) info = Cert-URL  SIP-PBX

Two Solution Options Option-1: Option-2 PBX obtains Identity Identity header from the host SP that owns the calling TN Option-2 PBX generates Identity header using certificate and private key obtained from host SP that owns calling TN

Option-1: PBX obtains Identity Header from SP Public STI Architecture SP hosts a TN signing service that PBX invokes per call. Message Sequence PBX user TN-1 initiates DOD call PBX asks SP-1 to sign calling TN-1 (since SP-1 owns TN-1). SP-1 returns Identity header containing signature for TN-1 PBX includes received Identity header in INVITE to SP-2. SP-2 verifies Identity signature. SP-2 sends INVITE to terminating network, containing either received Identity header, or newly created Identity header. Pros: Leverages already-supported signing functionality of Service Provider Cons: Uses resources of Service Provider (per-call) PA/CA SP-2 SP STI Functions (KMS, SKS, AS, etc.) [5] INVITE Identity: <TN-1> Call Control SP-1 SIP-PBX [2] Sign TN-1 [4] INVITE Identity: <TN-1> [3] Identity <TN-1> [1] Orig call request Call Control

Option-2: PBX generates Identity Header Architecture SP provides an STI Proxy service to PBX Message Sequence PBX user TN-1 initiates DOD call PBX asks PBX STI Function to sign calling TN. PBX STI Function sends certificate request to STI Proxy. STI Proxy returns certificate to PBX STI Function. This cert could be a child of a certificate that SP-1 had previously obtained from the CA. This new child cert could specify PBX-unique attributes, such as the cert lifetime, the set of TNs covered by cert, etc. PBX STI function returns Identity header to Call Control. and 7) Same as option-1; PBX includes received Identity header in INVITE to SP-2, etc. Pros: Avoids use of real-time resources in Service Provider. Cons: Adds STI functionality to PBX Public STI PA/CA SP-1 SP-2 STI Proxy [7] INVITE Identity: <TN-1> Call Control [3] Get Cert [4] <cert> SIP-PBX PBX STI Functions (KMS, SKS, AS, etc.) [6] INVITE Identity: <TN-1> [2] Sign TN-1 [5] Identity <TN-1> [1] Orig call request Call Control