STIR WG / IETF 97 Seoul, Nov 2016 Jon

Slides:



Advertisements
Similar presentations
IETF 71 SIPPING WG meeting draft-ietf-sipping-pai-update-00.
Advertisements

Rfc4474bis-01 IETF 89 (London) STIR WG Jon & Cullen.
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
Page 1IETF 65 ENUM WG IETF 65 – ENUM WG IANA Registration for an Enumservice and “tel” Parameter for Calling Name Delivery (CNAM) Information 20 March.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
1 IETF 88 (Vancouver) November 6, 2013 Cullen Jennings V3.
SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan,
Abierman-netconf-mar07 1 NETCONF WG 68 th IETF Prague, CZ March 19, 2007.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential Conveying Policy URI in Call-info purpose Hisham Khartabil Aki Niemi SIP WG.
1/7 Clarification of Privacy Mechanism for SIP draft-munakata-sipping-privacy-clarified-00 Mayumi Munakata (NTT) Shida Schubert (NTT) IETF67 SIPPING 1.
Rfc4474bis-03 IETF 92 (Texas) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed, signer/verifier.
Call Completion using BFCP draft-roach-sipping-callcomp-bfcp IETF 67 – San Diego November 7, 2006.
Stir-cnam STIR WG / IETF 95 Buenos Aires, Apr 2016 Jon.
Henning Schulzrinne IETF 97
PCI-DSS Security Awareness
Telephone Related Queries (TeRQ)
Authenticated Identity
draft-rescorla-fallback-01
sip-identity-04 Added new response codes for various conditions
Encryption and Network Security
STIR WG / IETF 94 Yokohama, Nov 2015 Jon
TeRI and the MODERN Framework
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
Full Page Watermarking
Request History Capability – Requirements & Solution
Improving Security of Real-time Communications
Agenda and Status SIP Working Group
Chris Wendt, David Hancock (Comcast)
SIP Identity issues John Elwell, Jonathan Rosenberg et alia
IETF 64 – ENUM WG IANA Registration for an Enumservice Containing PSTN Signaling Information 8 November 2005 Co-Authors:
Proposed ATIS Standard for Signing of SIP RPH
SIP Resource Priority Henning Schulzrinne/Columbia University
Analysis of Use of Separate Identity Header for SIP RPH Signing
Flemming Andreasen SIP Extensions for Caller Identity and Privacy Flemming Andreasen
RFC PASSporT Construction 6.2 Verifier Behavior
Agenda Warm Up - 8/28/17 Grab a notes page!
draft-ipdvb-sec-01.txt ULE Security Requirements
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
Working Group Draft for TCPCLv4
SIP Resource Priority Henning Schulzrinne/Columbia University
IETF 101 (London) STIR WG Mar2018
SIP RPH and TN Signing Cross Relationship
STIR WG IETF-100 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-01) November, 2017 Ray P. Singh, Martin Dolly, Subir Das,
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Change Proposals for SHAKEN Documents
Shibboleth and uApprove at University of Michigan
SIP RPH Signing Use Cases
STIR WG IETF-102 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-06) July 18, 2018 Ray P. Singh, Martin Dolly, Subir Das, and.
RFC Verifier Behavior Step 4: Check the Freshness of Date
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Doug Bellows – Inteliquent 3/18/2019
An MPLS-Based Forwarding Plane for Service Function Chaining
P-Charge-Info P-Charge-Info draft-york-p-charge-info-07
Rifaat Shekh-Yusef IETF105, OAuth WG, Montreal, Canada 26 July 2019
STIR Certificate delegation
BPSec: AD Review Comments and Responses
SHAKEN for Presented to: Ericsson Contact:
Calling Party Identity
Enterprise Certificates DRAFT
Proposed Changes to STI-VS "iat" freshness check
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
Rich Call Data Integrity Mechanism
draft-ietf-stir-oob-02 Out of Band
IETF 103 (กรุงเทพฯ) STIR WG Nov 2018
IETF 102 (Montreal) STIR WG Jul 2018
Presentation transcript:

STIR WG / IETF 97 Seoul, Nov 2016 Jon PASSporT Extensions STIR WG / IETF 97 Seoul, Nov 2016 Jon

Twofold PASSporT extensibility model First, just throwing in new claims For adding claims beyond the bare minimum Any new claims signed in addition to the baseline Requires normal JWS IANA registration procedures for claims Requires full form PASSporT as well Second, “ppt”

Demonstrating extensibility Before we ship rfc4474bis/PASSporT Be nice to know if the extensibility model works Both with and without a “ppt” Added a single claim for display-name “cna” – short for CNAM Captures display-name in SIP in a “nam” subelement Though it is extensible for additional data Also added a claim for diversion information “div” - we’ll talk about that one first

draft-peterson-passport-divert-00 A feature many people have asked about How do we handle retargeting? To header field of SIP is signed by PASSporT Original value may be lost with retargeting We could define a special Identity header track it With its own “ppt” – “div” for “divert” Different from History-Info and Diversion? Yes, as it is signed by the original destination domain Useful for things like SIPBRANDY where integrity protection for retargeting matters

Inverting the usual rule Mandatory extensions let you alter baseline behavior An Identity header with “div” always points to some prior Identity header Though that header may in turn contain a div… Chains back to an original assertion A diverting auth service takes an existing PASSporT, moves the “dest” to “div,” and populates “dest” with the new target Instead of signing for the “orig” value, the auth service for “div signs the “dest”

For an original PASSporT… Header: { "typ":”passport", "alg":”ES256“, "x5u":"https://www.example.com/cert.pkx" } Claims: { ”orig":{“uri”:”alice@example.com”}, ”dest":{“uri”:”firsttarget@example.com”}, "iat": 1443208345 }

“div” with “ppt” Header: Claims: { "typ":”passport", "alg":”ES256“, "ppt":”div“, "x5u":"https://www.example.com/cert.pkx" } Claims: { ”orig":{“uri”:”alice@example.com”}, ”dest":{“uri”:”secondtarget@example.com”}, "iat": 1443208345, “div”:{“uri”:”firsttarget@example.com”} }

draft-peterson-stir-cnam-01 Operates in two modes Without “ppt” This signifies that an originating authentication service provides the caller name Same entity that signs for the originating number With “ppt” This signifies that a third party provides the assertion Different entity than signs for the originating number Signature can come from someone that doesn’t own the TN Different Identity header field as well

“cna” without “ppt” Header: Claims: { "typ":”passport", "alg":”ES256“, "x5u":"https://www.example.com/cert.pkx" } Claims: { ”orig":{“tn”:"12155551212”}, ”dest":{“tn”:"12155551213”}, "iat": 1443208345, “cna”:{“nam:”Alice Atlanta”} }

“cna” with “ppt” Header: Claims: { "typ":”passport", "alg":”ES256“, "ppt":”cna“, "x5u":"https://www.example.com/cert.pkx" } Claims: { ”orig":{“tn”:"12155551212”}, ”dest":{“tn”:"12155551213”}, "iat": 1443208345, “cna”:{“nam:”Alice Atlanta”} }

Elaborating on “cna” Possible to add more claims than “nam” in the “can” element Could include information about organizations Maybe some fields in Henning’s Caller-Info parameters Location, potentially Likely be reference rather than by value Other rich data associated with the originating persona Creates an IANA registry allowing allocation of more related elements

Sanity checking So we have some examples of PASSporT extensions Oh yeah, one more – SIPBRANDY “msec” If there’s interest, we could go there Sure, STIR isn’t chartered to do CNAM now… But we have a charter discussion today Crucial now to make sure people understand extensibility for STIR If we’re getting it wrong, we’d better fix it soon