Chris Wendt, David Hancock (Comcast)

Slides:



Advertisements
Similar presentations
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-02 David Hancock, Daryl Malas.
Advertisements

Public Key Infrastructure A Quick Look Inside PKI Technology Investigation Center 3/27/2002.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Public Key Management and X.509 Certificates
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
14 May 2002© TrueTrust Ltd1 Privilege Management in X.509(2000) David W Chadwick BSc PhD.
Secure Electronic Transaction (SET)
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Authorization for IoT Group Name: oneM2M SEC WG Source: Francois Ennesser, Gemalto NV Meeting Date: Agenda Item:
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
SIP Interconnect Guidelines draft-hancock-sip-interconnect-guidelines-01 David Hancock, Daryl Malas.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
Timeline – Standards & Requirements
Trust Profiling for Adaptive Trust Negotiation
Public Key Infrastructure (PKI)
STI Interworking with SIP-PBXs
TN Proof-of-Possession and Number Portability
SSL Certificates for Secure Websites
STIR WG / IETF 94 Yokohama, Nov 2015 Jon
Timeline - ATIS Involvement
Trust Anchor Management Problem Statement
Cryptography and Network Security
Outline What does the OS protect? Authentication for operating systems
SHAKEN Governance Authority Criteria
Authentication Applications
Outline What does the OS protect? Authentication for operating systems
Timeline - ATIS Involvement
Proposed ATIS Standard for Signing of SIP RPH
Verstat Related Best Practices
RFC PASSporT Construction 6.2 Verifier Behavior
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
APNIC Trial of Certification of IP Addresses and ASes
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
Doug Bellows – Inteliquent 10/4/2018
Enterprise Scenarios August 2018.
Resource Certificate Profile
Digital Certificates and X.509
SIP RPH and TN Signing Cross Relationship
Intermediate Security Topics in SQL SERver
Chapter 4 Cryptography / Encryption
SHAKEN & Know Your Customer
TN-PoP Scenarios Jim McEachern Principal Technologist ATIS August 2018.
Change Proposals for SHAKEN Documents
SIP RPH Signing Use Cases
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
RFC Verifier Behavior Step 4: Check the Freshness of Date
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
Issuing delegate certs to Customer AF using Cross-Certification
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Doug Bellows – Inteliquent 3/18/2019
Enterprise Structure For Use Case Application of Various Token/Cert Proposals Presented by: Rebekah Johnson.
STIR/Shaken: Mitigating Illegal Robocalling and Caller ID Scams
STIR Certificate delegation
SHAKEN for Presented to: Ericsson Contact:
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Certificates DRAFT
Enterprise Use Cases and A-Level Attestation
Proposed Changes to STI-VS "iat" freshness check
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
Enterprise Certificates
Rich Call Data Integrity Mechanism
Remote ATtestation ProcedureS (RATS)
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
Presentation transcript:

Chris Wendt, David Hancock (Comcast) TN Proof-of-Possession Solution Overview Chris Wendt, David Hancock (Comcast) Dec 7, 2017

Review of SHAKEN Procedures

SHAKEN provides full attestation for this use case SHAKEN enables an originating SP to provide full attestation if… Originating SP has a direct authenticated relationship with the customer, and Originating SP has established a verified association with the calling TN For example: SP establishes security relationship with the endpoints of its customers (e.g., using SIP Digest authentication) During call origination, SP knows which TN (in case of phone) or set of TNs (in case of enterprise) the originating customer is authorized to use This provides originating SP with sufficient information to fully attest that calling TN identifies calling customer

SHAKEN certificate scope at SP-level granularity Scope of STI certificate is identified using TN Authorization List extension (defined in draft-ietf-stir-certificates) TN Authorization List identifies the set of TNs that are within the cert’s scope of authority using three different data types ServiceProviderCode identifies the SP that owns the certificate TelephoneNumberRange identifies a range of TNs TelephoneNumber identifies a single TN SHAKEN mandates that STI certificates support only ServiceProviderCode This has the semantics "the scope of this cert is all the TNs owned by this SP” (Here, “owned” means the SP has established a verified association with the TN)

SHAKEN Authentication & Verification Originating SP Terminating SP 5 STI-CR GET STI cert STI-VS STI certificate STI Certificate Issuer: STI-CA TNAuthList ServiceProviderCode Originating SP public key Signature STI-AS 4 verify 2 authenticate Call Control 3 INVITE TN-x Call Control PAI: TN-a; To: TN-x Identity: SHAKEN Passport token, STI cert URL 1 6 INVITE TN-x INVITE TN-x-contact PPI: TN-a; To: TN-x PAI: TN-a, verstat-verified; To: TN-x STI certificate scope mandated by SHAKEN Outgoing Call to TN-x Incoming Call from TN-a ✓ Phone registered for TN-a Phone registered for TN-x

Implications of SP-level certificates Using SP-level certs means that … Verification services cannot explicitly verify that calling TN belongs to the certificate owner Therefore, verification services must assume that the originating SP holding certificate will fully attest only calling TNs that it "owns" This is a reasonable assumption, since the verification service knows that the originating SP is an STI-authorized provider in good standing An originating SP has a strong incentive not to break this trust, since… Doing so would negatively affect its reputation, and Could result in loss of STI accreditation

Telephone Number Proof-of-Possession

TN-PoP enables support of full attestation for additional use cases How to support full attestation when customer obtains TNs from multiple providers? Per SHAKEN, the originating SP cannot provide full attestation if it doesn’t own the calling TN Use cases include… Multi-homed PBX originates call via one SP from a calling TN obtained from another SP Enterprise originates call via host SP from a calling toll-free number obtained from a RespOrg Legitimate spoofing service delivers calling user’s work TN for calls originated from user’s home phone Automatic outbound dialing service originates call via host SP using calling TN owned by another SP (e.g. school outbound calling service announces snow-day closings display school’s TN) TN Proof-of-Possession enables support of full attestation for all these cases

TN-PoP Introduces two new roles Telephone Number Provider: An entity that is authoritative for a set of telephone numbers, and that can delegate a subset of those telephone numbers to another entity Examples include STI-authorized telephone service providers, RespOrgs, and 3rd-party TN providers Customer Application Function: A non-STI-authorized entity that purchases (or otherwise obtains) delegated telephone numbers from a Telephone Number Provider. Examples include an Enterprise PBX, a legitimate spoofing application, or an automated outbound dialing service.

TN-PoP Solution Overview At service startup time: TN Provider delegates a subset of its TNs to Customer AF TN Provider delivers PoP certificate with scope that covers delegated TNs to Customer AF At call origination time: Customer AF uses PoP certificate to provide PoP authentication service with full attestation for calling TN Identity header containing PoP PASSporT token is carried end-to-end in INVITE request from Customer AF to terminating network Terminating SP performs PoP verification

PoP Certificate Management Procedure STI-CA STI-CA Root Certificate Issuer: STI-CA STI-CA public key Signature STI CA certificate 3) Request PoP certificate 4) Deliver PoP certificate Telephone Number Provider 5) Store PoP cert STI-CR Certificate path 2) Request PoP certificate for delegated TNs 0) Delegate TNs 6) Deliver PoP certificate Customer Application Function PoP Certificate Issuer: STI-CA TNAuthList TN Provider SPC TNs delegated from TN Provider Customer AF public key Signature 1) Generate public/private key pair PoP certificate Certificate scope at TN level SKS Private key

PoP Authentication and Verification TN Provider Terminating SP STI-CR 5 GET PoP cert PoP-VS PoP certificate PoP Certificate Issuer: STI-CA TNAuthList TN Provider SPC TNs delegated from TN Provider Customer AF public key Signature Originating SP 4 Call Control 3 INVITE TN-x Call Control PAI: TN-a; To: TN-x Identity: PoP Passport token, PoP cert URL 2 INVITE TN-x PAI: TN-a; To: TN-x Identity: PoP PASSporT token, PoP cert URL 6 INVITE TN-x-contact A Customer AF that has obtained TNs from multiple TN Providers will have multiple PoP certs; one for each set of delegated TNs. During PoP authentication at (1), the Customer AF must select the PoP cert whose scope covers the calling TN. PAI: TN-a, verstat-verified; To: TN-x Incoming Call from TN-a ✓ 1 Call Control PoP-AS SKS Private key Customer Application Function Phone registered for TN-x

PoP certificates PoP certificates must have TN-level authorization scope TN Authorization List identifies set of TNs delegated by TN Provider to Customer AF using TelephoneNumberRange and TelephoneNumber data types Reason for TN-level PoP certificates Customer AF is a non-STI entity Therefore, PoP verification service can’t assume Customer AF will fully attest only its delegated TNs TN-level certificates enable PoP verification service to explicitly check that calling TN is authorized by certificate

PoP PASSporT Token TN PoP authentication must construct a PoP PASSporT token PoP PASSporT token contains base PASSporT claims plus "origid" claim Reason for PASSporT extension Verification service uses "ppt"="tn-pop" as trigger to perform PoP verification, including additional step to validate that calling TN is in-scope of PoP certificate Customer AF can optionally use "origid" claim to record originating port No need for "attest" claim, since, by definition, PoP PASSporT tokens imply full attestation

Carrying PoP Identity header end-to-end Why not have originating SP replace validated PoP Identity header with SHAKEN Identity header with full attestation? Two reasons: Originating SP isn’t responsible for the delegation of TNs from TN provider to customer AF, and therefore its reputation should not be negatively impacted if something goes wrong. An SP should only be required provide full SHAKEN attestation for calling TNs that it owns – requiring it to do anything beyond that is outside the spirit of SHAKEN. If a problem is detected post-verification, then we want to identify the TN provider so it can revoke the PoP certificate that was used. Carrying the PoP Identity header end-to-end provides the post-verification trace-back procedure with the information needed to easily identify the TN provider.

General TN-PoP Requirements When a TN provider delegates a subset of its TNs to a Customer AF, it may optionally provide a PoP certificate for the delegated TNs A TN provider must ensure that the scope of a PoP certificate provided to a Customer AF covers only the TNs that it has delegated to the Customer AF When renewing a PoP certificate, the TN provider must ensure that the scope of the new PoP certificate identifies the set of TNs currently delegated to the Customer AF When originating a call from a delegated TN that is in-scope for one of its PoP certificates, the Customer AF must use the PoP certificate that covers the calling TN to perform PoP authentication An originating SP serving the Customer AF must convey a PoP Identity header received from the Customer AF unchanged toward the terminating network A PoP PASSporT token implicitly indicates "full" attestation (i.e., no need for explicit attestation claim)

Comments/Questions