RFC PASSporT Construction 6.2 Verifier Behavior

Slides:



Advertisements
Similar presentations
NJAIRE Claim Determination Form Training. Purpose of training Reinforce expectations of member company claim reporting Identify common errors made in.
Advertisements

Web Services and the Semantic Web: Open Discussion Session Diana Geangalau Ryan Layfield.
PPA 502 – Program Evaluation Lecture 5b – Collecting Data from Agency Records.
Identity in SIP (and in-band) STIR BoF Berlin, DE 7/30/2013.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
1 A Path Forward on Identity Agreement on a problem space –We all agree that E.164 numbers don’t work well with RFC4474 –Less agreement about the requirements.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
Secure Credential Manager Claes Nilsson - Sony Ericsson
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Alec Brusilovsky, Zhibi Wang Alcatel-Lucent, July 24, 2007.
SIP working group IETF#70 Essential corrections Keith Drage.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
1 IETF 88 (Vancouver) November 6, 2013 Cullen Jennings V3.
All Rights Reserved © Alcatel-Lucent 2006, ##### 2G IMS CAVE Based Security Replay Protection Zhibi Wang January, 2007.
Fall 2006CS 395: Computer Security1 Key Management.
Stir-cnam STIR WG / IETF 95 Buenos Aires, Apr 2016 Jon.
Soapbox (S-Series) Certificate Validation Jens Jensen, STFC.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
TAG Presentation 18th May 2004 Paul Butler
Timeline – Standards & Requirements
Session 5 – Questionnaire Checklists
Authenticated Identity
draft-rescorla-fallback-01
OGSA-WG Basic Profile Session #1 Security
STIR WG / IETF 94 Yokohama, Nov 2015 Jon
Timeline - ATIS Involvement
Cryptography and Network Security
TAG Presentation 18th May 2004 Paul Butler
Improving Security of Real-time Communications
Outline What does the OS protect? Authentication for operating systems
Control system network security issues and recommendations
Radius, LDAP, Radius used in Authenticating Users
SHAKEN Governance Authority Criteria
STIR WG / IETF 97 Seoul, Nov 2016 Jon
Chris Wendt, David Hancock (Comcast)
Outline What does the OS protect? Authentication for operating systems
Timeline - ATIS Involvement
Fragmentation issues in IPv4/IPv6 translation
Proposed ATIS Standard for Signing of SIP RPH
Verstat Related Best Practices
Analysis of Use of Separate Identity Header for SIP RPH Signing
RFC PASSporT Construction 6.2 Verifier Behavior
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
RFC PASSporT Construction 6.2 Verifier Behavior
IETF 101 (London) STIR WG Mar2018
SIP RPH and TN Signing Cross Relationship
STIR WG IETF-100 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-01) November, 2017 Ray P. Singh, Martin Dolly, Subir Das,
TN-PoP Scenarios Jim McEachern Principal Technologist ATIS August 2018.
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Change Proposals for SHAKEN Documents
SIP RPH Signing Use Cases
STIR WG IETF-102 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-06) July 18, 2018 Ray P. Singh, Martin Dolly, Subir Das, and.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
RFC Verifier Behavior Step 4: Check the Freshness of Date
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
Proposal for Change/Improvments in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Security Principles and Policies CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Doug Bellows – Inteliquent 3/18/2019
Rifaat Shekh-Yusef IETF105, OAuth WG, Montreal, Canada 26 July 2019
BPSec: AD Review Comments and Responses
SHAKEN for Presented to: Ericsson Contact:
Calling Party Identity
Proposed Changes to STI-VS "iat" freshness check
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
draft-ietf-stir-oob-02 Out of Band
IETF 103 (กรุงเทพฯ) STIR WG Nov 2018
IETF 102 (Montreal) STIR WG Jul 2018
Presentation transcript:

iat content based on PASSporT issuance time Conflict Analysis against RFC8224 / ATIS-1000074

RFC8224 4.1 PASSporT Construction 6.2 Verifier Behavior Third, the JSON key "iat" MUST appear. The authentication service SHOULD set the value of "iat" to an encoding of the value of the SIP Date header field as a JSON NumericDate (as UNIX time, per [RFC7519], Section 2), though an authentication service MAY set the value of "iat" to its own current clock time. If the authentication service uses its own clock time, then the use of the full form of PASSporT is REQUIRED. In either case, the authentication service MUST NOT generate a PASSporT for a SIP request if the Date header is outside of its local policy for freshness (sixty seconds is RECOMMENDED). Using local clock time as “iat” content is allowed if full form is used 6.2 Verifier Behavior Step 4: Check the Freshness of Date The verifier furthermore ensures that the value of the Date header field of the request meets local policy for freshness (sixty seconds is RECOMMENDED) and that it falls within the validity period of the credential used to sign the Identity header field. For more on the attacks this prevents, see Section 12.1. If the full form of the PASSporT is present, the verifier SHOULD compare the "iat" value in the PASSporT to the Date header field value in the request. If the two are different, and the "iat" value differs from the Date header field value but remains within verification service policy for freshness, the verification service SHOULD perform the computation required by Step 5, using the "iat" value instead of the Date header field value. For full form, “iat”, Date header content being different is allowed That “iat” passes freshness check is sufficient

ATIS-1000074 5.3.1 PASSporT & Identity Header Verification The verifier validates that the PASSporT token provided in the Identity header of the INVITE includes all of the baseline claims, as well as the SHAKEN extension claims. The verifier shall also follow the draft-ietf-stirrfc4474bis-defined verification procedures to check the corresponding date, originating identity (i.e., the originating telephone number) and destination identities (i.e., the terminating telephone numbers). Follows RFC8224, no new mandates regarding date check 5.3.3 Use of the Full Form of PASSporT Draft-ietf-stir-rfc4474bis supports the use of both full and compact forms of the PASSporT token in the Identity header. The full form of the PASSporT token shall be used to avoid any potential SIP network element interaction with headers, in particular the Date header field, which could lead to large numbers of 438 (‘Invalid Identity Header’) errors being generated. Use of full form mandated

Freshness Check during Authentication RFC8224 4.1 PASSPorT Construction Third, the JSON key "iat" MUST appear. The authentication service SHOULD set the value of "iat" to an encoding of the value of the SIP Date header field as a JSON NumericDate (as UNIX time, per [RFC7519], Section 2), though an authentication service MAY set the value of "iat" to its own current clock time. If the authentication service uses its own clock time, then the use of the full form of PASSporT is REQUIRED. In either case, the authentication service MUST NOT generate a PASSporT for a SIP request if the Date header is outside of its local policy for freshness (sixty seconds is RECOMMENDED). Authentication Service = CSCF + STI-AS Date header check, where? RFC8224 is agnostic to ATIS split of functionality and therefore any functionality expected by Authentication Service can be implemented - at least theoretically – either in CSCF or in STI-AS. I would think that anything related with session semantics/network deployment model/services should be responsibility of CSCF and STI-AS should be mainly dealing with generating the signature/PASSporT. Freshness check from Authentication Service perspective: Whether Date header is “fresh enough” or not depends on network deployment, at which point signature is to be generated, scenario under consideration and all these are session related IMHO. Some examples: i- Originating Network signing before call egresses to another Operator, announcement/digit collection already happened (the use case I already presented) There is a non-negligible difference between Date and current time but it is legitimate. Freshness check should pass. ii- Intermediary Network signing on behalf of the Originating Network. Originating Network full trusted. Announcement/digit collection happened in Originating Network. There is a non-negligible difference between Date and current time but it is legitimate. Intermediary Network wouldn’t know about announcement/digit collection but it trusts Originating Network. Freshness check should pass. iii- Intermediary Network signing on behalf of the Originating Network. Originating Network somewhat trusted. Announcement/digit collection happened in Originating Network. There is a non-negligible difference between Date and current time but it is legitimate. Intermediary Network wouldn’t know about announcement/digit collection. Based on policy, it decides not to generate a signature. There could be many more variations but the common point is that the decision would require session level policy/knowledge about origin of the call/trust level associated with the origin etc… I don’t think STI-AS should be aware of such concepts. It is not a session control element.

Freshness Check during Authentication What is the purpose? If Date is used for “iat” making sure that it is not stale as otherwise it would be rejected during validation Still problematic as freshness threshold may be different at Verification Service Any reason why it should be done if “iat” is populated with local time of Authentication Service?