Doug Bellows – Inteliquent 10/4/2018

Slides:



Advertisements
Similar presentations
LinkSec Architecture Attempt 3
Advertisements

Secure Communication Architectures.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
Chapter 10: Authentication Guide to Computer Network Security.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
DOCUMENT #: GSC15-GTSC8-06 FOR: Presentation SOURCE: ATIS AGENDA ITEM: GTSC8; 4.2 CONTACT(S): Art Reilly ATIS Cybersecurity.
Proposal for device identification PAR. Scope Unique per-device identifiers (DevID) Method or methods for authenticating that device is bound to that.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt Authentication/Authorization for possible deployments Relevant scenarios for CAFE.
M2M Service Layer – DM Server Security Group Name: OMA-BBF-oneM2M Adhoc Source: Timothy Carey, Meeting Date:
Timeline – Standards & Requirements
IPSec Detailed Description and VPN
draft-rescorla-fallback-01
User-group-based Security Policy for Service Layer
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
sip-identity-04 Added new response codes for various conditions
Encryption and Network Security
IP-NNI Joint Task Force Status Update
Cryptography and Network Security
Timeline - ATIS Involvement
Katrin Hoeper Channel Bindings Katrin Hoeper
SECURING NETWORK TRAFFIC WITH IPSEC
1st Draft for Defining IoT (1)
Global Standards Collaboration (GSC) 14
SHAKEN Governance Authority Criteria
OmniRAN Introduction and Way Forward
Virtual Private Networks (VPN)
ATIS Cybersecurity DOCUMENT #: GSC13-GTSC6-12 FOR: Presentation
Global Standards Collaboration (GSC) GSC-15
Chris Wendt, David Hancock (Comcast)
Timeline - ATIS Involvement
IP-NNI Joint Task Force Status Update
Seraphim : A Security Architecture for Active Networks
Verstat Related Best Practices
Cryptography and Network Security
VPNs and IPSec Review VPN concepts Encryption IPSec Lab.
Security in ebXML Messaging
NAAS 2.0 Features and Enhancements
Maryna Komarova (ENST)
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Goals Introduce the Windows Server 2003 family of operating systems
draft-ipdvb-sec-01.txt ULE Security Requirements
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
HIMSS National Conference New Orleans Convention Center
SOA in Action Chapter 10 B. Ramamurthy 1/16/2019.
SHAKEN & Know Your Customer
IEEE 802 Scope of OmniRAN Abstract
IP Interconnection Profile
IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx
SIP RPH Signing Use Cases
OmniRAN Introduction and Way Forward
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Unit 8 Network Security.
Protection Mechanisms in Security Management
Doug Bellows – Inteliquent 3/18/2019
Cryptography and Network Security
TDR authentication requirements
SHAKEN for Presented to: Ericsson Contact:
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Certificates DRAFT
Enterprise Use Cases and A-Level Attestation
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Enterprise Certificates
draft-ietf-stir-oob-02 Out of Band
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
Presentation transcript:

Doug Bellows – Inteliquent 10/4/2018 Draft Attestation and Origination Identifier Framework Technical Report Doug Bellows – Inteliquent 10/4/2018

Draft Attestation and origination ID Framework TR – Contribution IPNNI-2018-00106R000 Adapted from UNI Security Whitepaper Short security analysis of SHAKEN Introduces models for use of SHAKEN in relation to UNI and NNI interfaces Proposed guidelines for attestation population Proposed guidelines for origid population Use cases for attestation in various UNI/NNI scenarios

SHAKEN security services Identifies/Authenticates originating service provider Protect integrity of call parameters Identity header with cryptographic signature and PKI certificates provide both services UNI security is outside the SHAKEN mechanisms

UNI Security Model

UNI Security Model Three applicable security services: Customer/user identity User authentication User-to-TN authorization UNI security has components in the administrative plane and services plane – may also rely on network/transport-layer services

UNI Security Model Per SHAKEN definitions, attestation values rely on application of first two services (value “B”) or all three services (value “A”) “Customer/user” is the direct customer of the SP and not necessarily the end user (reseller/VASP call scenarios). UNI is the interface between the SP and the customer.

NNI Model

Populating Identity header for calls received at an NNI For calls originated by a customer to an SP within the trust domain (e.g. U.S. service providers), Identity header should be populated by the carrier hosting the UNI Some scenarios do not fall into this category, e.g. international gateways Identity headers should be passed as-is across the NNI to and from transit carriers and to terminating carriers. Within the trust domain, calls may arrive at an intermediate NNI without an Identity header (e.g. TDM interfaces, non-SHAKEN-capable SPs). Populating Identity by the intermediate SP may aid traceback but provides less information than population by the originating SP. Assume no direct knowledge of customer/user identity/authentication/authorization, so no attestation values that rely on these services

Origination Identifier Guidelines Origid guidelines re-factor the text in SHAKEN – origid based on UNI or NNI interface characteristics as opposed to an attestation level determined later NNI – origid should be a reference at the granularity of the peer SP or peer SBC/IBCF UNI – granularity depends on the characteristics of the interface and user: If the SP controls calling TN marking (network marking or TN filtering), origid reference may be at a granularity other than UNI or customer (e.g. access network or region) as might be useful for the SP to locate the source. If the customer controls calling TN marking, origid reference should be at the granularity of customer or UNI Privacy concerns – origid is an opaque value outside the originating SP. If tied permanently to a personal/small business UNI it could reveal information on calling patterns not immediately obvious based on calling TN alone. Possibly origid for an individual/small business UNI should not be a permanent reference (e.g. it persists for <24 hours or the length of a SIP registration to drive analytics).

UNI/NNI Use Cases - Customer/TN Identity Direct individual assignment Customer/TN ID may be interchangable Prepaid account Customer may not be strongly identified Enterprise Multiple TNs per customer, possibly multiple SPs Communication reseller TNs assigned to reseller or end user, end users are known only to reseller Value-added service provider Calls may be originated by end user or by VASP, TNs may be assigned to either

UNI/NNI Use Cases – Customer/user authentication Device Device-resident credentials/SIM, cryptographic transaction, other factors Account User-provided credentials (e.g. username/password), SIP registration, other factors Network IP address whitelist, VPN, dedicated connections

UNI/NNI Use Cases – Calling TN authorization/screening SP marking Direct assignment Contract relationship “Letter of Authorization” Independent authorization check Indirect No validation

UNI/NNI Example Use Cases End user Customer/ Inter- connecting entity TN assigned to TN assigned by Identity established by Authentication type Authorization established by Attestation result Mobile subscriber Same as end user Subscriber Originating SP Customer name/address/credit checks Device Direct assignment A Enterprise PBX Enterprise customer Other SP Customer ID/pre-shared key, IP network ACL Letter of Authorization Individual or enterprise VASP Customer name/address/credit checks, end-user traced through customer Customer ID/IP network ACL Direct assignment, terms of use (customer responsible for end use) Non-domestic entity Gateway provider Non- domestic provider/not determined Not determined (gateway provider not the originating SP) Network interconnection Not determined C Reseller Terms of use A or B based on terms enforcement …