IPNNI SHAKEN Enterprise Models: LEMON TWIST

Slides:



Advertisements
Similar presentations
Internet Protocol Security (IP Sec)
Advertisements

Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter 10 Securing Exchange Server 2003.
Dorian Grid Identity Management and Federation Dialogue Workshop II Edinburgh, Scotland February 9-10, 2006 Stephen Langella Department.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
Proxy Authentication of the Emergency Status of SIP Calls draft-barnes-ecrit-auth-00 Richard Barnes IETF 69, Chicago, IL, USA.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
Java Security Pingping Ma Nov 2 nd, Overview Platform Security Cryptography Authentication and Access Control Public Key Infrastructure (PKI)
Case Study: DirXML Implementation at Waste Management Rick Wagner Systems Engineer Novell, Inc.
Credentials Roadmap STIR WG IETF 90 (Toronto) Sean Turner
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
1. 2 Overview In Exchange security is managed by assigning permissions in Active Directory Exchange objects are secured with DACL and ACEs Permissions.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
1 Public Key Infrastructure Rocky K. C. Chang 6 March 2007.
STI Interworking with SIP-PBXs
TN Proof-of-Possession and Number Portability
BIM 360 Glue Migration to BIM 360 Account Administration (HQ)
Trust Anchor Management Problem Statement
ECRIT Interim: SIP Location Conveyance
Cryptography and Network Security
Goals of soBGP Verify the origin of advertisements
Radius, LDAP, Radius used in Authenticating Users
SHAKEN Governance Authority Criteria
Certificate management Miroslav Dobrucký Institute of Informatics SAS
Public Key Infrastructure (PKI)
Network Services Interface
Chris Wendt, David Hancock (Comcast)
Proposed ATIS Standard for Signing of SIP RPH
Verstat Related Best Practices
NS/EP Service Provider Credential for SIP RPH Signing
RFC PASSporT Construction 6.2 Verifier Behavior
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
APNIC Trial of Certification of IP Addresses and ASes
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
Doug Bellows – Inteliquent 10/4/2018
Enterprise Scenarios August 2018.
Digital Certificates and X.509
SIP RPH and TN Signing Cross Relationship
SHAKEN & Know Your Customer
SharePoint Online Authentication Patterns
TN-PoP Scenarios Jim McEachern Principal Technologist ATIS August 2018.
Change Proposals for SHAKEN Documents
SIP RPH Signing Use Cases
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
RFC Verifier Behavior Step 4: Check the Freshness of Date
SHAKEN Jim McEachern Senior Technology Consultant ATIS December 2017.
Proposal for Change/Improvements in STIR/SHAKEN Technical Report on SHAKEN APIs for a Centralized Signing and Signature Validation Server.
Issuing delegate certs to Customer AF using Cross-Certification
Instructor Materials Chapter 5: Ensuring Integrity
Doug Bellows – Inteliquent 3/18/2019
Enterprise Structure For Use Case Application of Various Token/Cert Proposals Presented by: Rebekah Johnson.
STIR Certificate delegation
SHAKEN for Presented to: Ericsson Contact:
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Certificates DRAFT
Enterprise Use Cases and A-Level Attestation
Proposed Changes to STI-VS "iat" freshness check
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
Enterprise Certificates
Rich Call Data Integrity Mechanism
draft-ietf-stir-oob-02 Out of Band
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
Presentation transcript:

IPNNI SHAKEN Enterprise Models: LEMON TWIST March 18, 2019 Mary Barnes, iconectiv Industry Solutions Email: mbarnes@iconectiv.com CONFIDENTIAL - RESTRICTED ACCESS This document and the confidential information it contains shall be distributed, routed or made available solely to authorized persons having a need to know within iconectiv, except with written permission of iconectiv. Telcordia Technologies, Inc. dba iconectiv.

Terms, Principles and Problem statement TN Provider is the SP who has been assigned the TNs that the Enterprise (aka TN Customer) is using to make outgoing calls Originating SP is the service provider that handles the outgoing calls (aka Connected SP) at the point at which they are entering the PLMN Need to decide requirements for content and semantics of Identity header field and PASSporT (including RCD) generated by the Enterprise at call origination. Need to determine requirements for Originating SP for content and semantics of Identity header field/PASSPorT added to the incoming SIP INVITE. CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Requirements The Originating SP should always authenticate and add an Identity header field: Depending upon level of trust in the TN provider, the Originating SP sets the Attestation to A or B. The calling party identity of the TN customer must be authenticated and authorized by the Originating SP through some means – direct or indirect CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Scenarios and related requirements (1) Originating SP is the TN Provider. Originating SP should sign with an attestation of “A” if it has a trust relationship with the TN Customer. Originating SP may allow a TN Customer provide an Identity header field with an RCD PASSport. Originating SP is not the TN Provider The calling party identity must be authenticated and authorized by the Originating SP through some means – direct or indirect If the originating SP has a trust relationship with the TN customer, it may not require an Identity header field in the INVITE from the TN customer If the originating SP does not have a trust relationship, it should expect an incoming INVITE to contain a SIP Identity header field. If not authenticated then the originating SP should set the attestation to ‘B’ CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Scenarios and related requirements (2) 3. Originating SP is not the TN Provider & Originating SP has no relationship with the TN Customer. SIP INVITE may have passed through one or more intermediaries prior to reaching the Originating SP. The calling party identity must be authenticated and authorized by the Originating SP Should the originating SP expect an incoming INVITE to contain a SIP Identity header field added by the TN customer? If not, then attestation should be set to ‘B’. If there is an Identity header field, the originating SP can authenticate the TN customer’s identity 4. Others? CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Solution Options TN-PoP 2.0 Lemon-Twist (LEveraging MOdels for Enterprise dialiNg - TNauthlist With an enterprise Identity Secured Token) CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

TN PoP 2.0 Model Focus remains scenario 2? Utilizes delegated certificates as described in RFC 8226 and draft-peterson-: Adds cross certificates to the model based on RFC 5280: SP hosts a CA delegated by one of the STI-CAs: Enterprise requests certificate from SP CA Key advantages: Removes the ACME proxy from TN-PoP solution Uses standard PKI functions for delegation Disadvantages: Increases complexity: Additional fields in certificates Additional criteria to be considered and established by the CP/CPS (currently states no cross certificates) More complex certificate path validation at the STI-VS Increases # certificate chains to manage More complex traceback and debugging SP now manages a PKI instance CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

LEveraging MOdels for Enterprise dialiNg (Lemon) - TNs With an enterprise Identity Secured Token (TWIST) (1) Based on Trust Authority model developed for STI-PA: Introduces a Trust Anchor (TA) logical function for supporting SPs Enterprise customers Trust Anchor provides a subset of functionality provided by the STI-PA TA supports API for Authority Token Acquisition A unique identifier is assigned by the SP for the TN Customer: Concatenation of SPC with an additional identifier assigned by the SP SP configures account with the TA with the identifiers SP provides the Enterprise with credentials to obtain an SPC token from the TA, removing SP/TN Provider from any subsequent interactions Input to token generation includes SPC+id and TNs The Trust Anchor may be supported in the STI-PA or by another entity with which the SP has an equivalent trust relationship for managing SP specific accounts and numbering CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

LEveraging MOdels for Enterprise dialiNg (Lemon) – TNs With an enterprise Identity Secured Token (TWIST) (2) Defines a new type of attestation: A’: Implies Full attestation – originating SP has verified the identity that has been authenticated and authorized by another SP in the SHAKEN ecosystem Provides the terminating provider with more comprehensive information about the call, possibly including a unique ‘verstat’ value Originating SP does not need to verify the SIP Identity header field added by the enterprise: Passes the SIP Identity header field as received from the enterprise Originating SP can add an additional SIP Identity header field with attestation ‘A’ depending upon relationship with Enterprise CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

SHAKEN LEMoN TWIST Interfaces Trust Anchor/STI-PA STI Certification Authority Protocol/API Human I/F DataBase I/F SPC Token Cert CRL Authority Token Authority Token Enterprise CRL URL List of CAs Credentials for Authority Token API & URLs for List of STI-CAs Enterprise Account with TNs for each SPC+id Service Provider CONFIDENTIAL - RESTRICTED Access See confidentiality restrictions on title page

Summary – LEMoN TWIST Model is consistent with core SHAKEN: Trust is based on secure token provided by the entity that has been given authority over the TNs Gives enterprises flexibility in choosing an STI-CA Reduces burden on SP’s role in certificate acquisition Doesn’t require more complex certificate delegation model Reduces processing burden on originating SP TN Customer directly interfaces with an STI-CA More transparent – terminating SP recognizes call as being from an authorized user of SP-x’s TNs – consistent with the “What do we know and how do we know it model” Enterprise isn’t relegated behind the SP in the SHAKEN ecosystem No new PKI requirements (no new IETF dependency) Hosting in the STI-PA simplifies SP account management CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Overall Comparison: TN-PoP 2.0 and Lemon Twist SHAKEN Who issues Certificate Delegated CA in SP’s domain Any trusted STI-CA (selected by Enterprise) Any trusted STI-CA (selected by SP) Input for Authority Token acquistion TBD SPC+id, TNs SPC Challenge-response mechanism TN Customer’s Authority token issued by TA (or STI-PA) SP’s Authority token issued by the STI-PA CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Functional Impacts: TN-PoP’ and Lemon Twist New SP functionality (KMS) Delegated CA in SP’s domain Input to trust authority for authority token = SPC+id, TNs Certificate generation (KMS and STI-CA) Requires more complete standardization for delegated certificates for STIR* Same as SHAKEN Challenge-response mechanism (KMS and STI-CA) TBD (see certificate generation) Certificate path validation (STI-VS) More complex due to delegated (cross) certificates** Authentication (STI-AS) None Sets Attestation to A’ * https://www.ietf.org/id/draft-peterson-stir-cert-delegation-00.txt ** https://mailarchive.ietf.org/arch/msg/stir/YVRfILEUu0yZaHMIMc3hIcEQPug: “This can be a bit messy when delegating from SPC to TN ranges, but that messiness probably isn’t avoidable.” CONFIDENTIAL - RESTRICTED Access See confidentiality restricstions on title page

Questions ???