STIR Certificate delegation

Slides:



Advertisements
Similar presentations
Rfc4474bis-01 IETF 89 (London) STIR WG Jon & Cullen.
Advertisements

Extended Validation Models in PKI Alternatives and Implications Marc Branchaud John Linn
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
Review of draft-ietf-sidr-arch-01.txt Steve Kent BBN Technologies.
STIR Credentials IETF 88 (Vancouver) Wednesday Session Jon & Hadriel.
November 1, 2006Sarah Wahl / Graduate Student UCCS1 Public Key Infrastructure By Sarah Wahl.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
Wolfgang Schneider NSI: A Client-Server-Model for PKI Services.
NENA Development Conference | October 2014 | Orlando, Florida Security Certificates Between i3 ESInet’s and FE’s Nate Wilcox Emergicom, LLC Brian Rosen.
Federation Strategy Robert Ricci GENI-FIRE Workshop September 2015.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian.
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Credentials Roadmap STIR WG IETF 90 (Toronto) Sean Turner
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
Public Key Infrastructure (X509 PKI) Presented by : Ali Fanian
IETF63 - enum WG1 ENUM validation architecture & friends Alex Mayrhofer enum.at / 3.4.e164.arpa Bernie Höneisen SWITCH.
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
Leveraging Campus Authentication for Grid Scalability Jim Jokl Marty Humphrey University of Virginia Internet2 Meeting April 2004.
1 IETF 72 SIP WG meeting SIP Identity issues John Elwell et alia.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
1 IETF 88 (Vancouver) November 6, 2013 Cullen Jennings V3.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
X.509 standard and CA’s operation Certificate path validation Dec. 18, C&IS lab. Vo Duc Liem.
Bridge Certification Architecture A Brief Overview by Tim Sigmon May, 2000.
VOMS Attribute Authorities Michael Helm ESnet/LBNL 23 Feb 2007.
Draft-peterson-modern- problems-04 Jon Peterson MODERN WG IETF 95 (Buenos Aires)
29 th EUGridPMA meeting, September 2013, Bucharest AEGIS Certification Authority Dušan Radovanović University of Belgrade Computer Centre.
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
Bootstrapping Key Infrastructures
TAG Presentation 18th May 2004 Paul Butler
Key management issues in PGP
CRLite: A Scalable System for Pushing All TLS Revocations to All Browsers By Kartik Patel.
draft-rescorla-fallback-01
TN Proof-of-Possession and Number Portability
OGF PGI – EDGI Security Use Case and Requirements
DNSSEC Deployment Challenges
STIR WG / IETF 94 Yokohama, Nov 2015 Jon
Timeline - ATIS Involvement
Trust Anchor Management Problem Statement
TAG Presentation 18th May 2004 Paul Butler
Living on the Edge: (Re)focus DNS Efforts on the End-Points
Goals of soBGP Verify the origin of advertisements
SHAKEN Governance Authority Criteria
A user-friendly approach to grid security
Organized by governmental sector (National Institute of information )
Chris Wendt, David Hancock (Comcast)
U.S. Federal e-Authentication Initiative
What’s changed in the Shibboleth 1.2 Origin
RFC PASSporT Construction 6.2 Verifier Behavior
Frameworks for putting KAM into action
Doug Bellows – Inteliquent 10/4/2018
Resource Certificate Profile
SHAKEN & Know Your Customer
Recap At IETF 97 we presented the Voucher document for the first time as an ANIMA draft Bootstrapping Design team has met weekly since, about 50% discussion.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
Issuing delegate certs to Customer AF using Cross-Certification
IPNNI SHAKEN Enterprise Models: LEMON TWIST
TG1 Draft Topics Date: Authors: September 2012 Month Year
Doug Bellows – Inteliquent 3/18/2019
BPSec: AD Review Comments and Responses
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Use Cases and A-Level Attestation
Proposed Changes to STI-VS "iat" freshness check
Calling Party Identity
Rich Call Data Integrity Mechanism
draft-ietf-stir-oob-02 Out of Band
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
Presentation transcript:

STIR Certificate delegation IETF 105 STIR WG Jon - Montreal - Jul 2019

draft-ietf-stir-cert-delegation-00 Specification sets out to explain: how delegation of RFC8226 certificates works how AS/VS deal with certificate chains interaction with ACME It’s short, hopefully doesn’t need to be much longer Supports a number of enterprise use cases Also meaningful for some OTT/CPaaS providers End users? Maybe someday, not current focus

Why are we talking about this? Sometimes, outbound calls will not transit the AS of the carrier who owns the calling party number Common case is enterprises who use LCR for outbound calls across multiple providers Some “legitimate spoofing” cases do this too Motivation: push credentials from TN owners to an AS able to sign for the call Alternative: let outbound carriers sign even though they don’t own the number If we just allow carriers to sign for any number, what’s the point of STIR? Enables traceback, which is a good start, but real-time authorization/blocking is the direction of the industry

SPCs and TNs Early deployment is based on SPCs Specifically, OCN-level certs Some non-carrier entities probably should have SPCs Assigned complex, non-contiguous and large set of TNs Carriers in all but name (and regulation) But many enterprises have simple, stable TN blocks Or even just want to sign calls from a single dial-out number Delegation from SPCs to TNs requires understanding when a TN range is “encompassed” by an SPC But that’s something verifiers need to understand about SPCs anyway when a call from a TN arrives The real question is when is “encompassing” checked: when certs are issued, or during call processing at the VS?

To CA or not CA? Setting the CA bit to “true” enables X.509 delegation We’ve added this to the ACME “atc” mechanism for STIR This means we’re dealing with certificate chains Though, if the same CA is issuing a carrier’s SPC cert and the delegated enterprise cert, possible to collapse We may also have cross-certification to consolidate credentials and permissions There are alternatives if we can’t set the CA bit A STIR variant of draft-ietf-tls-subcerts Workaround for PKI environments where you can only get EE certs Basically, a pseudo-cert with a narrower scope

Smaller questions x5u vs. x5c There is a JWT way to do certificate chains Are we too locked-in to x5u? Setting a flag for “encompassed” validation in certs? Yes, it is a sort of “good bit” But CAs are kind of in the business of validating names when CP/CPS includes some formal requirement Note that this is auditable offline, which is handy Interaction with ACME STAR Lots of work on short-term delegation around that, some may be reusable for our ACME interfaces

Next Steps Resolve issues, advance Pressing need for solutions in the marketplace

Delegation & Authority Delegation built-in to certificates RFC5280 describes path construction and path validation STIR uses SKID/AKID delegation A root authority assigns certificates to number assignees Could contain OCNs or TNs/blocks Assignees then delegate individual TNs or blocks to enterprises Authentication Service signs with delegate certificate Verification Service does path validation Root Authority OCNs / 10,000 TNs CSP 100 TNs 1 TN Enterprise Block Enterprise Single