Rich Call Data Integrity Mechanism

Slides:



Advertisements
Similar presentations
Rfc4474bis-01 IETF 89 (London) STIR WG Jon & Cullen.
Advertisements

Digital Signatures and Hash Functions. Digital Signatures.
PROJECT ON DIGITAL SIGNATURE Submitted by: Submitted to: NAME: Roll no: Reg.no. :
Resource Certificate Profile Geoff Huston, George Michaelson, Rob Loomans APNIC IETF 67.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Report on Attribute Certificates By Ganesh Godavari.
IETF OAuth Proof-of-Possession
DICOM INTERNATIONAL DICOM INTERNATIONAL CONFERENCE & SEMINAR April 8-10, 2008 Chengdu, China DICOM Security Eric Pan Agfa HealthCare.
Security Jonathan Calazan December 12, 2005.
Overview of Digital Signatures Introduction To Networks and Communications (CS 555) Presented by Bharath Kongara.
Proxy Authentication of the Emergency Status of SIP Calls draft-barnes-ecrit-auth-00 Richard Barnes IETF 69, Chicago, IL, USA.
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
SMUCSE 5349/49 Security. SMUCSE 5349/7349 Threats Threats to the security of itself –Loss of confidentiality s are sent in clear over.
AQA Computing A2 © Nelson Thornes 2009 Section Unit 3 Section 6.4: Internet Security Digital Signatures and Certificates.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
Secure Electronic Transaction (SET)
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Cryptography Encryption/Decryption Franci Tajnik CISA Franci Tajnik.
©The McGraw-Hill Companies, Inc., 2000© Adapted for use at JMU by Mohamed Aboutabl, 2003Mohamed Aboutabl1 1 Chapter 29 Internet Security.
Security Overview  System protection requirements areas  Types of information protection  Information Architecture dimensions  Public Key Infrastructure.
Certificate Requests to HIP Jani Pellikka 80 th IETF Mar 27 th – Apr 1 st 2011 Prague, Czech Republic.
Electronic signature Validity Model 1. Shell model Certificate 1 Certificate 2 Certificate 3 Signed document Generate valid signature validCheck invalidCheck.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
2/19/2016clicktechsolution.com Security. 2/19/2016clicktechsolution.com Threats Threats to the security of itself –Loss of confidentiality.
BGP L3VPN origin validation (draft-ymbk-l3vpn-origination-02) November 2012.
 Attacks and threats  Security challenge & Solution  Communication Infrastructure  The CA hierarchy  Vehicular Public Key  Certificates.
Timeline – Standards & Requirements
VNF Package Integrity and Authenticity – Public key based
TN Proof-of-Possession and Number Portability
Timeline - ATIS Involvement
Trust Anchor Management Problem Statement
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
Chapter 5: The Art of Ensuring Integrity
STIR WG / IETF 97 Seoul, Nov 2016 Jon
Chris Wendt, David Hancock (Comcast)
Timeline - ATIS Involvement
Proposed ATIS Standard for Signing of SIP RPH
Message Digest Cryptographic checksum One-way function Relevance
NS/EP Service Provider Credential for SIP RPH Signing
Pooja programmer,cse department
RFC PASSporT Construction 6.2 Verifier Behavior
APNIC Trial of Certification of IP Addresses and ASes
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
جايگاه گواهی ديجيتالی در ايران
Resource Certificate Profile
SIP RPH and TN Signing Cross Relationship
STIR WG IETF-100 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-01) November, 2017 Ray P. Singh, Martin Dolly, Subir Das,
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Change Proposals for SHAKEN Documents
Certificate Enrollment Process
ROA Content Proposal November 2006 Geoff Huston.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006
RFC Verifier Behavior Step 4: Check the Freshness of Date
Issuing delegate certs to Customer AF using Cross-Certification
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Instructor Materials Chapter 5: Ensuring Integrity
Doug Bellows – Inteliquent 3/18/2019
Potential L2 security options for UL BCS
Rifaat Shekh-Yusef IETF105, OAuth WG, Montreal, Canada 26 July 2019
STIR Certificate delegation
Calling Party Identity
Enterprise Use Cases and A-Level Attestation
Enterprise Use Cases and A-Level Attestation
Proposed Changes to STI-VS "iat" freshness check
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Calling Party Identity
Toll-Free Number Assignment and Administration – SHAKEN/STIR Delegate Certificates Enterprise Origination Julio Armenta
Presentation transcript:

Rich Call Data Integrity Mechanism

Problem: Malicious TN Customer could use fake or spoof company name/logo/etc. Example use case: TN customer with malicious intent obtains a delegate end-entity cert from its TN Provider TN customer originates call from TN that is in-scope for the delegate cert TNAuthList (i.e., can’t spoof calling number) TN Customer populates "rcd" claim with the company name/logo of a different company. Rich-call-data is rendered to called user with a "green checkmark" We need a mechanism that enables verifiers to detect when a TN customer includes RCD data that it is not authorized to use.

Delegate end-entity cert Solution: Rich Call Data Integrity procedures defined in draft-ietf-stir-passport-rcd Use JWTClaimConstraints to mandate inclusion of new "rcdi" claim that contains digest of "rcd" claim Procedure TN Provider issues certificate to TN Customer containing a JWTClaimConstraints object that mandates inclusion of "rcdi" claim with a specific claim value for all PASSporTs signed by this certificate. RCD Authentication complies with the constraints by including an “rcd” claim with the indicated value. RCD Verification calculates a digest across the “rcd” claim value, and compares it to the “rcdi” value. A mismatch results in a verification failure. TN Provider Subordinate CA Delegate CA Certificate TNAuthList spc: 1234 range: tn-10,100 Delegate CA cert 1) Issue delegate end-entity certificate with JWTClaimConstraints object. Delegate end-entity Certificate TNAuthList spc: 1234 range: tn-20,10 JWTClaimConstraints mustInclude: "rcdi" permittedValues: "sha256-H8BRh…X6xO" TN Customer RCD PASSporT Protected Header { … } Payload { "dest":{tn-x}, "iat":1443208345, "orig":{tn-20}, "rcdi":"sha256-H8BRh…X6xO", "rcd":{"nam": company name, ”icn": <uri to company logo>} Signature Delegate end-entity cert 2) RCD Authentication complies with claims constraint 3) RCD Verification verifies that claims constraints have been met