SOURCE IDENTITY (ORIGIN AUTHENTICATION) Henning Schulzrinne May 31, 2013 draft-peterson-secure-origin-ps-00.

Slides:



Advertisements
Similar presentations
Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
Advertisements

1 IP Telephony (VoIP) CSI4118 Fall Introduction (1) A recent application of Internet technology – Voice over IP (VoIP): Transmission of voice.
Signaling: SIP SIP is one of Many ITU H.323 Originally for video conferencing The first standard protocol for VoIP Still in wide usage, but negative.
© 2004 AT&T, All Rights Reserved. The world’s networking company SM An Evolution Path for Numbering and Interconnection Future Of Numbering Symposium November.
1 Network Architecture and Design Advanced Issues in Internet Protocol (IP) IPv4 Network Address Translation (NAT) IPV6 IP Security (IPsec) Mobile IP IP.
Session Initiation Protocol Winelfred G. Pasamba.
VoIP Technology Developments and Trends Henning Schulzrinne Columbia University.
CSc 461/561 CSc 461/561 Multimedia Systems Part C: 2. SIP.
SIP, Session Initiation Protocol Internet Draft, IETF, RFC 2543.
An Introduction to SIP Moshe Sambol Services Research Lab November 18, 1998.
Internet Telephony Helen J. Wang Network Reading Group, Jan 27, 99 Acknowledgement: Jimmy, Bhaskar.
Numbering Update HENNING SCHULZRINNE JUNE 4, 2015.
Introduction to SIP Speaker: Min-Hua Yang Advisor: Ho-Ting Wu Date:2005/3/29.
PREVENTING CALLERID SPOOFING Henning Schulzrinne FCC draft-peterson-secure-origin-ps-00.
Membership and Media Management in Centralized Multimedia Conferences based on Internet Engineering Task Force Protocol Building Blocks Author: Ritu Mittal.
Session Initialization Protocol (SIP)
Via contains the address at which the originator is expecting to receive responses to this request. Mandatory To contains a display name and a SIP URI.
Transitioning the PSTN to IP
Identity in SIP (and in-band) STIR BoF Berlin, DE 7/30/2013.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
1 SIP WG meeting 73rd IETF - Minneapolis, MN, USA November, 2008 Return Routability Check draft-kuthan-sip-derive-00 Jiri
caller ID spoofing – technical challenges & Standards
© 2008 AT&T Knowledge Ventures. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Knowledge Ventures. 1 Video Relay Service and Assignment.
ENUM? “ Telephone Number Mapping (ENUM or Enum, from TElephone NUmber Mapping) is a suite of protocols to unify the telephone numbering system E.164 with.
PSTN – User ENUM – „Infrastructure ENUM“ An ETSI View Richard Stastny IETF60 San Diego.
1 Kommunikatsiooniteenuste arendus IRT0080 Loeng 4 Avo Ots telekommunikatsiooni õppetool, TTÜ raadio- ja sidetehnika inst.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
B2BUA – A New Type of SIP Server Name: Stephen Cipolli Title: System Architect Date: Feb. 12, 2004.
© Copyright 2007 Arbinet-thexchange, Inc. All Rights Reserved. Voice Peering Steve Heap Chief Technology Officer.
Slide 1 Nicklas Beijar - TRIP, ENUM and Number Portability TRIP, ENUM and Number Portability Nicklas Beijar
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.
NO-CALL LAW ENFORCEMENT SUMMIT Technology Update: The Future of Call Blocking and Caller ID Authentication Henning Schulzrinne – FCC & Columbia University.
© 2004 AT&T, All Rights Reserved. The world’s networking company SM VoIP, Portability, and the Evolution of Addressing LNPA & Future of Numbering Working.
1 ENUM’s Role in VoIP IP Telephony Conference & Expo Miami February 12, 2004 Sheri Jenkinson VeriSign Communication Services Product Manager - ENUM
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
Credentials Roadmap STIR WG IETF 90 (Toronto) Sean Turner
Presented By Team Netgeeks SIP Session Initiation Protocol.
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
November 2005IETF64 - ECRIT1 Emergency Service Identifiers draft-ietf-sipping-sos-01 draft-schulzrinne-sipping-service-01 Henning Schulzrinne Columbia.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
SOURCE IDENTITY (ORIGIN AUTHENTICATION) Henning Schulzrinne August 2013 draft-peterson-secure-origin-ps-01 + mailing list discussion.
Slide 1 Nicklas Beijar - TRIP, ENUM and Number Portability TRIP, ENUM and Number Portability Nicklas Beijar
Session Initiation Protocol (SIP) Chapter 5 speaker : Wenping Zhang data :
1 IETF 72 SIP WG meeting SIP Identity issues John Elwell et alia.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
Security fundamentals Topic 5 Using a Public Key Infrastructure.
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
SIP Security Issues : The SIP Authentication Procedure and its Processing Load Speaker: Lin-Yi Wu Advisor : Prof. Yi-Bing Lin Date : 2003/04/09.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
The Session Initiation Protocol - SIP
S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN Antti Keurulainen,
SOSIMPLE: A Serverless, Standards- based, P2P SIP Communication System David A. Bryan and Bruce B. Lowekamp College of William and Mary Cullen Jennings.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
1Security for Service Providers – Dave Gladwin – Newport Networks – SIP ’04 – 22-Jan-04 Security for Service Providers Protecting Service Infrastructure.
SIP AAI a possibility for TF-EMC2 and TF-ECS cooperation
IP Telephony (VoIP).
TN Proof-of-Possession and Number Portability
Session Initiation Protocol
Session Initiation Protocol (SIP)
Chris Wendt, David Hancock (Comcast)
Jean-François Mulé CableLabs
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Henning Schulzrinne Columbia University
IoT identifiers.
Technology assistance
Doug Bellows – Inteliquent 3/18/2019
Enterprise Use Cases and A-Level Attestation
Enterprise Use Cases and A-Level Attestation
Presentation transcript:

SOURCE IDENTITY (ORIGIN AUTHENTICATION) Henning Schulzrinne May 31, 2013 draft-peterson-secure-origin-ps-00

PropertyURL owned URL provider E.164Service- specific e m www.facebook.co m/alice.example Protocol- independent no yes Multimedia yes maybe (VRS)maybe Portable yesnosomewhatno Groups yes bridge number not generally Trademark issues yesunlikely possible Privacy Depends on name chosen (pseudonym) Depends on naming scheme mostlyDepends on provider “real name” policy 2 Communication identifiers

Easily available on (SIP) trunks US Caller ID Act of 2009: Prohibit any person or entity from transmitting misleading or inaccurate caller ID information with the intent to defraud, cause harm, or wrongfully obtain anything of value. Also: FCC phantom traffic rules 3 Caller ID spoofing

Two modes of caller ID spoofing Impersonation spoof target number Helpful for vishing stolen credit card validation retrieving voic messages SWATting disconnect utilities unwanted pizza deliveries retrieving display name (CNAM) Anonymization pick more-or-less random # including unassigned numbers Helpful for robocalling intercarrier compensation fraud TDOS 4

Robocalling 5

Legitimate caller ID spoofing Doctor’s office call from personal physician cell phone should show doctor’s office number Call center airline outbound contract call center should show airline main number, not call center Multiple devices, one number provide single call-back number (e.g., Google Voice) from all devices 6 anonymity is distinct problem (caller ID suppression)

Spoofing & robocall investigations Destination number and time “who called N at T?” Use CDRs by iteration “who did you receive call N/T from?” each iteration requires legal subpoena limited CDR retention time single call may traverse 5+ hops some providers may be located abroad  may not respond to US subpoena  create standard provider trace mechanism across SBCs possibly signed helpful even if only helpful providers add trace not each proxy hop, just logical hops Trace: urn:ocn:7679 Trace: urn:itad:318 7

Operator identifiers OCN (Operating Company Number) assigned by NECA ($250) requires proof of status example: AT&T DC = 7679 ITAD (TRIP IP Telephony Administrative Domain (ITAD) Numbers) assigned by IANA (FCFS, $0) example: Columbia University = 318 ICC (ITU Carrier Codes) – M.1400 assigned by ITU via national registrar example: Deutsche Telekom = DTAG 8

Goals: Interconnection models 9 VoIP SS7 Internet signaling out-of-band validation cannot be modified CNAM textual caller ID lookup

Evil caller vs. man-in-the-middle Evil caller spoof source identity currently, the dominant problem Man-in-the-middle modify call signaling primarily, for media intercept copy for later replay more plausible on end system 10

Requirements E.164 number source authenticity Complete solution (but not necessarily one mechanism) number assignment to validation validate caller ID extended caller information (e.g., EV?) Functionality must work without human intervention at caller or callee minimal must survive SBCs must allow partial authorized & revocable delegation doctor’s office third-party call center for airline must allow number portability among carriers (that sign) 11

Requirements Privacy e.g., third parties cannot discover what numbers the callee has dialed recently Efficiency minimal expansion of SIP headers (= suitable for UDP) caching of certs Simplicity minimize overall complexity incremental deployment 12

Non-goals Validate other identifiers might or might not translate (assignment hierarchy) Cross-national calls from +234 codes are not a major problem (right now) Content (media) protection or integrity  SRTP 13

P-Asserted-Identity (RFC 3325) RFC 3325 assumptions: originating end systems cannot alter SIP headers (or intermediate entities can be trusted to remove PAI headers) trusted chain of providers 14 P-Asserted-Identity: "Cullen Jennings" P-Asserted-Identity: tel:

RFC 4474 (SIP Identity) 15 INVITE SIP/2.0 Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds8 To: Bob From: Alice ;tag= Call-ID: a84b4c76e66710 CSeq: INVITE Max-Forwards: 70 Date: Thu, 21 Feb :02:03 GMT Contact: Identity: “KVhPKbfU/pryhVn9Yc6U=“ Identity-Info: ;alg=rsa-sha1 Content-Type: application/sdp Content-Length: 147 v=0 o=UserA IN IP4 pc33.atlanta.example.com s=Session SDP … changed by SBC

Problems with RFC 4474 see rosenberg-sip-rfc4474-concerns Cannot identify assignee of telephone number Intermediate entity re-signs request B2BUAs re-originate call request replace everything except method, From & To (if lucky) 16

VIPR concerns Uses PSTN for reachability validation “own” number  proof of previous PSTN call (start/stop time, …) First call via PSTN doesn’t deal with robocalls “A domain can only call a specific number over SIP, if it had previously called that exact same number over the PSTN.” Single, worldwide P2P network deployment challenging Allows impersonator to find out who called specific number 17 draft-jennings-vipr-overview

Changes in environment Mobile, programmable devices IP connectivity allows (some) end system validation Failure of public ENUM PKI developments, e.g., DANE B2BUA deployment Stickiness of infrastructure SS7 will be with us, unchanged, for decade+ Number assignment certificated carriers  interconnected VoIP providers (trial) geographic assignment (LATA, area code)  non-geographic assignment 1000 blocks  individual assignment? 18

Now: LIDB & CNAM, LERG, LARG, CSARG, NNAG, SRDB, SMS/800 (toll free), do-not-call, … Future: 19 Strawman “Public” PSTN database carrier code or SIP URLs type of service (800, …) owner public key … extensible set of fields multiple interfaces (legacy emulation) multiple providers extensible set of fields multiple interfaces (legacy emulation) multiple providers DB HTTPS e.g., IETF TERQ effort

Goal Validate that originator of call is authorized to use From identifier Maybe goals: ensure integrity of call signaling components 20

Certificate models Integrated with assignment assignment of number includes certificate: “public key X is authorized to use number N” issued by number assignment authority, possibly with delegation chain allocation entity  carrier  end user separate proof of ownership similar to web domain validation e.g., Google voice validation by automated call back “Enter the number you heard” SIP OPTIONS message response? 21

Possible goals Short term? Trace call path by provider Update RFC 4474 (tel:, SBCs) Source validation for SS7 networks Longer term Display name validation Attribute validation Number assignment and delegation 22