STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013.

Slides:



Advertisements
Similar presentations
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Advertisements

Policy interoperability in electronic signatures Andreas Mitrakas EESSI International event, Rome, 7 April 2003.
Efficient Public Key Infrastructure Implementation in Wireless Sensor Networks Wireless Communication and Sensor Computing, ICWCSC International.
RPKI and Routing Security ICANN 44 June Today’s Routing Environment is Insecure Routing is built on mutual trust models Routing auditing requires.
An Introduction to Routing Security (and RPKI Tools) Geoff Huston May 2013.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
Identity Standards (Federal Bridge Certification Authority – Certificate Lifecycle) Oct,
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Lecture 23 Internet Authentication Applications
STIR Credentials IETF 88 (Vancouver) Wednesday Session Jon & Hadriel.
Authentication Cristian Solano. Cryptography is the science of using mathematics to encrypt and decrypt data. Public Key Cryptography –Problems with key.
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Resource PKI: Certificate Policy & Certification Practice Statement Dr. Stephen Kent Chief Scientist - Information Security.
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
Resource Certificate Profile SIDR WG Meeting IETF 66, July 2006 draft-ietf-sidr-res-certs-01 Geoff Huston Rob Loomans George Michaelson.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
Identity in SIP (and in-band) STIR BoF Berlin, DE 7/30/2013.
1 IETF VoIP Peering BOF: Input on Inter-domain SIP Requirements for VoIP Peering Jean-François Mulé CableLabs
The Resource Public Key Infrastructure Geoff Huston APNIC.
Digital Certificates Public Key Deception Digital Certificates Certificate Authorities Public Key Infrastructures (PKIs)
Effectively Integrating Information Technology (IT) Security into the Acquisition Process Section 5: Security Controls.
Trust Anchor Management Problem Statement 69 th IETF Trust Anchor Management BOF Carl Wallace.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
Guomin Yang et al. IEEE Transactions on Wireless Communication Vol. 6 No. 9 September
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
MIME Object Security Services (MOSS). Privacy Enhanced Mail (PEM) was the first Internet standard to address security in messages. The MOSS protocol.
SAML Right Here, Right Now Hal Lockhart September 25, 2012.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
Key Management. Session and Interchange Keys  Key management – distribution of cryptographic keys, mechanisms used to bind an identity to a key, and.
IEEE MEDIA INDEPENDENT HANDOVER DCN: MuGM Title: TGd Message Signing Proposal Date Submitted: Presented at IEEE d session.
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
Credentials Roadmap STIR WG IETF 90 (Toronto) Sean Turner
Certificate Credentials STIR WG IETF 91 (Honolulu) Sean Jon.
Page 1 ©1999 InfoGard Laboratories, Inc Centre for Applied Cryptographic Research workshop, Nov. 8, 1999 Third party evaluations of CA cryptographic implementations.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
STIR Problem Statement IETF 88 (Vancouver) Tuesday Session Jon Peterson.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
SAML FTF #4 Workitems Bob Blakley. SAML “SenderVouches” SubjectConfirmation Method: A Proposed Alternative to Bindings 0.5 Proposals.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
Establishing authenticated channels and secure identifiers in ad-hoc networks Authors: B. Sieka and A. D. Kshemkalyani (University of Illinois at Chicago)
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
1 APNIC Trial of Certification of IP Addresses and ASes RIPE October 2005 Geoff Huston.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
User Authentication  fundamental security building block basis of access control & user accountability  is the process of verifying an identity claimed.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
Key Management and Distribution Anand Seetharam CST 312.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
Using Digital Signature with DNS. DNS structure Virtually every application uses the Domain Name System (DNS). DNS database maps: –Name to IP address.
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
Timeline – Standards & Requirements
Timeline - ATIS Involvement
Goals of soBGP Verify the origin of advertisements
SHAKEN Governance Authority Criteria
Chris Wendt, David Hancock (Comcast)
Timeline - ATIS Involvement
Proposed ATIS Standard for Signing of SIP RPH
Verstat Related Best Practices
Jean-François Mulé CableLabs
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
RFC PASSporT Construction 6.2 Verifier Behavior
RFC Verifier Behavior Step 4: Check the Freshness of Date
Chinese wall model in the internet Environment
Doug Bellows – Inteliquent 3/18/2019
Cryptography and Network Security
STIR / SHAKEN for 911 use of SHAKEN 8/7/2019
Presentation transcript:

STIR Charter (discussion) STIR BoF Berlin, DE 7/30/2013

For reference This is a snapshot of the 7/23 charter version Obviously this does not capture any discussion today No need to excessively wordsmith here This is available on the STIR list for your perusal Chairs will ask for hums later, but now let’s chat

Preamble Over the last decade, a growing set of problems have resulted from the lack of security mechanisms for attesting the origins of real-time communications. As with , the claimed source identity of a SIP request is not verified, and this permits unauthorized use of source identities as part of deceptive and coercive activities, such as robocalling (bulk unsolicited commercial communications), vishing (voic hacking, and impersonating banks) and swatting (impersonating callers to emergency services to stimulate unwarranted large scale law enforcement deployments). This working group will define a deployable mechanism that verifies the authorization of the calling party to use a particular telephone number.

Postamble SIP is one of the main VoIP technologies used by parties that want to present an incorrect origin, in this context an origin telephone number. Several previous efforts have tried to secure the origins of SIP communications, including RFC 3325, RFC 4474, and the VIPR working group. To date, however, true validation of the source of SIP calls has not seen any appreciable deployment. Several factors contributed to this lack of success, including: failure of the problem to be seen as critical at the time; lack of any technical means of producing a proof of authority over telephone numbers; misalignment of the mechanisms proposed by RFC 4474 with the complex deployment environment that has emerged for SIP; lack of end-to-end SIP session establishment; and inherent operational problems with a transitive trust model. To make deployment of this solution more likely, consideration must be given to latency, real-time performance, computational overhead, and administrative overhead for the legitimate call source and all verifiers.

The plan (wall o’ text) As its first work item, the working group will specify a SIP header-based authorization mechanism to verify the originator of a SIP session is authorized to use the claimed source telephone number, where the session is established with SIP end to end. This is called an in-band mechanism. The mechanism will use a canonical telephone number representation specified by the working group, including any mappings that might be needed between the SIP header fields and the canonical telephone number representation. The working group will consider choices for protecting identity information and credentials used, but will likely be based on a digital signature mechanism that covers a set of information in the SIP header fields, and verification will employ a credential that contains the public key and is associated with the one or more telephone numbers. In order to be authoritative, credentials used with this mechanism will be derived from existing telephone number assignment and delegation models. That is, when a telephone number or range of telephone numbers is delegated to an entity, relevant credentials will be generated (or modified) to reflect such delegation. The mechanism must allow a telephone number holder to further delegate and revoke use of a telephone number without compromising the global delegation scheme.

Limitations and Warranties The mechanism must allow parties who are not delegated a telephone number, but are authorized by the entity who is delegated the number, to place calls using the identity. After completing the in-band mechanism, the working group will consider session establishment where there are one or more non- SIP hops, most likely using an out-of-band authorization mechanism. However, the in-band and the out-of-band mechanisms should share as much in common as possible, especially the credentials. Expansion of the authorization mechanism to identities using the form is deferred since the main focus of the working group is to develop a solution for telephone numbers.

Disclaimers and Pleasantries The working group will coordinate with the Security Area on credential management. The working group will coordinate with other working groups in the RAI Area regarding signaling through existing deployments. Authentication and authorization of identity is closely linked to privacy, and these security features frequently come at the cost of privacy. This working group is not chartered to mandate the presence of identity in SIP requests, and to the extent feasible it will find privacy-friendly solutions that leak minimal information about calls to third parties.

Inputs (won’t be in the charter) Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks (RFC 3325) Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP) (RFC 4474) Secure Call Origin Identification secure-origin-00http://tools.ietf.org/html/draft-cooper-iab- secure-origin-00 Secure Origin Identification: Problem Statement, Requirements, and Roadmap Authenticated Identity Management in the Session Initiation Protocol (SIP)

Outputs The working group will deliver the following: - A problem statement detailing the deployment environment and situation that motivate work on secure telephone identity - A mechanism document describing the SIP end-to-end with telephone number-based identities -A document describing the credentials required to support telephone number identity authentication -A fallback mechanism to allow out-of-band identity establishment during call setup

Milestones Sep 2013 Submit problem statement for Informational Nov 2013 Submit in-band mechanism for Proposed Standard Feb 2014 Submit credential specification for Proposed Standard Jun 2014 Submit fallback for Proposed Standard