diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc8816.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc8816.txt')
-rw-r--r-- | doc/rfc/rfc8816.txt | 1328 |
1 files changed, 1328 insertions, 0 deletions
diff --git a/doc/rfc/rfc8816.txt b/doc/rfc/rfc8816.txt new file mode 100644 index 0000000..3675487 --- /dev/null +++ b/doc/rfc/rfc8816.txt @@ -0,0 +1,1328 @@ + + + + +Internet Engineering Task Force (IETF) E. Rescorla +Request for Comments: 8816 Mozilla +Category: Informational J. Peterson +ISSN: 2070-1721 Neustar + February 2021 + + +Secure Telephone Identity Revisited (STIR) Out-of-Band Architecture and + Use Cases + +Abstract + + The Personal Assertion Token (PASSporT) format defines a token that + can be carried by signaling protocols, including SIP, to + cryptographically attest the identity of callers. However, not all + telephone calls use Internet signaling protocols, and some calls use + them for only part of their signaling path, while some cannot + reliably deliver SIP header fields end-to-end. This document + describes use cases that require the delivery of PASSporT objects + outside of the signaling path, and defines architectures and + semantics to provide this functionality. + +Status of This Memo + + This document is not an Internet Standards Track specification; it is + published for informational purposes. + + This document is a product of the Internet Engineering Task Force + (IETF). It represents the consensus of the IETF community. It has + received public review and has been approved for publication by the + Internet Engineering Steering Group (IESG). Not all documents + approved by the IESG are candidates for any level of Internet + Standard; see Section 2 of RFC 7841. + + Information about the current status of this document, any errata, + and how to provide feedback on it may be obtained at + https://www.rfc-editor.org/info/rfc8816. + +Copyright Notice + + Copyright (c) 2021 IETF Trust and the persons identified as the + document authors. All rights reserved. + + This document is subject to BCP 78 and the IETF Trust's Legal + Provisions Relating to IETF Documents + (https://trustee.ietf.org/license-info) in effect on the date of + publication of this document. Please review these documents + carefully, as they describe your rights and restrictions with respect + to this document. Code Components extracted from this document must + include Simplified BSD License text as described in Section 4.e of + the Trust Legal Provisions and are provided without warranty as + described in the Simplified BSD License. + +Table of Contents + + 1. Introduction + 2. Terminology + 3. Operating Environments + 4. Dataflows + 5. Use Cases + 5.1. Case 1: VoIP to PSTN Call + 5.2. Case 2: Two Smart PSTN Endpoints + 5.3. Case 3: PSTN to VoIP Call + 5.4. Case 4: Gateway Out-of-Band + 5.5. Case 5: Enterprise Call Center + 6. Storing and Retrieving PASSporTs + 6.1. Storage + 6.2. Retrieval + 7. Solution Architecture + 7.1. Credentials and Phone Numbers + 7.2. Call Flow + 7.3. Security Analysis + 7.4. Substitution Attacks + 7.5. Rate Control for CPS Storage + 8. Authentication and Verification Service Behavior for + Out-of-Band + 8.1. Authentication Service (AS) + 8.2. Verification Service (VS) + 8.3. Gateway Placement Services + 9. Example HTTPS Interface to the CPS + 10. CPS Discovery + 11. Encryption Key Lookup + 12. IANA Considerations + 13. Privacy Considerations + 14. Security Considerations + 15. Informative References + Acknowledgments + Authors' Addresses + +1. Introduction + + The STIR problem statement [RFC7340] describes widespread problems + enabled by impersonation in the telephone network, including illegal + robocalling, voicemail hacking, and swatting. As telephone services + are increasingly migrating onto the Internet, and using Voice over IP + (VoIP) protocols such as SIP [RFC3261], it is necessary for these + protocols to support stronger identity mechanisms to prevent + impersonation. For example, [RFC8224] defines a SIP Identity header + field capable of carrying PASSporT objects [RFC8225] in SIP as a + means to cryptographically attest that the originator of a telephone + call is authorized to use the calling party number (or, for native + SIP cases, SIP URI) associated with the originator of the call. + + Not all telephone calls use SIP today, however, and even those that + do use SIP do not always carry SIP signaling end-to-end. Calls from + telephone numbers still routinely traverse the Public Switched + Telephone Network (PSTN) at some point. Broadly, calls fall into one + of three categories: + + 1. One or both of the endpoints is actually a PSTN endpoint. + + 2. Both of the endpoints are non-PSTN (SIP, Jingle, etc.) but the + call transits the PSTN at some point. + + 3. Non-PSTN calls that do not transit the PSTN at all (such as + native SIP end-to-end calls). + + The first two categories represent the majority of telephone calls + associated with problems like illegal robocalling: many robocalls + today originate on the Internet but terminate at PSTN endpoints. + However, the core network elements that operate the PSTN are legacy + devices that are unlikely to be upgradable at this point to support + an in-band authentication system. As such, those devices largely + cannot be modified to pass signatures originating on the Internet -- + or indeed any in-band signaling data -- intact. Even if fields for + tunneling arbitrary data can be found in traditional PSTN signaling, + in some cases legacy elements would strip the signatures from those + fields; in others, they might damage them to the point where they + cannot be verified. For those first two categories above, any in- + band authentication scheme does not seem practical in the current + environment. + + While the core network of the PSTN remains fixed, the endpoints of + the telephone network are becoming increasingly programmable and + sophisticated. Landline "plain old telephone service" deployments, + especially in the developed world, are shrinking, and increasingly + being replaced by three classes of intelligent devices: smart phones, + IP Private Branch Exchanges (PBXs), and terminal adapters. All three + are general purpose computers, and typically all three have Internet + access as well as access to the PSTN; they may be used for + residential, mobile, or enterprise telephone services. Additionally, + various kinds of gateways increasingly front for deployments of + legacy PBX and PSTN switches. All of this provides a potential + avenue for building an authentication system that implements stronger + identity while leaving PSTN systems intact. + + This capability also provides an ideal transitional technology while + in-band STIR adoption is ramping up. It permits early adopters to + use the technology even when intervening network elements are not yet + STIR-aware, and through various kinds of gateways, it may allow + providers with a significant PSTN investment to still secure their + calls with STIR. + + The techniques described in this document therefore build on the + PASSporT [RFC8225] mechanism and the work of [RFC8224] to describe a + way that a PASSporT object created in the originating network of a + call can reach the terminating network even when it cannot be carried + end-to-end in-band in the call signaling. This relies on a new + service defined in this document called a Call Placement Service + (CPS) that permits the PASSporT object to be stored during call + processing and retrieved for verification purposes. + + Potential implementors should note that this document merely defines + the operating environments in which this out-of-band STIR mechanism + is intended to operate. It provides use cases, gives a broad + description of the components, and a potential solution architecture. + Various environments may have their own security requirements: a + public deployment of out-of-band STIR faces far greater challenges + than a constrained intra-network deployment. To flesh out the + storage and retrieval of PASSporTs in the CPS within this context, + this document includes a strawman protocol suitable for that purpose. + Deploying this framework in any given environment would require + additional specification outside the scope of this document. + +2. Terminology + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and + "OPTIONAL" in this document are to be interpreted as described in BCP + 14 [RFC2119] [RFC8174] when, and only when, they appear in all + capitals, as shown here. + +3. Operating Environments + + This section describes the environments in which the proposed out-of- + band STIR mechanism is intended to operate. In the simplest setting, + Alice calls Bob, and her call is routed through some set of gateways + and/or the PSTN that do not support end-to-end delivery of STIR. + Both Alice and Bob have smart devices that can access the Internet + (perhaps enterprise devices, or even end-user ones), but they do not + have a clear telephone signaling connection between them: Alice + cannot inject any data into signaling that Bob can read, with the + exception of the asserted destination and origination E.164 numbers. + The calling party number might originate from her own device or from + the network. These numbers are effectively the only data that can be + used for coordination between the endpoints. + + +---------+ + / \ + +--- +---+ + +----------+ / \ +----------+ + | | | Gateways | | | + | Alice |<----->| and/or |<----->| Bob | + | (caller) | | PSTN | | (callee) | + +----------+ \ / +----------+ + +--- +---+ + \ / + +---------+ + + In a more complicated setting, Alice and/or Bob may not have a smart + or programmable device, but instead just a traditional telephone. + However, one or both of them are behind a STIR-aware gateway that can + participate in out-of-band coordination, as shown below: + + +---------+ + / \ + +--- +---+ + +----------+ +--+ / \ +--+ +----------+ + | | | | | Gateways | | | | | + | Alice |<-|GW|->| and/or |<-|GW|->| Bob | + | (caller) | | | | PSTN | | | | (callee) | + +----------+ +--+ \ / +--+ +----------+ + +--- +---+ + \ / + +---------+ + + In such a case, Alice might have an analog (e.g., PSTN) connection to + her gateway or switch that is responsible for her identity. + Similarly, the gateway would verify Alice's identity, generate the + right calling party number information, and provide that number to + Bob using ordinary Plain Old Telephone Service (POTS) mechanisms. + +4. Dataflows + + Because in these operating environments, endpoints cannot pass + cryptographic information to one another directly through signaling, + any solution must involve some rendezvous mechanism to allow + endpoints to communicate. We call this rendezvous service a Call + Placement Service (CPS), a service where a record of call placement, + in this case a PASSporT, can be stored for future retrieval. In + principle, this service could communicate any information, but + minimally we expect it to include a full-form PASSporT that attests + the caller, callee, and the time of the call. The callee can use the + existence of a PASSporT for a given incoming call as rough validation + of the asserted origin of that call. (See Section 11 for limitations + of this design.) + + This architecture does not mandate that any particular sort of entity + operate a CPS or mandate any means to discover a CPS. A CPS could be + run internally within a network or made publicly available. One or + more CPSes could be run by a carrier, as repositories for PASSporTs + for calls sent to its customers, or a CPS could be built into an + enterprise PBX or even a smartphone. To the degree possible, it is + specified here generically as an idea that may have applicability to + a variety of STIR deployments. + + There are roughly two plausible dataflow architectures for the CPS: + + 1. The callee registers with the CPS. When the caller wishes to + place a call to the callee, it sends the PASSporT to the CPS, + which immediately forwards it to the callee. + + 2. The caller stores the PASSporT with the CPS at the time of call + placement. When the callee receives the call, it contacts the + CPS and retrieves the PASSporT. + + While the first architecture is roughly isomorphic to current VoIP + protocols, it shares their drawbacks. Specifically, the callee must + maintain a full-time connection to the CPS to serve as a notification + channel. This comes with the usual networking costs to the callee + and is especially problematic for mobile endpoints. Indeed, if the + endpoints had the capabilities to implement such an architecture, + they could surely just use SIP or some other protocol to set up a + secure session; even if the media were going through the traditional + PSTN, a "shadow" SIP session could convey the PASSporT. Thus, we + focus on the second architecture in which the PSTN incoming call + serves as the notification channel, and the callee can then contact + the CPS to retrieve the PASSporT. In specialized environments, for + example, a call center that receives a large volume of incoming calls + that originated in the PSTN, the notification channel approach might + be viable. + +5. Use Cases + + The following are the motivating use cases for this mechanism. Bear + in mind that, just as in [RFC8224], there may be multiple Identity + header fields in a single SIP INVITE, so there may be multiple + PASSporTs in this out-of-band mechanism associated with a single + call. For example, a SIP user agent might create a PASSporT for a + call with an end-user credential, and as the call exits the + originating administrative domain, the network authentication service + might create its own PASSporT for the same call. As such, these use + cases may overlap in the processing of a single call. + +5.1. Case 1: VoIP to PSTN Call + + A call originates in a SIP environment in a STIR-aware administrative + domain. The local authentication service for that administrative + domain creates a PASSporT that is carried in band in the call per + [RFC8224]. The call is routed out of the originating administrative + domain and reaches a gateway to the PSTN. Eventually, the call will + terminate on a mobile smartphone that supports this out-of-band + mechanism. + + In this use case, the originating authentication service can store + the PASSporT with the appropriate CPS (per the practices of + Section 10) for the target telephone number as a fallback in case SIP + signaling will not reach end-to-end. When the destination mobile + smartphone receives the call over the PSTN, it consults the CPS and + discovers a PASSporT from the originating telephone number waiting + for it. It uses this PASSporT to verify the calling party number. + +5.2. Case 2: Two Smart PSTN Endpoints + + A call originates with an enterprise PBX that has both Internet + access and a built-in gateway to the PSTN, which communicates through + traditional telephone signaling protocols. The PBX immediately + routes the call to the PSTN, but before it does, it provisions a + PASSporT on the CPS associated with the target telephone number. + + After normal PSTN routing, the call lands on a smart mobile handset + that supports the STIR out-of-band mechanism. It queries the + appropriate CPS over the Internet to determine if a call has been + placed to it by a STIR-aware device. It finds the PASSporT + provisioned by the enterprise PBX and uses it to verify the calling + party number. + +5.3. Case 3: PSTN to VoIP Call + + A call originates with an enterprise PBX that has both Internet + access and a built-in gateway to the PSTN. It will immediately route + the call to the PSTN, but before it does, it provisions a PASSporT + with the CPS associated with the target telephone number. However, + it turns out that the call will eventually route through the PSTN to + an Internet gateway, which will translate this into a SIP call and + deliver it to an administrative domain with a STIR verification + service. + + In this case, there are two subcases for how the PASSporT might be + retrieved. In subcase 1, the Internet gateway that receives the call + from the PSTN could query the appropriate CPS to determine if the + original caller created and provisioned a PASSporT for this call. If + so, it can retrieve the PASSporT and, when it creates a SIP INVITE + for this call, add a corresponding Identity header field per + [RFC8224]. When the SIP INVITE reaches the destination + administrative domain, it will be able to verify the PASSporT + normally. Note that to avoid discrepancies with the Date header + field value, only a full-form PASSporT should be used for this + purpose. In subcase 2, the gateway does not retrieve the PASSporT + itself, but instead the verification service at the destination + administrative domain does so. Subcase 1 would perhaps be valuable + for deployments where the destination administrative domain supports + in-band STIR but not out-of-band STIR. + +5.4. Case 4: Gateway Out-of-Band + + A call originates in the SIP world in a STIR-aware administrative + domain. The local authentication service for that administrative + domain creates a PASSporT that is carried in band in the call per + [RFC8224]. The call is routed out of the originating administrative + domain and eventually reaches a gateway to the PSTN. + + In this case, the originating authentication service does not support + the out-of-band mechanism, so instead the gateway to the PSTN + extracts the PASSporT from the SIP request and provisions it to the + CPS. (When the call reaches the gateway to the PSTN, the gateway + might first check the CPS to see if a PASSporT object had already + been provisioned for this call, and only provision a PASSporT if none + is present). + + Ultimately, the call may terminate on the PSTN or be routed back to a + SIP environment. In the former case, perhaps the destination + endpoint queries the CPS to retrieve the PASSporT provisioned by the + first gateway. If the call ultimately returns to a SIP environment, + it might be the gateway from the PSTN back to the Internet that + retrieves the PASSporT from the CPS and attaches it to the new SIP + INVITE it creates, or it might be the terminating administrative + domain's verification service that checks the CPS when an INVITE + arrives with no Identity header field. Either way, the PASSporT can + survive the gap in SIP coverage caused by the PSTN leg of the call. + +5.5. Case 5: Enterprise Call Center + + A call originates from a mobile user, and a STIR authentication + service operated by their carrier creates a PASSporT for the call. + As the carrier forwards the call via SIP, it attaches the PASSporT to + the SIP call with an Identity header field. As a fallback in case + the call will not go end-to-end over SIP, the carrier also stores the + PASSporT in a CPS. + + The call is then routed over SIP for a time, before it transitions to + the PSTN and ultimately is handled by a legacy PBX at a high-volume + call center. The call center supports the out-of-band service, and + has a high-volume interface to a CPS to retrieve PASSporTs for + incoming calls; agents at the call center use a general purpose + computer to manage inbound calls and can receive STIR notifications + through it. When the PASSporT arrives at the CPS, it is sent through + a subscription/notification interface to a system that can correlate + incoming calls with valid PASSporTs. The call center agent sees that + a valid call from the originating number has arrived. + +6. Storing and Retrieving PASSporTs + + The use cases show a variety of entities accessing the CPS to store + and retrieve PASSporTs. The question of how the CPS authorizes the + storage and retrieval of PASSporTs is thus a key design decision in + the architecture. The STIR architecture assumes that service + providers and, in some cases, end-user devices will have credentials + suitable for attesting authority over telephone numbers per + [RFC8226]. These credentials provide the most obvious way that a CPS + can authorize the storage and retrieval of PASSporTs. However, as + use cases 3, 4, and 5 in Section 5 show, it may sometimes make sense + for the entity storing or retrieving PASSporTs to be an intermediary + rather than a device associated with either the originating or + terminating side of a call; those intermediaries often would not have + access to STIR credentials covering the telephone numbers in + question. Requiring authorization based on a credential to store + PASSporTs is therefore undesirable, though potentially acceptable if + sufficient steps are taken to mitigate any privacy risk of leaking + data. + + It is an explicit design goal of this mechanism to minimize the + potential privacy exposure of using a CPS. Ideally, the out-of-band + mechanism should not result in a worse privacy situation than in-band + STIR [RFC8224]: for in-band, we might say that a SIP entity is + authorized to receive a PASSporT if it is an intermediate or final + target of the routing of a SIP request. As the originator of a call + cannot necessarily predict the routing path a call will follow, an + out-of-band mechanism could conceivably even improve on the privacy + story. + + Broadly, the architecture recommended here thus is one focused on + permitting any entity to store encrypted PASSporTs at the CPS, + indexed under the called number. PASSporTs will be encrypted with a + public key associated with the called number, so these PASSporTs may + safely be retrieved by any entity because only holders of the + corresponding private key will be able to decrypt the PASSporT. This + also prevents the CPS itself from learning the contents of PASSporTs, + and thus metadata about calls in progress, which makes the CPS a less + attractive target for pervasive monitoring (see [RFC7258]). As a + first step, transport-level security can provide confidentiality from + eavesdroppers for both the storing and retrieval of PASSporTs. To + bolster the privacy story, to prevent denial-of-service flooding of + the CPS, and to complicate traffic analysis, a few additional + mechanisms are also recommended below. + +6.1. Storage + + There are a few dimensions to authorizing the storage of PASSporTs. + Encrypting PASSporTs prior to storage entails that a CPS has no way + to tell if a PASSporT is valid; it simply conveys encrypted blocks + that it cannot access itself and can make no authorization decision + based on the PASSporT contents. There is certainly no prospect for + the CPS to verify the PASSporTs itself. + + Note that this architecture requires clients that store PASSporTs to + have access to an encryption key associated with the intended called + party to be used to encrypt the PASSporT. Discovering this key + requires the existence of a key lookup service (see Section 11), + depending on how the CPS is architected; however, some kind of key + store or repository could be implemented adjacent to it and perhaps + even incorporated into its operation. Key discovery is made more + complicated by the fact that there can potentially be multiple + entities that have authority over a telephone number: a carrier, a + reseller, an enterprise, and an end user might all have credentials + permitting them to attest that they are allowed to originate calls + from a number, say. PASSporTs for out-of-band use therefore might + need to be encrypted with multiple keys in the hopes that one will be + decipherable by the relying party. + + Again, the most obvious way to authorize storage is to require the + originator to authenticate themselves to the CPS with their STIR + credential. However, since the call is indexed at the CPS under the + called number, this can weaken the privacy story of the architecture, + as it reveals to the CPS both the identity of the caller and the + callee. Moreover, it does not work for the gateway use cases + described above; to support those use cases, we must effectively + allow any entity to store PASSporTs at a CPS. This does not degrade + the anti-impersonation security of STIR, because entities who do not + possess the necessary credentials to sign the PASSporT will not be + able to create PASSporTs that will be treated as valid by verifiers. + In this architecture, it does not matter whether the CPS received a + PASSporT from the authentication service that created it or from an + intermediary gateway downstream in the routing path as in case 4 + above. However, if literally anyone can store PASSporTs in the CPS, + an attacker could easily flood the CPS with millions of bogus + PASSporTs indexed under a calling number, and thereby prevent the + called party from finding a valid PASSporT for an incoming call + buried in a haystack of fake entries. + + The solution architecture must therefore include some sort of traffic + control system to prevent flooding. Preferably, this should not + require authenticating the source, as this will reveal to the CPS + both the source and destination of traffic. A potential solution is + discussed below in Section 7.5. + +6.2. Retrieval + + For retrieval of PASSporTs, this architecture assumes that clients + will contact the CPS through some sort of polling or notification + interface to receive all current PASSporTs for calls destined to a + particular telephone number, or block of numbers. + + As PASSporTs stored at the CPS are encrypted with a key belonging to + the intended destination, the CPS can safely allow anyone to download + PASSporTs for a called number without much fear of compromising + private information about calls in progress -- provided that the CPS + always returns at least one encrypted blob in response to a request, + even if there was no call in progress. Otherwise, entities could + poll the CPS constantly, or eavesdrop on traffic, to learn whether or + not calls were in progress. The CPS MUST generate at least one + unique and plausible encrypted response to all retrieval requests, + and these dummy encrypted PASSporTs MUST NOT be repeated for later + calls. An encryption scheme needs to be carefully chosen to make + messages look indistinguishable from random when encrypted, so that + information about the called party is not discoverable from + legitimate encrypted PASSporTs. + + Because the entity placing a call may discover multiple keys + associated with the called party number, multiple valid PASSporTs may + be stored in the CPS. A particular called party who retrieves + PASSporTs from the CPS may have access to only one of those keys. + Thus, the presence of one or more PASSporTs that the called party + cannot decrypt -- which would be indistinguishable from the "dummy" + PASSporTs created by the CPS when no calls are in progress - does not + entail that there is no call in progress. A retriever likely will + need to decrypt all PASSporTs retrieved from the CPS, and may find + only one that is valid. + + In order to prevent the CPS from learning the numbers that a callee + controls, callees might also request PASSporTs for numbers that they + do not own, that they have no hope of decrypting. Implementations + could even allow a callee to request PASSporTs for a range or prefix + of numbers: a trade-off where that callee is willing to sift through + bulk quantities of undecryptable PASSporTs for the sake of hiding + from the CPS which numbers it controls. + + Note that in out-of-band call forwarding cases, special behavior is + required to manage the relationship between PASSporTs using the + diversion extension [PASSPORT-DIVERT]. The originating + authentication service encrypts the initial PASSporT with the public + encryption key of the intended destination, but once a call is + forwarded, it may go to a destination that does not possess the + corresponding private key and thus could not decrypt the original + PASSporT. This requires the retargeting entity to generate encrypted + PASSporTs that show a secure chain of diversion: a retargeting storer + SHOULD use the "div-o" PASSporT type, with its "opt" extension, as + specified in [PASSPORT-DIVERT], in order to nest the original + PASSporT within the encrypted diversion PASSporT. + +7. Solution Architecture + + In this section, we discuss a high-level architecture for providing + the service described in the previous sections. This discussion is + deliberately sketchy, focusing on broad concepts and skipping over + details. The intent here is merely to provide an overall + architecture, not an implementable specification. A more concrete + example of how this might be specified is given in Section 9. + +7.1. Credentials and Phone Numbers + + We start from the premise of the STIR problem statement [RFC7340] + that phone numbers can be associated with credentials that can be + used to attest ownership of numbers. For purposes of exposition, we + will assume that ownership is associated with the endpoint (e.g., a + smartphone), but it might well be associated with a provider or + gateway acting for the endpoint instead. It might be the case that + multiple entities are able to act for a given number, provided that + they have the appropriate authority. [RFC8226] describes a + credential system suitable for this purpose; the question of how an + entity is determined to have control of a given number is out of + scope for this document. + +7.2. Call Flow + + An overview of the basic calling and verification process is shown + below. In this diagram, we assume that Alice has the number + +1.111.555.1111 and Bob has the number +2.222.555.2222. + + Alice Call Placement Service Bob + -------------------------------------------------------------------- + + Store Encrypted PASSporT for 2.222.555.2222 -> + + Call from 1.111.555.1111 ------------------------------------------> + + + <-------------- Request PASSporT(s) + for 2.222.555.2222 + + Obtain Encrypted PASSporT --------> + (2.222.555.2222, 1.111.555.1111) + + [Ring phone with verified callerid + = 1.111.555.1111] + + When Alice wishes to make a call to Bob, she contacts the CPS and + stores an encrypted PASSporT on the CPS indexed under Bob's number. + The CPS then awaits retrievals for that number. + + When Alice places the call, Bob's phone would usually ring and + display Alice's number (+1.111.555.1111), which is informed by the + existing PSTN mechanisms for relaying a calling party number (e.g., + the Calling Party's Number (CIN) field of the Initial Address Message + (IAM)). Instead, Bob's phone transparently contacts the CPS and + requests any current PASSporTs for calls to his number. The CPS + responds with any such PASSporTs (or dummy PASSporTs if no relevant + ones are currently stored). If such a PASSporT exists, and the + verification service in Bob's phone decrypts it using his private + key, validates it, then Bob's phone can present the calling party + number information as valid. Otherwise, the call is unverifiable. + Note that this does not necessarily mean that the call is bogus; + because we expect incremental deployment, many legitimate calls will + be unverifiable. + +7.3. Security Analysis + + The primary attack we seek to prevent is an attacker convincing the + callee that a given call is from some other caller C. There are two + scenarios to be concerned with: + + 1. The attacker wishes to impersonate a target when no call from + that target is in progress. + + 2. The attacker wishes to substitute himself for an existing call + setup. + + If an attacker can inject fake PASSporTs into the CPS or in the + communication from the CPS to the callee, he can mount either attack. + As PASSporTs should be digitally signed by an appropriate authority + for the number and verified by the callee (see Section 7.1), this + should not arise in ordinary operations. Any attacker who is aware + of calls in progress can attempt to mount a race to substitute + themselves as described in Section 7.4. For privacy and robustness + reasons, using TLS [RFC8446] on the originating side when storing the + PASSporT at the CPS is RECOMMENDED. + + The entire system depends on the security of the credential + infrastructure. If the authentication credentials for a given number + are compromised, then an attacker can impersonate calls from that + number. However, that is no different from in-band STIR [RFC8224]. + + A secondary attack we must also prevent is denial-of-service against + the CPS, which requires some form of rate control solution that will + not degrade the privacy properties of the architecture. + +7.4. Substitution Attacks + + All that the receipt of the PASSporT from the CPS proves to the + called party is that Alice is trying to call Bob (or at least was as + of very recently) -- it does not prove that any particular incoming + call is from Alice. Consider the scenario in which we have a service + that provides an automatic callback to a user-provided number. In + that case, the attacker can try to arrange for a false caller-id + value, as shown below: + + Attacker Callback Service CPS Bob + -------------------------------------------------------------------- + Place call to Bob ----------> + (from 111.555.1111) + Store PASSporT for + CS:Bob -------------> + + Call from Attacker (forged CS caller-id info) --------------------> + + Call from CS ------------------------> X + + + <-- Retrieve PASSporT + for CS:Bob + + PASSporT for CS:Bob ------------------------> + + [Ring phone with callerid = + 111.555.1111] + + In order to mount this attack, the attacker contacts the Callback + Service (CS) and provides it with Bob's number. This causes the CS + to initiate a call to Bob. As before, the CS contacts the CPS to + insert an appropriate PASSporT and then initiates a call to Bob. + Because it is a valid CS injecting the PASSporT, none of the security + checks mentioned above help. However, the attacker simultaneously + initiates a call to Bob using forged caller-id information + corresponding to the CS. If he wins the race with the CS, then Bob's + phone will attempt to verify the attacker's call (and succeed since + they are indistinguishable), and the CS's call will go to busy/voice + mail/call waiting. + + In order to prevent a passive attacker from using traffic analysis or + similar means to learn precisely when a call is placed, it is + essential that the connection between the caller and the CPS be + encrypted as recommended above. Authentication services could store + dummy PASSporTs at the CPS at random intervals in order to make it + more difficult for an eavesdropper to use traffic analysis to + determine that a call was about to be placed. + + Note that in a SIP environment, the callee might notice that there + were multiple INVITEs and thus detect this attack, but in some PSTN + interworking scenarios, or highly intermediated networks, only one + call setup attempt will reach the target. Also note that the success + of this substitution attack depends on the attacker landing their + call within the narrow window that the PASSporT is retained in the + CPS, so shortening that window will reduce the opportunity for the + attack. Finally, smart endpoints could implement some sort of state + coordination to ensure that both sides believe the call is in + progress, though methods of supporting that are outside the scope of + this document. + +7.5. Rate Control for CPS Storage + + In order to prevent the flooding of a CPS with bogus PASSporTs, we + propose the use of "blind signatures" (see [RFC5636]). A sender will + initially authenticate to the CPS using its STIR credentials and + acquire a signed token from the CPS that will be presented later when + storing a PASSporT. The flow looks as follows: + + Sender CPS + + Authenticate to CPS ---------------------> + Blinded(K_temp) -------------------------> + <------------- Sign(K_cps, Blinded(K_temp)) + [Disconnect] + + + Sign(K_cps, K_temp) + Sign(K_temp, E(K_receiver, PASSporT)) ---> + + At an initial time when no call is yet in progress, a potential + client connects to the CPS, authenticates, and sends a blinded + version of a freshly generated public key. The CPS returns a signed + version of that blinded key. The sender can then unblind the key and + get a signature on K_temp from the CPS. + + Then later, when a client wants to store a PASSporT, it connects to + the CPS anonymously (preferably over a network connection that cannot + be correlated with the token acquisition) and sends both the signed + K_temp and its own signature over the encrypted PASSporT. The CPS + verifies both signatures and, if they verify, stores the encrypted + passport (discarding the signatures). + + This design lets the CPS rate limit how many PASSporTs a given sender + can store just by counting how many times K_temp appears; perhaps CPS + policy might reject storage attempts and require acquisition of a new + K_temp after storing more than a certain number of PASSporTs indexed + under the same destination number in a short interval. This does + not, of course, allow the CPS to tell when bogus data is being + provisioned by an attacker, simply the rate at which data is being + provisioned. Potentially, feedback mechanisms could be developed + that would allow the called parties to tell the CPS when they are + receiving unusual or bogus PASSporTs. + + This architecture also assumes that the CPS will age out PASSporTs. + A CPS SHOULD NOT keep any stored PASSporT for longer than the + recommended freshness policy for the "iat" value as described in + [RFC8224] (i.e., sixty seconds) unless some local policy for a CPS + deployment requires a longer or shorter interval. Any reduction in + this window makes substitution attacks (see Section 7.4) harder to + mount, but making the window too small might conceivably age + PASSporTs out while a heavily redirected call is still alerting. + + An alternative potential approach to blind signatures would be the + use of verifiable oblivious pseudorandom functions (VOPRFs, per + [PRIVACY-PASS]), which may prove faster. + +8. Authentication and Verification Service Behavior for Out-of-Band + + [RFC8224] defines an authentication service and a verification + service as functions that act in the context of SIP requests and + responses. This specification thus provides a more generic + description of authentication service and verification service + behavior that might or might not involve any SIP transactions, but + depends only on placing a request for communications from an + originating identity to one or more destination identities. + +8.1. Authentication Service (AS) + + Out-of-band authentication services perform steps similar to those + defined in [RFC8224] with some exceptions: + + Step 1: The authentication service MUST determine whether it is + authoritative for the identity of the originator of the request, that + is, the identity it will populate in the "orig" claim of the + PASSporT. It can do so only if it possesses the private key of one + or more credentials that can be used to sign for that identity, be it + a domain or a telephone number or some other identifier. For + example, the authentication service could hold the private key + associated with a STIR certificate [RFC8225]. + + Step 2: The authentication service MUST determine that the originator + of communications can claim the originating identity. This is a + policy decision made by the authentication service that depends on + its relationship to the originator. For an out-of-band application + built into the calling device, for example, this is the same check + performed in Step 1: does the calling device hold a private key, one + corresponding to a STIR certificate, that can sign for the + originating identity? + + Step 3: The authentication service MUST acquire the public encryption + key of the destination, which will be used to encrypt the PASSporT + (see Section 11). It MUST also discover (see Section 10) the CPS + associated with the destination. The authentication service may + already have the encryption key and destination CPS cached, or may + need to query a service to acquire the key. Note that per + Section 7.5, the authentication service may also need to acquire a + token for PASSporT storage from the CPS upon CPS discovery. It is + anticipated that the discovery mechanism (see Section 10) used to + find the appropriate CPS will also find the proper key server for the + public key of the destination. In some cases, a destination may have + multiple public encryption keys associated with it. In that case, + the authentication service MUST collect all of those keys. + + Step 4: The authentication service MUST create the PASSporT object. + This includes acquiring the system time to populate the "iat" claim, + and populating the "orig" and "dest" claims as described in + [RFC8225]. The authentication service MUST then encrypt the + PASSporT. If in Step 3 the authentication service discovered + multiple public keys for the destination, it MUST create one + encrypted copy for each public key it discovered. + + Finally, the authentication service stores the encrypted PASSporT(s) + at the CPS discovered in Step 3. Only after that is completed should + any call be initiated. Note that a call might be initiated over SIP, + and the authentication service would place the same PASSporT in the + Identity header field value of the SIP request -- though SIP would + carry a cleartext version rather than an encrypted version sent to + the CPS. In that case, out-of-band would serve as a fallback + mechanism if the request was not conveyed over SIP end-to-end. Also, + note that the authentication service MAY use a compact form of the + PASSporT for a SIP request, whereas the version stored at the CPS + MUST always be a full-form PASSporT. + +8.2. Verification Service (VS) + + When a call arrives, an out-of-band verification service performs + steps similar to those defined in [RFC8224] with some exceptions: + + Step 1: The verification service contacts the CPS and requests all + current PASSporTs for its destination number; or alternatively it may + receive PASSporTs through a push interface from the CPS in some + deployments. The verification service MUST then decrypt all + PASSporTs using its private key. Some PASSporTs may not be + decryptable for any number of reasons: they may be intended for a + different verification service, or they may be "dummy" values + inserted by the CPS for privacy purposes. The next few steps will + narrow down the set of PASSporTs that the verification service will + examine from that initial decryptable set. + + Step 2: The verification service MUST determine if any "ppt" + extensions in the PASSporTs are unsupported. It takes only the set + of supported PASSporTs and applies the next step to them. + + Step 3: The verification service MUST determine if there is an + overlap between the calling party number presented in call signaling + and the "orig" field of any decrypted PASSporTs. It takes the set of + matching PASSporTs and applies the next step to them. + + Step 4: The verification service MUST determine if the credentials + that signed each PASSporT are valid, and if the verification service + trusts the CA that issued the credentials. It takes the set of + trusted PASSporTs to the next step. + + Step 5: The verification service MUST check the freshness of the + "iat" claim of each PASSporT. The exact interval of time that + determines freshness is left to local policy. It takes the set of + fresh PASSporTs to the next step. + + Step 6: The verification service MUST check the validity of the + signature over each PASSporT, as described in [RFC8225]. + + Finally, the verification service will end up with one or more valid + PASSporTs corresponding to the call it has received. In keeping with + baseline STIR, this document does not dictate any particular + treatment of calls that have valid PASSporTs associated with them; + the handling of the call after the verification process depends on + how the verification service is implemented and on local policy. + However, it is anticipated that local policies could involve making + different forwarding decisions in intermediary implementations, or + changing how the user is alerted or how identity is rendered in user + agent implementations. + +8.3. Gateway Placement Services + + The STIR out-of-band mechanism also supports the presence of gateway + placement services, which do not create PASSporTs themselves, but + instead take PASSporTs out of signaling protocols and store them at a + CPS before gatewaying to a protocol that cannot carry PASSporTs + itself. For example, a SIP gateway that sends calls to the PSTN + could receive a call with an Identity header field, extract a + PASSporT from the Identity header field, and store that PASSporT at a + CPS. + + To place a PASSporT at a CPS, a gateway MUST perform Step 3 of + Section 8.1 above: that is, it must discover the CPS and public key + associated with the destination of the call, and may need to acquire + a PASSporT storage token (see Section 6.1). Per Step 3 of + Section 8.1, this may entail discovering several keys. The gateway + then collects the in-band PASSporT(s) from the in-band signaling, + encrypts the PASSporT(s), and stores them at the CPS. + + A similar service could be performed by a gateway that retrieves + PASSporTs from a CPS and inserts them into signaling protocols that + support carrying PASSporTs in-band. This behavior may be defined by + future specifications. + +9. Example HTTPS Interface to the CPS + + As a rough example, we show a CPS implementation here that uses a + Representational State Transfer (REST) API [REST] to store and + retrieve objects at the CPS. The calling party stores the PASSporT + at the CPS prior to initiating the call; the PASSporT is stored at a + location at the CPS that corresponds to the called number. Note that + it is possible for multiple parties to be calling a number at the + same time, and that for called numbers such as large call centers, + many PASSporTs could legitimately be stored simultaneously, and it + might prove difficult to correlate these with incoming calls. + + Assume that an authentication service has created the following + PASSporT for a call to the telephone number 2.222.555.2222 (note that + these are dummy values): + + eyJhbGciOiJFUzI1NiIsInR5cCI6InBhc3Nwb3J0IiwieDV1IjoiaHR0cHM6Ly9 + jZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9.eyJkZXN0Ijp7InRuIjpbI + jIyMjI1NTUyMjIyIl19LCJpYXQiOiIxNTgzMjUxODEwIiwib3JpZyI6eyJ0biI6 + IjExMTE1NTUxMTExIn19.pnij4IlLHoR4vxID0u3CT1e9Hq4xLngZUTv45Vbxmd + 3IVyZug4KOSa378yfP4x6twY0KTdiDypsereS438ZHaQ + + Through some discovery mechanism (see Section 10), the authentication + service discovers the network location of a web service that acts as + the CPS for 2.222.555.2222. Through the same mechanism, we will say + that it has also discovered one public encryption key for that + destination. It uses that encryption key to encrypt the PASSporT, + resulting in the encrypted PASSporT: + + rlWuoTpvBvWSHmV1AvVfVaE5pPV6VaOup3Ajo3W0VvjvrQI1VwbvnUE0pUZ6Yl9w + MKW0YzI4LJ1joTHho3WaY3Oup3Ajo3W0YzAypvW9rlWxMKA0Vwc7VaIlnFV6JlWm + nKN6LJkcL2INMKuuoKOfMF5wo20vKK0fVzyuqPV6VwR0AQZlZQtmAQHvYPWipzyaV + wc7VaEhVwbvZGVkAGH1AGRlZGVvsK0ed3cwG1ubEjnxRTwUPaJFjHafuq0-mW6S1 + IBtSJFwUOe8Dwcwyx-pcSLcSLfbwAPcGmB3DsCBypxTnF6uRpx7j + + Having concluded the numbered steps in Section 8.1, including + acquiring any token (per Section 6.1) needed to store the PASSporT at + the CPS, the authentication service then stores the encrypted + PASSporT: + + POST /cps/2.222.555.2222/ppts HTTP/1.1 + Host: cps.example.com + Content-Type: application/passport + + rlWuoTpvBvWSHmV1AvVfVaE5pPV6VaOup3Ajo3W0VvjvrQI1VwbvnUE0pUZ6Yl9w + MKW0YzI4LJ1joTHho3WaY3Oup3Ajo3W0YzAypvW9rlWxMKA0Vwc7VaIlnFV6JlWm + nKN6LJkcL2INMKuuoKOfMF5wo20vKK0fVzyuqPV6VwR0AQZlZQtmAQHvYPWipzyaV + wc7VaEhVwbvZGVkAGH1AGRlZGVvsK0ed3cwG1ubEjnxRTwUPaJFjHafuq0-mW6S1 + IBtSJFwUOe8Dwcwyx-pcSLcSLfbwAPcGmB3DsCBypxTnF6uRpx7j + + The web service assigns a new location for this encrypted PASSporT in + the collection, returning a 201 OK with the location of + /cps/2.222.222.2222/ppts/ppt1. Now the authentication service can + place the call, which may be signaled by various protocols. Once the + call arrives at the terminating side, a verification service contacts + its CPS to ask for the set of incoming calls for its telephone number + (2.222.222.2222). + + GET /cps/2.222.555.2222/ppts + Host: cps.example.com + + This returns to the verification service a list of the PASSporTs + currently in the collection, which currently consists of only + /cps/2.222.222.2222/ppts/ppt1. The verification service then sends a + new GET for /cps/2.222.555.2222/ppts/ppt1/ which yields: + + HTTP/1.1 200 OK + Content-Type: application/passport + Link: <https://cps.example.com/cps/2.222.555.2222/ppts> + + rlWuoTpvBvWSHmV1AvVfVaE5pPV6VaOup3Ajo3W0VvjvrQI1VwbvnUE0pUZ6Yl9w + MKW0YzI4LJ1joTHho3WaY3Oup3Ajo3W0YzAypvW9rlWxMKA0Vwc7VaIlnFV6JlWm + nKN6LJkcL2INMKuuoKOfMF5wo20vKK0fVzyuqPV6VwR0AQZlZQtmAQHvYPWipzyaV + wc7VaEhVwbvZGVkAGH1AGRlZGVvsK0ed3cwG1ubEjnxRTwUPaJFjHafuq0-mW6S1 + IBtSJFwUOe8Dwcwyx-pcSLcSLfbwAPcGmB3DsCBypxTnF6uRpx7j + + That concludes Step 1 of Section 8.2; the verification service then + goes on to the next step, processing that PASSporT through its + various checks. A complete protocol description for CPS interactions + is left to future work. + +10. CPS Discovery + + In order for the two ends of the out-of-band dataflow to coordinate, + they must agree on a way to discover a CPS and retrieve PASSporT + objects from it based solely on the rendezvous information available: + the calling party number and the called number. Because the storage + of PASSporTs in this architecture is indexed by the called party + number, it makes sense to discover a CPS based on the called party + number as well. There are a number of potential service discovery + mechanisms that could be used for this purpose. The means of service + discovery may vary by use case. + + Although the discussion above is written largely in terms of a single + CPS, having a significant fraction of all telephone calls result in + storing and retrieving PASSporTs at a single monolithic CPS has + obvious scaling problems, and would as well allow the CPS to gather + metadata about a very wide set of callers and callees. These issues + can be alleviated by operational models with a federated CPS; any + service discovery mechanism for out-of-band STIR should enable + federation of the CPS function. Likely models include ones where a + carrier operates one or more CPS instances on behalf of its + customers, an enterprise runs a CPS instance on behalf of its PBX + users, or a third-party service provider offers a CPS as a cloud + service. + + Some service discovery possibilities under consideration include the + following: + + For some deployments in closed (e.g., intra-network) environments, + the CPS location can simply be provisioned in implementations, + obviating the need for a discovery protocol. + + If a credential lookup service is already available (see + Section 11), the CPS location can also be recorded in the callee's + credentials; an extension to [RFC8226] could, for example, provide + a link to the location of the CPS where PASSporTs should be stored + for a destination. + + There exist a number of common directory systems that might be + used to translate telephone numbers into the URIs of a CPS. ENUM + [RFC6116] is commonly implemented, though no "golden root" central + ENUM administration exists that could be easily reused today to + help the endpoints discover a common CPS. Other protocols + associated with queries for telephone numbers, such as the + Telephone-Related Information (TeRI) protocol [MODERN-TERI], could + also serve for this application. + + Another possibility is to use a single distributed service for + this function. Verification Involving PSTN Reachability (VIPR) + [VIPR-OVERVIEW] proposed a REsource LOcation And Discovery + (RELOAD) [RFC6940] usage for telephone numbers to help direct + calls to enterprises on the Internet. It would be possible to + describe a similar RELOAD usage to identify the CPS where calls + for a particular telephone number should be stored. One advantage + that the STIR architecture has over VIPR is that it assumes a + credential system that proves authority over telephone numbers; + those credentials could be used to determine whether or not a CPS + could legitimately claim to be the proper store for a given + telephone number. + + This document does not prescribe any single way to do service + discovery for a CPS; it is envisioned that initial deployments will + provision the location of the CPS at the authentication service and + verification service. + +11. Encryption Key Lookup + + In order to encrypt a PASSporT (see Section 6.1), the caller needs + access to the callee's public encryption key. Note that because STIR + uses the Elliptic Curve Digital Signature Algorithm (ECDSA) for + signing PASSporTs, the public key used to verify PASSporTs is not + suitable for this function, and thus the encryption key must be + discovered separately. This requires some sort of directory/lookup + system. + + Some initial STIR deployments have fielded certificate repositories + so that verification services can acquire the signing credentials for + PASSporTs, which are linked through a URI in the "x5u" element of the + PASSporT. These certificate repositories could clearly be repurposed + for allowing authentication services to download the public + encryption key for the called party -- provided they can be + discovered by calling parties. This document does not specify any + particular discovery scheme, but instead offers some general guidance + about potential approaches. + + It is a desirable property that the public encryption key for a given + party be linked to their STIR credential. An Elliptic Curve + Diffie-Hellman (ECDH) [RFC7748] public-private key pair might be + generated for a subcert [TLS-SUBCERTS] of the STIR credential. That + subcert could be looked up along with the STIR credential of the + called party. Further details of this subcert, and the exact lookup + mechanism involved, are deferred for future protocol work. + + Obviously, if there is a single central database that the caller and + callee each access in real time to download the other's keys, then + this represents a real privacy risk, as the central key database + learns about each call. A number of mechanisms are potentially + available to mitigate this: + + Have endpoints pre-fetch keys for potential counterparties (e.g., + their address book or the entire database). + + Have caching servers in the user's network that proxy their + fetches and thus conceal the relationship between the user and the + keys they are fetching. + + Clearly, there is a privacy/timeliness trade-off in that getting up- + to-date knowledge about credential validity requires contacting the + credential directory in real-time (e.g., via the Online Certificate + Status Protocol (OCSP) [RFC6960]). This is somewhat mitigated for + the caller's credentials in that he can get short-term credentials + right before placing a call which only reveals his calling rate, but + not who he is calling. Alternately, the CPS can verify the caller's + credentials via OCSP, though of course this requires the callee to + trust the CPS's verification. This approach does not work as well + for the callee's credentials, but the risk there is more modest since + an attacker would need to both have the callee's credentials and + regularly poll the database for every potential caller. + + We consider the exact best point in the trade-off space to be an open + issue. + +12. IANA Considerations + + This document has no IANA actions. + +13. Privacy Considerations + + Delivering PASSporTs out-of-band offers a different set of privacy + properties than traditional in-band STIR. In-band operations convey + PASSporTs as headers in SIP messages in cleartext, which any + forwarding intermediaries can potentially inspect. By contrast, out- + of-band STIR stores these PASSporTs at a service after encrypting + them as described in Section 6, effectively creating a path between + the authentication and verification service in which the CPS is the + sole intermediary, but the CPS cannot read the PASSporTs. + Potentially, out-of-band PASSporT delivery could thus improve on the + privacy story of STIR. + + The principle actors in the operation of out-of-band are the AS, VS, + and CPS. The AS and VS functions differ from baseline behavior + [RFC8224], in that they interact with a CPS over a non-SIP interface, + of which the REST interface in Section 9 serves as an example. Some + out-of-band deployments may also require a discovery service for the + CPS itself (Section 10) and/or encryption keys (Section 11). Even + with encrypted PASSporTs, the network interactions by which the AS + and VS interact with the CPS, and to a lesser extent any discovery + services, thus create potential opportunities for data leakage about + calling and called parties. + + The process of storing and retrieving PASSporTs at a CPS can itself + reveal information about calls being placed. The mechanism takes + care not to require that the AS authenticate itself to the CPS, + relying instead on a blind signature mechanism for flood control + prevention. Section 7.4 discusses the practice of storing "dummy" + PASSporTs at random intervals to thwart traffic analysis, and as + Section 8.2 notes, a CPS is required to return a dummy PASSporT even + if there is no PASSporT indexed for that calling number, which + similarly enables the retrieval side to randomly request PASSporTs + when there are no calls in progress. Note that the caller's IP + address itself leaks information about the caller. Proxying the + storage of the CPS through some third party could help prevent this + attack. It might also be possible to use a more sophisticated system + such as Riposte [RIPOSTE]. These measures can help to mitigate + information disclosure in the system. In implementations that + require service discovery (see Section 10), perhaps through key + discovery (Section 11), similar measures could be used to make sure + that service discovery does not itself disclose information about + calls. + + Ultimately, this document only provides a framework for future + implementation of out-of-band systems, and the privacy properties of + a given implementation will depend on architectural assumptions made + in those environments. More closed systems for intranet operations + may adopt a weaker security posture but otherwise mitigate the risks + of information disclosure, whereas more open environments will + require careful implementation of the practices described here. + + For general privacy risks associated with the operations of STIR, + also see the privacy considerations covered in Section 11 of + [RFC8224]. + +14. Security Considerations + + This entire document is about security, but the detailed security + properties will vary depending on how the framework is applied and + deployed. General guidance for dealing with the most obvious + security challenges posed by this framework is given in Sections 7.3 + and 7.4, along proposed solutions for problems like denial-of-service + attacks or traffic analysis against the CPS. + + Although there are considerable security challenges associated with + widespread deployment of a public CPS, those must be weighed against + the potential usefulness of a service that delivers a STIR assurance + without requiring the passage of end-to-end SIP. Ultimately, the + security properties of this mechanism are at least comparable to in- + band STIR: the substitution attack documented in Section 7.4 could be + implemented by any in-band SIP intermediary or eavesdropper who + happened to see the PASSporT in transit, say, and launched its own + call with a copy of that PASSporT to race against the original to the + destination. + +15. Informative References + + [MODERN-TERI] + Peterson, J., "An Architecture and Information Model for + Telephone-Related Information (TeRI)", Work in Progress, + Internet-Draft, draft-ietf-modern-teri-00, 2 July 2018, + <https://tools.ietf.org/html/draft-ietf-modern-teri-00>. + + [PASSPORT-DIVERT] + Peterson, J., "PASSporT Extension for Diverted Calls", + Work in Progress, Internet-Draft, draft-ietf-stir- + passport-divert-09, 13 July 2020, + <https://tools.ietf.org/html/draft-ietf-stir-passport- + divert-09>. + + [PRIVACY-PASS] + Davidson, A. and N. Sullivan, "The Privacy Pass Protocol", + Work in Progress, Internet-Draft, draft-privacy-pass-00, 3 + November 2019, + <https://tools.ietf.org/html/draft-privacy-pass-00>. + + [REST] Fielding, R., "Architectural Styles and the Design of + Network-based Software Architectures, Chapter 5: + Representational State Transfer", Ph.D. + Dissertation, University of California, Irvine, 2010. + + [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate + Requirement Levels", BCP 14, RFC 2119, + DOI 10.17487/RFC2119, March 1997, + <https://www.rfc-editor.org/info/rfc2119>. + + [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, + A., Peterson, J., Sparks, R., Handley, M., and E. + Schooler, "SIP: Session Initiation Protocol", RFC 3261, + DOI 10.17487/RFC3261, June 2002, + <https://www.rfc-editor.org/info/rfc3261>. + + [RFC5636] Park, S., Park, H., Won, Y., Lee, J., and S. Kent, + "Traceable Anonymous Certificate", RFC 5636, + DOI 10.17487/RFC5636, August 2009, + <https://www.rfc-editor.org/info/rfc5636>. + + [RFC6116] Bradner, S., Conroy, L., and K. Fujiwara, "The E.164 to + Uniform Resource Identifiers (URI) Dynamic Delegation + Discovery System (DDDS) Application (ENUM)", RFC 6116, + DOI 10.17487/RFC6116, March 2011, + <https://www.rfc-editor.org/info/rfc6116>. + + [RFC6940] Jennings, C., Lowekamp, B., Ed., Rescorla, E., Baset, S., + and H. Schulzrinne, "REsource LOcation And Discovery + (RELOAD) Base Protocol", RFC 6940, DOI 10.17487/RFC6940, + January 2014, <https://www.rfc-editor.org/info/rfc6940>. + + [RFC6960] Santesson, S., Myers, M., Ankney, R., Malpani, A., + Galperin, S., and C. Adams, "X.509 Internet Public Key + Infrastructure Online Certificate Status Protocol - OCSP", + RFC 6960, DOI 10.17487/RFC6960, June 2013, + <https://www.rfc-editor.org/info/rfc6960>. + + [RFC7258] Farrell, S. and H. Tschofenig, "Pervasive Monitoring Is an + Attack", BCP 188, RFC 7258, DOI 10.17487/RFC7258, May + 2014, <https://www.rfc-editor.org/info/rfc7258>. + + [RFC7340] Peterson, J., Schulzrinne, H., and H. Tschofenig, "Secure + Telephone Identity Problem Statement and Requirements", + RFC 7340, DOI 10.17487/RFC7340, September 2014, + <https://www.rfc-editor.org/info/rfc7340>. + + [RFC7748] Langley, A., Hamburg, M., and S. Turner, "Elliptic Curves + for Security", RFC 7748, DOI 10.17487/RFC7748, January + 2016, <https://www.rfc-editor.org/info/rfc7748>. + + [RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC + 2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174, + May 2017, <https://www.rfc-editor.org/info/rfc8174>. + + [RFC8224] Peterson, J., Jennings, C., Rescorla, E., and C. Wendt, + "Authenticated Identity Management in the Session + Initiation Protocol (SIP)", RFC 8224, + DOI 10.17487/RFC8224, February 2018, + <https://www.rfc-editor.org/info/rfc8224>. + + [RFC8225] Wendt, C. and J. Peterson, "PASSporT: Personal Assertion + Token", RFC 8225, DOI 10.17487/RFC8225, February 2018, + <https://www.rfc-editor.org/info/rfc8225>. + + [RFC8226] Peterson, J. and S. Turner, "Secure Telephone Identity + Credentials: Certificates", RFC 8226, + DOI 10.17487/RFC8226, February 2018, + <https://www.rfc-editor.org/info/rfc8226>. + + [RFC8446] Rescorla, E., "The Transport Layer Security (TLS) Protocol + Version 1.3", RFC 8446, DOI 10.17487/RFC8446, August 2018, + <https://www.rfc-editor.org/info/rfc8446>. + + [RIPOSTE] Corrigan-Gibbs, H., Boneh, D., and D. Mazières, "Riposte: + An Anonymous Messaging System Handling Millions of Users", + May 2015, <https://people.csail.mit.edu/henrycg/pubs/ + oakland15riposte/>. + + [TLS-SUBCERTS] + Barnes, R., Iyengar, S., Sullivan, N., and E. Rescorla, + "Delegated Credentials for TLS", Work in Progress, + Internet-Draft, draft-ietf-tls-subcerts-10, 24 January + 2021, + <https://tools.ietf.org/html/draft-ietf-tls-subcerts-10>. + + [VIPR-OVERVIEW] + Barnes, M., Jennings, C., Rosenberg, J., and M. Petit- + Huguenin, "Verification Involving PSTN Reachability: + Requirements and Architecture Overview", Work in Progress, + Internet-Draft, draft-jennings-vipr-overview-06, 9 + December 2013, <https://tools.ietf.org/html/draft- + jennings-vipr-overview-06>. + +Acknowledgments + + The ideas in this document came out of discussions with Richard + Barnes and Cullen Jennings. We'd also like to thank Russ Housley, + Chris Wendt, Eric Burger, Mary Barnes, Ben Campbell, Ted Huang, + Jonathan Rosenberg, and Robert Sparks for helpful suggestions. + +Authors' Addresses + + Eric Rescorla + Mozilla + + Email: ekr@rtfm.com + + + Jon Peterson + Neustar, Inc. + 1800 Sutter St Suite 570 + Concord, CA 94520 + United States of America + + Email: jon.peterson@team.neustar |