I think we don't need something *better* than the PSTN, though that 
would be nice. What I think we need is something that is *not worse* 
than the PSTN. The problem is defining what that means.

I think that means at least:

- when you connect via sip you get a callerid for at least those
   pstn callers where you would have gotten one if you had a pstn phone
   *and* that callerid was "correct".

- callerid is available to callees from sip callers with E.164 AORs
   when it hasn't been intentionally blocked and the caller is the
   legitimate "owner" of the number.

- the frequency with which "incorrect" (spoofed) callerid is delivered
   to callees is no worse, on average, than with pure pstn calls.

I realize this are a bit vague and hard to measure. But I think this is 
subjectively what will be required for sip to be widely accepted as a 
substitute for pstn phone service.

        Paul

Francois Audet wrote:
> Another "solution" is to not do it.
> 
> By that I mean, use RFC 4474 for domain-based security, and if you 
> insist on using phone numbers, then it's not "secured that way".
> 
> Before the flaming start: by definition, if something is addressed by a phone
> number,  it is something that is likely to be reacheable through the PSTN.
> 
> The way security works in the PSTN is completely different. The media is 
> almost
> never encrypted for one. So in the context of SIP, it means there is a 
> gateway 
> somewhere destroying the end-to-end nature of the encryption.
> 
> Even for the Identity, it's different. For one thing, the Identity assertion
> is not end-to-end à-la-RFC 4474.
> 
> So, I'm proposing that if you are using phone numbers as your identity, then
> it is not a design requirement of this group to re-invent a "better" identity
> security system for the PSTN.
> 
> It's not because something is a problem that it necessarily needs to be 
> solved.
> 
> My 2 cents.
> 
>> -----Original Message-----
>> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
>> Behalf Of Jonathan Rosenberg
>> Sent: Monday, February 18, 2008 11:36
>> To: Paul Kyzivat
>> Cc: IETF SIP List
>> Subject: Re: [Sip] New I-D on RFC4474 and phone numbers
>>
>> I agree that something along the lines of enum could solve 
>> this problem, and I believe there was a draft that proposed 
>> such a thing. This has been discussed since the start of rfc4474.
>>
>> However, I fear that saying, 'use enum' is kind of like 
>> saying, we'll just use an All-Knowing Oracle, so lets figure 
>> out the interface protocol to the Oracle. The easy part is 
>> the interface (the enum mechanism). The actual hard problem 
>> is how to get those entries populated. The deployment of 
>> public enum has been - shall we say - less than spectacular. 
>> I'd hate for that to be our only solution. Not that its 
>> obvious what else to do; though I do suggest in my draft how 
>> domain based authentication, when combined with whitelists 
>> and blacklists, can help.
>>
>> -Jonathan R.
>>
>> Paul Kyzivat wrote:
>>> Jonathan,
>>>
>>> I guess the time has come for this discussion, since John Ewell has 
>>> also submitted a draft on this subject.
>>>
>>> I thought the problem was already well known, but perhaps 
>> not. IMO the 
>>> main thing now is to figure out the *solution* to the problem!
>>> IMO a solution is to use a 4474-style approach, but where the 
>>> certificate is tied to just the phone number, not to some arbitrary 
>>> domain name. That of course would depend on a model where 
>> the "owner" 
>>> of the phone number is the one who may obtain the 
>> certificate for that number.
>>> My thought is that we already have an algorithmic mapping from an 
>>> E.164 phone number to a domain name, defined by enum. If the sender 
>>> puts an
>>> E.164 number in From, and can sign it with a cert for the 
>> enum mapped 
>>> domain name corresponding to that number, then that ought 
>> to be valid 
>>> proof of the validity of the sender.
>>>
>>> In those places where public enum is in operation, I think there is 
>>> already a legal mechanism in place to give the owner of record of a 
>>> particular phone number control over the contents of the 
>> corresponding 
>>> DNS entry. That should also be sufficient to allow a certificate 
>>> authority to assign a cert to that same owner.
>>>
>>> Combine all that and you have a complete e2e identity model 
>> for phone 
>>> numbers, based on public enum. And that can be true even if public 
>>> enum isn't used to *route* the calls to that number. So it could be 
>>> used for "unlisted" numbers.
>>>
>>> To use this approach the From header should contain either 
>> a TEL URI, 
>>> or a sip/sips URI containing the enum-mapped domain name 
>> corresponding 
>>> to the phone number. (I would rather see the TEL used for 
>> this - it is 
>>> more user friendly.)
>>>
>>>     Thanks,
>>>     Paul
>>>
>>> Jonathan Rosenberg wrote:
>>>> I just submitted:
>>>>
>> http://www.ietf.org/internet-drafts/draft-rosenberg-sip-rfc4474-conce
>>>> rns-00.txt
>>>>
>>>>
>>>> This is basically a discussion on the security properties 
>> of rfc4474 
>>>> with phone numbers, and a comparison to rfc3325 in this 
>> case. Also a 
>>>> discussion on what happens to dtls-srtp.
>>>>
>>>> Comments welcome.
>>>>
>>>> -Jonathan R.
>> -- 
>> Jonathan D. Rosenberg, Ph.D.                   499 Thornall St.
>> Cisco Fellow                                   Edison, NJ 08837
>> Cisco, Voice Technology Group
>> [EMAIL PROTECTED]
>> http://www.jdrosen.net                         PHONE: (408) 902-3084
>> http://www.cisco.com
>> _______________________________________________
>> Sip mailing list  http://www.ietf.org/mailman/listinfo/sip
>> This list is for NEW development of the core SIP Protocol Use 
>> [EMAIL PROTECTED] for questions on current sip 
>> Use [EMAIL PROTECTED] for new developments on the application of sip
>>
> 
_______________________________________________
Sip mailing list  http://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to