Hi, Paul,
This was a helpful note.
("analogy alert") - when I was working at a network monitoring company, we
were asked to provide traffic counts for IPsec. Looking at customer network
traces (for large ISPs) we saw way more people deploying ESP
("authentication plus confidentiality") than AH ("authentication without
confidentiality") - I'm not sure that we even implemented AH, but I left
before that feature shipped.
I'm thinking that if we didn't even see much uptake on "knowing who you were
talking to without confidentiality" at the IP layer - that's what AH gives
you - from networks operators, we're not likely to be able to explain what's
happening at the application layer to end users with much subtlety.
So I'd expect a single indicator ("it's all secure") to see more uptake than
two indicators ("the signaling is/is not secure", "the media is/is not
secure").
Your mileage may vary, and it's worth noting that my information is about
three years old, so things could have changed since then...
Thanks,
Spencer
I'm conflicted here. Its a tricky job to sort out which "security
combinations" can be meaningfully distinguished to the end user. They have
to be both comprehensible and useful. And it must be possible to convey
them via a range of commonly used UAs.
On one hand I think this is not an area that we ought to be
standardizing - it is potentially a good area for innovation. OTOH,
without some minimal expectations the whole thing is useless.
I can see a bunch of combinations that potentially might be in common use:
1) for single medium (e.g. audio) calls:
a) nothing is secure
b) identity is secure, media is not
c) both identity and media is secure
d) media is secure, identity is not
2) for multimedia calls (e.g. audio+video)
a-d) as above
*) combos where some media is secure and some not
On top of that, we have the cases where the other end is a gateway that we
may trust, but which has to represent security properties from its far
side.
And, there is the distinction between trust based on transitive trust
domains vs trust based on e2e encryption and certificates.
Clearly this is *way* too much to present to the average user, and nearly
impossible to present without a sophisticated UI. So it needs to be boiled
down into just a few alternatives.
John is proposing that it should all be condensed into *two* alternatives:
secure, and non-secure. In this case "secure" would be only cases 1c or 2c
above, and everything else would be insecure.
Its my feeling that isn't going to be good enough. For one thing, it means
that there probably will be almost no secure commercial deployments. It
also means that vendors will want to "bend the truth" a bit - perhaps by
claiming that certain cases are handled more securely than they really
are.
So, I'm leaning towards separating identity security from media security,
but I think I am willing to roll all media security together.
For identity security, I'm thinking of possibly three cases:
- secure (e2e or via transitive trust with some rules TBD)
- secure to the PSTN (secure as above, to a PSTN gw)
- insecure (all the rest)
I would render this as some sort of annotation on the callerid display.
(Colors, icon, etc.)
For media security, I suppose the same three cases apply. This would need
to be rendered independently of the callerid display. It might be in the
media stream itself. (Ring tone?) If in display, maybe it would be a lock,
rendered in different colors - but separate from the callerid.
I think this is important because callerid is important to people, and
because there is probably a lot better chance of getting secure callerid
than secure media. Treating the PSTN as a special case is clearly a hack.
But again, its probably an important hack because people think they know
what they are getting with the PSTN (even if they are wrong), and trust it
more than our new fangled stuff. Also, for quite some time most calls are
likely to have one PSTN endpoint. Treating PSTN identity as totally
insecure will distress people.
Thanks,
Paul
Elwell, John wrote:
Dan,
-----Original Message-----
From: Dan York [mailto:[EMAIL PROTECTED] Sent: 08 July 2008 19:53
To: Elwell, John
Cc: IETF SIP List
Subject: Re: [Sip] On the need for a visual identifier of trusted
identity - Fwd: I-D
Action:draft-york-sip-visual-identifier-trusted-identity-00.txt
John,
On Jul 8, 2008, at 3:13 AM, Elwell, John wrote:
Thanks for writing this, which I believe is an important part of the
whole SIP Identity discussion going on at present.
You're welcome.
Even if (as is
likely) the IETF does not standardise such a visual indicator, the
IETF
should still give consideration to what sort of indicators
are needed
and ensure that its protocols are able to supply sufficient
information
for a UA to be able to select the appropriate indicator.
Agreed.
The only other comment I have is that I didn't see anything
about the
impact of PSTN interworking. So there would seem to be at least 3
elements that make up the security status of a call:
- the strength of authentication of the peer user or domain;
- the strength of encryption;
- whether the call is via PSTN.
So as I read this comment, there are really two separate issues I see
here:
1. How do you symbolize the "trusted identity" of the PSTN Caller ID
transmitted by the PSTN-to-SIP gateway? Assuming we can come up with a
mechanism to arrive at end-to-end authenticated identity between two
SIP endpoints, we could get a "trusted identity" of the *PSTN
gateway*, but we have no way of really knowing whether the Caller ID of
the call was spoofed out on the PSTN before it reached the gateway. We
therefore can't really trust the "identity" of the caller provided to
us by the PSTN gateway - even if we can get an authenticated *SIP*
identity of the gateway itself. Perhaps this is represented to the end
user as any other "untrusted" call would be. Perhaps some systems could
display that this is an inbound call from the PSTN?
[JRE] We could provide the gateway identity as a trusted identity, but
it seems unhelpful not also to provide the PSTN number as an untrusted
identity. Unfortunately this complicates the UI.
2. Should the "visual identifier" be for more than just "trusted
identity"? In the draft, I specifically was focusing on the issue of
trusted identity and NOT on the issue of the call being encrypted. But
in your comments you mention the "security status" of a call which is
really something more. In the context of identity, there are several
possibilities for a call two SIP endpoints:
a. "Trusted identity" without signaling or media encryption.
b. Trusted identity with signaling encryption but without media
encryption.
[JRE] The average user will not understand the difference between
signalling encryption and media encryption. I think any indication of
encryption should mean that anything the user "sends" is encrypted,
which might include voice, video, messages, pictures, geographic
location, the fact that user A is making a call to user B, etc.. I don't
think it is helpful to give the user separate indications for these - a
secure call indication should mean everything is secure. So what I
really mean to say is that all these different factors should be taken
into consideration before indicating that the call is secure.
I understand that your draft was focusing only on the strength of
identity authentication. However, the padlock on browsers means that the
web site has been authenticated AND that data is encrypted. The average
user might not be able to cope with two separate indicators on SIP
devices for these.
c. Trusted identity with both signaling and media encryption.
And really there are another identical three possibilities for a call
between a SIP endpoint and PSTN gateway, for a total of at least six
possibilities. (Since you note you could also add in the *strength* of
the encryption.)
We are rapidly leaving simple-icon-that-nontechnical-people-can-
understand land.
And probably getting into nuances (like encryption strength) that may
be of interest to the more paranoid of us (like me) but not at all to
the vast majority of people using the actual systems.
[JRE] To a first approximation this might be just "encrypted" or
"unencrypted".
My guess is that probably the average user *might* care about:
1. When I dial this number, am I really talking to my bank? (Or when
they called me, is it really them?)
2. Can I give them my credit card number without fear of some hacker in
______ getting that number?
[JRE] Agreed.
Ideally, they'd get both in one icon or identifier.... but I'm not sure
that's always possible. There may be times when I want to be sure it
really is Hadriel Kaplan calling me but I don't really care whether
what we talk about is encrypted. But for many SIP endpoints is it
desirable - or even possible - to have multiple icons?
[JRE] I don't know the answer, but I think we are in basic agreement.
It's an interesting problem.
Dan
--
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO Voxeo Corporation [EMAIL PROTECTED]
Phone: +1-407-455-5859 Skype: danyork http://www.voxeo.com
Blogs: http://blogs.voxeo.com http://www.disruptivetelephony.com
Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip