> -----Original Message-----
> From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On 
> Behalf Of Spencer Dawkins
> Sent: Wednesday, July 09, 2008 7:18 AM
> To: IETF SIP List
> Subject: Re: [Sip] On the need for a visual identifier of 
> trusted identity -Fwd:I-D 
> Action:draft-york-sip-visual-identifier-trusted-identity-00.txt
> 
> Hi, Paul,
> 
> This was a helpful note.
> 
> ("analogy alert") - when I was working at a network 
> monitoring company, we 
> were asked to provide traffic counts for IPsec. Looking at 
> customer network 
> traces (for large ISPs) we saw way more people deploying ESP 
> ("authentication plus confidentiality") than AH 
> ("authentication without 
> confidentiality") - I'm not sure that we even implemented AH, 
> but I left 
> before that feature shipped.

IPsec AH does not work across NATs.

-d

> I'm thinking that if we didn't even see much uptake on 
> "knowing who you were 
> talking to without confidentiality" at the IP layer - that's 
> what AH gives 
> you - from networks operators, we're not likely to be able to 
> explain what's 
> happening at the application layer to end users with much subtlety.
> 
> So I'd expect a single indicator ("it's all secure") to see 
> more uptake than 
> two indicators ("the signaling is/is not secure", "the media 
> is/is not 
> secure").
> 
> Your mileage may vary, and it's worth noting that my 
> information is about 
> three years old, so things could have changed since then...
> 
> Thanks,
> 
> Spencer
> 
> 
> > I'm conflicted here. Its a tricky job to sort out which "security 
> > combinations" can be meaningfully distinguished to the end 
> user. They have 
> > to be both comprehensible and useful. And it must be 
> possible to convey 
> > them via a range of commonly used UAs.
> >
> > On one hand I think this is not an area that we ought to be 
> > standardizing - it is potentially a good area for innovation. OTOH, 
> > without some minimal expectations the whole thing is useless.
> >
> > I can see a bunch of combinations that potentially might be 
> in common use:
> >
> > 1) for single medium (e.g. audio) calls:
> >    a) nothing is secure
> >    b) identity is secure, media is not
> >    c) both identity and media is secure
> >    d) media is secure, identity is not
> > 2) for multimedia calls (e.g. audio+video)
> >    a-d) as above
> >    *) combos where some media is secure and some not
> >
> > On top of that, we have the cases where the other end is a 
> gateway that we 
> > may trust, but which has to represent security properties 
> from its far 
> > side.
> >
> > And, there is the distinction between trust based on 
> transitive trust 
> > domains vs trust based on e2e encryption and certificates.
> >
> > Clearly this is *way* too much to present to the average 
> user, and nearly 
> > impossible to present without a sophisticated UI. So it 
> needs to be boiled 
> > down into just a few alternatives.
> >
> > John is proposing that it should all be condensed into 
> *two* alternatives: 
> > secure, and non-secure. In this case "secure" would be only 
> cases 1c or 2c 
> > above, and everything else would be insecure.
> >
> > Its my feeling that isn't going to be good enough. For one 
> thing, it means 
> > that there probably will be almost no secure commercial 
> deployments. It 
> > also means that vendors will want to "bend the truth" a bit 
> - perhaps by 
> > claiming that certain cases are handled more securely than 
> they really 
> > are.
> >
> > So, I'm leaning towards separating identity security from 
> media security, 
> > but I think I am willing to roll all media security together.
> > For identity security, I'm thinking of possibly three cases:
> > - secure (e2e or via transitive trust with some rules TBD)
> > - secure to the PSTN (secure as above, to a PSTN gw)
> > - insecure (all the rest)
> > I would render this as some sort of annotation on the 
> callerid display.
> > (Colors, icon, etc.)
> >
> > For media security, I suppose the same three cases apply. 
> This would need 
> > to be rendered independently of the callerid display. It 
> might be in the 
> > media stream itself. (Ring tone?) If in display, maybe it 
> would be a lock, 
> > rendered in different colors - but separate from the callerid.
> >
> > I think this is important because callerid is important to 
> people, and 
> > because there is probably a lot better chance of getting 
> secure callerid 
> > than secure media. Treating the PSTN as a special case is 
> clearly a hack. 
> > But again, its probably an important hack because people 
> think they know 
> > what they are getting with the PSTN (even if they are 
> wrong), and trust it 
> > more than our new fangled stuff. Also, for quite some time 
> most calls are 
> > likely to have one PSTN endpoint. Treating PSTN identity as totally 
> > insecure will distress people.
> >
> > Thanks,
> > Paul
> >
> > Elwell, John wrote:
> >> Dan,
> >>
> >>> -----Original Message-----
> >>> From: Dan York [mailto:[EMAIL PROTECTED] Sent: 08 July 2008 19:53
> >>> To: Elwell, John
> >>> Cc: IETF SIP List
> >>> Subject: Re: [Sip] On the need for a visual identifier of trusted 
> >>> identity - Fwd: I-D 
> >>> Action:draft-york-sip-visual-identifier-trusted-identity-00.txt
> >>>
> >>> John,
> >>>
> >>> On Jul 8, 2008, at 3:13 AM, Elwell, John wrote:
> >>>
> >>>> Thanks for writing this, which I believe is an important 
> part of the
> >>>> whole SIP Identity discussion going on at present.
> >>> You're welcome.
> >>>
> >>>> Even if (as is
> >>>> likely) the IETF does not standardise such a visual 
> indicator, the 
> >>>> IETF
> >>>> should still give consideration to what sort of indicators
> >>> are needed
> >>>> and ensure that its protocols are able to supply sufficient 
> >>>> information
> >>>> for a UA to be able to select the appropriate indicator.
> >>> Agreed.
> >>>
> >>>> The only other comment I have is that I didn't see anything
> >>> about the
> >>>> impact of PSTN interworking. So there would seem to be at least 3
> >>>> elements that make up the security status of a call:
> >>>> - the strength of authentication of the peer user or domain;
> >>>> - the strength of encryption;
> >>>> - whether the call is via PSTN.
> >>>
> >>> So as I read this comment, there are really two separate 
> issues I see 
> >>> here:
> >>>
> >>> 1. How do you symbolize the "trusted identity" of the 
> PSTN Caller ID 
> >>> transmitted by the PSTN-to-SIP gateway? Assuming we can 
> come up with a 
> >>> mechanism to arrive at end-to-end authenticated identity 
> between two 
> >>> SIP endpoints, we could get  a "trusted identity" of the *PSTN 
> >>> gateway*, but we have no way of really knowing whether 
> the Caller ID  of 
> >>> the call was spoofed out on the PSTN before it reached 
> the  gateway.  We 
> >>> therefore can't really trust the "identity" of the caller 
>  provided to 
> >>> us by the PSTN gateway - even if we can get an  
> authenticated *SIP* 
> >>> identity of the gateway itself.  Perhaps this is  
> represented to the end 
> >>> user as any other "untrusted" call would be.  Perhaps 
> some systems could 
> >>> display that this is an inbound call from  the PSTN?
> >> [JRE] We could provide the gateway identity as a trusted 
> identity, but
> >> it seems unhelpful not also to provide the PSTN number as 
> an untrusted
> >> identity. Unfortunately this complicates the UI.
> >>
> >>> 2. Should the "visual identifier" be for more than just "trusted 
> >>> identity"?  In the draft, I specifically was focusing on 
> the issue of 
> >>> trusted identity and NOT on the issue of the call being 
> encrypted.   But 
> >>> in your comments you mention the "security status" of a 
> call which  is 
> >>> really something more.  In the context of identity, there 
> are  several 
> >>> possibilities for a call two SIP endpoints:
> >>>
> >>>    a. "Trusted identity" without signaling or media encryption.
> >>>    b. Trusted identity with signaling encryption but 
> without media 
> >>> encryption.
> >> [JRE] The average user will not understand the difference between
> >> signalling encryption and media encryption. I think any 
> indication of
> >> encryption should mean that anything the user "sends" is encrypted,
> >> which might include voice, video, messages, pictures, geographic
> >> location, the fact that user A is making a call to user B, 
> etc.. I don't
> >> think it is helpful to give the user separate indications 
> for these - a
> >> secure call indication should mean everything is secure. So what I
> >> really mean to say is that all these different factors 
> should be taken
> >> into consideration before indicating that the call is secure.
> >> I understand that your draft was focusing only on the strength of
> >> identity authentication. However, the padlock on browsers 
> means that the
> >> web site has been authenticated AND that data is 
> encrypted. The average
> >> user might not be able to cope with two separate indicators on SIP
> >> devices for these.
> >>
> >>>    c. Trusted identity with both signaling and media encryption.
> >>>
> >>> And really there are another identical three 
> possibilities for a call 
> >>> between a SIP endpoint and PSTN gateway, for a total of 
> at least six 
> >>> possibilities.  (Since you note you could also add in the 
> *strength*  of 
> >>> the encryption.)
> >>>
> >>> We are rapidly leaving simple-icon-that-nontechnical-people-can- 
> >>> understand land.
> >>>
> >>> And probably getting into nuances (like encryption 
> strength) that may 
> >>> be of interest to the more paranoid of us (like me) but 
> not at all to 
> >>> the vast majority of people using the actual systems.
> >> [JRE] To a first approximation this might be just "encrypted" or
> >> "unencrypted".
> >>
> >>> My guess is that probably the average user *might* care about:
> >>>
> >>> 1. When I dial this number, am I really talking to my 
> bank? (Or when 
> >>> they called me, is it really them?)
> >>> 2. Can I give them my credit card number without fear of 
> some hacker  in 
> >>> ______ getting that number?
> >> [JRE] Agreed.
> >>
> >>> Ideally, they'd get both in one icon or identifier.... 
> but I'm not  sure 
> >>> that's always possible.  There may be times when I want 
> to be  sure it 
> >>> really is Hadriel Kaplan calling me but I don't really 
> care  whether 
> >>> what we talk about is encrypted.  But for many SIP 
> endpoints  is it 
> >>> desirable - or even possible - to have multiple icons?
> >> [JRE] I don't know the answer, but I think we are in basic 
> agreement.
> >>
> >>> It's an interesting problem.
> >>>
> >>> Dan
> >>>
> >>> -- 
> >>> Dan York, CISSP, Director of Emerging Communication Technology
> >>> Office of the CTO    Voxeo Corporation     [EMAIL PROTECTED]
> >>> Phone: +1-407-455-5859  Skype: danyork  http://www.voxeo.com
> >>> Blogs: http://blogs.voxeo.com  http://www.disruptivetelephony.com
> >>>
> >>> Build voice applications based on open standards.
> >>> Find out how at http://www.voxeo.com/free
> >>>
> >>>
> >>>
> >>>
> >>>
> >>>
> >> _______________________________________________
> >> Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
> >> This list is for NEW development of the core SIP Protocol
> >> Use [EMAIL PROTECTED] for questions on current sip
> >> Use [EMAIL PROTECTED] for new developments on the application of sip
> >>
> > _______________________________________________
> > Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
> > This list is for NEW development of the core SIP Protocol
> > Use [EMAIL PROTECTED] for questions on current sip
> > Use [EMAIL PROTECTED] for new developments on the application of sip
> > 
> 
> 
> _______________________________________________
> Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
> This list is for NEW development of the core SIP Protocol
> Use [EMAIL PROTECTED] for questions on current sip
> Use [EMAIL PROTECTED] for new developments on the application of sip
> 

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to