Connected Identity for STIR
draft-ietf-stir-rfc4916-update-07
Revision differences
Document history
| Date | Rev. | By | Action |
|---|---|---|---|
|
2025-12-02
|
07 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
|
2025-12-01
|
07 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
|
2025-12-01
|
07 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
|
2025-11-04
|
07 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
|
2025-11-03
|
07 | (System) | RFC Editor state changed to AUTH from EDIT |
|
2025-11-03
|
07 | (System) | RFC Editor state changed to EDIT |
|
2025-11-03
|
07 | (System) | IESG state changed to RFC Ed Queue from Approved-announcement sent |
|
2025-11-03
|
07 | (System) | Announcement was received by RFC Editor |
|
2025-10-31
|
07 | (System) | IANA Action state changed to In Progress |
|
2025-10-31
|
07 | Morgan Condie | IESG state changed to Approved-announcement sent from Approved-announcement to be sent |
|
2025-10-31
|
07 | Morgan Condie | IESG has approved the document |
|
2025-10-31
|
07 | Morgan Condie | Closed "Approve" ballot |
|
2025-10-31
|
07 | Morgan Condie | Ballot approval text was generated |
|
2025-10-31
|
07 | (System) | Removed all action holders (IESG state changed) |
|
2025-10-31
|
07 | Orie Steele | IESG state changed to Approved-announcement to be sent from IESG Evaluation |
|
2025-08-27
|
07 | Orie Steele | The working group has clarified the update related confusion. |
|
2025-08-27
|
07 | Orie Steele | IESG state changed to IESG Evaluation from IESG Evaluation::AD Followup |
|
2025-08-12
|
07 | Orie Steele | Awaiting confirmation regarding "update" from authors. Awaiting confirmation of normative changes for -07 on mailing list. |
|
2025-07-31
|
07 | Mohamed Boucadair | [Ballot comment] Hi Jon and Chris, Thanks for the follow-up and clarification. I understand better how you are approaching these. I'm clearing my DISCUSS ballot, … [Ballot comment] Hi Jon and Chris, Thanks for the follow-up and clarification. I understand better how you are approaching these. I'm clearing my DISCUSS ballot, but I'm leaving most of content, for record. ================Initial Ballot================= # Update or not update RFC4916? We say that the mechanism in 4916 is complex. We also recommend against it in general, except some “corner cases”. Also, I understand that we don’t specify a new "from-change" behavior, but still the discussion in Section 10 is sufficient in its own to weight the reco in 4916 with at least the complexity statement in this document. BTW, can we have some brief description of these corner cases? # Security, Trust, & Privacy There are several statements that I think need some better scoping/caution as they may be misleading about provided security protection: (1) CURRENT: Some sort of directory service might exist advertising support for connected identity which institutions could use to inform potential callers that, if connected identity is supported when reaching them with SIP, there is a potential security problem. How to trust that? How this is maintained/populated? What about stale information? (2) CURRENT: previously supported connected identity, so that if support is unavailable later, calling users could be alerted to a potential security problem. This is challenging with number portability and may lead to “false positives”. (3) CURRENT: Similarly, when clicking on a telephone number viewed on a web page, or similar service, smartphones often prompt users approve the access to the outbound dialer. There is no guarantee that the displayed number corresponds to the actual request-uri of a session that will be issued. May be add a caution about risk with such uses. (4) CURRENT: probe what identity would be reached as a destination, and potentially even to exchange STIR PASSporTs in order to validate whether or not the expected destination can be reached securely. There is no correlation between the probed identities and the session that will be placed. Did I missed something? If not, adding some warning would be needed here. (5) I wonder whether the probing mentioned early in the document can also be used to help attacker adjust their strategies. If so, can we add a note about this? For example, the following can be used to detect when redirection/session transfer is in place and infer users activity (transfer of a fixed number for a long period can be a hint that users are abroad, for example)? CURRENT: Note that sending "div" PASSporTs in the backwards direction will potentially reveal service logic to the called party. As presumably this service logic is enacted on behalf of the called party, the called party can make a policy determination about reflecting those "div" PASSporTs back to the caller: connected identity may not be compatible with some operator policies. (6) There are other statements that are presented as providing better security while I think this is more about a "feeling of better secure". For example, CURRENT: Connected identity is very valuable for these use cases because it gives a strong assurance to the calling party that they have in fact reached the user for the called telephone number. Assuming the “trusted” device is not also hijacked! I would avoid claiming this is secure in an absolute manner. # Group all Operational/Deployment considerations in a dedicated section There are several ops considerations that are spread in many parts of the document. For the convenience of those who will deploy, it would be better to group these considerations in one section. For example, CURRENT: "div" is not universally supported, so calls MAY be retargeted without generating a "div" PASSporT, in which case the use of "rsp" PASSporTs will not be possible. Note that the decision to trust any "div" or "rsp" PASSporT is, as always in STIR, a matter of local policy of the relying parties: some stricter systems may not want to trust any "rsp" that differs from the "dest" in the PASSporT of the original request. Note that sending "div" PASSporTs in the backwards direction will potentially reveal service logic to the called party. As presumably this service logic is enacted on behalf of the called party, the called party can make a policy determination about reflecting those "div" PASSporTs back to the caller: connected identity may not be compatible with some operator policies. and CURRENT: This specification thus does not recommend PASSporTs for any requests sent in a dialog other than INVITE, UPDATE, and BYE. # STIR deployment assumptions Maybe that’s obvious for the authors/WG, but should we say early that the STIR benefits will be observed if all involved session parties are STIR-capable? # Logging CURRENT: While this specification does not prescribe any user experience associated with placing a call, it assumes that callers might have some way to a set an authorization posture that will result in the right thing happening when the connected identity is not expected. Can we have some reco for UAC to logs such events? In some contexts, this can be used for troubleshooting. # Back with a reference (1) CURRENT: SIP Identity header and the revised problem space of STIR. Please cite a reference for the revied pb space. (2) CURRENT: For example, there is a class of mobile fraud attacks ("call stretching") Do we have any ref about “call stretching” attack we can cite here? (3) CURRENT: and PRACK, and provisional responses Cite RFC3262? (4) CURRENT: Mid-dialog requests also require special handling in diversion cases. Relying parties who intended to trust an "rsp" PASSporT MUST validate any "div" chain back to the "rsp" PASSporT on any Identity header Can we have a pointer about how the chain validation is done? # On terminology The document makes use of STIR/SIP terms that need to be digested. Please add a note to Section 2 where readers can find those (“retargeting”, “SIP service”, etc.). Also, terms such as PAID are used without being introduced. Consider: s/the P-Asserted-Identity header/the P-Asserted-Identity (PAID) header # I don’t parse the following as RFC8862 is about best practices. Please elaborate. CURRENT: This document also addresses concerns about applying [RFC4916] connected identity to STIR discussed in the SIPBRANDY framework [RFC8862]. # Side note CURRENT: Moreover, on the Internet, the lack of any centralized or even federated routing system for telephone numbers has resulted in deployments where the (no change is needed) This reminds me TRIP (RFC3219) and its inherent support of policies; but the market decided otherwise. # Redundant behavior (1) Section 4 CURRENT: (although "div" MAY additionally appear in responses, per Section 5). No need to be redundant with Section 5. Keep the normative language in one place. Thanks. (2) Section 6 CURRENT: originating and terminating side, as well as any BYE requests, SHOULD contain Identity headers with valid PASSporTs. If only the terminating side supports connected identity, obviously the originator cannot be expected to know that it needs to send PASSporTs for subsequent requests like BYE. Doing so prevents third-parties from spoofing any mid-dialog requests in order to redirect media or similarly interfere with communications, as well as preventing denial of service teardowns by attackers, so it has clear benefits and is thus RECOMMENDED. There is a subtlety here but these SHOULD/RECOMMENDED are redundant IMO. Keep one. # NITS ## Please use “session” instead of “call” as the mechanism applied to any media session. Also consider using “terminating”/”initiating” parties rather that “called/calling”, etc. ## Expand STIR in the abstract ## SIP does not initiates sessions OLD: The Session Initiation Protocol (SIP) [RFC3261] initiates NEW: The Session Initiation Protocol (SIP) [RFC3261] is used to initiate ## Better Scope OLD: One area of connected identity that is not explored in this document is the implications for conferencing, especially meshed conferencing systems. This scope of this mechanism is solely two-party communications; multiparty sharing of connected identity is left for future work. NEW This document focuses solely two-party communications; multiparty sharing of connected identity is left for future work. Specifically, it is out of scope to explore the implications for conferencing, especially meshed conferencing systems. ## Past constructs Even if this was published in the past, many statements related to 4916 can still be used in present. Please update these statement to use present. For example, OLD: [RFC4916] allowed NEW: [RFC4916] allows Or OLD: [RFC4916] rightly observed NEW: [RFC4916] rightly observes Etc. ## Simplify OLD: It also explores some new features that would be enabled by connected identity for STIR, including the use of connected identity to prevent route hijacking and to notify callers when an expected called party has successfully been reached. NEW: It also explores some new features that would be enabled by connected identity for STIR, including to prevent route hijacking and to notify initiating parties when an expected terminating party has successfully been reached. ## Modern?! (1) CURRENT: The STIR problem statement [RFC7340] enumerates robocalling, voicemail hacking, vishing, and swatting as problems with the modern telephone network I would s/modern/IP-based (2) CURRENT: The user interface of modern smartphones support an address book from There was such address book even in old fixed phones ;-) I would delete “modern” mention. ## Generalize OLD: Finally, telephone numbers are widely used today for two-factor authentication (TFA) prior to accessing web resources, NEW: Finally, telephone numbers are widely used today for two-factor authentication (TFA) prior to accessing resources on the Internet, ## Straightforward CURRENT: In straightforward call setup, the address-of-record That is? Please consider s/ address-of-record/address-of-record (AoR). Then, use AoR in the remaining part of the text. ## Move upper as this convention is already used before this note. CURRENT: PASSporTs of the "rsp" type will be referred to throughout this specification as "rsp" PASSporTs. ## Be consistent with 3261 use + nit fix OLD: While it might seem attractive to provide identity for failure response codes (4XX, 5XX, 6XX), those explicitly do not form dialogs or connections, and are thus outside the scope of this specification. The same applies to redirect (3XX) response codes, though see [RFC8946] section 7 for guidance on authentication redirection. NEW: While it might seem attractive to provide identity for failure response codes (4xx, 5xx, 6xx), those explicitly do not form dialogs or connections, and are thus outside the scope of this specification. The same applies to redirect (3xx) response codes, though see Section 7 of [RFC8946] for guidance on authentication redirection. There are other similar occurrences in the document that need to be fixed. Cheers, Med |
|
2025-07-31
|
07 | Mohamed Boucadair | [Ballot Position Update] Position for Mohamed Boucadair has been changed to No Objection from Discuss |
|
2025-07-10
|
07 | Russ Housley | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards track RFC is requested. Yes, this appears on the title page of the Internet-Draft. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The SIP Identity header conveys cryptographic identity information about the originators of SIP requests. However, the Secure Telephone Identity Revisited (STIR) framework provides no means for determining the identity of the called party in a traditional telephone calling scenario. This document updates prior guidance to reflect changes to SIP Identity that accompanied STIR, and offers a way to tell the originator the "connected identity". Tha is, the telephone number of the party that answered the call, even if the call was retargeted to party trying to impersonate the intended destination. Working Group Summary The STIR WG reached consensus, and there is support for publication of this document as a standards-track RFC. Document Quality Several people have expressed interest in implementing this specification. Personnel Russ Housley is the Document Shepherd. Murray Kucherawy is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd did a complete review of -04 during WG Last Call. Then, the ball got dropped, and the shepherd writeup was delayed. The ball has been found, revision -05 was posted to resolve the problems that were discovered, and we are (finally) moving the document forward. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns at all. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No additional review is needed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns at all. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. Both authors have confirmed that they are unaware of any IPR disclosures that need to be submitted. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures have been submitted against this document. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The STIR WG reached consensus, and there is support for publication of this document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened to appeal or expressed discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. IDnits raises a warnings: -- Obsolete informational reference (is this intentional?): RFC 4474 (Obsoleted by RFC 8224) This reference to RFC 4474 is needed. It is providing historical context. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No additional formal review is needed for this document. (13) Have all references within this document been identified as either normative or informative? Yes, informative and normative references appear is separate sections in the document. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? None. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no downrefs. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No, publication of this document will not change the status of any other documents. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This specification defines a new PASSporT type for the PASSport Extensions Registry: https://www.iana.org/assignments/passport/passport.xhtml#passport-extensions (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are created. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None is needed for this document. |
|
2025-07-07
|
07 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2025-07-07
|
07 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2025-07-07
|
07 | (System) | IANA Review state changed to Version Changed - Review Needed from IANA OK - Actions Needed |
|
2025-07-07
|
07 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-07.txt |
|
2025-07-07
|
07 | Jon Peterson | New version accepted (logged-in submitter: Jon Peterson) |
|
2025-07-07
|
07 | Jon Peterson | Uploaded new revision |
|
2025-05-08
|
06 | (System) | Changed action holders to Jon Peterson, Chris Wendt (IESG state changed) |
|
2025-05-08
|
06 | Cindy Morgan | IESG state changed to IESG Evaluation::Revised I-D Needed from IESG Evaluation |
|
2025-05-07
|
06 | Paul Wouters | [Ballot comment] I agree with Med that "This document updates prior guidance" seems to imply it Updates: a previous document. |
|
2025-05-07
|
06 | Paul Wouters | [Ballot Position Update] New position, No Objection, has been recorded for Paul Wouters |
|
2025-05-07
|
06 | Mike Bishop | [Ballot comment] I support Mohamed Boucadair's DISCUSS regarding updating RFC4916. The terminology section needs to be updated; while it contains the RFC2919 boilerplate, it … [Ballot comment] I support Mohamed Boucadair's DISCUSS regarding updating RFC4916. The terminology section needs to be updated; while it contains the RFC2919 boilerplate, it doesn't list a lot of the specialized terminology used in this document. Consider adding a list of terms used in this document, potentially with references to other RFCs or relevant documents as needed. |
|
2025-05-07
|
06 | Mike Bishop | [Ballot Position Update] New position, No Objection, has been recorded for Mike Bishop |
|
2025-05-06
|
06 | Mahesh Jethanandani | [Ballot comment] "Copyright Notice", paragraph 0 > Copyright (c) 2024 IETF Trust and the persons identified as the > document authors. All rights … [Ballot comment] "Copyright Notice", paragraph 0 > Copyright (c) 2024 IETF Trust and the persons identified as the > document authors. All rights reserved. The Copyright statement needs to be updated. Normally, this would have happened automatically if the draft had been published anytime this year. However, the document has actually expired. It expired on April 24, but probably because it was already in the IESG queue, it is still marked Active. No explicit action is required other than to publish a new version of the document. Section 1, paragraph 0 > 1. Introduction As Med has already pointed out, the Shepherd's write-up uses an old template. The writeup indicates that there was a gap between -04 and -05 versions of the document, and that might explain why the writeup identifies Murray as the Responsible AD, when in fact it is Orie. The write-up needs to be updated to reflect the change. No reference entries found for these items, which were mentioned in the text. While somewhat obvious, a note to the RFC Editor would make it clear. [RFCThis]. Found terminology that should be reviewed for inclusivity; see https://www.rfc-editor.org/part2/#inclusive_language for background and more guidance: * Term "her"; alternatives might be "they", "them", "their" * Term "traditional"; alternatives might be "classic", "classical", "common", "conventional", "customary", "fixed", "habitual", "historic", "long-established", "popular", "prescribed", "regular", "rooted", "time-honored", "universal", "widely used", "widespread" ------------------------------------------------------------------------------- NIT ------------------------------------------------------------------------------- All comments below are about very minor potential issues that you may choose to address in some way - or ignore - as you see fit. Some were flagged by automated tools (via https://github.com/larseggert/ietf-reviewtool), so there will likely be some false positives. There is no need to let me know what you did with these suggestions. Will note that the Shepherd's write-up already refects this nit. Reference [RFC4474] to RFC4474, which was obsoleted by RFC8224 (this may be on purpose). Section 4, paragraph 1 > es, per Section 5). At a high level, an "rsp" PASSporT is signed similarly to > ^^ Use "a" instead of "an" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 4, paragraph 3 > SIPBRANDY [RFC8862]. The handling of an "rsp" PASSporT differs from the handl > ^^ Use "a" instead of "an" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 5, paragraph 1 > ackwards direction is the only current defined way for secure indications of > ^^^^^^^^^^^^^^^ Make sure that the adjective "current" is correct. Possibly, it should be an adverb (typically ~ly) that modifies "defined". Possibly, it should be the first word in a compound adjective (hyphenated adjective). Possibly, it is correct. Section 5, paragraph 2 > ved in the dialog-initiating INVITE. An "rsp" PASSporT that signs a different > ^^ Use "A" instead of "An" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 5, paragraph 3 > R, a matter of local policy of the relying parties: some stricter systems may > ^^^^^^^ The verb "rely" requires the preposition "on" (or "upon"). Section 6, paragraph 2 > cases where it would be useful to relying parties, but recipients of a CANCE > ^^^^^^^ The verb "rely" requires the preposition "on" (or "upon"). Section 6, paragraph 2 > elying parties who intended to trust an "rsp" PASSporT MUST validate any "div > ^^ Use "a" instead of "an" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 7, paragraph 1 > ble, media should not be exchanged. Thus we assume that users have a way in t > ^^^^ A comma may be missing after the conjunctive/linking adverb "Thus". Section 8, paragraph 2 > ample.com/cert.cer" } The payload of an "rsp" PASSporT looks entirely like a > ^^ Use "a" instead of "an" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 8, paragraph 3 > elements appearing in the payload of an "rsp" type PASSporT. 10. UPDATE Pro > ^^ Use "a" instead of "an" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 11, paragraph 1 > as with "div," the "dest" element of an "rsp" PASSporT is signed, rather tha > ^^ Use "a" instead of "an" if the following word doesn't start with a vowel sound, e.g. "a sentence", "a university". Section 13, paragraph 1 > The value of a "rsp" PASSporT to relying parties, as with all PASSporTs, de > ^^^^^^^ The verb "rely" requires the preposition "on" (or "upon"). Section 13, paragraph 1 > with all PASSporTs, depends on the relying party trusting the certificate tha > ^^^^^^^ The verb "rely" requires the preposition "on" (or "upon"). Section 13, paragraph 1 > ider Codes (SPCs), effectively the relying party knows the network operator w > ^^^^^^^ The verb "rely" requires the preposition "on" (or "upon"). |
|
2025-05-06
|
06 | Mahesh Jethanandani | [Ballot Position Update] New position, No Objection, has been recorded for Mahesh Jethanandani |
|
2025-05-06
|
06 | Ketan Talaulikar | [Ballot comment] I support Med's discuss on clarification of relationship with RFC4916. I don't have the technical expertise in this area to evaluate or … [Ballot comment] I support Med's discuss on clarification of relationship with RFC4916. I don't have the technical expertise in this area to evaluate or recommend how that can be done. |
|
2025-05-06
|
06 | Ketan Talaulikar | [Ballot Position Update] New position, No Objection, has been recorded for Ketan Talaulikar |
|
2025-05-06
|
06 | Éric Vyncke | [Ballot Position Update] New position, No Objection, has been recorded for Éric Vyncke |
|
2025-05-04
|
06 | Jim Guichard | [Ballot Position Update] New position, No Objection, has been recorded for Jim Guichard |
|
2025-05-01
|
06 | Deb Cooley | [Ballot Position Update] New position, No Objection, has been recorded for Deb Cooley |
|
2025-04-30
|
06 | Roman Danyliw | [Ballot comment] Thank you to Elwyn B. Davies for the GENART review. Please consider the proposed editorial changes. I support Mohamed Boucadair DISCUSS position and … [Ballot comment] Thank you to Elwyn B. Davies for the GENART review. Please consider the proposed editorial changes. I support Mohamed Boucadair DISCUSS position and the feedback of the GENART reviewer on providing additional clarity in Section 10 on the relationship between this specification and RFC496. |
|
2025-04-30
|
06 | Roman Danyliw | [Ballot Position Update] New position, No Objection, has been recorded for Roman Danyliw |
|
2025-04-29
|
06 | Andy Newton | [Ballot Position Update] New position, No Objection, has been recorded for Andy Newton |
|
2025-04-29
|
06 | Gunter Van de Velde | [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-stir-rfc4916-update-06 # The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-stir-rfc4916-update-06.txt # … [Ballot comment] # Gunter Van de Velde, RTG AD, comments for draft-ietf-stir-rfc4916-update-06 # The line numbers used are rendered from IETF idnits tool: https://author-tools.ietf.org/api/idnits?url=https://www.ietf.org/archive/id/draft-ietf-stir-rfc4916-update-06.txt # General Review # ============== ## the document reads well and is nicely written. It handles technology i am not so familiar with and hence my review is from generalist perspective. ## Shepherd writeup seems based upon a year old prior draft (it references the prior responsible STIR WG AD and I missed finding the downref ) ## I suspect it was me being a RTG focused that terminology as swatting and vishing were things i have to do a short internet lookup. I guess in the field of this text, everybody is very well aware of this terminology ## The term "ppt" is used for the first time on line 231. I have not the faintest idea what is a ppt. Is this specified in an RFC? (i may have missed finding the reference). Maybe this is very well known terminology in this domain and my observation makes so sense as result. ## first use of 'div' on line 232 does not expand into RFC8946. however it does expand on line 234. Typically the first usage has the reference document associated. (minor idnit as both instances are so close to each other, only 2 lines difference). Another term was "orig" that i was not familiar with and failed to find a reference at first usage. # Detailed Review # =============== The abstract reads: 11 Abstract 12 13 The SIP Identity header conveys cryptographic identity information 14 about the originators of SIP requests. The Secure Telephone Identity 15 Revisited (STIR) framework however provides no means for determining 16 the identity of the called party in a traditional telephone calling 17 scenario. This document updates prior guidance on the "connected 18 identity" problem to reflect the changes to SIP Identity that 19 accompanied STIR, and considers a revised problem space for connected 20 identity as a means of detecting calls that have been retargeted to a 21 party impersonating the intended destination, as well as the spoofing 22 of mid-dialog or dialog-terminating events by intermediaries or third 23 parties. GV> Potentially alternative abstract textblob that could be mingled with the original.( i'll leave that to the authors to decide what they prefer): " The Identity header field defined for the Session Initiation Protocol (SIP) in RFC 4474 conveys cryptographic assurance of the identity of the originator of a SIP request. RFC 4916 extends this mechanism to support authenticated identity for the caller's asserted identity in certain contexts, particularly where privacy considerations or intermediaries modify the From header field. However, the authentication practices outlined in RFC 4916 do not align with the STIR (Secure Telephone Identity Revisited) architecture defined in RFC 8224. This document updates RFC 4916 to incorporate the PASSporT (Personal Assertion Token) format for conveying asserted identities, thereby enhancing security and interoperability within the STIR framework. This update ensures compatibility with modern SIP identity practices and strengthens the overall identity assurance in SIP networks. " 105 The property of providing identity of the called party to the calling 106 party is called "connected identity." Previous work on connected 107 identity focused on fixing the core semantics of SIP. [RFC4916] 108 allowed a mid-dialog request, such as an UPDATE [RFC3311], to convey 109 identity in either direction within the context of an existing 110 INVITE-initiated dialog. In an update to the original [RFC3261] 111 behavior, [RFC4916] allowed that UPDATE to alter the From header 112 field value for requests in the backwards direction: previously 113 [RFC3261] required that the From header field values sent in requests 114 in the backwards direction reflect the To header field value of the 115 dialog-forming request. Under the original [RFC3261] rules, if Alice 116 sent a dialog-forming request to Bob, then even if Bob's SIP service 117 forwarded that dialog-forming request to Carol, Carol would still be 118 required to put Bob's identity in the From header field value in any 119 mid-dialog requests in the backwards direction. GV> What about following blob: " The provision of identity information for the called party to the calling party is referred to as "connected identity." Prior work on connected identity focused on addressing shortcomings in the core semantics of SIP. [RFC4916] introduced mechanisms allowing a mid-dialog request, such as an UPDATE [RFC3311], to convey identity information in either direction within the context of an established INVITE-initiated dialog. Specifically, [RFC4916] updated the behavior originally defined in [RFC3261] by permitting an UPDATE to modify the From header field value for requests sent in the backwards (callee-to-caller) direction. Under the original RFC 3261 rules, requests in the backwards direction were required to use a From header field value reflecting the To header field value of the dialog-forming request. Consequently, under [RFC3261], if Alice initiated a dialog-forming request to Bob, and Bob’s SIP service subsequently forwarded the request to Carol, Carol would still be required to use Bob’s identity in the From header field of any mid-dialog requests sent in the backwards direction. " 143 One area of connected identity that is not explored in this document 144 is the implications for conferencing, especially meshed conferencing 145 systems. This scope of this mechanism is solely two-party 146 communications; multiparty sharing of connected identity is left for 147 future work. GV> What about the following textblob: " This document does not address the implications of connected identity in conferencing scenarios, particularly in meshed conferencing systems. The scope of the mechanism described herein is limited to two-party communications. The extension of connected identity mechanisms to multiparty communications is left for future work. " 228 This specification therefore adds provisional and final responses, 229 including the 100, 180, 183, and 200 responses, to the set of 230 messages that can contain an Identity header. PASSporTs that appear GV> What are 100, 180, 183 and 200 responses? 242 While it might seem attractive to provide identity for failure 243 response codes (4XX, 5XX, 6XX), those explicitly do not form dialogs 244 or connections, and are thus outside the scope of this specification. 245 The same applies to redirect (3XX) response codes, though see 246 [RFC8946] Section 7 for guidance on authentication redirection. GV> Do the 4XX, 5XX etc codes mean something in STIR technology domain? I am not sure what this refers towards or what the intent of this phrase is from a routing generalist perspective |
|
2025-04-29
|
06 | Gunter Van de Velde | [Ballot Position Update] New position, No Objection, has been recorded for Gunter Van de Velde |
|
2025-04-22
|
06 | Mohamed Boucadair | [Ballot discuss] Hi Jon and Chris, Thanks for the effort put into this document. Also, thanks to Ron Bonica for the OPSDIR review. # Shepherd … [Ballot discuss] Hi Jon and Chris, Thanks for the effort put into this document. Also, thanks to Ron Bonica for the OPSDIR review. # Shepherd Write-up ## The write-up does not follow the latest version [1]. ## The write-up includes: “The author has confirmed that he is unaware of any IPR disclosures that need to be submitted.” Is this only one specific author? If both authors have replied, maybe worth reflecting this in the write-up. Thanks. ## Downref The write-up indicates that there is no downref but the document cites RFC 3375 as normative. That downref is called in the IETF LC. That's said, that RFC should not be cited as normative at the first place. IMO, it should be cited as informative given that the only citation is: CURRENT: The establishment of media-less dialogs has long been specified as a component of third-party call control in SIP [RFC3375], in which an INVITE is sent with no SDP # DISCUSS ## Update or not update RFC4916? We say that the mechanism in 4916 is complex. We also recommend against it in general, except some “corner cases”. Also, I understand that we don’t specify a new "from-change" behavior, but still the discussion in Section 10 is sufficient in its own to weight the reco in 4916 with at least the complexity statement in this document. BTW, can we have some brief description of these corner cases? ## Security, Trust, & Privacy There are several statements that I think need some better scoping/caution as they may be misleading about provided security protection: (1) CURRENT: Some sort of directory service might exist advertising support for connected identity which institutions could use to inform potential callers that, if connected identity is supported when reaching them with SIP, there is a potential security problem. How to trust that? How this is maintained/populated? What about stale information? (2) CURRENT: previously supported connected identity, so that if support is unavailable later, calling users could be alerted to a potential security problem. This is challenging with number portability and may lead to “false positives”. (3) CURRENT: Similarly, when clicking on a telephone number viewed on a web page, or similar service, smartphones often prompt users approve the access to the outbound dialer. There is no guarantee that the displayed number corresponds to the actual request-uri of a session that will be issued. May be add a caution about risk with such uses. (4) CURRENT: probe what identity would be reached as a destination, and potentially even to exchange STIR PASSporTs in order to validate whether or not the expected destination can be reached securely. There is no correlation between the probed identities and the session that will be placed. Did I missed something? If not, adding some warning would be needed here. (5) I wonder whether the probing mentioned early in the document can also be used to help attacker adjust their strategies. If so, can we add a note about this? For example, the following can be used to detect when redirection/session transfer is in place and infer users activity (transfer of a fixed number for a long period can be a hint that users are abroad, for example)? CURRENT: Note that sending "div" PASSporTs in the backwards direction will potentially reveal service logic to the called party. As presumably this service logic is enacted on behalf of the called party, the called party can make a policy determination about reflecting those "div" PASSporTs back to the caller: connected identity may not be compatible with some operator policies. (6) There are other statements that are presented as providing better security while I think this is more about a "feeling of better secure". For example, CURRENT: Connected identity is very valuable for these use cases because it gives a strong assurance to the calling party that they have in fact reached the user for the called telephone number. Assuming the “trusted” device is not also hijacked! I would avoid claiming this is secure in an absolute manner. |
|
2025-04-22
|
06 | Mohamed Boucadair | [Ballot comment] # Group all Operational/Deployment considerations in a dedicated section There are several ops considerations that are spread in many parts of the document. … [Ballot comment] # Group all Operational/Deployment considerations in a dedicated section There are several ops considerations that are spread in many parts of the document. For the convenience of those who will deploy, it would be better to group these considerations in one section. For example, CURRENT: "div" is not universally supported, so calls MAY be retargeted without generating a "div" PASSporT, in which case the use of "rsp" PASSporTs will not be possible. Note that the decision to trust any "div" or "rsp" PASSporT is, as always in STIR, a matter of local policy of the relying parties: some stricter systems may not want to trust any "rsp" that differs from the "dest" in the PASSporT of the original request. Note that sending "div" PASSporTs in the backwards direction will potentially reveal service logic to the called party. As presumably this service logic is enacted on behalf of the called party, the called party can make a policy determination about reflecting those "div" PASSporTs back to the caller: connected identity may not be compatible with some operator policies. and CURRENT: This specification thus does not recommend PASSporTs for any requests sent in a dialog other than INVITE, UPDATE, and BYE. # STIR deployment assumptions Maybe that’s obvious for the authors/WG, but should we say early that the STIR benefits will be observed if all involved session parties are STIR-capable? # Logging CURRENT: While this specification does not prescribe any user experience associated with placing a call, it assumes that callers might have some way to a set an authorization posture that will result in the right thing happening when the connected identity is not expected. Can we have some reco for UAC to logs such events? In some contexts, this can be used for troubleshooting. # Back with a reference (1) CURRENT: SIP Identity header and the revised problem space of STIR. Please cite a reference for the revied pb space. (2) CURRENT: For example, there is a class of mobile fraud attacks ("call stretching") Do we have any ref about “call stretching” attack we can cite here? (3) CURRENT: and PRACK, and provisional responses Cite RFC3262? (4) CURRENT: Mid-dialog requests also require special handling in diversion cases. Relying parties who intended to trust an "rsp" PASSporT MUST validate any "div" chain back to the "rsp" PASSporT on any Identity header Can we have a pointer about how the chain validation is done? # On terminology The document makes use of STIR/SIP terms that need to be digested. Please add a note to Section 2 where readers can find those (“retargeting”, “SIP service”, etc.). Also, terms such as PAID are used without being introduced. Consider: s/the P-Asserted-Identity header/the P-Asserted-Identity (PAID) header # I don’t parse the following as RFC8862 is about best practices. Please elaborate. CURRENT: This document also addresses concerns about applying [RFC4916] connected identity to STIR discussed in the SIPBRANDY framework [RFC8862]. # Side note CURRENT: Moreover, on the Internet, the lack of any centralized or even federated routing system for telephone numbers has resulted in deployments where the (no change is needed) This reminds me TRIP (RFC3219) and its inherent support of policies; but the market decided otherwise. # Redundant behavior (1) Section 4 CURRENT: (although "div" MAY additionally appear in responses, per Section 5). No need to be redundant with Section 5. Keep the normative language in one place. Thanks. (2) Section 6 CURRENT: originating and terminating side, as well as any BYE requests, SHOULD contain Identity headers with valid PASSporTs. If only the terminating side supports connected identity, obviously the originator cannot be expected to know that it needs to send PASSporTs for subsequent requests like BYE. Doing so prevents third-parties from spoofing any mid-dialog requests in order to redirect media or similarly interfere with communications, as well as preventing denial of service teardowns by attackers, so it has clear benefits and is thus RECOMMENDED. There is a subtlety here but these SHOULD/RECOMMENDED are redundant IMO. Keep one. # NITS ## Please use “session” instead of “call” as the mechanism applied to any media session. Also consider using “terminating”/”initiating” parties rather that “called/calling”, etc. ## Expand STIR in the abstract ## SIP does not initiates sessions OLD: The Session Initiation Protocol (SIP) [RFC3261] initiates NEW: The Session Initiation Protocol (SIP) [RFC3261] is used to initiate ## Better Scope OLD: One area of connected identity that is not explored in this document is the implications for conferencing, especially meshed conferencing systems. This scope of this mechanism is solely two-party communications; multiparty sharing of connected identity is left for future work. NEW This document focuses solely two-party communications; multiparty sharing of connected identity is left for future work. Specifically, it is out of scope to explore the implications for conferencing, especially meshed conferencing systems. ## Past constructs Even if this was published in the past, many statements related to 4916 can still be used in present. Please update these statement to use present. For example, OLD: [RFC4916] allowed NEW: [RFC4916] allows Or OLD: [RFC4916] rightly observed NEW: [RFC4916] rightly observes Etc. ## Simplify OLD: It also explores some new features that would be enabled by connected identity for STIR, including the use of connected identity to prevent route hijacking and to notify callers when an expected called party has successfully been reached. NEW: It also explores some new features that would be enabled by connected identity for STIR, including to prevent route hijacking and to notify initiating parties when an expected terminating party has successfully been reached. ## Modern?! (1) CURRENT: The STIR problem statement [RFC7340] enumerates robocalling, voicemail hacking, vishing, and swatting as problems with the modern telephone network I would s/modern/IP-based (2) CURRENT: The user interface of modern smartphones support an address book from There was such address book even in old fixed phones ;-) I would delete “modern” mention. ## Generalize OLD: Finally, telephone numbers are widely used today for two-factor authentication (TFA) prior to accessing web resources, NEW: Finally, telephone numbers are widely used today for two-factor authentication (TFA) prior to accessing resources on the Internet, ## Straightforward CURRENT: In straightforward call setup, the address-of-record That is? Please consider s/ address-of-record/address-of-record (AoR). Then, use AoR in the remaining part of the text. ## Move upper as this convention is already used before this note. CURRENT: PASSporTs of the "rsp" type will be referred to throughout this specification as "rsp" PASSporTs. ## Be consistent with 3261 use + nit fix OLD: While it might seem attractive to provide identity for failure response codes (4XX, 5XX, 6XX), those explicitly do not form dialogs or connections, and are thus outside the scope of this specification. The same applies to redirect (3XX) response codes, though see [RFC8946] section 7 for guidance on authentication redirection. NEW: While it might seem attractive to provide identity for failure response codes (4xx, 5xx, 6xx), those explicitly do not form dialogs or connections, and are thus outside the scope of this specification. The same applies to redirect (3xx) response codes, though see Section 7 of [RFC8946] for guidance on authentication redirection. There are other similar occurrences in the document that need to be fixed. Cheers, Med [1] https://datatracker.ietf.org/doc/shepherdwriteup-template/workinggroup |
|
2025-04-22
|
06 | Mohamed Boucadair | Ballot comment and discuss text updated for Mohamed Boucadair |
|
2025-04-22
|
06 | Mohamed Boucadair | [Ballot discuss] Hi Jon and Chris, Thanks for the effort put into this document. Also, thanks to Ron Bonica for the OPSDIR review. # Shepherd … [Ballot discuss] Hi Jon and Chris, Thanks for the effort put into this document. Also, thanks to Ron Bonica for the OPSDIR review. # Shepherd Write-up ## The write-up does not follow the latest version [1]. ## The write-up includes: “The author has confirmed that he is unaware of any IPR disclosures that need to be submitted.” Is this only one specific author? If both authors have replied, maybe worth reflecting this in the write-up. Thanks. ## Downref The write-up indicates that there is no downref but the document cites RFC 3375 as normative. That downref is call in the IETF LC. That's said, that RFC should not be cited as normative at the first place. It should be cited as informative given that the only citation is: CURRENT: The establishment of media-less dialogs has long been specified as a component of third-party call control in SIP [RFC3375], in which an INVITE is sent with no SDP # DISCUSS ## Update or not update RFC4916? We say that the mechanism in 4916 is complex. We also recommend against it in general, except some “corner cases”. Also, I understand that that we don’t specify a new "from-change" behavior but still the discussion in Section 10 is sufficient in its own to warrant to weight the reco in 4916 with at least the complexity statement in this document. BTW, can we have some brief description of these corner cases? ## Security, Trust, & Privacy There are several statements that I think need some better scoping/caution as they may be misleading about provided security protection: (1) CURRENT: Some sort of directory service might exist advertising support for connected identity which institutions could use to inform potential callers that, if connected identity is supported when reaching them with SIP, there is a potential security problem. How to trust that? How this is maintained/populated? What about stale information? (2) CURRENT: previously supported connected identity, so that if support is unavailable later, calling users could be alerted to a potential security problem. This is challenging with number portability and may lead to “false positives”. (3) CURRENT: Similarly, when clicking on a telephone number viewed on a web page, or similar service, smartphones often prompt users approve the access to the outbound dialer. There is no guarantee that the displayed number corresponds to the actual request-uri of a session that will be issued. May be add a caution about risk with such uses. (4) CURRENT: probe what identity would be reached as a destination, and potentially even to exchange STIR PASSporTs in order to validate whether or not the expected destination can be reached securely. There is no correlation between the probed identities and the session that will be placed. Did I missed something? If not, adding some warning would be needed here. (5) I wonder whether the probing mentioned early in the document can also be used to help attacker adjust their strategies. If so, can we add a note about this to the document? For example, the following can can be used to detect when redirection is in place and infer users activity (redirection of a fixed number for a long period can be a hint that users are abroad, for example)? CURRENT: Note that sending "div" PASSporTs in the backwards direction will potentially reveal service logic to the called party. As presumably this service logic is enacted on behalf of the called party, the called party can make a policy determination about reflecting those "div" PASSporTs back to the caller: connected identity may not be compatible with some operator policies. (6) There are other statement that are presented as providing better security while I think this is more about a "feeling of better secure". For example, CURRENT: Connected identity is very valuable for these use cases because it gives a strong assurance to the calling party that they have in fact reached the user for the called telephone number. Assuming the “trusted” device is not also hijacked! I would avoid claiming this is secure in an absolute manner. |
|
2025-04-22
|
06 | Mohamed Boucadair | [Ballot comment] # Group all Operational/Deployment considerations in a dedicated section There are several ops considerations that are spread in many parts of the document. … [Ballot comment] # Group all Operational/Deployment considerations in a dedicated section There are several ops considerations that are spread in many parts of the document. For the convenience of those who will deploy, it would be better to group these considerations in one section. For example, CURRENT: "div" is not universally supported, so calls MAY be retargeted without generating a "div" PASSporT, in which case the use of "rsp" PASSporTs will not be possible. Note that the decision to trust any "div" or "rsp" PASSporT is, as always in STIR, a matter of local policy of the relying parties: some stricter systems may not want to trust any "rsp" that differs from the "dest" in the PASSporT of the original request. Note that sending "div" PASSporTs in the backwards direction will potentially reveal service logic to the called party. As presumably this service logic is enacted on behalf of the called party, the called party can make a policy determination about reflecting those "div" PASSporTs back to the caller: connected identity may not be compatible with some operator policies. and CURRENT: This specification thus does not recommend PASSporTs for any requests sent in a dialog other than INVITE, UPDATE, and BYE. # STIR deployment assumptions Maybe that’s obvious for the authors/WG, but should we say early that these STIR benefits will be observed if involved session parties are STIR-capable? # Logging CURRENT: While this specification does not prescribe any user experience associated with placing a call, it assumes that callers might have some way to a set an authorization posture that will result in the right thing happening when the connected identity is not expected. Can we have some reco for UAC to logs such events? In some contexts, this can be used for troubleshooting. # Back with a reference (1) CURRENT: SIP Identity header and the revised problem space of STIR. Please cite a reference for the revied pb space. (2) CURRENT: For example, there is a class of mobile fraud attacks ("call stretching") Do we have any ref about “call stretching” attack we can cite here? (3) CURRENT: and PRACK, and provisional responses Cite RFC3262? (4) CURRENT: Mid-dialog requests also require special handling in diversion cases. Relying parties who intended to trust an "rsp" PASSporT MUST validate any "div" chain back to the "rsp" PASSporT on any Identity header Can we have a pointer about how the chain validation is done? # On terminology The document makes use of STIR/SIP terms that need to be digested. Please add a note to Section 2 where readers can find those (“retargeting”, “SIP service”, etc.). Also, terms such as PAID are used without being introduced. Consider: s/the P-Asserted-Identity header/the P-Asserted-Identity (PAID) header # I don’t parse the following as RFC8862 is about best practices. Please elaborate. CURRENT: This document also addresses concerns about applying [RFC4916] connected identity to STIR discussed in the SIPBRANDY framework [RFC8862]. # Side note CURRENT: Moreover, on the Internet, the lack of any centralized or even federated routing system for telephone numbers has resulted in deployments where the (no change is needed) This reminds me TRIP (RFC3219) and its inherent support of policies; but the market decided otherwise. # Redundant behavior (1) Section 4 CURRENT: (although "div" MAY additionally appear in responses, per Section 5). No need to be redundant with Section 5. Keep the normative language in one place. Thanks. (2) Section 6 CURRENT: originating and terminating side, as well as any BYE requests, SHOULD contain Identity headers with valid PASSporTs. If only the terminating side supports connected identity, obviously the originator cannot be expected to know that it needs to send PASSporTs for subsequent requests like BYE. Doing so prevents third-parties from spoofing any mid-dialog requests in order to redirect media or similarly interfere with communications, as well as preventing denial of service teardowns by attackers, so it has clear benefits and is thus RECOMMENDED. There is a subtlety here but these SHOULD/RECOMMENDED are redundant IMO. Keep one. # NITS ## Please use “session” instead of “call” as the mechanism applied to any media session. Also consider using “terminating”/”initiating” parties rather that “called/calling”, etc. ## Expand STIR in the abstract ## SIP does not initiates sessions OLD: The Session Initiation Protocol (SIP) [RFC3261] initiates NEW: The Session Initiation Protocol (SIP) [RFC3261] is used to initiate ## Better Scope OLD: One area of connected identity that is not explored in this document is the implications for conferencing, especially meshed conferencing systems. This scope of this mechanism is solely two-party communications; multiparty sharing of connected identity is left for future work. NEW This document focuses solely two-party communications; multiparty sharing of connected identity is left for future work. Specifically, it is out of scope to explore the implications for conferencing, especially meshed conferencing systems. ## Past constructs Even if this was published in the past, many statements related to 4916 can still be used in present. Please update these statement to use present. For example, OLD: [RFC4916] allowed NEW: [RFC4916] allows Or OLD: [RFC4916] rightly observed NEW: [RFC4916] rightly observes Etc. ## Simplify OLD: It also explores some new features that would be enabled by connected identity for STIR, including the use of connected identity to prevent route hijacking and to notify callers when an expected called party has successfully been reached. NEW: It also explores some new features that would be enabled by connected identity for STIR, including to prevent route hijacking and to notify initiating parties when an expected terminating party has successfully been reached. ## Modern?! (1) CURRENT: The STIR problem statement [RFC7340] enumerates robocalling, voicemail hacking, vishing, and swatting as problems with the modern telephone network I would s/modern/IP-based (2) CURRENT: The user interface of modern smartphones support an address book from There was such address book even in old fixed phones ;-) I would delete “modern” mention. ## Generalize OLD: Finally, telephone numbers are widely used today for two-factor authentication (TFA) prior to accessing web resources, NEW: Finally, telephone numbers are widely used today for two-factor authentication (TFA) prior to accessing resources on the Internet, ## Straightforward CURRENT: In straightforward call setup, the address-of-record That is? Please consider s/ address-of-record// address-of-record (AoR). Then, use AoR in the remaining part of the text. ## Move upper as this convention is already used before this note. CURRENT: PASSporTs of the "rsp" type will be referred to throughout this specification as "rsp" PASSporTs. ## Be consistent with 3261 use + nit fix OLD: While it might seem attractive to provide identity for failure response codes (4XX, 5XX, 6XX), those explicitly do not form dialogs or connections, and are thus outside the scope of this specification. The same applies to redirect (3XX) response codes, though see [RFC8946] section 7 for guidance on authentication redirection. NEW: While it might seem attractive to provide identity for failure response codes (4xx, 5xx, 6xx), those explicitly do not form dialogs or connections, and are thus outside the scope of this specification. The same applies to redirect (3xx) response codes, though see Section 7 of [RFC8946] for guidance on authentication redirection. There are other similar occurrences in the document that need to be fixed. Cheers, Med [1] https://datatracker.ietf.org/doc/shepherdwriteup-template/workinggroup |
|
2025-04-22
|
06 | Mohamed Boucadair | [Ballot Position Update] New position, Discuss, has been recorded for Mohamed Boucadair |
|
2025-04-17
|
06 | Gorry Fairhurst | [Ballot Position Update] New position, No Objection, has been recorded for Gorry Fairhurst |
|
2025-03-28
|
06 | Erik Kline | [Ballot Position Update] New position, No Objection, has been recorded for Erik Kline |
|
2025-03-17
|
06 | Ron Bonica | Request for Telechat review by OPSDIR Completed: Ready. Reviewer: Ron Bonica. Sent review to list. |
|
2025-03-12
|
06 | Carlos Pignataro | Request for Telechat review by OPSDIR is assigned to Ron Bonica |
|
2025-03-12
|
06 | Mohamed Boucadair | Requested Telechat review by OPSDIR |
|
2025-03-11
|
06 | Cindy Morgan | Placed on agenda for telechat - 2025-05-08 |
|
2025-03-11
|
06 | Orie Steele | Ballot has been issued |
|
2025-03-11
|
06 | Orie Steele | [Ballot Position Update] New position, Yes, has been recorded for Orie Steele |
|
2025-03-11
|
06 | Orie Steele | Created "Approve" ballot |
|
2025-03-11
|
06 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2025-03-11
|
06 | Orie Steele | IESG state changed to IESG Evaluation from Waiting for AD Go-Ahead::Revised I-D Needed |
|
2025-01-20
|
07 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
|
2025-01-20
|
07 | Jon Peterson | Uploaded new revision |
|
2024-12-04
|
06 | Orie Steele | Authors, please respond to the reviews received on -06. |
|
2024-12-04
|
06 | (System) | Changed action holders to Jon Peterson, Chris Wendt (IESG state changed) |
|
2024-12-04
|
06 | Orie Steele | IESG state changed to Waiting for AD Go-Ahead::Revised I-D Needed from Waiting for AD Go-Ahead |
|
2024-11-23
|
06 | Elwyn Davies | Request for Last Call review by GENART Completed: Almost Ready. Reviewer: Elwyn Davies. Sent review to list. |
|
2024-11-19
|
06 | Jean Mahoney | Request for Last Call review by ARTART Completed: Ready with Nits. Reviewer: Jean Mahoney. Sent review to list. |
|
2024-11-19
|
06 | (System) | IESG state changed to Waiting for AD Go-Ahead from In Last Call |
|
2024-11-18
|
06 | David Dong | IANA Review state changed to IANA OK - Actions Needed from IANA - Not OK |
|
2024-11-18
|
06 | David Dong | IANA Experts State changed to Expert Reviews OK from Reviews assigned |
|
2024-11-18
|
06 | David Dong | IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-stir-rfc4916-update-06. If any part of this review is inaccurate, please let us know. The IANA understands that, … IESG/Authors/WG Chairs: IANA has completed its review of draft-ietf-stir-rfc4916-update-06. If any part of this review is inaccurate, please let us know. The IANA understands that, upon approval of this document, there is a single action which we must complete. In the Personal Assertion Token (PASSporT) Extensions registry in the Personal Assertion Token (PASSporT) registry group located at: https://www.iana.org/assignments/passport/ A single new extension will be registered as follows: ppt value: rsp Reference: [ RFC-to-be ] Because this registry requires Expert Review [RFC8126] for registration, we've contacted the IESG-designated expert in a separate ticket to request approval. Expert review should be completed before your document can be approved for publication as an RFC. We understand that this is the only action required to be completed upon approval of this document. NOTE: The action requested in this document will not be completed until the document has been approved for publication as an RFC. This message is meant only to confirm the action that will be performed. For definitions of IANA review states, please see: https://datatracker.ietf.org/help/state/draft/iana-review Thank you, David Dong IANA Services Sr. Specialist |
|
2024-11-18
|
06 | (System) | IANA Review state changed to IANA - Not OK from IANA - Review Needed |
|
2024-11-12
|
06 | Valery Smyslov | Request for Last Call review by SECDIR Completed: Has Nits. Reviewer: Valery Smyslov. Sent review to list. |
|
2024-11-08
|
06 | David Dong | IANA Experts State changed to Reviews assigned |
|
2024-11-07
|
06 | Jean Mahoney | Request for Last Call review by GENART is assigned to Elwyn Davies |
|
2024-11-07
|
06 | Tero Kivinen | Request for Last Call review by SECDIR is assigned to Valery Smyslov |
|
2024-11-05
|
06 | Barry Leiba | Request for Last Call review by ARTART is assigned to Jean Mahoney |
|
2024-11-05
|
06 | Cindy Morgan | IANA Review state changed to IANA - Review Needed |
|
2024-11-05
|
06 | Cindy Morgan | The following Last Call announcement was sent out (ends 2024-11-19): From: The IESG To: IETF-Announce CC: draft-ietf-stir-rfc4916-update@ietf.org, housley@vigilsec.com, orie@transmute.industries, stir-chairs@ietf.org, stir@ietf.org … The following Last Call announcement was sent out (ends 2024-11-19): From: The IESG To: IETF-Announce CC: draft-ietf-stir-rfc4916-update@ietf.org, housley@vigilsec.com, orie@transmute.industries, stir-chairs@ietf.org, stir@ietf.org Reply-To: last-call@ietf.org Sender: Subject: Last Call: (Connected Identity for STIR) to Proposed Standard The IESG has received a request from the Secure Telephone Identity Revisited WG (stir) to consider the following document: - 'Connected Identity for STIR' as Proposed Standard The IESG plans to make a decision in the next few weeks, and solicits final comments on this action. Please send substantive comments to the last-call@ietf.org mailing lists by 2024-11-19. Exceptionally, comments may be sent to iesg@ietf.org instead. In either case, please retain the beginning of the Subject line to allow automated sorting. Abstract The SIP Identity header conveys cryptographic identity information about the originators of SIP requests. The Secure Telephone Identity Revisited (STIR) framework however provides no means for determining the identity of the called party in a traditional telephone calling scenario. This document updates prior guidance on the "connected identity" problem to reflect the changes to SIP Identity that accompanied STIR, and considers a revised problem space for connected identity as a means of detecting calls that have been retargeted to a party impersonating the intended destination, as well as the spoofing of mid-dialog or dialog-terminating events by intermediaries or third parties. The file can be obtained via https://datatracker.ietf.org/doc/draft-ietf-stir-rfc4916-update/ No IPR declarations have been submitted directly on this I-D. The document contains these normative downward references. See RFC 3967 for additional information: rfc3375: Generic Registry-Registrar Protocol Requirements (Informational - Internet Engineering Task Force (IETF) stream) |
|
2024-11-05
|
06 | Cindy Morgan | IESG state changed to In Last Call from Last Call Requested |
|
2024-11-05
|
06 | Cindy Morgan | Last call announcement was generated |
|
2024-11-04
|
06 | Orie Steele | Last call was requested |
|
2024-11-04
|
06 | Orie Steele | Ballot approval text was generated |
|
2024-11-04
|
06 | Orie Steele | AD Evaluation Feedback has been addressed, ballot text has been revised: https://mailarchive.ietf.org/arch/msg/stir/1pSk2XB4PxSstjdGojxeau0hbhI/ |
|
2024-11-04
|
06 | Orie Steele | IESG state changed to Last Call Requested from AD Evaluation::AD Followup |
|
2024-11-04
|
06 | Orie Steele | Ballot writeup was changed |
|
2024-10-21
|
06 | Orie Steele | Last call announcement was generated |
|
2024-10-21
|
06 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2024-10-21
|
06 | (System) | Sub state has been changed to AD Followup from Revised I-D Needed |
|
2024-10-21
|
06 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-06.txt |
|
2024-10-21
|
06 | Jon Peterson | New version accepted (logged-in submitter: Jon Peterson) |
|
2024-10-21
|
06 | Jon Peterson | Uploaded new revision |
|
2024-07-28
|
05 | Orie Steele | Assuming some changes will be needed based on ad review of -05 https://mailarchive.ietf.org/arch/msg/stir/4HaNVpr6T1z-zPiPp35ggEFACDI/ |
|
2024-07-28
|
05 | (System) | Changed action holders to Jon Peterson, Chris Wendt (IESG state changed) |
|
2024-07-28
|
05 | Orie Steele | IESG state changed to AD Evaluation::Revised I-D Needed from AD Evaluation |
|
2024-07-28
|
05 | Orie Steele | IESG state changed to AD Evaluation from Publication Requested |
|
2024-07-08
|
05 | Russ Housley | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards track RFC is requested. Yes, this appears on the title page of the Internet-Draft. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The SIP Identity header conveys cryptographic identity information about the originators of SIP requests. However, the Secure Telephone Identity Revisited (STIR) framework provides no means for determining the identity of the called party in a traditional telephone calling scenario. This document updates prior guidance to reflect changes to SIP Identity that accompanied STIR, and offers a way to tell the originator the "connected identity". Tha is, the telephone number of the party that answered the call, even if the call was retargeted to party trying to impersonate the intended destination. Working Group Summary The STIR WG reached consensus, and there is support for publication of this document as a standards-track RFC. Document Quality Several people have expressed interest in implementing this specification. Personnel Russ Housley is the Document Shepherd. Murray Kucherawy is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd did a complete review of -04 during WG Last Call. Then, the ball got dropped, and the shepherd writeup was delayed. The ball has been found, revision -05 was posted to resolve the problems that were discovered, and we are (finally) moving the document forward. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns at all. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No additional review is needed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns at all. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. The author has confirmed that he is unaware of any IPR disclosures that need to be submitted. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures have been submitted against this document. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The STIR WG reached consensus, and there is support for publication of this document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened to appeal or expressed discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. IDnits raises a warnings: -- Obsolete informational reference (is this intentional?): RFC 4474 (Obsoleted by RFC 8224) This reference to RFC 4474 is needed. It is providing historical context. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No additional formal review is needed for this document. (13) Have all references within this document been identified as either normative or informative? Yes, informative and normative references appear is separate sections in the document. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? None. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no downrefs. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No, publication of this document will not change the status of any other documents. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This specification defines a new PASSporT type for the PASSport Extensions Registry: https://www.iana.org/assignments/passport/passport.xhtml#passport-extensions (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are created. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None is needed for this document. |
|
2024-07-08
|
05 | Russ Housley | IETF WG state changed to Submitted to IESG for Publication from WG Consensus: Waiting for Write-Up |
|
2024-07-08
|
05 | Russ Housley | IESG state changed to Publication Requested from I-D Exists |
|
2024-07-08
|
05 | (System) | Changed action holders to Orie Steele (IESG state changed) |
|
2024-07-08
|
05 | Russ Housley | Responsible AD changed to Orie Steele |
|
2024-07-08
|
05 | Russ Housley | Document is now in IESG state Publication Requested |
|
2024-07-08
|
05 | Russ Housley | Intended Status changed to Proposed Standard from None |
|
2024-07-08
|
05 | Russ Housley | (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? … (1) What type of RFC is being requested (BCP, Proposed Standard, Internet Standard, Informational, Experimental, or Historic)? Why is this the proper type of RFC? Is this type of RFC indicated in the title page header? Standards track RFC is requested. Yes, this appears on the title page of the Internet-Draft. (2) The IESG approval announcement includes a Document Announcement Write-Up. Please provide such a Document Announcement Write-Up. Recent examples can be found in the "Action" announcements for approved documents. The approval announcement contains the following sections: Technical Summary The SIP Identity header conveys cryptographic identity information about the originators of SIP requests. However, the Secure Telephone Identity Revisited (STIR) framework provides no means for determining the identity of the called party in a traditional telephone calling scenario. This document updates prior guidance to reflect changes to SIP Identity that accompanied STIR, and offers a way to tell the originator the "connected identity". Tha is, the telephone number of the party that answered the call, even if the call was retargeted to party trying to impersonate the intended destination. Working Group Summary The STIR WG reached consensus, and there is support for publication of this document as a standards-track RFC. Document Quality Several people have expressed interest in implementing this specification. Personnel Russ Housley is the Document Shepherd. Murray Kucherawy is the Responsible Area Director. (3) Briefly describe the review of this document that was performed by the Document Shepherd. If this version of the document is not ready for publication, please explain why the document is being forwarded to the IESG. The document shepherd did a complete review of -04 during WG Last Call. Then, the ball got dropped, and the shepherd writeup was delayed. The ball has been found, revision -05 was posted to resolve the problems that were discovered, and we are (finally) moving the document forward. (4) Does the document Shepherd have any concerns about the depth or breadth of the reviews that have been performed? No concerns at all. (5) Do portions of the document need review from a particular or from broader perspective, e.g., security, operational complexity, AAA, DNS, DHCP, XML, or internationalization? If so, describe the review that took place. No additional review is needed. (6) Describe any specific concerns or issues that the Document Shepherd has with this document that the Responsible Area Director and/or the IESG should be aware of? For example, perhaps he or she is uncomfortable with certain parts of the document, or has concerns whether there really is a need for it. In any event, if the WG has discussed those issues and has indicated that it still wishes to advance the document, detail those concerns here. No concerns at all. (7) Has each author confirmed that any and all appropriate IPR disclosures required for full conformance with the provisions of BCP 78 and BCP 79 have already been filed. If not, explain why. The author has confirmed that he is unaware of any IPR disclosures that need to be submitted. (8) Has an IPR disclosure been filed that references this document? If so, summarize any WG discussion and conclusion regarding the IPR disclosures. No IPR disclosures have been submitted against this document. (9) How solid is the WG consensus behind this document? Does it represent the strong concurrence of a few individuals, with others being silent, or does the WG as a whole understand and agree with it? The STIR WG reached consensus, and there is support for publication of this document. (10) Has anyone threatened an appeal or otherwise indicated extreme discontent? If so, please summarise the areas of conflict in separate email messages to the Responsible Area Director. (It should be in a separate email because this questionnaire is publicly available.) No one has threatened to appeal or expressed discontent. (11) Identify any ID nits the Document Shepherd has found in this document. (See https://www.ietf.org/tools/idnits/ and the Internet-Drafts Checklist). Boilerplate checks are not enough; this check needs to be thorough. IDnits raises a warnings: -- Obsolete informational reference (is this intentional?): RFC 4474 (Obsoleted by RFC 8224) This reference to RFC 4474 is needed. It is providing historical context. (12) Describe how the document meets any required formal review criteria, such as the MIB Doctor, media type, and URI type reviews. No additional formal review is needed for this document. (13) Have all references within this document been identified as either normative or informative? Yes, informative and normative references appear is separate sections in the document. (14) Are there normative references to documents that are not ready for advancement or are otherwise in an unclear state? If such normative references exist, what is the plan for their completion? None. (15) Are there downward normative references references (see RFC 3967)? If so, list these downward references to support the Area Director in the Last Call procedure. There are no downrefs. (16) Will publication of this document change the status of any existing RFCs? Are those RFCs listed on the title page header, listed in the abstract, and discussed in the introduction? If the RFCs are not listed in the Abstract and Introduction, explain why, and point to the part of the document where the relationship of this document to the other RFCs is discussed. If this information is not in the document, explain why the WG considers it unnecessary. No, publication of this document will not change the status of any other documents. (17) Describe the Document Shepherd's review of the IANA considerations section, especially with regard to its consistency with the body of the document. Confirm that all protocol extensions that the document makes are associated with the appropriate reservations in IANA registries. Confirm that any referenced IANA registries have been clearly identified. Confirm that newly created IANA registries include a detailed specification of the initial contents for the registry, that allocations procedures for future registrations are defined, and a reasonable name for the new registry has been suggested (see RFC 5226). This specification defines a new PASSporT type for the PASSport Extensions Registry: https://www.iana.org/assignments/passport/passport.xhtml#passport-extensions (18) List any new IANA registries that require Expert Review for future allocations. Provide any public guidance that the IESG would find useful in selecting the IANA Experts for these new registries. No new IANA registries are created. (19) Describe reviews and automated checks performed by the Document Shepherd to validate sections of the document written in a formal language, such as XML code, BNF rules, MIB definitions, etc. None is needed for this document. |
|
2024-07-07
|
05 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-05.txt |
|
2024-07-07
|
05 | Jon Peterson | New version accepted (logged-in submitter: Jon Peterson) |
|
2024-07-07
|
05 | Jon Peterson | Uploaded new revision |
|
2024-05-02
|
04 | Russ Housley | IETF WG state changed to WG Consensus: Waiting for Write-Up from WG Document |
|
2024-05-02
|
04 | Russ Housley | Document shepherd changed to Russ Housley |
|
2024-05-02
|
04 | Russ Housley | Notification list changed to housley@vigilsec.com |
|
2024-05-02
|
04 | Russ Housley | Changed consensus to Yes from Unknown |
|
2024-04-25
|
04 | (System) | Document has expired |
|
2023-11-09
|
04 | Ben Campbell | Added to session: IETF-118: stir Fri-0830 |
|
2023-10-23
|
04 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-04.txt |
|
2023-10-23
|
04 | (System) | New version approved |
|
2023-10-23
|
04 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
|
2023-10-23
|
04 | Jon Peterson | Uploaded new revision |
|
2023-07-07
|
03 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-03.txt |
|
2023-07-07
|
03 | Jon Peterson | New version accepted (logged-in submitter: Jon Peterson) |
|
2023-07-07
|
03 | Jon Peterson | Uploaded new revision |
|
2023-03-15
|
02 | Russ Housley | Added to session: IETF-116: stir Wed-0630 |
|
2023-03-13
|
02 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-02.txt |
|
2023-03-13
|
02 | Chris Wendt | New version approved |
|
2023-03-13
|
02 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
|
2023-03-13
|
02 | Jon Peterson | Uploaded new revision |
|
2022-10-24
|
01 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-01.txt |
|
2022-10-24
|
01 | (System) | New version approved |
|
2022-10-24
|
01 | (System) | Request for posting confirmation emailed to previous authors: Chris Wendt , Jon Peterson |
|
2022-10-24
|
01 | Jon Peterson | Uploaded new revision |
|
2022-10-23
|
00 | (System) | Document has expired |
|
2022-04-21
|
00 | Ben Campbell | Added to session: interim-2022-stir-01 |
|
2022-04-21
|
00 | Ben Campbell | This document now replaces draft-peterson-stir-rfc4916-update instead of None |
|
2022-04-21
|
00 | Jon Peterson | New version available: draft-ietf-stir-rfc4916-update-00.txt |
|
2022-04-21
|
00 | Ben Campbell | WG -00 approved |
|
2022-04-21
|
00 | Jon Peterson | Set submitter to "Jon Peterson ", replaces to draft-peterson-stir-rfc4916-update and sent approval email to group chairs: stir-chairs@ietf.org |
|
2022-04-21
|
00 | Jon Peterson | Uploaded new revision |