Messaging Use Cases and Extensions for STIR
draft-peterson-stir-messaging-01
Network Working Group J. Peterson
Internet-Draft Neustar
Intended status: Standards Track C. Wendt
Expires: August 26, 2021 Comcast
February 22, 2021
Messaging Use Cases and Extensions for STIR
draft-peterson-stir-messaging-01
Abstract
Secure Telephone Identity Revisited (STIR) provides a means of
attesting the identity of a telephone caller via a signed token in
order to prevent impersonation of a calling party number, which is a
key enabler for illegal robocalling. Similar impersonation is
sometimes leveraged by bad actors in the text messaging space. This
document considers the applicability of STIR's Persona Assertion
Token (PASSporT) and certificate issuance framework to instant text
and multimedia messaging use cases, both for messages carried or
negotiated by SIP, and for non-SIP messaging.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
This Internet-Draft will expire on August 26, 2021.
Copyright Notice
Copyright (c) 2021 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(https://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
Peterson & Wendt Expires August 26, 2021 [Page 1]
Internet-Draft STIR Messaging February 2021
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3
3. Applicability to Messaging Systems . . . . . . . . . . . . . 3
3.1. Message Sessions . . . . . . . . . . . . . . . . . . . . 4
3.2. PASSporTs and Messaging . . . . . . . . . . . . . . . . . 4
3.2.1. PASSporT Conveyance with Messaging . . . . . . . . . 5
4. Certificates and Messaging . . . . . . . . . . . . . . . . . 6
5. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
6.1. JSON Web Token Claims Registration . . . . . . . . . . . 6
6.2. PASSporT Type Registration . . . . . . . . . . . . . . . 7
7. Security Considerations . . . . . . . . . . . . . . . . . . . 7
8. References . . . . . . . . . . . . . . . . . . . . . . . . . 7
8.1. Normative References . . . . . . . . . . . . . . . . . . 7
8.2. Informative References . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 9
1. Introduction
The STIR problem statement [RFC7340] describes widespread problems
enabled by impersonation in the telephone network, including illegal
robocalling, voicemail hacking, and swatting. As telephone services
are increasingly migrating onto the Internet and using Voice over IP
(VoIP) protocols such as SIP [RFC3261], it is necessary for these
protocols to support stronger identity mechanisms to prevent
impersonation. [RFC8224] defines a SIP Identity header field capable
of carrying PASSporT [RFC8225] objects in SIP as a means to
cryptographically attest that the originator of a telephone call is
authorized to use the calling party number (or, for native SIP cases,
SIP URI) associated with the originator of the call.
The problem of bulk, unsolicited commercial communications is not
however limited to telephone calls. Although the problem is not
currently widespread, in some environments spammers and fraudsters
are turning to messaging applications to deliver undesired content to
Show full document text