Skip to main content

Minutes IETF109: stir
minutes-109-stir-02

Meeting Minutes Secure Telephone Identity Revisited (stir) WG
Date and time 2020-11-20 09:00
Title Minutes IETF109: stir
State Active
Other versions plain text
Last updated 2020-11-24

minutes-109-stir-02
Minutes - STIR - IETF 109
Friday 2020-11-20 16:00 +07 (09:00 UTC)

Summary:

* Jon will remove the ability for intermediate CAs to sign certs from the
delegation draft. * draft-ietf-stir-rph-emergency-services (already post-wglc)
should be ready to submit to the IESG at this point. * We will issue a call for
WG adoption on draft-peterson-stir-messaging * There was suppport to adopt
draft-peterson-stir-rfc4916-update, but it may take a charter tweak. Murray
will evaluate.

--- Raw Notes (via codimd) ---
# STIR - IETF109

## Minute Takers, Jabber Scribe
Brian Rosen, Jean Mahoney - note takers
Russ will watch the chat room

## Agenda Bash
Chris would like to talk about a draft if there's time - related to errors with
multiple identity headers.

## Status of drafts between pubreq and RFC
oob and div - div is blocked on oob.
delegation - IESG review. Should intermediate CAs be able to sign certs?
Jon - do people feel strongly?
Russ - there are certain CA keys to sign with, but delegation was intended to
be lower in the chain - add to Sec Considerations. Chris - don't we create
delegate from intermediate certs? Jon - the only thing you can sign ... can't
sign passports with intermediate certs. How much do we care about aggregating
permissions from multiple certs Russ - It is ugly, work arounds exist, not
opposed to removal Jon - Okay with taking it out Chris - chains won't be that
long Ben - can always go back and add it with another draft Jon - sold

## draft-ietf-stir-passport-rcd – Chris Wendt
Simple fixes, including adding PAI to nam
Ready to go
sipcore-rcd-updates issues.  If no jcard, what do we do with the URL, I think
ignore Should call-reason have a cid? Jon - reason could be in a header. Hassle
to add a body just to contain a text string. How do you feel about clobbering
the Subject header field? RjS - coopting it would close doors with weird side
effect. Put it in a data URI? You can carry one in the header. Jon - data URI
is a pet peeve of mine, maybe time has come. We want more structure, data
structures for internationalization. If we can't use Subject, use Reason
header. Chris - seems potentially important. Just for a string, agree on that.
I'll ask on the list. Russ - please, and that's the SIPCORE list, correct?
Chris - yes.

## draft-ietf-stir-servprovider-oob - Jon Peterson
New idea, what if terminating service provider operates the OOB service.  No
need to encrypt PASSports, need CPS discovery. Need to wait another cycle to
advance the document. Lot of changes. Chris - Are you going to align with IPNNI
work going on? Jon - align with IETF security. It's a plausible security
environment.

## draft-ietf-stir-rph-emergency-services - Chris Wendt
Claims updates. auth instead of ESOrig and ESCallBack
RjS - could we send this to the IESG Dec/Jan?
Chris - that would be good.
RjS - nothing it's waiting on?
Chris - no. Nothing controversial left.
Brian - there's my draft which has to have a mechanism draft in sipcore. This
draft does not have a dependency on that draft.

## draft-peterson-stir-rfc4916-update - Jon Peterson
How to make Identity work in the backwards direction. Updates 4916.  Extends
scope of stir. Chris - +1 to the "before the call" use case. How to roll this
out when it's not globally supported. RjS - how many big companies leave the
calls in Ringing when the customer is in the IVR still? Just establishes early
media, and leaves you sitting there? Jon - isn't there a PRACK update? You get
a 183 you can PRACK it right? RjS - I think there's a missing step. You have to
have something to PRACK. Something to consider. Jon - don't need to solve it
here, but see if people are interested, if the WG wants to adopt. Ben - No
passport extension needed, right? No problem with orig claim being confused
with caller orig? Chris - could send rcd backwards, but don't need extension.

Chairs - do we think we should do this, and enough people to help? Murray, are
you comfortable that this is in charter or do we need to change it? Murray -
I'll take a look, maybe next week.

## draft-peterson-stir-messaging - Jon Peterson
Applies stir to messaging
For carrier messaging, could use same cert infrastructure

Brian - use MESSAGE for alarm - not 2-way. Working to make STIR applicable to
emergency calls because of swatting. We want to protect MESSAGE.

Should we define how any framework uses stir?, like MLS?
Chris - sframe - associating participants with each media stream, should
incorporate this framework. Russ - MLS focusing on encrypting group chat. Brian
- I need this. I want it and will work on it. Ben - intellectually, I really
like this. Reservation about whether it will get used - Google is using Signal
protocol for e2e encryption. Brian's use case is enough by itself. Chris - be
nice to have a common framework. tim costello - sounds like a good idea. Thomas
McCarthy-Howe - I can totally see this. I'm in. Russ - think we can do ...
without recharter. Brian - I need it bad enough that I don't want to get bogged
down in a generic framework. My simple use case will be waiting on that. Jon -
how to deal with a plurality of message types. Do we need typing of messages?
Brian - don't have an Identity header in those environments. Many things you
would have to do to do this outside of SIP. Chris - we have a generic passport,
think we have the bones. Jon - what I'm hearing from Brian - don't go crazy
with the scope. RjS - If we did magic and it was well-defined today, what does
the deployment pipeline look like. Take immediate advantage? Brian - we would
just do it anyway. In NEMA specs, for incoming emergency calls, an incoming
text - maybe MSRP - we assume we can use the Identity coming in with INVITE.
There's discussions with ATIS to sign outgoing calls from emergency services. I
think it's real simple. Jon - do you care if the message has been tampered
with? Brian - anything that improves integrity is worthwhile and we would
implement in a flash. Primary concern is swatting. Chris - If I send a picture
of crimescene, are there integrity issues. Brian - need to know who you are.
Identity is primary issue. Identity protection. Russ - do you care about
replay? Brian - message replay, yes. Russ - this mechanism doesn't give you
that. Brian - right. RjS - I heard a ton of interest. Can issue a call for
adoption on the list.

RjS - Chris, you had a draft you wanted to discuss?
Chris -
draft-wendt-stir-identity-header-errors-handling
A solution when you have multiple IDentity headers, some succeed, some fail.
Send back PASSporTs that had errors. Take a look. Suggest things. List
discussion would be appreciated. Jon - I'd rather do this then hack UIDs. Minor
reservation - the div part - reviewing service logic in the backwards direction
- someone may holler about. div is the failure. If there's a way to extract
PASSporTs. Chris - div is the exception. the critical usecase SHAKEN succeeds,
but rcd failed. Jon - it's a non-critical error, what you do when they report
them. Ben - Does OOB come into play here? Do this for OOB? Chris - I'll defer
to Jon, don't know if you can trace it all the way back. Jon - If we can patch
8224, I'd be happy. I don't want to put UIDs in PASSporTs. Chris - I don't
think using PASSporTs is a bad idea.

RjS - end of our agenda and AOB.