
From richard@shockey.us  Sat Nov  2 14:46:40 2013
Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EC77921E80EE for <cnit@ietfa.amsl.com>; Sat,  2 Nov 2013 14:46:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.086
X-Spam-Level: 
X-Spam-Status: No, score=-101.086 tagged_above=-999 required=5 tests=[AWL=-0.448, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_BL_SPAMCOP_NET=1.96, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j15ZEA+G0DOF for <cnit@ietfa.amsl.com>; Sat,  2 Nov 2013 14:46:40 -0700 (PDT)
Received: from outbound-ss-1429.hostmonster.com (outbound-ss-1429.hostmonster.com [74.220.221.129]) by ietfa.amsl.com (Postfix) with SMTP id D8BD021E80B7 for <cnit@ietf.org>; Sat,  2 Nov 2013 14:46:23 -0700 (PDT)
Received: (qmail 5628 invoked by uid 0); 2 Nov 2013 21:46:18 -0000
Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy19-pub.mail.unifiedlayer.com with SMTP; 2 Nov 2013 21:46:18 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=4EmYlQ2AubMosQqJM1/t9Yrl71zwZ1xkp651pFooy8M=;  b=JVcZcMIM3FubgTW1nZNh2wDr3LAV7uIndA1jln5xNZea7QrY9f9GNeiK1gjsk0zOH4Kpc0cwz1XRpx/acmX8RZ+4fpbk3nZjiYVg6FMMh4l6R58H0jOyygzgoO+Ldg4n;
Received: from [173.79.179.104] (port=59618 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from <richard@shockey.us>) id 1Vcj1O-00070f-8T; Sat, 02 Nov 2013 15:46:18 -0600
From: "Richard Shockey" <richard@shockey.us>
To: "'Brian Rosen'" <br@brianrosen.net>, "'Paul Kyzivat'" <pkyzivat@alum.mit.edu>
References: <CE96DF15.3C8A3%york@isoc.org>	<B705AE1B-3B18-4F14-B81A-A7F6554DDC8E@brianrosen.net>	<52742C38.2000402@alum.mit.edu> <E6A478F1-C34A-490E-B7CE-E8E88C3C1FFB@brianrosen.net>
In-Reply-To: <E6A478F1-C34A-490E-B7CE-E8E88C3C1FFB@brianrosen.net>
Date: Sat, 2 Nov 2013 17:46:16 -0400
Message-ID: <018401ced814$f63b73c0$e2b25b40$@shockey.us>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0185_01CED7F3.6F2B5A60"
X-Mailer: Microsoft Outlook 15.0
Content-Language: en-us
Thread-Index: AQJdikwN8Jr5vD77bgIKtwNGTFzpuAEu++hsANQWoYECUhxDNJjSaMeg
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us}
Cc: stir@ietf.org, cnit@ietf.org
Subject: Re: [cnit] [stir] Application servers - Re: Call Center Implications
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 02 Nov 2013 21:46:41 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0185_01CED7F3.6F2B5A60
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I have to admit all of this discussion increasingly makes me =
uncomfortable.

=20

Complexity is the enemy of deployability and security.=20

=20

That is BTW the core problem some of us see in the PREPASS discussion.=20

=20

=93We have met the enemy and it is us.=94

=20

Validation of the Caller ID number and maybe possibly the Verbose =
Calling
Party data [CNAM+] better be pretty simple.  The chain of authority IMHO =
is
still derived at the first order from the Carrier of Record.  We can =
debate
the rest. =20

=20

I make no pretentions to being a Security expert.  One of our Co-Chairs =
is.
What I have not been able to see over some serious searching is the real
story about PKI. What are its successes and failures?  DANE vs DKIM vs =
WEB
PKI whatever. What do we say to NRA=92s?  Well this might work this =
might not
. =20

=20

Now we start playing the game of Economics.  President Truman was =
quoted. =20

=20

=93GIVE me a one-handed economist,=94 demanded a frustrated American =
president.
=93All my economists say, =91on the one hand...on the other'=94.=20

=20

From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of
Brian Rosen
Sent: Friday, November 01, 2013 8:20 PM
To: Paul Kyzivat
Cc: stir@ietf.org List
Subject: Re: [stir] Application servers - Re: Call Center Implications

=20

Yeah, could be.  We ought to at least be thinking about it.

=20

Maybe a delegation can limit what name can be used.

=20

Brian

=20

On Nov 1, 2013, at 6:33 PM, Paul Kyzivat <pkyzivat@alum.mit.edu
<mailto:pkyzivat@alum.mit.edu> > wrote:





On 11/1/13 3:22 PM, Brian Rosen wrote:



Look at this case from two points of view.

The one we=92re concerned about here in stir right now is the call =
chain.

I think the only thing that matters is that there can be multiple
credentials per number, including in this case, the service provider who
provides the actual TN service (who would handle a return call to the =
TN),
its subscriber (the enterprise), and the automated special service =
provider
you are concerned about.  They all have different credentials, any of =
which
can be used to sign for an outgoing call.  If the mass call out =
processor
has the credential, it can make calls, even if they don=92t come from =
the same
service provider that serves the subscriber. That=92s good.

Verifying has to be able to deal with this multiple credential per =
number
dealie.  I=92ll note that if the TN came through a reseller path, there =
might
be 6 or 7, or even more, authorized entities who can sign.  That leads =
us
towards some way to select the right credential that appears in the
signaling.  A query by TN to a database (regardless of protocol) would =
have
to return each of the credentials and the verifier would have to try =
them
sequentially unless it knew by something in the signaling which was the
right one.  The notion of sending a URI to the credential fixes this, =
but
there are other ways.

Now, this also means we need a highly automated way for these =
delegations to
be instantiated, so your automated self-service entity can get the
credential it needs without a human in the path.  I think that means =
that
the upwind delegator has to have an automated interface to create the
delegation, and the delegate has to have an automated interface to =
create or
retrieve the credential.

I have a bunch of thoughts on that, but I think we need to get the call
chain stuff completely worked out before we start worrying about the
provisioning aspects.


It occurs to me that this delegation may present different issues for =
cnit
than it does for stir. When somebody acquires a number, there might be
multiple names that they should be allowed to use with it. And when
delegating, they might not want to delegate the right to use all of =
those
names.

I mention it here because it might mean that stir and cnit have =
different
delegation needs. But if cnit wants to ride on stir's delegation coat =
tails,
it will have to be considered from the start.

               Thanks,
               Paul




Brian

On Nov 1, 2013, at 6:07 PM, Dan York <york@isoc.org =
<mailto:york@isoc.org> >
wrote:




Brian,


On 10/30/13 3:21 PM, "Brian Rosen" <br@brianrosen.net
<mailto:br@brianrosen.net> > wrote:




We have a separate list for caller name (cnit).


Ah, cool! I missed the notice back in late August that this list was
created.




I don=B9t see any difference between these authorized users of a TN and =
a
BPO.  The customer can get a credential authorized by the service
provider who delegated the TN to him.  The customer can then =
=B3delegate=B2
the BPO or the mass calling service provider to use that number on its
behalf.  There is no difference from our point of view why the =
authorized
entity is placing the call, what kind of service it offers, or how many
calls it places.  If it=B9s authorized by the subscriber to use the TN,
then the contractor can use the TN and sign for it.


Agreed.  At the highest level, it's fundamentally the same problem we're
trying to solve. My main point in raising it was that some of these
services may be very automated - even to the point of being entirely
self-service.  Again, it's not really any different from a huge call
center at a conceptual level.

Dan




_______________________________________________
stir mailing list
stir@ietf.org <mailto:stir@ietf.org>=20
https://www.ietf.org/mailman/listinfo/stir


_______________________________________________
stir mailing list
stir@ietf.org <mailto:stir@ietf.org>=20
https://www.ietf.org/mailman/listinfo/stir

=20


------=_NextPart_000_0185_01CED7F3.6F2B5A60
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Diso-8859-1"><meta name=3DGenerator content=3D"Microsoft Word =
15 (filtered medium)"><style><!--
/* Font Definitions */
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-tab-span
	{mso-style-name:apple-tab-span;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I have to admit all of this discussion increasingly makes me =
uncomfortable.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Complexity is the enemy of deployability and security. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>That is BTW the core problem some of us see in the PREPASS =
discussion. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&#8220;We have met the enemy and it is =
us.&#8221;<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Validation of the Caller ID number and maybe possibly the Verbose =
Calling Party data [CNAM+] better be pretty simple.=A0 The chain of =
authority IMHO is still derived at the first order from the Carrier of =
Record.=A0 We can debate the rest. =A0<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I make no pretentions to being a Security expert. =A0One of our =
Co-Chairs is.=A0 What I have not been able to see over some serious =
searching is the real story about PKI. What are its successes and =
failures?=A0 DANE vs DKIM vs WEB PKI whatever. What do we say to =
NRA&#8217;s?=A0 Well this might work this might not .=A0 =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Now we start playing the game of Economics.=A0 President Truman was =
quoted.=A0 <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&#8220;GIVE me a one-handed economist,&#8221; demanded a frustrated =
American president. &#8220;All my economists say, &#8216;on the one =
hand...on the other'&#8221;. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'> =
stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] <b>On Behalf Of =
</b>Brian Rosen<br><b>Sent:</b> Friday, November 01, 2013 8:20 =
PM<br><b>To:</b> Paul Kyzivat<br><b>Cc:</b> stir@ietf.org =
List<br><b>Subject:</b> Re: [stir] Application servers - Re: Call Center =
Implications<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Yeah, could =
be. &nbsp;We ought to at least be thinking about =
it.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Maybe a delegation can limit what name can be =
used.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Nov 1, 2013, at 6:33 PM, Paul Kyzivat &lt;<a =
href=3D"mailto:pkyzivat@alum.mit.edu">pkyzivat@alum.mit.edu</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'>On 11/1/13 3:22 PM, =
Brian Rosen wrote:<br><br><o:p></o:p></span></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'>Look at this case from =
two points of view.<br><br>The one we&#8217;re concerned about here in =
stir right now is the call chain.<br><br>I think the only thing that =
matters is that there can be multiple credentials per number, including =
in this case, the service provider who provides the actual TN service =
(who would handle a return call to the TN), its subscriber (the =
enterprise), and the automated special service provider you are =
concerned about. &nbsp;They all have different credentials, any of which =
can be used to sign for an outgoing call. &nbsp;If the mass call out =
processor has the credential, it can make calls, even if they =
don&#8217;t come from the same service provider that serves the =
subscriber. That&#8217;s good.<br><br>Verifying has to be able to deal =
with this multiple credential per number dealie. &nbsp;I&#8217;ll note =
that if the TN came through a reseller path, there might be 6 or 7, or =
even more, authorized entities who can sign. &nbsp;That leads us towards =
some way to select the right credential that appears in the signaling. =
&nbsp;A query by TN to a database (regardless of protocol) would have to =
return each of the credentials and the verifier would have to try them =
sequentially unless it knew by something in the signaling which was the =
right one. &nbsp;The notion of sending a URI to the credential fixes =
this, but there are other ways.<br><br>Now, this also means we need a =
highly automated way for these delegations to be instantiated, so your =
automated self-service entity can get the credential it needs without a =
human in the path. &nbsp;I think that means that the upwind delegator =
has to have an automated interface to create the delegation, and the =
delegate has to have an automated interface to create or retrieve the =
credential.<br><br>I have a bunch of thoughts on that, but I think we =
need to get the call chain stuff completely worked out before we start =
worrying about the provisioning =
aspects.<o:p></o:p></span></p></blockquote><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt'><br>It occurs to me that this delegation may =
present different issues for cnit than it does for stir. When somebody =
acquires a number, there might be multiple names that they should be =
allowed to use with it. And when delegating, they might not want to =
delegate the right to use all of those names.<br><br>I mention it here =
because it might mean that stir and cnit have different delegation =
needs. But if cnit wants to ride on stir's delegation coat tails, it =
will have to be considered from the start.<br><br><span =
class=3Dapple-tab-span>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =
</span>Thanks,<br><span =
class=3Dapple-tab-span>=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0=A0 =
</span>Paul<br><br><br><o:p></o:p></span></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'>Brian<br><br>On Nov 1, =
2013, at 6:07 PM, Dan York &lt;<a =
href=3D"mailto:york@isoc.org">york@isoc.org</a>&gt; =
wrote:<br><br><br><o:p></o:p></span></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'>Brian,<br><br><br>On =
10/30/13 3:21 PM, &quot;Brian Rosen&quot; &lt;<a =
href=3D"mailto:br@brianrosen.net">br@brianrosen.net</a>&gt; =
wrote:<br><br><br><o:p></o:p></span></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'>We have a separate =
list for caller name (cnit).<o:p></o:p></span></p></blockquote><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'><br>Ah, cool! I missed =
the notice back in late August that this list =
was<br>created.<br><br><br><o:p></o:p></span></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><p =
class=3DMsoNormal><span style=3D'font-size:9.0pt'>I don=B9t see any =
difference between these authorized users of a TN and a<br>BPO. =
&nbsp;The customer can get a credential authorized by the =
service<br>provider who delegated the TN to him. &nbsp;The customer can =
then =B3delegate=B2<br>the BPO or the mass calling service provider to =
use that number on its<br>behalf. &nbsp;There is no difference from our =
point of view why the authorized<br>entity is placing the call, what =
kind of service it offers, or how many<br>calls it places. &nbsp;If =
it=B9s authorized by the subscriber to use the TN,<br>then the =
contractor can use the TN and sign for =
it.<o:p></o:p></span></p></blockquote><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><span =
style=3D'font-size:9.0pt'><br>Agreed. &nbsp;At the highest level, it's =
fundamentally the same problem we're<br>trying to solve. My main point =
in raising it was that some of these<br>services may be very automated - =
even to the point of being entirely<br>self-service. &nbsp;Again, it's =
not really any different from a huge call<br>center at a conceptual =
level.<br><br>Dan<br><br><o:p></o:p></span></p></blockquote><p =
class=3DMsoNormal style=3D'margin-bottom:12.0pt'><span =
style=3D'font-size:9.0pt'><br>___________________________________________=
____<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org/=
mailman/listinfo/stir</a><o:p></o:p></span></p></blockquote><p =
class=3DMsoNormal><span =
style=3D'font-size:9.0pt'><br>___________________________________________=
____<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org/=
mailman/listinfo/stir</a><o:p></o:p></span></p></div></blockquote></div><=
p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_000_0185_01CED7F3.6F2B5A60--


From richard@shockey.us  Wed Nov  6 05:29:59 2013
Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3D3F911E81B7 for <cnit@ietfa.amsl.com>; Wed,  6 Nov 2013 05:29:59 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.997
X-Spam-Level: 
X-Spam-Status: No, score=-101.997 tagged_above=-999 required=5 tests=[AWL=0.268, BAYES_00=-2.599, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yKy0diDI9mtc for <cnit@ietfa.amsl.com>; Wed,  6 Nov 2013 05:29:54 -0800 (PST)
Received: from oproxy7-pub.mail.unifiedlayer.com (oproxy7-pub.mail.unifiedlayer.com [67.222.55.9]) by ietfa.amsl.com (Postfix) with SMTP id 5798F11E8197 for <cnit@ietf.org>; Wed,  6 Nov 2013 05:29:50 -0800 (PST)
Received: (qmail 4313 invoked by uid 0); 6 Nov 2013 13:29:27 -0000
Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy7.mail.unifiedlayer.com with SMTP; 6 Nov 2013 13:29:27 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default;  h=Content-Transfer-Encoding:Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=iBKIyZwiZBuC+2IulKm6PETGDrpBlVIbwAoDJ7F8Cdw=;  b=LokQUecljfhNnVQXiHNV9cWYomkuWo0kFv14nDEswKoz1/qbyjUVD6Ak9bcgLtbDjtlVxdE7KoTpN9L4yK1F9cKuU5+5zzGrVR7Vis/Eo5CjpXVr580XmEpYHyMJZshI;
Received: from [173.79.179.104] (port=49307 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from <richard@shockey.us>) id 1Ve3Ak-0005mt-5k; Wed, 06 Nov 2013 06:29:26 -0700
From: "Richard Shockey" <richard@shockey.us>
To: "'Dan York'" <york@isoc.org>
References: <32C55AFE-FA17-4776-AD91-259AD3E226BE@brianrosen.net>	<CE95977C.3C181%york@isoc.org>	<024001ced5a2$f3268810$d9739830$@shockey.us>	<029501ced5b5$8fa9f480$aefddd80$@shockey.us>	<2AA32171-1AE3-4AEE-AEDC-B2031562B7BD@brianrosen.net>	<00d901ced637$9e8143a0$db83cae0$@shockey.us>	<8B0027B8-D777-48F3-B5BF-B8F81F038E37@brianrosen.net>, <020a01ced680$caf4ec90$60dec5b0$@shockey.us> <DF50A190-CF63-4C2A-BC95-715FD736075E@isoc.org>
In-Reply-To: <DF50A190-CF63-4C2A-BC95-715FD736075E@isoc.org>
Date: Wed, 6 Nov 2013 08:29:24 -0500
Message-ID: <013b01cedaf4$367b2ac0$a3718040$@shockey.us>
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQLTdCvgrcMvmbDsv2xAt2r4G5TZbQLC46EgAqz016cBpe129QIWVK8PAdOJjcEBFampjAB5gRUxAqM7HPqXlW65MA==
Content-Language: en-us
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us}
Cc: cnit@ietf.org, 'DISPATCH' <dispatch@ietf.org>, 'Brian Rosen' <br@brianrosen.net>
Subject: Re: [cnit] [stir] Application servers - Re: Call Center Implications
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Nov 2013 13:29:59 -0000

-----Original Message-----
From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf Of Dan
York
Sent: Thursday, October 31, 2013 8:24 PM
To: Richard Shockey
Cc: cnit@ietf.org; DISPATCH; Brian Rosen
Subject: Re: [cnit] [stir] Application servers - Re: Call Center
Implications

Richard,

> On Oct 31, 2013, at 5:34 PM, "Richard Shockey" <richard@shockey.us> wrote:
> 
> I am very interested in working on improving caller name.
> 
> [RS> ]  So I'm not completely insane?  :-)  

Welllllll... we can debate that! ;-) But... If you are insane then a number
of us are because I, too, am interested in working on this.

> Ok then it seams the
> conversation is worth having and there is productive work here ..

I will admit that when we started working on STIR, I had it in my head that
when we talking about "secure origin identification" we were talking about
BOTH the phone number and the displayed caller name. I don't think securing
ONLY the phone number fully helps regular users, because the regular person
out there usually looks at (and trusts!) the displayed "Caller ID". 

If we secure the phone number but not the display name, attackers/spammers
are simply going to figure out ways to send a valid phone number but a
confusing display name. Sure, the secured phone number may help track the
attacker down, but in the meantime victims have been fooled into giving up
information. 

[RS> ]  I agree.  We will have to do both eventually.  


So I think we have to look at how we secure both.

> See you in
> London.  

Why London? Are you not in Vancouver? Or were you just saying this is
post-Vancouver work?

[RS> ]  Obviously not enough time to organize a Goals and Requirements or a
draft charter etc.  I'm not in Vancouver. Its something to properly organize
and present in London. 




Dan
_______________________________________________
cnit mailing list
cnit@ietf.org
https://www.ietf.org/mailman/listinfo/cnit


From richard@shockey.us  Wed Nov  6 13:11:16 2013
Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 90AE221E81C3 for <cnit@ietfa.amsl.com>; Wed,  6 Nov 2013 13:11:16 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.184
X-Spam-Level: 
X-Spam-Status: No, score=-102.184 tagged_above=-999 required=5 tests=[AWL=0.414, BAYES_00=-2.599, HTML_MESSAGE=0.001, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NI8LiognVT4w for <cnit@ietfa.amsl.com>; Wed,  6 Nov 2013 13:11:07 -0800 (PST)
Received: from oproxy17-pub.mail.unifiedlayer.com (oproxy17-pub.mail.unifiedlayer.com [74.220.201.171]) by ietfa.amsl.com (Postfix) with SMTP id DDB9D21E8198 for <cnit@ietf.org>; Wed,  6 Nov 2013 13:11:02 -0800 (PST)
Received: (qmail 10928 invoked by uid 0); 6 Nov 2013 21:10:58 -0000
Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy17-pub.mail.unifiedlayer.com with SMTP; 6 Nov 2013 21:10:58 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=077RVOZW91O/k6NGWYrHiKBcwJoqGCEi4HaXP5lJkfQ=;  b=FG6YumXCMH9T8HsWWx+yCZlrQXhLgGK6pjtMdd4s7ImuZrhiZ01l3AnpBh27spkR8fTRewCcv2W9Lw1Phu7x67VsWkEW1nA8RXlVKIsXI7iJ2/CRO/nb77qP3VlZKYR2;
Received: from [173.79.179.104] (port=54874 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from <richard@shockey.us>) id 1VeANN-00030h-6h; Wed, 06 Nov 2013 14:10:57 -0700
From: "Richard Shockey" <richard@shockey.us>
To: "'Brian Rosen'" <br@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>
In-Reply-To: <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>
Date: Wed, 6 Nov 2013 16:10:55 -0500
Message-ID: <02e301cedb34$af790790$0e6b16b0$@shockey.us>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_02E4_01CEDB0A.C6AC9C80"
X-Mailer: Microsoft Outlook 15.0
Thread-Index: AQKuxOgdsFN95Qgmj4nb3bGbN4Q20wEejKIqAhCsH9QBYcTrs5g0U4aQ
Content-Language: en-us
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us}
Cc: stir@ietf.org, "'Gorman, Pierce A \[NTK\]'" <Pierce.Gorman@sprint.com>, cnit@ietf.org, "'Fernando Mousinho \(fmousinh\)'" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 06 Nov 2013 21:11:16 -0000

This is a multipart message in MIME format.

------=_NextPart_000_02E4_01CEDB0A.C6AC9C80
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

URI for a JCARD in the CALL INFO header provisioned by the calling party and
ultimately signed by the responsible entity.  The carrier could provision
this for their mobile or hosted customers.  Enterprises could do this
themselves.  This also has advantages in Enterprise to Enterprise UC as well
where the data is derived from the Enterprise "directory" and could
facilitate end to end PPX to PBX communications especially in point to point
video communications. 

 

There are certainly privacy and security issues to be addressed.  The Push
vs Pull model.  This really would be PII in the clear but then its done
voluntarily. 

 

There would have to be some work around restructuring the Header and adding
some parameters but it's underutilized right now and this Use Case is a
perfectly appropriate use. 

 

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

 

Obviously it would need to be signed but we don't need to worry about that
..yet. 

 

>From 3261 

 

20.9 Call-Info

 

   The Call-Info header field provides additional information about the

   caller or callee, depending on whether it is found in a request or

   response.  The purpose of the URI is described by the "purpose"

   parameter.  The "icon" parameter designates an image suitable as an

   iconic representation of the caller or callee.  The "info" parameter

   describes the caller or callee in general, for example, through a web

   page.  The "card" parameter provides a business card, for example, in

   vCard [36] or LDIF [37] formats.  Additional tokens can be registered

   using IANA and the procedures in Section 27.

 

   Use of the Call-Info header field can pose a security risk.  If a

   callee fetches the URIs provided by a malicious caller, the callee

   may be at risk for displaying inappropriate or offensive content,

   dangerous or illegal content, and so on.  Therefore, it is

   RECOMMENDED that a UA only render the information in the Call-Info

   header field if it can verify the authenticity of the element that

   originated the header field and trusts that element.  This need not

   be the peer UA; a proxy can insert this header field into requests.

 

   Example:

 

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=icon,

     <http://www.example.com/alice/> ;purpose=info

 

From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

We've considered adding some information that is not number and is not name,
but is something like "bank", which might have some sort of validation
behind it.

 

Is that along the lines you were thinking?

 

Brian

On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us
<mailto:richard@shockey.us> > wrote:





I agree with Pierce here and respectfully disagree that STIR might eliminate
the need for other forms of caller identification.  Though your use case of
credit card validation is a useful one and you are right there are still
applications that use SS7 for things that have nothing to do with call
setup. I agree with you STIR may have more applications beyond the obvious
ones of realtime session validation.

 

It's been my experience recently that there is a use case for something MORE
in the identification of the session as it is presented to the called party.
This is the CNAM + idea we are kicking around on the CNIT list.

 

_______________________________________________

cnit mailing list

 <mailto:cnit@ietf.org> cnit@ietf.org

 <https://www.ietf.org/mailman/listinfo/cnit>
https://www.ietf.org/mailman/listinfo/cnit

 

But your use case of a bank wanting to make sure they could properly
identify themselves to the consumer before establishing a conversation is
exactly what this process is about.  STIR is essential but it's a
multi-faceted problem that may require multi-faceted solutions.. and
enhanced CNAM + being only one of them.   Its not unreasonable to discuss
those.

 

The obviously analogy is I would want to see some real identification of a
utility worker before I let them into my house to make repairs.  I would
want some validation that the call to me to reconfirm the appointments was
in fact from the utility in question.

 

 

 

From: stir-bounces@ietf.org <mailto:stir-bounces@ietf.org>
[mailto:stir-bounces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org <mailto:stir@ietf.org> 
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Let me rephrase it. it may eliminate the need for other forms of caller
identification beyond what STIR will provide, depending on the specific use
case. For example, a credit card company may choose to rely entirely on STIR
before allowing a card to be unblocked by an IVR (and as I said earlier,
many companies do it today). In other use cases, the TN alone is not
sufficient information - my health care provider will want to know which
member of the family is calling.

 

I agree that ANI is already broadly used to improve customer service today.
However, it is not usually deemed as a secure enough mechanism to validate
the caller (therefore this WG!), except if you are a large organization that
can leverage things like SS7. STIR would make this type of validation
available to a broader number of companies.

 

 

Going on a tangent. perhaps this is out of scope, but there is not a lot of
discussion about called party hijacking. Couldn't a man-in-the-middle try to
answer calls on my behalf? If my bank is calling me, I want to make sure
it's really them before carrying a conversation, but wouldn't they want the
same? 

 

 

From: <Gorman>, "Pierce A [NTK]" < <mailto:Pierce.Gorman@sprint.com>
Pierce.Gorman@sprint.com>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho < <mailto:fmousinh@cisco.com> fmousinh@cisco.com>, "
<mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

I agree with your characterization of businesses as victim of caller ID
fraud however contact centers also use TN as a key to improve information
available to call agents to reduce average time-per-call and increase
capacity of the call center.  So I don't agree that STIR would "eliminate
the need for caller identification from known TNs."

 

But perhaps I misunderstood your last sentence?

 

 

From: Fernando Mousinho (fmousinh) [ <mailto:fmousinh@cisco.com>
mailto:fmousinh@cisco.com] 
Sent: November 05, 2013 4:34 PM
To:  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I would suggest we add a new attack type to section 3. More and more
companies are using the caller ID for account validation. For example, if I
call my credit card provider from my office number, they ask me for
identification. If I call from my home phone number, I'm informed that I
don't need to provide any further identification because my number is on
file. Some (all?) companies that implement this type of validation rely on
SS7 today.

 

Ultimately, this is yet another variation of impersonation - but in this
case, the "victim" is a business, unlike the other two scenarios we've
listed so far.

 

Addressing this scenario would actually turn STIR into a feature, given it
would enable contact centers of all sizes to eliminate the need for caller
identification from known TNs.

 

 

 

From: Alex Bobotek < <mailto:alex@bobotek.net> alex@bobotek.net>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen < <mailto:br@brianrosen.net> br@brianrosen.net>, "Peterson,
Jon" < <mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>
Cc: " <mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us>, "'DOLLY, MARTIN C'" < <mailto:md3135@att.com>
md3135@att.com>, 'Robert Sparks' < <mailto:rjsparks@nostrum.com>
rjsparks@nostrum.com>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Jon,

 

Thanks for the response.  The intention in #1 below is to clarify the
following sentence:

 

The primary attack vector is

   therefore one where the attacker contrives for the calling telephone

   number in signaling to be a particular chosen number, one that the

   attacker does not have the authority to call from, in order for that

   number to be rendered on the terminating side. 

 

This might be misconstrued as indicating that the objective of spoofing is
simply the rendering of a spoofed number on the receiving display, causing
mistaken conclusions that defenses might be limited to securing the rendered
information.  No issues with leaving this as it's a valid point.  Another
(increasing) motivation is to evade network and/or endpoint defenses that
may block based on CPN. 

 

So however it's worded, I think it's important to allow for both attack
objectives of a spoofed presentation at the endpoint and in transit.   

 

Regards,

 

Alex

 

> -----Original Message-----

> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc:  <mailto:stir@ietf.org> stir@ietf.org; Alex Bobotek; 'Robert Sparks';
'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> 

> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

> 

> Brian

> 

> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <
<mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>

> wrote:

> 

> > Thanks for these notes, Alex. Some responses below.

> >

> >> Here are several comments that should feed into the IETF Peterson
draft:

> >>

> >> *   Remove any assumptions that the solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions should be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can usually be

> > implemented in either endpoints or in intermediaries of various kinds.

> > If I see text that implies otherwise, I'll certainly change it.

> >

> >> *   Add a sessionless attack scenario.  A spam payload may be carried
in

> a

> >> SIP INVITE or MESSAGE, which might contain stock market advice even

> >> in a display name field.  These attacks do NOT require session

> establishment.

> >> More generally, we should be mindful of the fact that SIP is used in

> >> telephony form more than voice session setup.

> >

> > Probably if we were going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the PSTN over

> > TCAP or with some Internet protocol, including MESSAGE) rather than

> > with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this below with your suggested

> text.

> >

> >> Here's some suggested markup:

> >>

> >>

> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:

> >>

> >> The primary attack vector is

> >>  therefore one where the attacker contrives for the calling telephone

> >> number in signaling to be a particular chosen number that the

> >> attacker does not have the authority to call from.

> >

> > What you want here is to remove the implication that the number will

> > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, I would say it is significant

> > in the primary attack vectors that concern us.

> >

> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:

> >>

> >>     Smart devices are generally based on computers with some degree

> >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio and/or images.  This includes

> >> smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.

> >

> > I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3.3 Attack Scenarios:

> >>

> >>       Impersonation, IP-Mobile Text Message

> >>

> >>        An attacker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using randomized calling

> >> party numbers.

> >>

> >>       Countermeasure: in-band authenticated identity

> >

> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeasure. I am curious though

> > whether practically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over MESSAGE

> > today. Either way, no problem having an attack scenario of this form in
the

> document.

> >

> > Jon Peterson

> > Neustar, Inc.

> >

> >> Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of Richard Shockey

> >>> Sent: Monday, September 30, 2013 1:11 PM

> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> +1

> >>>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM

> >>> To: Robert Sparks

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> Yes, ok

> >>>

> >>> Martin Dolly

> >>> Lead Member of Technical Staff

> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network

> >>> Technology

> >>> +1-609-903-3360

> >>>  <mailto:md3135@att.com> md3135@att.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"

> >>>> < <mailto:rjsparks@nostrum.com> rjsparks@nostrum.com>

> >>> wrote:

> >>>>

> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:

> >>>>> With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >>>>

> >>>> Just to make sure - I think you're referring to Hadriel's comments

> >>>> on the

> >>> problem statement document?

> >>>> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

> >>>> In any case, we _are_ talking about a starting place, not a

> >>>> finished

> >>> product.

> >>>>

> >>>> If there's no other objection, I'd like to get Jon to submit the

> >>>> threats

> >>> document as a WG -00 as soon as it's convenient.

> >>>>

> >>>> RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On

> >>>>> Behalf Of Russ Housley

> >>>>> Sent: Thursday, September 26, 2013 4:37 PM

> >>>>> To: IETF STIR Mail List

> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from more people about this

> >>> document.  Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>>> Russ

> >>>>>

> >>>>>

> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:

> >>>>>>

> >>>>>>  <http://www.ietf.org/id/draft-peterson-stir-threats-00.txt>
http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group adopt this I-D as the starting point for

> >>>>>> the

> >>> STIR threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _______________________________________________

> >>>>> stir mailing list

> >>>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>>

> >>>> _______________________________________________

> >>>> stir mailing list

> >>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >> _______________________________________________

> >> stir mailing list

> >>  <mailto:stir@ietf.org> stir@ietf.org

> >>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >

> > _______________________________________________

> > stir mailing list

> >  <mailto:stir@ietf.org> stir@ietf.org

> >  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> 

> _______________________________________________

> stir mailing list

>  <mailto:stir@ietf.org> stir@ietf.org

>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


  _____  



This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

_______________________________________________
stir mailing list
stir@ietf.org <mailto:stir@ietf.org> 
https://www.ietf.org/mailman/listinfo/stir

 


------=_NextPart_000_02E4_01CEDB0A.C6AC9C80
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity. &nbsp;The carrier =
could provision this for their mobile or hosted customers.&nbsp; =
Enterprises could do this themselves.&nbsp; This also has advantages in =
Enterprise to Enterprise UC as well where the data is derived from the =
Enterprise &#8220;directory&#8221; and could facilitate end to end PPX =
to PBX communications especially in point to point video communications. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There are certainly privacy and security issues to be =
addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be PII =
in the clear but then its done voluntarily. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There would have to be some work around restructuring the Header and =
adding some parameters but it&#8217;s underutilized right now and this =
Use Case is a perfectly appropriate use. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06">https:/=
/tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</a><o:p></o:p></span></=
p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Obviously it would need to be signed but we don&#8217;t need to worry =
about that ..yet. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>From 3261 <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>20.9 Call-Info<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; The Call-Info header field provides additional =
information about the<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; caller or callee, depending on whether it is found in a =
request or<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; response.&nbsp; The purpose of the URI is described by =
the &quot;purpose&quot;<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; parameter.&nbsp; The &quot;icon&quot; parameter =
designates an image suitable as an<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; iconic representation of the caller or callee.&nbsp; The =
&quot;info&quot; parameter<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; describes the caller or callee in general, for example, =
through a web<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; page.&nbsp; The &quot;card&quot; parameter provides a =
business card, for example, in<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; Additional tokens =
can be registered<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; using IANA and the procedures in Section =
27.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Use of the Call-Info header field can pose a security =
risk.&nbsp; If a<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; callee fetches the URIs provided by a malicious caller, =
the callee<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; may be at risk for displaying inappropriate or offensive =
content,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; dangerous or illegal content, and so on.&nbsp; =
Therefore, it is<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; RECOMMENDED that a UA only render the information in the =
Call-Info<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; header field if it can verify the authenticity of the =
element that<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; originated the header field and trusts that =
element.&nbsp; This need not<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; be the peer UA; a proxy can insert this header field =
into requests.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Example:<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Call-Info: =
&lt;http://wwww.example.com/alice/photo.jpg&gt; =
;purpose=3Dicon,<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp; &lt;http://www.example.com/alice/&gt; =
;purpose=3Dinfo<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'> Brian =
Rosen [mailto:br@brianrosen.net] <br><b>Sent:</b> Wednesday, November =
06, 2013 3:41 PM<br><b>To:</b> Richard Shockey<br><b>Cc:</b> Fernando =
Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org =
List<br><b>Subject:</b> Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>We&#8217;ve =
considered adding some information that is not number and is not name, =
but is something like &#8220;bank&#8221;, which might have some sort of =
validation behind it.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Is that along the lines you were =
thinking?<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p><div><div><p class=3DMsoNormal>On =
Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.&nbsp; =
Though your use case of credit card validation is a useful one and you =
are right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session =
validation.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>_______________________________________________</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>cnit mailing list</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:#954F72'>cnit@ietf.org</span></a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/cnit</span>=
</a></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.&nbsp; STIR is essential but =
it&#8217;s a multi-faceted problem that may require multi-faceted =
solutions.. and enhanced CNAM + being only one of them.&nbsp;&nbsp; Its =
not unreasonable to discuss those.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs. =
&nbsp;I would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in question.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><div style=3D'border:none;border-top:solid #E1E1E1 =
1.0pt;padding:3.0pt 0in 0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a> [<a =
href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>]<s=
pan class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Gorman, Pierce A [NTK]; <a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div></div=
><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Let me =
rephrase it&#8230; it may eliminate the need for other forms of caller =
identification beyond what STIR will provide, depending on the specific =
use case. For example, a credit card company may choose to rely entirely =
on STIR before allowing a card to be unblocked by an IVR (and as I said =
earlier, many companies do it today). In other use cases, the TN alone =
is not sufficient information &#8211; my health care provider will want =
to know which member of the family is calling.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I agree =
that ANI is already broadly used to improve customer service today. =
However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of =
companies.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Going on a =
tangent&#8230; perhaps this is out of scope, but there is not a lot of =
discussion about called party hijacking. Couldn&#8217;t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it&#8217;s really them before carrying a =
conversation, but wouldn&#8217;t they want the same?&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&lt;Gorman&=
gt;, &quot;Pierce A [NTK]&quot; &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D'color:#954F72'>Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Dat=
e:<span class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, November =
5, 2013 at 6:05 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho &lt;<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>fmousinh@cisco.com</span></a>&gt;, &quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3Dapple-converted-space>&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I agree with your characterization of businesses as victim of caller ID =
fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.&nbsp; So I don&#8217;t agree that =
STIR would &#8220;eliminate the need for caller identification from =
known TNs.&#8221;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>But perhaps I misunderstood your last sentence?</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div><div style=3D'border:none;border-top:solid #B5C4DF =
1.0pt;padding:3.0pt 0in 0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fernando =
Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>mailto:fmousinh@cisco.com</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I would =
suggest we add a new attack type to section 3. More and more companies =
are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I&#8217;m informed =
that I don&#8217;t need to provide any further identification because my =
number is on file. Some (all?) companies that implement this type of =
validation rely on SS7 today.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Ultimately,=
 this is yet another variation of impersonation &#8211; but in this =
case, the &#8220;victim&#8221; is a business, unlike the other two =
scenarios we&#8217;ve listed so far.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Addressing =
this scenario would actually turn STIR into a feature, given it would =
enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D'color:#954F72'>alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, October 1, 2013 =
at 12:51 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:#954F72'>br@brianrosen.net</span></a>&gt;, =
&quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:#954F72'>jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:=
<span class=3Dapple-converted-space>&nbsp;</span></b>&quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D'color:#954F72'>richard@shockey.us</span></a>&gt;, &quot;'DOLLY, =
MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D'color:#954F72'>md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:#954F72'>rjsparks@nostrum.com</span></a>&gt;<br><b>Subject=
:<span class=3Dapple-converted-space>&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Jon,<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Thanks for =
the response.&nbsp; The intention in #1 below is to clarify the =
following sentence:<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>The<span =
class=3Dapple-converted-space>&nbsp;</span><b>primary</b><span =
class=3Dapple-converted-space>&nbsp;</span>attack vector =
is<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; therefore one where the attacker contrives for the calling =
telephone<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number in signaling to be a particular chosen number, one that =
the<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; attacker does not have the authority to call from,<span =
class=3Dapple-converted-space>&nbsp;</span><b>in order for =
that</b><o:p></o:p></span></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number to be rendered on the terminating side</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>.&nbsp;<o:p=
></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>This might =
be misconstrued as indicating that the objective of spoofing is simply =
the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the =
rendered information. &nbsp;No issues with leaving this as it&#8217;s a =
valid point.&nbsp; Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on =
CPN.&nbsp;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>So however =
it&#8217;s worded, I think it&#8217;s important to allow for both attack =
objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Regards,<o:=
p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex<o:p></=
o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;<o:p>=
</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
-----Original Message-----<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Brian =
Rosen<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Sent: =
Tuesday, October 01, 2013 9:29 AM<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; To: =
Peterson, Jon<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; Richard<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Shockey<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<o:p>&n=
bsp;</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Don't =
think there is much MESSAGE.&nbsp; MSRP is about all we see, and XMPP =
is<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; more =
likely than that.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<o:p>&n=
bsp;</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Brian<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<o:p>&n=
bsp;</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; On =
Oct 1, 2013, at 12:24 PM, &quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:windowtext;text-decoration:none'>jon.peterson@neustar.biz<=
/span></a>&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
wrote:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<o:p>&n=
bsp;</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Thanks for these notes, Alex. Some responses =
below.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here are several comments that should feed into the IETF =
Peterson draft:<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
[IMO,<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; both endpoint and in-network solutions should be =
facilitated]<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Agreed that both in-band and out-of-band solutions can usually =
be<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
implemented in either endpoints or in intermediaries of various =
kinds.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
If I see text that implies otherwise, I'll certainly change =
it.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Add a sessionless attack scenario.&nbsp; A spam =
payload may be carried in<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
a<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
establishment.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; More generally, we should be mindful of the fact that SIP is =
used in<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; telephony form more than voice session =
setup.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Probably if we were going to include a sessionless attack scenario, =
it<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
would be with regular text messages (whether carried on the PSTN =
over<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
TCAP or with some Internet protocol, including MESSAGE) rather =
than<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
with an INVITE, which typically wouldn't result in a payload =
being<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
immediately rendered to a user. More on this below with your =
suggested<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
text.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here's some suggested =
markup:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; The primary attack vector is<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; number in signaling to be a particular chosen number that =
the<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; attacker does not have the authority to call =
from.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
What you want here is to remove the implication that the number =
will<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
in the primary attack vectors that concern =
us.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; of programmability, the capacity to access the Internet, =
and<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; capabilities of rendering text, audio and/or images.&nbsp; This =
includes<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; IP private branch exchanges, and so =
on.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
I can add the notion that smart devices can render text, audio =
and/or<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
images as you suggest.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, IP-Mobile Text =
Message<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; party numbers.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Provided we're talking about end-to-end SIP use of MESSAGE, =
agreed<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
that in-band would be the right countermeasure. I am curious =
though<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
document.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Jon Peterson<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Neustar, Inc.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Regards,<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Alex<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of Richard Shockey<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN C<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: Robert Sparks<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Yes, ok<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Martin Dolly<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Technology<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1-609-903-3360<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D'color:windowtext;text-decoration:none'>md3135@att.com</span></a>=
<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, &quot;Robert =
Sparks&quot;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:windowtext;text-decoration:none'>rjsparks@nostrum.com</spa=
n></a>&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; wrote:<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Hi Martin -<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Just to make sure - I think you're referring to =
Hadriel's comments<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; on the<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; problem statement =
document?<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; I don't think Hadriel's commented directly on =
stir-threats yet.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; In any case, we _are_ talking about a starting place, =
not a<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; finished<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; product.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; If there's no other objection, I'd like to get Jon to =
submit the<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; threats<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; RjS<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; From:<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear from more =
people about this<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; hear from him soon.<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Russ<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ Housley =
wrote:<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D'color:windowtext;text-decoration:none'>http://www.ietf.org/id/dr=
aft-peterson-stir-threats-00.txt</span></a><o:p></o:p></span></p></div><d=
iv><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt this I-D as the =
starting point for<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; the<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; STIR threat docuent?<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Russ<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; stir mailing =
list<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; stir mailing list<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing list<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing list<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; stir mailing list<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
stir mailing list<o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<o:p>&n=
bsp;</o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
_______________________________________________<o:p></o:p></span></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; stir =
mailing list<o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
o:p></o:p></span></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a><o:p></o:p></span></p></div></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'><hr =
size=3D3 width=3D"100%" align=3Dcenter></span></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><o:p></o:p>=
</span></p></div></div><p class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'>__________=
_____________________________________<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org/=
mailman/listinfo/stir</a><o:p></o:p></span></p></div></blockquote></div><=
p class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_000_02E4_01CEDB0A.C6AC9C80--


From br@brianrosen.net  Wed Nov  6 21:59:23 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1688D11E8152 for <cnit@ietfa.amsl.com>; Wed,  6 Nov 2013 21:59:23 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level: 
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H640pwRy1Pp4 for <cnit@ietfa.amsl.com>; Wed,  6 Nov 2013 21:59:18 -0800 (PST)
Received: from mail-qe0-f44.google.com (mail-qe0-f44.google.com [209.85.128.44]) by ietfa.amsl.com (Postfix) with ESMTP id 9140011E813A for <cnit@ietf.org>; Wed,  6 Nov 2013 21:59:15 -0800 (PST)
Received: by mail-qe0-f44.google.com with SMTP id 6so72105qeb.17 for <cnit@ietf.org>; Wed, 06 Nov 2013 21:59:15 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=ey/TNA2SAK/Mn5ekufTUDV9cc0MT+IIBe4QoctlC0RE=; b=m+wUlpGMoetI6lJXZCLP0jNOlbEDtRa84LVMHJSYtHB1xUOfngcCSshlzNDGGR960l jVk0MIbUm7vvO/pa8HGAGyQQ7PBdLf7JbU6FedtSpJRZpnSgng74u+sFvlP4fNNHqnaj TDPHWlxQBeYxO4wgY4GvwMgLBhuirrkCVAQgAqPk/oZjz3UAKF09ob+BUK7x6f88IbIu EJzBamfABex4+cya6gi+iDYVk0RWczeCrc7pifHo3C0Uz/ipFU8Y0CLzN7YL0eH+2c+3 O4Tv78rxlQDe8C7qR2DIhJcK0cruZ39S8Hf/C/rpDDT8wlXd/NKrEY8NLn4dYvjaYA4u ae2A==
X-Gm-Message-State: ALoCoQly2DyFxJChpnjDHKnGHcfW+4Z9i9fm/6oO6M5c2ThVLc/XSjq/NYDP7CYbwY4aA1BkH49X
X-Received: by 10.49.131.2 with SMTP id oi2mr9598159qeb.82.1383803954885; Wed, 06 Nov 2013 21:59:14 -0800 (PST)
Received: from hotel-wireless-v6.meeting.ietf.org ([2001:67c:370:144:6c3f:cc98:bab6:63ed]) by mx.google.com with ESMTPSA id h2sm6552896qaf.10.2013.11.06.21.59.12 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Wed, 06 Nov 2013 21:59:14 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_98F09337-36C1-4E17-900F-9451B7F226DE"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <02e301cedb34$af790790$0e6b16b0$@shockey.us>
Date: Wed, 6 Nov 2013 21:59:09 -0800
Message-Id: <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us>
To: Richard Shockey <richard@shockey.us>
X-Mailer: Apple Mail (2.1816)
Cc: "stir@ietf.org List" <stir@ietf.org>, "Gorman, Pierce A \[NTK\]" <Pierce.Gorman@sprint.com>, cnit@ietf.org, "Fernando Mousinho \(fmousinh\)" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 05:59:23 -0000

--Apple-Mail=_98F09337-36C1-4E17-900F-9451B7F226DE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate =
the data, which it has very little basis to validate.  It could get a =
3rd party to do the validation, but then it=92s putting its reputation =
on the back of some hired hand validator.

If the responsibility is the end user/device, then the signature has no =
value.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that=92s an encoding detail.  All of =
SIP Is XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us> wrote:

> URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity.  The carrier =
could provision this for their mobile or hosted customers.  Enterprises =
could do this themselves.  This also has advantages in Enterprise to =
Enterprise UC as well where the data is derived from the Enterprise =
=93directory=94 and could facilitate end to end PPX to PBX =
communications especially in point to point video communications.
> =20
> There are certainly privacy and security issues to be addressed.  The =
Push vs Pull model.  This really would be PII in the clear but then its =
done voluntarily.
> =20
> There would have to be some work around restructuring the Header and =
adding some parameters but it=92s underutilized right now and this Use =
Case is a perfectly appropriate use.
> =20
> https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06
> =20
> Obviously it would need to be signed but we don=92t need to worry =
about that ..yet.
> =20
> =46rom 3261
> =20
> 20.9 Call-Info
> =20
>    The Call-Info header field provides additional information about =
the
>    caller or callee, depending on whether it is found in a request or
>    response.  The purpose of the URI is described by the "purpose"
>    parameter.  The "icon" parameter designates an image suitable as an
>    iconic representation of the caller or callee.  The "info" =
parameter
>    describes the caller or callee in general, for example, through a =
web
>    page.  The "card" parameter provides a business card, for example, =
in
>    vCard [36] or LDIF [37] formats.  Additional tokens can be =
registered
>    using IANA and the procedures in Section 27.
> =20
>    Use of the Call-Info header field can pose a security risk.  If a
>    callee fetches the URIs provided by a malicious caller, the callee
>    may be at risk for displaying inappropriate or offensive content,
>    dangerous or illegal content, and so on.  Therefore, it is
>    RECOMMENDED that a UA only render the information in the Call-Info
>    header field if it can verify the authenticity of the element that
>    originated the header field and trusts that element.  This need not
>    be the peer UA; a proxy can insert this header field into requests.
> =20
>    Example:
> =20
>    Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,=

>      <http://www.example.com/alice/> ;purpose=3Dinfo
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: Wednesday, November 06, 2013 3:41 PM
> To: Richard Shockey
> Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; =
stir@ietf.org List
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> We=92ve considered adding some information that is not number and is =
not name, but is something like =93bank=94, which might have some sort =
of validation behind it.
> =20
> Is that along the lines you were thinking?
> =20
> Brian
> On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us> =
wrote:
>=20
>=20
> I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.  Though =
your use case of credit card validation is a useful one and you are =
right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session validation.
> =20
> It=92s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.
> =20
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit
> =20
> But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.  STIR is essential but it=92s a =
multi-faceted problem that may require multi-faceted solutions.. and =
enhanced CNAM + being only one of them.   Its not unreasonable to =
discuss those.
> =20
> The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs.  I =
would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in question.
> =20
> =20
> =20
> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of Fernando Mousinho (fmousinh)
> Sent: Tuesday, November 05, 2013 6:26 PM
> To: Gorman, Pierce A [NTK]; stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Let me rephrase it=85 it may eliminate the need for other forms of =
caller identification beyond what STIR will provide, depending on the =
specific use case. For example, a credit card company may choose to rely =
entirely on STIR before allowing a card to be unblocked by an IVR (and =
as I said earlier, many companies do it today). In other use cases, the =
TN alone is not sufficient information =96 my health care provider will =
want to know which member of the family is calling.
> =20
> I agree that ANI is already broadly used to improve customer service =
today. However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of companies.
> =20
> =20
> Going on a tangent=85 perhaps this is out of scope, but there is not a =
lot of discussion about called party hijacking. Couldn=92t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it=92s really them before carrying a =
conversation, but wouldn=92t they want the same?=20
> =20
> =20
> From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com>
> Date: Tuesday, November 5, 2013 at 6:05 PM
> To: Fernando Mousinho <fmousinh@cisco.com>, "stir@ietf.org" =
<stir@ietf.org>
> Subject: RE: [stir] draft-peterson-stir-threats-00.txt
> =20
> I agree with your characterization of businesses as victim of caller =
ID fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.  So I don=92t agree that STIR =
would =93eliminate the need for caller identification from known TNs.=94
> =20
> But perhaps I misunderstood your last sentence?
> =20
> =20
> From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]=20
> Sent: November 05, 2013 4:34 PM
> To: stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> I would suggest we add a new attack type to section 3. More and more =
companies are using the caller ID for account validation. For example, =
if I call my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I=92m informed that =
I don=92t need to provide any further identification because my number =
is on file. Some (all?) companies that implement this type of validation =
rely on SS7 today.
> =20
> Ultimately, this is yet another variation of impersonation =96 but in =
this case, the =93victim=94 is a business, unlike the other two =
scenarios we=92ve listed so far.
> =20
> Addressing this scenario would actually turn STIR into a feature, =
given it would enable contact centers of all sizes to eliminate the need =
for caller identification from known TNs.
> =20
> =20
> =20
> From: Alex Bobotek <alex@bobotek.net>
> Date: Tuesday, October 1, 2013 at 12:51 PM
> To: Brian Rosen <br@brianrosen.net>, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> Cc: "stir@ietf.org" <stir@ietf.org>, Richard Shockey =
<richard@shockey.us>, "'DOLLY, MARTIN C'" <md3135@att.com>, 'Robert =
Sparks' <rjsparks@nostrum.com>
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Jon,
> =20
> Thanks for the response.  The intention in #1 below is to clarify the =
following sentence:
> =20
> The primary attack vector is
>    therefore one where the attacker contrives for the calling =
telephone
>    number in signaling to be a particular chosen number, one that the
>    attacker does not have the authority to call from, in order for =
that
>    number to be rendered on the terminating side.=20
> =20
> This might be misconstrued as indicating that the objective of =
spoofing is simply the rendering of a spoofed number on the receiving =
display, causing mistaken conclusions that defenses might be limited to =
securing the rendered information.  No issues with leaving this as it=92s =
a valid point.  Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on CPN.=20
> =20
> So however it=92s worded, I think it=92s important to allow for both =
attack objectives of a spoofed presentation at the endpoint and in =
transit.  =20
> =20
> Regards,
> =20
> Alex
> =20
> > -----Original Message-----
> > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of
> > Brian Rosen
> > Sent: Tuesday, October 01, 2013 9:29 AM
> > To: Peterson, Jon
> > Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; 'DOLLY, MARTIN C'; =
Richard
> > Shockey
> > Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >=20
> > Don't think there is much MESSAGE.  MSRP is about all we see, and =
XMPP is
> > more likely than that.
> >=20
> > Brian
> >=20
> > On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> > wrote:
> >=20
> > > Thanks for these notes, Alex. Some responses below.
> > >
> > >> Here are several comments that should feed into the IETF Peterson =
draft:
> > >>
> > >> *   Remove any assumptions that the solution cannot be in-network
> > [IMO,
> > >> both endpoint and in-network solutions should be facilitated]
> > >
> > > Agreed that both in-band and out-of-band solutions can usually be
> > > implemented in either endpoints or in intermediaries of various =
kinds.
> > > If I see text that implies otherwise, I'll certainly change it.
> > >
> > >> *   Add a sessionless attack scenario.  A spam payload may be =
carried in
> > a
> > >> SIP INVITE or MESSAGE, which might contain stock market advice =
even
> > >> in a display name field.  These attacks do NOT require session
> > establishment.
> > >> More generally, we should be mindful of the fact that SIP is used =
in
> > >> telephony form more than voice session setup.
> > >
> > > Probably if we were going to include a sessionless attack =
scenario, it
> > > would be with regular text messages (whether carried on the PSTN =
over
> > > TCAP or with some Internet protocol, including MESSAGE) rather =
than
> > > with an INVITE, which typically wouldn't result in a payload being
> > > immediately rendered to a user. More on this below with your =
suggested
> > text.
> > >
> > >> Here's some suggested markup:
> > >>
> > >>
> > >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction =
with:
> > >>
> > >> The primary attack vector is
> > >>  therefore one where the attacker contrives for the calling =
telephone
> > >> number in signaling to be a particular chosen number that the
> > >> attacker does not have the authority to call from.
> > >
> > > What you want here is to remove the implication that the number =
will
> > > be rendered on the terminating side? While there are some attacks
> > > where that isn't significant, perhaps, I would say it is =
significant
> > > in the primary attack vectors that concern us.
> > >
> > >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> > >>
> > >>     Smart devices are generally based on computers with some =
degree
> > >> of programmability, the capacity to access the Internet, and
> > >> capabilities of rendering text, audio and/or images.  This =
includes
> > >> smart phones, telephone applications on desktop and laptop =
computers,
> > >> IP private branch exchanges, and so on.
> > >
> > > I can add the notion that smart devices can render text, audio =
and/or
> > > images as you suggest.
> > >
> > >> 3.  Add to 3.3 Attack Scenarios:
> > >>
> > >>       Impersonation, IP-Mobile Text Message
> > >>
> > >>        An attacker with an computer sends a high volume of SIP =
MESSAGE
> > >> spam message to IP-enabled smart phones using randomized calling
> > >> party numbers.
> > >>
> > >>       Countermeasure: in-band authenticated identity
> > >
> > > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > > that in-band would be the right countermeasure. I am curious =
though
> > > whether practically speaking there is enough use of MESSAGE in =
this
> > > fashion that we're actually seeing high-volume spam over MESSAGE
> > > today. Either way, no problem having an attack scenario of this =
form in the
> > document.
> > >
> > > Jon Peterson
> > > Neustar, Inc.
> > >
> > >> Regards,
> > >>
> > >> Alex
> > >>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of Richard Shockey
> > >>> Sent: Monday, September 30, 2013 1:11 PM
> > >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> +1
> > >>>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of DOLLY, MARTIN C
> > >>> Sent: Monday, September 30, 2013 12:58 PM
> > >>> To: Robert Sparks
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> Yes, ok
> > >>>
> > >>> Martin Dolly
> > >>> Lead Member of Technical Staff
> > >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> > >>> Technology
> > >>> +1-609-903-3360
> > >>> md3135@att.com
> > >>>
> > >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> > >>>> <rjsparks@nostrum.com>
> > >>> wrote:
> > >>>>
> > >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> > >>>>> With Hadriel comments incorporated, it is a start
> > >>>> Hi Martin -
> > >>>>
> > >>>> Just to make sure - I think you're referring to Hadriel's =
comments
> > >>>> on the
> > >>> problem statement document?
> > >>>> I don't think Hadriel's commented directly on stir-threats yet.
> > >>>>
> > >>>> In any case, we _are_ talking about a starting place, not a
> > >>>> finished
> > >>> product.
> > >>>>
> > >>>> If there's no other objection, I'd like to get Jon to submit =
the
> > >>>> threats
> > >>> document as a WG -00 as soon as it's convenient.
> > >>>>
> > >>>> RjS
> > >>>>>
> > >>>>> -----Original Message-----
> > >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On
> > >>>>> Behalf Of Russ Housley
> > >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> > >>>>> To: IETF STIR Mail List
> > >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>>>
> > >>>>> It has been six days, I'd like to hear from more people about =
this
> > >>> document.  Martin asked for an additional week, so I'm sure we =
will
> > >>> hear from him soon.
> > >>>>>
> > >>>>> Russ
> > >>>>>
> > >>>>>
> > >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> > >>>>>>
> > >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> > >>>>>>
> > >>>>>> Should the working group adopt this I-D as the starting point =
for
> > >>>>>> the
> > >>> STIR threat docuent?
> > >>>>>>
> > >>>>>> Russ
> > >>>>> _______________________________________________
> > >>>>> stir mailing list
> > >>>>> stir@ietf.org
> > >>>>> https://www.ietf.org/mailman/listinfo/stir
> > >>>>
> > >>>> _______________________________________________
> > >>>> stir mailing list
> > >>>> stir@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/stir
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >>>
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >> _______________________________________________
> > >> stir mailing list
> > >> stir@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/stir
> > >
> > > _______________________________________________
> > > stir mailing list
> > > stir@ietf.org
> > > https://www.ietf.org/mailman/listinfo/stir
> >=20
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org
> > https://www.ietf.org/mailman/listinfo/stir
> =20
>=20
> This e-mail may contain Sprint proprietary information intended for =
the sole use of the recipient(s). Any use by others is prohibited. If =
you are not the intended recipient, please contact the sender and delete =
all copies of the message.
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir
> =20


--Apple-Mail=_98F09337-36C1-4E17-900F-9451B7F226DE
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">I =
think this would be a heavy lift.<div><br></div><div>If the responsible =
entity was a carrier, then it would have to validate the data, which it =
has very little basis to validate. &nbsp;It could get a 3rd party to do =
the validation, but then it=92s putting its reputation on the back of =
some hired hand validator.</div><div><br></div><div>If the =
responsibility is the end user/device, then the signature has no =
value.</div><div><br></div><div>I do not argue that Call-Info is =
suitable, &nbsp;it is.</div><div><br></div><div>I do question JCARD vs =
xCard, but that=92s an encoding detail. &nbsp;All of SIP Is XML =
described by schema, not =
json.</div><div><br></div><div>Brian</div><div><br></div><div><div><div><d=
iv>On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dus-ascii"><meta name=3D"Generator" content=3D"Microsoft Word =
15 (filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--><div lang=3D"EN-US" link=3D"blue" =
vlink=3D"purple"><div class=3D"WordSection1"><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">URI for a JCARD in the CALL INFO header =
provisioned by the calling party and ultimately signed by the =
responsible entity. &nbsp;The carrier could provision this for their =
mobile or hosted customers.&nbsp; Enterprises could do this =
themselves.&nbsp; This also has advantages in Enterprise to Enterprise =
UC as well where the data is derived from the Enterprise =93directory=94 =
and could facilitate end to end PPX to PBX communications especially in =
point to point video communications. <o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">There are certainly privacy and security issues to =
be addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be =
PII in the clear but then its done voluntarily. <o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">There would have to be some work around =
restructuring the Header and adding some parameters but it=92s =
underutilized right now and this Use Case is a perfectly appropriate =
use. <o:p></o:p></span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D"><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06">https://=
tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</a><o:p></o:p></span></p>=
<p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">Obviously it would need to be signed but we don=92t =
need to worry about that ..yet. <o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">=46rom 3261 <o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">20.9 Call-Info<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; The Call-Info header field provides =
additional information about the<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; caller or callee, depending on =
whether it is found in a request or<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; response.&nbsp; The purpose of the =
URI is described by the "purpose"<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; parameter.&nbsp; The "icon" parameter =
designates an image suitable as an<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; iconic representation of the caller =
or callee.&nbsp; The "info" parameter<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; describes the caller or callee in =
general, for example, through a web<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; page.&nbsp; The "card" parameter =
provides a business card, for example, in<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; vCard [36] or LDIF [37] =
formats.&nbsp; Additional tokens can be =
registered<o:p></o:p></span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; using IANA and the procedures in =
Section 27.<o:p></o:p></span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; Use of the Call-Info header field can =
pose a security risk.&nbsp; If a<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; callee fetches the URIs provided by a =
malicious caller, the callee<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; may be at risk for displaying =
inappropriate or offensive content,<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; dangerous or illegal content, and so =
on.&nbsp; Therefore, it is<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; RECOMMENDED that a UA only render the =
information in the Call-Info<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; header field if it can verify the =
authenticity of the element that<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; originated the header field and =
trusts that element.&nbsp; This need not<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; be the peer UA; a proxy can insert =
this header field into requests.<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; Example:<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg">http://wwww.example.com/a=
lice/photo.jpg</a>&gt; ;purpose=3Dicon,<o:p></o:p></span></p><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/">http://www.example.com/alice/</a>&g=
t; ;purpose=3Dinfo<o:p></o:p></span></p><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span></p><div><div =
style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in"><p class=3D"MsoNormal"><b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">From:</span></b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"> Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>] =
<br><b>Sent:</b> Wednesday, November 06, 2013 3:41 PM<br><b>To:</b> =
Richard Shockey<br><b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, =
Pierce A [NTK]; <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> =
List<br><b>Subject:</b> Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3D"MsoNormal"><o:p>&nbsp;</o:p></p><p class=3D"MsoNormal">We=92ve =
considered adding some information that is not number and is not name, =
but is something like =93bank=94, which might have some sort of =
validation behind it.<o:p></o:p></p><div><p =
class=3D"MsoNormal"><o:p>&nbsp;</o:p></p></div><div><p =
class=3D"MsoNormal">Is that along the lines you were =
thinking?<o:p></o:p></p></div><div><p =
class=3D"MsoNormal"><o:p>&nbsp;</o:p></p></div><div><p =
class=3D"MsoNormal">Brian<o:p></o:p></p><div><div><p =
class=3D"MsoNormal">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3D"MsoNormal"><br><br><o:p></o:p></p><blockquote =
style=3D"margin-top:5.0pt;margin-bottom:5.0pt"><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">I agree with Pierce here and respectfully disagree =
that STIR might eliminate the need for other forms of caller =
identification.&nbsp; Though your use case of credit card validation is =
a useful one and you are right there are still applications that use SS7 =
for things that have nothing to do with call setup. I agree with you =
STIR may have more applications beyond the obvious ones of realtime =
session validation.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">It=92s been my experience recently that there is a =
use case for something MORE in the identification of the session as it =
is presented to the called party. This is the CNAM + idea we are kicking =
around on the CNIT list.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">_______________________________________________</spa=
n><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">cnit mailing list</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D"><a href=3D"mailto:cnit@ietf.org"><span =
style=3D"color:#954F72">cnit@ietf.org</span></a></span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D"><a =
href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D"color:#954F72">https://www.ietf.org/mailman/listinfo/cnit</span><=
/a></span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">But your use case of a bank wanting to make sure =
they could properly identify themselves to the consumer before =
establishing a conversation is exactly what this process is about.&nbsp; =
STIR is essential but it=92s a multi-faceted problem that may require =
multi-faceted solutions.. and enhanced CNAM + being only one of =
them.&nbsp;&nbsp; Its not unreasonable to discuss those.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">The obviously analogy is I would want to see some =
real identification of a utility worker before I let them into my house =
to make repairs. &nbsp;I would want some validation that the call to me =
to reconfirm the appointments was in fact from the utility in =
question.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;;color:#1F497D">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><div =
style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in"><p class=3D"MsoNormal"><b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span></span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><a href=3D"mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a>=
 [<a =
href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>]<sp=
an class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce A [NTK]; <a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><div><=
p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Let me rephrase it=85 it may eliminate the need for other forms =
of caller identification beyond what STIR will provide, depending on the =
specific use case. For example, a credit card company may choose to rely =
entirely on STIR before allowing a card to be unblocked by an IVR (and =
as I said earlier, many companies do it today). In other use cases, the =
TN alone is not sufficient information =96 my health care provider will =
want to know which member of the family is calling.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">I agree that ANI is already broadly used to improve customer =
service today. However, it is not usually deemed as a secure enough =
mechanism to validate the caller (therefore this WG!), except if you are =
a large organization that can leverage things like SS7. STIR would make =
this type of validation available to a broader number of =
companies.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Going on a tangent=85 perhaps this is out of scope, but there is =
not a lot of discussion about called party hijacking. Couldn=92t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it=92s really them before carrying a =
conversation, but wouldn=92t they want the same?&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div =
style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in"><p class=3D"MsoNormal"><b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&lt;Gorman&gt;, "Pierce A [NTK]" &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D"color:#954F72">Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Date=
:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, =
November 5, 2013 at 6:05 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
&lt;<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D"color:#954F72">fmousinh@cisco.com</span></a>&gt;, "<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:#954F72">stir@ietf.org</span></a>" &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:#954F72">stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#0000CC">I agree with your characterization of businesses as =
victim of caller ID fraud however contact centers also use TN as a key =
to improve information available to call agents to reduce average =
time-per-call and increase capacity of the call center.&nbsp; So I don=92t=
 agree that STIR would =93eliminate the need for caller identification =
from known TNs.=94</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#0000CC">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#0000CC">But perhaps I misunderstood your last =
sentence?</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#0000CC">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Arial&quot;,&quot;sans-serif&q=
uot;;color:#0000CC">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><div =
style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in"><p class=3D"MsoNormal"><b><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">&nbsp;</span></span><span =
style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&=
quot;">Fernando Mousinho (fmousinh) [<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D"color:#954F72">mailto:fmousinh@cisco.com</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:#954F72">stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">I would suggest we add a new attack type to section 3. More and =
more companies are using the caller ID for account validation. For =
example, if I call my credit card provider from my office number, they =
ask me for identification. If I call from my home phone number, I=92m =
informed that I don=92t need to provide any further identification =
because my number is on file. Some (all?) companies that implement this =
type of validation rely on SS7 today.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Ultimately, this is yet another variation of impersonation =96 =
but in this case, the =93victim=94 is a business, unlike the other two =
scenarios we=92ve listed so far.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Addressing this scenario would actually turn STIR into a =
feature, given it would enable contact centers of all sizes to eliminate =
the need for caller identification from known TNs.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div =
style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in"><p class=3D"MsoNormal"><b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Alex Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D"color:#954F72">alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, October 1, =
2013 at 12:51 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D"color:#954F72">br@brianrosen.net</span></a>&gt;, "Peterson, =
Jon" &lt;<a href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D"color:#954F72">jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:<=
span class=3D"apple-converted-space">&nbsp;</span></b>"<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:#954F72">stir@ietf.org</span></a>" &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:#954F72">stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D"color:#954F72">richard@shockey.us</span></a>&gt;, "'DOLLY, =
MARTIN C'" &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D"color:#954F72">md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D"color:#954F72">rjsparks@nostrum.com</span></a>&gt;<br><b>Subject:=
<span class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div><div><p class=3D"MsoNormal"><span=
 =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Jon,<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Thanks for the response.&nbsp; The intention in #1 below is to =
clarify the following sentence:<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">The<span =
class=3D"apple-converted-space">&nbsp;</span><b>primary</b><span =
class=3D"apple-converted-space">&nbsp;</span>attack vector =
is<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;&nbsp; therefore one where the attacker contrives for the =
calling telephone<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;&nbsp; number in signaling to be a particular chosen =
number, one that the<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;&nbsp; attacker does not have the authority to call =
from,<span class=3D"apple-converted-space">&nbsp;</span><b>in order for =
that</b><o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;&nbsp; number to be rendered on the terminating =
side</span></b><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">.&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">This might be misconstrued as indicating that the objective of =
spoofing is simply the rendering of a spoofed number on the receiving =
display, causing mistaken conclusions that defenses might be limited to =
securing the rendered information. &nbsp;No issues with leaving this as =
it=92s a valid point.&nbsp; Another (increasing) motivation is to evade =
network and/or endpoint defenses that may block based on =
CPN.&nbsp;<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">So however it=92s worded, I think it=92s important to allow for =
both attack objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Regards,<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">Alex<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; From:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Brian Rosen<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Sent: Tuesday, October 01, 2013 9:29 =
AM<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; To: Peterson, Jon<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:#954F72">stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; Richard<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Shockey<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<o:p>&nbsp;</o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Don't think there is much MESSAGE.&nbsp; MSRP is about all =
we see, and XMPP is<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; more likely than that.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<o:p>&nbsp;</o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; Brian<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<o:p>&nbsp;</o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D"color:windowtext;text-decoration:none">jon.peterson@neustar.biz</=
span></a>&gt;<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span=
 =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; wrote:<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<o:p>&nbsp;</o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; Thanks for these notes, Alex. Some responses =
below.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; Here are several comments that should feed into =
the IETF Peterson draft:<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the =
solution cannot be in-network<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; [IMO,<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; both endpoint and in-network solutions should be =
facilitated]<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; Agreed that both in-band and out-of-band solutions can =
usually be<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; implemented in either endpoints or in intermediaries =
of various kinds.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; If I see text that implies otherwise, I'll certainly =
change it.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessionless attack =
scenario.&nbsp; A spam payload may be carried =
in<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; a<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; SIP INVITE or MESSAGE, which might contain stock =
market advice even<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; in a display name field.&nbsp; These attacks do =
NOT require session<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; establishment.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; More generally, we should be mindful of the fact =
that SIP is used in<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; telephony form more than voice session =
setup.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; Probably if we were going to include a sessionless =
attack scenario, it<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; would be with regular text messages (whether carried =
on the PSTN over<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; TCAP or with some Internet protocol, including =
MESSAGE) rather than<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; with an INVITE, which typically wouldn't result in a =
payload being<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span=
 =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; immediately rendered to a user. More on this below =
with your suggested<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; text.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; Here's some suggested =
markup:<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd =
paragraph of 1.0 Introduction with:<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; The primary attack vector =
is<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&nbsp; therefore one where the attacker contrives =
for the calling telephone<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; number in signaling to be a particular chosen =
number that the<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; attacker does not have the authority to call =
from.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; What you want here is to remove the implication that =
the number will<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; be rendered on the terminating side? While there are =
some attacks<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; where that isn't significant, perhaps, I would say it =
is significant<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; in the primary attack vectors that concern =
us.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are =
generally based on computers with some =
degree<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; of programmability, the capacity to access the =
Internet, and<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span=
 =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; capabilities of rendering text, audio and/or =
images.&nbsp; This includes<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; smart phones, telephone applications on desktop =
and laptop computers,<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; IP private branch exchanges, and so =
on.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; I can add the notion that smart devices can render =
text, audio and/or<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; images as you =
suggest.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, =
IP-Mobile Text Message<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker =
with an computer sends a high volume of SIP =
MESSAGE<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; spam message to IP-enabled smart phones using =
randomized calling<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; party numbers.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: =
in-band authenticated identity<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; Provided we're talking about end-to-end SIP use of =
MESSAGE, agreed<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; that in-band would be the right countermeasure. I am =
curious though<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; whether practically speaking there is enough use of =
MESSAGE in this<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; fashion that we're actually seeing high-volume spam =
over MESSAGE<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; today. Either way, no problem having an attack =
scenario of this form in the<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; document.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; Jon Peterson<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; Neustar, Inc.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; Regards,<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; Alex<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.org</spa=
n></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">mailto:stir-bounces@ietf.o=
rg</span></a>] On Behalf<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Of Richard =
Shockey<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Cc:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; +1<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.org</spa=
n></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">mailto:stir-bounces@ietf.o=
rg</span></a>] On Behalf<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Of DOLLY, MARTIN =
C<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; To: Robert =
Sparks<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Cc:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Yes, ok<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Martin =
Dolly<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Lead Member of Technical =
Staff<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards =
AT&amp;T Labs - Network<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; Technology<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; =
+1-609-903-3360<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D"color:windowtext;text-decoration:none">md3135@att.com</span></a><=
o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, "Robert =
Sparks"<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; &lt;<a =
href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D"color:windowtext;text-decoration:none">rjsparks@nostrum.com</span=
></a>&gt;<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; wrote:<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it =
is a start<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; Hi Martin =
-<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; Just to make sure - I think you're =
referring to Hadriel's comments<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; on the<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; problem statement =
document?<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; I don't think Hadriel's commented directly =
on stir-threats yet.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; In any case, we _are_ talking about a =
starting place, not a<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; =
finished<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; product.<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; If there's no other objection, I'd like to =
get Jon to submit the<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; threats<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; RjS<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original =
Message-----<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.org</spa=
n></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">mailto:stir-bounces@ietf.o=
rg</span></a>] On<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 =
4:37 PM<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear =
from more people about this<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; document.&nbsp; Martin asked for an additional =
week, so I'm sure we will<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; hear from him =
soon.<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; =
Russ<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ =
Housley wrote:<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D"color:windowtext;text-decoration:none">http://www.ietf.org/id/dra=
ft-peterson-stir-threats-00.txt</span></a><o:p></o:p></span></p></div><div=
><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt =
this I-D as the starting point for<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
the<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; STIR threat =
docuent?<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
Russ<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt; stir mailing =
list<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt; stir mailing =
list<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; stir mailing =
list<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt; stir mailing =
list<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt; stir mailing =
list<o:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a=
 href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a=
 href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt; stir mailing list<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; &gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<o:p>&nbsp;</o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; =
_______________________________________________<o:p></o:p></span></p></div=
><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt; stir mailing list<o:p></o:p></span></p></div><div><p =
class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a><o=
:p></o:p></span></p></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mailm=
an/listinfo/stir</span></a><o:p></o:p></span></p></div></div></div><div><p=
 class=3D"MsoNormal"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">&nbsp;</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div><div class=3D"MsoNormal" =
align=3D"center" style=3D"text-align:center"><span =
style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><hr size=3D"3" width=3D"100%" =
align=3D"center"></span></div><div><p class=3D"MsoNormal"><span =
style=3D"font-size:7.5pt;font-family:&quot;Arial&quot;,&quot;sans-serif&qu=
ot;;color:gray"><br>This e-mail may contain Sprint proprietary =
information intended for the sole use of the recipient(s). Any use by =
others is prohibited. If you are not the intended recipient, please =
contact the sender and delete all copies of the message.</span><span =
style=3D"font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;"><o:p></o:p></span></p></div></div><p class=3D"MsoNormal"><span =
style=3D"font-size:9.0pt;font-family:&quot;Helvetica&quot;,&quot;sans-seri=
f&quot;">_______________________________________________<br>stir mailing =
list<br><a href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org/m=
ailman/listinfo/stir</a><o:p></o:p></span></p></blockquote></div><p =
class=3D"MsoNormal"><o:p>&nbsp;</o:p></p></div></div></div></blockquote></=
div><br></div></div></body></html>=

--Apple-Mail=_98F09337-36C1-4E17-900F-9451B7F226DE--

From Pierce.Gorman@sprint.com  Thu Nov  7 06:53:58 2013
Return-Path: <Pierce.Gorman@sprint.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C8B921E81BE; Thu,  7 Nov 2013 06:53:58 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.215
X-Spam-Level: 
X-Spam-Status: No, score=-3.215 tagged_above=-999 required=5 tests=[AWL=-0.617, BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id iqnEEvqsMDhG; Thu,  7 Nov 2013 06:53:49 -0800 (PST)
Received: from db8outboundpool.messaging.microsoft.com (mail-db8lp0188.outbound.messaging.microsoft.com [213.199.154.188]) by ietfa.amsl.com (Postfix) with ESMTP id 8E24C21E80B4; Thu,  7 Nov 2013 06:53:48 -0800 (PST)
Received: from mail216-db8-R.bigfish.com (10.174.8.247) by DB8EHSOBE008.bigfish.com (10.174.4.71) with Microsoft SMTP Server id 14.1.225.22; Thu, 7 Nov 2013 14:53:47 +0000
Received: from mail216-db8 (localhost [127.0.0.1])	by mail216-db8-R.bigfish.com (Postfix) with ESMTP id 7B6F6E01AF; Thu,  7 Nov 2013 14:53:47 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:144.229.32.56; KIP:(null); UIP:(null); IPV:NLI; H:pdaasdm1.corp.sprint.com; RD:smtpda1.sprint.com; EFVD:NLI
X-SpamScore: -19
X-BigFish: VS-19(zzbb2dI98dI9371Ic85fh542I1432I1447Idbb0idbf2izz1f42h208ch1ee6h1de0h1fdah2073h2146h1202h1e76h1d1ah1d2ah1fc6hzz8275ch1d7338h1de098h1033IL17326ah8275bh8275dh18c673h1de097h186068h1d68deh8275fh168198mz2fh109h2a8h839hd25hf0ah1288h12a5h12bdh137ah1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h1b0ah1bceh224fh1d0ch1d2eh1d3fh1dfeh1dffh1e1dh1fe8h1ff5h20f0h2216h1155h)
Received-SPF: pass (mail216-db8: domain of sprint.com designates 144.229.32.56 as permitted sender) client-ip=144.229.32.56; envelope-from=Pierce.Gorman@sprint.com; helo=pdaasdm1.corp.sprint.com ; p.sprint.com ; 
Received: from mail216-db8 (localhost.localdomain [127.0.0.1]) by mail216-db8 (MessageSwitch) id 1383836023978340_5064; Thu,  7 Nov 2013 14:53:43 +0000 (UTC)
Received: from DB8EHSMHS017.bigfish.com (unknown [10.174.8.242])	by mail216-db8.bigfish.com (Postfix) with ESMTP id E965F220048; Thu,  7 Nov 2013 14:53:43 +0000 (UTC)
Received: from pdaasdm1.corp.sprint.com (144.229.32.56) by DB8EHSMHS017.bigfish.com (10.174.4.27) with Microsoft SMTP Server (TLS) id 14.16.227.3; Thu, 7 Nov 2013 14:53:42 +0000
Received: from PLSWEH02.ad.sprint.com (plsweh02.corp.sprint.com [144.226.242.131])	by pdaasdm1.corp.sprint.com (Sentrion-MTA-4.2.2/Sentrion-MTA-4.2.2) with ESMTP id rA7Erc1N014796 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 7 Nov 2013 08:53:40 -0600
Received: from pdawm10a.ad.sprint.com ([169.254.2.186]) by PLSWEH02.ad.sprint.com ([144.226.242.131]) with mapi id 14.03.0123.003; Thu, 7 Nov 2013 08:53:39 -0600
From: "Gorman, Pierce A [NTK]" <Pierce.Gorman@sprint.com>
To: Brian Rosen <br@brianrosen.net>, Richard Shockey <richard@shockey.us>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO2nc0UwzhVvA23kepk+N3A5gBjZoXQFMAgAIHxfuAAI6Z8A==
Date: Thu, 7 Nov 2013 14:53:38 +0000
Message-ID: <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>
In-Reply-To: <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.229.76.114]
Content-Type: multipart/alternative; boundary="_000_B4C06A5710F0ED4583B3CF5E9C6B21D85515B88FPDAWM10Aadsprin_"
MIME-Version: 1.0
X-OriginatorOrg: sprint.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
Cc: "stir@ietf.org List" <stir@ietf.org>, "cnit@ietf.org" <cnit@ietf.org>, "Fernando Mousinho \(fmousinh\)" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 14:53:58 -0000

--_000_B4C06A5710F0ED4583B3CF5E9C6B21D85515B88FPDAWM10Aadsprin_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org Lis=
t; cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:


URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

>From 3261

20.9 Call-Info

   The Call-Info header field provides additional information about the
   caller or callee, depending on whether it is found in a request or
   response.  The purpose of the URI is described by the "purpose"
   parameter.  The "icon" parameter designates an image suitable as an
   iconic representation of the caller or callee.  The "info" parameter
   describes the caller or callee in general, for example, through a web
   page.  The "card" parameter provides a business card, for example, in
   vCard [36] or LDIF [37] formats.  Additional tokens can be registered
   using IANA and the procedures in Section 27.

   Use of the Call-Info header field can pose a security risk.  If a
   callee fetches the URIs provided by a malicious caller, the callee
   may be at risk for displaying inappropriate or offensive content,
   dangerous or illegal content, and so on.  Therefore, it is
   RECOMMENDED that a UA only render the information in the Call-Info
   header field if it can verify the authenticity of the element that
   originated the header field and trusts that element.  This need not
   be the peer UA; a proxy can insert this header field into requests.

   Example:

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,
     <http://www.example.com/alice/> ;purpose=3Dinfo

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

We've considered adding some information that is not number and is not name=
, but is something like "bank", which might have some sort of validation be=
hind it.

Is that along the lines you were thinking?

Brian
On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:



I agree with Pierce here and respectfully disagree that STIR might eliminat=
e the need for other forms of caller identification.  Though your use case =
of credit card validation is a useful one and you are right there are still=
 applications that use SS7 for things that have nothing to do with call set=
up. I agree with you STIR may have more applications beyond the obvious one=
s of realtime session validation.

It's been my experience recently that there is a use case for something MOR=
E in the identification of the session as it is presented to the called par=
ty. This is the CNAM + idea we are kicking around on the CNIT list.

_______________________________________________
cnit mailing list
cnit@ietf.org<mailto:cnit@ietf.org>
https://www.ietf.org/mailman/listinfo/cnit

But your use case of a bank wanting to make sure they could properly identi=
fy themselves to the consumer before establishing a conversation is exactly=
 what this process is about.  STIR is essential but it's a multi-faceted pr=
oblem that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.   Its not unreasonable to discuss those.

The obviously analogy is I would want to see some real identification of a =
utility worker before I let them into my house to make repairs.  I would wa=
nt some validation that the call to me to reconfirm the appointments was in=
 fact from the utility in question.



From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Let me rephrase it... it may eliminate the need for other forms of caller i=
dentification beyond what STIR will provide, depending on the specific use =
case. For example, a credit card company may choose to rely entirely on STI=
R before allowing a card to be unblocked by an IVR (and as I said earlier, =
many companies do it today). In other use cases, the TN alone is not suffic=
ient information - my health care provider will want to know which member o=
f the family is calling.

I agree that ANI is already broadly used to improve customer service today.=
 However, it is not usually deemed as a secure enough mechanism to validate=
 the caller (therefore this WG!), except if you are a large organization th=
at can leverage things like SS7. STIR would make this type of validation av=
ailable to a broader number of companies.


Going on a tangent... perhaps this is out of scope, but there is not a lot =
of discussion about called party hijacking. Couldn't a man-in-the-middle tr=
y to answer calls on my behalf? If my bank is calling me, I want to make su=
re it's really them before carrying a conversation, but wouldn't they want =
the same?


From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com<mailto:Pierce.Go=
rman@sprint.com>>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho <fmousinh@cisco.com<mailto:fmousinh@cisco.com>>, "sti=
r@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.org>>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

I agree with your characterization of businesses as victim of caller ID fra=
ud however contact centers also use TN as a key to improve information avai=
lable to call agents to reduce average time-per-call and increase capacity =
of the call center.  So I don't agree that STIR would "eliminate the need f=
or caller identification from known TNs."

But perhaps I misunderstood your last sentence?


From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]
Sent: November 05, 2013 4:34 PM
To: stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I would suggest we add a new attack type to section 3. More and more compan=
ies are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for identificati=
on. If I call from my home phone number, I'm informed that I don't need to =
provide any further identification because my number is on file. Some (all?=
) companies that implement this type of validation rely on SS7 today.

Ultimately, this is yet another variation of impersonation - but in this ca=
se, the "victim" is a business, unlike the other two scenarios we've listed=
 so far.

Addressing this scenario would actually turn STIR into a feature, given it =
would enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.



From: Alex Bobotek <alex@bobotek.net<mailto:alex@bobotek.net>>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>, "Peterson, J=
on" <jon.peterson@neustar.biz<mailto:jon.peterson@neustar.biz>>
Cc: "stir@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.o=
rg>>, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>, "'DO=
LLY, MARTIN C'" <md3135@att.com<mailto:md3135@att.com>>, 'Robert Sparks' <r=
jsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Jon,

Thanks for the response.  The intention in #1 below is to clarify the follo=
wing sentence:

The primary attack vector is
   therefore one where the attacker contrives for the calling telephone
   number in signaling to be a particular chosen number, one that the
   attacker does not have the authority to call from, in order for that
   number to be rendered on the terminating side.

This might be misconstrued as indicating that the objective of spoofing is =
simply the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the rendere=
d information.  No issues with leaving this as it's a valid point.  Another=
 (increasing) motivation is to evade network and/or endpoint defenses that =
may block based on CPN.

So however it's worded, I think it's important to allow for both attack obj=
ectives of a spoofed presentation at the endpoint and in transit.

Regards,

Alex

> -----Original Message-----
> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-bo=
unces@ietf.org] On Behalf Of
> Brian Rosen
> Sent: Tuesday, October 01, 2013 9:29 AM
> To: Peterson, Jon
> Cc: stir@ietf.org<mailto:stir@ietf.org>; Alex Bobotek; 'Robert Sparks'; '=
DOLLY, MARTIN C'; Richard
> Shockey
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
>
> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is
> more likely than that.
>
> Brian
>
> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <jon.peterson@neustar.biz<ma=
ilto:jon.peterson@neustar.biz>>
> wrote:
>
> > Thanks for these notes, Alex. Some responses below.
> >
> >> Here are several comments that should feed into the IETF Peterson draf=
t:
> >>
> >> *   Remove any assumptions that the solution cannot be in-network
> [IMO,
> >> both endpoint and in-network solutions should be facilitated]
> >
> > Agreed that both in-band and out-of-band solutions can usually be
> > implemented in either endpoints or in intermediaries of various kinds.
> > If I see text that implies otherwise, I'll certainly change it.
> >
> >> *   Add a sessionless attack scenario.  A spam payload may be carried =
in
> a
> >> SIP INVITE or MESSAGE, which might contain stock market advice even
> >> in a display name field.  These attacks do NOT require session
> establishment.
> >> More generally, we should be mindful of the fact that SIP is used in
> >> telephony form more than voice session setup.
> >
> > Probably if we were going to include a sessionless attack scenario, it
> > would be with regular text messages (whether carried on the PSTN over
> > TCAP or with some Internet protocol, including MESSAGE) rather than
> > with an INVITE, which typically wouldn't result in a payload being
> > immediately rendered to a user. More on this below with your suggested
> text.
> >
> >> Here's some suggested markup:
> >>
> >>
> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:
> >>
> >> The primary attack vector is
> >>  therefore one where the attacker contrives for the calling telephone
> >> number in signaling to be a particular chosen number that the
> >> attacker does not have the authority to call from.
> >
> > What you want here is to remove the implication that the number will
> > be rendered on the terminating side? While there are some attacks
> > where that isn't significant, perhaps, I would say it is significant
> > in the primary attack vectors that concern us.
> >
> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> >>
> >>     Smart devices are generally based on computers with some degree
> >> of programmability, the capacity to access the Internet, and
> >> capabilities of rendering text, audio and/or images.  This includes
> >> smart phones, telephone applications on desktop and laptop computers,
> >> IP private branch exchanges, and so on.
> >
> > I can add the notion that smart devices can render text, audio and/or
> > images as you suggest.
> >
> >> 3.  Add to 3.3 Attack Scenarios:
> >>
> >>       Impersonation, IP-Mobile Text Message
> >>
> >>        An attacker with an computer sends a high volume of SIP MESSAGE
> >> spam message to IP-enabled smart phones using randomized calling
> >> party numbers.
> >>
> >>       Countermeasure: in-band authenticated identity
> >
> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > that in-band would be the right countermeasure. I am curious though
> > whether practically speaking there is enough use of MESSAGE in this
> > fashion that we're actually seeing high-volume spam over MESSAGE
> > today. Either way, no problem having an attack scenario of this form in=
 the
> document.
> >
> > Jon Peterson
> > Neustar, Inc.
> >
> >> Regards,
> >>
> >> Alex
> >>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of Richard Shockey
> >>> Sent: Monday, September 30, 2013 1:11 PM
> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> +1
> >>>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of DOLLY, MARTIN C
> >>> Sent: Monday, September 30, 2013 12:58 PM
> >>> To: Robert Sparks
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> Yes, ok
> >>>
> >>> Martin Dolly
> >>> Lead Member of Technical Staff
> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> >>> Technology
> >>> +1-609-903-3360
> >>> md3135@att.com<mailto:md3135@att.com>
> >>>
> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> >>>> <rjsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
> >>> wrote:
> >>>>
> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> >>>>> With Hadriel comments incorporated, it is a start
> >>>> Hi Martin -
> >>>>
> >>>> Just to make sure - I think you're referring to Hadriel's comments
> >>>> on the
> >>> problem statement document?
> >>>> I don't think Hadriel's commented directly on stir-threats yet.
> >>>>
> >>>> In any case, we _are_ talking about a starting place, not a
> >>>> finished
> >>> product.
> >>>>
> >>>> If there's no other objection, I'd like to get Jon to submit the
> >>>> threats
> >>> document as a WG -00 as soon as it's convenient.
> >>>>
> >>>> RjS
> >>>>>
> >>>>> -----Original Message-----
> >>>>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:s=
tir-bounces@ietf.org] On
> >>>>> Behalf Of Russ Housley
> >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> >>>>> To: IETF STIR Mail List
> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>>>
> >>>>> It has been six days, I'd like to hear from more people about this
> >>> document.  Martin asked for an additional week, so I'm sure we will
> >>> hear from him soon.
> >>>>>
> >>>>> Russ
> >>>>>
> >>>>>
> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> >>>>>>
> >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> >>>>>>
> >>>>>> Should the working group adopt this I-D as the starting point for
> >>>>>> the
> >>> STIR threat docuent?
> >>>>>>
> >>>>>> Russ
> >>>>> _______________________________________________
> >>>>> stir mailing list
> >>>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>>> https://www.ietf.org/mailman/listinfo/stir
> >>>>
> >>>> _______________________________________________
> >>>> stir mailing list
> >>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>> https://www.ietf.org/mailman/listinfo/stir
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >>>
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >> _______________________________________________
> >> stir mailing list
> >> stir@ietf.org<mailto:stir@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/stir
> >
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org<mailto:stir@ietf.org>
> > https://www.ietf.org/mailman/listinfo/stir
>
> _______________________________________________
> stir mailing list
> stir@ietf.org<mailto:stir@ietf.org>
> https://www.ietf.org/mailman/listinfo/stir

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.
_______________________________________________
stir mailing list
stir@ietf.org<mailto:stir@ietf.org>
https://www.ietf.org/mailman/listinfo/stir



________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.

--_000_B4C06A5710F0ED4583B3CF5E9C6B21D85515B88FPDAWM10Aadsprin_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html>
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<style>
<!--
@font-face
	{font-family:Helvetica}
@font-face
	{font-family:Helvetica}
@font-face
	{font-family:Calibri}
@font-face
	{font-family:Tahoma}
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif"}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif"}
span.apple-converted-space
	{}
span.EmailStyle18
	{font-family:"Calibri","sans-serif";
	color:#1F497D}
span.BalloonTextChar
	{font-family:"Tahoma","sans-serif"}
span.EmailStyle21
	{font-family:"Arial","sans-serif";
	color:#0000CC}
.MsoChpDefault
	{font-size:10.0pt}
@page WordSection1
	{margin:1.0in 1.0in 1.0in 1.0in}
div.WordSection1
	{}
-->
</style>
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">I&#8217;ll admit I am not=
 familiar with v/x/jcard encoding differences or the implications of their =
use so I&#8217;ll encourage educating me if it isn&#8217;t too onerous.</sp=
an></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">I&#8217;m not sure what i=
s the concern with a 3<sup>rd</sup> party providing &#8220;validation&#8221=
; though.&nbsp; There are numerous examples of 3<sup>rd</sup> parties provi=
ding
 validation of information including NASDAQ, NYSE, Barron&#8217;s, Moody&#8=
217;s, and the federal reserve banking system to name a few.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">&nbsp;</span></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:black">Pierce</span><span style=3D=
"font-size:11.0pt; font-family:&quot;Arial&quot;,&quot;sans-serif&quot;; co=
lor:#0000CC"></span></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">&nbsp;</span></p>
<div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt; font-family:&quo=
t;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:10.0pt; font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Brian =
Rosen [mailto:br@brianrosen.net]
<br>
<b>Sent:</b> November 06, 2013 11:59 PM<br>
<b>To:</b> Richard Shockey<br>
<b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.=
org List; cnit@ietf.org<br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt</span></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">I think this would be a heavy lift.</p>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">If the responsible entity was a carrier, then it wou=
ld have to validate the data, which it has very little basis to validate. &=
nbsp;It could get a 3rd party to do the validation, but then it&#8217;s put=
ting its reputation on the back of some hired
 hand validator.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">If the responsibility is the end user/device, then t=
he signature has no value.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">I do not argue that Call-Info is suitable, &nbsp;it =
is.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">I do question JCARD vs xCard, but that&#8217;s an en=
coding detail. &nbsp;All of SIP Is XML described by schema, not json.</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">Brian</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; wrote:</p>
</div>
<p class=3D"MsoNormal"><br>
<br>
</p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">URI for a JCARD in the =
CALL INFO header provisioned by the calling party and ultimately signed by =
the responsible entity. &nbsp;The carrier could provision this
 for their mobile or hosted customers.&nbsp; Enterprises could do this them=
selves.&nbsp; This also has advantages in Enterprise to Enterprise UC as we=
ll where the data is derived from the Enterprise &#8220;directory&#8221; an=
d could facilitate end to end PPX to PBX communications
 especially in point to point video communications. </span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">There are certainly pri=
vacy and security issues to be addressed.&nbsp; The Push vs Pull model.&nbs=
p; This really would be PII in the clear but then its done voluntarily.
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">There would have to be =
some work around restructuring the Header and adding some parameters but it=
&#8217;s underutilized right now and this Use Case is a perfectly
 appropriate use. </span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D"><a href=3D"https://tool=
s.ietf.org/html/draft-ietf-jcardcal-jcard-06">https://tools.ietf.org/html/d=
raft-ietf-jcardcal-jcard-06</a></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">Obviously it would need=
 to be signed but we don&#8217;t need to worry about that ..yet.
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">From 3261
</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">20.9 Call-Info</span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; The Call-I=
nfo header field provides additional information about the</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; caller or =
callee, depending on whether it is found in a request or</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; response.&=
nbsp; The purpose of the URI is described by the &quot;purpose&quot;</span>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; parameter.=
&nbsp; The &quot;icon&quot; parameter designates an image suitable as an</s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; iconic rep=
resentation of the caller or callee.&nbsp; The &quot;info&quot; parameter</=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; describes =
the caller or callee in general, for example, through a web</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; page.&nbsp=
; The &quot;card&quot; parameter provides a business card, for example, in<=
/span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; vCard [36]=
 or LDIF [37] formats.&nbsp; Additional tokens can be registered</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; using IANA=
 and the procedures in Section 27.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; Use of the=
 Call-Info header field can pose a security risk.&nbsp; If a</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; callee fet=
ches the URIs provided by a malicious caller, the callee</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; may be at =
risk for displaying inappropriate or offensive content,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; dangerous =
or illegal content, and so on.&nbsp; Therefore, it is</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; RECOMMENDE=
D that a UA only render the information in the Call-Info</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; header fie=
ld if it can verify the authenticity of the element that</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; originated=
 the header field and trusts that element.&nbsp; This need not</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; be the pee=
r UA; a proxy can insert this header field into requests.</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; Example:</=
span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp; Call-Info:=
 &lt;<a href=3D"http://wwww.example.com/alice/photo.jpg">http://wwww.exampl=
e.com/alice/photo.jpg</a>&gt; ;purpose=3Dicon,</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp=
; &lt;<a href=3D"http://www.example.com/alice/">http://www.example.com/alic=
e/</a>&gt; ;purpose=3Dinfo</span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
<div>
<div style=3D"border:none; border-top:solid #E1E1E1 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt; font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font=
-size:11.0pt; font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"> Bria=
n Rosen [<a href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]
<br>
<b>Sent:</b> Wednesday, November 06, 2013 3:41 PM<br>
<b>To:</b> Richard Shockey<br>
<b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; <a href=3D=
"mailto:stir@ietf.org">
stir@ietf.org</a> List<br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt</span></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
<p class=3D"MsoNormal">We&#8217;ve considered adding some information that =
is not number and is not name, but is something like &#8220;bank&#8221;, wh=
ich might have some sort of validation behind it.</p>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">Is that along the lines you were thinking?</p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
<div>
<p class=3D"MsoNormal">Brian</p>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; wrote:</p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<br>
</p>
<blockquote style=3D"margin-top:5.0pt; margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">I agree with Pierce her=
e and respectfully disagree that STIR might eliminate the need for other fo=
rms of caller identification.&nbsp; Though your use case of credit
 card validation is a useful one and you are right there are still applicat=
ions that use SS7 for things that have nothing to do with call setup. I agr=
ee with you STIR may have more applications beyond the obvious ones of real=
time session validation.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">It&#8217;s been my expe=
rience recently that there is a use case for something MORE in the identifi=
cation of the session as it is presented to the called party.
 This is the CNAM &#43; idea we are kicking around on the CNIT list.</span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">_______________________=
________________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">cnit mailing list</span=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D"><a href=3D"mailto:cnit@=
ietf.org"><span style=3D"color:#954F72">cnit@ietf.org</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D"><a href=3D"https://www.=
ietf.org/mailman/listinfo/cnit"><span style=3D"color:#954F72">https://www.i=
etf.org/mailman/listinfo/cnit</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">But your use case of a =
bank wanting to make sure they could properly identify themselves to the co=
nsumer before establishing a conversation is exactly what
 this process is about.&nbsp; STIR is essential but it&#8217;s a multi-face=
ted problem that may require multi-faceted solutions.. and enhanced CNAM &#=
43; being only one of them.&nbsp;&nbsp; Its not unreasonable to discuss tho=
se.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">The obviously analogy i=
s I would want to see some real identification of a utility worker before I=
 let them into my house to make repairs. &nbsp;I would want some
 validation that the call to me to reconfirm the appointments was in fact f=
rom the utility in question.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;; color:#1F497D">&nbsp;</span></p>
</div>
<div>
<div style=3D"border:none; border-top:solid #E1E1E1 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt; font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"appl=
e-converted-space"><span style=3D"font-size:11.0pt; font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-si=
ze:11.0pt; font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=
=3D"mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a>
 [<a href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>=
]<span class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span cl=
ass=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho (fmousinh)=
<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Tuesday, Nov=
ember 05, 2013 6:26 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce=
 A [NTK]; <a href=3D"mailto:stir@ietf.org">
stir@ietf.org</a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Let me rephrase it&#8230; it may elimi=
nate the need for other forms of caller identification beyond what STIR wil=
l provide, depending on the specific use case. For example, a
 credit card company may choose to rely entirely on STIR before allowing a =
card to be unblocked by an IVR (and as I said earlier, many companies do it=
 today). In other use cases, the TN alone is not sufficient information &#8=
211; my health care provider will want
 to know which member of the family is calling.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">I agree that ANI is already broadly us=
ed to improve customer service today. However, it is not usually deemed as =
a secure enough mechanism to validate the caller (therefore
 this WG!), except if you are a large organization that can leverage things=
 like SS7. STIR would make this type of validation available to a broader n=
umber of companies.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Going on a tangent&#8230; perhaps this=
 is out of scope, but there is not a lot of discussion about called party h=
ijacking. Couldn&#8217;t a man-in-the-middle try to answer calls on
 my behalf? If my bank is calling me, I want to make sure it&#8217;s really=
 them before carrying a conversation, but wouldn&#8217;t they want the same=
?&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt; font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted=
-space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt; font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;">&lt;Gorman&gt;, &quot;Pierce =
A [NTK]&quot; &lt;<a href=3D"mailto:Pierce.Gorman@sprint.com"><span style=
=3D"color:#954F72">Pierce.Gorman@sprint.com</span></a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Nov=
ember 5, 2013 at 6:05 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousi=
nho &lt;<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"color:#954F72"=
>fmousinh@cisco.com</span></a>&gt;, &quot;<a href=3D"mailto:stir@ietf.org">=
<span style=3D"color:#954F72">stir@ietf.org</span></a>&quot; &lt;<a href=3D=
"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></=
a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir=
] draft-peterson-stir-threats-00.txt</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">I agree with your charact=
erization of businesses as victim of caller ID fraud however contact center=
s also use TN as a key to improve information available
 to call agents to reduce average time-per-call and increase capacity of th=
e call center.&nbsp; So I don&#8217;t agree that STIR would &#8220;eliminat=
e the need for caller identification from known TNs.&#8221;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">But perhaps I misundersto=
od your last sentence?</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;A=
rial&quot;,&quot;sans-serif&quot;; color:#0000CC">&nbsp;</span></p>
</div>
<div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt; font-family:&quo=
t;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:10.0pt; font-family:&quot;Tahoma=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:10.0pt; font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Fernando
 Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"=
color:#954F72">mailto:fmousinh@cisco.com</span></a>]<span class=3D"apple-co=
nverted-space">&nbsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 05,=
 2013 4:34 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></a><b=
r>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">I would suggest we add a new attack ty=
pe to section 3. More and more companies are using the caller ID for accoun=
t validation. For example, if I call my credit card provider
 from my office number, they ask me for identification. If I call from my h=
ome phone number, I&#8217;m informed that I don&#8217;t need to provide any=
 further identification because my number is on file. Some (all?) companies=
 that implement this type of validation rely
 on SS7 today.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Ultimately, this is yet another variat=
ion of impersonation &#8211; but in this case, the &#8220;victim&#8221; is =
a business, unlike the other two scenarios we&#8217;ve listed so far.</span=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Addressing this scenario would actuall=
y turn STIR into a feature, given it would enable contact centers of all si=
zes to eliminate the need for caller identification from
 known TNs.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div style=3D"border:none; border-top:solid #B5C4DF 1.0pt; padding:3.0pt 0i=
n 0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt; font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted=
-space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt; font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;">Alex Bobotek &lt;<a href=3D"m=
ailto:alex@bobotek.net"><span style=3D"color:#954F72">alex@bobotek.net</spa=
n></a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Oct=
ober 1, 2013 at 12:51 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &l=
t;<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:#954F72">br@bri=
anrosen.net</span></a>&gt;, &quot;Peterson, Jon&quot; &lt;<a href=3D"mailto=
:jon.peterson@neustar.biz"><span style=3D"color:#954F72">jon.peterson@neust=
ar.biz</span></a>&gt;<br>
<b>Cc:<span class=3D"apple-converted-space">&nbsp;</span></b>&quot;<a href=
=3D"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span=
></a>&quot; &lt;<a href=3D"mailto:stir@ietf.org"><span style=3D"color:#954F=
72">stir@ietf.org</span></a>&gt;, Richard Shockey &lt;<a href=3D"mailto:ric=
hard@shockey.us"><span style=3D"color:#954F72">richard@shockey.us</span></a=
>&gt;,
 &quot;'DOLLY, MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D"color:#954F72">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;=
<a href=3D"mailto:rjsparks@nostrum.com"><span style=3D"color:#954F72">rjspa=
rks@nostrum.com</span></a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir=
] draft-peterson-stir-threats-00.txt</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Jon,</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Thanks for the response.&nbsp; The int=
ention in #1 below is to clarify the following sentence:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">The<span class=3D"apple-converted-spac=
e">&nbsp;</span><b>primary</b><span class=3D"apple-converted-space">&nbsp;<=
/span>attack vector is</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; therefore one where the a=
ttacker contrives for the calling telephone</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number in signaling to be=
 a particular chosen number, one that the</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; attacker does not have th=
e authority to call from,<span class=3D"apple-converted-space">&nbsp;</span=
><b>in order for that</b></span></p>
</div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt; font-family:&quo=
t;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number to be rendered =
on the terminating side</span></b><span style=3D"font-size:11.0pt; font-fam=
ily:&quot;Calibri&quot;,&quot;sans-serif&quot;">.&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">This might be misconstrued as indicati=
ng that the objective of spoofing is simply the rendering of a spoofed numb=
er on the receiving display, causing mistaken conclusions
 that defenses might be limited to securing the rendered information. &nbsp=
;No issues with leaving this as it&#8217;s a valid point.&nbsp; Another (in=
creasing) motivation is to evade network and/or endpoint defenses that may =
block based on CPN.&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">So however it&#8217;s worded, I think =
it&#8217;s important to allow for both attack objectives of a spoofed prese=
ntation at the endpoint and in transit.&nbsp; &nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Regards,</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">Alex</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; -----Original Message-----</span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; From:<span class=3D"apple-convert=
ed-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"><span style=
=3D"color:#954F72">stir-bounces@ietf.org</span></a><span class=3D"apple-con=
verted-space">&nbsp;</span>[<a href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf Of</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Brian Rosen</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Sent: Tuesday, October 01, 2013 9=
:29 AM</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; To: Peterson, Jon</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Cc:<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:=
#954F72">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY,
 MARTIN C'; Richard</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Shockey</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Subject: Re: [stir] draft-peterso=
n-stir-threats-00.txt</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Don't think there is much MESSAGE=
.&nbsp; MSRP is about all we see, and XMPP is</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; more likely than that.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; Brian</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; On Oct 1, 2013, at 12:24 PM, &quo=
t;Peterson, Jon&quot; &lt;<a href=3D"mailto:jon.peterson@neustar.biz"><span=
 style=3D"color:windowtext; text-decoration:none">jon.peterson@neustar.biz<=
/span></a>&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; wrote:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; Thanks for these notes, Alex=
. Some responses below.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here are several comment=
s that should feed into the IETF Peterson draft:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Remove any=
 assumptions that the solution cannot be in-network</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; [IMO,</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; both endpoint and in-net=
work solutions should be facilitated]</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; Agreed that both in-band and=
 out-of-band solutions can usually be</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; implemented in either endpoi=
nts or in intermediaries of various kinds.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; If I see text that implies o=
therwise, I'll certainly change it.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sess=
ionless attack scenario.&nbsp; A spam payload may be carried in</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; a</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; SIP INVITE or MESSAGE, w=
hich might contain stock market advice even</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; in a display name field.=
&nbsp; These attacks do NOT require session</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; establishment.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; More generally, we shoul=
d be mindful of the fact that SIP is used in</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; telephony form more than=
 voice session setup.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; Probably if we were going to=
 include a sessionless attack scenario, it</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; would be with regular text m=
essages (whether carried on the PSTN over</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; TCAP or with some Internet p=
rotocol, including MESSAGE) rather than</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; with an INVITE, which typica=
lly wouldn't result in a payload being</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; immediately rendered to a us=
er. More on this below with your suggested</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; text.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here's some suggested ma=
rkup:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 1.&nbsp;&nbsp;&nbsp; Rep=
lace 2nd sentence of 2nd paragraph of 1.0 Introduction with:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; The primary attack vecto=
r is</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; therefore one wher=
e the attacker contrives for the calling telephone</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; number in signaling to b=
e a particular chosen number that the</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; attacker does not have t=
he authority to call from.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; What you want here is to rem=
ove the implication that the number will</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; be rendered on the terminati=
ng side? While there are some attacks</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; where that isn't significant=
, perhaps, I would say it is significant</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; in the primary attack vector=
s that concern us.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 2.&nbsp; Replace 3rd par=
agraph of 2.1 Endpoints with:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; =
Smart devices are generally based on computers with some degree</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; of programmability, the =
capacity to access the Internet, and</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; capabilities of renderin=
g text, audio and/or images.&nbsp; This includes</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; smart phones, telephone =
applications on desktop and laptop computers,</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; IP private branch exchan=
ges, and so on.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; I can add the notion that sm=
art devices can render text, audio and/or</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; images as you suggest.</span=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Atta=
ck Scenarios:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp; Impersonation, IP-Mobile Text Message</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp; &nbsp;An attacker with an computer sends a high volume of SIP MESSAG=
E</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; spam message to IP-enabl=
ed smart phones using randomized calling</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; party numbers.</span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;=
&nbsp; Countermeasure: in-band authenticated identity</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; Provided we're talking about=
 end-to-end SIP use of MESSAGE, agreed</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; that in-band would be the ri=
ght countermeasure. I am curious though</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; whether practically speaking=
 there is enough use of MESSAGE in this</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; fashion that we're actually =
seeing high-volume spam over MESSAGE</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; today. Either way, no proble=
m having an attack scenario of this form in the</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; document.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; Jon Peterson</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; Neustar, Inc.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Regards,</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Alex</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Messag=
e-----</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"=
apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org=
"><span style=3D"color:windowtext; text-decoration:none">stir-bounces@ietf.=
org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=
=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext; text-dec=
oration:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of Richard Shockey</=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septem=
ber 30, 2013 1:11 PM</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: 'DOLLY, MARTIN C=
'; 'Robert Sparks'</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"ap=
ple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span st=
yle=3D"color:windowtext; text-decoration:none">stir@ietf.org</span></a></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Messag=
e-----</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"=
apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org=
"><span style=3D"color:windowtext; text-decoration:none">stir-bounces@ietf.=
org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=
=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext; text-dec=
oration:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of DOLLY, MARTIN C</=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septem=
ber 30, 2013 12:58 PM</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: Robert Sparks</s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"ap=
ple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span st=
yle=3D"color:windowtext; text-decoration:none">stir@ietf.org</span></a></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Yes, ok</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Martin Dolly</span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Lead Member of Techn=
ical Staff</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Core Network &amp; G=
ov't/Regulatory Standards AT&amp;T Labs - Network</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Technology</span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1-609-903-3360<=
/span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-=
converted-space">&nbsp;</span><a href=3D"mailto:md3135@att.com"><span style=
=3D"color:windowtext; text-decoration:none">md3135@att.com</span></a></span=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013,=
 at 12:47 PM, &quot;Robert Sparks&quot;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; &lt;<a href=3D"m=
ailto:rjsparks@nostrum.com"><span style=3D"color:windowtext; text-decoratio=
n:none">rjsparks@nostrum.com</span></a>&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; wrote:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3=
:42 PM, DOLLY, MARTIN C wrote:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; With Hadriel=
 comments incorporated, it is a start</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Hi Martin -</spa=
n></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Just to make sur=
e - I think you're referring to Hadriel's comments</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; on the</span></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; problem statement do=
cument?</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; I don't think Ha=
driel's commented directly on stir-threats yet.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; In any case, we =
_are_ talking about a starting place, not a</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; finished</span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; product.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; If there's no ot=
her objection, I'd like to get Jon to submit the</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; threats</span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document as a WG -00=
 as soon as it's convenient.</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; RjS</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; -----Origina=
l Message-----</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span c=
lass=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@=
ietf.org"><span style=3D"color:windowtext; text-decoration:none">stir-bounc=
es@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<=
a href=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext; te=
xt-decoration:none">mailto:stir-bounces@ietf.org</span></a>]
 On</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Behalf Of Ru=
ss Housley</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Sent: Thursd=
ay, September 26, 2013 4:37 PM</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; To: IETF STI=
R Mail List</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Subject: Re:=
 [stir] draft-peterson-stir-threats-00.txt</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; It has been =
six days, I'd like to hear from more people about this</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document.&nbsp; Mart=
in asked for an additional week, so I'm sure we will</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; hear from him soon.<=
/span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Russ</span><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 2=
0, 2013, at 5:23 PM, Russ Housley wrote:</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span cla=
ss=3D"apple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id=
/draft-peterson-stir-threats-00.txt"><span style=3D"color:windowtext; text-=
decoration:none">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt<=
/span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should t=
he working group adopt this I-D as the starting point for</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; the</spa=
n></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; STIR threat docuent?=
</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Russ</sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; ____________=
___________________________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; stir mailing=
 list</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=
=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><s=
pan style=3D"color:windowtext; text-decoration:none">stir@ietf.org</span></=
a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=
=3D"apple-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mai=
lman/listinfo/stir"><span style=3D"color:windowtext; text-decoration:none">=
https://www.ietf.org/mailman/listinfo/stir</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; ________________=
_______________________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; stir mailing lis=
t</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"ap=
ple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span st=
yle=3D"color:windowtext; text-decoration:none">stir@ietf.org</span></a></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"ap=
ple-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/l=
istinfo/stir"><span style=3D"color:windowtext; text-decoration:none">https:=
//www.ietf.org/mailman/listinfo/stir</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; ____________________=
___________________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-=
converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext; text-decoration:none">stir@ietf.org</span></a></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-=
converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listi=
nfo/stir"><span style=3D"color:windowtext; text-decoration:none">https://ww=
w.ietf.org/mailman/listinfo/stir</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; ____________________=
___________________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</s=
pan></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-=
converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext; text-decoration:none">stir@ietf.org</span></a></span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-=
converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listi=
nfo/stir"><span style=3D"color:windowtext; text-decoration:none">https://ww=
w.ietf.org/mailman/listinfo/stir</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; ________________________=
_______________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; stir mailing list</span>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conv=
erted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"c=
olor:windowtext; text-decoration:none">stir@ietf.org</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conv=
erted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/=
stir"><span style=3D"color:windowtext; text-decoration:none">https://www.ie=
tf.org/mailman/listinfo/stir</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; ____________________________=
___________________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt; stir mailing list</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converte=
d-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color=
:windowtext; text-decoration:none">stir@ietf.org</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converte=
d-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir=
"><span style=3D"color:windowtext; text-decoration:none">https://www.ietf.o=
rg/mailman/listinfo/stir</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; _________________________________=
______________</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt; stir mailing list</span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spa=
ce">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:wind=
owtext; text-decoration:none">stir@ietf.org</span></a></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spa=
ce">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"><sp=
an style=3D"color:windowtext; text-decoration:none">https://www.ietf.org/ma=
ilman/listinfo/stir</span></a></span></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt; font-family:&quot;C=
alibri&quot;,&quot;sans-serif&quot;">&nbsp;</span></p>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:10.5pt; font-family:&quot;Calibri&quot;,&quot;sans-seri=
f&quot;">
<hr size=3D"3" width=3D"100%" align=3D"center">
</span></div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt; font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;; color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt; font-family:&quot;He=
lvetica&quot;,&quot;sans-serif&quot;">_____________________________________=
__________<br>
stir mailing list<br>
<a href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org=
/mailman/listinfo/stir</a></span></p>
</blockquote>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;</p>
</div>
</div>
</div>
<br>
<hr>
<font face=3D"Arial" color=3D"Gray" size=3D"1"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.<br>
</font>
</body>
</html>

--_000_B4C06A5710F0ED4583B3CF5E9C6B21D85515B88FPDAWM10Aadsprin_--

From Henning.Schulzrinne@fcc.gov  Thu Nov  7 07:00:32 2013
Return-Path: <Henning.Schulzrinne@fcc.gov>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3954821E8221; Thu,  7 Nov 2013 07:00:32 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.732
X-Spam-Level: 
X-Spam-Status: No, score=-1.732 tagged_above=-999 required=5 tests=[AWL=0.866,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jiLWRWSSoCH2; Thu,  7 Nov 2013 07:00:20 -0800 (PST)
Received: from DC-IP-1.fcc.gov (dc-ip-1.fcc.gov [192.104.54.97]) by ietfa.amsl.com (Postfix) with ESMTP id 4FC3921E81D6; Thu,  7 Nov 2013 07:00:18 -0800 (PST)
Message-ID: <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov>
From: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
To: "'Gorman, Pierce A [NTK]'" <Pierce.Gorman@sprint.com>, Brian Rosen <br@brianrosen.net>, Richard Shockey <richard@shockey.us>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO28lBm7MQs/E/Y0C8yrTGiGFz45oZ21rg
Date: Thu, 7 Nov 2013 15:00:16 +0000
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com>
In-Reply-To: <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_E6A16181E5FD2F46B962315BB05962D01FC237B6p2pxmb13fccnetw_"
MIME-Version: 1.0
Cc: "stir@ietf.org List" <stir@ietf.org>, "Fernando Mousinho \(fmousinh\)" <fmousinh@cisco.com>, "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 15:00:32 -0000

--_000_E6A16181E5FD2F46B962315BB05962D01FC237B6p2pxmb13fccnetw_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

As a thought experiment, Kumiko Ono and I had published a draft

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.

It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, ...) is not involved.

Henning

From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf Of Gor=
man, Pierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org List; cnit@ietf.org; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

>From 3261

20.9 Call-Info

   The Call-Info header field provides additional information about the
   caller or callee, depending on whether it is found in a request or
   response.  The purpose of the URI is described by the "purpose"
   parameter.  The "icon" parameter designates an image suitable as an
   iconic representation of the caller or callee.  The "info" parameter
   describes the caller or callee in general, for example, through a web
   page.  The "card" parameter provides a business card, for example, in
   vCard [36] or LDIF [37] formats.  Additional tokens can be registered
   using IANA and the procedures in Section 27.

   Use of the Call-Info header field can pose a security risk.  If a
   callee fetches the URIs provided by a malicious caller, the callee
   may be at risk for displaying inappropriate or offensive content,
   dangerous or illegal content, and so on.  Therefore, it is
   RECOMMENDED that a UA only render the information in the Call-Info
   header field if it can verify the authenticity of the element that
   originated the header field and trusts that element.  This need not
   be the peer UA; a proxy can insert this header field into requests.

   Example:

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,
     <http://www.example.com/alice/> ;purpose=3Dinfo

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

We've considered adding some information that is not number and is not name=
, but is something like "bank", which might have some sort of validation be=
hind it.

Is that along the lines you were thinking?

Brian
On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:


I agree with Pierce here and respectfully disagree that STIR might eliminat=
e the need for other forms of caller identification.  Though your use case =
of credit card validation is a useful one and you are right there are still=
 applications that use SS7 for things that have nothing to do with call set=
up. I agree with you STIR may have more applications beyond the obvious one=
s of realtime session validation.

It's been my experience recently that there is a use case for something MOR=
E in the identification of the session as it is presented to the called par=
ty. This is the CNAM + idea we are kicking around on the CNIT list.

_______________________________________________
cnit mailing list
cnit@ietf.org<mailto:cnit@ietf.org>
https://www.ietf.org/mailman/listinfo/cnit

But your use case of a bank wanting to make sure they could properly identi=
fy themselves to the consumer before establishing a conversation is exactly=
 what this process is about.  STIR is essential but it's a multi-faceted pr=
oblem that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.   Its not unreasonable to discuss those.

The obviously analogy is I would want to see some real identification of a =
utility worker before I let them into my house to make repairs.  I would wa=
nt some validation that the call to me to reconfirm the appointments was in=
 fact from the utility in question.



From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Let me rephrase it... it may eliminate the need for other forms of caller i=
dentification beyond what STIR will provide, depending on the specific use =
case. For example, a credit card company may choose to rely entirely on STI=
R before allowing a card to be unblocked by an IVR (and as I said earlier, =
many companies do it today). In other use cases, the TN alone is not suffic=
ient information - my health care provider will want to know which member o=
f the family is calling.

I agree that ANI is already broadly used to improve customer service today.=
 However, it is not usually deemed as a secure enough mechanism to validate=
 the caller (therefore this WG!), except if you are a large organization th=
at can leverage things like SS7. STIR would make this type of validation av=
ailable to a broader number of companies.


Going on a tangent... perhaps this is out of scope, but there is not a lot =
of discussion about called party hijacking. Couldn't a man-in-the-middle tr=
y to answer calls on my behalf? If my bank is calling me, I want to make su=
re it's really them before carrying a conversation, but wouldn't they want =
the same?


From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com<mailto:Pierce.Go=
rman@sprint.com>>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho <fmousinh@cisco.com<mailto:fmousinh@cisco.com>>, "sti=
r@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.org>>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

I agree with your characterization of businesses as victim of caller ID fra=
ud however contact centers also use TN as a key to improve information avai=
lable to call agents to reduce average time-per-call and increase capacity =
of the call center.  So I don't agree that STIR would "eliminate the need f=
or caller identification from known TNs."

But perhaps I misunderstood your last sentence?


From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]
Sent: November 05, 2013 4:34 PM
To: stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I would suggest we add a new attack type to section 3. More and more compan=
ies are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for identificati=
on. If I call from my home phone number, I'm informed that I don't need to =
provide any further identification because my number is on file. Some (all?=
) companies that implement this type of validation rely on SS7 today.

Ultimately, this is yet another variation of impersonation - but in this ca=
se, the "victim" is a business, unlike the other two scenarios we've listed=
 so far.

Addressing this scenario would actually turn STIR into a feature, given it =
would enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.



From: Alex Bobotek <alex@bobotek.net<mailto:alex@bobotek.net>>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>, "Peterson, J=
on" <jon.peterson@neustar.biz<mailto:jon.peterson@neustar.biz>>
Cc: "stir@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.o=
rg>>, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>, "'DO=
LLY, MARTIN C'" <md3135@att.com<mailto:md3135@att.com>>, 'Robert Sparks' <r=
jsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Jon,

Thanks for the response.  The intention in #1 below is to clarify the follo=
wing sentence:

The primary attack vector is
   therefore one where the attacker contrives for the calling telephone
   number in signaling to be a particular chosen number, one that the
   attacker does not have the authority to call from, in order for that
   number to be rendered on the terminating side.

This might be misconstrued as indicating that the objective of spoofing is =
simply the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the rendere=
d information.  No issues with leaving this as it's a valid point.  Another=
 (increasing) motivation is to evade network and/or endpoint defenses that =
may block based on CPN.

So however it's worded, I think it's important to allow for both attack obj=
ectives of a spoofed presentation at the endpoint and in transit.

Regards,

Alex

> -----Original Message-----
> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-bo=
unces@ietf.org] On Behalf Of
> Brian Rosen
> Sent: Tuesday, October 01, 2013 9:29 AM
> To: Peterson, Jon
> Cc: stir@ietf.org<mailto:stir@ietf.org>; Alex Bobotek; 'Robert Sparks'; '=
DOLLY, MARTIN C'; Richard
> Shockey
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
>
> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is
> more likely than that.
>
> Brian
>
> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <jon.peterson@neustar.biz<ma=
ilto:jon.peterson@neustar.biz>>
> wrote:
>
> > Thanks for these notes, Alex. Some responses below.
> >
> >> Here are several comments that should feed into the IETF Peterson draf=
t:
> >>
> >> *   Remove any assumptions that the solution cannot be in-network
> [IMO,
> >> both endpoint and in-network solutions should be facilitated]
> >
> > Agreed that both in-band and out-of-band solutions can usually be
> > implemented in either endpoints or in intermediaries of various kinds.
> > If I see text that implies otherwise, I'll certainly change it.
> >
> >> *   Add a sessionless attack scenario.  A spam payload may be carried =
in
> a
> >> SIP INVITE or MESSAGE, which might contain stock market advice even
> >> in a display name field.  These attacks do NOT require session
> establishment.
> >> More generally, we should be mindful of the fact that SIP is used in
> >> telephony form more than voice session setup.
> >
> > Probably if we were going to include a sessionless attack scenario, it
> > would be with regular text messages (whether carried on the PSTN over
> > TCAP or with some Internet protocol, including MESSAGE) rather than
> > with an INVITE, which typically wouldn't result in a payload being
> > immediately rendered to a user. More on this below with your suggested
> text.
> >
> >> Here's some suggested markup:
> >>
> >>
> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:
> >>
> >> The primary attack vector is
> >>  therefore one where the attacker contrives for the calling telephone
> >> number in signaling to be a particular chosen number that the
> >> attacker does not have the authority to call from.
> >
> > What you want here is to remove the implication that the number will
> > be rendered on the terminating side? While there are some attacks
> > where that isn't significant, perhaps, I would say it is significant
> > in the primary attack vectors that concern us.
> >
> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> >>
> >>     Smart devices are generally based on computers with some degree
> >> of programmability, the capacity to access the Internet, and
> >> capabilities of rendering text, audio and/or images.  This includes
> >> smart phones, telephone applications on desktop and laptop computers,
> >> IP private branch exchanges, and so on.
> >
> > I can add the notion that smart devices can render text, audio and/or
> > images as you suggest.
> >
> >> 3.  Add to 3.3 Attack Scenarios:
> >>
> >>       Impersonation, IP-Mobile Text Message
> >>
> >>        An attacker with an computer sends a high volume of SIP MESSAGE
> >> spam message to IP-enabled smart phones using randomized calling
> >> party numbers.
> >>
> >>       Countermeasure: in-band authenticated identity
> >
> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > that in-band would be the right countermeasure. I am curious though
> > whether practically speaking there is enough use of MESSAGE in this
> > fashion that we're actually seeing high-volume spam over MESSAGE
> > today. Either way, no problem having an attack scenario of this form in=
 the
> document.
> >
> > Jon Peterson
> > Neustar, Inc.
> >
> >> Regards,
> >>
> >> Alex
> >>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of Richard Shockey
> >>> Sent: Monday, September 30, 2013 1:11 PM
> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> +1
> >>>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of DOLLY, MARTIN C
> >>> Sent: Monday, September 30, 2013 12:58 PM
> >>> To: Robert Sparks
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> Yes, ok
> >>>
> >>> Martin Dolly
> >>> Lead Member of Technical Staff
> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> >>> Technology
> >>> +1-609-903-3360
> >>> md3135@att.com<mailto:md3135@att.com>
> >>>
> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> >>>> <rjsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
> >>> wrote:
> >>>>
> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> >>>>> With Hadriel comments incorporated, it is a start
> >>>> Hi Martin -
> >>>>
> >>>> Just to make sure - I think you're referring to Hadriel's comments
> >>>> on the
> >>> problem statement document?
> >>>> I don't think Hadriel's commented directly on stir-threats yet.
> >>>>
> >>>> In any case, we _are_ talking about a starting place, not a
> >>>> finished
> >>> product.
> >>>>
> >>>> If there's no other objection, I'd like to get Jon to submit the
> >>>> threats
> >>> document as a WG -00 as soon as it's convenient.
> >>>>
> >>>> RjS
> >>>>>
> >>>>> -----Original Message-----
> >>>>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:s=
tir-bounces@ietf.org] On
> >>>>> Behalf Of Russ Housley
> >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> >>>>> To: IETF STIR Mail List
> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>>>
> >>>>> It has been six days, I'd like to hear from more people about this
> >>> document.  Martin asked for an additional week, so I'm sure we will
> >>> hear from him soon.
> >>>>>
> >>>>> Russ
> >>>>>
> >>>>>
> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> >>>>>>
> >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> >>>>>>
> >>>>>> Should the working group adopt this I-D as the starting point for
> >>>>>> the
> >>> STIR threat docuent?
> >>>>>>
> >>>>>> Russ
> >>>>> _______________________________________________
> >>>>> stir mailing list
> >>>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>>> https://www.ietf.org/mailman/listinfo/stir
> >>>>
> >>>> _______________________________________________
> >>>> stir mailing list
> >>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>> https://www.ietf.org/mailman/listinfo/stir
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >>>
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >> _______________________________________________
> >> stir mailing list
> >> stir@ietf.org<mailto:stir@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/stir
> >
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org<mailto:stir@ietf.org>
> > https://www.ietf.org/mailman/listinfo/stir
>
> _______________________________________________
> stir mailing list
> stir@ietf.org<mailto:stir@ietf.org>
> https://www.ietf.org/mailman/listinfo/stir

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.
_______________________________________________
stir mailing list
stir@ietf.org<mailto:stir@ietf.org>
https://www.ietf.org/mailman/listinfo/stir



________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.

--_000_E6A16181E5FD2F46B962315BB05962D01FC237B6p2pxmb13fccnetw_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman","serif";}
span.emailstyle18
	{mso-style-name:emailstyle18;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma","sans-serif";}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Arial","sans-serif";
	color:#0000CC;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As a thought experiment, =
Kumiko Ono and I had published a draft
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">http://tools.ietf.org/htm=
l/draft-ono-dispatch-attribute-validation-00<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">to allow third parties to=
 validate property information. If the validating party (e.g., a bank regul=
ator) is willing to sign a certificate, similar in spirit
 to the framed gold-leaf diplomas in your dentist&#8217;s office or, more l=
owly, to the health departments rating in a restaurant window, and it can b=
e tied to a phone number, this shouldn&#8217;t be too hard.<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s a bit harder i=
f the certifying authority (regulator, Realtor board, local bar association=
, &#8230;) is not involved.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Henning
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> cnit-bou=
nces@ietf.org [mailto:cnit-bounces@ietf.org]
<b>On Behalf Of </b>Gorman, Pierce A [NTK]<br>
<b>Sent:</b> Thursday, November 07, 2013 9:54 AM<br>
<b>To:</b> Brian Rosen; Richard Shockey<br>
<b>Cc:</b> stir@ietf.org List; cnit@ietf.org; Fernando Mousinho (fmousinh)<=
br>
<b>Subject:</b> Re: [cnit] [stir] draft-peterson-stir-threats-00.txt<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;ll admit I am not f=
amiliar with v/x/jcard encoding differences or the implications of their us=
e so I&#8217;ll encourage educating me if it isn&#8217;t too onerous.</span=
><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;m not sure what is =
the concern with a 3<sup>rd</sup> party providing &#8220;validation&#8221; =
though.&nbsp; There are numerous examples of 3<sup>rd</sup> parties providi=
ng validation
 of information including NASDAQ, NYSE, Barron&#8217;s, Moody&#8217;s, and =
the federal reserve banking system to name a few.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:black">Pierce</span><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Brian Ro=
sen [<a href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]
<br>
<b>Sent:</b> November 06, 2013 11:59 PM<br>
<b>To:</b> Richard Shockey<br>
<b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; <a href=3D=
"mailto:stir@ietf.org">
stir@ietf.org</a> List; <a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><=
br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt</span><o:p></=
o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal">I think this would be a heavy lift.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">If the responsible entity was a carrier, then it wou=
ld have to validate the data, which it has very little basis to validate. &=
nbsp;It could get a 3rd party to do the validation, but then it&#8217;s put=
ting its reputation on the back of some hired
 hand validator.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">If the responsibility is the end user/device, then t=
he signature has no value.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I do question JCARD vs xCard, but that&#8217;s an en=
coding detail. &nbsp;All of SIP Is XML described by schema, not json.<o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">URI for a JCARD in the CA=
LL INFO header provisioned by the calling party and ultimately signed by th=
e responsible entity. &nbsp;The carrier could provision this
 for their mobile or hosted customers.&nbsp; Enterprises could do this them=
selves.&nbsp; This also has advantages in Enterprise to Enterprise UC as we=
ll where the data is derived from the Enterprise &#8220;directory&#8221; an=
d could facilitate end to end PPX to PBX communications
 especially in point to point video communications. </span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There are certainly priva=
cy and security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp;=
 This really would be PII in the clear but then its done voluntarily.
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There would have to be so=
me work around restructuring the Header and adding some parameters but it&#=
8217;s underutilized right now and this Use Case is a perfectly
 appropriate use. </span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://tools.=
ietf.org/html/draft-ietf-jcardcal-jcard-06">https://tools.ietf.org/html/dra=
ft-ietf-jcardcal-jcard-06</a></span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Obviously it would need t=
o be signed but we don&#8217;t need to worry about that ..yet.
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">From 3261
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">20.9 Call-Info</span><o:p=
></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; The Call-Inf=
o header field provides additional information about the</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; caller or ca=
llee, depending on whether it is found in a request or</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; response.&nb=
sp; The purpose of the URI is described by the &quot;purpose&quot;</span><o=
:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; parameter.&n=
bsp; The &quot;icon&quot; parameter designates an image suitable as an</spa=
n><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; iconic repre=
sentation of the caller or callee.&nbsp; The &quot;info&quot; parameter</sp=
an><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; describes th=
e caller or callee in general, for example, through a web</span><o:p></o:p>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; page.&nbsp; =
The &quot;card&quot; parameter provides a business card, for example, in</s=
pan><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; vCard [36] o=
r LDIF [37] formats.&nbsp; Additional tokens can be registered</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; using IANA a=
nd the procedures in Section 27.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Use of the C=
all-Info header field can pose a security risk.&nbsp; If a</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; callee fetch=
es the URIs provided by a malicious caller, the callee</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; may be at ri=
sk for displaying inappropriate or offensive content,</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; dangerous or=
 illegal content, and so on.&nbsp; Therefore, it is</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; RECOMMENDED =
that a UA only render the information in the Call-Info</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; header field=
 if it can verify the authenticity of the element that</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; originated t=
he header field and trusts that element.&nbsp; This need not</span><o:p></o=
:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into requests.</span><o:p></o:p></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Example:</sp=
an><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Call-Info: &=
lt;<a href=3D"http://wwww.example.com/alice/photo.jpg">http://wwww.example.=
com/alice/photo.jpg</a>&gt; ;purpose=3Dicon,</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;<a href=3D"http://www.example.com/alice/">http://www.example.com/alice/=
</a>&gt; ;purpose=3Dinfo</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"> Brian =
Rosen [<a href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]
<br>
<b>Sent:</b> Wednesday, November 06, 2013 3:41 PM<br>
<b>To:</b> Richard Shockey<br>
<b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; <a href=3D=
"mailto:stir@ietf.org">
stir@ietf.org</a> List<br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt</span><o:p></=
o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal">We&#8217;ve considered adding some information that =
is not number and is not name, but is something like &#8220;bank&#8221;, wh=
ich might have some sort of validation behind it.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Is that along the lines you were thinking?<o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><br>
<br>
<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree with Pierce here =
and respectfully disagree that STIR might eliminate the need for other form=
s of caller identification.&nbsp; Though your use case of credit
 card validation is a useful one and you are right there are still applicat=
ions that use SS7 for things that have nothing to do with call setup. I agr=
ee with you STIR may have more applications beyond the obvious ones of real=
time session validation.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s been my experi=
ence recently that there is a use case for something MORE in the identifica=
tion of the session as it is presented to the called party. This
 is the CNAM &#43; idea we are kicking around on the CNIT list.</span><o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">_________________________=
______________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">cnit mailing list</span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"mailto:cnit@ie=
tf.org"><span style=3D"color:#954F72">cnit@ietf.org</span></a></span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://www.ie=
tf.org/mailman/listinfo/cnit"><span style=3D"color:#954F72">https://www.iet=
f.org/mailman/listinfo/cnit</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">But your use case of a ba=
nk wanting to make sure they could properly identify themselves to the cons=
umer before establishing a conversation is exactly what
 this process is about.&nbsp; STIR is essential but it&#8217;s a multi-face=
ted problem that may require multi-faceted solutions.. and enhanced CNAM &#=
43; being only one of them.&nbsp;&nbsp; Its not unreasonable to discuss tho=
se.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The obviously analogy is =
I would want to see some real identification of a utility worker before I l=
et them into my house to make repairs. &nbsp;I would want some
 validation that the call to me to reconfirm the appointments was in fact f=
rom the utility in question.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=3D"=
mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a>
 [<a href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>=
]<span class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span cl=
ass=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho (fmousinh)=
<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Tuesday, Nov=
ember 05, 2013 6:26 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce=
 A [NTK]; <a href=3D"mailto:stir@ietf.org">
stir@ietf.org</a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Let me rephrase it&#8230; it may elimin=
ate the need for other forms of caller identification beyond what STIR will=
 provide, depending on the specific use case. For example, a credit
 card company may choose to rely entirely on STIR before allowing a card to=
 be unblocked by an IVR (and as I said earlier, many companies do it today)=
. In other use cases, the TN alone is not sufficient information &#8211; my=
 health care provider will want to know
 which member of the family is calling.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I agree that ANI is already broadly use=
d to improve customer service today. However, it is not usually deemed as a=
 secure enough mechanism to validate the caller (therefore
 this WG!), except if you are a large organization that can leverage things=
 like SS7. STIR would make this type of validation available to a broader n=
umber of companies.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Going on a tangent&#8230; perhaps this =
is out of scope, but there is not a lot of discussion about called party hi=
jacking. Couldn&#8217;t a man-in-the-middle try to answer calls on my
 behalf? If my bank is calling me, I want to make sure it&#8217;s really th=
em before carrying a conversation, but wouldn&#8217;t they want the same?&n=
bsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">&lt;Gorman&gt;, &quot;Pierce A =
[NTK]&quot; &lt;<a href=3D"mailto:Pierce.Gorman@sprint.com"><span style=3D"=
color:#954F72">Pierce.Gorman@sprint.com</span></a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Nov=
ember 5, 2013 at 6:05 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousi=
nho &lt;<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"color:#954F72"=
>fmousinh@cisco.com</span></a>&gt;, &quot;<a href=3D"mailto:stir@ietf.org">=
<span style=3D"color:#954F72">stir@ietf.org</span></a>&quot; &lt;<a href=3D=
"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></=
a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I agree with your character=
ization of businesses as victim of caller ID fraud however contact centers =
also use TN as a key to improve information available to
 call agents to reduce average time-per-call and increase capacity of the c=
all center.&nbsp; So I don&#8217;t agree that STIR would &#8220;eliminate t=
he need for caller identification from known TNs.&#8221;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">But perhaps I misunderstood=
 your last sentence?</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Fernando
 Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"=
color:#954F72">mailto:fmousinh@cisco.com</span></a>]<span class=3D"apple-co=
nverted-space">&nbsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 05,=
 2013 4:34 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></a><b=
r>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I would suggest we add a new attack typ=
e to section 3. More and more companies are using the caller ID for account=
 validation. For example, if I call my credit card provider
 from my office number, they ask me for identification. If I call from my h=
ome phone number, I&#8217;m informed that I don&#8217;t need to provide any=
 further identification because my number is on file. Some (all?) companies=
 that implement this type of validation rely
 on SS7 today.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Ultimately, this is yet another variati=
on of impersonation &#8211; but in this case, the &#8220;victim&#8221; is a=
 business, unlike the other two scenarios we&#8217;ve listed so far.</span>=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Addressing this scenario would actually=
 turn STIR into a feature, given it would enable contact centers of all siz=
es to eliminate the need for caller identification from
 known TNs.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">Alex Bobotek &lt;<a href=3D"mai=
lto:alex@bobotek.net"><span style=3D"color:#954F72">alex@bobotek.net</span>=
</a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Oct=
ober 1, 2013 at 12:51 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &l=
t;<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:#954F72">br@bri=
anrosen.net</span></a>&gt;, &quot;Peterson, Jon&quot; &lt;<a href=3D"mailto=
:jon.peterson@neustar.biz"><span style=3D"color:#954F72">jon.peterson@neust=
ar.biz</span></a>&gt;<br>
<b>Cc:<span class=3D"apple-converted-space">&nbsp;</span></b>&quot;<a href=
=3D"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span=
></a>&quot; &lt;<a href=3D"mailto:stir@ietf.org"><span style=3D"color:#954F=
72">stir@ietf.org</span></a>&gt;, Richard Shockey &lt;<a href=3D"mailto:ric=
hard@shockey.us"><span style=3D"color:#954F72">richard@shockey.us</span></a=
>&gt;,
 &quot;'DOLLY, MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D"color:#954F72">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;=
<a href=3D"mailto:rjsparks@nostrum.com"><span style=3D"color:#954F72">rjspa=
rks@nostrum.com</span></a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Jon,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Thanks for the response.&nbsp; The inte=
ntion in #1 below is to clarify the following sentence:</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">The<span class=3D"apple-converted-space=
">&nbsp;</span><b>primary</b><span class=3D"apple-converted-space">&nbsp;</=
span>attack vector is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; therefore one where the at=
tacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number in signaling to be =
a particular chosen number, one that the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; attacker does not have the=
 authority to call from,<span class=3D"apple-converted-space">&nbsp;</span>=
<b>in order for that</b></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number to be rendered o=
n the terminating side</span></b><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;">.&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">This might be misconstrued as indicatin=
g that the objective of spoofing is simply the rendering of a spoofed numbe=
r on the receiving display, causing mistaken conclusions
 that defenses might be limited to securing the rendered information. &nbsp=
;No issues with leaving this as it&#8217;s a valid point.&nbsp; Another (in=
creasing) motivation is to evade network and/or endpoint defenses that may =
block based on CPN.&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">So however it&#8217;s worded, I think i=
t&#8217;s important to allow for both attack objectives of a spoofed presen=
tation at the endpoint and in transit.&nbsp; &nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Regards,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Alex</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; -----Original Message-----</span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; From:<span class=3D"apple-converte=
d-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"><span style=
=3D"color:#954F72">stir-bounces@ietf.org</span></a><span class=3D"apple-con=
verted-space">&nbsp;</span>[<a href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf Of</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian Rosen</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Sent: Tuesday, October 01, 2013 9:=
29 AM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; To: Peterson, Jon</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Cc:<span class=3D"apple-converted-=
space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:#=
954F72">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY,
 MARTIN C'; Richard</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Shockey</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Subject: Re: [stir] draft-peterson=
-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Don't think there is much MESSAGE.=
&nbsp; MSRP is about all we see, and XMPP is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; more likely than that.</span><o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; On Oct 1, 2013, at 12:24 PM, &quot=
;Peterson, Jon&quot; &lt;<a href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D"color:windowtext;text-decoration:none">jon.peterson@neustar.biz</s=
pan></a>&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; wrote:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Thanks for these notes, Alex.=
 Some responses below.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here are several comments=
 that should feed into the IETF Peterson draft:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Remove any =
assumptions that the solution cannot be in-network</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; [IMO,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; both endpoint and in-netw=
ork solutions should be facilitated]</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Agreed that both in-band and =
out-of-band solutions can usually be</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; implemented in either endpoin=
ts or in intermediaries of various kinds.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; If I see text that implies ot=
herwise, I'll certainly change it.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessi=
onless attack scenario.&nbsp; A spam payload may be carried in</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; a</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; SIP INVITE or MESSAGE, wh=
ich might contain stock market advice even</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; in a display name field.&=
nbsp; These attacks do NOT require session</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; establishment.</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; More generally, we should=
 be mindful of the fact that SIP is used in</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; telephony form more than =
voice session setup.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Probably if we were going to =
include a sessionless attack scenario, it</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; would be with regular text me=
ssages (whether carried on the PSTN over</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; TCAP or with some Internet pr=
otocol, including MESSAGE) rather than</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; with an INVITE, which typical=
ly wouldn't result in a payload being</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; immediately rendered to a use=
r. More on this below with your suggested</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; text.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here's some suggested mar=
kup:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 1.&nbsp;&nbsp;&nbsp; Repl=
ace 2nd sentence of 2nd paragraph of 1.0 Introduction with:</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; The primary attack vector=
 is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; therefore one where=
 the attacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; number in signaling to be=
 a particular chosen number that the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; attacker does not have th=
e authority to call from.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; What you want here is to remo=
ve the implication that the number will</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; be rendered on the terminatin=
g side? While there are some attacks</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; where that isn't significant,=
 perhaps, I would say it is significant</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; in the primary attack vectors=
 that concern us.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 2.&nbsp; Replace 3rd para=
graph of 2.1 Endpoints with:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; S=
mart devices are generally based on computers with some degree</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; of programmability, the c=
apacity to access the Internet, and</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; capabilities of rendering=
 text, audio and/or images.&nbsp; This includes</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; smart phones, telephone a=
pplications on desktop and laptop computers,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; IP private branch exchang=
es, and so on.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; I can add the notion that sma=
rt devices can render text, audio and/or</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; images as you suggest.</span>=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attac=
k Scenarios:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; Impersonation, IP-Mobile Text Message</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; &nbsp;An attacker with an computer sends a high volume of SIP MESSAGE=
</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; spam message to IP-enable=
d smart phones using randomized calling</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; party numbers.</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&=
nbsp; Countermeasure: in-band authenticated identity</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Provided we're talking about =
end-to-end SIP use of MESSAGE, agreed</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; that in-band would be the rig=
ht countermeasure. I am curious though</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; whether practically speaking =
there is enough use of MESSAGE in this</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; fashion that we're actually s=
eeing high-volume spam over MESSAGE</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; today. Either way, no problem=
 having an attack scenario of this form in the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; document.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Jon Peterson</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Neustar, Inc.</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Regards,</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Alex</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of Richard Shockey</s=
pan><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 1:11 PM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: 'DOLLY, MARTIN C'=
; 'Robert Sparks'</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of DOLLY, MARTIN C</s=
pan><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 12:58 PM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: Robert Sparks</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Yes, ok</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Martin Dolly</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Lead Member of Techni=
cal Staff</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Core Network &amp; Go=
v't/Regulatory Standards AT&amp;T Labs - Network</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Technology</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1-609-903-3360</=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:md3135@att.com"><span style=
=3D"color:windowtext;text-decoration:none">md3135@att.com</span></a></span>=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, =
at 12:47 PM, &quot;Robert Sparks&quot;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; &lt;<a href=3D"ma=
ilto:rjsparks@nostrum.com"><span style=3D"color:windowtext;text-decoration:=
none">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; wrote:</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:=
42 PM, DOLLY, MARTIN C wrote:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; With Hadriel =
comments incorporated, it is a start</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Hi Martin -</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Just to make sure=
 - I think you're referring to Hadriel's comments</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; on the</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; problem statement doc=
ument?</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; I don't think Had=
riel's commented directly on stir-threats yet.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; In any case, we _=
are_ talking about a starting place, not a</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; finished</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; product.</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; If there's no oth=
er objection, I'd like to get Jon to submit the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; threats</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document as a WG -00 =
as soon as it's convenient.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; RjS</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original=
 Message-----</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span cl=
ass=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@i=
etf.org"><span style=3D"color:windowtext;text-decoration:none">stir-bounces=
@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-=
decoration:none">mailto:stir-bounces@ietf.org</span></a>]
 On</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Behalf Of Rus=
s Housley</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Sent: Thursda=
y, September 26, 2013 4:37 PM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; To: IETF STIR=
 Mail List</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Subject: Re: =
[stir] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; It has been s=
ix days, I'd like to hear from more people about this</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document.&nbsp; Marti=
n asked for an additional week, so I'm sure we will</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; hear from him soon.</=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Russ</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20=
, 2013, at 5:23 PM, Russ Housley wrote:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span clas=
s=3D"apple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id/=
draft-peterson-stir-threats-00.txt"><span style=3D"color:windowtext;text-de=
coration:none">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</s=
pan></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should th=
e working group adopt this I-D as the starting point for</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; the</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; STIR threat docuent?<=
/span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Russ</spa=
n><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; _____________=
__________________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span=
 style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailma=
n/listinfo/stir"><span style=3D"color:windowtext;text-decoration:none">http=
s://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; _________________=
______________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; stir mailing list=
</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/li=
stinfo/stir"><span style=3D"color:windowtext;text-decoration:none">https://=
www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; _________________________=
______________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; stir mailing list</span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"co=
lor:windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/s=
tir"><span style=3D"color:windowtext;text-decoration:none">https://www.ietf=
.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; _____________________________=
__________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; stir mailing list</span><o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:=
windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"=
><span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org=
/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; __________________________________=
_____________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; stir mailing list</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:windo=
wtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"><spa=
n style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">
<hr size=3D"3" width=3D"100%" align=3D"center">
</span></div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;">______________________________________=
_________<br>
stir mailing list<br>
<a href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org=
/mailman/listinfo/stir</a></span><o:p></o:p></p>
</blockquote>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center">
<hr size=3D"2" width=3D"100%" align=3D"center">
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</body>
</html>

--_000_E6A16181E5FD2F46B962315BB05962D01FC237B6p2pxmb13fccnetw_--

From richard@shockey.us  Thu Nov  7 07:16:49 2013
Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0165421E82A2 for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 07:16:48 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -101.143
X-Spam-Level: 
X-Spam-Status: No, score=-101.143 tagged_above=-999 required=5 tests=[AWL=-0.649, BAYES_00=-2.599, FH_RELAY_NODNS=1.451, HELO_MISMATCH_COM=0.553, HTML_MESSAGE=0.001, RDNS_NONE=0.1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id yYji5BENwUFm for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 07:16:35 -0800 (PST)
Received: from alt-proxy8.mail.unifiedlayer.com (unknown [74.220.207.38]) by ietfa.amsl.com (Postfix) with SMTP id A52E521E82A5 for <cnit@ietf.org>; Thu,  7 Nov 2013 07:16:13 -0800 (PST)
Received: (qmail 3000 invoked by uid 0); 7 Nov 2013 15:16:12 -0000
Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy19.mail.unifiedlayer.com with SMTP; 7 Nov 2013 15:16:12 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=liotkh2XOns4mvgLxv6NWxpzUlrIRR1S4rgFKPoxIHc=;  b=X+T0lw4KDdk0NeLZDdS1+PnTiqMg3Tm1kc1oU5ETeDWVcBVYjkpGp2trTr+cXEXAU6r59EVAWbJvC0dZtCGhtX1cTrHSpegmxrKH43t1TYYbRyy8Y/9xNsO0rQLcCi7J;
Received: from [173.79.179.104] (port=49527 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from <richard@shockey.us>) id 1VeRJb-0006jA-C1; Thu, 07 Nov 2013 08:16:12 -0700
From: "Richard Shockey" <richard@shockey.us>
To: "'Brian Rosen'" <br@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>
In-Reply-To: <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>
Date: Thu, 7 Nov 2013 10:16:09 -0500
Message-ID: <00f401cedbcc$4a7e3700$df7aa500$@shockey.us>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_00F5_01CEDBA2.61B77140"
X-Mailer: Microsoft Outlook 15.0
Content-Language: en-us
Thread-Index: AQKuxOgdsFN95Qgmj4nb3bGbN4Q20wEejKIqAhCsH9QBYcTrswHCXLsVAZF++gqYGuRbMA==
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us}
Cc: stir@ietf.org, "'Gorman, Pierce A \[NTK\]'" <Pierce.Gorman@sprint.com>, "'Fernando Mousinho \(fmousinh\)'" <fmousinh@cisco.com>, cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 15:16:49 -0000

This is a multipart message in MIME format.

------=_NextPart_000_00F5_01CEDBA2.61B77140
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

 

Like CNAM is so accurate today. ??  When certain companies get the data from
scanning phone books that are not even printed anymore? 

 

The carrier has the billing relationship. As you well know that is where the
data comes from now but it is not granular.  

 

The carrier permits the customer to create the record(s). What are you
trying to validate? The Accuracy of the data?  . In any event none of that
is our problem.   We make the tools. Someone else worries about policy.

 

You are making this way too complicated thus defeating the basic use case.


 

Well from time to time I've discovered I'm not a big fan of the end to end
principal.  It just doesn't work for every use case.  This is a carrier
service or in certain cases hosted.

 

Much like I'm convinced the out of band solution in STIR is total fantasy
and like VIPR will almost never actually be used in practice. 

 

As for encoding I mentioned JCARD since there seems to be a faction in the
IETF that is anti-XML 

 

From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf Of
Brian Rosen
Sent: Thursday, November 07, 2013 12:59 AM
To: Richard Shockey
Cc: stir@ietf.org List; Gorman, Pierce A [NTK]; cnit@ietf.org; Fernando
Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

 

I think this would be a heavy lift.

 

If the responsible entity was a carrier, then it would have to validate the
data, which it has very little basis to validate.  It could get a 3rd party
to do the validation, but then it's putting its reputation on the back of
some hired hand validator.

 

If the responsibility is the end user/device, then the signature has no
value.

 

I do not argue that Call-Info is suitable,  it is.

 

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is
XML described by schema, not json.

 

Brian

 

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us
<mailto:richard@shockey.us> > wrote:





URI for a JCARD in the CALL INFO header provisioned by the calling party and
ultimately signed by the responsible entity.  The carrier could provision
this for their mobile or hosted customers.  Enterprises could do this
themselves.  This also has advantages in Enterprise to Enterprise UC as well
where the data is derived from the Enterprise "directory" and could
facilitate end to end PPX to PBX communications especially in point to point
video communications. 

 

There are certainly privacy and security issues to be addressed.  The Push
vs Pull model.  This really would be PII in the clear but then its done
voluntarily. 

 

There would have to be some work around restructuring the Header and adding
some parameters but it's underutilized right now and this Use Case is a
perfectly appropriate use. 

 

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

 

Obviously it would need to be signed but we don't need to worry about that
..yet. 

 

>From 3261 

 

20.9 Call-Info

 

   The Call-Info header field provides additional information about the

   caller or callee, depending on whether it is found in a request or

   response.  The purpose of the URI is described by the "purpose"

   parameter.  The "icon" parameter designates an image suitable as an

   iconic representation of the caller or callee.  The "info" parameter

   describes the caller or callee in general, for example, through a web

   page.  The "card" parameter provides a business card, for example, in

   vCard [36] or LDIF [37] formats.  Additional tokens can be registered

   using IANA and the procedures in Section 27.

 

   Use of the Call-Info header field can pose a security risk.  If a

   callee fetches the URIs provided by a malicious caller, the callee

   may be at risk for displaying inappropriate or offensive content,

   dangerous or illegal content, and so on.  Therefore, it is

   RECOMMENDED that a UA only render the information in the Call-Info

   header field if it can verify the authenticity of the element that

   originated the header field and trusts that element.  This need not

   be the peer UA; a proxy can insert this header field into requests.

 

   Example:

 

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=icon,

     <http://www.example.com/alice/> ;purpose=info

 

From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org
<mailto:stir@ietf.org>  List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

We've considered adding some information that is not number and is not name,
but is something like "bank", which might have some sort of validation
behind it.

 

Is that along the lines you were thinking?

 

Brian

On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us
<mailto:richard@shockey.us> > wrote:






I agree with Pierce here and respectfully disagree that STIR might eliminate
the need for other forms of caller identification.  Though your use case of
credit card validation is a useful one and you are right there are still
applications that use SS7 for things that have nothing to do with call
setup. I agree with you STIR may have more applications beyond the obvious
ones of realtime session validation.

 

It's been my experience recently that there is a use case for something MORE
in the identification of the session as it is presented to the called party.
This is the CNAM + idea we are kicking around on the CNIT list.

 

_______________________________________________

cnit mailing list

 <mailto:cnit@ietf.org> cnit@ietf.org

 <https://www.ietf.org/mailman/listinfo/cnit>
https://www.ietf.org/mailman/listinfo/cnit

 

But your use case of a bank wanting to make sure they could properly
identify themselves to the consumer before establishing a conversation is
exactly what this process is about.  STIR is essential but it's a
multi-faceted problem that may require multi-faceted solutions.. and
enhanced CNAM + being only one of them.   Its not unreasonable to discuss
those.

 

The obviously analogy is I would want to see some real identification of a
utility worker before I let them into my house to make repairs.  I would
want some validation that the call to me to reconfirm the appointments was
in fact from the utility in question.

 

 

 

From: stir-bounces@ietf.org <mailto:stir-bounces@ietf.org>
[mailto:stir-bounces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org <mailto:stir@ietf.org> 
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Let me rephrase it. it may eliminate the need for other forms of caller
identification beyond what STIR will provide, depending on the specific use
case. For example, a credit card company may choose to rely entirely on STIR
before allowing a card to be unblocked by an IVR (and as I said earlier,
many companies do it today). In other use cases, the TN alone is not
sufficient information - my health care provider will want to know which
member of the family is calling.

 

I agree that ANI is already broadly used to improve customer service today.
However, it is not usually deemed as a secure enough mechanism to validate
the caller (therefore this WG!), except if you are a large organization that
can leverage things like SS7. STIR would make this type of validation
available to a broader number of companies.

 

 

Going on a tangent. perhaps this is out of scope, but there is not a lot of
discussion about called party hijacking. Couldn't a man-in-the-middle try to
answer calls on my behalf? If my bank is calling me, I want to make sure
it's really them before carrying a conversation, but wouldn't they want the
same? 

 

 

From: <Gorman>, "Pierce A [NTK]" < <mailto:Pierce.Gorman@sprint.com>
Pierce.Gorman@sprint.com>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho < <mailto:fmousinh@cisco.com> fmousinh@cisco.com>, "
<mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

I agree with your characterization of businesses as victim of caller ID
fraud however contact centers also use TN as a key to improve information
available to call agents to reduce average time-per-call and increase
capacity of the call center.  So I don't agree that STIR would "eliminate
the need for caller identification from known TNs."

 

But perhaps I misunderstood your last sentence?

 

 

From: Fernando Mousinho (fmousinh) [ <mailto:fmousinh@cisco.com>
mailto:fmousinh@cisco.com] 
Sent: November 05, 2013 4:34 PM
To:  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I would suggest we add a new attack type to section 3. More and more
companies are using the caller ID for account validation. For example, if I
call my credit card provider from my office number, they ask me for
identification. If I call from my home phone number, I'm informed that I
don't need to provide any further identification because my number is on
file. Some (all?) companies that implement this type of validation rely on
SS7 today.

 

Ultimately, this is yet another variation of impersonation - but in this
case, the "victim" is a business, unlike the other two scenarios we've
listed so far.

 

Addressing this scenario would actually turn STIR into a feature, given it
would enable contact centers of all sizes to eliminate the need for caller
identification from known TNs.

 

 

 

From: Alex Bobotek < <mailto:alex@bobotek.net> alex@bobotek.net>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen < <mailto:br@brianrosen.net> br@brianrosen.net>, "Peterson,
Jon" < <mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>
Cc: " <mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us>, "'DOLLY, MARTIN C'" < <mailto:md3135@att.com>
md3135@att.com>, 'Robert Sparks' < <mailto:rjsparks@nostrum.com>
rjsparks@nostrum.com>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Jon,

 

Thanks for the response.  The intention in #1 below is to clarify the
following sentence:

 

The primary attack vector is

   therefore one where the attacker contrives for the calling telephone

   number in signaling to be a particular chosen number, one that the

   attacker does not have the authority to call from, in order for that

   number to be rendered on the terminating side. 

 

This might be misconstrued as indicating that the objective of spoofing is
simply the rendering of a spoofed number on the receiving display, causing
mistaken conclusions that defenses might be limited to securing the rendered
information.  No issues with leaving this as it's a valid point.  Another
(increasing) motivation is to evade network and/or endpoint defenses that
may block based on CPN. 

 

So however it's worded, I think it's important to allow for both attack
objectives of a spoofed presentation at the endpoint and in transit.   

 

Regards,

 

Alex

 

> -----Original Message-----

> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc:  <mailto:stir@ietf.org> stir@ietf.org; Alex Bobotek; 'Robert Sparks';
'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> 

> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

> 

> Brian

> 

> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <
<mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>

> wrote:

> 

> > Thanks for these notes, Alex. Some responses below.

> >

> >> Here are several comments that should feed into the IETF Peterson
draft:

> >>

> >> *   Remove any assumptions that the solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions should be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can usually be

> > implemented in either endpoints or in intermediaries of various kinds.

> > If I see text that implies otherwise, I'll certainly change it.

> >

> >> *   Add a sessionless attack scenario.  A spam payload may be carried
in

> a

> >> SIP INVITE or MESSAGE, which might contain stock market advice even

> >> in a display name field.  These attacks do NOT require session

> establishment.

> >> More generally, we should be mindful of the fact that SIP is used in

> >> telephony form more than voice session setup.

> >

> > Probably if we were going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the PSTN over

> > TCAP or with some Internet protocol, including MESSAGE) rather than

> > with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this below with your suggested

> text.

> >

> >> Here's some suggested markup:

> >>

> >>

> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:

> >>

> >> The primary attack vector is

> >>  therefore one where the attacker contrives for the calling telephone

> >> number in signaling to be a particular chosen number that the

> >> attacker does not have the authority to call from.

> >

> > What you want here is to remove the implication that the number will

> > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, I would say it is significant

> > in the primary attack vectors that concern us.

> >

> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:

> >>

> >>     Smart devices are generally based on computers with some degree

> >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio and/or images.  This includes

> >> smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.

> >

> > I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3.3 Attack Scenarios:

> >>

> >>       Impersonation, IP-Mobile Text Message

> >>

> >>        An attacker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using randomized calling

> >> party numbers.

> >>

> >>       Countermeasure: in-band authenticated identity

> >

> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeasure. I am curious though

> > whether practically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over MESSAGE

> > today. Either way, no problem having an attack scenario of this form in
the

> document.

> >

> > Jon Peterson

> > Neustar, Inc.

> >

> >> Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of Richard Shockey

> >>> Sent: Monday, September 30, 2013 1:11 PM

> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> +1

> >>>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM

> >>> To: Robert Sparks

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> Yes, ok

> >>>

> >>> Martin Dolly

> >>> Lead Member of Technical Staff

> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network

> >>> Technology

> >>> +1-609-903-3360

> >>>  <mailto:md3135@att.com> md3135@att.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"

> >>>> < <mailto:rjsparks@nostrum.com> rjsparks@nostrum.com>

> >>> wrote:

> >>>>

> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:

> >>>>> With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >>>>

> >>>> Just to make sure - I think you're referring to Hadriel's comments

> >>>> on the

> >>> problem statement document?

> >>>> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

> >>>> In any case, we _are_ talking about a starting place, not a

> >>>> finished

> >>> product.

> >>>>

> >>>> If there's no other objection, I'd like to get Jon to submit the

> >>>> threats

> >>> document as a WG -00 as soon as it's convenient.

> >>>>

> >>>> RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On

> >>>>> Behalf Of Russ Housley

> >>>>> Sent: Thursday, September 26, 2013 4:37 PM

> >>>>> To: IETF STIR Mail List

> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from more people about this

> >>> document.  Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>>> Russ

> >>>>>

> >>>>>

> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:

> >>>>>>

> >>>>>>  <http://www.ietf.org/id/draft-peterson-stir-threats-00.txt>
http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group adopt this I-D as the starting point for

> >>>>>> the

> >>> STIR threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _______________________________________________

> >>>>> stir mailing list

> >>>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>>

> >>>> _______________________________________________

> >>>> stir mailing list

> >>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >> _______________________________________________

> >> stir mailing list

> >>  <mailto:stir@ietf.org> stir@ietf.org

> >>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >

> > _______________________________________________

> > stir mailing list

> >  <mailto:stir@ietf.org> stir@ietf.org

> >  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> 

> _______________________________________________

> stir mailing list

>  <mailto:stir@ietf.org> stir@ietf.org

>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


  _____  



This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

_______________________________________________
stir mailing list
stir@ietf.org <mailto:stir@ietf.org> 
https://www.ietf.org/mailman/listinfo/stir

 

 


------=_NextPart_000_00F5_01CEDBA2.61B77140
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><meta =
http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Like CNAM is so accurate today&#8230; ??&nbsp; When certain companies =
get the data from scanning phone books that are not even printed =
anymore? <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The carrier has the billing relationship. As you well know that is =
where the data comes from now but it is not granular.&nbsp; =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The carrier permits the customer to create the record(s). What are =
you trying to validate? The Accuracy of the data?&nbsp; &#8230; In any =
event none of that is our problem.&nbsp; &nbsp;We make the tools. =
Someone else worries about policy.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>You are making this way too complicated thus defeating the basic use =
case.&nbsp;&nbsp; <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Well from time to time I&#8217;ve discovered I&#8217;m not a big fan =
of the end to end principal.&nbsp; It just doesn&#8217;t work for every =
use case.&nbsp; This is a carrier service or in certain cases =
hosted.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Much like I&#8217;m convinced the out of band solution in STIR is =
total fantasy and like VIPR will almost never actually be used in =
practice. <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>As for encoding I mentioned JCARD since there seems to be a faction =
in the IETF that is anti-XML <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'> =
cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] <b>On Behalf Of =
</b>Brian Rosen<br><b>Sent:</b> Thursday, November 07, 2013 12:59 =
AM<br><b>To:</b> Richard Shockey<br><b>Cc:</b> stir@ietf.org List; =
Gorman, Pierce A [NTK]; cnit@ietf.org; Fernando Mousinho =
(fmousinh)<br><b>Subject:</b> Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>I think this =
would be a heavy lift.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>If the responsible entity was a carrier, then it would =
have to validate the data, which it has very little basis to validate. =
&nbsp;It could get a 3rd party to do the validation, but then it&#8217;s =
putting its reputation on the back of some hired hand =
validator.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>If the responsibility is the end user/device, then the =
signature has no value.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
do question JCARD vs xCard, but that&#8217;s an encoding detail. =
&nbsp;All of SIP Is XML described by schema, not =
json.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><div><div><div><p =
class=3DMsoNormal>On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity. &nbsp;The carrier =
could provision this for their mobile or hosted customers.&nbsp; =
Enterprises could do this themselves.&nbsp; This also has advantages in =
Enterprise to Enterprise UC as well where the data is derived from the =
Enterprise &#8220;directory&#8221; and could facilitate end to end PPX =
to PBX communications especially in point to point video communications. =
</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There are certainly privacy and security issues to be =
addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be PII =
in the clear but then its done voluntarily. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There would have to be some work around restructuring the Header and =
adding some parameters but it&#8217;s underutilized right now and this =
Use Case is a perfectly appropriate use. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06">https:/=
/tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</a></span><o:p></o:p></=
p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Obviously it would need to be signed but we don&#8217;t need to worry =
about that ..yet. </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>From 3261 </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>20.9 Call-Info</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; The Call-Info header field provides additional =
information about the</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; caller or callee, depending on whether it is found in a =
request or</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; response.&nbsp; The purpose of the URI is described by =
the &quot;purpose&quot;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; parameter.&nbsp; The &quot;icon&quot; parameter =
designates an image suitable as an</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; iconic representation of the caller or callee.&nbsp; The =
&quot;info&quot; parameter</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; describes the caller or callee in general, for example, =
through a web</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; page.&nbsp; The &quot;card&quot; parameter provides a =
business card, for example, in</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; Additional tokens =
can be registered</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Use of the Call-Info header field can pose a security =
risk.&nbsp; If a</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; callee fetches the URIs provided by a malicious caller, =
the callee</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; may be at risk for displaying inappropriate or offensive =
content,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; dangerous or illegal content, and so on.&nbsp; =
Therefore, it is</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; RECOMMENDED that a UA only render the information in the =
Call-Info</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; header field if it can verify the authenticity of the =
element that</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; originated the header field and trusts that =
element.&nbsp; This need not</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; be the peer UA; a proxy can insert this header field =
into requests.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Example:</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg">http://wwww.example.com/=
alice/photo.jpg</a>&gt; ;purpose=3Dicon,</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/">http://www.example.com/alice/</a>&=
gt; ;purpose=3Dinfo</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'> Brian =
Rosen [<a =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>] =
<br><b>Sent:</b> Wednesday, November 06, 2013 3:41 PM<br><b>To:</b> =
Richard Shockey<br><b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, =
Pierce A [NTK]; <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> =
List<br><b>Subject:</b> Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal>We&#8217;ve =
considered adding some information that is not number and is not name, =
but is something like &#8220;bank&#8221;, which might have some sort of =
validation behind it.<o:p></o:p></p><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Is that along the lines you were =
thinking?<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p><div><div><p class=3DMsoNormal>On =
Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.&nbsp; =
Though your use case of credit card validation is a useful one and you =
are right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session =
validation.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>_______________________________________________</span><o:p></o:p></p><=
/div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>cnit mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:#954F72'>cnit@ietf.org</span></a></span><o:p></o:p></p></d=
iv><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/cnit</span>=
</a></span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.&nbsp; STIR is essential but =
it&#8217;s a multi-faceted problem that may require multi-faceted =
solutions.. and enhanced CNAM + being only one of them.&nbsp;&nbsp; Its =
not unreasonable to discuss those.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs. =
&nbsp;I would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in =
question.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a> [<a =
href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>]<s=
pan class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Gorman, Pierce A [NTK]; <a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Let me =
rephrase it&#8230; it may eliminate the need for other forms of caller =
identification beyond what STIR will provide, depending on the specific =
use case. For example, a credit card company may choose to rely entirely =
on STIR before allowing a card to be unblocked by an IVR (and as I said =
earlier, many companies do it today). In other use cases, the TN alone =
is not sufficient information &#8211; my health care provider will want =
to know which member of the family is =
calling.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I agree =
that ANI is already broadly used to improve customer service today. =
However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of =
companies.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Going on a =
tangent&#8230; perhaps this is out of scope, but there is not a lot of =
discussion about called party hijacking. Couldn&#8217;t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it&#8217;s really them before carrying a =
conversation, but wouldn&#8217;t they want the =
same?&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&lt;Gorman&=
gt;, &quot;Pierce A [NTK]&quot; &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D'color:#954F72'>Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Dat=
e:<span class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, November =
5, 2013 at 6:05 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho &lt;<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>fmousinh@cisco.com</span></a>&gt;, &quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3Dapple-converted-space>&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I agree with your characterization of businesses as victim of caller ID =
fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.&nbsp; So I don&#8217;t agree that =
STIR would &#8220;eliminate the need for caller identification from =
known TNs.&#8221;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fernando =
Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>mailto:fmousinh@cisco.com</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I would =
suggest we add a new attack type to section 3. More and more companies =
are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I&#8217;m informed =
that I don&#8217;t need to provide any further identification because my =
number is on file. Some (all?) companies that implement this type of =
validation rely on SS7 today.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Ultimately,=
 this is yet another variation of impersonation &#8211; but in this =
case, the &#8220;victim&#8221; is a business, unlike the other two =
scenarios we&#8217;ve listed so far.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Addressing =
this scenario would actually turn STIR into a feature, given it would =
enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D'color:#954F72'>alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, October 1, 2013 =
at 12:51 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:#954F72'>br@brianrosen.net</span></a>&gt;, =
&quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:#954F72'>jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:=
<span class=3Dapple-converted-space>&nbsp;</span></b>&quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D'color:#954F72'>richard@shockey.us</span></a>&gt;, &quot;'DOLLY, =
MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D'color:#954F72'>md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:#954F72'>rjsparks@nostrum.com</span></a>&gt;<br><b>Subject=
:<span class=3Dapple-converted-space>&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Jon,</span>=
<o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Thanks for =
the response.&nbsp; The intention in #1 below is to clarify the =
following sentence:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>The<span =
class=3Dapple-converted-space>&nbsp;</span><b>primary</b><span =
class=3Dapple-converted-space>&nbsp;</span>attack vector =
is</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; therefore one where the attacker contrives for the calling =
telephone</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number in signaling to be a particular chosen number, one that =
the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; attacker does not have the authority to call from,<span =
class=3Dapple-converted-space>&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number to be rendered on the terminating side</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>.&nbsp;</sp=
an><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>This might =
be misconstrued as indicating that the objective of spoofing is simply =
the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the =
rendered information. &nbsp;No issues with leaving this as it&#8217;s a =
valid point.&nbsp; Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on =
CPN.&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>So however =
it&#8217;s worded, I think it&#8217;s important to allow for both attack =
objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Regards,</s=
pan><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex</span>=
<o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
-----Original Message-----</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Brian =
Rosen</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Sent: =
Tuesday, October 01, 2013 9:29 AM</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; To: =
Peterson, Jon</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; Richard</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Shockey</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Don't =
think there is much MESSAGE.&nbsp; MSRP is about all we see, and XMPP =
is</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; more =
likely than that.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Brian</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; On =
Oct 1, 2013, at 12:24 PM, &quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:windowtext;text-decoration:none'>jon.peterson@neustar.biz<=
/span></a>&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
wrote:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Thanks for these notes, Alex. Some responses =
below.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here are several comments that should feed into the IETF =
Peterson draft:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
[IMO,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; both endpoint and in-network solutions should be =
facilitated]</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Agreed that both in-band and out-of-band solutions can usually =
be</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
implemented in either endpoints or in intermediaries of various =
kinds.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
If I see text that implies otherwise, I'll certainly change =
it.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Add a sessionless attack scenario.&nbsp; A spam =
payload may be carried in</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
a</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
establishment.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; More generally, we should be mindful of the fact that SIP is =
used in</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; telephony form more than voice session =
setup.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Probably if we were going to include a sessionless attack scenario, =
it</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
would be with regular text messages (whether carried on the PSTN =
over</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
TCAP or with some Internet protocol, including MESSAGE) rather =
than</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
with an INVITE, which typically wouldn't result in a payload =
being</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
immediately rendered to a user. More on this below with your =
suggested</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
text.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; The primary attack vector is</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; number in signaling to be a particular chosen number that =
the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
in the primary attack vectors that concern =
us.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; of programmability, the capacity to access the Internet, =
and</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; capabilities of rendering text, audio and/or images.&nbsp; This =
includes</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
I can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
images as you suggest.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Provided we're talking about end-to-end SIP use of MESSAGE, =
agreed</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
that in-band would be the right countermeasure. I am curious =
though</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
document.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Jon Peterson</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Regards,</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Alex</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of Richard Shockey</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN C</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: Robert Sparks</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Yes, ok</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Martin Dolly</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Technology</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1-609-903-3360</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D'color:windowtext;text-decoration:none'>md3135@att.com</span></a>=
</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, &quot;Robert =
Sparks&quot;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:windowtext;text-decoration:none'>rjsparks@nostrum.com</spa=
n></a>&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; wrote:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Hi Martin -</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Just to make sure - I think you're referring to =
Hadriel's comments</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; on the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; I don't think Hadriel's commented directly on =
stir-threats yet.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; In any case, we _are_ talking about a starting place, =
not a</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; finished</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; If there's no other objection, I'd like to get Jon to =
submit the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; threats</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; RjS</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; From:<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear from more =
people about this</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; hear from him soon.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ Housley =
wrote:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D'color:windowtext;text-decoration:none'>http://www.ietf.org/id/dr=
aft-peterson-stir-threats-00.txt</span></a></span><o:p></o:p></p></div><d=
iv><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt this I-D as the =
starting point for</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; STIR threat docuent?</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; stir =
mailing list</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'><hr =
size=3D3 width=3D"100%" align=3Dcenter></span></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'>__________=
_____________________________________<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org/=
mailman/listinfo/stir</a></span><o:p></o:p></p></blockquote></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></blockquote></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_00F5_01CEDBA2.61B77140--


From michael.hammer@yaanatech.com  Thu Nov  7 07:28:41 2013
Return-Path: <michael.hammer@yaanatech.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 654D711E8102; Thu,  7 Nov 2013 07:28:41 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.184
X-Spam-Level: 
X-Spam-Status: No, score=-2.184 tagged_above=-999 required=5 tests=[AWL=0.414,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ETYR+X7c2T53; Thu,  7 Nov 2013 07:28:31 -0800 (PST)
Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id F223C21F85EC; Thu,  7 Nov 2013 07:28:29 -0800 (PST)
Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Thu, 7 Nov 2013 07:28:29 -0800
From: Michael Hammer <michael.hammer@yaanatech.com>
To: "Henning.Schulzrinne@fcc.gov" <Henning.Schulzrinne@fcc.gov>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, "br@brianrosen.net" <br@brianrosen.net>, "richard@shockey.us" <richard@shockey.us>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQIJuyR31NLy1lMhJkGcqWArv1sc1QINOqbRAr/2giEC0l///wF434JzmR/4cmCAAD+vQIABiMQAgAABSwCAABcWAIA3YVcAgAAInoCAAAXVgIAA6nqAgAB5wgCAAAhegIAAk5aAgACVVgCAAAHaAP//gKww
Date: Thu, 7 Nov 2013 15:28:28 +0000
Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov>
In-Reply-To: <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.17.100.142]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_005D_01CEDBA4.18350350"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "cnit@ietf.org" <cnit@ietf.org>, "fmousinh@cisco.com" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 15:28:41 -0000

------=_NextPart_000_005D_01CEDBA4.18350350
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_005E_01CEDBA4.18350350"


------=_NextPart_001_005E_01CEDBA4.18350350
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

So, would you trust a certificate from the City of Reston, Virginia police
department?

 

(Hint:  you can find Reston on a map, but there is no City of Reston.  

  The only police are Fairfax County.)

 

My concern is that one you dilute or disperse authority, it becomes a
free-for-all again, and anybody's guess.

 

Mike

 

 

From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of
Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc: stir@ietf.org List; Fernando Mousinho (fmousinh); cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

As a thought experiment, Kumiko Ono and I had published a draft 

 

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

 

to allow third parties to validate property information. If the validating
party (e.g., a bank regulator) is willing to sign a certificate, similar in
spirit to the framed gold-leaf diplomas in your dentist's office or, more
lowly, to the health departments rating in a restaurant window, and it can
be tied to a phone number, this shouldn't be too hard.

 

It's a bit harder if the certifying authority (regulator, Realtor board,
local bar association, .) is not involved.

 

Henning 

 

From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf Of
Gorman, Pierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org List; cnit@ietf.org; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

 

I'll admit I am not familiar with v/x/jcard encoding differences or the
implications of their use so I'll encourage educating me if it isn't too
onerous.

 

I'm not sure what is the concern with a 3rd party providing "validation"
though.  There are numerous examples of 3rd parties providing validation of
information including NASDAQ, NYSE, Barron's, Moody's, and the federal
reserve banking system to name a few.

 

Pierce

 

From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org
List; cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I think this would be a heavy lift.

 

If the responsible entity was a carrier, then it would have to validate the
data, which it has very little basis to validate.  It could get a 3rd party
to do the validation, but then it's putting its reputation on the back of
some hired hand validator.

 

If the responsibility is the end user/device, then the signature has no
value.

 

I do not argue that Call-Info is suitable,  it is.

 

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is
XML described by schema, not json.

 

Brian

 

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us> wrote:

 

URI for a JCARD in the CALL INFO header provisioned by the calling party and
ultimately signed by the responsible entity.  The carrier could provision
this for their mobile or hosted customers.  Enterprises could do this
themselves.  This also has advantages in Enterprise to Enterprise UC as well
where the data is derived from the Enterprise "directory" and could
facilitate end to end PPX to PBX communications especially in point to point
video communications. 

 

There are certainly privacy and security issues to be addressed.  The Push
vs Pull model.  This really would be PII in the clear but then its done
voluntarily. 

 

There would have to be some work around restructuring the Header and adding
some parameters but it's underutilized right now and this Use Case is a
perfectly appropriate use. 

 

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

 

Obviously it would need to be signed but we don't need to worry about that
..yet. 

 

>From 3261 

 

20.9 Call-Info

 

   The Call-Info header field provides additional information about the

   caller or callee, depending on whether it is found in a request or

   response.  The purpose of the URI is described by the "purpose"

   parameter.  The "icon" parameter designates an image suitable as an

   iconic representation of the caller or callee.  The "info" parameter

   describes the caller or callee in general, for example, through a web

   page.  The "card" parameter provides a business card, for example, in

   vCard [36] or LDIF [37] formats.  Additional tokens can be registered

   using IANA and the procedures in Section 27.

 

   Use of the Call-Info header field can pose a security risk.  If a

   callee fetches the URIs provided by a malicious caller, the callee

   may be at risk for displaying inappropriate or offensive content,

   dangerous or illegal content, and so on.  Therefore, it is

   RECOMMENDED that a UA only render the information in the Call-Info

   header field if it can verify the authenticity of the element that

   originated the header field and trusts that element.  This need not

   be the peer UA; a proxy can insert this header field into requests.

 

   Example:

 

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=icon,

     <http://www.example.com/alice/> ;purpose=info

 

From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

We've considered adding some information that is not number and is not name,
but is something like "bank", which might have some sort of validation
behind it.

 

Is that along the lines you were thinking?

 

Brian

On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us> wrote:

 

I agree with Pierce here and respectfully disagree that STIR might eliminate
the need for other forms of caller identification.  Though your use case of
credit card validation is a useful one and you are right there are still
applications that use SS7 for things that have nothing to do with call
setup. I agree with you STIR may have more applications beyond the obvious
ones of realtime session validation.

 

It's been my experience recently that there is a use case for something MORE
in the identification of the session as it is presented to the called party.
This is the CNAM + idea we are kicking around on the CNIT list.

 

_______________________________________________

cnit mailing list

 <mailto:cnit@ietf.org> cnit@ietf.org

 <https://www.ietf.org/mailman/listinfo/cnit>
https://www.ietf.org/mailman/listinfo/cnit

 

But your use case of a bank wanting to make sure they could properly
identify themselves to the consumer before establishing a conversation is
exactly what this process is about.  STIR is essential but it's a
multi-faceted problem that may require multi-faceted solutions.. and
enhanced CNAM + being only one of them.   Its not unreasonable to discuss
those.

 

The obviously analogy is I would want to see some real identification of a
utility worker before I let them into my house to make repairs.  I would
want some validation that the call to me to reconfirm the appointments was
in fact from the utility in question.

 

 

 

From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of
Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Let me rephrase it. it may eliminate the need for other forms of caller
identification beyond what STIR will provide, depending on the specific use
case. For example, a credit card company may choose to rely entirely on STIR
before allowing a card to be unblocked by an IVR (and as I said earlier,
many companies do it today). In other use cases, the TN alone is not
sufficient information - my health care provider will want to know which
member of the family is calling.

 

I agree that ANI is already broadly used to improve customer service today.
However, it is not usually deemed as a secure enough mechanism to validate
the caller (therefore this WG!), except if you are a large organization that
can leverage things like SS7. STIR would make this type of validation
available to a broader number of companies.

 

 

Going on a tangent. perhaps this is out of scope, but there is not a lot of
discussion about called party hijacking. Couldn't a man-in-the-middle try to
answer calls on my behalf? If my bank is calling me, I want to make sure
it's really them before carrying a conversation, but wouldn't they want the
same? 

 

 

From: <Gorman>, "Pierce A [NTK]" < <mailto:Pierce.Gorman@sprint.com>
Pierce.Gorman@sprint.com>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho < <mailto:fmousinh@cisco.com> fmousinh@cisco.com>, "
<mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

I agree with your characterization of businesses as victim of caller ID
fraud however contact centers also use TN as a key to improve information
available to call agents to reduce average time-per-call and increase
capacity of the call center.  So I don't agree that STIR would "eliminate
the need for caller identification from known TNs."

 

But perhaps I misunderstood your last sentence?

 

 

From: Fernando Mousinho (fmousinh) [ <mailto:fmousinh@cisco.com>
mailto:fmousinh@cisco.com] 
Sent: November 05, 2013 4:34 PM
To:  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I would suggest we add a new attack type to section 3. More and more
companies are using the caller ID for account validation. For example, if I
call my credit card provider from my office number, they ask me for
identification. If I call from my home phone number, I'm informed that I
don't need to provide any further identification because my number is on
file. Some (all?) companies that implement this type of validation rely on
SS7 today.

 

Ultimately, this is yet another variation of impersonation - but in this
case, the "victim" is a business, unlike the other two scenarios we've
listed so far.

 

Addressing this scenario would actually turn STIR into a feature, given it
would enable contact centers of all sizes to eliminate the need for caller
identification from known TNs.

 

 

 

From: Alex Bobotek < <mailto:alex@bobotek.net> alex@bobotek.net>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen < <mailto:br@brianrosen.net> br@brianrosen.net>, "Peterson,
Jon" < <mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>
Cc: " <mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us>, "'DOLLY, MARTIN C'" < <mailto:md3135@att.com>
md3135@att.com>, 'Robert Sparks' < <mailto:rjsparks@nostrum.com>
rjsparks@nostrum.com>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Jon,

 

Thanks for the response.  The intention in #1 below is to clarify the
following sentence:

 

The primary attack vector is

   therefore one where the attacker contrives for the calling telephone

   number in signaling to be a particular chosen number, one that the

   attacker does not have the authority to call from, in order for that

   number to be rendered on the terminating side. 

 

This might be misconstrued as indicating that the objective of spoofing is
simply the rendering of a spoofed number on the receiving display, causing
mistaken conclusions that defenses might be limited to securing the rendered
information.  No issues with leaving this as it's a valid point.  Another
(increasing) motivation is to evade network and/or endpoint defenses that
may block based on CPN. 

 

So however it's worded, I think it's important to allow for both attack
objectives of a spoofed presentation at the endpoint and in transit.   

 

Regards,

 

Alex

 

> -----Original Message-----

> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc:  <mailto:stir@ietf.org> stir@ietf.org; Alex Bobotek; 'Robert Sparks';
'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> 

> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

> 

> Brian

> 

> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <
<mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>

> wrote:

> 

> > Thanks for these notes, Alex. Some responses below.

> >

> >> Here are several comments that should feed into the IETF Peterson
draft:

> >>

> >> *   Remove any assumptions that the solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions should be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can usually be

> > implemented in either endpoints or in intermediaries of various kinds.

> > If I see text that implies otherwise, I'll certainly change it.

> >

> >> *   Add a sessionless attack scenario.  A spam payload may be carried
in

> a

> >> SIP INVITE or MESSAGE, which might contain stock market advice even

> >> in a display name field.  These attacks do NOT require session

> establishment.

> >> More generally, we should be mindful of the fact that SIP is used in

> >> telephony form more than voice session setup.

> >

> > Probably if we were going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the PSTN over

> > TCAP or with some Internet protocol, including MESSAGE) rather than

> > with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this below with your suggested

> text.

> >

> >> Here's some suggested markup:

> >>

> >>

> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:

> >>

> >> The primary attack vector is

> >>  therefore one where the attacker contrives for the calling telephone

> >> number in signaling to be a particular chosen number that the

> >> attacker does not have the authority to call from.

> >

> > What you want here is to remove the implication that the number will

> > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, I would say it is significant

> > in the primary attack vectors that concern us.

> >

> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:

> >>

> >>     Smart devices are generally based on computers with some degree

> >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio and/or images.  This includes

> >> smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.

> >

> > I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3.3 Attack Scenarios:

> >>

> >>       Impersonation, IP-Mobile Text Message

> >>

> >>        An attacker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using randomized calling

> >> party numbers.

> >>

> >>       Countermeasure: in-band authenticated identity

> >

> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeasure. I am curious though

> > whether practically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over MESSAGE

> > today. Either way, no problem having an attack scenario of this form in
the

> document.

> >

> > Jon Peterson

> > Neustar, Inc.

> >

> >> Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of Richard Shockey

> >>> Sent: Monday, September 30, 2013 1:11 PM

> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> +1

> >>>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM

> >>> To: Robert Sparks

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> Yes, ok

> >>>

> >>> Martin Dolly

> >>> Lead Member of Technical Staff

> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network

> >>> Technology

> >>> +1-609-903-3360

> >>>  <mailto:md3135@att.com> md3135@att.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"

> >>>> < <mailto:rjsparks@nostrum.com> rjsparks@nostrum.com>

> >>> wrote:

> >>>>

> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:

> >>>>> With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >>>>

> >>>> Just to make sure - I think you're referring to Hadriel's comments

> >>>> on the

> >>> problem statement document?

> >>>> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

> >>>> In any case, we _are_ talking about a starting place, not a

> >>>> finished

> >>> product.

> >>>>

> >>>> If there's no other objection, I'd like to get Jon to submit the

> >>>> threats

> >>> document as a WG -00 as soon as it's convenient.

> >>>>

> >>>> RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On

> >>>>> Behalf Of Russ Housley

> >>>>> Sent: Thursday, September 26, 2013 4:37 PM

> >>>>> To: IETF STIR Mail List

> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from more people about this

> >>> document.  Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>>> Russ

> >>>>>

> >>>>>

> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:

> >>>>>>

> >>>>>>  <http://www.ietf.org/id/draft-peterson-stir-threats-00.txt>
http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group adopt this I-D as the starting point for

> >>>>>> the

> >>> STIR threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _______________________________________________

> >>>>> stir mailing list

> >>>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>>

> >>>> _______________________________________________

> >>>> stir mailing list

> >>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >> _______________________________________________

> >> stir mailing list

> >>  <mailto:stir@ietf.org> stir@ietf.org

> >>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >

> > _______________________________________________

> > stir mailing list

> >  <mailto:stir@ietf.org> stir@ietf.org

> >  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> 

> _______________________________________________

> stir mailing list

>  <mailto:stir@ietf.org> stir@ietf.org

>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


  _____  



This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

_______________________________________________
stir mailing list
stir@ietf.org
https://www.ietf.org/mailman/listinfo/stir

 

 

 

  _____  


This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.


------=_NextPart_001_005E_01CEDBA4.18350350
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman","serif";}
span.emailstyle18
	{mso-style-name:emailstyle18;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma","sans-serif";}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Arial","sans-serif";
	color:#0000CC;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>So, would you trust a certificate from the City of Reston, Virginia =
police department?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>(Hint:&nbsp; you can find Reston on a map, but there is no City of =
Reston.&nbsp; <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;The only police are Fairfax =
County.)<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>My concern is that one you dilute or disperse authority, it becomes a =
free-for-all again, and anybody&#8217;s guess.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Mike<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] <b>On Behalf Of =
</b>Henning Schulzrinne<br><b>Sent:</b> Thursday, November 07, 2013 =
10:00 AM<br><b>To:</b> 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard =
Shockey<br><b>Cc:</b> stir@ietf.org List; Fernando Mousinho (fmousinh); =
cnit@ietf.org<br><b>Subject:</b> Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>As a thought experiment, Kumiko Ono and I had published a draft =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"http://tools.ietf.org/html/draft-ono-dispatch-attribute-validatio=
n-00">http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-=
00</a><o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>to allow third parties to validate property information. If the =
validating party (e.g., a bank regulator) is willing to sign a =
certificate, similar in spirit to the framed gold-leaf diplomas in your =
dentist&#8217;s office or, more lowly, to the health departments rating =
in a restaurant window, and it can be tied to a phone number, this =
shouldn&#8217;t be too hard.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s a bit harder if the certifying authority (regulator, =
Realtor board, local bar association, &#8230;) is not =
involved.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Henning <o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
<a href=3D"mailto:cnit-bounces@ietf.org">cnit-bounces@ietf.org</a> <a =
href=3D"mailto:[mailto:cnit-bounces@ietf.org]">[mailto:cnit-bounces@ietf.=
org]</a> <b>On Behalf Of </b>Gorman, Pierce A [NTK]<br><b>Sent:</b> =
Thursday, November 07, 2013 9:54 AM<br><b>To:</b> Brian Rosen; Richard =
Shockey<br><b>Cc:</b> <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> =
List; <a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a>; Fernando =
Mousinho (fmousinh)<br><b>Subject:</b> Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I&#8217;ll admit I am not familiar with v/x/jcard encoding differences =
or the implications of their use so I&#8217;ll encourage educating me if =
it isn&#8217;t too onerous.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I&#8217;m not sure what is the concern with a 3<sup>rd</sup> party =
providing &#8220;validation&#8221; though.&nbsp; There are numerous =
examples of 3<sup>rd</sup> parties providing validation of information =
including NASDAQ, NYSE, Barron&#8217;s, Moody&#8217;s, and the federal =
reserve banking system to name a few.</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:black'>P=
ierce</span><o:p></o:p></p></div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>] =
<br><b>Sent:</b> November 06, 2013 11:59 PM<br><b>To:</b> Richard =
Shockey<br><b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A =
[NTK]; <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> List; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b> Re: =
[stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal>I think this =
would be a heavy lift.<o:p></o:p></p><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>If the responsible entity was a carrier, then it would =
have to validate the data, which it has very little basis to validate. =
&nbsp;It could get a 3rd party to do the validation, but then it&#8217;s =
putting its reputation on the back of some hired hand =
validator.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>If the responsibility is the end user/device, then the =
signature has no value.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p class=3DMsoNormal>I =
do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p class=3DMsoNormal>I =
do question JCARD vs xCard, but that&#8217;s an encoding detail. =
&nbsp;All of SIP Is XML described by schema, not =
json.<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><div><div><div><p =
class=3DMsoNormal>On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity. &nbsp;The carrier =
could provision this for their mobile or hosted customers.&nbsp; =
Enterprises could do this themselves.&nbsp; This also has advantages in =
Enterprise to Enterprise UC as well where the data is derived from the =
Enterprise &#8220;directory&#8221; and could facilitate end to end PPX =
to PBX communications especially in point to point video communications. =
</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There are certainly privacy and security issues to be =
addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be PII =
in the clear but then its done voluntarily. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There would have to be some work around restructuring the Header and =
adding some parameters but it&#8217;s underutilized right now and this =
Use Case is a perfectly appropriate use. </span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06">https:/=
/tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</a></span><o:p></o:p></=
p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Obviously it would need to be signed but we don&#8217;t need to worry =
about that ..yet. </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>From 3261 </span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>20.9 Call-Info</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; The Call-Info header field provides additional =
information about the</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; caller or callee, depending on whether it is found in a =
request or</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; response.&nbsp; The purpose of the URI is described by =
the &quot;purpose&quot;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; parameter.&nbsp; The &quot;icon&quot; parameter =
designates an image suitable as an</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; iconic representation of the caller or callee.&nbsp; The =
&quot;info&quot; parameter</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; describes the caller or callee in general, for example, =
through a web</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; page.&nbsp; The &quot;card&quot; parameter provides a =
business card, for example, in</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; Additional tokens =
can be registered</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Use of the Call-Info header field can pose a security =
risk.&nbsp; If a</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; callee fetches the URIs provided by a malicious caller, =
the callee</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; may be at risk for displaying inappropriate or offensive =
content,</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; dangerous or illegal content, and so on.&nbsp; =
Therefore, it is</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; RECOMMENDED that a UA only render the information in the =
Call-Info</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; header field if it can verify the authenticity of the =
element that</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; originated the header field and trusts that =
element.&nbsp; This need not</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; be the peer UA; a proxy can insert this header field =
into requests.</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Example:</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg">http://wwww.example.com/=
alice/photo.jpg</a>&gt; ;purpose=3Dicon,</span><o:p></o:p></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/">http://www.example.com/alice/</a>&=
gt; ;purpose=3Dinfo</span><o:p></o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'> Brian =
Rosen [<a =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>] =
<br><b>Sent:</b> Wednesday, November 06, 2013 3:41 PM<br><b>To:</b> =
Richard Shockey<br><b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, =
Pierce A [NTK]; <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> =
List<br><b>Subject:</b> Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p><p class=3DMsoNormal>We&#8217;ve =
considered adding some information that is not number and is not name, =
but is something like &#8220;bank&#8221;, which might have some sort of =
validation behind it.<o:p></o:p></p><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Is that along the lines you were =
thinking?<o:p></o:p></p></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p><div><div><p class=3DMsoNormal>On =
Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.&nbsp; =
Though your use case of credit card validation is a useful one and you =
are right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session =
validation.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>_______________________________________________</span><o:p></o:p></p><=
/div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>cnit mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:#954F72'>cnit@ietf.org</span></a></span><o:p></o:p></p></d=
iv><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/cnit</span>=
</a></span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.&nbsp; STIR is essential but =
it&#8217;s a multi-faceted problem that may require multi-faceted =
solutions.. and enhanced CNAM + being only one of them.&nbsp;&nbsp; Its =
not unreasonable to discuss those.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs. =
&nbsp;I would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in =
question.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a> [<a =
href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>]<s=
pan class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Gorman, Pierce A [NTK]; <a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Let me =
rephrase it&#8230; it may eliminate the need for other forms of caller =
identification beyond what STIR will provide, depending on the specific =
use case. For example, a credit card company may choose to rely entirely =
on STIR before allowing a card to be unblocked by an IVR (and as I said =
earlier, many companies do it today). In other use cases, the TN alone =
is not sufficient information &#8211; my health care provider will want =
to know which member of the family is =
calling.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I agree =
that ANI is already broadly used to improve customer service today. =
However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of =
companies.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Going on a =
tangent&#8230; perhaps this is out of scope, but there is not a lot of =
discussion about called party hijacking. Couldn&#8217;t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it&#8217;s really them before carrying a =
conversation, but wouldn&#8217;t they want the =
same?&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&lt;Gorman&=
gt;, &quot;Pierce A [NTK]&quot; &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D'color:#954F72'>Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Dat=
e:<span class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, November =
5, 2013 at 6:05 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho &lt;<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>fmousinh@cisco.com</span></a>&gt;, &quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3Dapple-converted-space>&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I agree with your characterization of businesses as victim of caller ID =
fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.&nbsp; So I don&#8217;t agree that =
STIR would &#8220;eliminate the need for caller identification from =
known TNs.&#8221;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fernando =
Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>mailto:fmousinh@cisco.com</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I would =
suggest we add a new attack type to section 3. More and more companies =
are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I&#8217;m informed =
that I don&#8217;t need to provide any further identification because my =
number is on file. Some (all?) companies that implement this type of =
validation rely on SS7 today.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Ultimately,=
 this is yet another variation of impersonation &#8211; but in this =
case, the &#8220;victim&#8221; is a business, unlike the other two =
scenarios we&#8217;ve listed so far.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Addressing =
this scenario would actually turn STIR into a feature, given it would =
enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D'color:#954F72'>alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, October 1, 2013 =
at 12:51 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:#954F72'>br@brianrosen.net</span></a>&gt;, =
&quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:#954F72'>jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:=
<span class=3Dapple-converted-space>&nbsp;</span></b>&quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D'color:#954F72'>richard@shockey.us</span></a>&gt;, &quot;'DOLLY, =
MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D'color:#954F72'>md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:#954F72'>rjsparks@nostrum.com</span></a>&gt;<br><b>Subject=
:<span class=3Dapple-converted-space>&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Jon,</span>=
<o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Thanks for =
the response.&nbsp; The intention in #1 below is to clarify the =
following sentence:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>The<span =
class=3Dapple-converted-space>&nbsp;</span><b>primary</b><span =
class=3Dapple-converted-space>&nbsp;</span>attack vector =
is</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; therefore one where the attacker contrives for the calling =
telephone</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number in signaling to be a particular chosen number, one that =
the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; attacker does not have the authority to call from,<span =
class=3Dapple-converted-space>&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></p></div><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number to be rendered on the terminating side</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>.&nbsp;</sp=
an><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>This might =
be misconstrued as indicating that the objective of spoofing is simply =
the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the =
rendered information. &nbsp;No issues with leaving this as it&#8217;s a =
valid point.&nbsp; Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on =
CPN.&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>So however =
it&#8217;s worded, I think it&#8217;s important to allow for both attack =
objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Regards,</s=
pan><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex</span>=
<o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
-----Original Message-----</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Brian =
Rosen</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Sent: =
Tuesday, October 01, 2013 9:29 AM</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; To: =
Peterson, Jon</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; Richard</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Shockey</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Don't =
think there is much MESSAGE.&nbsp; MSRP is about all we see, and XMPP =
is</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; more =
likely than that.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Brian</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; On =
Oct 1, 2013, at 12:24 PM, &quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:windowtext;text-decoration:none'>jon.peterson@neustar.biz<=
/span></a>&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
wrote:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Thanks for these notes, Alex. Some responses =
below.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here are several comments that should feed into the IETF =
Peterson draft:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
[IMO,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; both endpoint and in-network solutions should be =
facilitated]</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Agreed that both in-band and out-of-band solutions can usually =
be</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
implemented in either endpoints or in intermediaries of various =
kinds.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
If I see text that implies otherwise, I'll certainly change =
it.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Add a sessionless attack scenario.&nbsp; A spam =
payload may be carried in</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
a</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
establishment.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; More generally, we should be mindful of the fact that SIP is =
used in</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; telephony form more than voice session =
setup.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Probably if we were going to include a sessionless attack scenario, =
it</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
would be with regular text messages (whether carried on the PSTN =
over</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
TCAP or with some Internet protocol, including MESSAGE) rather =
than</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
with an INVITE, which typically wouldn't result in a payload =
being</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
immediately rendered to a user. More on this below with your =
suggested</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
text.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; The primary attack vector is</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; number in signaling to be a particular chosen number that =
the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
in the primary attack vectors that concern =
us.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; of programmability, the capacity to access the Internet, =
and</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; capabilities of rendering text, audio and/or images.&nbsp; This =
includes</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
I can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
images as you suggest.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Provided we're talking about end-to-end SIP use of MESSAGE, =
agreed</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
that in-band would be the right countermeasure. I am curious =
though</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
document.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Jon Peterson</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Regards,</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Alex</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of Richard Shockey</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN C</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: Robert Sparks</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Yes, ok</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Martin Dolly</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Technology</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1-609-903-3360</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D'color:windowtext;text-decoration:none'>md3135@att.com</span></a>=
</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, &quot;Robert =
Sparks&quot;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:windowtext;text-decoration:none'>rjsparks@nostrum.com</spa=
n></a>&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; wrote:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Hi Martin -</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Just to make sure - I think you're referring to =
Hadriel's comments</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; on the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; I don't think Hadriel's commented directly on =
stir-threats yet.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; In any case, we _are_ talking about a starting place, =
not a</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; finished</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; If there's no other objection, I'd like to get Jon to =
submit the</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; threats</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; RjS</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; From:<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear from more =
people about this</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; hear from him soon.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ Housley =
wrote:</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D'color:windowtext;text-decoration:none'>http://www.ietf.org/id/dr=
aft-peterson-stir-threats-00.txt</span></a></span><o:p></o:p></p></div><d=
iv><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt this I-D as the =
starting point for</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; STIR threat docuent?</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
stir mailing list</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; stir =
mailing list</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div></div><div>=
<p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'><hr =
size=3D3 width=3D"100%" align=3Dcenter></span></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div><p =
class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'>__________=
_____________________________________<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org/=
mailman/listinfo/stir</a></span><o:p></o:p></p></blockquote></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div class=3DMsoNormal =
align=3Dcenter style=3D'text-align:center'><hr size=3D2 width=3D"100%" =
align=3Dcenter></div><p class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></body></html>
------=_NextPart_001_005E_01CEDBA4.18350350--

------=_NextPart_000_005D_01CEDBA4.18350350
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"

MIAGCSqGSIb3DQEHAqCAMIACAQExCzAJBgUrDgMCGgUAMIAGCSqGSIb3DQEHAQAAoIIRPzCCBBow
ggMCAhEAi1t1VoRUhQsAz684SM6xpDANBgkqhkiG9w0BAQUFADCByjELMAkGA1UEBhMCVVMxFzAV
BgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBOZXR3b3JrMTow
OAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVkIHVzZSBvbmx5
MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRpZmljYXRpb24g
QXV0aG9yaXR5IC0gRzMwHhcNOTkxMDAxMDAwMDAwWhcNMzYwNzE2MjM1OTU5WjCByjELMAkGA1UE
BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO
ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk
IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp
ZmljYXRpb24gQXV0aG9yaXR5IC0gRzMwggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDd
hNS5tPmn2PMEeJzePdxsExbZet0kUWbAxyZZDawGCMKU0TMf8IM1H24byN6qbhVOVCfvxG0a7Avj
DvBEpVfHQFgeo0cfcexg9m2UyBg57f5CGFbf5ExJEHhOAXY1YxI23Wa8AQQ2o1Vo1aI2CayrISZU
Bq0/yhTgrMqtBh2V4vid8eBg/8J/dStMzNr+h5kh6rr+PlTX0ll42zxuz6ATABq4J6HkvmeWyqDF
s5zdyXWe6zCaX6PN2a54GT8j6VzbKb2tVcgbVIxj9uim6sc3ElyjKR4C2dsfO7TXD1ZHgRUESq+D
J9HFWIjB3faqp6MY2miqbRFR4b9la5+WdtE9AgMBAAEwDQYJKoZIhvcNAQEFBQADggEBAKtmjdez
useatuZV0AXxnzGNWqrZqkYmD3Htpa1TVmIBRypE6f4/dAsTm7n0TRuy0V+yttKIXLOfzcvUp9lg
lYQ6+ME3HWHK57DF5ZHaVKasMYGul97NCKy4wJeAf25ypOdpE5VlH8STPP15jwTUPk/q957OzWd8
T2UC/5GFVHPH/zb3hi3s0F5P/xGfcgbWuBrxTA0mZeJEgB7Hn+Pd6Ara7KUggGlooU9+4WvPB0H6
g468ON2wLhGxa7JCzJq8+UgieUoZD7IcPiB02WrDvvIoeBNWeU9tUOobsLVXsTdmWCPz3A/fCofE
74YF1TgUYJmjS94GlnEs8tu2H6TvP+4wggZCMIIFKqADAgECAhA4qwAv/66Wt1b/OVr7XecbMA0G
CSqGSIb3DQEBBQUAMIHKMQswCQYDVQQGEwJVUzEXMBUGA1UEChMOVmVyaVNpZ24sIEluYy4xHzAd
BgNVBAsTFlZlcmlTaWduIFRydXN0IE5ldHdvcmsxOjA4BgNVBAsTMShjKSAxOTk5IFZlcmlTaWdu
LCBJbmMuIC0gRm9yIGF1dGhvcml6ZWQgdXNlIG9ubHkxRTBDBgNVBAMTPFZlcmlTaWduIENsYXNz
IDEgUHVibGljIFByaW1hcnkgQ2VydGlmaWNhdGlvbiBBdXRob3JpdHkgLSBHMzAeFw0xMTA5MDEw
MDAwMDBaFw0yMTA4MzEyMzU5NTlaMIGmMQswCQYDVQQGEwJVUzEdMBsGA1UEChMUU3ltYW50ZWMg
Q29ycG9yYXRpb24xHzAdBgNVBAsTFlN5bWFudGVjIFRydXN0IE5ldHdvcmsxHjAcBgNVBAsTFVBl
cnNvbmEgTm90IFZhbGlkYXRlZDE3MDUGA1UEAxMuU3ltYW50ZWMgQ2xhc3MgMSBJbmRpdmlkdWFs
IFN1YnNjcmliZXIgQ0EgLSBHNDCCASIwDQYJKoZIhvcNAQEBBQADggEPADCCAQoCggEBAMbsJ/0d
Y/Q7HYrB0xzIyIKGtrhKhpKqgVxyyjANL55BIlcwISWQmqP0rCrGiBeGYXITdi7sA8snm48ggDfg
5IraVaZQD/y5XCNpiUKhuh+v7w75pMkK8fg3ssbZkkqufd+4RB+buj+MBv7YI09IUSNqYISo7icv
YN+W8hoqjDyPAMxPy/ogjrw19uHwmrYF8/wdP8YUew7a8gXk04MCpsVpcLSp5Fbp2x1c9KY24mu1
Hiot3L677joEsDAIrV9obMa9BpaIhOfmqWQtvDgwu4gmw2dmZrS0d/nAoccOcu9m4uW5yuDzhXc1
mN7UHLD+ZnHiOMtufE9AVeuX2agYHu0CAwEAAaOCAkQwggJAMDgGCCsGAQUFBwEBBCwwKjAoBggr
BgEFBQcwAYYcaHR0cDovL3BraS1vY3NwLnZlcmlzaWduLmNvbTASBgNVHRMBAf8ECDAGAQH/AgEA
MGwGA1UdIARlMGMwYQYLYIZIAYb4RQEHFwEwUjAmBggrBgEFBQcCARYaaHR0cDovL3d3dy5zeW1h
dXRoLmNvbS9jcHMwKAYIKwYBBQUHAgIwHBoaaHR0cDovL3d3dy5zeW1hdXRoLmNvbS9ycGEwNAYD
VR0fBC0wKzApoCegJYYjaHR0cDovL2NybC52ZXJpc2lnbi5jb20vcGNhMS1nMy5jcmwwDgYDVR0P
AQH/BAQDAgEGMCkGA1UdEQQiMCCkHjAcMRowGAYDVQQDExFWZXJpU2lnbk1QS0ktMi05NzAdBgNV
HQ4EFgQUrfnDk3IttbkoYeSk12DVxApeGgEwgfEGA1UdIwSB6TCB5qGB0KSBzTCByjELMAkGA1UE
BhMCVVMxFzAVBgNVBAoTDlZlcmlTaWduLCBJbmMuMR8wHQYDVQQLExZWZXJpU2lnbiBUcnVzdCBO
ZXR3b3JrMTowOAYDVQQLEzEoYykgMTk5OSBWZXJpU2lnbiwgSW5jLiAtIEZvciBhdXRob3JpemVk
IHVzZSBvbmx5MUUwQwYDVQQDEzxWZXJpU2lnbiBDbGFzcyAxIFB1YmxpYyBQcmltYXJ5IENlcnRp
ZmljYXRpb24gQXV0aG9yaXR5IC0gRzOCEQCLW3VWhFSFCwDPrzhIzrGkMA0GCSqGSIb3DQEBBQUA
A4IBAQDWj8Ham4jys2xNH1gvugFRXXTBRujDuHuf1kDx7/8yuolrwA40Q5+kmeak8F1IM2KFhWH+
I4gijGCbK5xlSZTEojgkSKVcpVBLaOliIqeT6Jkibj1buxBCDh9MdUc0VgmP+L2MPPNcu9KWcFRw
Yk3v0RC+nUgsXuyGaweC8D3hJScoLOAWdh6z/eViltKKPV8rrvtcwhO3ZWPLNHZDn9aHmaturZXB
AD9GJ4H/Nd4jDkPcFF8y+cop78JSMPWZ3bmB+DolII2CaPK5IYV0ZgThhjkWMvIt1iqoyd7ZAAJP
4xggxaWBVraV3tOCrfh7Jb5kfC6gunAs+Pl14nRNB22EMIIG1zCCBb+gAwIBAgIQEB3dROkPDT0Q
6QYEc74tcjANBgkqhkiG9w0BAQUFADCBpjELMAkGA1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVj
IENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRlYyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQ
ZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMTLlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVh
bCBTdWJzY3JpYmVyIENBIC0gRzQwHhcNMTMwNDAxMDAwMDAwWhcNMTQwNDAyMjM1OTU5WjCBzjEu
MCwGA1UEAwwlUGVyc29uYSBOb3QgVmFsaWRhdGVkIC0gMTM2NDg0MjY5NDQ0MzErMCkGCSqGSIb3
DQEJARYcbWljaGFlbC5oYW1tZXJAeWFhbmF0ZWNoLmNvbTEPMA0GA1UECwwGUy9NSU1FMR4wHAYD
VQQLDBVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxHzAdBgNVBAsMFlN5bWFudGVjIFRydXN0IE5ldHdv
cmsxHTAbBgNVBAoMFFN5bWFudGVjIENvcnBvcmF0aW9uMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAh2AtKQNowI8ILmNvdcY16moA8CH7hjSvGDNofwWsh4quEfZ6VQGtDhhOjUmW6JVq
719MH8FNJcVr8oAiVaK3nNeJTL2wO68LpgX6tcZ/z22pJoz98wHzgfWf3pfEUYrCqYg2V3m6oe0t
kd+OaeY8DmPVSpG7as0rkoEzeNwCtmpYjkm96mBO6/AQwsowSLbSuqkEGykp1k47KiPBtxhbp2um
IReh94vPrr1O9zXau9oGMvABJjigYQ2e5AhhhDdK8qOkhgkMAJN2nvLqY+VFrnFIsb5noQ/tP2M/
ct9qwRZ5kUaumRqE/XzV3rH8PoacZW/YvcwAp8Gr1ZaHCMRl+wIDAQABo4IC1TCCAtEwDAYDVR0T
AQH/BAIwADAOBgNVHQ8BAf8EBAMCBaAwIAYDVR0lAQH/BBYwFAYIKwYBBQUHAwQGCCsGAQUFBwMC
MB0GA1UdDgQWBBTlvYUx4PMlUy6uvceJkDMK4jBDZjAnBgNVHREEIDAegRxtaWNoYWVsLmhhbW1l
ckB5YWFuYXRlY2guY29tMB8GA1UdIwQYMBaAFK35w5NyLbW5KGHkpNdg1cQKXhoBMIIBKwYIKwYB
BQUHAQEEggEdMIIBGTCCARUGCCsGAQUFBzAChoIBB2xkYXA6Ly9kaXJlY3RvcnkudmVyaXNpZ24u
Y29tL0NOJTIwJTNEJTIwU3ltYW50ZWMlMjBDbGFzcyUyMDElMjBJbmRpdmlkdWFsJTIwU3Vic2Ny
aWJlciUyMENBJTIwLSUyMEc0JTJDJTIwT1UlMjAlM0QlMjBQZXJzb25hJTIwTm90JTIwVmFsaWRh
dGVkJTJDJTIwT1UlMjAlM0QlMjBTeW1hbnRlYyUyMFRydXN0JTIwTmV0d29yayUyQyUyME8lMjAl
M0QlMjBTeW1hbnRlYyUyMENvcnBvcmF0aW9uJTJDJTIwQyUyMCUzRCUyMFVTP2NBQ2VydGlmaWNh
dGU7YmluYXJ5MF0GA1UdHwRWMFQwUqBQoE6GTGh0dHA6Ly9wa2ktY3JsLnN5bWF1dGguY29tL2Nh
XzU2MWMxMDM2OTBjOTdhNjkyNDdhMGVmMDcxYWM4MWFmL0xhdGVzdENSTC5jcmwwbAYDVR0gBGUw
YzBhBgtghkgBhvhFAQcXATBSMCYGCCsGAQUFBwIBFhpodHRwOi8vd3d3LnN5bWF1dGguY29tL2Nw
czAoBggrBgEFBQcCAjAcGhpodHRwOi8vd3d3LnN5bWF1dGguY29tL3JwYTAqBgpghkgBhvhFARAD
BBwwGgYRYIZIAYb4RQEQAQICBAGGsxcWBTEwOTIyMA0GCSqGSIb3DQEBBQUAA4IBAQAae/er4pfB
TpqK6c/uJ9D8dVJzzNX26akkB8z/29totzbkpFAIlXRh02iNVK+GnsgS1gwu3FOvjgT5M4i+cNxD
vTJVcnZNXns75JUGX3UsWQbtSySrVzQx8lMtwW6nXHM5GlEaY8/jKVpambG2q9OHjmwMTz7I4A+y
KiiGCGdhE23dFOvku6t/oiwqFnXJmb4o75kbVevKEOd34MIj0P7Q8+1mZcNYEUTYKadoPXFyTWnO
2HTMvFcGgdLFKcqb13clWeW3/B5WjdBimpMjbvwi8ZbrhFdp7Y3NLKFSRH8W29rt0LW7zULxii0z
34NGsBkW9w95PLzTsqmKD4Yv5AkIMYIEkjCCBI4CAQEwgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYD
VQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlvbjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29y
azEeMBwGA1UECxMVUGVyc29uYSBOb3QgVmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFz
cyAxIEluZGl2aWR1YWwgU3Vic2NyaWJlciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMAkGBSsO
AwIaBQCgggKrMBgGCSqGSIb3DQEJAzELBgkqhkiG9w0BBwEwHAYJKoZIhvcNAQkFMQ8XDTEzMTEw
NzE1MjgyNlowIwYJKoZIhvcNAQkEMRYEFKT/8WFR/+6OQtOJsmBs2PDwFq8eMIGrBgkqhkiG9w0B
CQ8xgZ0wgZowCwYJYIZIAWUDBAEqMAsGCWCGSAFlAwQBFjAKBggqhkiG9w0DBzALBglghkgBZQME
AQIwDgYIKoZIhvcNAwICAgCAMAcGBSsOAwIHMA0GCCqGSIb3DQMCAgFAMA0GCCqGSIb3DQMCAgEo
MAcGBSsOAwIaMAsGCWCGSAFlAwQCAzALBglghkgBZQMEAgIwCwYJYIZIAWUDBAIBMIHMBgkrBgEE
AYI3EAQxgb4wgbswgaYxCzAJBgNVBAYTAlVTMR0wGwYDVQQKExRTeW1hbnRlYyBDb3Jwb3JhdGlv
bjEfMB0GA1UECxMWU3ltYW50ZWMgVHJ1c3QgTmV0d29yazEeMBwGA1UECxMVUGVyc29uYSBOb3Qg
VmFsaWRhdGVkMTcwNQYDVQQDEy5TeW1hbnRlYyBDbGFzcyAxIEluZGl2aWR1YWwgU3Vic2NyaWJl
ciBDQSAtIEc0AhAQHd1E6Q8NPRDpBgRzvi1yMIHOBgsqhkiG9w0BCRACCzGBvqCBuzCBpjELMAkG
A1UEBhMCVVMxHTAbBgNVBAoTFFN5bWFudGVjIENvcnBvcmF0aW9uMR8wHQYDVQQLExZTeW1hbnRl
YyBUcnVzdCBOZXR3b3JrMR4wHAYDVQQLExVQZXJzb25hIE5vdCBWYWxpZGF0ZWQxNzA1BgNVBAMT
LlN5bWFudGVjIENsYXNzIDEgSW5kaXZpZHVhbCBTdWJzY3JpYmVyIENBIC0gRzQCEBAd3UTpDw09
EOkGBHO+LXIwDQYJKoZIhvcNAQEBBQAEggEALOpe1qIe0vPORyuhSRDUeA3fwMGp4DyoQCCUqo7H
nwoz6CF7PJhSE9P8wAKpouA7WjN540583+xbdtryXQyJBksX5K1DZKraRYvRg2+BGHEVzXD+M5h5
6o1hEbE5kCB6Y45Ejd1pRWuQuX5iiRy8R2YKMh+rqM584tsP2WH9HhhUGkSueTXH3DJDiSuL7fMW
UVD50PxrMc1zHUvtddwY5ghlAISesH3uPO8gOnqwXjDFAPzlCcgAygS3pAYwGxPJ5zqARQ298k5k
S07r6oZ71HY/IzreNp9GjBZDYVAEhRuOvigCWlk+T7BZ5ueNGLVB1Y7xA4ayRuVgXK0/YhXcHAAA
AAAAAA==

------=_NextPart_000_005D_01CEDBA4.18350350--

From Henning.Schulzrinne@fcc.gov  Thu Nov  7 08:13:04 2013
Return-Path: <Henning.Schulzrinne@fcc.gov>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4973421E8149; Thu,  7 Nov 2013 08:13:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.948
X-Spam-Level: 
X-Spam-Status: No, score=-1.948 tagged_above=-999 required=5 tests=[AWL=0.650,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lUEpi18hgPfK; Thu,  7 Nov 2013 08:12:53 -0800 (PST)
Received: from DC-IP-2.fcc.gov (dc-ip-2.fcc.gov [192.104.54.91]) by ietfa.amsl.com (Postfix) with ESMTP id 3FD1A21E80DF; Thu,  7 Nov 2013 08:12:51 -0800 (PST)
Message-ID: <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov>
From: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
To: 'Michael Hammer' <michael.hammer@yaanatech.com>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, "br@brianrosen.net" <br@brianrosen.net>, "richard@shockey.us" <richard@shockey.us>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO28lBm7MQs/E/Y0C8yrTGiGFz45oZ21rggABc6AD//7YS0A==
Date: Thu, 7 Nov 2013 16:12:50 +0000
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com>
In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_E6A16181E5FD2F46B962315BB05962D01FC238EEp2pxmb13fccnetw_"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "cnit@ietf.org" <cnit@ietf.org>, "fmousinh@cisco.com" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 16:13:05 -0000

--_000_E6A16181E5FD2F46B962315BB05962D01FC238EEp2pxmb13fccnetw_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

Yes, that's a problem, but as long as the number of categories is small, yo=
u can build UIs that only render information that's appropriate to the decl=
aration. For practical reasons, I think the number of useful categories is =
likely going to be fairly limited:

-          Financial institution (FDIC and a few others)

-          Health care (each health care facility has a gov't number)

-          Charity (501c3, state registered)

-          Contractor (state-licensed)

-          Public safety organization (police, fire)

-          Lawyer (bar association)

-          Local, state and federal government (.gov in the US)

I suspect that list encompasses a large fraction of the fraudulent (imperso=
nation) calls. For all of the above, at least within a country, it's pretty=
 clear who can attest to the membership. Yes, this requires some UI work or=
 some server logic, but these categories and the organizations don't change=
 all that often - in most cases, the certifying entities have probably been=
 the same for the past 50+ years. I'm not as worried about figuring out whe=
ther the beautician, mortician or florist is licensed and properly identifi=
ed, although I'm sure we can all come up with potential fraud stories.

From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net; richa=
rd@shockey.us
Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

So, would you trust a certificate from the City of Reston, Virginia police =
department?

(Hint:  you can find Reston on a map, but there is no City of Reston.
  The only police are Fairfax County.)

My concern is that one you dilute or disperse authority, it becomes a free-=
for-all again, and anybody's guess.

Mike


From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; Fernando Mousinho (fmousinh);=
 cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

As a thought experiment, Kumiko Ono and I had published a draft

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.

It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, ...) is not involved.

Henning

From: cnit-bounces@ietf.org<mailto:cnit-bounces@ietf.org> [mailto:cnit-boun=
ces@ietf.org]<mailto:[mailto:cnit-bounces@ietf.org]> On Behalf Of Gorman, P=
ierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@iet=
f.org>; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

>From 3261

20.9 Call-Info

   The Call-Info header field provides additional information about the
   caller or callee, depending on whether it is found in a request or
   response.  The purpose of the URI is described by the "purpose"
   parameter.  The "icon" parameter designates an image suitable as an
   iconic representation of the caller or callee.  The "info" parameter
   describes the caller or callee in general, for example, through a web
   page.  The "card" parameter provides a business card, for example, in
   vCard [36] or LDIF [37] formats.  Additional tokens can be registered
   using IANA and the procedures in Section 27.

   Use of the Call-Info header field can pose a security risk.  If a
   callee fetches the URIs provided by a malicious caller, the callee
   may be at risk for displaying inappropriate or offensive content,
   dangerous or illegal content, and so on.  Therefore, it is
   RECOMMENDED that a UA only render the information in the Call-Info
   header field if it can verify the authenticity of the element that
   originated the header field and trusts that element.  This need not
   be the peer UA; a proxy can insert this header field into requests.

   Example:

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,
     <http://www.example.com/alice/> ;purpose=3Dinfo

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

We've considered adding some information that is not number and is not name=
, but is something like "bank", which might have some sort of validation be=
hind it.

Is that along the lines you were thinking?

Brian
On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

I agree with Pierce here and respectfully disagree that STIR might eliminat=
e the need for other forms of caller identification.  Though your use case =
of credit card validation is a useful one and you are right there are still=
 applications that use SS7 for things that have nothing to do with call set=
up. I agree with you STIR may have more applications beyond the obvious one=
s of realtime session validation.

It's been my experience recently that there is a use case for something MOR=
E in the identification of the session as it is presented to the called par=
ty. This is the CNAM + idea we are kicking around on the CNIT list.

_______________________________________________
cnit mailing list
cnit@ietf.org<mailto:cnit@ietf.org>
https://www.ietf.org/mailman/listinfo/cnit

But your use case of a bank wanting to make sure they could properly identi=
fy themselves to the consumer before establishing a conversation is exactly=
 what this process is about.  STIR is essential but it's a multi-faceted pr=
oblem that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.   Its not unreasonable to discuss those.

The obviously analogy is I would want to see some real identification of a =
utility worker before I let them into my house to make repairs.  I would wa=
nt some validation that the call to me to reconfirm the appointments was in=
 fact from the utility in question.



From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Let me rephrase it... it may eliminate the need for other forms of caller i=
dentification beyond what STIR will provide, depending on the specific use =
case. For example, a credit card company may choose to rely entirely on STI=
R before allowing a card to be unblocked by an IVR (and as I said earlier, =
many companies do it today). In other use cases, the TN alone is not suffic=
ient information - my health care provider will want to know which member o=
f the family is calling.

I agree that ANI is already broadly used to improve customer service today.=
 However, it is not usually deemed as a secure enough mechanism to validate=
 the caller (therefore this WG!), except if you are a large organization th=
at can leverage things like SS7. STIR would make this type of validation av=
ailable to a broader number of companies.


Going on a tangent... perhaps this is out of scope, but there is not a lot =
of discussion about called party hijacking. Couldn't a man-in-the-middle tr=
y to answer calls on my behalf? If my bank is calling me, I want to make su=
re it's really them before carrying a conversation, but wouldn't they want =
the same?


From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com<mailto:Pierce.Go=
rman@sprint.com>>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho <fmousinh@cisco.com<mailto:fmousinh@cisco.com>>, "sti=
r@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.org>>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

I agree with your characterization of businesses as victim of caller ID fra=
ud however contact centers also use TN as a key to improve information avai=
lable to call agents to reduce average time-per-call and increase capacity =
of the call center.  So I don't agree that STIR would "eliminate the need f=
or caller identification from known TNs."

But perhaps I misunderstood your last sentence?


From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]
Sent: November 05, 2013 4:34 PM
To: stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I would suggest we add a new attack type to section 3. More and more compan=
ies are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for identificati=
on. If I call from my home phone number, I'm informed that I don't need to =
provide any further identification because my number is on file. Some (all?=
) companies that implement this type of validation rely on SS7 today.

Ultimately, this is yet another variation of impersonation - but in this ca=
se, the "victim" is a business, unlike the other two scenarios we've listed=
 so far.

Addressing this scenario would actually turn STIR into a feature, given it =
would enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.



From: Alex Bobotek <alex@bobotek.net<mailto:alex@bobotek.net>>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>, "Peterson, J=
on" <jon.peterson@neustar.biz<mailto:jon.peterson@neustar.biz>>
Cc: "stir@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.o=
rg>>, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>, "'DO=
LLY, MARTIN C'" <md3135@att.com<mailto:md3135@att.com>>, 'Robert Sparks' <r=
jsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Jon,

Thanks for the response.  The intention in #1 below is to clarify the follo=
wing sentence:

The primary attack vector is
   therefore one where the attacker contrives for the calling telephone
   number in signaling to be a particular chosen number, one that the
   attacker does not have the authority to call from, in order for that
   number to be rendered on the terminating side.

This might be misconstrued as indicating that the objective of spoofing is =
simply the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the rendere=
d information.  No issues with leaving this as it's a valid point.  Another=
 (increasing) motivation is to evade network and/or endpoint defenses that =
may block based on CPN.

So however it's worded, I think it's important to allow for both attack obj=
ectives of a spoofed presentation at the endpoint and in transit.

Regards,

Alex

> -----Original Message-----
> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-bo=
unces@ietf.org] On Behalf Of
> Brian Rosen
> Sent: Tuesday, October 01, 2013 9:29 AM
> To: Peterson, Jon
> Cc: stir@ietf.org<mailto:stir@ietf.org>; Alex Bobotek; 'Robert Sparks'; '=
DOLLY, MARTIN C'; Richard
> Shockey
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
>
> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is
> more likely than that.
>
> Brian
>
> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <jon.peterson@neustar.biz<ma=
ilto:jon.peterson@neustar.biz>>
> wrote:
>
> > Thanks for these notes, Alex. Some responses below.
> >
> >> Here are several comments that should feed into the IETF Peterson draf=
t:
> >>
> >> *   Remove any assumptions that the solution cannot be in-network
> [IMO,
> >> both endpoint and in-network solutions should be facilitated]
> >
> > Agreed that both in-band and out-of-band solutions can usually be
> > implemented in either endpoints or in intermediaries of various kinds.
> > If I see text that implies otherwise, I'll certainly change it.
> >
> >> *   Add a sessionless attack scenario.  A spam payload may be carried =
in
> a
> >> SIP INVITE or MESSAGE, which might contain stock market advice even
> >> in a display name field.  These attacks do NOT require session
> establishment.
> >> More generally, we should be mindful of the fact that SIP is used in
> >> telephony form more than voice session setup.
> >
> > Probably if we were going to include a sessionless attack scenario, it
> > would be with regular text messages (whether carried on the PSTN over
> > TCAP or with some Internet protocol, including MESSAGE) rather than
> > with an INVITE, which typically wouldn't result in a payload being
> > immediately rendered to a user. More on this below with your suggested
> text.
> >
> >> Here's some suggested markup:
> >>
> >>
> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:
> >>
> >> The primary attack vector is
> >>  therefore one where the attacker contrives for the calling telephone
> >> number in signaling to be a particular chosen number that the
> >> attacker does not have the authority to call from.
> >
> > What you want here is to remove the implication that the number will
> > be rendered on the terminating side? While there are some attacks
> > where that isn't significant, perhaps, I would say it is significant
> > in the primary attack vectors that concern us.
> >
> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> >>
> >>     Smart devices are generally based on computers with some degree
> >> of programmability, the capacity to access the Internet, and
> >> capabilities of rendering text, audio and/or images.  This includes
> >> smart phones, telephone applications on desktop and laptop computers,
> >> IP private branch exchanges, and so on.
> >
> > I can add the notion that smart devices can render text, audio and/or
> > images as you suggest.
> >
> >> 3.  Add to 3.3 Attack Scenarios:
> >>
> >>       Impersonation, IP-Mobile Text Message
> >>
> >>        An attacker with an computer sends a high volume of SIP MESSAGE
> >> spam message to IP-enabled smart phones using randomized calling
> >> party numbers.
> >>
> >>       Countermeasure: in-band authenticated identity
> >
> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > that in-band would be the right countermeasure. I am curious though
> > whether practically speaking there is enough use of MESSAGE in this
> > fashion that we're actually seeing high-volume spam over MESSAGE
> > today. Either way, no problem having an attack scenario of this form in=
 the
> document.
> >
> > Jon Peterson
> > Neustar, Inc.
> >
> >> Regards,
> >>
> >> Alex
> >>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of Richard Shockey
> >>> Sent: Monday, September 30, 2013 1:11 PM
> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> +1
> >>>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of DOLLY, MARTIN C
> >>> Sent: Monday, September 30, 2013 12:58 PM
> >>> To: Robert Sparks
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> Yes, ok
> >>>
> >>> Martin Dolly
> >>> Lead Member of Technical Staff
> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> >>> Technology
> >>> +1-609-903-3360
> >>> md3135@att.com<mailto:md3135@att.com>
> >>>
> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> >>>> <rjsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
> >>> wrote:
> >>>>
> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> >>>>> With Hadriel comments incorporated, it is a start
> >>>> Hi Martin -
> >>>>
> >>>> Just to make sure - I think you're referring to Hadriel's comments
> >>>> on the
> >>> problem statement document?
> >>>> I don't think Hadriel's commented directly on stir-threats yet.
> >>>>
> >>>> In any case, we _are_ talking about a starting place, not a
> >>>> finished
> >>> product.
> >>>>
> >>>> If there's no other objection, I'd like to get Jon to submit the
> >>>> threats
> >>> document as a WG -00 as soon as it's convenient.
> >>>>
> >>>> RjS
> >>>>>
> >>>>> -----Original Message-----
> >>>>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:s=
tir-bounces@ietf.org] On
> >>>>> Behalf Of Russ Housley
> >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> >>>>> To: IETF STIR Mail List
> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>>>
> >>>>> It has been six days, I'd like to hear from more people about this
> >>> document.  Martin asked for an additional week, so I'm sure we will
> >>> hear from him soon.
> >>>>>
> >>>>> Russ
> >>>>>
> >>>>>
> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> >>>>>>
> >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> >>>>>>
> >>>>>> Should the working group adopt this I-D as the starting point for
> >>>>>> the
> >>> STIR threat docuent?
> >>>>>>
> >>>>>> Russ
> >>>>> _______________________________________________
> >>>>> stir mailing list
> >>>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>>> https://www.ietf.org/mailman/listinfo/stir
> >>>>
> >>>> _______________________________________________
> >>>> stir mailing list
> >>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>> https://www.ietf.org/mailman/listinfo/stir
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >>>
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >> _______________________________________________
> >> stir mailing list
> >> stir@ietf.org<mailto:stir@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/stir
> >
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org<mailto:stir@ietf.org>
> > https://www.ietf.org/mailman/listinfo/stir
>
> _______________________________________________
> stir mailing list
> stir@ietf.org<mailto:stir@ietf.org>
> https://www.ietf.org/mailman/listinfo/stir

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.
_______________________________________________
stir mailing list
stir@ietf.org<mailto:stir@ietf.org>
https://www.ietf.org/mailman/listinfo/stir



________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.

--_000_E6A16181E5FD2F46B962315BB05962D01FC238EEp2pxmb13fccnetw_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Wingdings;
	panose-1:5 0 0 0 0 0 0 0 0 0;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
p.MsoListParagraph, li.MsoListParagraph, div.MsoListParagraph
	{mso-style-priority:34;
	margin-top:0in;
	margin-right:0in;
	margin-bottom:0in;
	margin-left:.5in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman","serif";}
span.emailstyle18
	{mso-style-name:emailstyle18;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma","sans-serif";}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Arial","sans-serif";
	color:#0000CC;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle24
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle25
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle26
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
/* List Definitions */
@list l0
	{mso-list-id:1363438786;
	mso-list-type:hybrid;
	mso-list-template-ids:528768802 -1378999646 67698691 67698693 67698689 676=
98691 67698693 67698689 67698691 67698693;}
@list l0:level1
	{mso-level-start-at:202;
	mso-level-number-format:bullet;
	mso-level-text:-;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Calibri","sans-serif";
	mso-fareast-font-family:Calibri;}
@list l0:level2
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level3
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level4
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level5
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level6
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
@list l0:level7
	{mso-level-number-format:bullet;
	mso-level-text:\F0B7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Symbol;}
@list l0:level8
	{mso-level-number-format:bullet;
	mso-level-text:o;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:"Courier New";}
@list l0:level9
	{mso-level-number-format:bullet;
	mso-level-text:\F0A7;
	mso-level-tab-stop:none;
	mso-level-number-position:left;
	text-indent:-.25in;
	font-family:Wingdings;}
ol
	{margin-bottom:0in;}
ul
	{margin-bottom:0in;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Yes, that&#8217;s a probl=
em, but as long as the number of categories is small, you can build UIs tha=
t only render information that&#8217;s appropriate to the declaration.
 For practical reasons, I think the number of useful categories is likely g=
oing to be fairly limited:<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Financial institu=
tion (FDIC and a few others)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Health care (each=
 health care facility has a gov&#8217;t number)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Charity (501c3, s=
tate registered)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Contractor (state=
-licensed)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Public safety org=
anization (police, fire)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lawyer (bar assoc=
iation)<o:p></o:p></span></p>
<p class=3D"MsoListParagraph" style=3D"text-indent:-.25in;mso-list:l0 level=
1 lfo1"><![if !supportLists]><span style=3D"font-size:11.0pt;font-family:&q=
uot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><span style=3D"mso-=
list:Ignore">-<span style=3D"font:7.0pt &quot;Times New Roman&quot;">&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
</span></span></span><![endif]><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">Local, state and =
federal government (.gov in the US)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I suspect that list encom=
passes a large fraction of the fraudulent (impersonation) calls. For all of=
 the above, at least within a country, it&#8217;s pretty clear
 who can attest to the membership. Yes, this requires some UI work or some =
server logic, but these categories and the organizations don&#8217;t change=
 all that often &#8211; in most cases, the certifying entities have probabl=
y been the same for the past 50&#43; years. I&#8217;m
 not as worried about figuring out whether the beautician, mortician or flo=
rist is licensed and properly identified, although I&#8217;m sure we can al=
l come up with potential fraud stories.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Michael =
Hammer [mailto:michael.hammer@yaanatech.com]
<br>
<b>Sent:</b> Thursday, November 07, 2013 10:28 AM<br>
<b>To:</b> Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net=
; richard@shockey.us<br>
<b>Cc:</b> stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org<br>
<b>Subject:</b> RE: [stir] draft-peterson-stir-threats-00.txt<o:p></o:p></s=
pan></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">So, would you trust a cer=
tificate from the City of Reston, Virginia police department?<o:p></o:p></s=
pan></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">(Hint:&nbsp; you can find=
 Reston on a map, but there is no City of Reston.&nbsp;
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;The only poli=
ce are Fairfax County.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My concern is that one yo=
u dilute or disperse authority, it becomes a free-for-all again, and anybod=
y&#8217;s guess.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Mike<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a> [<a href=
=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>]
<b>On Behalf Of </b>Henning Schulzrinne<br>
<b>Sent:</b> Thursday, November 07, 2013 10:00 AM<br>
<b>To:</b> 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey<br>
<b>Cc:</b> <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> List; Fernand=
o Mousinho (fmousinh);
<a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt<o:p></o:p></s=
pan></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As a thought experiment, =
Kumiko Ono and I had published a draft
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"http://tools.i=
etf.org/html/draft-ono-dispatch-attribute-validation-00">http://tools.ietf.=
org/html/draft-ono-dispatch-attribute-validation-00</a><o:p></o:p></span></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">to allow third parties to=
 validate property information. If the validating party (e.g., a bank regul=
ator) is willing to sign a certificate, similar in spirit
 to the framed gold-leaf diplomas in your dentist&#8217;s office or, more l=
owly, to the health departments rating in a restaurant window, and it can b=
e tied to a phone number, this shouldn&#8217;t be too hard.<o:p></o:p></spa=
n></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s a bit harder i=
f the certifying authority (regulator, Realtor board, local bar association=
, &#8230;) is not involved.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Henning
<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">
<a href=3D"mailto:cnit-bounces@ietf.org">cnit-bounces@ietf.org</a> <a href=
=3D"mailto:[mailto:cnit-bounces@ietf.org]">
[mailto:cnit-bounces@ietf.org]</a> <b>On Behalf Of </b>Gorman, Pierce A [NT=
K]<br>
<b>Sent:</b> Thursday, November 07, 2013 9:54 AM<br>
<b>To:</b> Brian Rosen; Richard Shockey<br>
<b>Cc:</b> <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a> List; <a href=
=3D"mailto:cnit@ietf.org">
cnit@ietf.org</a>; Fernando Mousinho (fmousinh)<br>
<b>Subject:</b> Re: [cnit] [stir] draft-peterson-stir-threats-00.txt<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;ll admit I am not f=
amiliar with v/x/jcard encoding differences or the implications of their us=
e so I&#8217;ll encourage educating me if it isn&#8217;t too onerous.</span=
><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;m not sure what is =
the concern with a 3<sup>rd</sup> party providing &#8220;validation&#8221; =
though.&nbsp; There are numerous examples of 3<sup>rd</sup> parties providi=
ng validation
 of information including NASDAQ, NYSE, Barron&#8217;s, Moody&#8217;s, and =
the federal reserve banking system to name a few.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:black">Pierce</span><o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Brian Ro=
sen [<a href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]
<br>
<b>Sent:</b> November 06, 2013 11:59 PM<br>
<b>To:</b> Richard Shockey<br>
<b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; <a href=3D=
"mailto:stir@ietf.org">
stir@ietf.org</a> List; <a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><=
br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt</span><o:p></=
o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal">I think this would be a heavy lift.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">If the responsible entity was a carrier, then it wou=
ld have to validate the data, which it has very little basis to validate. &=
nbsp;It could get a 3rd party to do the validation, but then it&#8217;s put=
ting its reputation on the back of some hired
 hand validator.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">If the responsibility is the end user/device, then t=
he signature has no value.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I do question JCARD vs xCard, but that&#8217;s an en=
coding detail. &nbsp;All of SIP Is XML described by schema, not json.<o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">URI for a JCARD in the CA=
LL INFO header provisioned by the calling party and ultimately signed by th=
e responsible entity. &nbsp;The carrier could provision this
 for their mobile or hosted customers.&nbsp; Enterprises could do this them=
selves.&nbsp; This also has advantages in Enterprise to Enterprise UC as we=
ll where the data is derived from the Enterprise &#8220;directory&#8221; an=
d could facilitate end to end PPX to PBX communications
 especially in point to point video communications. </span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There are certainly priva=
cy and security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp;=
 This really would be PII in the clear but then its done voluntarily.
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There would have to be so=
me work around restructuring the Header and adding some parameters but it&#=
8217;s underutilized right now and this Use Case is a perfectly
 appropriate use. </span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://tools.=
ietf.org/html/draft-ietf-jcardcal-jcard-06">https://tools.ietf.org/html/dra=
ft-ietf-jcardcal-jcard-06</a></span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Obviously it would need t=
o be signed but we don&#8217;t need to worry about that ..yet.
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">From 3261
</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">20.9 Call-Info</span><o:p=
></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; The Call-Inf=
o header field provides additional information about the</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; caller or ca=
llee, depending on whether it is found in a request or</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; response.&nb=
sp; The purpose of the URI is described by the &quot;purpose&quot;</span><o=
:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; parameter.&n=
bsp; The &quot;icon&quot; parameter designates an image suitable as an</spa=
n><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; iconic repre=
sentation of the caller or callee.&nbsp; The &quot;info&quot; parameter</sp=
an><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; describes th=
e caller or callee in general, for example, through a web</span><o:p></o:p>=
</p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; page.&nbsp; =
The &quot;card&quot; parameter provides a business card, for example, in</s=
pan><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; vCard [36] o=
r LDIF [37] formats.&nbsp; Additional tokens can be registered</span><o:p><=
/o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; using IANA a=
nd the procedures in Section 27.</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Use of the C=
all-Info header field can pose a security risk.&nbsp; If a</span><o:p></o:p=
></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; callee fetch=
es the URIs provided by a malicious caller, the callee</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; may be at ri=
sk for displaying inappropriate or offensive content,</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; dangerous or=
 illegal content, and so on.&nbsp; Therefore, it is</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; RECOMMENDED =
that a UA only render the information in the Call-Info</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; header field=
 if it can verify the authenticity of the element that</span><o:p></o:p></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; originated t=
he header field and trusts that element.&nbsp; This need not</span><o:p></o=
:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into requests.</span><o:p></o:p></=
p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Example:</sp=
an><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Call-Info: &=
lt;<a href=3D"http://wwww.example.com/alice/photo.jpg">http://wwww.example.=
com/alice/photo.jpg</a>&gt; ;purpose=3Dicon,</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;<a href=3D"http://www.example.com/alice/">http://www.example.com/alice/=
</a>&gt; ;purpose=3Dinfo</span><o:p></o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-=
size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"> Brian =
Rosen [<a href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]
<br>
<b>Sent:</b> Wednesday, November 06, 2013 3:41 PM<br>
<b>To:</b> Richard Shockey<br>
<b>Cc:</b> Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; <a href=3D=
"mailto:stir@ietf.org">
stir@ietf.org</a> List<br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt</span><o:p></=
o:p></p>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
<p class=3D"MsoNormal">We&#8217;ve considered adding some information that =
is not number and is not name, but is something like &#8220;bank&#8221;, wh=
ich might have some sort of validation behind it.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Is that along the lines you were thinking?<o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; wrote:<o:p></o=
:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree with Pierce here =
and respectfully disagree that STIR might eliminate the need for other form=
s of caller identification.&nbsp; Though your use case of credit
 card validation is a useful one and you are right there are still applicat=
ions that use SS7 for things that have nothing to do with call setup. I agr=
ee with you STIR may have more applications beyond the obvious ones of real=
time session validation.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s been my experi=
ence recently that there is a use case for something MORE in the identifica=
tion of the session as it is presented to the called party. This
 is the CNAM &#43; idea we are kicking around on the CNIT list.</span><o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">_________________________=
______________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">cnit mailing list</span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"mailto:cnit@ie=
tf.org"><span style=3D"color:#954F72">cnit@ietf.org</span></a></span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://www.ie=
tf.org/mailman/listinfo/cnit"><span style=3D"color:#954F72">https://www.iet=
f.org/mailman/listinfo/cnit</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">But your use case of a ba=
nk wanting to make sure they could properly identify themselves to the cons=
umer before establishing a conversation is exactly what
 this process is about.&nbsp; STIR is essential but it&#8217;s a multi-face=
ted problem that may require multi-faceted solutions.. and enhanced CNAM &#=
43; being only one of them.&nbsp;&nbsp; Its not unreasonable to discuss tho=
se.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The obviously analogy is =
I would want to see some real identification of a utility worker before I l=
et them into my house to make repairs. &nbsp;I would want some
 validation that the call to me to reconfirm the appointments was in fact f=
rom the utility in question.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=3D"=
mailto:stir-bounces@ietf.org">stir-bounces@ietf.org</a>
 [<a href=3D"mailto:stir-bounces@ietf.org">mailto:stir-bounces@ietf.org</a>=
]<span class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span cl=
ass=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho (fmousinh)=
<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Tuesday, Nov=
ember 05, 2013 6:26 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce=
 A [NTK]; <a href=3D"mailto:stir@ietf.org">
stir@ietf.org</a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Let me rephrase it&#8230; it may elimin=
ate the need for other forms of caller identification beyond what STIR will=
 provide, depending on the specific use case. For example, a credit
 card company may choose to rely entirely on STIR before allowing a card to=
 be unblocked by an IVR (and as I said earlier, many companies do it today)=
. In other use cases, the TN alone is not sufficient information &#8211; my=
 health care provider will want to know
 which member of the family is calling.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I agree that ANI is already broadly use=
d to improve customer service today. However, it is not usually deemed as a=
 secure enough mechanism to validate the caller (therefore
 this WG!), except if you are a large organization that can leverage things=
 like SS7. STIR would make this type of validation available to a broader n=
umber of companies.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Going on a tangent&#8230; perhaps this =
is out of scope, but there is not a lot of discussion about called party hi=
jacking. Couldn&#8217;t a man-in-the-middle try to answer calls on my
 behalf? If my bank is calling me, I want to make sure it&#8217;s really th=
em before carrying a conversation, but wouldn&#8217;t they want the same?&n=
bsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">&lt;Gorman&gt;, &quot;Pierce A =
[NTK]&quot; &lt;<a href=3D"mailto:Pierce.Gorman@sprint.com"><span style=3D"=
color:#954F72">Pierce.Gorman@sprint.com</span></a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Nov=
ember 5, 2013 at 6:05 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousi=
nho &lt;<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"color:#954F72"=
>fmousinh@cisco.com</span></a>&gt;, &quot;<a href=3D"mailto:stir@ietf.org">=
<span style=3D"color:#954F72">stir@ietf.org</span></a>&quot; &lt;<a href=3D=
"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></=
a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I agree with your character=
ization of businesses as victim of caller ID fraud however contact centers =
also use TN as a key to improve information available to
 call agents to reduce average time-per-call and increase capacity of the c=
all center.&nbsp; So I don&#8217;t agree that STIR would &#8220;eliminate t=
he need for caller identification from known TNs.&#8221;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">But perhaps I misunderstood=
 your last sentence?</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Fernando
 Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"=
color:#954F72">mailto:fmousinh@cisco.com</span></a>]<span class=3D"apple-co=
nverted-space">&nbsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 05,=
 2013 4:34 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></a><b=
r>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I would suggest we add a new attack typ=
e to section 3. More and more companies are using the caller ID for account=
 validation. For example, if I call my credit card provider
 from my office number, they ask me for identification. If I call from my h=
ome phone number, I&#8217;m informed that I don&#8217;t need to provide any=
 further identification because my number is on file. Some (all?) companies=
 that implement this type of validation rely
 on SS7 today.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Ultimately, this is yet another variati=
on of impersonation &#8211; but in this case, the &#8220;victim&#8221; is a=
 business, unlike the other two scenarios we&#8217;ve listed so far.</span>=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Addressing this scenario would actually=
 turn STIR into a feature, given it would enable contact centers of all siz=
es to eliminate the need for caller identification from
 known TNs.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">Alex Bobotek &lt;<a href=3D"mai=
lto:alex@bobotek.net"><span style=3D"color:#954F72">alex@bobotek.net</span>=
</a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Oct=
ober 1, 2013 at 12:51 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &l=
t;<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:#954F72">br@bri=
anrosen.net</span></a>&gt;, &quot;Peterson, Jon&quot; &lt;<a href=3D"mailto=
:jon.peterson@neustar.biz"><span style=3D"color:#954F72">jon.peterson@neust=
ar.biz</span></a>&gt;<br>
<b>Cc:<span class=3D"apple-converted-space">&nbsp;</span></b>&quot;<a href=
=3D"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span=
></a>&quot; &lt;<a href=3D"mailto:stir@ietf.org"><span style=3D"color:#954F=
72">stir@ietf.org</span></a>&gt;, Richard Shockey &lt;<a href=3D"mailto:ric=
hard@shockey.us"><span style=3D"color:#954F72">richard@shockey.us</span></a=
>&gt;,
 &quot;'DOLLY, MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D"color:#954F72">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;=
<a href=3D"mailto:rjsparks@nostrum.com"><span style=3D"color:#954F72">rjspa=
rks@nostrum.com</span></a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Jon,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Thanks for the response.&nbsp; The inte=
ntion in #1 below is to clarify the following sentence:</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">The<span class=3D"apple-converted-space=
">&nbsp;</span><b>primary</b><span class=3D"apple-converted-space">&nbsp;</=
span>attack vector is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; therefore one where the at=
tacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number in signaling to be =
a particular chosen number, one that the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; attacker does not have the=
 authority to call from,<span class=3D"apple-converted-space">&nbsp;</span>=
<b>in order for that</b></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number to be rendered o=
n the terminating side</span></b><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;">.&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">This might be misconstrued as indicatin=
g that the objective of spoofing is simply the rendering of a spoofed numbe=
r on the receiving display, causing mistaken conclusions
 that defenses might be limited to securing the rendered information. &nbsp=
;No issues with leaving this as it&#8217;s a valid point.&nbsp; Another (in=
creasing) motivation is to evade network and/or endpoint defenses that may =
block based on CPN.&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">So however it&#8217;s worded, I think i=
t&#8217;s important to allow for both attack objectives of a spoofed presen=
tation at the endpoint and in transit.&nbsp; &nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Regards,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Alex</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; -----Original Message-----</span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; From:<span class=3D"apple-converte=
d-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"><span style=
=3D"color:#954F72">stir-bounces@ietf.org</span></a><span class=3D"apple-con=
verted-space">&nbsp;</span>[<a href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf Of</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian Rosen</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Sent: Tuesday, October 01, 2013 9:=
29 AM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; To: Peterson, Jon</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Cc:<span class=3D"apple-converted-=
space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:#=
954F72">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY,
 MARTIN C'; Richard</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Shockey</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Subject: Re: [stir] draft-peterson=
-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Don't think there is much MESSAGE.=
&nbsp; MSRP is about all we see, and XMPP is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; more likely than that.</span><o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; On Oct 1, 2013, at 12:24 PM, &quot=
;Peterson, Jon&quot; &lt;<a href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D"color:windowtext;text-decoration:none">jon.peterson@neustar.biz</s=
pan></a>&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; wrote:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Thanks for these notes, Alex.=
 Some responses below.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here are several comments=
 that should feed into the IETF Peterson draft:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Remove any =
assumptions that the solution cannot be in-network</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; [IMO,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; both endpoint and in-netw=
ork solutions should be facilitated]</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Agreed that both in-band and =
out-of-band solutions can usually be</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; implemented in either endpoin=
ts or in intermediaries of various kinds.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; If I see text that implies ot=
herwise, I'll certainly change it.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessi=
onless attack scenario.&nbsp; A spam payload may be carried in</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; a</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; SIP INVITE or MESSAGE, wh=
ich might contain stock market advice even</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; in a display name field.&=
nbsp; These attacks do NOT require session</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; establishment.</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; More generally, we should=
 be mindful of the fact that SIP is used in</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; telephony form more than =
voice session setup.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Probably if we were going to =
include a sessionless attack scenario, it</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; would be with regular text me=
ssages (whether carried on the PSTN over</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; TCAP or with some Internet pr=
otocol, including MESSAGE) rather than</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; with an INVITE, which typical=
ly wouldn't result in a payload being</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; immediately rendered to a use=
r. More on this below with your suggested</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; text.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here's some suggested mar=
kup:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 1.&nbsp;&nbsp;&nbsp; Repl=
ace 2nd sentence of 2nd paragraph of 1.0 Introduction with:</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; The primary attack vector=
 is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; therefore one where=
 the attacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; number in signaling to be=
 a particular chosen number that the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; attacker does not have th=
e authority to call from.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; What you want here is to remo=
ve the implication that the number will</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; be rendered on the terminatin=
g side? While there are some attacks</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; where that isn't significant,=
 perhaps, I would say it is significant</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; in the primary attack vectors=
 that concern us.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 2.&nbsp; Replace 3rd para=
graph of 2.1 Endpoints with:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; S=
mart devices are generally based on computers with some degree</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; of programmability, the c=
apacity to access the Internet, and</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; capabilities of rendering=
 text, audio and/or images.&nbsp; This includes</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; smart phones, telephone a=
pplications on desktop and laptop computers,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; IP private branch exchang=
es, and so on.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; I can add the notion that sma=
rt devices can render text, audio and/or</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; images as you suggest.</span>=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attac=
k Scenarios:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; Impersonation, IP-Mobile Text Message</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; &nbsp;An attacker with an computer sends a high volume of SIP MESSAGE=
</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; spam message to IP-enable=
d smart phones using randomized calling</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; party numbers.</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&=
nbsp; Countermeasure: in-band authenticated identity</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Provided we're talking about =
end-to-end SIP use of MESSAGE, agreed</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; that in-band would be the rig=
ht countermeasure. I am curious though</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; whether practically speaking =
there is enough use of MESSAGE in this</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; fashion that we're actually s=
eeing high-volume spam over MESSAGE</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; today. Either way, no problem=
 having an attack scenario of this form in the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; document.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Jon Peterson</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Neustar, Inc.</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Regards,</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Alex</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of Richard Shockey</s=
pan><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 1:11 PM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: 'DOLLY, MARTIN C'=
; 'Robert Sparks'</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of DOLLY, MARTIN C</s=
pan><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 12:58 PM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: Robert Sparks</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Yes, ok</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Martin Dolly</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Lead Member of Techni=
cal Staff</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Core Network &amp; Go=
v't/Regulatory Standards AT&amp;T Labs - Network</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Technology</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1-609-903-3360</=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:md3135@att.com"><span style=
=3D"color:windowtext;text-decoration:none">md3135@att.com</span></a></span>=
<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, =
at 12:47 PM, &quot;Robert Sparks&quot;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; &lt;<a href=3D"ma=
ilto:rjsparks@nostrum.com"><span style=3D"color:windowtext;text-decoration:=
none">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; wrote:</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:=
42 PM, DOLLY, MARTIN C wrote:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; With Hadriel =
comments incorporated, it is a start</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Hi Martin -</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Just to make sure=
 - I think you're referring to Hadriel's comments</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; on the</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; problem statement doc=
ument?</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; I don't think Had=
riel's commented directly on stir-threats yet.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; In any case, we _=
are_ talking about a starting place, not a</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; finished</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; product.</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; If there's no oth=
er objection, I'd like to get Jon to submit the</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; threats</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document as a WG -00 =
as soon as it's convenient.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; RjS</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original=
 Message-----</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span cl=
ass=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@i=
etf.org"><span style=3D"color:windowtext;text-decoration:none">stir-bounces=
@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-=
decoration:none">mailto:stir-bounces@ietf.org</span></a>]
 On</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Behalf Of Rus=
s Housley</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Sent: Thursda=
y, September 26, 2013 4:37 PM</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; To: IETF STIR=
 Mail List</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Subject: Re: =
[stir] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; It has been s=
ix days, I'd like to hear from more people about this</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document.&nbsp; Marti=
n asked for an additional week, so I'm sure we will</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; hear from him soon.</=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Russ</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20=
, 2013, at 5:23 PM, Russ Housley wrote:</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span clas=
s=3D"apple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id/=
draft-peterson-stir-threats-00.txt"><span style=3D"color:windowtext;text-de=
coration:none">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</s=
pan></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should th=
e working group adopt this I-D as the starting point for</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; the</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; STIR threat docuent?<=
/span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Russ</spa=
n><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; _____________=
__________________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span=
 style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></=
span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailma=
n/listinfo/stir"><span style=3D"color:windowtext;text-decoration:none">http=
s://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; _________________=
______________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; stir mailing list=
</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/li=
stinfo/stir"><span style=3D"color:windowtext;text-decoration:none">https://=
www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; _________________________=
______________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; stir mailing list</span><=
o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"co=
lor:windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/s=
tir"><span style=3D"color:windowtext;text-decoration:none">https://www.ietf=
.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; _____________________________=
__________________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; stir mailing list</span><o:p>=
</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:=
windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"=
><span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org=
/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; __________________________________=
_____________</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; stir mailing list</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:windo=
wtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"><spa=
n style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">
<hr size=3D"3" width=3D"100%" align=3D"center">
</span></div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;">______________________________________=
_________<br>
stir mailing list<br>
<a href=3D"mailto:stir@ietf.org">stir@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/stir">https://www.ietf.org=
/mailman/listinfo/stir</a></span><o:p></o:p></p>
</blockquote>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center">
<hr size=3D"2" width=3D"100%" align=3D"center">
</div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</body>
</html>

--_000_E6A16181E5FD2F46B962315BB05962D01FC238EEp2pxmb13fccnetw_--

From br@brianrosen.net  Thu Nov  7 09:03:44 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8441921E81ED for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:03:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level: 
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 3QBoUnNGEeZt for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:03:40 -0800 (PST)
Received: from mail-bk0-f41.google.com (mail-bk0-f41.google.com [209.85.214.41]) by ietfa.amsl.com (Postfix) with ESMTP id C608121E81D1 for <cnit@ietf.org>; Thu,  7 Nov 2013 09:03:33 -0800 (PST)
Received: by mail-bk0-f41.google.com with SMTP id na10so414679bkb.0 for <cnit@ietf.org>; Thu, 07 Nov 2013 09:03:32 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=xWxicylaqmEADPx0YtR3rsytnyhoEa4/BE1Xf6EluJ8=; b=OWydjC2EXyHwg7vVBRMmHZjoFY+Yd0Wngza1WST44mZxQexVFB+lDa7XKyAhBQd/0n mEOZnF/Vjag7U5KmsAaTTKbAFOnNKu3k4PCKL5XYIghYFBaELZjrOp7Y6hEg2gorAa1k Sno6cMumQexhCbv1iePt9cYwsso/abTrk5s99fdBL+jI1ES17Ejm+6wYc3kG3qIATH0S mmVbSSNxbte/a/93LYk4rGJndkmUp6EB/fTQYQPNVhLBuwJFvp8a3s0lmRVaovvu+2QY z3wOuskeKlgqifHm4E213tSozQD0LXNML+JLnkgUp3HNmJuUZnM9WrIUn5g47oIPOjOE iCCA==
X-Gm-Message-State: ALoCoQmiawM+12zx+sXhWumFXly2awB1Czq0YLHe2+iLczhpqxrhtgNketTRp4MaSo33P84WojmV
X-Received: by 10.204.170.72 with SMTP id c8mr14760bkz.168.1383843812679; Thu, 07 Nov 2013 09:03:32 -0800 (PST)
Received: from wireless-a-v6.meeting.ietf.org ([2001:67c:370:176:9d97:144b:5e61:753]) by mx.google.com with ESMTPSA id b7sm3004958bkg.1.2013.11.07.09.03.26 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 07 Nov 2013 09:03:31 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_002AC86A-B46F-4492-AFD3-8423E16D53ED"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov>
Date: Thu, 7 Nov 2013 09:03:22 -0800
Message-Id: <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov>
To: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
X-Mailer: Apple Mail (2.1816)
Cc: "cnit@ietf.org" <cnit@ietf.org>, Richard Shockey <richard@shockey.us>, "stir@ietf.org" <stir@ietf.org>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, Michael Hammer <michael.hammer@yaanatech.com>, "fmousinh@cisco.com" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:03:44 -0000

--Apple-Mail=_002AC86A-B46F-4492-AFD3-8423E16D53ED
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Right.  I believe we can do this pretty easily.  We probably could have =
a 100 categories that would have similar authorities, and there are =
classifications maintained by folks like Dun Bradstreet that can go even =
farther.

What I think would be substantially harder is to validate an entire =
V/X/J card.  How is a validator to know your nickname is Fluffy?  Name, =
phone number and, if a business, a classification, yes, we can do that.  =
Content of a business card - very hard.

Brian


On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne =
<Henning.Schulzrinne@fcc.gov> wrote:

> Yes, that=92s a problem, but as long as the number of categories is =
small, you can build UIs that only render information that=92s =
appropriate to the declaration. For practical reasons, I think the =
number of useful categories is likely going to be fairly limited:
> -          Financial institution (FDIC and a few others)
> -          Health care (each health care facility has a gov=92t =
number)
> -          Charity (501c3, state registered)
> -          Contractor (state-licensed)
> -          Public safety organization (police, fire)
> -          Lawyer (bar association)
> -          Local, state and federal government (.gov in the US)
> =20
> I suspect that list encompasses a large fraction of the fraudulent =
(impersonation) calls. For all of the above, at least within a country, =
it=92s pretty clear who can attest to the membership. Yes, this requires =
some UI work or some server logic, but these categories and the =
organizations don=92t change all that often =96 in most cases, the =
certifying entities have probably been the same for the past 50+ years. =
I=92m not as worried about figuring out whether the beautician, =
mortician or florist is licensed and properly identified, although I=92m =
sure we can all come up with potential fraud stories.
> =20
> From: Michael Hammer [mailto:michael.hammer@yaanatech.com]=20
> Sent: Thursday, November 07, 2013 10:28 AM
> To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net; =
richard@shockey.us
> Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
> Subject: RE: [stir] draft-peterson-stir-threats-00.txt
> =20
> So, would you trust a certificate from the City of Reston, Virginia =
police department?
> =20
> (Hint:  you can find Reston on a map, but there is no City of Reston.=20=

>   The only police are Fairfax County.)
> =20
> My concern is that one you dilute or disperse authority, it becomes a =
free-for-all again, and anybody=92s guess.
> =20
> Mike
> =20
> =20
> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of Henning Schulzrinne
> Sent: Thursday, November 07, 2013 10:00 AM
> To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
> Cc: stir@ietf.org List; Fernando Mousinho (fmousinh); cnit@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> As a thought experiment, Kumiko Ono and I had published a draft
> =20
> http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00
> =20
> to allow third parties to validate property information. If the =
validating party (e.g., a bank regulator) is willing to sign a =
certificate, similar in spirit to the framed gold-leaf diplomas in your =
dentist=92s office or, more lowly, to the health departments rating in a =
restaurant window, and it can be tied to a phone number, this shouldn=92t =
be too hard.
> =20
> It=92s a bit harder if the certifying authority (regulator, Realtor =
board, local bar association, =85) is not involved.
> =20
> Henning
> =20
> From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf =
Of Gorman, Pierce A [NTK]
> Sent: Thursday, November 07, 2013 9:54 AM
> To: Brian Rosen; Richard Shockey
> Cc: stir@ietf.org List; cnit@ietf.org; Fernando Mousinho (fmousinh)
> Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
> =20
> I=92ll admit I am not familiar with v/x/jcard encoding differences or =
the implications of their use so I=92ll encourage educating me if it =
isn=92t too onerous.
> =20
> I=92m not sure what is the concern with a 3rd party providing =
=93validation=94 though.  There are numerous examples of 3rd parties =
providing validation of information including NASDAQ, NYSE, Barron=92s, =
Moody=92s, and the federal reserve banking system to name a few.
> =20
> Pierce
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: November 06, 2013 11:59 PM
> To: Richard Shockey
> Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; =
stir@ietf.org List; cnit@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> I think this would be a heavy lift.
> =20
> If the responsible entity was a carrier, then it would have to =
validate the data, which it has very little basis to validate.  It could =
get a 3rd party to do the validation, but then it=92s putting its =
reputation on the back of some hired hand validator.
> =20
> If the responsibility is the end user/device, then the signature has =
no value.
> =20
> I do not argue that Call-Info is suitable,  it is.
> =20
> I do question JCARD vs xCard, but that=92s an encoding detail.  All of =
SIP Is XML described by schema, not json.
> =20
> Brian
> =20
> On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us> =
wrote:
> =20
>=20
> URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity.  The carrier =
could provision this for their mobile or hosted customers.  Enterprises =
could do this themselves.  This also has advantages in Enterprise to =
Enterprise UC as well where the data is derived from the Enterprise =
=93directory=94 and could facilitate end to end PPX to PBX =
communications especially in point to point video communications.
> =20
> There are certainly privacy and security issues to be addressed.  The =
Push vs Pull model.  This really would be PII in the clear but then its =
done voluntarily.
> =20
> There would have to be some work around restructuring the Header and =
adding some parameters but it=92s underutilized right now and this Use =
Case is a perfectly appropriate use.
> =20
> https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06
> =20
> Obviously it would need to be signed but we don=92t need to worry =
about that ..yet.
> =20
> =46rom 3261
> =20
> 20.9 Call-Info
> =20
>    The Call-Info header field provides additional information about =
the
>    caller or callee, depending on whether it is found in a request or
>    response.  The purpose of the URI is described by the "purpose"
>    parameter.  The "icon" parameter designates an image suitable as an
>    iconic representation of the caller or callee.  The "info" =
parameter
>    describes the caller or callee in general, for example, through a =
web
>    page.  The "card" parameter provides a business card, for example, =
in
>    vCard [36] or LDIF [37] formats.  Additional tokens can be =
registered
>    using IANA and the procedures in Section 27.
> =20
>    Use of the Call-Info header field can pose a security risk.  If a
>    callee fetches the URIs provided by a malicious caller, the callee
>    may be at risk for displaying inappropriate or offensive content,
>    dangerous or illegal content, and so on.  Therefore, it is
>    RECOMMENDED that a UA only render the information in the Call-Info
>    header field if it can verify the authenticity of the element that
>    originated the header field and trusts that element.  This need not
>    be the peer UA; a proxy can insert this header field into requests.
> =20
>    Example:
> =20
>    Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,=

>      <http://www.example.com/alice/> ;purpose=3Dinfo
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: Wednesday, November 06, 2013 3:41 PM
> To: Richard Shockey
> Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; =
stir@ietf.org List
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> We=92ve considered adding some information that is not number and is =
not name, but is something like =93bank=94, which might have some sort =
of validation behind it.
> =20
> Is that along the lines you were thinking?
> =20
> Brian
> On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us> =
wrote:
> =20
>=20
> I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.  Though =
your use case of credit card validation is a useful one and you are =
right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session validation.
> =20
> It=92s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.
> =20
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit
> =20
> But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.  STIR is essential but it=92s a =
multi-faceted problem that may require multi-faceted solutions.. and =
enhanced CNAM + being only one of them.   Its not unreasonable to =
discuss those.
> =20
> The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs.  I =
would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in question.
> =20
> =20
> =20
> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of Fernando Mousinho (fmousinh)
> Sent: Tuesday, November 05, 2013 6:26 PM
> To: Gorman, Pierce A [NTK]; stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Let me rephrase it=85 it may eliminate the need for other forms of =
caller identification beyond what STIR will provide, depending on the =
specific use case. For example, a credit card company may choose to rely =
entirely on STIR before allowing a card to be unblocked by an IVR (and =
as I said earlier, many companies do it today). In other use cases, the =
TN alone is not sufficient information =96 my health care provider will =
want to know which member of the family is calling.
> =20
> I agree that ANI is already broadly used to improve customer service =
today. However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of companies.
> =20
> =20
> Going on a tangent=85 perhaps this is out of scope, but there is not a =
lot of discussion about called party hijacking. Couldn=92t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it=92s really them before carrying a =
conversation, but wouldn=92t they want the same?=20
> =20
> =20
> From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com>
> Date: Tuesday, November 5, 2013 at 6:05 PM
> To: Fernando Mousinho <fmousinh@cisco.com>, "stir@ietf.org" =
<stir@ietf.org>
> Subject: RE: [stir] draft-peterson-stir-threats-00.txt
> =20
> I agree with your characterization of businesses as victim of caller =
ID fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.  So I don=92t agree that STIR =
would =93eliminate the need for caller identification from known TNs.=94
> =20
> But perhaps I misunderstood your last sentence?
> =20
> =20
> From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]=20
> Sent: November 05, 2013 4:34 PM
> To: stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> I would suggest we add a new attack type to section 3. More and more =
companies are using the caller ID for account validation. For example, =
if I call my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I=92m informed that =
I don=92t need to provide any further identification because my number =
is on file. Some (all?) companies that implement this type of validation =
rely on SS7 today.
> =20
> Ultimately, this is yet another variation of impersonation =96 but in =
this case, the =93victim=94 is a business, unlike the other two =
scenarios we=92ve listed so far.
> =20
> Addressing this scenario would actually turn STIR into a feature, =
given it would enable contact centers of all sizes to eliminate the need =
for caller identification from known TNs.
> =20
> =20
> =20
> From: Alex Bobotek <alex@bobotek.net>
> Date: Tuesday, October 1, 2013 at 12:51 PM
> To: Brian Rosen <br@brianrosen.net>, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> Cc: "stir@ietf.org" <stir@ietf.org>, Richard Shockey =
<richard@shockey.us>, "'DOLLY, MARTIN C'" <md3135@att.com>, 'Robert =
Sparks' <rjsparks@nostrum.com>
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Jon,
> =20
> Thanks for the response.  The intention in #1 below is to clarify the =
following sentence:
> =20
> The primary attack vector is
>    therefore one where the attacker contrives for the calling =
telephone
>    number in signaling to be a particular chosen number, one that the
>    attacker does not have the authority to call from, in order for =
that
>    number to be rendered on the terminating side.=20
> =20
> This might be misconstrued as indicating that the objective of =
spoofing is simply the rendering of a spoofed number on the receiving =
display, causing mistaken conclusions that defenses might be limited to =
securing the rendered information.  No issues with leaving this as it=92s =
a valid point.  Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on CPN.=20
> =20
> So however it=92s worded, I think it=92s important to allow for both =
attack objectives of a spoofed presentation at the endpoint and in =
transit.  =20
> =20
> Regards,
> =20
> Alex
> =20
> > -----Original Message-----
> > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of
> > Brian Rosen
> > Sent: Tuesday, October 01, 2013 9:29 AM
> > To: Peterson, Jon
> > Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; 'DOLLY, MARTIN C'; =
Richard
> > Shockey
> > Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >=20
> > Don't think there is much MESSAGE.  MSRP is about all we see, and =
XMPP is
> > more likely than that.
> >=20
> > Brian
> >=20
> > On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> > wrote:
> >=20
> > > Thanks for these notes, Alex. Some responses below.
> > >
> > >> Here are several comments that should feed into the IETF Peterson =
draft:
> > >>
> > >> *   Remove any assumptions that the solution cannot be in-network
> > [IMO,
> > >> both endpoint and in-network solutions should be facilitated]
> > >
> > > Agreed that both in-band and out-of-band solutions can usually be
> > > implemented in either endpoints or in intermediaries of various =
kinds.
> > > If I see text that implies otherwise, I'll certainly change it.
> > >
> > >> *   Add a sessionless attack scenario.  A spam payload may be =
carried in
> > a
> > >> SIP INVITE or MESSAGE, which might contain stock market advice =
even
> > >> in a display name field.  These attacks do NOT require session
> > establishment.
> > >> More generally, we should be mindful of the fact that SIP is used =
in
> > >> telephony form more than voice session setup.
> > >
> > > Probably if we were going to include a sessionless attack =
scenario, it
> > > would be with regular text messages (whether carried on the PSTN =
over
> > > TCAP or with some Internet protocol, including MESSAGE) rather =
than
> > > with an INVITE, which typically wouldn't result in a payload being
> > > immediately rendered to a user. More on this below with your =
suggested
> > text.
> > >
> > >> Here's some suggested markup:
> > >>
> > >>
> > >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction =
with:
> > >>
> > >> The primary attack vector is
> > >>  therefore one where the attacker contrives for the calling =
telephone
> > >> number in signaling to be a particular chosen number that the
> > >> attacker does not have the authority to call from.
> > >
> > > What you want here is to remove the implication that the number =
will
> > > be rendered on the terminating side? While there are some attacks
> > > where that isn't significant, perhaps, I would say it is =
significant
> > > in the primary attack vectors that concern us.
> > >
> > >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> > >>
> > >>     Smart devices are generally based on computers with some =
degree
> > >> of programmability, the capacity to access the Internet, and
> > >> capabilities of rendering text, audio and/or images.  This =
includes
> > >> smart phones, telephone applications on desktop and laptop =
computers,
> > >> IP private branch exchanges, and so on.
> > >
> > > I can add the notion that smart devices can render text, audio =
and/or
> > > images as you suggest.
> > >
> > >> 3.  Add to 3.3 Attack Scenarios:
> > >>
> > >>       Impersonation, IP-Mobile Text Message
> > >>
> > >>        An attacker with an computer sends a high volume of SIP =
MESSAGE
> > >> spam message to IP-enabled smart phones using randomized calling
> > >> party numbers.
> > >>
> > >>       Countermeasure: in-band authenticated identity
> > >
> > > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > > that in-band would be the right countermeasure. I am curious =
though
> > > whether practically speaking there is enough use of MESSAGE in =
this
> > > fashion that we're actually seeing high-volume spam over MESSAGE
> > > today. Either way, no problem having an attack scenario of this =
form in the
> > document.
> > >
> > > Jon Peterson
> > > Neustar, Inc.
> > >
> > >> Regards,
> > >>
> > >> Alex
> > >>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of Richard Shockey
> > >>> Sent: Monday, September 30, 2013 1:11 PM
> > >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> +1
> > >>>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of DOLLY, MARTIN C
> > >>> Sent: Monday, September 30, 2013 12:58 PM
> > >>> To: Robert Sparks
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> Yes, ok
> > >>>
> > >>> Martin Dolly
> > >>> Lead Member of Technical Staff
> > >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> > >>> Technology
> > >>> +1-609-903-3360
> > >>> md3135@att.com
> > >>>
> > >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> > >>>> <rjsparks@nostrum.com>
> > >>> wrote:
> > >>>>
> > >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> > >>>>> With Hadriel comments incorporated, it is a start
> > >>>> Hi Martin -
> > >>>>
> > >>>> Just to make sure - I think you're referring to Hadriel's =
comments
> > >>>> on the
> > >>> problem statement document?
> > >>>> I don't think Hadriel's commented directly on stir-threats yet.
> > >>>>
> > >>>> In any case, we _are_ talking about a starting place, not a
> > >>>> finished
> > >>> product.
> > >>>>
> > >>>> If there's no other objection, I'd like to get Jon to submit =
the
> > >>>> threats
> > >>> document as a WG -00 as soon as it's convenient.
> > >>>>
> > >>>> RjS
> > >>>>>
> > >>>>> -----Original Message-----
> > >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On
> > >>>>> Behalf Of Russ Housley
> > >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> > >>>>> To: IETF STIR Mail List
> > >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>>>
> > >>>>> It has been six days, I'd like to hear from more people about =
this
> > >>> document.  Martin asked for an additional week, so I'm sure we =
will
> > >>> hear from him soon.
> > >>>>>
> > >>>>> Russ
> > >>>>>
> > >>>>>
> > >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> > >>>>>>
> > >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> > >>>>>>
> > >>>>>> Should the working group adopt this I-D as the starting point =
for
> > >>>>>> the
> > >>> STIR threat docuent?
> > >>>>>>
> > >>>>>> Russ
> > >>>>> _______________________________________________
> > >>>>> stir mailing list
> > >>>>> stir@ietf.org
> > >>>>> https://www.ietf.org/mailman/listinfo/stir
> > >>>>
> > >>>> _______________________________________________
> > >>>> stir mailing list
> > >>>> stir@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/stir
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >>>
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >> _______________________________________________
> > >> stir mailing list
> > >> stir@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/stir
> > >
> > > _______________________________________________
> > > stir mailing list
> > > stir@ietf.org
> > > https://www.ietf.org/mailman/listinfo/stir
> >=20
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org
> > https://www.ietf.org/mailman/listinfo/stir
> =20
>=20
> This e-mail may contain Sprint proprietary information intended for =
the sole use of the recipient(s). Any use by others is prohibited. If =
you are not the intended recipient, please contact the sender and delete =
all copies of the message.
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir
> =20
> =20
> =20
>=20
> This e-mail may contain Sprint proprietary information intended for =
the sole use of the recipient(s). Any use by others is prohibited. If =
you are not the intended recipient, please contact the sender and delete =
all copies of the message.


--Apple-Mail=_002AC86A-B46F-4492-AFD3-8423E16D53ED
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">Right. =
&nbsp;I believe we can do this pretty easily. &nbsp;We probably could =
have a 100 categories that would have similar authorities, and there are =
classifications maintained by folks like Dun Bradstreet that can go even =
farther.<div><br></div><div>What I think would be substantially harder =
is to validate an entire V/X/J card. &nbsp;How is a validator to know =
your nickname is Fluffy? &nbsp;Name, phone number and, if a business, a =
classification, yes, we can do that. &nbsp;Content of a business card - =
very =
hard.</div><div><br></div><div>Brian</div><div><br></div><div><br><div><di=
v>On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne &lt;<a =
href=3D"mailto:Henning.Schulzrinne@fcc.gov">Henning.Schulzrinne@fcc.gov</a=
>&gt; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Yes, that=92s a problem, but as long as the number of =
categories is small, you can build UIs that only render information =
that=92s appropriate to the declaration. For practical reasons, I think =
the number of useful categories is likely going to be fairly =
limited:<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><span>-<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Financial institution (FDIC and a few =
others)<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><span>-<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Health care (each health care facility has a gov=92t =
number)<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><span>-<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Charity (501c3, state =
registered)<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><span>-<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Contractor =
(state-licensed)<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt 0.5in; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><span>-<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Public safety organization (police, =
fire)<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt =
0.5in; font-size: 12pt; font-family: 'Times New Roman', serif; =
text-indent: -0.25in;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><span>-<span =
style=3D"font-style: normal; font-variant: normal; font-weight: normal; =
font-size: 7pt; line-height: normal; font-family: 'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Lawyer (bar association)<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt 0.5in; font-size: 12pt; font-family: =
'Times New Roman', serif; text-indent: -0.25in;"><span style=3D"font-size:=
 11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, =
125);"><span>-<span style=3D"font-style: normal; font-variant: normal; =
font-weight: normal; font-size: 7pt; line-height: normal; font-family: =
'Times New =
Roman';">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"Apple-converted-space">&nbsp;</span></span></span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Local, state and federal government (.gov in the =
US)<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">I suspect that list encompasses a large fraction of =
the fraudulent (impersonation) calls. For all of the above, at least =
within a country, it=92s pretty clear who can attest to the membership. =
Yes, this requires some UI work or some server logic, but these =
categories and the organizations don=92t change all that often =96 in =
most cases, the certifying entities have probably been the same for the =
past 50+ years. I=92m not as worried about figuring out whether the =
beautician, mortician or florist is licensed and properly identified, =
although I=92m sure we can all come up with potential fraud =
stories.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div><div style=3D"border-style: =
solid none none; border-top-color: rgb(181, 196, 223); border-top-width: =
1pt; padding: 3pt 0in 0in;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span>Michael Hammer [<a =
href=3D"mailto:michael.hammer@yaanatech.com">mailto:michael.hammer@yaanate=
ch.com</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
10:28 AM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Henning Schulzrinne; <a =
href=3D"mailto:Pierce.Gorman@sprint.com">Pierce.Gorman@sprint.com</a>; =
<a href=3D"mailto:br@brianrosen.net">br@brianrosen.net</a>; <a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a><br><b>Cc:</b><sp=
an class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a =
href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>RE: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">So, would you trust a certificate from the City of =
Reston, Virginia police department?<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">(Hint:&nbsp; you can find =
Reston on a map, but there is no City of =
Reston.&nbsp;<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp;The only police are Fairfax =
County.)<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">My concern is that one you dilute or disperse =
authority, it becomes a free-for-all again, and anybody=92s =
guess.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Mike<o:p></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span></div><div><div style=3D"border-style: solid none =
none; border-top-color: rgb(181, 196, 223); border-top-width: 1pt; =
padding: 3pt 0in 0in;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">stir-bounces@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">mailto:stir-bounces@ietf.org</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Henning =
Schulzrinne<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
10:00 AM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>'Gorman, Pierce A [NTK]'; =
Brian Rosen; Richard Shockey<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>List; Fernando Mousinho =
(fmousinh);<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">As a thought experiment, Kumiko Ono and I had =
published a draft<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);"><a =
href=3D"http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation=
-00" style=3D"color: purple; text-decoration: =
underline;">http://tools.ietf.org/html/draft-ono-dispatch-attribute-valida=
tion-00</a><o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">to allow third parties to validate property =
information. If the validating party (e.g., a bank regulator) is willing =
to sign a certificate, similar in spirit to the framed gold-leaf =
diplomas in your dentist=92s office or, more lowly, to the health =
departments rating in a restaurant window, and it can be tied to a phone =
number, this shouldn=92t be too hard.<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">It=92s a bit harder if =
the certifying authority (regulator, Realtor board, local bar =
association, =85) is not involved.<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">Henning<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div><div style=3D"border-style: =
solid none none; border-top-color: rgb(181, 196, 223); border-top-width: =
1pt; padding: 3pt 0in 0in;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">cnit-bounces@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:[mailto:cnit-bounces@ietf.org]" style=3D"color: purple; =
text-decoration: underline;">[mailto:cnit-bounces@ietf.org]</a><span =
class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Gorman, Pierce A =
[NTK]<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
9:54 AM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Brian Rosen; Richard =
Shockey<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a=
 href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>List;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;">cnit@ietf.org</a>; Fernando Mousinho =
(fmousinh)<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">I=92ll admit I am not familiar with v/x/jcard =
encoding differences or the implications of their use so I=92ll =
encourage educating me if it isn=92t too =
onerous.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">I=92m not sure what is the concern with a 3<sup>rd</sup><span =
class=3D"Apple-converted-space">&nbsp;</span>party providing =
=93validation=94 though.&nbsp; There are numerous examples of =
3<sup>rd</sup><span class=3D"Apple-converted-space">&nbsp;</span>parties =
providing validation of information including NASDAQ, NYSE, Barron=92s, =
Moody=92s, and the federal reserve banking system to name a =
few.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif;">Pierce</span><o:p></o:p></div></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">&nbsp;</span><o:p></o:p></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span>Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;">mailto:br@brianrosen.net</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>November 06, 2013 11:59 =
PM<br><b>To:</b><span class=3D"Apple-converted-space">&nbsp;</span>Richard=
 Shockey<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Fernando Mousinho =
(fmousinh); Gorman, Pierce A [NTK];<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>List;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I =
think this would be a heavy lift.<o:p></o:p></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">If the responsible entity was a carrier, then it =
would have to validate the data, which it has very little basis to =
validate. &nbsp;It could get a 3rd party to do the validation, but then =
it=92s putting its reputation on the back of some hired hand =
validator.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">If =
the responsibility is the end user/device, then the signature has no =
value.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I do =
not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I do =
question JCARD vs xCard, but that=92s an encoding detail. &nbsp;All of =
SIP Is XML described by schema, not =
json.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">Brian<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></div></div><p class=3D"MsoNormal" style=3D"margin: 0in =
0in 12pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></p><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">URI for a JCARD in the CALL INFO header provisioned =
by the calling party and ultimately signed by the responsible entity. =
&nbsp;The carrier could provision this for their mobile or hosted =
customers.&nbsp; Enterprises could do this themselves.&nbsp; This also =
has advantages in Enterprise to Enterprise UC as well where the data is =
derived from the Enterprise =93directory=94 and could facilitate end to =
end PPX to PBX communications especially in point to point video =
communications.</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">There are certainly privacy and =
security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp; =
This really would be PII in the clear but then its done =
voluntarily.</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">There would have to be some work =
around restructuring the Header and adding some parameters but it=92s =
underutilized right now and this Use Case is a perfectly appropriate =
use.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06" =
style=3D"color: purple; text-decoration: =
underline;">https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</a></=
span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Obviously it would need to be signed but we don=92t =
need to worry about that ..yet.</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">=46rom 3261</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">20.9 Call-Info</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; The Call-Info header field provides =
additional information about the</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; caller or =
callee, depending on whether it is found in a request =
or</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; response.&nbsp; The purpose of the URI =
is described by the "purpose"</span><o:p></o:p></div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; parameter.&nbsp; The =
"icon" parameter designates an image suitable as =
an</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; iconic representation of the caller or =
callee.&nbsp; The "info" parameter</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; describes =
the caller or callee in general, for example, through a =
web</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; page.&nbsp; The "card" parameter =
provides a business card, for example, in</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; vCard [36] =
or LDIF [37] formats.&nbsp; Additional tokens can be =
registered</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; Use of the Call-Info =
header field can pose a security risk.&nbsp; If =
a</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; callee fetches the URIs provided by a =
malicious caller, the callee</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; may be at risk for =
displaying inappropriate or offensive =
content,</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; dangerous or illegal content, and so =
on.&nbsp; Therefore, it is</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; RECOMMENDED that a UA =
only render the information in the Call-Info</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; header field =
if it can verify the authenticity of the element =
that</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; originated the header field and trusts =
that element.&nbsp; This need not</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into =
requests.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; =
Example:</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg" style=3D"color: purple; =
text-decoration: =
underline;">http://wwww.example.com/alice/photo.jpg</a>&gt; =
;purpose=3Dicon,</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/" style=3D"color: purple; =
text-decoration: underline;">http://www.example.com/alice/</a>&gt; =
;purpose=3Dinfo</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span>Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;">mailto:br@brianrosen.net</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Wednesday, November 06, =
2013 3:41 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Fernando Mousinho =
(fmousinh); Gorman, Pierce A [NTK];<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>List<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">We=92ve=
 considered adding some information that is not number and is not name, =
but is something like =93bank=94, which might have some sort of =
validation behind it.<o:p></o:p></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">Is =
that along the lines you were thinking?<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">Brian<o:p></o:p></div><div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></div></div><p class=3D"MsoNormal" style=3D"margin: 0in =
0in 12pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></p><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;"><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">I agree with Pierce here and respectfully disagree =
that STIR might eliminate the need for other forms of caller =
identification.&nbsp; Though your use case of credit card validation is =
a useful one and you are right there are still applications that use SS7 =
for things that have nothing to do with call setup. I agree with you =
STIR may have more applications beyond the obvious ones of realtime =
session validation.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">It=92s been my experience recently =
that there is a use case for something MORE in the identification of the =
session as it is presented to the called party. This is the CNAM + idea =
we are kicking around on the CNIT =
list.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">_______________________________________________</span><o:p></o:p></=
div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);">cnit mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);"><a href=3D"mailto:cnit@ietf.org" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">cnit@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"https://www.ietf.org/mailman/listinfo/cnit" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">https://www.ietf.org/mailman/listinfo/cnit</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">But your use case of a bank =
wanting to make sure they could properly identify themselves to the =
consumer before establishing a conversation is exactly what this process =
is about.&nbsp; STIR is essential but it=92s a multi-faceted problem =
that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.&nbsp;&nbsp; Its not unreasonable to discuss =
those.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">The obviously analogy is =
I would want to see some real identification of a utility worker before =
I let them into my house to make repairs. &nbsp;I would want some =
validation that the call to me to reconfirm the appointments was in fact =
from the utility in question.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;"><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">stir-bounces@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">mailto:stir-bounces@ietf.org</a>]<span =
class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce A =
[NTK];<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Let me rephrase it=85 it may eliminate the need =
for other forms of caller identification beyond what STIR will provide, =
depending on the specific use case. For example, a credit card company =
may choose to rely entirely on STIR before allowing a card to be =
unblocked by an IVR (and as I said earlier, many companies do it today). =
In other use cases, the TN alone is not sufficient information =96 my =
health care provider will want to know which member of the family is =
calling.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">I agree that ANI is already broadly used to =
improve customer service today. However, it is not usually deemed as a =
secure enough mechanism to validate the caller (therefore this WG!), =
except if you are a large organization that can leverage things like =
SS7. STIR would make this type of validation available to a broader =
number of companies.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Going on a tangent=85 perhaps this is out of =
scope, but there is not a lot of discussion about called party =
hijacking. Couldn=92t a man-in-the-middle try to answer calls on my =
behalf? If my bank is calling me, I want to make sure it=92s really them =
before carrying a conversation, but wouldn=92t they want the =
same?&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&lt;Gorman&gt;, "Pierce A [NTK]" &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, November 5, =
2013 at 6:05 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
&lt;<a href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">fmousinh@cisco.com</span></a>&gt;, "<a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>" &lt;<a href=3D"mailto:stir@ietf.org" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 rgb(149, 79, 114);">stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, 204);">I agree with your characterization =
of businesses as victim of caller ID fraud however contact centers also =
use TN as a key to improve information available to call agents to =
reduce average time-per-call and increase capacity of the call =
center.&nbsp; So I don=92t agree that STIR would =93eliminate the need =
for caller identification from known =
TNs.=94</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, =
204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;">Fernando Mousinho (fmousinh) [<a =
href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">mailto:fmousinh@cisco.com</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">I would suggest we add a new attack type to =
section 3. More and more companies are using the caller ID for account =
validation. For example, if I call my credit card provider from my =
office number, they ask me for identification. If I call from my home =
phone number, I=92m informed that I don=92t need to provide any further =
identification because my number is on file. Some (all?) companies that =
implement this type of validation rely on SS7 =
today.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Ultimately, this is yet another variation of =
impersonation =96 but in this case, the =93victim=94 is a business, =
unlike the other two scenarios we=92ve listed so =
far.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Addressing this scenario would actually turn STIR =
into a feature, given it would enable contact centers of all sizes to =
eliminate the need for caller identification from known =
TNs.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, October 1, =
2013 at 12:51 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">br@brianrosen.net</span></a>&gt;, "Peterson, Jon" &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:<span =
class=3D"apple-converted-space">&nbsp;</span></b>"<a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>" &lt;<a href=3D"mailto:stir@ietf.org" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 rgb(149, 79, 114);">stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">richard@shockey.us</span></a>&gt;, "'DOLLY, MARTIN C'" &lt;<a =
href=3D"mailto:md3135@att.com" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;<a =
href=3D"mailto:rjsparks@nostrum.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">rjsparks@nostrum.com</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Jon,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Thanks for the response.&nbsp; The intention in #1 =
below is to clarify the following =
sentence:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">The<span =
class=3D"apple-converted-space">&nbsp;</span><b>primary</b><span =
class=3D"apple-converted-space">&nbsp;</span>attack vector =
is</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; therefore one where the attacker contrives for =
the calling telephone</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;&nbsp; number in signaling to be a =
particular chosen number, one that =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; attacker does not have the authority to call =
from,<span class=3D"apple-converted-space">&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; number to be rendered on the terminating =
side</span></b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">.&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">This might be misconstrued as indicating that the =
objective of spoofing is simply the rendering of a spoofed number on the =
receiving display, causing mistaken conclusions that defenses might be =
limited to securing the rendered information. &nbsp;No issues with =
leaving this as it=92s a valid point.&nbsp; Another (increasing) =
motivation is to evade network and/or endpoint defenses that may block =
based on CPN.&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">So however it=92s worded, I think it=92s important =
to allow for both attack objectives of a spoofed presentation at the =
endpoint and in transit.&nbsp; =
&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Regards,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Alex</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">mailto:stir-bounces@ietf.org</span></a>] On Behalf =
Of</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Brian =
Rosen</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Sent: =
Tuesday, October 01, 2013 9:29 AM</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; To: Peterson, =
Jon</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY, =
MARTIN C'; Richard</span><o:p></o:p></div></div><div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; Shockey</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Don't think there is much MESSAGE.&nbsp; MSRP =
is about all we see, and XMPP is</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; more likely than =
that.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Brian</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
&lt;<a href=3D"mailto:jon.peterson@neustar.biz" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">jon.peterson@neustar.biz</span></a>&gt;</span><o:p></o:p></div></di=
v><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; =
wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Thanks for these notes, Alex. Some =
responses below.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; Here are several comments that =
should feed into the IETF Peterson =
draft:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; [IMO,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; both endpoint and in-network =
solutions should be facilitated]</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Agreed that both in-band and out-of-band =
solutions can usually be</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; implemented in either endpoints or in =
intermediaries of various kinds.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; If I see text that implies otherwise, =
I'll certainly change it.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessionless =
attack scenario.&nbsp; A spam payload may be carried =
in</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
a</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
establishment.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; More generally, we should be mindful of the =
fact that SIP is used in</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; telephony form more than voice =
session setup.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Probably if we were going to include a =
sessionless attack scenario, it</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; would be with regular text messages =
(whether carried on the PSTN over</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; TCAP or with some Internet protocol, =
including MESSAGE) rather than</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; with an INVITE, which typically wouldn't =
result in a payload being</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; immediately rendered to a user. More on =
this below with your suggested</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; text.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; The primary attack vector =
is</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; number in signaling to be a particular chosen =
number that the</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt; in the primary attack vectors that concern =
us.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; of programmability, the capacity to =
access the Internet, and</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; capabilities of rendering text, =
audio and/or images.&nbsp; This =
includes</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; I =
can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
images as you suggest.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Provided we're talking about end-to-end =
SIP use of MESSAGE, agreed</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; that in-band would be the right =
countermeasure. I am curious =
though</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
document.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Jon =
Peterson</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; =
Regards,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; Alex</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Of Richard Shockey</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 =
1:11 PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; +1</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN C</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 =
12:58 PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; To: Robert Sparks</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Cc:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; Yes, =
ok</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; Martin =
Dolly</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
Technology</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
+1-609-903-3360</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:md3135@att.com" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">md3135@att.com</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, "Robert =
Sparks"</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 windowtext; text-decoration: =
none;">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></div></div><d=
iv><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; =
wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN =
C wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt; Hi Martin -</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; Just to make sure - I think you're =
referring to Hadriel's comments</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; on =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; I don't think Hadriel's commented =
directly on stir-threats yet.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; In any case, we _are_ talking about a =
starting place, not a</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; =
finished</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; If there's no other objection, I'd =
like to get Jon to submit the</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; =
threats</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; =
RjS</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] =
On</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; It has been six days, =
I'd like to hear from more people about =
this</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; hear from him =
soon.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at =
5:23 PM, Russ Housley wrote:</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 windowtext; text-decoration: =
none;">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</span></a=
></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should the working =
group adopt this I-D as the starting point =
for</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; the</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; STIR threat =
docuent?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; stir =
mailing list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; &gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div class=3D"MsoNormal" =
align=3D"center" style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-align: center;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;"><hr =
size=3D"3" width=3D"100%" align=3D"center"></span></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 7.5pt; font-family: Arial, =
sans-serif; color: gray;"><br>This e-mail may contain Sprint proprietary =
information intended for the sole use of the recipient(s). Any use by =
others is prohibited. If you are not the intended recipient, please =
contact the sender and delete all copies of the =
message.</span><o:p></o:p></div></div></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif;">_______________________________________________<br>stir =
mailing list<br><a href=3D"mailto:stir@ietf.org" style=3D"color: purple; =
text-decoration: underline;">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/stir</a></span><o:p></o:=
p></div></blockquote></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div></div></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div><div class=3D"MsoNormal" align=3D"center" =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif; text-align: center;"><hr size=3D"2" width=3D"100%" =
align=3D"center"></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 7.5pt; font-family: Arial, sans-serif; color: =
gray;"><br>This e-mail may contain Sprint proprietary information =
intended for the sole use of the recipient(s). Any use by others is =
prohibited. If you are not the intended recipient, please contact the =
sender and delete all copies of the =
message.</span></div></div></div></blockquote></div><br></div></body></htm=
l>=

--Apple-Mail=_002AC86A-B46F-4492-AFD3-8423E16D53ED--

From Henning.Schulzrinne@fcc.gov  Thu Nov  7 09:09:44 2013
Return-Path: <Henning.Schulzrinne@fcc.gov>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D8D2B21F9DBD; Thu,  7 Nov 2013 09:09:43 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.078
X-Spam-Level: 
X-Spam-Status: No, score=-2.078 tagged_above=-999 required=5 tests=[AWL=0.520,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Eri3t-+KrLW8; Thu,  7 Nov 2013 09:09:32 -0800 (PST)
Received: from DC-IP-1.fcc.gov (dc-ip-1.fcc.gov [192.104.54.97]) by ietfa.amsl.com (Postfix) with ESMTP id 74B4621E81F6; Thu,  7 Nov 2013 09:09:18 -0800 (PST)
Message-ID: <E6A16181E5FD2F46B962315BB05962D01FC23A6F@fcc.gov>
From: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
To: 'Brian Rosen' <br@brianrosen.net>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO28lBm7MQs/E/Y0C8yrTGiGFz45oZ21rggABc6AD//7YS0IAAZHIA//+swSA=
Date: Thu, 7 Nov 2013 17:09:17 +0000
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov> <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net>
In-Reply-To: <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_E6A16181E5FD2F46B962315BB05962D01FC23A6Fp2pxmb13fccnetw_"
MIME-Version: 1.0
Cc: "cnit@ietf.org" <cnit@ietf.org>, Richard Shockey <richard@shockey.us>, "stir@ietf.org" <stir@ietf.org>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, Michael Hammer <michael.hammer@yaanatech.com>, "fmousinh@cisco.com" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:09:44 -0000

--_000_E6A16181E5FD2F46B962315BB05962D01FC23A6Fp2pxmb13fccnetw_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

For businesses, the incorporation record contains the address, but that may=
 well be Delaware.

The carrier generally knows the correct service address for landline (and t=
he billing address for most cell calls), for obvious reasons.

I agree that names are hard and should probably be left to the originator i=
n many cases. It's much more helpful if the caller ID says "John Smith, ABC=
 Bank" or "Wire department", even if the carrier has no idea whether that's=
 really John Smith or that particular department calling. (It's helpful to =
the callee because they may recognize John Smith as their financial advisor=
, for example.)

From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of Bri=
an Rosen
Sent: Thursday, November 07, 2013 12:03 PM
To: Henning Schulzrinne
Cc: cnit@ietf.org; Richard Shockey; stir@ietf.org; Pierce.Gorman@sprint.com=
; Michael Hammer; fmousinh@cisco.com
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Right.  I believe we can do this pretty easily.  We probably could have a 1=
00 categories that would have similar authorities, and there are classifica=
tions maintained by folks like Dun Bradstreet that can go even farther.

What I think would be substantially harder is to validate an entire V/X/J c=
ard.  How is a validator to know your nickname is Fluffy?  Name, phone numb=
er and, if a business, a classification, yes, we can do that.  Content of a=
 business card - very hard.

Brian


On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne <Henning.Schulzrinne@fcc.go=
v<mailto:Henning.Schulzrinne@fcc.gov>> wrote:


Yes, that's a problem, but as long as the number of categories is small, yo=
u can build UIs that only render information that's appropriate to the decl=
aration. For practical reasons, I think the number of useful categories is =
likely going to be fairly limited:
-          Financial institution (FDIC and a few others)
-          Health care (each health care facility has a gov't number)
-          Charity (501c3, state registered)
-          Contractor (state-licensed)
-          Public safety organization (police, fire)
-          Lawyer (bar association)
-          Local, state and federal government (.gov in the US)

I suspect that list encompasses a large fraction of the fraudulent (imperso=
nation) calls. For all of the above, at least within a country, it's pretty=
 clear who can attest to the membership. Yes, this requires some UI work or=
 some server logic, but these categories and the organizations don't change=
 all that often - in most cases, the certifying entities have probably been=
 the same for the past 50+ years. I'm not as worried about figuring out whe=
ther the beautician, mortician or florist is licensed and properly identifi=
ed, although I'm sure we can all come up with potential fraud stories.

From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com<mailto:Pierce.Gorman@spri=
nt.com>; br@brianrosen.net<mailto:br@brianrosen.net>; richard@shockey.us<ma=
ilto:richard@shockey.us>
Cc: stir@ietf.org<mailto:stir@ietf.org>; fmousinh@cisco.com<mailto:fmousinh=
@cisco.com>; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

So, would you trust a certificate from the City of Reston, Virginia police =
department?

(Hint:  you can find Reston on a map, but there is no City of Reston.
  The only police are Fairfax County.)

My concern is that one you dilute or disperse authority, it becomes a free-=
for-all again, and anybody's guess.

Mike


From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; Fernando Mousinho (fmousinh);=
 cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

As a thought experiment, Kumiko Ono and I had published a draft

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.

It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, ...) is not involved.

Henning

From: cnit-bounces@ietf.org<mailto:cnit-bounces@ietf.org> [mailto:cnit-boun=
ces@ietf.org]<mailto:[mailto:cnit-bounces@ietf.org]> On Behalf Of Gorman, P=
ierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@iet=
f.org>; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

>From 3261

20.9 Call-Info

   The Call-Info header field provides additional information about the
   caller or callee, depending on whether it is found in a request or
   response.  The purpose of the URI is described by the "purpose"
   parameter.  The "icon" parameter designates an image suitable as an
   iconic representation of the caller or callee.  The "info" parameter
   describes the caller or callee in general, for example, through a web
   page.  The "card" parameter provides a business card, for example, in
   vCard [36] or LDIF [37] formats.  Additional tokens can be registered
   using IANA and the procedures in Section 27.

   Use of the Call-Info header field can pose a security risk.  If a
   callee fetches the URIs provided by a malicious caller, the callee
   may be at risk for displaying inappropriate or offensive content,
   dangerous or illegal content, and so on.  Therefore, it is
   RECOMMENDED that a UA only render the information in the Call-Info
   header field if it can verify the authenticity of the element that
   originated the header field and trusts that element.  This need not
   be the peer UA; a proxy can insert this header field into requests.

   Example:

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,
     <http://www.example.com/alice/> ;purpose=3Dinfo

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

We've considered adding some information that is not number and is not name=
, but is something like "bank", which might have some sort of validation be=
hind it.

Is that along the lines you were thinking?

Brian
On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

I agree with Pierce here and respectfully disagree that STIR might eliminat=
e the need for other forms of caller identification.  Though your use case =
of credit card validation is a useful one and you are right there are still=
 applications that use SS7 for things that have nothing to do with call set=
up. I agree with you STIR may have more applications beyond the obvious one=
s of realtime session validation.

It's been my experience recently that there is a use case for something MOR=
E in the identification of the session as it is presented to the called par=
ty. This is the CNAM + idea we are kicking around on the CNIT list.

_______________________________________________
cnit mailing list
cnit@ietf.org<mailto:cnit@ietf.org>
https://www.ietf.org/mailman/listinfo/cnit

But your use case of a bank wanting to make sure they could properly identi=
fy themselves to the consumer before establishing a conversation is exactly=
 what this process is about.  STIR is essential but it's a multi-faceted pr=
oblem that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.   Its not unreasonable to discuss those.

The obviously analogy is I would want to see some real identification of a =
utility worker before I let them into my house to make repairs.  I would wa=
nt some validation that the call to me to reconfirm the appointments was in=
 fact from the utility in question.



From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Let me rephrase it... it may eliminate the need for other forms of caller i=
dentification beyond what STIR will provide, depending on the specific use =
case. For example, a credit card company may choose to rely entirely on STI=
R before allowing a card to be unblocked by an IVR (and as I said earlier, =
many companies do it today). In other use cases, the TN alone is not suffic=
ient information - my health care provider will want to know which member o=
f the family is calling.

I agree that ANI is already broadly used to improve customer service today.=
 However, it is not usually deemed as a secure enough mechanism to validate=
 the caller (therefore this WG!), except if you are a large organization th=
at can leverage things like SS7. STIR would make this type of validation av=
ailable to a broader number of companies.


Going on a tangent... perhaps this is out of scope, but there is not a lot =
of discussion about called party hijacking. Couldn't a man-in-the-middle tr=
y to answer calls on my behalf? If my bank is calling me, I want to make su=
re it's really them before carrying a conversation, but wouldn't they want =
the same?


From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com<mailto:Pierce.Go=
rman@sprint.com>>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho <fmousinh@cisco.com<mailto:fmousinh@cisco.com>>, "sti=
r@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.org>>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

I agree with your characterization of businesses as victim of caller ID fra=
ud however contact centers also use TN as a key to improve information avai=
lable to call agents to reduce average time-per-call and increase capacity =
of the call center.  So I don't agree that STIR would "eliminate the need f=
or caller identification from known TNs."

But perhaps I misunderstood your last sentence?


From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]
Sent: November 05, 2013 4:34 PM
To: stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I would suggest we add a new attack type to section 3. More and more compan=
ies are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for identificati=
on. If I call from my home phone number, I'm informed that I don't need to =
provide any further identification because my number is on file. Some (all?=
) companies that implement this type of validation rely on SS7 today.

Ultimately, this is yet another variation of impersonation - but in this ca=
se, the "victim" is a business, unlike the other two scenarios we've listed=
 so far.

Addressing this scenario would actually turn STIR into a feature, given it =
would enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.



From: Alex Bobotek <alex@bobotek.net<mailto:alex@bobotek.net>>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>, "Peterson, J=
on" <jon.peterson@neustar.biz<mailto:jon.peterson@neustar.biz>>
Cc: "stir@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.o=
rg>>, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>, "'DO=
LLY, MARTIN C'" <md3135@att.com<mailto:md3135@att.com>>, 'Robert Sparks' <r=
jsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Jon,

Thanks for the response.  The intention in #1 below is to clarify the follo=
wing sentence:

The primary attack vector is
   therefore one where the attacker contrives for the calling telephone
   number in signaling to be a particular chosen number, one that the
   attacker does not have the authority to call from, in order for that
   number to be rendered on the terminating side.

This might be misconstrued as indicating that the objective of spoofing is =
simply the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the rendere=
d information.  No issues with leaving this as it's a valid point.  Another=
 (increasing) motivation is to evade network and/or endpoint defenses that =
may block based on CPN.

So however it's worded, I think it's important to allow for both attack obj=
ectives of a spoofed presentation at the endpoint and in transit.

Regards,

Alex

> -----Original Message-----
> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-bo=
unces@ietf.org] On Behalf Of
> Brian Rosen
> Sent: Tuesday, October 01, 2013 9:29 AM
> To: Peterson, Jon
> Cc: stir@ietf.org<mailto:stir@ietf.org>; Alex Bobotek; 'Robert Sparks'; '=
DOLLY, MARTIN C'; Richard
> Shockey
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
>
> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is
> more likely than that.
>
> Brian
>
> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <jon.peterson@neustar.biz<ma=
ilto:jon.peterson@neustar.biz>>
> wrote:
>
> > Thanks for these notes, Alex. Some responses below.
> >
> >> Here are several comments that should feed into the IETF Peterson draf=
t:
> >>
> >> *   Remove any assumptions that the solution cannot be in-network
> [IMO,
> >> both endpoint and in-network solutions should be facilitated]
> >
> > Agreed that both in-band and out-of-band solutions can usually be
> > implemented in either endpoints or in intermediaries of various kinds.
> > If I see text that implies otherwise, I'll certainly change it.
> >
> >> *   Add a sessionless attack scenario.  A spam payload may be carried =
in
> a
> >> SIP INVITE or MESSAGE, which might contain stock market advice even
> >> in a display name field.  These attacks do NOT require session
> establishment.
> >> More generally, we should be mindful of the fact that SIP is used in
> >> telephony form more than voice session setup.
> >
> > Probably if we were going to include a sessionless attack scenario, it
> > would be with regular text messages (whether carried on the PSTN over
> > TCAP or with some Internet protocol, including MESSAGE) rather than
> > with an INVITE, which typically wouldn't result in a payload being
> > immediately rendered to a user. More on this below with your suggested
> text.
> >
> >> Here's some suggested markup:
> >>
> >>
> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:
> >>
> >> The primary attack vector is
> >>  therefore one where the attacker contrives for the calling telephone
> >> number in signaling to be a particular chosen number that the
> >> attacker does not have the authority to call from.
> >
> > What you want here is to remove the implication that the number will
> > be rendered on the terminating side? While there are some attacks
> > where that isn't significant, perhaps, I would say it is significant
> > in the primary attack vectors that concern us.
> >
> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> >>
> >>     Smart devices are generally based on computers with some degree
> >> of programmability, the capacity to access the Internet, and
> >> capabilities of rendering text, audio and/or images.  This includes
> >> smart phones, telephone applications on desktop and laptop computers,
> >> IP private branch exchanges, and so on.
> >
> > I can add the notion that smart devices can render text, audio and/or
> > images as you suggest.
> >
> >> 3.  Add to 3.3 Attack Scenarios:
> >>
> >>       Impersonation, IP-Mobile Text Message
> >>
> >>        An attacker with an computer sends a high volume of SIP MESSAGE
> >> spam message to IP-enabled smart phones using randomized calling
> >> party numbers.
> >>
> >>       Countermeasure: in-band authenticated identity
> >
> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > that in-band would be the right countermeasure. I am curious though
> > whether practically speaking there is enough use of MESSAGE in this
> > fashion that we're actually seeing high-volume spam over MESSAGE
> > today. Either way, no problem having an attack scenario of this form in=
 the
> document.
> >
> > Jon Peterson
> > Neustar, Inc.
> >
> >> Regards,
> >>
> >> Alex
> >>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of Richard Shockey
> >>> Sent: Monday, September 30, 2013 1:11 PM
> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> +1
> >>>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of DOLLY, MARTIN C
> >>> Sent: Monday, September 30, 2013 12:58 PM
> >>> To: Robert Sparks
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> Yes, ok
> >>>
> >>> Martin Dolly
> >>> Lead Member of Technical Staff
> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> >>> Technology
> >>> +1-609-903-3360
> >>> md3135@att.com<mailto:md3135@att.com>
> >>>
> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> >>>> <rjsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
> >>> wrote:
> >>>>
> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> >>>>> With Hadriel comments incorporated, it is a start
> >>>> Hi Martin -
> >>>>
> >>>> Just to make sure - I think you're referring to Hadriel's comments
> >>>> on the
> >>> problem statement document?
> >>>> I don't think Hadriel's commented directly on stir-threats yet.
> >>>>
> >>>> In any case, we _are_ talking about a starting place, not a
> >>>> finished
> >>> product.
> >>>>
> >>>> If there's no other objection, I'd like to get Jon to submit the
> >>>> threats
> >>> document as a WG -00 as soon as it's convenient.
> >>>>
> >>>> RjS
> >>>>>
> >>>>> -----Original Message-----
> >>>>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:s=
tir-bounces@ietf.org] On
> >>>>> Behalf Of Russ Housley
> >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> >>>>> To: IETF STIR Mail List
> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>>>
> >>>>> It has been six days, I'd like to hear from more people about this
> >>> document.  Martin asked for an additional week, so I'm sure we will
> >>> hear from him soon.
> >>>>>
> >>>>> Russ
> >>>>>
> >>>>>
> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> >>>>>>
> >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> >>>>>>
> >>>>>> Should the working group adopt this I-D as the starting point for
> >>>>>> the
> >>> STIR threat docuent?
> >>>>>>
> >>>>>> Russ
> >>>>> _______________________________________________
> >>>>> stir mailing list
> >>>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>>> https://www.ietf.org/mailman/listinfo/stir
> >>>>
> >>>> _______________________________________________
> >>>> stir mailing list
> >>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>> https://www.ietf.org/mailman/listinfo/stir
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >>>
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >> _______________________________________________
> >> stir mailing list
> >> stir@ietf.org<mailto:stir@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/stir
> >
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org<mailto:stir@ietf.org>
> > https://www.ietf.org/mailman/listinfo/stir
>
> _______________________________________________
> stir mailing list
> stir@ietf.org<mailto:stir@ietf.org>
> https://www.ietf.org/mailman/listinfo/stir

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.
_______________________________________________
stir mailing list
stir@ietf.org<mailto:stir@ietf.org>
https://www.ietf.org/mailman/listinfo/stir



________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.


--_000_E6A16181E5FD2F46B962315BB05962D01FC23A6Fp2pxmb13fccnetw_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">For businesses, the incor=
poration record contains the address, but that may well be Delaware.<o:p></=
o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The carrier generally kno=
ws the correct service address for landline (and the billing address for mo=
st cell calls), for obvious reasons.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree that names are ha=
rd and should probably be left to the originator in many cases. It&#8217;s =
much more helpful if the caller ID says &#8220;John Smith, ABC Bank&#8221;
 or &#8220;Wire department&#8221;, even if the carrier has no idea whether =
that&#8217;s really John Smith or that particular department calling. (It&#=
8217;s helpful to the callee because they may recognize John Smith as their=
 financial advisor, for example.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> stir-bou=
nces@ietf.org [mailto:stir-bounces@ietf.org]
<b>On Behalf Of </b>Brian Rosen<br>
<b>Sent:</b> Thursday, November 07, 2013 12:03 PM<br>
<b>To:</b> Henning Schulzrinne<br>
<b>Cc:</b> cnit@ietf.org; Richard Shockey; stir@ietf.org; Pierce.Gorman@spr=
int.com; Michael Hammer; fmousinh@cisco.com<br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt<o:p></o:p></s=
pan></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Right. &nbsp;I believe we can do this pretty easily.=
 &nbsp;We probably could have a 100 categories that would have similar auth=
orities, and there are classifications maintained by folks like Dun Bradstr=
eet that can go even farther.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">What I think would be substantially harder is to val=
idate an entire V/X/J card. &nbsp;How is a validator to know your nickname =
is Fluffy? &nbsp;Name, phone number and, if a business, a classification, y=
es, we can do that. &nbsp;Content of a business card
 - very hard.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne &lt;=
<a href=3D"mailto:Henning.Schulzrinne@fcc.gov">Henning.Schulzrinne@fcc.gov<=
/a>&gt; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal"><br>
<br>
<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Yes, that&#8217;s a probl=
em, but as long as the number of categories is small, you can build UIs tha=
t only render information that&#8217;s appropriate to the declaration.
 For practical reasons, I think the number of useful categories is likely g=
oing to be fairly limited:</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Financial
 institution (FDIC and a few others)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Health
 care (each health care facility has a gov&#8217;t number)</span><o:p></o:p=
></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Charity
 (501c3, state registered)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Contractor
 (state-licensed)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Public
 safety organization (police, fire)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lawyer
 (bar association)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Local,
 state and federal government (.gov in the US)</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I suspect that list encom=
passes a large fraction of the fraudulent (impersonation) calls. For all of=
 the above, at least within a country, it&#8217;s pretty clear
 who can attest to the membership. Yes, this requires some UI work or some =
server logic, but these categories and the organizations don&#8217;t change=
 all that often &#8211; in most cases, the certifying entities have probabl=
y been the same for the past 50&#43; years. I&#8217;m
 not as worried about figuring out whether the beautician, mortician or flo=
rist is licensed and properly identified, although I&#8217;m sure we can al=
l come up with potential fraud stories.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Michael
 Hammer [<a href=3D"mailto:michael.hammer@yaanatech.com">mailto:michael.ham=
mer@yaanatech.com</a>]<span class=3D"apple-converted-space">&nbsp;</span><b=
r>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Thursday, No=
vember 07, 2013 10:28 AM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Henning Schulz=
rinne; <a href=3D"mailto:Pierce.Gorman@sprint.com">
Pierce.Gorman@sprint.com</a>; <a href=3D"mailto:br@brianrosen.net">br@brian=
rosen.net</a>;
<a href=3D"mailto:richard@shockey.us">richard@shockey.us</a><br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org">stir@ietf.org</a>;
<a href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a href=3D"ma=
ilto:cnit@ietf.org">
cnit@ietf.org</a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>RE: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">So, would you trust a cer=
tificate from the City of Reston, Virginia police department?</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">(Hint:&nbsp; you can find=
 Reston on a map, but there is no City of Reston.&nbsp;</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;The only poli=
ce are Fairfax County.)</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My concern is that one yo=
u dilute or disperse authority, it becomes a free-for-all again, and anybod=
y&#8217;s guess.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Mike</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"><a href=3D"mai=
lto:stir-bounces@ietf.org"><span style=3D"color:purple">stir-bounces@ietf.o=
rg</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D=
"mailto:stir-bounces@ietf.org"><span style=3D"color:purple">mailto:stir-bou=
nces@ietf.org</span></a>]<span class=3D"apple-converted-space">&nbsp;</span=
><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Henning Sc=
hulzrinne<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Thursday, No=
vember 07, 2013 10:00 AM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>'Gorman, Pierc=
e A [NTK]'; Brian Rosen; Richard Shockey<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org</span></a><sp=
an class=3D"apple-converted-space">&nbsp;</span>List; Fernando Mousinho (fm=
ousinh);<span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mailt=
o:cnit@ietf.org"><span style=3D"color:purple">cnit@ietf.org</span></a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As a thought experiment, =
Kumiko Ono and I had published a draft</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"http://tools.i=
etf.org/html/draft-ono-dispatch-attribute-validation-00"><span style=3D"col=
or:purple">http://tools.ietf.org/html/draft-ono-dispatch-attribute-validati=
on-00</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">to allow third parties to=
 validate property information. If the validating party (e.g., a bank regul=
ator) is willing to sign a certificate, similar in spirit
 to the framed gold-leaf diplomas in your dentist&#8217;s office or, more l=
owly, to the health departments rating in a restaurant window, and it can b=
e tied to a phone number, this shouldn&#8217;t be too hard.</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s a bit harder i=
f the certifying authority (regulator, Realtor board, local bar association=
, &#8230;) is not involved.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Henning</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"><a href=3D"mai=
lto:cnit-bounces@ietf.org"><span style=3D"color:purple">cnit-bounces@ietf.o=
rg</span></a><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"=
mailto:[mailto:cnit-bounces@ietf.org]"><span style=3D"color:purple">[mailto=
:cnit-bounces@ietf.org]</span></a><span class=3D"apple-converted-space">&nb=
sp;</span><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Gorman, Pi=
erce A [NTK]<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Thursday, No=
vember 07, 2013 9:54 AM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Brian Rosen; R=
ichard Shockey<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org</span></a><sp=
an class=3D"apple-converted-space">&nbsp;</span>List;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:cnit@ietf.org"><span style=
=3D"color:purple">cnit@ietf.org</span></a>;
 Fernando Mousinho (fmousinh)<br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [cnit=
] [stir] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;ll admit I am not f=
amiliar with v/x/jcard encoding differences or the implications of their us=
e so I&#8217;ll encourage educating me if it isn&#8217;t too onerous.</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;m not sure what is =
the concern with a 3<sup>rd</sup><span class=3D"apple-converted-space">&nbs=
p;</span>party providing &#8220;validation&#8221; though.&nbsp; There are n=
umerous examples
 of 3<sup>rd</sup><span class=3D"apple-converted-space">&nbsp;</span>partie=
s providing validation of information including NASDAQ, NYSE, Barron&#8217;=
s, Moody&#8217;s, and the federal reserve banking system to name a few.</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;">Pierce</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Brian
 Rosen [<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:purple">m=
ailto:br@brianrosen.net</span></a>]<span class=3D"apple-converted-space">&n=
bsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 06,=
 2013 11:59 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Richard Shocke=
y<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span>Fernando Mousi=
nho (fmousinh); Gorman, Pierce A [NTK];<span class=3D"apple-converted-space=
">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:purple=
">stir@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</spa=
n>List;<span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto=
:cnit@ietf.org"><span style=3D"color:purple">cnit@ietf.org</span></a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I think this would be a heavy lift.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">If the responsible entity was a carrier, then it wou=
ld have to validate the data, which it has very little basis to validate. &=
nbsp;It could get a 3rd party to do the validation, but then it&#8217;s put=
ting its reputation on the back of some hired
 hand validator.<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">If the responsibility is the end user/device, then t=
he signature has no value.<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">I do question JCARD vs xCard, but that&#8217;s an en=
coding detail. &nbsp;All of SIP Is XML described by schema, not json.<o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us"><span style=3D"color:purple">richard@shoc=
key.us</span></a>&gt; wrote:<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">&nbsp;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">URI for a JCARD in the CA=
LL INFO header provisioned by the calling party and ultimately signed by th=
e responsible entity. &nbsp;The carrier could provision this
 for their mobile or hosted customers.&nbsp; Enterprises could do this them=
selves.&nbsp; This also has advantages in Enterprise to Enterprise UC as we=
ll where the data is derived from the Enterprise &#8220;directory&#8221; an=
d could facilitate end to end PPX to PBX communications
 especially in point to point video communications.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There are certainly priva=
cy and security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp;=
 This really would be PII in the clear but then its done voluntarily.</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There would have to be so=
me work around restructuring the Header and adding some parameters but it&#=
8217;s underutilized right now and this Use Case is a perfectly
 appropriate use.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://tools.=
ietf.org/html/draft-ietf-jcardcal-jcard-06"><span style=3D"color:purple">ht=
tps://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</span></a></span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Obviously it would need t=
o be signed but we don&#8217;t need to worry about that ..yet.</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">From 3261</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">20.9 Call-Info</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; The Call-Inf=
o header field provides additional information about the</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; caller or ca=
llee, depending on whether it is found in a request or</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; response.&nb=
sp; The purpose of the URI is described by the &quot;purpose&quot;</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; parameter.&n=
bsp; The &quot;icon&quot; parameter designates an image suitable as an</spa=
n><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; iconic repre=
sentation of the caller or callee.&nbsp; The &quot;info&quot; parameter</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; describes th=
e caller or callee in general, for example, through a web</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; page.&nbsp; =
The &quot;card&quot; parameter provides a business card, for example, in</s=
pan><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; vCard [36] o=
r LDIF [37] formats.&nbsp; Additional tokens can be registered</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; using IANA a=
nd the procedures in Section 27.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Use of the C=
all-Info header field can pose a security risk.&nbsp; If a</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; callee fetch=
es the URIs provided by a malicious caller, the callee</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; may be at ri=
sk for displaying inappropriate or offensive content,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; dangerous or=
 illegal content, and so on.&nbsp; Therefore, it is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; RECOMMENDED =
that a UA only render the information in the Call-Info</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; header field=
 if it can verify the authenticity of the element that</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; originated t=
he header field and trusts that element.&nbsp; This need not</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into requests.</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Example:</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Call-Info: &=
lt;<a href=3D"http://wwww.example.com/alice/photo.jpg"><span style=3D"color=
:purple">http://wwww.example.com/alice/photo.jpg</span></a>&gt; ;purpose=3D=
icon,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;<a href=3D"http://www.example.com/alice/"><span style=3D"color:purple">=
http://www.example.com/alice/</span></a>&gt; ;purpose=3Dinfo</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Brian
 Rosen [<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:purple">m=
ailto:br@brianrosen.net</span></a>]<span class=3D"apple-converted-space">&n=
bsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Wednesday, N=
ovember 06, 2013 3:41 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Richard Shocke=
y<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span>Fernando Mousi=
nho (fmousinh); Gorman, Pierce A [NTK];<span class=3D"apple-converted-space=
">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:purple=
">stir@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</spa=
n>List<br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">We&#8217;ve considered adding some information that =
is not number and is not name, but is something like &#8220;bank&#8221;, wh=
ich might have some sort of validation behind it.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">Is that along the lines you were thinking?<o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us"><span style=3D"color:purple">richard@shoc=
key.us</span></a>&gt; wrote:<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">&nbsp;<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree with Pierce here =
and respectfully disagree that STIR might eliminate the need for other form=
s of caller identification.&nbsp; Though your use case of credit
 card validation is a useful one and you are right there are still applicat=
ions that use SS7 for things that have nothing to do with call setup. I agr=
ee with you STIR may have more applications beyond the obvious ones of real=
time session validation.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s been my experi=
ence recently that there is a use case for something MORE in the identifica=
tion of the session as it is presented to the called party. This
 is the CNAM &#43; idea we are kicking around on the CNIT list.</span><o:p>=
</o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">_________________________=
______________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">cnit mailing list</span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"mailto:cnit@ie=
tf.org"><span style=3D"color:#954F72">cnit@ietf.org</span></a></span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://www.ie=
tf.org/mailman/listinfo/cnit"><span style=3D"color:#954F72">https://www.iet=
f.org/mailman/listinfo/cnit</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">But your use case of a ba=
nk wanting to make sure they could properly identify themselves to the cons=
umer before establishing a conversation is exactly what
 this process is about.&nbsp; STIR is essential but it&#8217;s a multi-face=
ted problem that may require multi-faceted solutions.. and enhanced CNAM &#=
43; being only one of them.&nbsp;&nbsp; Its not unreasonable to discuss tho=
se.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The obviously analogy is =
I would want to see some real identification of a utility worker before I l=
et them into my house to make repairs. &nbsp;I would want some
 validation that the call to me to reconfirm the appointments was in fact f=
rom the utility in question.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:purple">stir-bounces@iet=
f.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=
=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:purple">mailto:stir-=
bounces@ietf.org</span></a>]<span class=3D"apple-converted-space">&nbsp;</s=
pan><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando M=
ousinho (fmousinh)<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Tuesday, Nov=
ember 05, 2013 6:26 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce=
 A [NTK];<span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mail=
to:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org</span></a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Let me rephrase it&#8230; it may elimin=
ate the need for other forms of caller identification beyond what STIR will=
 provide, depending on the specific use case. For example, a credit
 card company may choose to rely entirely on STIR before allowing a card to=
 be unblocked by an IVR (and as I said earlier, many companies do it today)=
. In other use cases, the TN alone is not sufficient information &#8211; my=
 health care provider will want to know
 which member of the family is calling.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I agree that ANI is already broadly use=
d to improve customer service today. However, it is not usually deemed as a=
 secure enough mechanism to validate the caller (therefore
 this WG!), except if you are a large organization that can leverage things=
 like SS7. STIR would make this type of validation available to a broader n=
umber of companies.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Going on a tangent&#8230; perhaps this =
is out of scope, but there is not a lot of discussion about called party hi=
jacking. Couldn&#8217;t a man-in-the-middle try to answer calls on my
 behalf? If my bank is calling me, I want to make sure it&#8217;s really th=
em before carrying a conversation, but wouldn&#8217;t they want the same?&n=
bsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">&lt;Gorman&gt;, &quot;Pierce A =
[NTK]&quot; &lt;<a href=3D"mailto:Pierce.Gorman@sprint.com"><span style=3D"=
color:#954F72">Pierce.Gorman@sprint.com</span></a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Nov=
ember 5, 2013 at 6:05 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousi=
nho &lt;<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"color:#954F72"=
>fmousinh@cisco.com</span></a>&gt;, &quot;<a href=3D"mailto:stir@ietf.org">=
<span style=3D"color:#954F72">stir@ietf.org</span></a>&quot; &lt;<a href=3D=
"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></=
a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I agree with your character=
ization of businesses as victim of caller ID fraud however contact centers =
also use TN as a key to improve information available to
 call agents to reduce average time-per-call and increase capacity of the c=
all center.&nbsp; So I don&#8217;t agree that STIR would &#8220;eliminate t=
he need for caller identification from known TNs.&#8221;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">But perhaps I misunderstood=
 your last sentence?</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Fernando
 Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"=
color:#954F72">mailto:fmousinh@cisco.com</span></a>]<span class=3D"apple-co=
nverted-space">&nbsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 05,=
 2013 4:34 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></a><b=
r>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I would suggest we add a new attack typ=
e to section 3. More and more companies are using the caller ID for account=
 validation. For example, if I call my credit card provider
 from my office number, they ask me for identification. If I call from my h=
ome phone number, I&#8217;m informed that I don&#8217;t need to provide any=
 further identification because my number is on file. Some (all?) companies=
 that implement this type of validation rely
 on SS7 today.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Ultimately, this is yet another variati=
on of impersonation &#8211; but in this case, the &#8220;victim&#8221; is a=
 business, unlike the other two scenarios we&#8217;ve listed so far.</span>=
<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Addressing this scenario would actually=
 turn STIR into a feature, given it would enable contact centers of all siz=
es to eliminate the need for caller identification from
 known TNs.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">Alex Bobotek &lt;<a href=3D"mai=
lto:alex@bobotek.net"><span style=3D"color:#954F72">alex@bobotek.net</span>=
</a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Oct=
ober 1, 2013 at 12:51 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &l=
t;<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:#954F72">br@bri=
anrosen.net</span></a>&gt;, &quot;Peterson, Jon&quot; &lt;<a href=3D"mailto=
:jon.peterson@neustar.biz"><span style=3D"color:#954F72">jon.peterson@neust=
ar.biz</span></a>&gt;<br>
<b>Cc:<span class=3D"apple-converted-space">&nbsp;</span></b>&quot;<a href=
=3D"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span=
></a>&quot; &lt;<a href=3D"mailto:stir@ietf.org"><span style=3D"color:#954F=
72">stir@ietf.org</span></a>&gt;, Richard Shockey &lt;<a href=3D"mailto:ric=
hard@shockey.us"><span style=3D"color:#954F72">richard@shockey.us</span></a=
>&gt;,
 &quot;'DOLLY, MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D"color:#954F72">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;=
<a href=3D"mailto:rjsparks@nostrum.com"><span style=3D"color:#954F72">rjspa=
rks@nostrum.com</span></a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Jon,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Thanks for the response.&nbsp; The inte=
ntion in #1 below is to clarify the following sentence:</span><o:p></o:p></=
p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">The<span class=3D"apple-converted-space=
">&nbsp;</span><b>primary</b><span class=3D"apple-converted-space">&nbsp;</=
span>attack vector is</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; therefore one where the at=
tacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number in signaling to be =
a particular chosen number, one that the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; attacker does not have the=
 authority to call from,<span class=3D"apple-converted-space">&nbsp;</span>=
<b>in order for that</b></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number to be rendered o=
n the terminating side</span></b><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;">.&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">This might be misconstrued as indicatin=
g that the objective of spoofing is simply the rendering of a spoofed numbe=
r on the receiving display, causing mistaken conclusions
 that defenses might be limited to securing the rendered information. &nbsp=
;No issues with leaving this as it&#8217;s a valid point.&nbsp; Another (in=
creasing) motivation is to evade network and/or endpoint defenses that may =
block based on CPN.&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">So however it&#8217;s worded, I think i=
t&#8217;s important to allow for both attack objectives of a spoofed presen=
tation at the endpoint and in transit.&nbsp; &nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Regards,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Alex</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; -----Original Message-----</span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; From:<span class=3D"apple-converte=
d-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"><span style=
=3D"color:#954F72">stir-bounces@ietf.org</span></a><span class=3D"apple-con=
verted-space">&nbsp;</span>[<a href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf Of</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian Rosen</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Sent: Tuesday, October 01, 2013 9:=
29 AM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; To: Peterson, Jon</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Cc:<span class=3D"apple-converted-=
space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:#=
954F72">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY,
 MARTIN C'; Richard</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Shockey</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Subject: Re: [stir] draft-peterson=
-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Don't think there is much MESSAGE.=
&nbsp; MSRP is about all we see, and XMPP is</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; more likely than that.</span><o:p>=
</o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; On Oct 1, 2013, at 12:24 PM, &quot=
;Peterson, Jon&quot; &lt;<a href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D"color:windowtext;text-decoration:none">jon.peterson@neustar.biz</s=
pan></a>&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; wrote:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Thanks for these notes, Alex.=
 Some responses below.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here are several comments=
 that should feed into the IETF Peterson draft:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Remove any =
assumptions that the solution cannot be in-network</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; [IMO,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; both endpoint and in-netw=
ork solutions should be facilitated]</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Agreed that both in-band and =
out-of-band solutions can usually be</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; implemented in either endpoin=
ts or in intermediaries of various kinds.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; If I see text that implies ot=
herwise, I'll certainly change it.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessi=
onless attack scenario.&nbsp; A spam payload may be carried in</span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; a</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; SIP INVITE or MESSAGE, wh=
ich might contain stock market advice even</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; in a display name field.&=
nbsp; These attacks do NOT require session</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; establishment.</span><o:p></o:p></=
p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; More generally, we should=
 be mindful of the fact that SIP is used in</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; telephony form more than =
voice session setup.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Probably if we were going to =
include a sessionless attack scenario, it</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; would be with regular text me=
ssages (whether carried on the PSTN over</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; TCAP or with some Internet pr=
otocol, including MESSAGE) rather than</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; with an INVITE, which typical=
ly wouldn't result in a payload being</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; immediately rendered to a use=
r. More on this below with your suggested</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; text.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here's some suggested mar=
kup:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 1.&nbsp;&nbsp;&nbsp; Repl=
ace 2nd sentence of 2nd paragraph of 1.0 Introduction with:</span><o:p></o:=
p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; The primary attack vector=
 is</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; therefore one where=
 the attacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; number in signaling to be=
 a particular chosen number that the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; attacker does not have th=
e authority to call from.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; What you want here is to remo=
ve the implication that the number will</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; be rendered on the terminatin=
g side? While there are some attacks</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; where that isn't significant,=
 perhaps, I would say it is significant</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; in the primary attack vectors=
 that concern us.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 2.&nbsp; Replace 3rd para=
graph of 2.1 Endpoints with:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; S=
mart devices are generally based on computers with some degree</span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; of programmability, the c=
apacity to access the Internet, and</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; capabilities of rendering=
 text, audio and/or images.&nbsp; This includes</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; smart phones, telephone a=
pplications on desktop and laptop computers,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; IP private branch exchang=
es, and so on.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; I can add the notion that sma=
rt devices can render text, audio and/or</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; images as you suggest.</span>=
<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attac=
k Scenarios:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; Impersonation, IP-Mobile Text Message</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; &nbsp;An attacker with an computer sends a high volume of SIP MESSAGE=
</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; spam message to IP-enable=
d smart phones using randomized calling</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; party numbers.</span><o:p=
></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&=
nbsp; Countermeasure: in-band authenticated identity</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Provided we're talking about =
end-to-end SIP use of MESSAGE, agreed</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; that in-band would be the rig=
ht countermeasure. I am curious though</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; whether practically speaking =
there is enough use of MESSAGE in this</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; fashion that we're actually s=
eeing high-volume spam over MESSAGE</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; today. Either way, no problem=
 having an attack scenario of this form in the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; document.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Jon Peterson</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Neustar, Inc.</span><o:p></o:=
p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Regards,</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Alex</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of Richard Shockey</s=
pan><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 1:11 PM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: 'DOLLY, MARTIN C'=
; 'Robert Sparks'</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1</span><o:p></o=
:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of DOLLY, MARTIN C</s=
pan><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 12:58 PM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: Robert Sparks</sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Yes, ok</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Martin Dolly</span><o=
:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Lead Member of Techni=
cal Staff</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Core Network &amp; Go=
v't/Regulatory Standards AT&amp;T Labs - Network</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Technology</span><o:p=
></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1-609-903-3360</=
span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:md3135@att.com"><span style=
=3D"color:windowtext;text-decoration:none">md3135@att.com</span></a></span>=
<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, =
at 12:47 PM, &quot;Robert Sparks&quot;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; &lt;<a href=3D"ma=
ilto:rjsparks@nostrum.com"><span style=3D"color:windowtext;text-decoration:=
none">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; wrote:</span><o:p></o=
:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:=
42 PM, DOLLY, MARTIN C wrote:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; With Hadriel =
comments incorporated, it is a start</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Hi Martin -</span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Just to make sure=
 - I think you're referring to Hadriel's comments</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; on the</span><o:p=
></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; problem statement doc=
ument?</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; I don't think Had=
riel's commented directly on stir-threats yet.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; In any case, we _=
are_ talking about a starting place, not a</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; finished</span><o=
:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; product.</span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; If there's no oth=
er objection, I'd like to get Jon to submit the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; threats</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document as a WG -00 =
as soon as it's convenient.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; RjS</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original=
 Message-----</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span cl=
ass=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@i=
etf.org"><span style=3D"color:windowtext;text-decoration:none">stir-bounces=
@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-=
decoration:none">mailto:stir-bounces@ietf.org</span></a>]
 On</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Behalf Of Rus=
s Housley</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Sent: Thursda=
y, September 26, 2013 4:37 PM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; To: IETF STIR=
 Mail List</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Subject: Re: =
[stir] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; It has been s=
ix days, I'd like to hear from more people about this</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document.&nbsp; Marti=
n asked for an additional week, so I'm sure we will</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; hear from him soon.</=
span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Russ</span><o=
:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20=
, 2013, at 5:23 PM, Russ Housley wrote:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span clas=
s=3D"apple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id/=
draft-peterson-stir-threats-00.txt"><span style=3D"color:windowtext;text-de=
coration:none">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</s=
pan></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should th=
e working group adopt this I-D as the starting point for</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; the</span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; STIR threat docuent?<=
/span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Russ</spa=
n><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; _____________=
__________________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span=
 style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></=
span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailma=
n/listinfo/stir"><span style=3D"color:windowtext;text-decoration:none">http=
s://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; _________________=
______________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; stir mailing list=
</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/li=
stinfo/stir"><span style=3D"color:windowtext;text-decoration:none">https://=
www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; _________________________=
______________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; stir mailing list</span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"co=
lor:windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/s=
tir"><span style=3D"color:windowtext;text-decoration:none">https://www.ietf=
.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; _____________________________=
__________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; stir mailing list</span><o:p>=
</o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:=
windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"=
><span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org=
/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; __________________________________=
_____________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; stir mailing list</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:windo=
wtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"><spa=
n style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">
<hr size=3D"3" width=3D"100%" align=3D"center">
</span></div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;">______________________________________=
_________<br>
stir mailing list<br>
<a href=3D"mailto:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org=
</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/stir"><span style=3D"color=
:purple">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p><=
/o:p></p>
</div>
</blockquote>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center">
<hr size=3D"2" width=3D"100%" align=3D"center">
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_E6A16181E5FD2F46B962315BB05962D01FC23A6Fp2pxmb13fccnetw_--

From Pierce.Gorman@sprint.com  Thu Nov  7 09:10:13 2013
Return-Path: <Pierce.Gorman@sprint.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AE36E21E812B; Thu,  7 Nov 2013 09:10:12 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.061
X-Spam-Level: 
X-Spam-Status: No, score=-3.061 tagged_above=-999 required=5 tests=[AWL=-0.462, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id t2XJ1VQI7Mwu; Thu,  7 Nov 2013 09:10:06 -0800 (PST)
Received: from db9outboundpool.messaging.microsoft.com (mail-db9lp0248.outbound.messaging.microsoft.com [213.199.154.248]) by ietfa.amsl.com (Postfix) with ESMTP id 347B921E8134; Thu,  7 Nov 2013 09:09:41 -0800 (PST)
Received: from mail220-db9-R.bigfish.com (10.174.16.244) by DB9EHSOBE018.bigfish.com (10.174.14.81) with Microsoft SMTP Server id 14.1.225.22; Thu, 7 Nov 2013 17:09:40 +0000
Received: from mail220-db9 (localhost [127.0.0.1])	by mail220-db9-R.bigfish.com (Postfix) with ESMTP id D0465801A9; Thu,  7 Nov 2013 17:09:40 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:144.230.168.25; KIP:(null); UIP:(null); IPV:NLI; H:plsasdm1.corp.sprint.com; RD:smtpls1.sprint.com; EFVD:NLI
X-SpamScore: -24
X-BigFish: VS-24(zz98dI9371I542I1fdcIzz1f42h208ch1ee6h1de0h1fdah2073h2146h1202h1e76h1d1ah1d2ah1fc6hzz1de098h1033IL17326ah8275bh8275dh1de097h186068hz2fh109h2a8h839h944hd25hf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h1b0ah224fh1d0ch1d2eh1d3fh1dc1h1dfeh1dffh1e1dh1fe8h1ff5h2216h1155h)
Received-SPF: pass (mail220-db9: domain of sprint.com designates 144.230.168.25 as permitted sender) client-ip=144.230.168.25; envelope-from=Pierce.Gorman@sprint.com; helo=plsasdm1.corp.sprint.com ; p.sprint.com ; 
Received: from mail220-db9 (localhost.localdomain [127.0.0.1]) by mail220-db9 (MessageSwitch) id 13838441784542_25535; Thu,  7 Nov 2013 17:09:38 +0000 (UTC)
Received: from DB9EHSMHS010.bigfish.com (unknown [10.174.16.248])	by mail220-db9.bigfish.com (Postfix) with ESMTP id F1BB620054; Thu,  7 Nov 2013 17:09:37 +0000 (UTC)
Received: from plsasdm1.corp.sprint.com (144.230.168.25) by DB9EHSMHS010.bigfish.com (10.174.14.20) with Microsoft SMTP Server (TLS) id 14.16.227.3; Thu, 7 Nov 2013 17:09:37 +0000
Received: from PLSWEH02.ad.sprint.com (plsweh02.corp.sprint.com [144.226.242.131])	by plsasdm1.corp.sprint.com (Sentrion-MTA-4.2.2/Sentrion-MTA-4.2.2) with ESMTP id rA7H9ZGh011785 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 7 Nov 2013 11:09:35 -0600
Received: from pdawm10a.ad.sprint.com ([169.254.2.186]) by PLSWEH02.ad.sprint.com ([144.226.242.131]) with mapi id 14.03.0123.003; Thu, 7 Nov 2013 11:09:35 -0600
From: "Gorman, Pierce A [NTK]" <Pierce.Gorman@sprint.com>
To: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>, 'Michael Hammer' <michael.hammer@yaanatech.com>, "br@brianrosen.net" <br@brianrosen.net>, "richard@shockey.us" <richard@shockey.us>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: Ac7b2+d8aE3RKG+HTk+hJde51INkfg==
Date: Thu, 7 Nov 2013 17:09:33 +0000
Message-ID: <B4C06A5710F0ED4583B3CF5E9C6B21D85515BE41@PDAWM10A.ad.sprint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.229.76.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: sprint.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
Cc: "stir@ietf.org" <stir@ietf.org>, "fmousinh@cisco.com" <fmousinh@cisco.com>, "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:10:13 -0000

In addition to the examples of certifying organizations that Henning provid=
ed, there are Barron's, Moody's, Dun & Bradstreet, Equifax, Experion, KPMG,=
 Deloitte-Touche, NYSE, NASDAQ, et cetera.

Do we even need the categories, or do we just need 3rd parties to be expert=
 at vetting the authenticity of an originator?  If it is the latter, I rema=
in unconcerned about the business model aspects.

Pierce

-----Original Message-----
From: Henning Schulzrinne [mailto:Henning.Schulzrinne@fcc.gov]
Sent: November 07, 2013 10:13 AM
To: 'Michael Hammer'; Gorman, Pierce A [NTK]; br@brianrosen.net; richard@sh=
ockey.us
Cc: stir@ietf.org; cnit@ietf.org; fmousinh@cisco.com
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Yes, that's a problem, but as long as the number of categories is small, yo=
u can build UIs that only render information that's appropriate to the decl=
aration. For practical reasons, I think the number of useful categories is =
likely going to be fairly limited:

-          Financial institution (FDIC and a few others)

-          Health care (each health care facility has a gov't number)

-          Charity (501c3, state registered)

-          Contractor (state-licensed)

-          Public safety organization (police, fire)

-          Lawyer (bar association)

-          Local, state and federal government (.gov in the US)

I suspect that list encompasses a large fraction of the fraudulent (imperso=
nation) calls. For all of the above, at least within a country, it's pretty=
 clear who can attest to the membership. Yes, this requires some UI work or=
 some server logic, but these categories and the organizations don't change=
 all that often - in most cases, the certifying entities have probably been=
 the same for the past 50+ years. I'm not as worried about figuring out whe=
ther the beautician, mortician or florist is licensed and properly identifi=
ed, although I'm sure we can all come up with potential fraud stories.

From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net; richa=
rd@shockey.us
Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

So, would you trust a certificate from the City of Reston, Virginia police =
department?

(Hint:  you can find Reston on a map, but there is no City of Reston.
  The only police are Fairfax County.)

My concern is that one you dilute or disperse authority, it becomes a free-=
for-all again, and anybody's guess.

Mike


From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; Fernando Mousinho (fmousinh);=
 cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

As a thought experiment, Kumiko Ono and I had published a draft

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.

It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, ...) is not involved.

Henning

From: cnit-bounces@ietf.org<mailto:cnit-bounces@ietf.org> [mailto:cnit-boun=
ces@ietf.org]<mailto:[mailto:cnit-bounces@ietf.org]> On Behalf Of Gorman, P=
ierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@iet=
f.org>; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.


From br@brianrosen.net  Thu Nov  7 09:10:52 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B874A21E81EA for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:10:52 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level: 
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 49BGzXi+t+NR for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:10:47 -0800 (PST)
Received: from mail-bk0-f46.google.com (mail-bk0-f46.google.com [209.85.214.46]) by ietfa.amsl.com (Postfix) with ESMTP id 07B2F21E820F for <cnit@ietf.org>; Thu,  7 Nov 2013 09:10:24 -0800 (PST)
Received: by mail-bk0-f46.google.com with SMTP id e11so357164bkh.33 for <cnit@ietf.org>; Thu, 07 Nov 2013 09:10:24 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=AaSbwVtBu+HtUJAPazHAjM5GuaqDoba+M572lkQfo/E=; b=A6pvAf3a//Ogx3SFa+I9/FjiUF9GTGBbgCAxYOKIOT6o1WKClQ77qwLPX3Q1oyC/pV 0dzjUAuHgS7eeolhm1qe2+yaI8eIk0c227sJq1So/0pAZXyXd5iIL0jCE8928qMzio4N B5f0pMAYCmkC5L1ifTGq659DeceZcaZ8ySR64Bg+Asg8fxSedEsHdfk89pGJvY3rka5t 6150zJ4A420lci6gr8P2C5QkkBv/y8Y7mwPXudXoAYtmVj5vQQ9i6K3TmK5A/6SMp+9J t1ey7u/bDOa0qmiYO3IAIBq2zc3Mu28rcrlgm2lHThC6cqa26I+UhhUB5pbgUOE931nd QicQ==
X-Gm-Message-State: ALoCoQlJAETjb95+rvfThq8R2AkhJ8GUPFo1J6IYScmau3lwAH4yKwkT3tQwLLPIjEXxrgcoiwQQ
X-Received: by 10.204.231.207 with SMTP id jr15mr53276bkb.66.1383844224144; Thu, 07 Nov 2013 09:10:24 -0800 (PST)
Received: from dhcp-b7f9.meeting.ietf.org (dhcp-b7f9.meeting.ietf.org. [31.133.183.249]) by mx.google.com with ESMTPSA id l9sm3023886bkg.0.2013.11.07.09.10.19 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 07 Nov 2013 09:10:22 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_4AC161E6-68CE-4F8A-8156-0728D2677122"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <00f401cedbcc$4a7e3700$df7aa500$@shockey.us>
Date: Thu, 7 Nov 2013 09:10:14 -0800
Message-Id: <61DECB8D-A41A-41B8-B43C-DC11D3E2AE1B@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <00f401cedbcc$4a7e3700$df7aa500$@shockey.us>
To: Richard Shockey <richard@shockey.us>
X-Mailer: Apple Mail (2.1816)
Cc: "stir@ietf.org List" <stir@ietf.org>, "Gorman, Pierce A \[NTK\]" <Pierce.Gorman@sprint.com>, "Fernando Mousinho \(fmousinh\)" <fmousinh@cisco.com>, cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:10:52 -0000

--Apple-Mail=_4AC161E6-68CE-4F8A-8156-0728D2677122
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

We=92re agreeing CNAM doesn=92t work, it lies, and we have to fix that.

Billing relationships are useful, but only give you return routability =
properties.  Not very interesting, and billing addresses aren=92t often =
what is wanted.  Given various corporate relationships that are =
tolerated by carriers, it would be trivial to make the billing name be =
anything you wanted it to be and get service from most carriers. =20

I think it IS possible to validate a name, as long as you allow a =
probability of that validation to be carried, because the techniques we =
have aren=92t definitive. =20

See prior reply on the category idea, which I think is workable.

FWIW, I am in favor of an in band solution for CNAM - display name of =
From.

You proposed a VCARD.  I think that is unworkable.  Name is hard enough. =
 We might be able to get an address.  All the other fields in a VCARD =
are pretty dicey.


On Nov 7, 2013, at 7:16 AM, Richard Shockey <richard@shockey.us> wrote:

> =20
> Like CNAM is so accurate today=85 ??  When certain companies get the =
data from scanning phone books that are not even printed anymore?
> =20
> The carrier has the billing relationship. As you well know that is =
where the data comes from now but it is not granular.=20
> =20
> The carrier permits the customer to create the record(s). What are you =
trying to validate? The Accuracy of the data?  =85 In any event none of =
that is our problem.   We make the tools. Someone else worries about =
policy.
> =20
> You are making this way too complicated thus defeating the basic use =
case. =20
> =20
> Well from time to time I=92ve discovered I=92m not a big fan of the =
end to end principal.  It just doesn=92t work for every use case.  This =
is a carrier service or in certain cases hosted.
> =20
> Much like I=92m convinced the out of band solution in STIR is total =
fantasy and like VIPR will almost never actually be used in practice.
> =20
> As for encoding I mentioned JCARD since there seems to be a faction in =
the IETF that is anti-XML
> =20
> From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf =
Of Brian Rosen
> Sent: Thursday, November 07, 2013 12:59 AM
> To: Richard Shockey
> Cc: stir@ietf.org List; Gorman, Pierce A [NTK]; cnit@ietf.org; =
Fernando Mousinho (fmousinh)
> Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
> =20
> I think this would be a heavy lift.
> =20
> If the responsible entity was a carrier, then it would have to =
validate the data, which it has very little basis to validate.  It could =
get a 3rd party to do the validation, but then it=92s putting its =
reputation on the back of some hired hand validator.
> =20
> If the responsibility is the end user/device, then the signature has =
no value.
> =20
> I do not argue that Call-Info is suitable,  it is.
> =20
> I do question JCARD vs xCard, but that=92s an encoding detail.  All of =
SIP Is XML described by schema, not json.
> =20
> Brian
> =20
> On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us> =
wrote:
>=20
>=20
> URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity.  The carrier =
could provision this for their mobile or hosted customers.  Enterprises =
could do this themselves.  This also has advantages in Enterprise to =
Enterprise UC as well where the data is derived from the Enterprise =
=93directory=94 and could facilitate end to end PPX to PBX =
communications especially in point to point video communications.
> =20
> There are certainly privacy and security issues to be addressed.  The =
Push vs Pull model.  This really would be PII in the clear but then its =
done voluntarily.
> =20
> There would have to be some work around restructuring the Header and =
adding some parameters but it=92s underutilized right now and this Use =
Case is a perfectly appropriate use.
> =20
> https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06
> =20
> Obviously it would need to be signed but we don=92t need to worry =
about that ..yet.
> =20
> =46rom 3261
> =20
> 20.9 Call-Info
> =20
>    The Call-Info header field provides additional information about =
the
>    caller or callee, depending on whether it is found in a request or
>    response.  The purpose of the URI is described by the "purpose"
>    parameter.  The "icon" parameter designates an image suitable as an
>    iconic representation of the caller or callee.  The "info" =
parameter
>    describes the caller or callee in general, for example, through a =
web
>    page.  The "card" parameter provides a business card, for example, =
in
>    vCard [36] or LDIF [37] formats.  Additional tokens can be =
registered
>    using IANA and the procedures in Section 27.
> =20
>    Use of the Call-Info header field can pose a security risk.  If a
>    callee fetches the URIs provided by a malicious caller, the callee
>    may be at risk for displaying inappropriate or offensive content,
>    dangerous or illegal content, and so on.  Therefore, it is
>    RECOMMENDED that a UA only render the information in the Call-Info
>    header field if it can verify the authenticity of the element that
>    originated the header field and trusts that element.  This need not
>    be the peer UA; a proxy can insert this header field into requests.
> =20
>    Example:
> =20
>    Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,=

>      <http://www.example.com/alice/> ;purpose=3Dinfo
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: Wednesday, November 06, 2013 3:41 PM
> To: Richard Shockey
> Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; =
stir@ietf.org List
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> We=92ve considered adding some information that is not number and is =
not name, but is something like =93bank=94, which might have some sort =
of validation behind it.
> =20
> Is that along the lines you were thinking?
> =20
> Brian
> On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us> =
wrote:
>=20
>=20
>=20
> I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.  Though =
your use case of credit card validation is a useful one and you are =
right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session validation.
> =20
> It=92s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.
> =20
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit
> =20
> But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.  STIR is essential but it=92s a =
multi-faceted problem that may require multi-faceted solutions.. and =
enhanced CNAM + being only one of them.   Its not unreasonable to =
discuss those.
> =20
> The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs.  I =
would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in question.
> =20
> =20
> =20
> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of Fernando Mousinho (fmousinh)
> Sent: Tuesday, November 05, 2013 6:26 PM
> To: Gorman, Pierce A [NTK]; stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Let me rephrase it=85 it may eliminate the need for other forms of =
caller identification beyond what STIR will provide, depending on the =
specific use case. For example, a credit card company may choose to rely =
entirely on STIR before allowing a card to be unblocked by an IVR (and =
as I said earlier, many companies do it today). In other use cases, the =
TN alone is not sufficient information =96 my health care provider will =
want to know which member of the family is calling.
> =20
> I agree that ANI is already broadly used to improve customer service =
today. However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of companies.
> =20
> =20
> Going on a tangent=85 perhaps this is out of scope, but there is not a =
lot of discussion about called party hijacking. Couldn=92t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it=92s really them before carrying a =
conversation, but wouldn=92t they want the same?=20
> =20
> =20
> From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com>
> Date: Tuesday, November 5, 2013 at 6:05 PM
> To: Fernando Mousinho <fmousinh@cisco.com>, "stir@ietf.org" =
<stir@ietf.org>
> Subject: RE: [stir] draft-peterson-stir-threats-00.txt
> =20
> I agree with your characterization of businesses as victim of caller =
ID fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.  So I don=92t agree that STIR =
would =93eliminate the need for caller identification from known TNs.=94
> =20
> But perhaps I misunderstood your last sentence?
> =20
> =20
> From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]=20
> Sent: November 05, 2013 4:34 PM
> To: stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> I would suggest we add a new attack type to section 3. More and more =
companies are using the caller ID for account validation. For example, =
if I call my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I=92m informed that =
I don=92t need to provide any further identification because my number =
is on file. Some (all?) companies that implement this type of validation =
rely on SS7 today.
> =20
> Ultimately, this is yet another variation of impersonation =96 but in =
this case, the =93victim=94 is a business, unlike the other two =
scenarios we=92ve listed so far.
> =20
> Addressing this scenario would actually turn STIR into a feature, =
given it would enable contact centers of all sizes to eliminate the need =
for caller identification from known TNs.
> =20
> =20
> =20
> From: Alex Bobotek <alex@bobotek.net>
> Date: Tuesday, October 1, 2013 at 12:51 PM
> To: Brian Rosen <br@brianrosen.net>, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> Cc: "stir@ietf.org" <stir@ietf.org>, Richard Shockey =
<richard@shockey.us>, "'DOLLY, MARTIN C'" <md3135@att.com>, 'Robert =
Sparks' <rjsparks@nostrum.com>
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Jon,
> =20
> Thanks for the response.  The intention in #1 below is to clarify the =
following sentence:
> =20
> The primary attack vector is
>    therefore one where the attacker contrives for the calling =
telephone
>    number in signaling to be a particular chosen number, one that the
>    attacker does not have the authority to call from, in order for =
that
>    number to be rendered on the terminating side.=20
> =20
> This might be misconstrued as indicating that the objective of =
spoofing is simply the rendering of a spoofed number on the receiving =
display, causing mistaken conclusions that defenses might be limited to =
securing the rendered information.  No issues with leaving this as it=92s =
a valid point.  Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on CPN.=20
> =20
> So however it=92s worded, I think it=92s important to allow for both =
attack objectives of a spoofed presentation at the endpoint and in =
transit.  =20
> =20
> Regards,
> =20
> Alex
> =20
> > -----Original Message-----
> > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of
> > Brian Rosen
> > Sent: Tuesday, October 01, 2013 9:29 AM
> > To: Peterson, Jon
> > Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; 'DOLLY, MARTIN C'; =
Richard
> > Shockey
> > Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >=20
> > Don't think there is much MESSAGE.  MSRP is about all we see, and =
XMPP is
> > more likely than that.
> >=20
> > Brian
> >=20
> > On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> > wrote:
> >=20
> > > Thanks for these notes, Alex. Some responses below.
> > >
> > >> Here are several comments that should feed into the IETF Peterson =
draft:
> > >>
> > >> *   Remove any assumptions that the solution cannot be in-network
> > [IMO,
> > >> both endpoint and in-network solutions should be facilitated]
> > >
> > > Agreed that both in-band and out-of-band solutions can usually be
> > > implemented in either endpoints or in intermediaries of various =
kinds.
> > > If I see text that implies otherwise, I'll certainly change it.
> > >
> > >> *   Add a sessionless attack scenario.  A spam payload may be =
carried in
> > a
> > >> SIP INVITE or MESSAGE, which might contain stock market advice =
even
> > >> in a display name field.  These attacks do NOT require session
> > establishment.
> > >> More generally, we should be mindful of the fact that SIP is used =
in
> > >> telephony form more than voice session setup.
> > >
> > > Probably if we were going to include a sessionless attack =
scenario, it
> > > would be with regular text messages (whether carried on the PSTN =
over
> > > TCAP or with some Internet protocol, including MESSAGE) rather =
than
> > > with an INVITE, which typically wouldn't result in a payload being
> > > immediately rendered to a user. More on this below with your =
suggested
> > text.
> > >
> > >> Here's some suggested markup:
> > >>
> > >>
> > >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction =
with:
> > >>
> > >> The primary attack vector is
> > >>  therefore one where the attacker contrives for the calling =
telephone
> > >> number in signaling to be a particular chosen number that the
> > >> attacker does not have the authority to call from.
> > >
> > > What you want here is to remove the implication that the number =
will
> > > be rendered on the terminating side? While there are some attacks
> > > where that isn't significant, perhaps, I would say it is =
significant
> > > in the primary attack vectors that concern us.
> > >
> > >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> > >>
> > >>     Smart devices are generally based on computers with some =
degree
> > >> of programmability, the capacity to access the Internet, and
> > >> capabilities of rendering text, audio and/or images.  This =
includes
> > >> smart phones, telephone applications on desktop and laptop =
computers,
> > >> IP private branch exchanges, and so on.
> > >
> > > I can add the notion that smart devices can render text, audio =
and/or
> > > images as you suggest.
> > >
> > >> 3.  Add to 3.3 Attack Scenarios:
> > >>
> > >>       Impersonation, IP-Mobile Text Message
> > >>
> > >>        An attacker with an computer sends a high volume of SIP =
MESSAGE
> > >> spam message to IP-enabled smart phones using randomized calling
> > >> party numbers.
> > >>
> > >>       Countermeasure: in-band authenticated identity
> > >
> > > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > > that in-band would be the right countermeasure. I am curious =
though
> > > whether practically speaking there is enough use of MESSAGE in =
this
> > > fashion that we're actually seeing high-volume spam over MESSAGE
> > > today. Either way, no problem having an attack scenario of this =
form in the
> > document.
> > >
> > > Jon Peterson
> > > Neustar, Inc.
> > >
> > >> Regards,
> > >>
> > >> Alex
> > >>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of Richard Shockey
> > >>> Sent: Monday, September 30, 2013 1:11 PM
> > >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> +1
> > >>>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of DOLLY, MARTIN C
> > >>> Sent: Monday, September 30, 2013 12:58 PM
> > >>> To: Robert Sparks
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> Yes, ok
> > >>>
> > >>> Martin Dolly
> > >>> Lead Member of Technical Staff
> > >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> > >>> Technology
> > >>> +1-609-903-3360
> > >>> md3135@att.com
> > >>>
> > >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> > >>>> <rjsparks@nostrum.com>
> > >>> wrote:
> > >>>>
> > >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> > >>>>> With Hadriel comments incorporated, it is a start
> > >>>> Hi Martin -
> > >>>>
> > >>>> Just to make sure - I think you're referring to Hadriel's =
comments
> > >>>> on the
> > >>> problem statement document?
> > >>>> I don't think Hadriel's commented directly on stir-threats yet.
> > >>>>
> > >>>> In any case, we _are_ talking about a starting place, not a
> > >>>> finished
> > >>> product.
> > >>>>
> > >>>> If there's no other objection, I'd like to get Jon to submit =
the
> > >>>> threats
> > >>> document as a WG -00 as soon as it's convenient.
> > >>>>
> > >>>> RjS
> > >>>>>
> > >>>>> -----Original Message-----
> > >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On
> > >>>>> Behalf Of Russ Housley
> > >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> > >>>>> To: IETF STIR Mail List
> > >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>>>
> > >>>>> It has been six days, I'd like to hear from more people about =
this
> > >>> document.  Martin asked for an additional week, so I'm sure we =
will
> > >>> hear from him soon.
> > >>>>>
> > >>>>> Russ
> > >>>>>
> > >>>>>
> > >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> > >>>>>>
> > >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> > >>>>>>
> > >>>>>> Should the working group adopt this I-D as the starting point =
for
> > >>>>>> the
> > >>> STIR threat docuent?
> > >>>>>>
> > >>>>>> Russ
> > >>>>> _______________________________________________
> > >>>>> stir mailing list
> > >>>>> stir@ietf.org
> > >>>>> https://www.ietf.org/mailman/listinfo/stir
> > >>>>
> > >>>> _______________________________________________
> > >>>> stir mailing list
> > >>>> stir@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/stir
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >>>
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >> _______________________________________________
> > >> stir mailing list
> > >> stir@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/stir
> > >
> > > _______________________________________________
> > > stir mailing list
> > > stir@ietf.org
> > > https://www.ietf.org/mailman/listinfo/stir
> >=20
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org
> > https://www.ietf.org/mailman/listinfo/stir
> =20
>=20
> This e-mail may contain Sprint proprietary information intended for =
the sole use of the recipient(s). Any use by others is prohibited. If =
you are not the intended recipient, please contact the sender and delete =
all copies of the message.
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir


--Apple-Mail=_4AC161E6-68CE-4F8A-8156-0728D2677122
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">We=92re =
agreeing CNAM doesn=92t work, it lies, and we have to fix =
that.<div><br></div><div>Billing relationships are useful, but only give =
you return routability properties. &nbsp;Not very interesting, and =
billing addresses aren=92t often what is wanted. &nbsp;Given various =
corporate relationships that are tolerated by carriers, it would be =
trivial to make the billing name be anything you wanted it to be and get =
service from most carriers. &nbsp;</div><div><br></div><div>I think it =
IS possible to validate a name, as long as you allow a probability of =
that validation to be carried, because the techniques we have aren=92t =
definitive. &nbsp;</div><div><br></div><div>See prior reply on the =
category idea, which I think is workable.</div><div><br></div><div>FWIW, =
I am in favor of an in band solution for CNAM - display name of =
From.</div><div><br></div><div>You proposed a VCARD. &nbsp;I think that =
is unworkable. &nbsp;Name is hard enough. &nbsp;We might be able to get =
an address. &nbsp;All the other fields in a VCARD are pretty =
dicey.</div><div><br></div><div><br></div><div><div><div><div>On Nov 7, =
2013, at 7:16 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Like CNAM is so accurate today=85 ??&nbsp; When =
certain companies get the data from scanning phone books that are not =
even printed anymore?<o:p></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">The carrier has the =
billing relationship. As you well know that is where the data comes from =
now but it is not granular.&nbsp;<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">The carrier permits the =
customer to create the record(s). What are you trying to validate? The =
Accuracy of the data?&nbsp; =85 In any event none of that is our =
problem.&nbsp; &nbsp;We make the tools. Someone else worries about =
policy.<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">You are making this way too complicated thus =
defeating the basic use case.&nbsp;&nbsp;<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">Well from time to time =
I=92ve discovered I=92m not a big fan of the end to end principal.&nbsp; =
It just doesn=92t work for every use case.&nbsp; This is a carrier =
service or in certain cases hosted.<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">Much like I=92m convinced =
the out of band solution in STIR is total fantasy and like VIPR will =
almost never actually be used in practice.<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">As for encoding I =
mentioned JCARD since there seems to be a faction in the IETF that is =
anti-XML<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div><div style=3D"border-style: =
solid none none; border-top-color: rgb(225, 225, 225); border-top-width: =
1pt; padding: 3pt 0in 0in;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><b><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit-bounces@ietf.org">cnit-bounces@ietf.org</a> [<a =
href=3D"mailto:cnit-bounces@ietf.org">mailto:cnit-bounces@ietf.org</a>]<sp=
an class=3D"Apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"Apple-converted-space">&nbsp;</span></b>Brian =
Rosen<br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
12:59 AM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span class=3D"Apple-converted-space">&nbsp;</span><a=
 href=3D"mailto:stir@ietf.org">stir@ietf.org</a> List; Gorman, Pierce A =
[NTK]; <a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a>; Fernando =
Mousinho (fmousinh)<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I =
think this would be a heavy lift.<o:p></o:p></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">If the responsible entity was a carrier, then it =
would have to validate the data, which it has very little basis to =
validate. &nbsp;It could get a 3rd party to do the validation, but then =
it=92s putting its reputation on the back of some hired hand =
validator.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">If =
the responsibility is the end user/device, then the signature has no =
value.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I do =
not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I do =
question JCARD vs xCard, but that=92s an encoding detail. &nbsp;All of =
SIP Is XML described by schema, not =
json.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">Brian<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;"><br><br><o:p></o:p></div><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, 125);">URI =
for a JCARD in the CALL INFO header provisioned by the calling party and =
ultimately signed by the responsible entity. &nbsp;The carrier could =
provision this for their mobile or hosted customers.&nbsp; Enterprises =
could do this themselves.&nbsp; This also has advantages in Enterprise =
to Enterprise UC as well where the data is derived from the Enterprise =
=93directory=94 and could facilitate end to end PPX to PBX =
communications especially in point to point video =
communications.</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">There are certainly privacy and =
security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp; =
This really would be PII in the clear but then its done =
voluntarily.</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">There would have to be some work =
around restructuring the Header and adding some parameters but it=92s =
underutilized right now and this Use Case is a perfectly appropriate =
use.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06" =
style=3D"color: purple; text-decoration: =
underline;">https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</a></=
span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Obviously it would need to be signed but we don=92t =
need to worry about that ..yet.</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">=46rom 3261</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">20.9 Call-Info</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; The Call-Info header field provides =
additional information about the</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; caller or =
callee, depending on whether it is found in a request =
or</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; response.&nbsp; The purpose of the URI =
is described by the "purpose"</span><o:p></o:p></div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; parameter.&nbsp; The =
"icon" parameter designates an image suitable as =
an</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; iconic representation of the caller or =
callee.&nbsp; The "info" parameter</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; describes =
the caller or callee in general, for example, through a =
web</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; page.&nbsp; The "card" parameter =
provides a business card, for example, in</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; vCard [36] =
or LDIF [37] formats.&nbsp; Additional tokens can be =
registered</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; Use of the Call-Info =
header field can pose a security risk.&nbsp; If =
a</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; callee fetches the URIs provided by a =
malicious caller, the callee</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; may be at risk for =
displaying inappropriate or offensive =
content,</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; dangerous or illegal content, and so =
on.&nbsp; Therefore, it is</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; RECOMMENDED that a UA =
only render the information in the Call-Info</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; header field =
if it can verify the authenticity of the element =
that</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; originated the header field and trusts =
that element.&nbsp; This need not</span><o:p></o:p></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into =
requests.</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; =
Example:</span><o:p></o:p></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg" style=3D"color: purple; =
text-decoration: =
underline;">http://wwww.example.com/alice/photo.jpg</a>&gt; =
;purpose=3Dicon,</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/" style=3D"color: purple; =
text-decoration: underline;">http://www.example.com/alice/</a>&gt; =
;purpose=3Dinfo</span><o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span>Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;">mailto:br@brianrosen.net</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Wednesday, November 06, =
2013 3:41 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Fernando Mousinho =
(fmousinh); Gorman, Pierce A [NTK];<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>List<br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">We=92ve=
 considered adding some information that is not number and is not name, =
but is something like =93bank=94, which might have some sort of =
validation behind it.<o:p></o:p></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">Is =
that along the lines you were thinking?<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">Brian<o:p></o:p></div><div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;"><br><br><br><o:p></o:p></div><blockquote style=3D"margin-top: =
5pt; margin-bottom: 5pt;"><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">I agree with Pierce here and respectfully disagree =
that STIR might eliminate the need for other forms of caller =
identification.&nbsp; Though your use case of credit card validation is =
a useful one and you are right there are still applications that use SS7 =
for things that have nothing to do with call setup. I agree with you =
STIR may have more applications beyond the obvious ones of realtime =
session validation.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">It=92s been my experience recently =
that there is a use case for something MORE in the identification of the =
session as it is presented to the called party. This is the CNAM + idea =
we are kicking around on the CNIT =
list.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">_______________________________________________</span><o:p></o:p></=
div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);">cnit mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);"><a href=3D"mailto:cnit@ietf.org" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">cnit@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"https://www.ietf.org/mailman/listinfo/cnit" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">https://www.ietf.org/mailman/listinfo/cnit</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">But your use case of a bank =
wanting to make sure they could properly identify themselves to the =
consumer before establishing a conversation is exactly what this process =
is about.&nbsp; STIR is essential but it=92s a multi-faceted problem =
that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.&nbsp;&nbsp; Its not unreasonable to discuss =
those.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">The obviously analogy is =
I would want to see some real identification of a utility worker before =
I let them into my house to make repairs. &nbsp;I would want some =
validation that the call to me to reconfirm the appointments was in fact =
from the utility in question.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;"><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">stir-bounces@ietf.org</a><span =
class=3D"Apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;">mailto:stir-bounces@ietf.org</a>]<span =
class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce A =
[NTK];<span class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Let me rephrase it=85 it may eliminate the need =
for other forms of caller identification beyond what STIR will provide, =
depending on the specific use case. For example, a credit card company =
may choose to rely entirely on STIR before allowing a card to be =
unblocked by an IVR (and as I said earlier, many companies do it today). =
In other use cases, the TN alone is not sufficient information =96 my =
health care provider will want to know which member of the family is =
calling.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">I agree that ANI is already broadly used to =
improve customer service today. However, it is not usually deemed as a =
secure enough mechanism to validate the caller (therefore this WG!), =
except if you are a large organization that can leverage things like =
SS7. STIR would make this type of validation available to a broader =
number of companies.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Going on a tangent=85 perhaps this is out of =
scope, but there is not a lot of discussion about called party =
hijacking. Couldn=92t a man-in-the-middle try to answer calls on my =
behalf? If my bank is calling me, I want to make sure it=92s really them =
before carrying a conversation, but wouldn=92t they want the =
same?&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&lt;Gorman&gt;, "Pierce A [NTK]" &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, November 5, =
2013 at 6:05 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
&lt;<a href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">fmousinh@cisco.com</span></a>&gt;, "<a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>" &lt;<a href=3D"mailto:stir@ietf.org" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 rgb(149, 79, 114);">stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, 204);">I agree with your characterization =
of businesses as victim of caller ID fraud however contact centers also =
use TN as a key to improve information available to call agents to =
reduce average time-per-call and increase capacity of the call =
center.&nbsp; So I don=92t agree that STIR would =93eliminate the need =
for caller identification from known =
TNs.=94</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, =
204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;">Fernando Mousinho (fmousinh) [<a =
href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">mailto:fmousinh@cisco.com</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">I would suggest we add a new attack type to =
section 3. More and more companies are using the caller ID for account =
validation. For example, if I call my credit card provider from my =
office number, they ask me for identification. If I call from my home =
phone number, I=92m informed that I don=92t need to provide any further =
identification because my number is on file. Some (all?) companies that =
implement this type of validation rely on SS7 =
today.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Ultimately, this is yet another variation of =
impersonation =96 but in this case, the =93victim=94 is a business, =
unlike the other two scenarios we=92ve listed so =
far.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Addressing this scenario would actually turn STIR =
into a feature, given it would enable contact centers of all sizes to =
eliminate the need for caller identification from known =
TNs.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, October 1, =
2013 at 12:51 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">br@brianrosen.net</span></a>&gt;, "Peterson, Jon" &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:<span =
class=3D"apple-converted-space">&nbsp;</span></b>"<a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>" &lt;<a href=3D"mailto:stir@ietf.org" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 rgb(149, 79, 114);">stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">richard@shockey.us</span></a>&gt;, "'DOLLY, MARTIN C'" &lt;<a =
href=3D"mailto:md3135@att.com" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;<a =
href=3D"mailto:rjsparks@nostrum.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">rjsparks@nostrum.com</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Jon,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Thanks for the response.&nbsp; The intention in #1 =
below is to clarify the following =
sentence:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">The<span =
class=3D"apple-converted-space">&nbsp;</span><b>primary</b><span =
class=3D"apple-converted-space">&nbsp;</span>attack vector =
is</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; therefore one where the attacker contrives for =
the calling telephone</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;&nbsp; number in signaling to be a =
particular chosen number, one that =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; attacker does not have the authority to call =
from,<span class=3D"apple-converted-space">&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; number to be rendered on the terminating =
side</span></b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">.&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">This might be misconstrued as indicating that the =
objective of spoofing is simply the rendering of a spoofed number on the =
receiving display, causing mistaken conclusions that defenses might be =
limited to securing the rendered information. &nbsp;No issues with =
leaving this as it=92s a valid point.&nbsp; Another (increasing) =
motivation is to evade network and/or endpoint defenses that may block =
based on CPN.&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">So however it=92s worded, I think it=92s important =
to allow for both attack objectives of a spoofed presentation at the =
endpoint and in transit.&nbsp; =
&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Regards,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Alex</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">mailto:stir-bounces@ietf.org</span></a>] On Behalf =
Of</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Brian =
Rosen</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Sent: =
Tuesday, October 01, 2013 9:29 AM</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; To: Peterson, =
Jon</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY, =
MARTIN C'; Richard</span><o:p></o:p></div></div><div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; Shockey</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Don't think there is much MESSAGE.&nbsp; MSRP =
is about all we see, and XMPP is</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; more likely than =
that.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Brian</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
&lt;<a href=3D"mailto:jon.peterson@neustar.biz" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">jon.peterson@neustar.biz</span></a>&gt;</span><o:p></o:p></div></di=
v><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; =
wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Thanks for these notes, Alex. Some =
responses below.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; Here are several comments that =
should feed into the IETF Peterson =
draft:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; [IMO,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; both endpoint and in-network =
solutions should be facilitated]</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Agreed that both in-band and out-of-band =
solutions can usually be</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; implemented in either endpoints or in =
intermediaries of various kinds.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; If I see text that implies otherwise, =
I'll certainly change it.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessionless =
attack scenario.&nbsp; A spam payload may be carried =
in</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
a</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
establishment.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; More generally, we should be mindful of the =
fact that SIP is used in</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; telephony form more than voice =
session setup.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Probably if we were going to include a =
sessionless attack scenario, it</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; would be with regular text messages =
(whether carried on the PSTN over</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; TCAP or with some Internet protocol, =
including MESSAGE) rather than</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; with an INVITE, which typically wouldn't =
result in a payload being</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; immediately rendered to a user. More on =
this below with your suggested</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; text.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; The primary attack vector =
is</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; number in signaling to be a particular chosen =
number that the</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt; in the primary attack vectors that concern =
us.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; of programmability, the capacity to =
access the Internet, and</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; capabilities of rendering text, =
audio and/or images.&nbsp; This =
includes</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; I =
can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
images as you suggest.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Provided we're talking about end-to-end =
SIP use of MESSAGE, agreed</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; that in-band would be the right =
countermeasure. I am curious =
though</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
document.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Jon =
Peterson</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; =
Regards,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; Alex</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Of Richard Shockey</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 =
1:11 PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; +1</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN C</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 =
12:58 PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; To: Robert Sparks</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Cc:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; Yes, =
ok</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; Martin =
Dolly</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
Technology</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
+1-609-903-3360</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:md3135@att.com" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">md3135@att.com</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, "Robert =
Sparks"</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 windowtext; text-decoration: =
none;">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></div></div><d=
iv><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; =
wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN =
C wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt; Hi Martin -</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; Just to make sure - I think you're =
referring to Hadriel's comments</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; on =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; I don't think Hadriel's commented =
directly on stir-threats yet.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; In any case, we _are_ talking about a =
starting place, not a</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; =
finished</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; If there's no other objection, I'd =
like to get Jon to submit the</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; =
threats</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; =
RjS</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] =
On</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; It has been six days, =
I'd like to hear from more people about =
this</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; hear from him =
soon.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at =
5:23 PM, Russ Housley wrote:</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 windowtext; text-decoration: =
none;">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</span></a=
></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should the working =
group adopt this I-D as the starting point =
for</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; the</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; STIR threat =
docuent?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; stir =
mailing list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; &gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div class=3D"MsoNormal" =
align=3D"center" style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-align: center;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;"><hr =
size=3D"3" width=3D"100%" align=3D"center"></span></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 7.5pt; font-family: Arial, =
sans-serif; color: gray;"><br>This e-mail may contain Sprint proprietary =
information intended for the sole use of the recipient(s). Any use by =
others is prohibited. If you are not the intended recipient, please =
contact the sender and delete all copies of the =
message.</span><o:p></o:p></div></div></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif;">_______________________________________________<br>stir =
mailing list<br><a href=3D"mailto:stir@ietf.org" style=3D"color: purple; =
text-decoration: underline;">stir@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/stir</a></span></div></b=
lockquote></div></div></blockquote></div></div></div></blockquote></div><b=
r></div></div></body></html>=

--Apple-Mail=_4AC161E6-68CE-4F8A-8156-0728D2677122--

From michael.hammer@yaanatech.com  Thu Nov  7 09:11:05 2013
Return-Path: <michael.hammer@yaanatech.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7BBA21E812B; Thu,  7 Nov 2013 09:11:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.236
X-Spam-Level: 
X-Spam-Status: No, score=-2.236 tagged_above=-999 required=5 tests=[AWL=0.362,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jvMadk4jHWmd; Thu,  7 Nov 2013 09:10:52 -0800 (PST)
Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id DBA0C21E821A; Thu,  7 Nov 2013 09:10:26 -0800 (PST)
Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Thu, 7 Nov 2013 09:10:26 -0800
From: Michael Hammer <michael.hammer@yaanatech.com>
To: "br@brianrosen.net" <br@brianrosen.net>, "Henning.Schulzrinne@fcc.gov" <Henning.Schulzrinne@fcc.gov>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQIJuyR31NLy1lMhJkGcqWArv1sc1QINOqbRAr/2giEC0l///wF434JzmR/4cmCAAD+vQIABiMQAgAABSwCAABcWAIA3YVcAgAAInoCAAAXVgIAA6nqAgAB5wgCAAAhegIAAk5aAgACVVgCAAAHaAP//gKwwgACTmgCAAA4fAP//exIA
Date: Thu, 7 Nov 2013 17:10:24 +0000
Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov> <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net>
In-Reply-To: <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.17.100.142]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0085_01CEDBB2.56084FD0"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, "fmousinh@cisco.com" <fmousinh@cisco.com>, "cnit@ietf.org" <cnit@ietf.org>, "richard@shockey.us" <richard@shockey.us>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:11:05 -0000

------=_NextPart_000_0085_01CEDBB2.56084FD0
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0086_01CEDBB2.56084FD0"


------=_NextPart_001_0086_01CEDBB2.56084FD0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

So, how does the average user know who is an authority?

(Note, we are not designing for IETF geniuses here.)

 

Is some well-known central authority going to certify all of these?

Are each of these going to cross-certify all the others? (federated model)

 

We need to always answer that fundamental user question:

Why should I TRUST this information?

 

Mike

 

 

From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: Thursday, November 07, 2013 12:03 PM
To: Henning Schulzrinne
Cc: Michael Hammer; Pierce.Gorman@sprint.com; Richard Shockey;
stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Right.  I believe we can do this pretty easily.  We probably could have a
100 categories that would have similar authorities, and there are
classifications maintained by folks like Dun Bradstreet that can go even
farther.

 

What I think would be substantially harder is to validate an entire V/X/J
card.  How is a validator to know your nickname is Fluffy?  Name, phone
number and, if a business, a classification, yes, we can do that.  Content
of a business card - very hard.

 

Brian

 

 

On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne
<Henning.Schulzrinne@fcc.gov> wrote:





Yes, that's a problem, but as long as the number of categories is small, you
can build UIs that only render information that's appropriate to the
declaration. For practical reasons, I think the number of useful categories
is likely going to be fairly limited:

-          Financial institution (FDIC and a few others)

-          Health care (each health care facility has a gov't number)

-          Charity (501c3, state registered)

-          Contractor (state-licensed)

-          Public safety organization (police, fire)

-          Lawyer (bar association)

-          Local, state and federal government (.gov in the US)

 

I suspect that list encompasses a large fraction of the fraudulent
(impersonation) calls. For all of the above, at least within a country, it's
pretty clear who can attest to the membership. Yes, this requires some UI
work or some server logic, but these categories and the organizations don't
change all that often - in most cases, the certifying entities have probably
been the same for the past 50+ years. I'm not as worried about figuring out
whether the beautician, mortician or florist is licensed and properly
identified, although I'm sure we can all come up with potential fraud
stories.

 

From: Michael Hammer [mailto:michael.hammer@yaanatech.com] 
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net;
richard@shockey.us
Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

So, would you trust a certificate from the City of Reston, Virginia police
department?

 

(Hint:  you can find Reston on a map, but there is no City of Reston. 

  The only police are Fairfax County.)

 

My concern is that one you dilute or disperse authority, it becomes a
free-for-all again, and anybody's guess.

 

Mike

 

 

From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of
Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc:  <mailto:stir@ietf.org> stir@ietf.org List; Fernando Mousinho
(fmousinh);  <mailto:cnit@ietf.org> cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

As a thought experiment, Kumiko Ono and I had published a draft

 

 <http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00>
http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

 

to allow third parties to validate property information. If the validating
party (e.g., a bank regulator) is willing to sign a certificate, similar in
spirit to the framed gold-leaf diplomas in your dentist's office or, more
lowly, to the health departments rating in a restaurant window, and it can
be tied to a phone number, this shouldn't be too hard.

 

It's a bit harder if the certifying authority (regulator, Realtor board,
local bar association, .) is not involved.

 

Henning

 

From:  <mailto:cnit-bounces@ietf.org> cnit-bounces@ietf.org
<mailto:[mailto:cnit-bounces@ietf.org]> [mailto:cnit-bounces@ietf.org] On
Behalf Of Gorman, Pierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc:  <mailto:stir@ietf.org> stir@ietf.org List;  <mailto:cnit@ietf.org>
cnit@ietf.org; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

 

I'll admit I am not familiar with v/x/jcard encoding differences or the
implications of their use so I'll encourage educating me if it isn't too
onerous.

 

I'm not sure what is the concern with a 3rd party providing "validation"
though.  There are numerous examples of 3rd parties providing validation of
information including NASDAQ, NYSE, Barron's, Moody's, and the federal
reserve banking system to name a few.

 

Pierce

 

From: Brian Rosen [ <mailto:br@brianrosen.net> mailto:br@brianrosen.net] 
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK];
<mailto:stir@ietf.org> stir@ietf.org List;  <mailto:cnit@ietf.org>
cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I think this would be a heavy lift.

 

If the responsible entity was a carrier, then it would have to validate the
data, which it has very little basis to validate.  It could get a 3rd party
to do the validation, but then it's putting its reputation on the back of
some hired hand validator.

 

If the responsibility is the end user/device, then the signature has no
value.

 

I do not argue that Call-Info is suitable,  it is.

 

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is
XML described by schema, not json.

 

Brian

 

On Nov 6, 2013, at 1:10 PM, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us> wrote:

 

URI for a JCARD in the CALL INFO header provisioned by the calling party and
ultimately signed by the responsible entity.  The carrier could provision
this for their mobile or hosted customers.  Enterprises could do this
themselves.  This also has advantages in Enterprise to Enterprise UC as well
where the data is derived from the Enterprise "directory" and could
facilitate end to end PPX to PBX communications especially in point to point
video communications.

 

There are certainly privacy and security issues to be addressed.  The Push
vs Pull model.  This really would be PII in the clear but then its done
voluntarily.

 

There would have to be some work around restructuring the Header and adding
some parameters but it's underutilized right now and this Use Case is a
perfectly appropriate use.

 

 <https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06>
https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

 

Obviously it would need to be signed but we don't need to worry about that
..yet.

 

>From 3261

 

20.9 Call-Info

 

   The Call-Info header field provides additional information about the

   caller or callee, depending on whether it is found in a request or

   response.  The purpose of the URI is described by the "purpose"

   parameter.  The "icon" parameter designates an image suitable as an

   iconic representation of the caller or callee.  The "info" parameter

   describes the caller or callee in general, for example, through a web

   page.  The "card" parameter provides a business card, for example, in

   vCard [36] or LDIF [37] formats.  Additional tokens can be registered

   using IANA and the procedures in Section 27.

 

   Use of the Call-Info header field can pose a security risk.  If a

   callee fetches the URIs provided by a malicious caller, the callee

   may be at risk for displaying inappropriate or offensive content,

   dangerous or illegal content, and so on.  Therefore, it is

   RECOMMENDED that a UA only render the information in the Call-Info

   header field if it can verify the authenticity of the element that

   originated the header field and trusts that element.  This need not

   be the peer UA; a proxy can insert this header field into requests.

 

   Example:

 

   Call-Info: < <http://wwww.example.com/alice/photo.jpg>
http://wwww.example.com/alice/photo.jpg> ;purpose=icon,

     < <http://www.example.com/alice/> http://www.example.com/alice/>
;purpose=info

 

From: Brian Rosen [ <mailto:br@brianrosen.net> mailto:br@brianrosen.net] 
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK];
<mailto:stir@ietf.org> stir@ietf.org List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

We've considered adding some information that is not number and is not name,
but is something like "bank", which might have some sort of validation
behind it.

 

Is that along the lines you were thinking?

 

Brian

On Nov 6, 2013, at 5:25 AM, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us> wrote:

 

I agree with Pierce here and respectfully disagree that STIR might eliminate
the need for other forms of caller identification.  Though your use case of
credit card validation is a useful one and you are right there are still
applications that use SS7 for things that have nothing to do with call
setup. I agree with you STIR may have more applications beyond the obvious
ones of realtime session validation.

 

It's been my experience recently that there is a use case for something MORE
in the identification of the session as it is presented to the called party.
This is the CNAM + idea we are kicking around on the CNIT list.

 

_______________________________________________

cnit mailing list

 <mailto:cnit@ietf.org> cnit@ietf.org

 <https://www.ietf.org/mailman/listinfo/cnit>
https://www.ietf.org/mailman/listinfo/cnit

 

But your use case of a bank wanting to make sure they could properly
identify themselves to the consumer before establishing a conversation is
exactly what this process is about.  STIR is essential but it's a
multi-faceted problem that may require multi-faceted solutions.. and
enhanced CNAM + being only one of them.   Its not unreasonable to discuss
those.

 

The obviously analogy is I would want to see some real identification of a
utility worker before I let them into my house to make repairs.  I would
want some validation that the call to me to reconfirm the appointments was
in fact from the utility in question.

 

 

 

From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of
Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK];  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Let me rephrase it. it may eliminate the need for other forms of caller
identification beyond what STIR will provide, depending on the specific use
case. For example, a credit card company may choose to rely entirely on STIR
before allowing a card to be unblocked by an IVR (and as I said earlier,
many companies do it today). In other use cases, the TN alone is not
sufficient information - my health care provider will want to know which
member of the family is calling.

 

I agree that ANI is already broadly used to improve customer service today.
However, it is not usually deemed as a secure enough mechanism to validate
the caller (therefore this WG!), except if you are a large organization that
can leverage things like SS7. STIR would make this type of validation
available to a broader number of companies.

 

 

Going on a tangent. perhaps this is out of scope, but there is not a lot of
discussion about called party hijacking. Couldn't a man-in-the-middle try to
answer calls on my behalf? If my bank is calling me, I want to make sure
it's really them before carrying a conversation, but wouldn't they want the
same? 

 

 

From: <Gorman>, "Pierce A [NTK]" < <mailto:Pierce.Gorman@sprint.com>
Pierce.Gorman@sprint.com>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho < <mailto:fmousinh@cisco.com> fmousinh@cisco.com>, "
<mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

I agree with your characterization of businesses as victim of caller ID
fraud however contact centers also use TN as a key to improve information
available to call agents to reduce average time-per-call and increase
capacity of the call center.  So I don't agree that STIR would "eliminate
the need for caller identification from known TNs."

 

But perhaps I misunderstood your last sentence?

 

 

From: Fernando Mousinho (fmousinh) [ <mailto:fmousinh@cisco.com>
mailto:fmousinh@cisco.com] 
Sent: November 05, 2013 4:34 PM
To:  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I would suggest we add a new attack type to section 3. More and more
companies are using the caller ID for account validation. For example, if I
call my credit card provider from my office number, they ask me for
identification. If I call from my home phone number, I'm informed that I
don't need to provide any further identification because my number is on
file. Some (all?) companies that implement this type of validation rely on
SS7 today.

 

Ultimately, this is yet another variation of impersonation - but in this
case, the "victim" is a business, unlike the other two scenarios we've
listed so far.

 

Addressing this scenario would actually turn STIR into a feature, given it
would enable contact centers of all sizes to eliminate the need for caller
identification from known TNs.

 

 

 

From: Alex Bobotek < <mailto:alex@bobotek.net> alex@bobotek.net>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen < <mailto:br@brianrosen.net> br@brianrosen.net>, "Peterson,
Jon" < <mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>
Cc: " <mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us>, "'DOLLY, MARTIN C'" < <mailto:md3135@att.com>
md3135@att.com>, 'Robert Sparks' < <mailto:rjsparks@nostrum.com>
rjsparks@nostrum.com>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Jon,

 

Thanks for the response.  The intention in #1 below is to clarify the
following sentence:

 

The primary attack vector is

   therefore one where the attacker contrives for the calling telephone

   number in signaling to be a particular chosen number, one that the

   attacker does not have the authority to call from, in order for that

   number to be rendered on the terminating side. 

 

This might be misconstrued as indicating that the objective of spoofing is
simply the rendering of a spoofed number on the receiving display, causing
mistaken conclusions that defenses might be limited to securing the rendered
information.  No issues with leaving this as it's a valid point.  Another
(increasing) motivation is to evade network and/or endpoint defenses that
may block based on CPN. 

 

So however it's worded, I think it's important to allow for both attack
objectives of a spoofed presentation at the endpoint and in transit.   

 

Regards,

 

Alex

 

> -----Original Message-----

> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc:  <mailto:stir@ietf.org> stir@ietf.org; Alex Bobotek; 'Robert Sparks';
'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> 

> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

> 

> Brian

> 

> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <
<mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>

> wrote:

> 

> > Thanks for these notes, Alex. Some responses below.

> >

> >> Here are several comments that should feed into the IETF Peterson
draft:

> >>

> >> *   Remove any assumptions that the solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions should be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can usually be

> > implemented in either endpoints or in intermediaries of various kinds.

> > If I see text that implies otherwise, I'll certainly change it.

> >

> >> *   Add a sessionless attack scenario.  A spam payload may be carried
in

> a

> >> SIP INVITE or MESSAGE, which might contain stock market advice even

> >> in a display name field.  These attacks do NOT require session

> establishment.

> >> More generally, we should be mindful of the fact that SIP is used in

> >> telephony form more than voice session setup.

> >

> > Probably if we were going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the PSTN over

> > TCAP or with some Internet protocol, including MESSAGE) rather than

> > with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this below with your suggested

> text.

> >

> >> Here's some suggested markup:

> >>

> >>

> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:

> >>

> >> The primary attack vector is

> >>  therefore one where the attacker contrives for the calling telephone

> >> number in signaling to be a particular chosen number that the

> >> attacker does not have the authority to call from.

> >

> > What you want here is to remove the implication that the number will

> > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, I would say it is significant

> > in the primary attack vectors that concern us.

> >

> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:

> >>

> >>     Smart devices are generally based on computers with some degree

> >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio and/or images.  This includes

> >> smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.

> >

> > I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3.3 Attack Scenarios:

> >>

> >>       Impersonation, IP-Mobile Text Message

> >>

> >>        An attacker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using randomized calling

> >> party numbers.

> >>

> >>       Countermeasure: in-band authenticated identity

> >

> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeasure. I am curious though

> > whether practically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over MESSAGE

> > today. Either way, no problem having an attack scenario of this form in
the

> document.

> >

> > Jon Peterson

> > Neustar, Inc.

> >

> >> Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of Richard Shockey

> >>> Sent: Monday, September 30, 2013 1:11 PM

> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> +1

> >>>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM

> >>> To: Robert Sparks

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> Yes, ok

> >>>

> >>> Martin Dolly

> >>> Lead Member of Technical Staff

> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network

> >>> Technology

> >>> +1-609-903-3360

> >>>  <mailto:md3135@att.com> md3135@att.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"

> >>>> < <mailto:rjsparks@nostrum.com> rjsparks@nostrum.com>

> >>> wrote:

> >>>>

> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:

> >>>>> With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >>>>

> >>>> Just to make sure - I think you're referring to Hadriel's comments

> >>>> on the

> >>> problem statement document?

> >>>> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

> >>>> In any case, we _are_ talking about a starting place, not a

> >>>> finished

> >>> product.

> >>>>

> >>>> If there's no other objection, I'd like to get Jon to submit the

> >>>> threats

> >>> document as a WG -00 as soon as it's convenient.

> >>>>

> >>>> RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On

> >>>>> Behalf Of Russ Housley

> >>>>> Sent: Thursday, September 26, 2013 4:37 PM

> >>>>> To: IETF STIR Mail List

> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from more people about this

> >>> document.  Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>>> Russ

> >>>>>

> >>>>>

> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:

> >>>>>>

> >>>>>>  <http://www.ietf.org/id/draft-peterson-stir-threats-00.txt>
http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group adopt this I-D as the starting point for

> >>>>>> the

> >>> STIR threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _______________________________________________

> >>>>> stir mailing list

> >>>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>>

> >>>> _______________________________________________

> >>>> stir mailing list

> >>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >> _______________________________________________

> >> stir mailing list

> >>  <mailto:stir@ietf.org> stir@ietf.org

> >>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >

> > _______________________________________________

> > stir mailing list

> >  <mailto:stir@ietf.org> stir@ietf.org

> >  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> 

> _______________________________________________

> stir mailing list

>  <mailto:stir@ietf.org> stir@ietf.org

>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


  _____  



This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

_______________________________________________
stir mailing list
 <mailto:stir@ietf.org> stir@ietf.org
 <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 

 

 

  _____  


This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

 


------=_NextPart_001_0086_01CEDBB2.56084FD0
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>So, how does the average user know who is an =
authority?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>(Note, we are not designing for IETF geniuses =
here.)<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Is some well-known central authority going to certify all of =
these?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Are each of these going to cross-certify all the others? (federated =
model)<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>We need to always answer that fundamental user =
question:<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Why should I TRUST this information?<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Mike<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Brian Rosen [mailto:br@brianrosen.net] <br><b>Sent:</b> Thursday, =
November 07, 2013 12:03 PM<br><b>To:</b> Henning =
Schulzrinne<br><b>Cc:</b> Michael Hammer; Pierce.Gorman@sprint.com; =
Richard Shockey; stir@ietf.org; fmousinh@cisco.com; =
cnit@ietf.org<br><b>Subject:</b> Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Right. =
&nbsp;I believe we can do this pretty easily. &nbsp;We probably could =
have a 100 categories that would have similar authorities, and there are =
classifications maintained by folks like Dun Bradstreet that can go even =
farther.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>What I think would be substantially harder is to =
validate an entire V/X/J card. &nbsp;How is a validator to know your =
nickname is Fluffy? &nbsp;Name, phone number and, if a business, a =
classification, yes, we can do that. &nbsp;Content of a business card - =
very hard.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Nov 7, 2013, at 8:12 AM, Henning Schulzrinne &lt;<a =
href=3D"mailto:Henning.Schulzrinne@fcc.gov">Henning.Schulzrinne@fcc.gov</=
a>&gt; wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Yes, that&#8217;s a problem, but as long as the number of categories =
is small, you can build UIs that only render information that&#8217;s =
appropriate to the declaration. For practical reasons, I think the =
number of useful categories is likely going to be fairly =
limited:</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Financial institution (FDIC and a few =
others)</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Health care (each health care facility has a gov&#8217;t =
number)</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Charity (501c3, state registered)</span><o:p></o:p></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Contractor (state-licensed)</span><o:p></o:p></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Public safety organization (police, =
fire)</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Lawyer (bar association)</span><o:p></o:p></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Local, state and federal government (.gov in the =
US)</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I suspect that list encompasses a large fraction of the fraudulent =
(impersonation) calls. For all of the above, at least within a country, =
it&#8217;s pretty clear who can attest to the membership. Yes, this =
requires some UI work or some server logic, but these categories and the =
organizations don&#8217;t change all that often &#8211; in most cases, =
the certifying entities have probably been the same for the past 50+ =
years. I&#8217;m not as worried about figuring out whether the =
beautician, mortician or florist is licensed and properly identified, =
although I&#8217;m sure we can all come up with potential fraud =
stories.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Michael =
Hammer [<a =
href=3D"mailto:michael.hammer@yaanatech.com">mailto:michael.hammer@yaanat=
ech.com</a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
10:28 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Henning Schulzrinne; <a =
href=3D"mailto:Pierce.Gorman@sprint.com">Pierce.Gorman@sprint.com</a>; =
<a href=3D"mailto:br@brianrosen.net">br@brianrosen.net</a>; <a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a><br><b>Cc:</b><s=
pan class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a =
href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>So, would you trust a certificate from the City of Reston, Virginia =
police department?</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>(Hint:&nbsp; you can find Reston on a map, but there is no City of =
Reston.&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;The only police are Fairfax =
County.)</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>My concern is that one you dilute or disperse authority, it becomes a =
free-for-all again, and anybody&#8217;s =
guess.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Mike</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>mailto:stir-bounces@ietf.org</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Henning =
Schulzrinne<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
10:00 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>'Gorman, Pierce A [NTK]'; =
Brian Rosen; Richard Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List; Fernando Mousinho =
(fmousinh);<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:purple'>cnit@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>As a thought experiment, Kumiko Ono and I had published a =
draft</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"http://tools.ietf.org/html/draft-ono-dispatch-attribute-validatio=
n-00"><span =
style=3D'color:purple'>http://tools.ietf.org/html/draft-ono-dispatch-attr=
ibute-validation-00</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>to allow third parties to validate property information. If the =
validating party (e.g., a bank regulator) is willing to sign a =
certificate, similar in spirit to the framed gold-leaf diplomas in your =
dentist&#8217;s office or, more lowly, to the health departments rating =
in a restaurant window, and it can be tied to a phone number, this =
shouldn&#8217;t be too hard.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s a bit harder if the certifying authority (regulator, =
Realtor board, local bar association, &#8230;) is not =
involved.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Henning</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'><a =
href=3D"mailto:cnit-bounces@ietf.org"><span =
style=3D'color:purple'>cnit-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:[mailto:cnit-bounces@ietf.org]"><span =
style=3D'color:purple'>[mailto:cnit-bounces@ietf.org]</span></a><span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Gorman, Pierce A =
[NTK]<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
9:54 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Brian Rosen; Richard =
Shockey<br><b>Cc:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:purple'>cnit@ietf.org</span></a>; Fernando Mousinho =
(fmousinh)<br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I&#8217;ll admit I am not familiar with v/x/jcard encoding differences =
or the implications of their use so I&#8217;ll encourage educating me if =
it isn&#8217;t too onerous.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I&#8217;m not sure what is the concern with a 3<sup>rd</sup><span =
class=3Dapple-converted-space>&nbsp;</span>party providing =
&#8220;validation&#8221; though.&nbsp; There are numerous examples of =
3<sup>rd</sup><span class=3Dapple-converted-space>&nbsp;</span>parties =
providing validation of information including NASDAQ, NYSE, =
Barron&#8217;s, Moody&#8217;s, and the federal reserve banking system to =
name a few.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif"'>Pierce</span>=
<o:p></o:p></p></div></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Brian Rosen =
[<a href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:purple'>mailto:br@brianrosen.net</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 06, 2013 11:59 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Fernando Mousinho (fmousinh); =
Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:purple'>cnit@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>I think this would be a heavy =
lift.<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>If the responsible entity was a carrier, then it would =
have to validate the data, which it has very little basis to validate. =
&nbsp;It could get a 3rd party to do the validation, but then it&#8217;s =
putting its reputation on the back of some hired hand =
validator.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>If the responsibility is the end user/device, then the =
signature has no value.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>I do question JCARD vs xCard, but that&#8217;s an =
encoding detail. &nbsp;All of SIP Is XML described by schema, not =
json.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><div><div><p=
 class=3DMsoNormal>On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us"><span =
style=3D'color:purple'>richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>&nbsp;<o:p></o:p></p><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity. &nbsp;The carrier =
could provision this for their mobile or hosted customers.&nbsp; =
Enterprises could do this themselves.&nbsp; This also has advantages in =
Enterprise to Enterprise UC as well where the data is derived from the =
Enterprise &#8220;directory&#8221; and could facilitate end to end PPX =
to PBX communications especially in point to point video =
communications.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There are certainly privacy and security issues to be =
addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be PII =
in the clear but then its done =
voluntarily.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There would have to be some work around restructuring the Header and =
adding some parameters but it&#8217;s underutilized right now and this =
Use Case is a perfectly appropriate =
use.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06"><span =
style=3D'color:purple'>https://tools.ietf.org/html/draft-ietf-jcardcal-jc=
ard-06</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Obviously it would need to be signed but we don&#8217;t need to worry =
about that ..yet.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>From 3261</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>20.9 Call-Info</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; The Call-Info header field provides additional =
information about the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; caller or callee, depending on whether it is found in a =
request or</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; response.&nbsp; The purpose of the URI is described by =
the &quot;purpose&quot;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; parameter.&nbsp; The &quot;icon&quot; parameter =
designates an image suitable as an</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; iconic representation of the caller or callee.&nbsp; The =
&quot;info&quot; parameter</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; describes the caller or callee in general, for example, =
through a web</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; page.&nbsp; The &quot;card&quot; parameter provides a =
business card, for example, in</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; Additional tokens =
can be registered</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Use of the Call-Info header field can pose a security =
risk.&nbsp; If a</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; callee fetches the URIs provided by a malicious caller, =
the callee</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; may be at risk for displaying inappropriate or offensive =
content,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; dangerous or illegal content, and so on.&nbsp; =
Therefore, it is</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; RECOMMENDED that a UA only render the information in the =
Call-Info</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; header field if it can verify the authenticity of the =
element that</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; originated the header field and trusts that =
element.&nbsp; This need not</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; be the peer UA; a proxy can insert this header field =
into requests.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Example:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg"><span =
style=3D'color:purple'>http://wwww.example.com/alice/photo.jpg</span></a>=
&gt; ;purpose=3Dicon,</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/"><span =
style=3D'color:purple'>http://www.example.com/alice/</span></a>&gt; =
;purpose=3Dinfo</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Brian =
Rosen [<a href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:purple'>mailto:br@brianrosen.net</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Wednesday, November 06, 2013 =
3:41 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Fernando Mousinho (fmousinh); =
Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List<br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>We&#8217;ve considered adding some information that is =
not number and is not name, but is something like &#8220;bank&#8221;, =
which might have some sort of validation behind =
it.<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Is that along the lines you were =
thinking?<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><div><div><p =
class=3DMsoNormal>On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us"><span =
style=3D'color:purple'>richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>&nbsp;<o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.&nbsp; =
Though your use case of credit card validation is a useful one and you =
are right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session =
validation.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>_______________________________________________</span><o:p></o:p></p><=
/div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>cnit mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:#954F72'>cnit@ietf.org</span></a></span><o:p></o:p></p></d=
iv></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/cnit</span>=
</a></span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.&nbsp; STIR is essential but =
it&#8217;s a multi-faceted problem that may require multi-faceted =
solutions.. and enhanced CNAM + being only one of them.&nbsp;&nbsp; Its =
not unreasonable to discuss =
those.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs. =
&nbsp;I would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in =
question.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>mailto:stir-bounces@ietf.org</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Let me =
rephrase it&#8230; it may eliminate the need for other forms of caller =
identification beyond what STIR will provide, depending on the specific =
use case. For example, a credit card company may choose to rely entirely =
on STIR before allowing a card to be unblocked by an IVR (and as I said =
earlier, many companies do it today). In other use cases, the TN alone =
is not sufficient information &#8211; my health care provider will want =
to know which member of the family is =
calling.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I agree =
that ANI is already broadly used to improve customer service today. =
However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of =
companies.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Going on a =
tangent&#8230; perhaps this is out of scope, but there is not a lot of =
discussion about called party hijacking. Couldn&#8217;t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it&#8217;s really them before carrying a =
conversation, but wouldn&#8217;t they want the =
same?&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&lt;Gorman&=
gt;, &quot;Pierce A [NTK]&quot; &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D'color:#954F72'>Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Dat=
e:<span class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, November =
5, 2013 at 6:05 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho &lt;<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>fmousinh@cisco.com</span></a>&gt;, &quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3Dapple-converted-space>&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I agree with your characterization of businesses as victim of caller ID =
fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.&nbsp; So I don&#8217;t agree that =
STIR would &#8220;eliminate the need for caller identification from =
known TNs.&#8221;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fernando =
Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>mailto:fmousinh@cisco.com</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I would =
suggest we add a new attack type to section 3. More and more companies =
are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I&#8217;m informed =
that I don&#8217;t need to provide any further identification because my =
number is on file. Some (all?) companies that implement this type of =
validation rely on SS7 =
today.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Ultimately,=
 this is yet another variation of impersonation &#8211; but in this =
case, the &#8220;victim&#8221; is a business, unlike the other two =
scenarios we&#8217;ve listed so =
far.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Addressing =
this scenario would actually turn STIR into a feature, given it would =
enable contact centers of all sizes to eliminate the need for caller =
identification from known =
TNs.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D'color:#954F72'>alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, October 1, 2013 =
at 12:51 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:#954F72'>br@brianrosen.net</span></a>&gt;, =
&quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:#954F72'>jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:=
<span class=3Dapple-converted-space>&nbsp;</span></b>&quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D'color:#954F72'>richard@shockey.us</span></a>&gt;, &quot;'DOLLY, =
MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D'color:#954F72'>md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:#954F72'>rjsparks@nostrum.com</span></a>&gt;<br><b>Subject=
:<span class=3Dapple-converted-space>&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Jon,</span>=
<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Thanks for =
the response.&nbsp; The intention in #1 below is to clarify the =
following sentence:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>The<span =
class=3Dapple-converted-space>&nbsp;</span><b>primary</b><span =
class=3Dapple-converted-space>&nbsp;</span>attack vector =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; therefore one where the attacker contrives for the calling =
telephone</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number in signaling to be a particular chosen number, one that =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; attacker does not have the authority to call from,<span =
class=3Dapple-converted-space>&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number to be rendered on the terminating side</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>.&nbsp;</sp=
an><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>This might =
be misconstrued as indicating that the objective of spoofing is simply =
the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the =
rendered information. &nbsp;No issues with leaving this as it&#8217;s a =
valid point.&nbsp; Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on =
CPN.&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>So however =
it&#8217;s worded, I think it&#8217;s important to allow for both attack =
objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Regards,</s=
pan><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex</span>=
<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
-----Original Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Brian =
Rosen</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Sent: =
Tuesday, October 01, 2013 9:29 =
AM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; To: =
Peterson, Jon</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; =
Richard</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Shockey</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Don't =
think there is much MESSAGE.&nbsp; MSRP is about all we see, and XMPP =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; more =
likely than that.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Brian</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; On =
Oct 1, 2013, at 12:24 PM, &quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:windowtext;text-decoration:none'>jon.peterson@neustar.biz<=
/span></a>&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Thanks for these notes, Alex. Some responses =
below.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here are several comments that should feed into the IETF =
Peterson draft:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
[IMO,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; both endpoint and in-network solutions should be =
facilitated]</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Agreed that both in-band and out-of-band solutions can usually =
be</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
implemented in either endpoints or in intermediaries of various =
kinds.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
If I see text that implies otherwise, I'll certainly change =
it.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Add a sessionless attack scenario.&nbsp; A spam =
payload may be carried in</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
a</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
establishment.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; More generally, we should be mindful of the fact that SIP is =
used in</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; telephony form more than voice session =
setup.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Probably if we were going to include a sessionless attack scenario, =
it</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
would be with regular text messages (whether carried on the PSTN =
over</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
TCAP or with some Internet protocol, including MESSAGE) rather =
than</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
with an INVITE, which typically wouldn't result in a payload =
being</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
immediately rendered to a user. More on this below with your =
suggested</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
text.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; The primary attack vector =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; number in signaling to be a particular chosen number that =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
in the primary attack vectors that concern =
us.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; of programmability, the capacity to access the Internet, =
and</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; capabilities of rendering text, audio and/or images.&nbsp; This =
includes</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
I can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
images as you suggest.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Provided we're talking about end-to-end SIP use of MESSAGE, =
agreed</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
that in-band would be the right countermeasure. I am curious =
though</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
document.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Jon Peterson</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Regards,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Alex</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of Richard =
Shockey</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN =
C</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: Robert =
Sparks</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Yes, ok</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Martin Dolly</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Technology</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
+1-609-903-3360</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D'color:windowtext;text-decoration:none'>md3135@att.com</span></a>=
</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, &quot;Robert =
Sparks&quot;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:windowtext;text-decoration:none'>rjsparks@nostrum.com</spa=
n></a>&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Hi Martin =
-</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Just to make sure - I think you're referring to =
Hadriel's comments</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; on the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; I don't think Hadriel's commented directly on =
stir-threats yet.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; In any case, we _are_ talking about a starting place, =
not a</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; finished</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; If there's no other objection, I'd like to get Jon to =
submit the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; threats</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; RjS</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; From:<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear from more =
people about this</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; hear from him =
soon.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ Housley =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D'color:windowtext;text-decoration:none'>http://www.ietf.org/id/dr=
aft-peterson-stir-threats-00.txt</span></a></span><o:p></o:p></p></div></=
div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt this I-D as the =
starting point for</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; STIR threat =
docuent?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; stir mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
stir mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; stir =
mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'><hr =
size=3D3 width=3D"100%" align=3Dcenter></span></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'>__________=
_____________________________________<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:purple'>https://www.ietf.org/mailman/listinfo/stir</span><=
/a></span><o:p></o:p></p></div></blockquote></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div class=3DMsoNormal =
align=3Dcenter style=3D'text-align:center'><hr size=3D2 width=3D"100%" =
align=3Dcenter></div><div><p class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_001_0086_01CEDBB2.56084FD0--

------=_NextPart_000_0085_01CEDBB2.56084FD0
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0085_01CEDBB2.56084FD0--

From br@brianrosen.net  Thu Nov  7 09:15:04 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 26D1511E8261 for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:15:04 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level: 
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bSVwKDMBEdyz for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:14:57 -0800 (PST)
Received: from mail-bk0-f44.google.com (mail-bk0-f44.google.com [209.85.214.44]) by ietfa.amsl.com (Postfix) with ESMTP id 8A88E21E81D1 for <cnit@ietf.org>; Thu,  7 Nov 2013 09:14:56 -0800 (PST)
Received: by mail-bk0-f44.google.com with SMTP id mx11so355392bkb.31 for <cnit@ietf.org>; Thu, 07 Nov 2013 09:14:55 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=PGqeQP+/sb/QJl2hmXk6A27GE76mJwqU9iNcefetrZA=; b=AOCJ1gQY+txG7vx4yHaGYJe2xq9DKPHzynzVjft8jdYItjviJnfdRBjEMRG31/UjIh ebrPUGFsvZyaT6mzFLbXmiSa96Y5bxTBGwmznvzMulvLgzxG6SIrM7rlrl5TKJVw8RWW by9z1TqoG81YFqzAdAXA0rraNSRIL/EtoLLOKRnOSk6WkZ6QbRsnAEE62PjeY1aWeAVX u0OrvjG0RLOlAM3bHPbHnXogG8vreJIAofJ7BokdBifwzI5qz/4/ayRL62opnf/6Bbr3 huwp2YZxAE4WNXhhc8r0ctF+hHQwrhbTkS63tGG0jVCmv3gvj8nmRsLm3xF7a0KndAaS 6uKQ==
X-Gm-Message-State: ALoCoQk0ajjuaGSt7x5mQhkKdCRDXQHRs027taz/IlB7Vdii0JiMyQ3bQc2uK8iCyPpwYqR/UMZZ
X-Received: by 10.205.15.72 with SMTP id pt8mr7192348bkb.17.1383844495647; Thu, 07 Nov 2013 09:14:55 -0800 (PST)
Received: from dhcp-b7f9.meeting.ietf.org (dhcp-b7f9.meeting.ietf.org. [31.133.183.249]) by mx.google.com with ESMTPSA id l9sm3035432bkg.0.2013.11.07.09.14.51 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 07 Nov 2013 09:14:54 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_B4AA15F0-D053-4A54-BF14-9F16459A0029"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com>
Date: Thu, 7 Nov 2013 09:14:48 -0800
Message-Id: <AA25C040-4523-4F71-9BD5-58F076C6047B@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov> <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net> <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com>
To: Michael Hammer <michael.hammer@yaanatech.com>
X-Mailer: Apple Mail (2.1816)
Cc: "cnit@ietf.org" <cnit@ietf.org>, Richard Shockey <richard@shockey.us>, "stir@ietf.org" <stir@ietf.org>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, "Henning.Schulzrinne@fcc.gov" <Henning.Schulzrinne@fcc.gov>, "fmousinh@cisco.com" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:15:05 -0000

--Apple-Mail=_B4AA15F0-D053-4A54-BF14-9F16459A0029
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Yeah, I think we can work out a central authority in a country to handle =
it.  Don=92t think cross certifying would work.
In the US, we have an agency (Federal Trade Commission) that is =
intimately familiar with, and very motivated to do something about =
spoofing of called id information, and could reasonably certify the =
certifiers.  Similar agencies exist in other countries that are =
experiencing the problems we are addressing.

Note that ALL you get out of this is the category.  But, like Henning, I =
think this is a VERY helpful, workable idea.

Brian

On Nov 7, 2013, at 9:10 AM, Michael Hammer =
<michael.hammer@yaanatech.com> wrote:

> So, how does the average user know who is an authority?
> (Note, we are not designing for IETF geniuses here.)
> =20
> Is some well-known central authority going to certify all of these?
> Are each of these going to cross-certify all the others? (federated =
model)
> =20
> We need to always answer that fundamental user question:
> Why should I TRUST this information?
> =20
> Mike
> =20
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: Thursday, November 07, 2013 12:03 PM
> To: Henning Schulzrinne
> Cc: Michael Hammer; Pierce.Gorman@sprint.com; Richard Shockey; =
stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Right.  I believe we can do this pretty easily.  We probably could =
have a 100 categories that would have similar authorities, and there are =
classifications maintained by folks like Dun Bradstreet that can go even =
farther.
> =20
> What I think would be substantially harder is to validate an entire =
V/X/J card.  How is a validator to know your nickname is Fluffy?  Name, =
phone number and, if a business, a classification, yes, we can do that.  =
Content of a business card - very hard.
> =20
> Brian
> =20
> =20
> On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne =
<Henning.Schulzrinne@fcc.gov> wrote:
>=20
>=20
> Yes, that=92s a problem, but as long as the number of categories is =
small, you can build UIs that only render information that=92s =
appropriate to the declaration. For practical reasons, I think the =
number of useful categories is likely going to be fairly limited:
> -          Financial institution (FDIC and a few others)
> -          Health care (each health care facility has a gov=92t =
number)
> -          Charity (501c3, state registered)
> -          Contractor (state-licensed)
> -          Public safety organization (police, fire)
> -          Lawyer (bar association)
> -          Local, state and federal government (.gov in the US)
> =20
> I suspect that list encompasses a large fraction of the fraudulent =
(impersonation) calls. For all of the above, at least within a country, =
it=92s pretty clear who can attest to the membership. Yes, this requires =
some UI work or some server logic, but these categories and the =
organizations don=92t change all that often =96 in most cases, the =
certifying entities have probably been the same for the past 50+ years. =
I=92m not as worried about figuring out whether the beautician, =
mortician or florist is licensed and properly identified, although I=92m =
sure we can all come up with potential fraud stories.
> =20
> From: Michael Hammer [mailto:michael.hammer@yaanatech.com]=20
> Sent: Thursday, November 07, 2013 10:28 AM
> To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net; =
richard@shockey.us
> Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
> Subject: RE: [stir] draft-peterson-stir-threats-00.txt
> =20
> So, would you trust a certificate from the City of Reston, Virginia =
police department?
> =20
> (Hint:  you can find Reston on a map, but there is no City of Reston.=20=

>   The only police are Fairfax County.)
> =20
> My concern is that one you dilute or disperse authority, it becomes a =
free-for-all again, and anybody=92s guess.
> =20
> Mike
> =20
> =20
> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of Henning Schulzrinne
> Sent: Thursday, November 07, 2013 10:00 AM
> To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
> Cc: stir@ietf.org List; Fernando Mousinho (fmousinh); cnit@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> As a thought experiment, Kumiko Ono and I had published a draft
> =20
> http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00
> =20
> to allow third parties to validate property information. If the =
validating party (e.g., a bank regulator) is willing to sign a =
certificate, similar in spirit to the framed gold-leaf diplomas in your =
dentist=92s office or, more lowly, to the health departments rating in a =
restaurant window, and it can be tied to a phone number, this shouldn=92t =
be too hard.
> =20
> It=92s a bit harder if the certifying authority (regulator, Realtor =
board, local bar association, =85) is not involved.
> =20
> Henning
> =20
> From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf =
Of Gorman, Pierce A [NTK]
> Sent: Thursday, November 07, 2013 9:54 AM
> To: Brian Rosen; Richard Shockey
> Cc: stir@ietf.org List; cnit@ietf.org; Fernando Mousinho (fmousinh)
> Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
> =20
> I=92ll admit I am not familiar with v/x/jcard encoding differences or =
the implications of their use so I=92ll encourage educating me if it =
isn=92t too onerous.
> =20
> I=92m not sure what is the concern with a 3rd party providing =
=93validation=94 though.  There are numerous examples of 3rd parties =
providing validation of information including NASDAQ, NYSE, Barron=92s, =
Moody=92s, and the federal reserve banking system to name a few.
> =20
> Pierce
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: November 06, 2013 11:59 PM
> To: Richard Shockey
> Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; =
stir@ietf.org List; cnit@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> I think this would be a heavy lift.
> =20
> If the responsible entity was a carrier, then it would have to =
validate the data, which it has very little basis to validate.  It could =
get a 3rd party to do the validation, but then it=92s putting its =
reputation on the back of some hired hand validator.
> =20
> If the responsibility is the end user/device, then the signature has =
no value.
> =20
> I do not argue that Call-Info is suitable,  it is.
> =20
> I do question JCARD vs xCard, but that=92s an encoding detail.  All of =
SIP Is XML described by schema, not json.
> =20
> Brian
> =20
> On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us> =
wrote:
> =20
>=20
> URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity.  The carrier =
could provision this for their mobile or hosted customers.  Enterprises =
could do this themselves.  This also has advantages in Enterprise to =
Enterprise UC as well where the data is derived from the Enterprise =
=93directory=94 and could facilitate end to end PPX to PBX =
communications especially in point to point video communications.
> =20
> There are certainly privacy and security issues to be addressed.  The =
Push vs Pull model.  This really would be PII in the clear but then its =
done voluntarily.
> =20
> There would have to be some work around restructuring the Header and =
adding some parameters but it=92s underutilized right now and this Use =
Case is a perfectly appropriate use.
> =20
> https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06
> =20
> Obviously it would need to be signed but we don=92t need to worry =
about that ..yet.
> =20
> =46rom 3261
> =20
> 20.9 Call-Info
> =20
>    The Call-Info header field provides additional information about =
the
>    caller or callee, depending on whether it is found in a request or
>    response.  The purpose of the URI is described by the "purpose"
>    parameter.  The "icon" parameter designates an image suitable as an
>    iconic representation of the caller or callee.  The "info" =
parameter
>    describes the caller or callee in general, for example, through a =
web
>    page.  The "card" parameter provides a business card, for example, =
in
>    vCard [36] or LDIF [37] formats.  Additional tokens can be =
registered
>    using IANA and the procedures in Section 27.
> =20
>    Use of the Call-Info header field can pose a security risk.  If a
>    callee fetches the URIs provided by a malicious caller, the callee
>    may be at risk for displaying inappropriate or offensive content,
>    dangerous or illegal content, and so on.  Therefore, it is
>    RECOMMENDED that a UA only render the information in the Call-Info
>    header field if it can verify the authenticity of the element that
>    originated the header field and trusts that element.  This need not
>    be the peer UA; a proxy can insert this header field into requests.
> =20
>    Example:
> =20
>    Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,=

>      <http://www.example.com/alice/> ;purpose=3Dinfo
> =20
> From: Brian Rosen [mailto:br@brianrosen.net]=20
> Sent: Wednesday, November 06, 2013 3:41 PM
> To: Richard Shockey
> Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; =
stir@ietf.org List
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> We=92ve considered adding some information that is not number and is =
not name, but is something like =93bank=94, which might have some sort =
of validation behind it.
> =20
> Is that along the lines you were thinking?
> =20
> Brian
> On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us> =
wrote:
> =20
>=20
> I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.  Though =
your use case of credit card validation is a useful one and you are =
right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session validation.
> =20
> It=92s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.
> =20
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit
> =20
> But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.  STIR is essential but it=92s a =
multi-faceted problem that may require multi-faceted solutions.. and =
enhanced CNAM + being only one of them.   Its not unreasonable to =
discuss those.
> =20
> The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs.  I =
would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in question.
> =20
> =20
> =20
> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of Fernando Mousinho (fmousinh)
> Sent: Tuesday, November 05, 2013 6:26 PM
> To: Gorman, Pierce A [NTK]; stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Let me rephrase it=85 it may eliminate the need for other forms of =
caller identification beyond what STIR will provide, depending on the =
specific use case. For example, a credit card company may choose to rely =
entirely on STIR before allowing a card to be unblocked by an IVR (and =
as I said earlier, many companies do it today). In other use cases, the =
TN alone is not sufficient information =96 my health care provider will =
want to know which member of the family is calling.
> =20
> I agree that ANI is already broadly used to improve customer service =
today. However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of companies.
> =20
> =20
> Going on a tangent=85 perhaps this is out of scope, but there is not a =
lot of discussion about called party hijacking. Couldn=92t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it=92s really them before carrying a =
conversation, but wouldn=92t they want the same?=20
> =20
> =20
> From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com>
> Date: Tuesday, November 5, 2013 at 6:05 PM
> To: Fernando Mousinho <fmousinh@cisco.com>, "stir@ietf.org" =
<stir@ietf.org>
> Subject: RE: [stir] draft-peterson-stir-threats-00.txt
> =20
> I agree with your characterization of businesses as victim of caller =
ID fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.  So I don=92t agree that STIR =
would =93eliminate the need for caller identification from known TNs.=94
> =20
> But perhaps I misunderstood your last sentence?
> =20
> =20
> From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]=20
> Sent: November 05, 2013 4:34 PM
> To: stir@ietf.org
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> I would suggest we add a new attack type to section 3. More and more =
companies are using the caller ID for account validation. For example, =
if I call my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I=92m informed that =
I don=92t need to provide any further identification because my number =
is on file. Some (all?) companies that implement this type of validation =
rely on SS7 today.
> =20
> Ultimately, this is yet another variation of impersonation =96 but in =
this case, the =93victim=94 is a business, unlike the other two =
scenarios we=92ve listed so far.
> =20
> Addressing this scenario would actually turn STIR into a feature, =
given it would enable contact centers of all sizes to eliminate the need =
for caller identification from known TNs.
> =20
> =20
> =20
> From: Alex Bobotek <alex@bobotek.net>
> Date: Tuesday, October 1, 2013 at 12:51 PM
> To: Brian Rosen <br@brianrosen.net>, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> Cc: "stir@ietf.org" <stir@ietf.org>, Richard Shockey =
<richard@shockey.us>, "'DOLLY, MARTIN C'" <md3135@att.com>, 'Robert =
Sparks' <rjsparks@nostrum.com>
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> =20
> Jon,
> =20
> Thanks for the response.  The intention in #1 below is to clarify the =
following sentence:
> =20
> The primary attack vector is
>    therefore one where the attacker contrives for the calling =
telephone
>    number in signaling to be a particular chosen number, one that the
>    attacker does not have the authority to call from, in order for =
that
>    number to be rendered on the terminating side.=20
> =20
> This might be misconstrued as indicating that the objective of =
spoofing is simply the rendering of a spoofed number on the receiving =
display, causing mistaken conclusions that defenses might be limited to =
securing the rendered information.  No issues with leaving this as it=92s =
a valid point.  Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on CPN.=20
> =20
> So however it=92s worded, I think it=92s important to allow for both =
attack objectives of a spoofed presentation at the endpoint and in =
transit.  =20
> =20
> Regards,
> =20
> Alex
> =20
> > -----Original Message-----
> > From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf =
Of
> > Brian Rosen
> > Sent: Tuesday, October 01, 2013 9:29 AM
> > To: Peterson, Jon
> > Cc: stir@ietf.org; Alex Bobotek; 'Robert Sparks'; 'DOLLY, MARTIN C'; =
Richard
> > Shockey
> > Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >=20
> > Don't think there is much MESSAGE.  MSRP is about all we see, and =
XMPP is
> > more likely than that.
> >=20
> > Brian
> >=20
> > On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
<jon.peterson@neustar.biz>
> > wrote:
> >=20
> > > Thanks for these notes, Alex. Some responses below.
> > >
> > >> Here are several comments that should feed into the IETF Peterson =
draft:
> > >>
> > >> *   Remove any assumptions that the solution cannot be in-network
> > [IMO,
> > >> both endpoint and in-network solutions should be facilitated]
> > >
> > > Agreed that both in-band and out-of-band solutions can usually be
> > > implemented in either endpoints or in intermediaries of various =
kinds.
> > > If I see text that implies otherwise, I'll certainly change it.
> > >
> > >> *   Add a sessionless attack scenario.  A spam payload may be =
carried in
> > a
> > >> SIP INVITE or MESSAGE, which might contain stock market advice =
even
> > >> in a display name field.  These attacks do NOT require session
> > establishment.
> > >> More generally, we should be mindful of the fact that SIP is used =
in
> > >> telephony form more than voice session setup.
> > >
> > > Probably if we were going to include a sessionless attack =
scenario, it
> > > would be with regular text messages (whether carried on the PSTN =
over
> > > TCAP or with some Internet protocol, including MESSAGE) rather =
than
> > > with an INVITE, which typically wouldn't result in a payload being
> > > immediately rendered to a user. More on this below with your =
suggested
> > text.
> > >
> > >> Here's some suggested markup:
> > >>
> > >>
> > >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction =
with:
> > >>
> > >> The primary attack vector is
> > >>  therefore one where the attacker contrives for the calling =
telephone
> > >> number in signaling to be a particular chosen number that the
> > >> attacker does not have the authority to call from.
> > >
> > > What you want here is to remove the implication that the number =
will
> > > be rendered on the terminating side? While there are some attacks
> > > where that isn't significant, perhaps, I would say it is =
significant
> > > in the primary attack vectors that concern us.
> > >
> > >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> > >>
> > >>     Smart devices are generally based on computers with some =
degree
> > >> of programmability, the capacity to access the Internet, and
> > >> capabilities of rendering text, audio and/or images.  This =
includes
> > >> smart phones, telephone applications on desktop and laptop =
computers,
> > >> IP private branch exchanges, and so on.
> > >
> > > I can add the notion that smart devices can render text, audio =
and/or
> > > images as you suggest.
> > >
> > >> 3.  Add to 3.3 Attack Scenarios:
> > >>
> > >>       Impersonation, IP-Mobile Text Message
> > >>
> > >>        An attacker with an computer sends a high volume of SIP =
MESSAGE
> > >> spam message to IP-enabled smart phones using randomized calling
> > >> party numbers.
> > >>
> > >>       Countermeasure: in-band authenticated identity
> > >
> > > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > > that in-band would be the right countermeasure. I am curious =
though
> > > whether practically speaking there is enough use of MESSAGE in =
this
> > > fashion that we're actually seeing high-volume spam over MESSAGE
> > > today. Either way, no problem having an attack scenario of this =
form in the
> > document.
> > >
> > > Jon Peterson
> > > Neustar, Inc.
> > >
> > >> Regards,
> > >>
> > >> Alex
> > >>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of Richard Shockey
> > >>> Sent: Monday, September 30, 2013 1:11 PM
> > >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> +1
> > >>>
> > >>> -----Original Message-----
> > >>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On =
Behalf
> > >>> Of DOLLY, MARTIN C
> > >>> Sent: Monday, September 30, 2013 12:58 PM
> > >>> To: Robert Sparks
> > >>> Cc: stir@ietf.org
> > >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>
> > >>> Yes, ok
> > >>>
> > >>> Martin Dolly
> > >>> Lead Member of Technical Staff
> > >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> > >>> Technology
> > >>> +1-609-903-3360
> > >>> md3135@att.com
> > >>>
> > >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> > >>>> <rjsparks@nostrum.com>
> > >>> wrote:
> > >>>>
> > >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> > >>>>> With Hadriel comments incorporated, it is a start
> > >>>> Hi Martin -
> > >>>>
> > >>>> Just to make sure - I think you're referring to Hadriel's =
comments
> > >>>> on the
> > >>> problem statement document?
> > >>>> I don't think Hadriel's commented directly on stir-threats yet.
> > >>>>
> > >>>> In any case, we _are_ talking about a starting place, not a
> > >>>> finished
> > >>> product.
> > >>>>
> > >>>> If there's no other objection, I'd like to get Jon to submit =
the
> > >>>> threats
> > >>> document as a WG -00 as soon as it's convenient.
> > >>>>
> > >>>> RjS
> > >>>>>
> > >>>>> -----Original Message-----
> > >>>>> From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On
> > >>>>> Behalf Of Russ Housley
> > >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> > >>>>> To: IETF STIR Mail List
> > >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> > >>>>>
> > >>>>> It has been six days, I'd like to hear from more people about =
this
> > >>> document.  Martin asked for an additional week, so I'm sure we =
will
> > >>> hear from him soon.
> > >>>>>
> > >>>>> Russ
> > >>>>>
> > >>>>>
> > >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> > >>>>>>
> > >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> > >>>>>>
> > >>>>>> Should the working group adopt this I-D as the starting point =
for
> > >>>>>> the
> > >>> STIR threat docuent?
> > >>>>>>
> > >>>>>> Russ
> > >>>>> _______________________________________________
> > >>>>> stir mailing list
> > >>>>> stir@ietf.org
> > >>>>> https://www.ietf.org/mailman/listinfo/stir
> > >>>>
> > >>>> _______________________________________________
> > >>>> stir mailing list
> > >>>> stir@ietf.org
> > >>>> https://www.ietf.org/mailman/listinfo/stir
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >>>
> > >>> _______________________________________________
> > >>> stir mailing list
> > >>> stir@ietf.org
> > >>> https://www.ietf.org/mailman/listinfo/stir
> > >> _______________________________________________
> > >> stir mailing list
> > >> stir@ietf.org
> > >> https://www.ietf.org/mailman/listinfo/stir
> > >
> > > _______________________________________________
> > > stir mailing list
> > > stir@ietf.org
> > > https://www.ietf.org/mailman/listinfo/stir
> >=20
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org
> > https://www.ietf.org/mailman/listinfo/stir
> =20
>=20
> This e-mail may contain Sprint proprietary information intended for =
the sole use of the recipient(s). Any use by others is prohibited. If =
you are not the intended recipient, please contact the sender and delete =
all copies of the message.
> _______________________________________________
> stir mailing list
> stir@ietf.org
> https://www.ietf.org/mailman/listinfo/stir
> =20
> =20
> =20
>=20
> This e-mail may contain Sprint proprietary information intended for =
the sole use of the recipient(s). Any use by others is prohibited. If =
you are not the intended recipient, please contact the sender and delete =
all copies of the message.


--Apple-Mail=_B4AA15F0-D053-4A54-BF14-9F16459A0029
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">Yeah, =
I think we can work out a central authority in a country to handle it. =
&nbsp;Don=92t think cross certifying would work.<div>In the US, we have =
an agency (Federal Trade Commission) that is intimately familiar with, =
and very motivated to do something about spoofing of called id =
information, and could reasonably certify the certifiers. &nbsp;Similar =
agencies exist in other countries that are experiencing the problems we =
are addressing.</div><div><br></div><div>Note that ALL you get out of =
this is the category. &nbsp;But, like Henning, I think this is a VERY =
helpful, workable =
idea.</div><div><br></div><div>Brian<br><div><br><div><div>On Nov 7, =
2013, at 9:10 AM, Michael Hammer &lt;<a =
href=3D"mailto:michael.hammer@yaanatech.com">michael.hammer@yaanatech.com<=
/a>&gt; wrote:</div><br class=3D"Apple-interchange-newline"><blockquote =
type=3D"cite"><div lang=3D"EN-US" link=3D"blue" vlink=3D"purple" =
style=3D"font-family: Helvetica; font-size: 12px; font-style: normal; =
font-variant: normal; font-weight: normal; letter-spacing: normal; =
line-height: normal; orphans: auto; text-align: start; text-indent: 0px; =
text-transform: none; white-space: normal; widows: auto; word-spacing: =
0px; -webkit-text-stroke-width: 0px;"><div class=3D"WordSection1" =
style=3D"page: WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">So, how does the average user know who is an =
authority?<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">(Note, we are not designing for IETF geniuses =
here.)<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Is some well-known central authority going to certify =
all of these?<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Are each of these going to cross-certify all the =
others? (federated model)<o:p></o:p></span></div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">We need to always answer =
that fundamental user question:<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">Why should I TRUST this =
information?<o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Mike<o:p></o:p></span></div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span></div><div><div style=3D"border-style: solid none =
none; border-top-color: rgb(181, 196, 223); border-top-width: 1pt; =
padding: 3pt 0in 0in;"><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><b><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><span =
class=3D"Apple-converted-space">&nbsp;</span>Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]<span =
class=3D"Apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
12:03 PM<br><b>To:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Henning =
Schulzrinne<br><b>Cc:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Michael Hammer; <a =
href=3D"mailto:Pierce.Gorman@sprint.com">Pierce.Gorman@sprint.com</a>; =
Richard Shockey; <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a =
href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3D"Apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></div></div></div><div=
 style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">Right. &nbsp;I believe we can do this pretty easily. &nbsp;We =
probably could have a 100 categories that would have similar =
authorities, and there are classifications maintained by folks like Dun =
Bradstreet that can go even farther.<o:p></o:p></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><o:p>&nbsp;</o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">What I think would be substantially harder is to =
validate an entire V/X/J card. &nbsp;How is a validator to know your =
nickname is Fluffy? &nbsp;Name, phone number and, if a business, a =
classification, yes, we can do that. &nbsp;Content of a business card - =
very hard.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">Brian<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><o:p>&nbsp;</o:p></div><div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">On =
Nov 7, 2013, at 8:12 AM, Henning Schulzrinne &lt;<a =
href=3D"mailto:Henning.Schulzrinne@fcc.gov" style=3D"color: purple; =
text-decoration: underline;">Henning.Schulzrinne@fcc.gov</a>&gt; =
wrote:<o:p></o:p></div></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;"><br><br><o:p></o:p></div><div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Yes, that=92s a problem, but as long as the number of =
categories is small, you can build UIs that only render information =
that=92s appropriate to the declaration. For practical reasons, I think =
the number of useful categories is likely going to be fairly =
limited:</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Financial institution (FDIC and a few =
others)</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Health care (each health care facility has a gov=92t =
number)</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Charity (501c3, state =
registered)</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Contractor =
(state-licensed)</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Public safety organization (police, =
fire)</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Lawyer (bar =
association)</span><o:p></o:p></div></div><div style=3D"margin-left: =
0.5in;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-indent: -0.25in;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">-</span><span style=3D"font-size: 7pt; color: rgb(31, =
73, 125);">&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span =
class=3D"apple-converted-space">&nbsp;</span></span><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">Local, state and federal government (.gov in the =
US)</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">I suspect that list =
encompasses a large fraction of the fraudulent (impersonation) calls. =
For all of the above, at least within a country, it=92s pretty clear who =
can attest to the membership. Yes, this requires some UI work or some =
server logic, but these categories and the organizations don=92t change =
all that often =96 in most cases, the certifying entities have probably =
been the same for the past 50+ years. I=92m not as worried about =
figuring out whether the beautician, mortician or florist is licensed =
and properly identified, although I=92m sure we can all come up with =
potential fraud stories.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;">Michael Hammer [<a =
href=3D"mailto:michael.hammer@yaanatech.com" style=3D"color: purple; =
text-decoration: =
underline;">mailto:michael.hammer@yaanatech.com</a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
10:28 AM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Henning Schulzrinne;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:Pierce.Gorman@sprint.com" style=3D"color: purple; =
text-decoration: underline;">Pierce.Gorman@sprint.com</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;">br@brianrosen.net</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;">richard@shockey.us</a><br><b>Cc:</b><span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;">stir@ietf.org</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;">fmousinh@cisco.com</a>;<span =
class=3D"Apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">So, would you trust a =
certificate from the City of Reston, Virginia police =
department?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">(Hint:&nbsp; you can find Reston =
on a map, but there is no City of =
Reston.&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp;The only police are =
Fairfax County.)</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">My concern is that one you dilute =
or disperse authority, it becomes a free-for-all again, and anybody=92s =
guess.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">Mike</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><a href=3D"mailto:stir-bounces@ietf.org"=
 style=3D"color: purple; text-decoration: underline;"><span =
style=3D"color: purple;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">mailto:stir-bounces@ietf.org</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"apple-converted-space">&nbsp;</span></b>Henning =
Schulzrinne<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
10:00 AM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>'Gorman, Pierce A [NTK]'; =
Brian Rosen; Richard Shockey<br><b>Cc:</b><span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: purple;">stir@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>List; Fernando Mousinho =
(fmousinh);<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: =
purple;">cnit@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">As a thought experiment, =
Kumiko Ono and I had published a =
draft</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation=
-00" style=3D"color: purple; text-decoration: underline;"><span =
style=3D"color: =
purple;">http://tools.ietf.org/html/draft-ono-dispatch-attribute-validatio=
n-00</span></a></span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">to allow third parties to validate =
property information. If the validating party (e.g., a bank regulator) =
is willing to sign a certificate, similar in spirit to the framed =
gold-leaf diplomas in your dentist=92s office or, more lowly, to the =
health departments rating in a restaurant window, and it can be tied to =
a phone number, this shouldn=92t be too =
hard.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">It=92s a bit harder if =
the certifying authority (regulator, Realtor board, local bar =
association, =85) is not =
involved.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">Henning</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;"><a href=3D"mailto:cnit-bounces@ietf.org"=
 style=3D"color: purple; text-decoration: underline;"><span =
style=3D"color: purple;">cnit-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:[mailto:cnit-bounces@ietf.org]" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">[mailto:cnit-bounces@ietf.org]</span></a><span =
class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"apple-converted-space">&nbsp;</span></b>Gorman, Pierce A =
[NTK]<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Thursday, November 07, 2013 =
9:54 AM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Brian Rosen; Richard =
Shockey<br><b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a=
 href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: purple;">stir@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>List;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: purple;">cnit@ietf.org</span></a>; =
Fernando Mousinho (fmousinh)<br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, 204);">I=92ll admit I am not familiar with =
v/x/jcard encoding differences or the implications of their use so I=92ll =
encourage educating me if it isn=92t too =
onerous.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">I=92m not sure what is the concern with a =
3<sup>rd</sup><span class=3D"apple-converted-space">&nbsp;</span>party =
providing =93validation=94 though.&nbsp; There are numerous examples of =
3<sup>rd</sup><span class=3D"apple-converted-space">&nbsp;</span>parties =
providing validation of information including NASDAQ, NYSE, Barron=92s, =
Moody=92s, and the federal reserve banking system to name a =
few.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif;">Pierce</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, =
204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;">Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">mailto:br@brianrosen.net</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>November 06, 2013 11:59 =
PM<br><b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Richard=
 Shockey<br><b>Cc:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Fernando Mousinho =
(fmousinh); Gorman, Pierce A [NTK];<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: purple;">stir@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>List;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: =
purple;">cnit@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">I think this would be a heavy =
lift.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">If =
the responsible entity was a carrier, then it would have to validate the =
data, which it has very little basis to validate. &nbsp;It could get a =
3rd party to do the validation, but then it=92s putting its reputation =
on the back of some hired hand =
validator.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">If =
the responsibility is the end user/device, then the signature has no =
value.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I do =
not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">I do =
question JCARD vs xCard, but that=92s an encoding detail. &nbsp;All of =
SIP Is XML described by schema, not =
json.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">Brian<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></div></div><p class=3D"MsoNormal" style=3D"margin: 0in =
0in 12pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></p><div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">URI for a JCARD in the CALL INFO header provisioned =
by the calling party and ultimately signed by the responsible entity. =
&nbsp;The carrier could provision this for their mobile or hosted =
customers.&nbsp; Enterprises could do this themselves.&nbsp; This also =
has advantages in Enterprise to Enterprise UC as well where the data is =
derived from the Enterprise =93directory=94 and could facilitate end to =
end PPX to PBX communications especially in point to point video =
communications.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">There are certainly privacy and =
security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp; =
This really would be PII in the clear but then its done =
voluntarily.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">There would have to be some work =
around restructuring the Header and adding some parameters but it=92s =
underutilized right now and this Use Case is a perfectly appropriate =
use.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 =
purple;">https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</span></=
a></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">Obviously it would need =
to be signed but we don=92t need to worry about that =
..yet.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">=46rom =
3261</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">20.9 =
Call-Info</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; The Call-Info header =
field provides additional information about =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; caller or callee, depending on whether =
it is found in a request or</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; =
response.&nbsp; The purpose of the URI is described by the =
"purpose"</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; parameter.&nbsp; The =
"icon" parameter designates an image suitable as =
an</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; iconic representation of the caller or =
callee.&nbsp; The "info" =
parameter</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; describes the caller =
or callee in general, for example, through a =
web</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; page.&nbsp; The "card" parameter =
provides a business card, for example, =
in</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; =
Additional tokens can be =
registered</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; using IANA and the =
procedures in Section 27.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; Use of the Call-Info =
header field can pose a security risk.&nbsp; If =
a</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; callee fetches the URIs provided by a =
malicious caller, the callee</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; may be at =
risk for displaying inappropriate or offensive =
content,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; dangerous or illegal content, and so =
on.&nbsp; Therefore, it is</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; RECOMMENDED =
that a UA only render the information in the =
Call-Info</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; header field if it =
can verify the authenticity of the element =
that</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;&nbsp; originated the header field and trusts =
that element.&nbsp; This need not</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into =
requests.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; =
Example:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp; Call-Info: =
&lt;<a href=3D"http://wwww.example.com/alice/photo.jpg" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: =
purple;">http://wwww.example.com/alice/photo.jpg</span></a>&gt; =
;purpose=3Dicon,</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">http://www.example.com/alice/</span></a>&gt; =
;purpose=3Dinfo</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">mailto:br@brianrosen.net</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Wednesday, November 06, =
2013 3:41 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Fernando Mousinho =
(fmousinh); Gorman, Pierce A [NTK];<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: purple;">stir@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>List<br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">We=92ve considered adding some information that is =
not number and is not name, but is something like =93bank=94, which =
might have some sort of validation behind =
it.<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;">Is =
that along the lines you were thinking?<o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div></div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">Brian<o:p></o:p></div></div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></div></div><p class=3D"MsoNormal" style=3D"margin: 0in =
0in 12pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></p><blockquote style=3D"margin-top: 5pt; =
margin-bottom: 5pt;"><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">I agree with Pierce here and respectfully disagree =
that STIR might eliminate the need for other forms of caller =
identification.&nbsp; Though your use case of credit card validation is =
a useful one and you are right there are still applications that use SS7 =
for things that have nothing to do with call setup. I agree with you =
STIR may have more applications beyond the obvious ones of realtime =
session validation.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">It=92s been my experience recently =
that there is a use case for something MORE in the identification of the =
session as it is presented to the called party. This is the CNAM + idea =
we are kicking around on the CNIT =
list.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">_______________________________________________</span><o:p></o:p></=
div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);">cnit mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);"><a href=3D"mailto:cnit@ietf.org" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">cnit@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);"><a =
href=3D"https://www.ietf.org/mailman/listinfo/cnit" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">https://www.ietf.org/mailman/listinfo/cnit</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, 125);">But your use case of a bank =
wanting to make sure they could properly identify themselves to the =
consumer before establishing a conversation is exactly what this process =
is about.&nbsp; STIR is essential but it=92s a multi-faceted problem =
that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.&nbsp;&nbsp; Its not unreasonable to discuss =
those.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">The obviously analogy is =
I would want to see some real identification of a utility worker before =
I let them into my house to make repairs. &nbsp;I would want some =
validation that the call to me to reconfirm the appointments was in fact =
from the utility in question.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif; color: rgb(31, 73, =
125);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(225, 225, =
225); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;"><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">mailto:stir-bounces@ietf.org</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><b>On Behalf Of<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce A =
[NTK];<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: =
purple;">stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Let me rephrase it=85 it may eliminate the need =
for other forms of caller identification beyond what STIR will provide, =
depending on the specific use case. For example, a credit card company =
may choose to rely entirely on STIR before allowing a card to be =
unblocked by an IVR (and as I said earlier, many companies do it today). =
In other use cases, the TN alone is not sufficient information =96 my =
health care provider will want to know which member of the family is =
calling.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">I agree that ANI is already broadly used to =
improve customer service today. However, it is not usually deemed as a =
secure enough mechanism to validate the caller (therefore this WG!), =
except if you are a large organization that can leverage things like =
SS7. STIR would make this type of validation available to a broader =
number of companies.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Going on a tangent=85 perhaps this is out of =
scope, but there is not a lot of discussion about called party =
hijacking. Couldn=92t a man-in-the-middle try to answer calls on my =
behalf? If my bank is calling me, I want to make sure it=92s really them =
before carrying a conversation, but wouldn=92t they want the =
same?&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&lt;Gorman&gt;, "Pierce A [NTK]" &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, November 5, =
2013 at 6:05 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousinho =
&lt;<a href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">fmousinh@cisco.com</span></a>&gt;, "<a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>" &lt;<a href=3D"mailto:stir@ietf.org" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 rgb(149, 79, 114);">stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, 204);">I agree with your characterization =
of businesses as victim of caller ID fraud however contact centers also =
use TN as a key to improve information available to call agents to =
reduce average time-per-call and increase capacity of the call =
center.&nbsp; So I don=92t agree that STIR would =93eliminate the need =
for caller identification from known =
TNs.=94</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Arial, sans-serif; color: rgb(0, =
0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Arial, sans-serif; =
color: rgb(0, 0, 204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: Arial, =
sans-serif; color: rgb(0, 0, =
204);">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">From:</span></b><span class=3D"apple-converted-space"><span =
style=3D"font-size: 10pt; font-family: Tahoma, =
sans-serif;">&nbsp;</span></span><span style=3D"font-size: 10pt; =
font-family: Tahoma, sans-serif;">Fernando Mousinho (fmousinh) [<a =
href=3D"mailto:fmousinh@cisco.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">mailto:fmousinh@cisco.com</span></a>]<span =
class=3D"apple-converted-space">&nbsp;</span><br><b>Sent:</b><span =
class=3D"apple-converted-space">&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3D"apple-converted-space">&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div></div><div=
><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">I would suggest we add a new attack type to =
section 3. More and more companies are using the caller ID for account =
validation. For example, if I call my credit card provider from my =
office number, they ask me for identification. If I call from my home =
phone number, I=92m informed that I don=92t need to provide any further =
identification because my number is on file. Some (all?) companies that =
implement this type of validation rely on SS7 =
today.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Ultimately, this is yet another variation of =
impersonation =96 but in this case, the =93victim=94 is a business, =
unlike the other two scenarios we=92ve listed so =
far.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">Addressing this scenario would actually turn STIR =
into a feature, given it would enable contact centers of all sizes to =
eliminate the need for caller identification from known =
TNs.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div =
style=3D"border-style: solid none none; border-top-color: rgb(181, 196, =
223); border-top-width: 1pt; padding: 3pt 0in 0in;"><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">From:<span =
class=3D"apple-converted-space">&nbsp;</span></span></b><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, October 1, =
2013 at 12:51 PM<br><b>To:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">br@brianrosen.net</span></a>&gt;, "Peterson, Jon" &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:<span =
class=3D"apple-converted-space">&nbsp;</span></b>"<a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>" &lt;<a href=3D"mailto:stir@ietf.org" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 rgb(149, 79, 114);">stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">richard@shockey.us</span></a>&gt;, "'DOLLY, MARTIN C'" &lt;<a =
href=3D"mailto:md3135@att.com" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;<a =
href=3D"mailto:rjsparks@nostrum.com" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">rjsparks@nostrum.com</span></a>&gt;<br><b>Subject:<span =
class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 10.5pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Jon,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Thanks for the response.&nbsp; The intention in #1 =
below is to clarify the following =
sentence:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">The<span =
class=3D"apple-converted-space">&nbsp;</span><b>primary</b><span =
class=3D"apple-converted-space">&nbsp;</span>attack vector =
is</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; therefore one where the attacker contrives for =
the calling telephone</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;&nbsp; number in signaling to be a =
particular chosen number, one that =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; attacker does not have the authority to call =
from,<span class=3D"apple-converted-space">&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;&nbsp; number to be rendered on the terminating =
side</span></b><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">.&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">This might be misconstrued as indicating that the =
objective of spoofing is simply the rendering of a spoofed number on the =
receiving display, causing mistaken conclusions that defenses might be =
limited to securing the rendered information. &nbsp;No issues with =
leaving this as it=92s a valid point.&nbsp; Another (increasing) =
motivation is to evade network and/or endpoint defenses that may block =
based on CPN.&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">So however it=92s worded, I think it=92s important =
to allow for both attack objectives of a spoofed presentation at the =
endpoint and in transit.&nbsp; =
&nbsp;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Regards,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">Alex</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: rgb(149, 79, =
114);">mailto:stir-bounces@ietf.org</span></a>] On Behalf =
Of</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Brian =
Rosen</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; Sent: =
Tuesday, October 01, 2013 9:29 AM</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; To: Peterson, =
Jon</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: rgb(149, 79, =
114);">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY, =
MARTIN C'; Richard</span><o:p></o:p></div></div><div><div style=3D"margin:=
 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; Shockey</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Don't think there is much MESSAGE.&nbsp; MSRP =
is about all we see, and XMPP is</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; more likely than =
that.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; Brian</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" =
&lt;<a href=3D"mailto:jon.peterson@neustar.biz" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">jon.peterson@neustar.biz</span></a>&gt;</span><o:p></o:p></div></di=
v><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; =
wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Thanks for these notes, Alex. Some =
responses below.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; Here are several comments that =
should feed into the IETF Peterson =
draft:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; [IMO,</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; both endpoint and in-network =
solutions should be facilitated]</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Agreed that both in-band and out-of-band =
solutions can usually be</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; implemented in either endpoints or in =
intermediaries of various kinds.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; If I see text that implies otherwise, =
I'll certainly change it.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessionless =
attack scenario.&nbsp; A spam payload may be carried =
in</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
a</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
establishment.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; More generally, we should be mindful of the =
fact that SIP is used in</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; telephony form more than voice =
session setup.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Probably if we were going to include a =
sessionless attack scenario, it</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; would be with regular text messages =
(whether carried on the PSTN over</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; TCAP or with some Internet protocol, =
including MESSAGE) rather than</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; with an INVITE, which typically wouldn't =
result in a payload being</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; immediately rendered to a user. More on =
this below with your suggested</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; text.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; The primary attack vector =
is</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; number in signaling to be a particular chosen =
number that the</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt; in the primary attack vectors that concern =
us.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; of programmability, the capacity to =
access the Internet, and</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; capabilities of rendering text, =
audio and/or images.&nbsp; This =
includes</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; I =
can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
images as you suggest.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Provided we're talking about end-to-end =
SIP use of MESSAGE, agreed</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; that in-band would be the right =
countermeasure. I am curious =
though</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
document.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt; Jon =
Peterson</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt; =
Regards,</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt; Alex</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Of Richard Shockey</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 =
1:11 PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Cc:<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; +1</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] On =
Behalf</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN C</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Sent: Monday, September 30, 2013 =
12:58 PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; To: Robert Sparks</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Cc:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; Yes, =
ok</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; Martin =
Dolly</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
Technology</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
+1-609-903-3360</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:md3135@att.com" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">md3135@att.com</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, "Robert =
Sparks"</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 windowtext; text-decoration: =
none;">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></div></div><d=
iv><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: =
'Times New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; =
wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN =
C wrote:</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt; Hi Martin -</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; Just to make sure - I think you're =
referring to Hadriel's comments</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; on =
the</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; I don't think Hadriel's commented =
directly on stir-threats yet.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; In any case, we _are_ talking about a =
starting place, not a</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; =
finished</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; If there's no other objection, I'd =
like to get Jon to submit the</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; =
threats</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; =
RjS</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">stir-bounces@ietf.org</span></a><span =
class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: none;">mailto:stir-bounces@ietf.org</span></a>] =
On</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; It has been six days, =
I'd like to hear from more people about =
this</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; hear from him =
soon.</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at =
5:23 PM, Russ Housley wrote:</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt" =
style=3D"color: purple; text-decoration: underline;"><span style=3D"color:=
 windowtext; text-decoration: =
none;">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</span></a=
></span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should the working =
group adopt this I-D as the starting point =
for</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; the</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt; STIR threat =
docuent?</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt; stir =
mailing list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 11pt; font-family: Calibri, =
sans-serif;">&gt; &gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; &gt;&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt;&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; &gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; &gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt; =
&gt;<span class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; &gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: =
12pt; font-family: 'Times New Roman', serif;"><span style=3D"font-size: =
11pt; font-family: Calibri, =
sans-serif;">&gt;&nbsp;</span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt; =
_______________________________________________</span><o:p></o:p></div></d=
iv><div><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif;">&gt; stir mailing =
list</span><o:p></o:p></div></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif;">&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"mailto:stir@ietf.org" style=3D"color: purple; text-decoration: =
underline;"><span style=3D"color: windowtext; text-decoration: =
none;">stir@ietf.org</span></a></span><o:p></o:p></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif;">&gt;<span =
class=3D"apple-converted-space">&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: windowtext; =
text-decoration: =
none;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></=
o:p></div></div></div></div><div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, =
sans-serif;">&nbsp;</span><o:p></o:p></div></div><div class=3D"MsoNormal" =
align=3D"center" style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-align: center;"><span =
style=3D"font-size: 10.5pt; font-family: Calibri, sans-serif;"><hr =
size=3D"3" width=3D"100%" align=3D"center"></span></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 7.5pt; font-family: Arial, =
sans-serif; color: gray;"><br>This e-mail may contain Sprint proprietary =
information intended for the sole use of the recipient(s). Any use by =
others is prohibited. If you are not the intended recipient, please =
contact the sender and delete all copies of the =
message.</span><o:p></o:p></div></div></div><div><div style=3D"margin: =
0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 9pt; font-family: Helvetica, =
sans-serif;">_______________________________________________<br>stir =
mailing list<br><a href=3D"mailto:stir@ietf.org" style=3D"color: purple; =
text-decoration: underline;"><span style=3D"color: =
purple;">stir@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir" style=3D"color: =
purple; text-decoration: underline;"><span style=3D"color: =
purple;">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p>=
</o:p></div></div></blockquote></div><div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;">&nbsp;<o:p></o:p></div></div></div></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div></div></div></div><div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;">&nbsp;<o:p></o:p></div></div><div class=3D"MsoNormal" =
align=3D"center" style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif; text-align: center;"><hr size=3D"2"=
 width=3D"100%" align=3D"center"></div><div><div style=3D"margin: 0in =
0in 0.0001pt; font-size: 12pt; font-family: 'Times New Roman', =
serif;"><span style=3D"font-size: 7.5pt; font-family: Arial, sans-serif; =
color: gray;"><br>This e-mail may contain Sprint proprietary information =
intended for the sole use of the recipient(s). Any use by others is =
prohibited. If you are not the intended recipient, please contact the =
sender and delete all copies of the =
message.</span></div></div></div></div></div></div></div></blockquote></di=
v><br></div></div></body></html>=

--Apple-Mail=_B4AA15F0-D053-4A54-BF14-9F16459A0029--

From Henning.Schulzrinne@fcc.gov  Thu Nov  7 09:15:31 2013
Return-Path: <Henning.Schulzrinne@fcc.gov>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ACD7D11E8188; Thu,  7 Nov 2013 09:15:31 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.165
X-Spam-Level: 
X-Spam-Status: No, score=-2.165 tagged_above=-999 required=5 tests=[AWL=0.433,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id sn5ipXs3q3nf; Thu,  7 Nov 2013 09:15:12 -0800 (PST)
Received: from DC-IP-1.fcc.gov (dc-ip-1.fcc.gov [192.104.54.97]) by ietfa.amsl.com (Postfix) with ESMTP id 6763121E81F1; Thu,  7 Nov 2013 09:15:07 -0800 (PST)
Message-ID: <E6A16181E5FD2F46B962315BB05962D01FC23ABC@fcc.gov>
From: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
To: 'Michael Hammer' <michael.hammer@yaanatech.com>, "br@brianrosen.net" <br@brianrosen.net>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO28lBm7MQs/E/Y0C8yrTGiGFz45oZ21rggABc6AD//7YS0IAAZHIAgAAB9wD//6y9gA==
Date: Thu, 7 Nov 2013 17:15:05 +0000
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov> <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net> <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com>
In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_E6A16181E5FD2F46B962315BB05962D01FC23ABCp2pxmb13fccnetw_"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, "fmousinh@cisco.com" <fmousinh@cisco.com>, "cnit@ietf.org" <cnit@ietf.org>, "richard@shockey.us" <richard@shockey.us>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:15:31 -0000

--_000_E6A16181E5FD2F46B962315BB05962D01FC23ABCp2pxmb13fccnetw_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

The user shouldn't and wouldn't - they would trust a third party (often, th=
eir carrier, I suspect) to figure out who can attest to the bankiness of a =
bank. This is not new - there are a number of existing outfits that do this=
 for web sites. (Example: Avast has a bar graph that shows trustworthiness.=
)


From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 12:10 PM
To: br@brianrosen.net; Henning Schulzrinne
Cc: Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org; fmousinh@c=
isco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

So, how does the average user know who is an authority?
(Note, we are not designing for IETF geniuses here.)

Is some well-known central authority going to certify all of these?
Are each of these going to cross-certify all the others? (federated model)

We need to always answer that fundamental user question:
Why should I TRUST this information?

Mike


From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Thursday, November 07, 2013 12:03 PM
To: Henning Schulzrinne
Cc: Michael Hammer; Pierce.Gorman@sprint.com<mailto:Pierce.Gorman@sprint.co=
m>; Richard Shockey; stir@ietf.org<mailto:stir@ietf.org>; fmousinh@cisco.co=
m<mailto:fmousinh@cisco.com>; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Right.  I believe we can do this pretty easily.  We probably could have a 1=
00 categories that would have similar authorities, and there are classifica=
tions maintained by folks like Dun Bradstreet that can go even farther.

What I think would be substantially harder is to validate an entire V/X/J c=
ard.  How is a validator to know your nickname is Fluffy?  Name, phone numb=
er and, if a business, a classification, yes, we can do that.  Content of a=
 business card - very hard.

Brian


On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne <Henning.Schulzrinne@fcc.go=
v<mailto:Henning.Schulzrinne@fcc.gov>> wrote:

Yes, that's a problem, but as long as the number of categories is small, yo=
u can build UIs that only render information that's appropriate to the decl=
aration. For practical reasons, I think the number of useful categories is =
likely going to be fairly limited:
-          Financial institution (FDIC and a few others)
-          Health care (each health care facility has a gov't number)
-          Charity (501c3, state registered)
-          Contractor (state-licensed)
-          Public safety organization (police, fire)
-          Lawyer (bar association)
-          Local, state and federal government (.gov in the US)

I suspect that list encompasses a large fraction of the fraudulent (imperso=
nation) calls. For all of the above, at least within a country, it's pretty=
 clear who can attest to the membership. Yes, this requires some UI work or=
 some server logic, but these categories and the organizations don't change=
 all that often - in most cases, the certifying entities have probably been=
 the same for the past 50+ years. I'm not as worried about figuring out whe=
ther the beautician, mortician or florist is licensed and properly identifi=
ed, although I'm sure we can all come up with potential fraud stories.

From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com<mailto:Pierce.Gorman@spri=
nt.com>; br@brianrosen.net<mailto:br@brianrosen.net>; richard@shockey.us<ma=
ilto:richard@shockey.us>
Cc: stir@ietf.org<mailto:stir@ietf.org>; fmousinh@cisco.com<mailto:fmousinh=
@cisco.com>; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

So, would you trust a certificate from the City of Reston, Virginia police =
department?

(Hint:  you can find Reston on a map, but there is no City of Reston.
  The only police are Fairfax County.)

My concern is that one you dilute or disperse authority, it becomes a free-=
for-all again, and anybody's guess.

Mike


From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; Fernando Mousinho (fmousinh);=
 cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

As a thought experiment, Kumiko Ono and I had published a draft

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.

It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, ...) is not involved.

Henning

From: cnit-bounces@ietf.org<mailto:cnit-bounces@ietf.org> [mailto:cnit-boun=
ces@ietf.org]<mailto:[mailto:cnit-bounces@ietf.org]> On Behalf Of Gorman, P=
ierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@iet=
f.org>; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

>From 3261

20.9 Call-Info

   The Call-Info header field provides additional information about the
   caller or callee, depending on whether it is found in a request or
   response.  The purpose of the URI is described by the "purpose"
   parameter.  The "icon" parameter designates an image suitable as an
   iconic representation of the caller or callee.  The "info" parameter
   describes the caller or callee in general, for example, through a web
   page.  The "card" parameter provides a business card, for example, in
   vCard [36] or LDIF [37] formats.  Additional tokens can be registered
   using IANA and the procedures in Section 27.

   Use of the Call-Info header field can pose a security risk.  If a
   callee fetches the URIs provided by a malicious caller, the callee
   may be at risk for displaying inappropriate or offensive content,
   dangerous or illegal content, and so on.  Therefore, it is
   RECOMMENDED that a UA only render the information in the Call-Info
   header field if it can verify the authenticity of the element that
   originated the header field and trusts that element.  This need not
   be the peer UA; a proxy can insert this header field into requests.

   Example:

   Call-Info: <http://wwww.example.com/alice/photo.jpg> ;purpose=3Dicon,
     <http://www.example.com/alice/> ;purpose=3Dinfo

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

We've considered adding some information that is not number and is not name=
, but is something like "bank", which might have some sort of validation be=
hind it.

Is that along the lines you were thinking?

Brian
On Nov 6, 2013, at 5:25 AM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

I agree with Pierce here and respectfully disagree that STIR might eliminat=
e the need for other forms of caller identification.  Though your use case =
of credit card validation is a useful one and you are right there are still=
 applications that use SS7 for things that have nothing to do with call set=
up. I agree with you STIR may have more applications beyond the obvious one=
s of realtime session validation.

It's been my experience recently that there is a use case for something MOR=
E in the identification of the session as it is presented to the called par=
ty. This is the CNAM + idea we are kicking around on the CNIT list.

_______________________________________________
cnit mailing list
cnit@ietf.org<mailto:cnit@ietf.org>
https://www.ietf.org/mailman/listinfo/cnit

But your use case of a bank wanting to make sure they could properly identi=
fy themselves to the consumer before establishing a conversation is exactly=
 what this process is about.  STIR is essential but it's a multi-faceted pr=
oblem that may require multi-faceted solutions.. and enhanced CNAM + being =
only one of them.   Its not unreasonable to discuss those.

The obviously analogy is I would want to see some real identification of a =
utility worker before I let them into my house to make repairs.  I would wa=
nt some validation that the call to me to reconfirm the appointments was in=
 fact from the utility in question.



From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK]; stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Let me rephrase it... it may eliminate the need for other forms of caller i=
dentification beyond what STIR will provide, depending on the specific use =
case. For example, a credit card company may choose to rely entirely on STI=
R before allowing a card to be unblocked by an IVR (and as I said earlier, =
many companies do it today). In other use cases, the TN alone is not suffic=
ient information - my health care provider will want to know which member o=
f the family is calling.

I agree that ANI is already broadly used to improve customer service today.=
 However, it is not usually deemed as a secure enough mechanism to validate=
 the caller (therefore this WG!), except if you are a large organization th=
at can leverage things like SS7. STIR would make this type of validation av=
ailable to a broader number of companies.


Going on a tangent... perhaps this is out of scope, but there is not a lot =
of discussion about called party hijacking. Couldn't a man-in-the-middle tr=
y to answer calls on my behalf? If my bank is calling me, I want to make su=
re it's really them before carrying a conversation, but wouldn't they want =
the same?


From: <Gorman>, "Pierce A [NTK]" <Pierce.Gorman@sprint.com<mailto:Pierce.Go=
rman@sprint.com>>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho <fmousinh@cisco.com<mailto:fmousinh@cisco.com>>, "sti=
r@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.org>>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

I agree with your characterization of businesses as victim of caller ID fra=
ud however contact centers also use TN as a key to improve information avai=
lable to call agents to reduce average time-per-call and increase capacity =
of the call center.  So I don't agree that STIR would "eliminate the need f=
or caller identification from known TNs."

But perhaps I misunderstood your last sentence?


From: Fernando Mousinho (fmousinh) [mailto:fmousinh@cisco.com]
Sent: November 05, 2013 4:34 PM
To: stir@ietf.org<mailto:stir@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I would suggest we add a new attack type to section 3. More and more compan=
ies are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for identificati=
on. If I call from my home phone number, I'm informed that I don't need to =
provide any further identification because my number is on file. Some (all?=
) companies that implement this type of validation rely on SS7 today.

Ultimately, this is yet another variation of impersonation - but in this ca=
se, the "victim" is a business, unlike the other two scenarios we've listed=
 so far.

Addressing this scenario would actually turn STIR into a feature, given it =
would enable contact centers of all sizes to eliminate the need for caller =
identification from known TNs.



From: Alex Bobotek <alex@bobotek.net<mailto:alex@bobotek.net>>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>, "Peterson, J=
on" <jon.peterson@neustar.biz<mailto:jon.peterson@neustar.biz>>
Cc: "stir@ietf.org<mailto:stir@ietf.org>" <stir@ietf.org<mailto:stir@ietf.o=
rg>>, Richard Shockey <richard@shockey.us<mailto:richard@shockey.us>>, "'DO=
LLY, MARTIN C'" <md3135@att.com<mailto:md3135@att.com>>, 'Robert Sparks' <r=
jsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Jon,

Thanks for the response.  The intention in #1 below is to clarify the follo=
wing sentence:

The primary attack vector is
   therefore one where the attacker contrives for the calling telephone
   number in signaling to be a particular chosen number, one that the
   attacker does not have the authority to call from, in order for that
   number to be rendered on the terminating side.

This might be misconstrued as indicating that the objective of spoofing is =
simply the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the rendere=
d information.  No issues with leaving this as it's a valid point.  Another=
 (increasing) motivation is to evade network and/or endpoint defenses that =
may block based on CPN.

So however it's worded, I think it's important to allow for both attack obj=
ectives of a spoofed presentation at the endpoint and in transit.

Regards,

Alex

> -----Original Message-----
> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-bo=
unces@ietf.org] On Behalf Of
> Brian Rosen
> Sent: Tuesday, October 01, 2013 9:29 AM
> To: Peterson, Jon
> Cc: stir@ietf.org<mailto:stir@ietf.org>; Alex Bobotek; 'Robert Sparks'; '=
DOLLY, MARTIN C'; Richard
> Shockey
> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
>
> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is
> more likely than that.
>
> Brian
>
> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <jon.peterson@neustar.biz<ma=
ilto:jon.peterson@neustar.biz>>
> wrote:
>
> > Thanks for these notes, Alex. Some responses below.
> >
> >> Here are several comments that should feed into the IETF Peterson draf=
t:
> >>
> >> *   Remove any assumptions that the solution cannot be in-network
> [IMO,
> >> both endpoint and in-network solutions should be facilitated]
> >
> > Agreed that both in-band and out-of-band solutions can usually be
> > implemented in either endpoints or in intermediaries of various kinds.
> > If I see text that implies otherwise, I'll certainly change it.
> >
> >> *   Add a sessionless attack scenario.  A spam payload may be carried =
in
> a
> >> SIP INVITE or MESSAGE, which might contain stock market advice even
> >> in a display name field.  These attacks do NOT require session
> establishment.
> >> More generally, we should be mindful of the fact that SIP is used in
> >> telephony form more than voice session setup.
> >
> > Probably if we were going to include a sessionless attack scenario, it
> > would be with regular text messages (whether carried on the PSTN over
> > TCAP or with some Internet protocol, including MESSAGE) rather than
> > with an INVITE, which typically wouldn't result in a payload being
> > immediately rendered to a user. More on this below with your suggested
> text.
> >
> >> Here's some suggested markup:
> >>
> >>
> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:
> >>
> >> The primary attack vector is
> >>  therefore one where the attacker contrives for the calling telephone
> >> number in signaling to be a particular chosen number that the
> >> attacker does not have the authority to call from.
> >
> > What you want here is to remove the implication that the number will
> > be rendered on the terminating side? While there are some attacks
> > where that isn't significant, perhaps, I would say it is significant
> > in the primary attack vectors that concern us.
> >
> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:
> >>
> >>     Smart devices are generally based on computers with some degree
> >> of programmability, the capacity to access the Internet, and
> >> capabilities of rendering text, audio and/or images.  This includes
> >> smart phones, telephone applications on desktop and laptop computers,
> >> IP private branch exchanges, and so on.
> >
> > I can add the notion that smart devices can render text, audio and/or
> > images as you suggest.
> >
> >> 3.  Add to 3.3 Attack Scenarios:
> >>
> >>       Impersonation, IP-Mobile Text Message
> >>
> >>        An attacker with an computer sends a high volume of SIP MESSAGE
> >> spam message to IP-enabled smart phones using randomized calling
> >> party numbers.
> >>
> >>       Countermeasure: in-band authenticated identity
> >
> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed
> > that in-band would be the right countermeasure. I am curious though
> > whether practically speaking there is enough use of MESSAGE in this
> > fashion that we're actually seeing high-volume spam over MESSAGE
> > today. Either way, no problem having an attack scenario of this form in=
 the
> document.
> >
> > Jon Peterson
> > Neustar, Inc.
> >
> >> Regards,
> >>
> >> Alex
> >>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of Richard Shockey
> >>> Sent: Monday, September 30, 2013 1:11 PM
> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> +1
> >>>
> >>> -----Original Message-----
> >>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:sti=
r-bounces@ietf.org] On Behalf
> >>> Of DOLLY, MARTIN C
> >>> Sent: Monday, September 30, 2013 12:58 PM
> >>> To: Robert Sparks
> >>> Cc: stir@ietf.org<mailto:stir@ietf.org>
> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>
> >>> Yes, ok
> >>>
> >>> Martin Dolly
> >>> Lead Member of Technical Staff
> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network
> >>> Technology
> >>> +1-609-903-3360
> >>> md3135@att.com<mailto:md3135@att.com>
> >>>
> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"
> >>>> <rjsparks@nostrum.com<mailto:rjsparks@nostrum.com>>
> >>> wrote:
> >>>>
> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:
> >>>>> With Hadriel comments incorporated, it is a start
> >>>> Hi Martin -
> >>>>
> >>>> Just to make sure - I think you're referring to Hadriel's comments
> >>>> on the
> >>> problem statement document?
> >>>> I don't think Hadriel's commented directly on stir-threats yet.
> >>>>
> >>>> In any case, we _are_ talking about a starting place, not a
> >>>> finished
> >>> product.
> >>>>
> >>>> If there's no other objection, I'd like to get Jon to submit the
> >>>> threats
> >>> document as a WG -00 as soon as it's convenient.
> >>>>
> >>>> RjS
> >>>>>
> >>>>> -----Original Message-----
> >>>>> From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:s=
tir-bounces@ietf.org] On
> >>>>> Behalf Of Russ Housley
> >>>>> Sent: Thursday, September 26, 2013 4:37 PM
> >>>>> To: IETF STIR Mail List
> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt
> >>>>>
> >>>>> It has been six days, I'd like to hear from more people about this
> >>> document.  Martin asked for an additional week, so I'm sure we will
> >>> hear from him soon.
> >>>>>
> >>>>> Russ
> >>>>>
> >>>>>
> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:
> >>>>>>
> >>>>>> http://www.ietf.org/id/draft-peterson-stir-threats-00.txt
> >>>>>>
> >>>>>> Should the working group adopt this I-D as the starting point for
> >>>>>> the
> >>> STIR threat docuent?
> >>>>>>
> >>>>>> Russ
> >>>>> _______________________________________________
> >>>>> stir mailing list
> >>>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>>> https://www.ietf.org/mailman/listinfo/stir
> >>>>
> >>>> _______________________________________________
> >>>> stir mailing list
> >>>> stir@ietf.org<mailto:stir@ietf.org>
> >>>> https://www.ietf.org/mailman/listinfo/stir
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >>>
> >>> _______________________________________________
> >>> stir mailing list
> >>> stir@ietf.org<mailto:stir@ietf.org>
> >>> https://www.ietf.org/mailman/listinfo/stir
> >> _______________________________________________
> >> stir mailing list
> >> stir@ietf.org<mailto:stir@ietf.org>
> >> https://www.ietf.org/mailman/listinfo/stir
> >
> > _______________________________________________
> > stir mailing list
> > stir@ietf.org<mailto:stir@ietf.org>
> > https://www.ietf.org/mailman/listinfo/stir
>
> _______________________________________________
> stir mailing list
> stir@ietf.org<mailto:stir@ietf.org>
> https://www.ietf.org/mailman/listinfo/stir

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.
_______________________________________________
stir mailing list
stir@ietf.org<mailto:stir@ietf.org>
https://www.ietf.org/mailman/listinfo/stir



________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.


--_000_E6A16181E5FD2F46B962315BB05962D01FC23ABCp2pxmb13fccnetw_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The user shouldn&#8217;t =
and wouldn&#8217;t &#8211; they would trust a third party (often, their car=
rier, I suspect) to figure out who can attest to the bankiness of a bank.
 This is not new &#8211; there are a number of existing outfits that do thi=
s for web sites. (Example: Avast has a bar graph that shows trustworthiness=
.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Michael =
Hammer [mailto:michael.hammer@yaanatech.com]
<br>
<b>Sent:</b> Thursday, November 07, 2013 12:10 PM<br>
<b>To:</b> br@brianrosen.net; Henning Schulzrinne<br>
<b>Cc:</b> Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org; fmo=
usinh@cisco.com; cnit@ietf.org<br>
<b>Subject:</b> RE: [stir] draft-peterson-stir-threats-00.txt<o:p></o:p></s=
pan></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">So, how does the average =
user know who is an authority?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">(Note, we are not designi=
ng for IETF geniuses here.)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Is some well-known centra=
l authority going to certify all of these?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Are each of these going t=
o cross-certify all the others? (federated model)<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">We need to always answer =
that fundamental user question:<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Why should I TRUST this i=
nformation?<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Mike<o:p></o:p></span></p=
>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span style=3D"font-s=
ize:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"> Brian Ro=
sen [<a href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]
<br>
<b>Sent:</b> Thursday, November 07, 2013 12:03 PM<br>
<b>To:</b> Henning Schulzrinne<br>
<b>Cc:</b> Michael Hammer; <a href=3D"mailto:Pierce.Gorman@sprint.com">Pier=
ce.Gorman@sprint.com</a>; Richard Shockey;
<a href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a href=3D"mailto:fmous=
inh@cisco.com">
fmousinh@cisco.com</a>; <a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><=
br>
<b>Subject:</b> Re: [stir] draft-peterson-stir-threats-00.txt<o:p></o:p></s=
pan></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Right. &nbsp;I believe we can do this pretty easily.=
 &nbsp;We probably could have a 100 categories that would have similar auth=
orities, and there are classifications maintained by folks like Dun Bradstr=
eet that can go even farther.<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">What I think would be substantially harder is to val=
idate an entire V/X/J card. &nbsp;How is a validator to know your nickname =
is Fluffy? &nbsp;Name, phone number and, if a business, a classification, y=
es, we can do that. &nbsp;Content of a business card
 - very hard.<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal">On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne &lt;=
<a href=3D"mailto:Henning.Schulzrinne@fcc.gov">Henning.Schulzrinne@fcc.gov<=
/a>&gt; wrote:<o:p></o:p></p>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt"><o:p>&nbsp;</o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Yes, that&#8217;s a probl=
em, but as long as the number of categories is small, you can build UIs tha=
t only render information that&#8217;s appropriate to the declaration.
 For practical reasons, I think the number of useful categories is likely g=
oing to be fairly limited:</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Financial
 institution (FDIC and a few others)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Health
 care (each health care facility has a gov&#8217;t number)</span><o:p></o:p=
></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Charity
 (501c3, state registered)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Contractor
 (state-licensed)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Public
 safety organization (police, fire)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Lawyer
 (bar association)</span><o:p></o:p></p>
</div>
<div style=3D"margin-left:.5in">
<p class=3D"MsoNormal" style=3D"text-indent:-.25in"><span style=3D"font-siz=
e:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F49=
7D">-</span><span style=3D"font-size:7.0pt;color:#1F497D">&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<span class=3D"apple-converted-space">=
&nbsp;</span></span><span style=3D"font-size:11.0pt;font-family:&quot;Calib=
ri&quot;,&quot;sans-serif&quot;;color:#1F497D">Local,
 state and federal government (.gov in the US)</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I suspect that list encom=
passes a large fraction of the fraudulent (impersonation) calls. For all of=
 the above, at least within a country, it&#8217;s pretty clear
 who can attest to the membership. Yes, this requires some UI work or some =
server logic, but these categories and the organizations don&#8217;t change=
 all that often &#8211; in most cases, the certifying entities have probabl=
y been the same for the past 50&#43; years. I&#8217;m
 not as worried about figuring out whether the beautician, mortician or flo=
rist is licensed and properly identified, although I&#8217;m sure we can al=
l come up with potential fraud stories.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Michael
 Hammer [<a href=3D"mailto:michael.hammer@yaanatech.com">mailto:michael.ham=
mer@yaanatech.com</a>]<span class=3D"apple-converted-space">&nbsp;</span><b=
r>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Thursday, No=
vember 07, 2013 10:28 AM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Henning Schulz=
rinne; <a href=3D"mailto:Pierce.Gorman@sprint.com">
Pierce.Gorman@sprint.com</a>; <a href=3D"mailto:br@brianrosen.net">br@brian=
rosen.net</a>;
<a href=3D"mailto:richard@shockey.us">richard@shockey.us</a><br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org">stir@ietf.org</a>;
<a href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a href=3D"ma=
ilto:cnit@ietf.org">
cnit@ietf.org</a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>RE: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">So, would you trust a cer=
tificate from the City of Reston, Virginia police department?</span><o:p></=
o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">(Hint:&nbsp; you can find=
 Reston on a map, but there is no City of Reston.&nbsp;</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;The only poli=
ce are Fairfax County.)</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">My concern is that one yo=
u dilute or disperse authority, it becomes a free-for-all again, and anybod=
y&#8217;s guess.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Mike</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"><a href=3D"mai=
lto:stir-bounces@ietf.org"><span style=3D"color:purple">stir-bounces@ietf.o=
rg</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D=
"mailto:stir-bounces@ietf.org"><span style=3D"color:purple">mailto:stir-bou=
nces@ietf.org</span></a>]<span class=3D"apple-converted-space">&nbsp;</span=
><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Henning Sc=
hulzrinne<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Thursday, No=
vember 07, 2013 10:00 AM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>'Gorman, Pierc=
e A [NTK]'; Brian Rosen; Richard Shockey<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org</span></a><sp=
an class=3D"apple-converted-space">&nbsp;</span>List; Fernando Mousinho (fm=
ousinh);<span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mailt=
o:cnit@ietf.org"><span style=3D"color:purple">cnit@ietf.org</span></a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">As a thought experiment, =
Kumiko Ono and I had published a draft</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"http://tools.i=
etf.org/html/draft-ono-dispatch-attribute-validation-00"><span style=3D"col=
or:purple">http://tools.ietf.org/html/draft-ono-dispatch-attribute-validati=
on-00</span></a></span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">to allow third parties to=
 validate property information. If the validating party (e.g., a bank regul=
ator) is willing to sign a certificate, similar in spirit
 to the framed gold-leaf diplomas in your dentist&#8217;s office or, more l=
owly, to the health departments rating in a restaurant window, and it can b=
e tied to a phone number, this shouldn&#8217;t be too hard.</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s a bit harder i=
f the certifying authority (regulator, Realtor board, local bar association=
, &#8230;) is not involved.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Henning</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;"><a href=3D"mai=
lto:cnit-bounces@ietf.org"><span style=3D"color:purple">cnit-bounces@ietf.o=
rg</span></a><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"=
mailto:[mailto:cnit-bounces@ietf.org]"><span style=3D"color:purple">[mailto=
:cnit-bounces@ietf.org]</span></a><span class=3D"apple-converted-space">&nb=
sp;</span><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Gorman, Pi=
erce A [NTK]<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Thursday, No=
vember 07, 2013 9:54 AM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Brian Rosen; R=
ichard Shockey<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org</span></a><sp=
an class=3D"apple-converted-space">&nbsp;</span>List;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:cnit@ietf.org"><span style=
=3D"color:purple">cnit@ietf.org</span></a>;
 Fernando Mousinho (fmousinh)<br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [cnit=
] [stir] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;ll admit I am not f=
amiliar with v/x/jcard encoding differences or the implications of their us=
e so I&#8217;ll encourage educating me if it isn&#8217;t too onerous.</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I&#8217;m not sure what is =
the concern with a 3<sup>rd</sup><span class=3D"apple-converted-space">&nbs=
p;</span>party providing &#8220;validation&#8221; though.&nbsp; There are n=
umerous examples
 of 3<sup>rd</sup><span class=3D"apple-converted-space">&nbsp;</span>partie=
s providing validation of information including NASDAQ, NYSE, Barron&#8217;=
s, Moody&#8217;s, and the federal reserve banking system to name a few.</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;">Pierce</span><o:p></o:p></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Brian
 Rosen [<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:purple">m=
ailto:br@brianrosen.net</span></a>]<span class=3D"apple-converted-space">&n=
bsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 06,=
 2013 11:59 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Richard Shocke=
y<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span>Fernando Mousi=
nho (fmousinh); Gorman, Pierce A [NTK];<span class=3D"apple-converted-space=
">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:purple=
">stir@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</spa=
n>List;<span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto=
:cnit@ietf.org"><span style=3D"color:purple">cnit@ietf.org</span></a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">I think this would be a heavy lift.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">If the responsible entity was a carrier, then it wou=
ld have to validate the data, which it has very little basis to validate. &=
nbsp;It could get a 3rd party to do the validation, but then it&#8217;s put=
ting its reputation on the back of some hired
 hand validator.<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">If the responsibility is the end user/device, then t=
he signature has no value.<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">I do question JCARD vs xCard, but that&#8217;s an en=
coding detail. &nbsp;All of SIP Is XML described by schema, not json.<o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us"><span style=3D"color:purple">richard@shoc=
key.us</span></a>&gt; wrote:<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">&nbsp;<o:p></o:p></p>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">URI for a JCARD in the CA=
LL INFO header provisioned by the calling party and ultimately signed by th=
e responsible entity. &nbsp;The carrier could provision this
 for their mobile or hosted customers.&nbsp; Enterprises could do this them=
selves.&nbsp; This also has advantages in Enterprise to Enterprise UC as we=
ll where the data is derived from the Enterprise &#8220;directory&#8221; an=
d could facilitate end to end PPX to PBX communications
 especially in point to point video communications.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There are certainly priva=
cy and security issues to be addressed.&nbsp; The Push vs Pull model.&nbsp;=
 This really would be PII in the clear but then its done voluntarily.</span=
><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">There would have to be so=
me work around restructuring the Header and adding some parameters but it&#=
8217;s underutilized right now and this Use Case is a perfectly
 appropriate use.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://tools.=
ietf.org/html/draft-ietf-jcardcal-jcard-06"><span style=3D"color:purple">ht=
tps://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06</span></a></span><o:=
p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">Obviously it would need t=
o be signed but we don&#8217;t need to worry about that ..yet.</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">From 3261</span><o:p></o:=
p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">20.9 Call-Info</span><o:p=
></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; The Call-Inf=
o header field provides additional information about the</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; caller or ca=
llee, depending on whether it is found in a request or</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; response.&nb=
sp; The purpose of the URI is described by the &quot;purpose&quot;</span><o=
:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; parameter.&n=
bsp; The &quot;icon&quot; parameter designates an image suitable as an</spa=
n><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; iconic repre=
sentation of the caller or callee.&nbsp; The &quot;info&quot; parameter</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; describes th=
e caller or callee in general, for example, through a web</span><o:p></o:p>=
</p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; page.&nbsp; =
The &quot;card&quot; parameter provides a business card, for example, in</s=
pan><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; vCard [36] o=
r LDIF [37] formats.&nbsp; Additional tokens can be registered</span><o:p><=
/o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; using IANA a=
nd the procedures in Section 27.</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Use of the C=
all-Info header field can pose a security risk.&nbsp; If a</span><o:p></o:p=
></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; callee fetch=
es the URIs provided by a malicious caller, the callee</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; may be at ri=
sk for displaying inappropriate or offensive content,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; dangerous or=
 illegal content, and so on.&nbsp; Therefore, it is</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; RECOMMENDED =
that a UA only render the information in the Call-Info</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; header field=
 if it can verify the authenticity of the element that</span><o:p></o:p></p=
>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; originated t=
he header field and trusts that element.&nbsp; This need not</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; be the peer =
UA; a proxy can insert this header field into requests.</span><o:p></o:p></=
p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Example:</sp=
an><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp; Call-Info: &=
lt;<a href=3D"http://wwww.example.com/alice/photo.jpg"><span style=3D"color=
:purple">http://wwww.example.com/alice/photo.jpg</span></a>&gt; ;purpose=3D=
icon,</span><o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;&nbsp;&nbsp;&nbsp; =
&lt;<a href=3D"http://www.example.com/alice/"><span style=3D"color:purple">=
http://www.example.com/alice/</span></a>&gt; ;purpose=3Dinfo</span><o:p></o=
:p></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;">Brian
 Rosen [<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:purple">m=
ailto:br@brianrosen.net</span></a>]<span class=3D"apple-converted-space">&n=
bsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Wednesday, N=
ovember 06, 2013 3:41 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Richard Shocke=
y<br>
<b>Cc:</b><span class=3D"apple-converted-space">&nbsp;</span>Fernando Mousi=
nho (fmousinh); Gorman, Pierce A [NTK];<span class=3D"apple-converted-space=
">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:purple=
">stir@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</spa=
n>List<br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div>
<p class=3D"MsoNormal">We&#8217;ve considered adding some information that =
is not number and is not name, but is something like &#8220;bank&#8221;, wh=
ich might have some sort of validation behind it.<o:p></o:p></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">Is that along the lines you were thinking?<o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal">Brian<o:p></o:p></p>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal">On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a h=
ref=3D"mailto:richard@shockey.us"><span style=3D"color:purple">richard@shoc=
key.us</span></a>&gt; wrote:<o:p></o:p></p>
</div>
</div>
<p class=3D"MsoNormal" style=3D"margin-bottom:12.0pt">&nbsp;<o:p></o:p></p>
<blockquote style=3D"margin-top:5.0pt;margin-bottom:5.0pt">
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I agree with Pierce here =
and respectfully disagree that STIR might eliminate the need for other form=
s of caller identification.&nbsp; Though your use case of credit
 card validation is a useful one and you are right there are still applicat=
ions that use SS7 for things that have nothing to do with call setup. I agr=
ee with you STIR may have more applications beyond the obvious ones of real=
time session validation.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s been my experi=
ence recently that there is a use case for something MORE in the identifica=
tion of the session as it is presented to the called party. This
 is the CNAM &#43; idea we are kicking around on the CNIT list.</span><o:p>=
</o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">_________________________=
______________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">cnit mailing list</span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"mailto:cnit@ie=
tf.org"><span style=3D"color:#954F72">cnit@ietf.org</span></a></span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a href=3D"https://www.ie=
tf.org/mailman/listinfo/cnit"><span style=3D"color:#954F72">https://www.iet=
f.org/mailman/listinfo/cnit</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">But your use case of a ba=
nk wanting to make sure they could properly identify themselves to the cons=
umer before establishing a conversation is exactly what
 this process is about.&nbsp; STIR is essential but it&#8217;s a multi-face=
ted problem that may require multi-faceted solutions.. and enhanced CNAM &#=
43; being only one of them.&nbsp;&nbsp; Its not unreasonable to discuss tho=
se.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">The obviously analogy is =
I would want to see some real identification of a utility worker before I l=
et them into my house to make repairs. &nbsp;I would want some
 validation that the call to me to reconfirm the appointments was in fact f=
rom the utility in question.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">&nbsp;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div style=3D"border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple=
-converted-space"><span style=3D"font-size:11.0pt;font-family:&quot;Calibri=
&quot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size=
:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;"><a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:purple">stir-bounces@iet=
f.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=
=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:purple">mailto:stir-=
bounces@ietf.org</span></a>]<span class=3D"apple-converted-space">&nbsp;</s=
pan><b>On
 Behalf Of<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando M=
ousinho (fmousinh)<br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>Tuesday, Nov=
ember 05, 2013 6:26 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span>Gorman, Pierce=
 A [NTK];<span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mail=
to:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org</span></a><br>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Let me rephrase it&#8230; it may elimin=
ate the need for other forms of caller identification beyond what STIR will=
 provide, depending on the specific use case. For example, a credit
 card company may choose to rely entirely on STIR before allowing a card to=
 be unblocked by an IVR (and as I said earlier, many companies do it today)=
. In other use cases, the TN alone is not sufficient information &#8211; my=
 health care provider will want to know
 which member of the family is calling.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I agree that ANI is already broadly use=
d to improve customer service today. However, it is not usually deemed as a=
 secure enough mechanism to validate the caller (therefore
 this WG!), except if you are a large organization that can leverage things=
 like SS7. STIR would make this type of validation available to a broader n=
umber of companies.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Going on a tangent&#8230; perhaps this =
is out of scope, but there is not a lot of discussion about called party hi=
jacking. Couldn&#8217;t a man-in-the-middle try to answer calls on my
 behalf? If my bank is calling me, I want to make sure it&#8217;s really th=
em before carrying a conversation, but wouldn&#8217;t they want the same?&n=
bsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">&lt;Gorman&gt;, &quot;Pierce A =
[NTK]&quot; &lt;<a href=3D"mailto:Pierce.Gorman@sprint.com"><span style=3D"=
color:#954F72">Pierce.Gorman@sprint.com</span></a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Nov=
ember 5, 2013 at 6:05 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Fernando Mousi=
nho &lt;<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"color:#954F72"=
>fmousinh@cisco.com</span></a>&gt;, &quot;<a href=3D"mailto:stir@ietf.org">=
<span style=3D"color:#954F72">stir@ietf.org</span></a>&quot; &lt;<a href=3D=
"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></=
a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>RE: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">I agree with your character=
ization of businesses as victim of caller ID fraud however contact centers =
also use TN as a key to improve information available to
 call agents to reduce average time-per-call and increase capacity of the c=
all center.&nbsp; So I don&#8217;t agree that STIR would &#8220;eliminate t=
he need for caller identification from known TNs.&#8221;</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">But perhaps I misunderstood=
 your last sentence?</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ar=
ial&quot;,&quot;sans-serif&quot;;color:#0000CC">&nbsp;</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;">From:</span></b><span class=3D"apple-=
converted-space"><span style=3D"font-size:10.0pt;font-family:&quot;Tahoma&q=
uot;,&quot;sans-serif&quot;">&nbsp;</span></span><span style=3D"font-size:1=
0.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif&quot;">Fernando
 Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span style=3D"=
color:#954F72">mailto:fmousinh@cisco.com</span></a>]<span class=3D"apple-co=
nverted-space">&nbsp;</span><br>
<b>Sent:</b><span class=3D"apple-converted-space">&nbsp;</span>November 05,=
 2013 4:34 PM<br>
<b>To:</b><span class=3D"apple-converted-space">&nbsp;</span><a href=3D"mai=
lto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span></a><b=
r>
<b>Subject:</b><span class=3D"apple-converted-space">&nbsp;</span>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">I would suggest we add a new attack typ=
e to section 3. More and more companies are using the caller ID for account=
 validation. For example, if I call my credit card provider
 from my office number, they ask me for identification. If I call from my h=
ome phone number, I&#8217;m informed that I don&#8217;t need to provide any=
 further identification because my number is on file. Some (all?) companies=
 that implement this type of validation rely
 on SS7 today.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Ultimately, this is yet another variati=
on of impersonation &#8211; but in this case, the &#8220;victim&#8221; is a=
 business, unlike the other two scenarios we&#8217;ve listed so far.</span>=
<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Addressing this scenario would actually=
 turn STIR into a feature, given it would enable contact centers of all siz=
es to eliminate the need for caller identification from
 known TNs.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">From:<span class=3D"apple-converted-=
space">&nbsp;</span></span></b><span style=3D"font-size:11.0pt;font-family:=
&quot;Calibri&quot;,&quot;sans-serif&quot;">Alex Bobotek &lt;<a href=3D"mai=
lto:alex@bobotek.net"><span style=3D"color:#954F72">alex@bobotek.net</span>=
</a>&gt;<br>
<b>Date:<span class=3D"apple-converted-space">&nbsp;</span></b>Tuesday, Oct=
ober 1, 2013 at 12:51 PM<br>
<b>To:<span class=3D"apple-converted-space">&nbsp;</span></b>Brian Rosen &l=
t;<a href=3D"mailto:br@brianrosen.net"><span style=3D"color:#954F72">br@bri=
anrosen.net</span></a>&gt;, &quot;Peterson, Jon&quot; &lt;<a href=3D"mailto=
:jon.peterson@neustar.biz"><span style=3D"color:#954F72">jon.peterson@neust=
ar.biz</span></a>&gt;<br>
<b>Cc:<span class=3D"apple-converted-space">&nbsp;</span></b>&quot;<a href=
=3D"mailto:stir@ietf.org"><span style=3D"color:#954F72">stir@ietf.org</span=
></a>&quot; &lt;<a href=3D"mailto:stir@ietf.org"><span style=3D"color:#954F=
72">stir@ietf.org</span></a>&gt;, Richard Shockey &lt;<a href=3D"mailto:ric=
hard@shockey.us"><span style=3D"color:#954F72">richard@shockey.us</span></a=
>&gt;,
 &quot;'DOLLY, MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D"color:#954F72">md3135@att.com</span></a>&gt;, 'Robert Sparks' &lt;=
<a href=3D"mailto:rjsparks@nostrum.com"><span style=3D"color:#954F72">rjspa=
rks@nostrum.com</span></a>&gt;<br>
<b>Subject:<span class=3D"apple-converted-space">&nbsp;</span></b>Re: [stir=
] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Jon,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Thanks for the response.&nbsp; The inte=
ntion in #1 below is to clarify the following sentence:</span><o:p></o:p></=
p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">The<span class=3D"apple-converted-space=
">&nbsp;</span><b>primary</b><span class=3D"apple-converted-space">&nbsp;</=
span>attack vector is</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; therefore one where the at=
tacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number in signaling to be =
a particular chosen number, one that the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; attacker does not have the=
 authority to call from,<span class=3D"apple-converted-space">&nbsp;</span>=
<b>in order for that</b></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><b><span style=3D"font-size:11.0pt;font-family:&quot=
;Calibri&quot;,&quot;sans-serif&quot;">&nbsp;&nbsp; number to be rendered o=
n the terminating side</span></b><span style=3D"font-size:11.0pt;font-famil=
y:&quot;Calibri&quot;,&quot;sans-serif&quot;">.&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">This might be misconstrued as indicatin=
g that the objective of spoofing is simply the rendering of a spoofed numbe=
r on the receiving display, causing mistaken conclusions
 that defenses might be limited to securing the rendered information. &nbsp=
;No issues with leaving this as it&#8217;s a valid point.&nbsp; Another (in=
creasing) motivation is to evade network and/or endpoint defenses that may =
block based on CPN.&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">So however it&#8217;s worded, I think i=
t&#8217;s important to allow for both attack objectives of a spoofed presen=
tation at the endpoint and in transit.&nbsp; &nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Regards,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">Alex</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; -----Original Message-----</span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; From:<span class=3D"apple-converte=
d-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"><span style=
=3D"color:#954F72">stir-bounces@ietf.org</span></a><span class=3D"apple-con=
verted-space">&nbsp;</span>[<a href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D"color:#954F72">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf Of</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian Rosen</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Sent: Tuesday, October 01, 2013 9:=
29 AM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; To: Peterson, Jon</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Cc:<span class=3D"apple-converted-=
space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:#=
954F72">stir@ietf.org</span></a>; Alex Bobotek; 'Robert Sparks'; 'DOLLY,
 MARTIN C'; Richard</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Shockey</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Subject: Re: [stir] draft-peterson=
-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Don't think there is much MESSAGE.=
&nbsp; MSRP is about all we see, and XMPP is</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; more likely than that.</span><o:p>=
</o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; Brian</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; On Oct 1, 2013, at 12:24 PM, &quot=
;Peterson, Jon&quot; &lt;<a href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D"color:windowtext;text-decoration:none">jon.peterson@neustar.biz</s=
pan></a>&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; wrote:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Thanks for these notes, Alex.=
 Some responses below.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here are several comments=
 that should feed into the IETF Peterson draft:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Remove any =
assumptions that the solution cannot be in-network</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; [IMO,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; both endpoint and in-netw=
ork solutions should be facilitated]</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Agreed that both in-band and =
out-of-band solutions can usually be</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; implemented in either endpoin=
ts or in intermediaries of various kinds.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; If I see text that implies ot=
herwise, I'll certainly change it.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; *&nbsp;&nbsp; Add a sessi=
onless attack scenario.&nbsp; A spam payload may be carried in</span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; a</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; SIP INVITE or MESSAGE, wh=
ich might contain stock market advice even</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; in a display name field.&=
nbsp; These attacks do NOT require session</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; establishment.</span><o:p></o:p></=
p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; More generally, we should=
 be mindful of the fact that SIP is used in</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; telephony form more than =
voice session setup.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Probably if we were going to =
include a sessionless attack scenario, it</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; would be with regular text me=
ssages (whether carried on the PSTN over</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; TCAP or with some Internet pr=
otocol, including MESSAGE) rather than</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; with an INVITE, which typical=
ly wouldn't result in a payload being</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; immediately rendered to a use=
r. More on this below with your suggested</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; text.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Here's some suggested mar=
kup:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 1.&nbsp;&nbsp;&nbsp; Repl=
ace 2nd sentence of 2nd paragraph of 1.0 Introduction with:</span><o:p></o:=
p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; The primary attack vector=
 is</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; therefore one where=
 the attacker contrives for the calling telephone</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; number in signaling to be=
 a particular chosen number that the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; attacker does not have th=
e authority to call from.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; What you want here is to remo=
ve the implication that the number will</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; be rendered on the terminatin=
g side? While there are some attacks</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; where that isn't significant,=
 perhaps, I would say it is significant</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; in the primary attack vectors=
 that concern us.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 2.&nbsp; Replace 3rd para=
graph of 2.1 Endpoints with:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; S=
mart devices are generally based on computers with some degree</span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; of programmability, the c=
apacity to access the Internet, and</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; capabilities of rendering=
 text, audio and/or images.&nbsp; This includes</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; smart phones, telephone a=
pplications on desktop and laptop computers,</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; IP private branch exchang=
es, and so on.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; I can add the notion that sma=
rt devices can render text, audio and/or</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; images as you suggest.</span>=
<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; 3.&nbsp; Add to 3.3 Attac=
k Scenarios:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; Impersonation, IP-Mobile Text Message</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp; &nbsp;An attacker with an computer sends a high volume of SIP MESSAGE=
</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; spam message to IP-enable=
d smart phones using randomized calling</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; party numbers.</span><o:p=
></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&=
nbsp; Countermeasure: in-band authenticated identity</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Provided we're talking about =
end-to-end SIP use of MESSAGE, agreed</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; that in-band would be the rig=
ht countermeasure. I am curious though</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; whether practically speaking =
there is enough use of MESSAGE in this</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; fashion that we're actually s=
eeing high-volume spam over MESSAGE</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; today. Either way, no problem=
 having an attack scenario of this form in the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; document.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Jon Peterson</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; Neustar, Inc.</span><o:p></o:=
p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Regards,</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; Alex</span><o:p></o:p></p=
>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of Richard Shockey</s=
pan><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 1:11 PM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: 'DOLLY, MARTIN C'=
; 'Robert Sparks'</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1</span><o:p></o=
:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; -----Original Message=
-----</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; From:<span class=3D"a=
pple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@ietf.org"=
><span style=3D"color:windowtext;text-decoration:none">stir-bounces@ietf.or=
g</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a href=3D"=
mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-decorati=
on:none">mailto:stir-bounces@ietf.org</span></a>]
 On Behalf</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Of DOLLY, MARTIN C</s=
pan><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Sent: Monday, Septemb=
er 30, 2013 12:58 PM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; To: Robert Sparks</sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Cc:<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Subject: Re: [stir] d=
raft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Yes, ok</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Martin Dolly</span><o=
:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Lead Member of Techni=
cal Staff</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Core Network &amp; Go=
v't/Regulatory Standards AT&amp;T Labs - Network</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; Technology</span><o:p=
></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; &#43;1-609-903-3360</=
span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:md3135@att.com"><span style=
=3D"color:windowtext;text-decoration:none">md3135@att.com</span></a></span>=
<o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; On Sep 30, 2013, =
at 12:47 PM, &quot;Robert Sparks&quot;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; &lt;<a href=3D"ma=
ilto:rjsparks@nostrum.com"><span style=3D"color:windowtext;text-decoration:=
none">rjsparks@nostrum.com</span></a>&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; wrote:</span><o:p></o=
:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; On 9/26/13 3:=
42 PM, DOLLY, MARTIN C wrote:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; With Hadriel =
comments incorporated, it is a start</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Hi Martin -</span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; Just to make sure=
 - I think you're referring to Hadriel's comments</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; on the</span><o:p=
></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; problem statement doc=
ument?</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; I don't think Had=
riel's commented directly on stir-threats yet.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; In any case, we _=
are_ talking about a starting place, not a</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; finished</span><o=
:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; product.</span><o:p><=
/o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; If there's no oth=
er objection, I'd like to get Jon to submit the</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; threats</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document as a WG -00 =
as soon as it's convenient.</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; RjS</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; -----Original=
 Message-----</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; From:<span cl=
ass=3D"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir-bounces@i=
etf.org"><span style=3D"color:windowtext;text-decoration:none">stir-bounces=
@ietf.org</span></a><span class=3D"apple-converted-space">&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span style=3D"color:windowtext;text-=
decoration:none">mailto:stir-bounces@ietf.org</span></a>]
 On</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Behalf Of Rus=
s Housley</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Sent: Thursda=
y, September 26, 2013 4:37 PM</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; To: IETF STIR=
 Mail List</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Subject: Re: =
[stir] draft-peterson-stir-threats-00.txt</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; It has been s=
ix days, I'd like to hear from more people about this</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; document.&nbsp; Marti=
n asked for an additional week, so I'm sure we will</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; hear from him soon.</=
span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; Russ</span><o=
:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;</span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; On Sep 20=
, 2013, at 5:23 PM, Russ Housley wrote:</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;<span clas=
s=3D"apple-converted-space">&nbsp;</span><a href=3D"http://www.ietf.org/id/=
draft-peterson-stir-threats-00.txt"><span style=3D"color:windowtext;text-de=
coration:none">http://www.ietf.org/id/draft-peterson-stir-threats-00.txt</s=
pan></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Should th=
e working group adopt this I-D as the starting point for</span><o:p></o:p><=
/p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; the</span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; STIR threat docuent?<=
/span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt;</span><o:=
p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;&gt; Russ</spa=
n><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; _____________=
__________________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span=
 style=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></=
span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;&gt;<span class=3D=
"apple-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailma=
n/listinfo/stir"><span style=3D"color:windowtext;text-decoration:none">http=
s://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;</span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; _________________=
______________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt; stir mailing list=
</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span sty=
le=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span=
><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;&gt;<span class=3D"app=
le-converted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/li=
stinfo/stir"><span style=3D"color:windowtext;text-decoration:none">https://=
www.ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; _____________________=
__________________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt; stir mailing list</sp=
an><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=
=3D"color:windowtext;text-decoration:none">stir@ietf.org</span></a></span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;&gt;<span class=3D"apple-c=
onverted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listin=
fo/stir"><span style=3D"color:windowtext;text-decoration:none">https://www.=
ietf.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; _________________________=
______________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt; stir mailing list</span><=
o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"co=
lor:windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></=
o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;&gt;<span class=3D"apple-conve=
rted-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/s=
tir"><span style=3D"color:windowtext;text-decoration:none">https://www.ietf=
.org/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; _____________________________=
__________________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt; stir mailing list</span><o:p>=
</o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:=
windowtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p>=
</p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; &gt;<span class=3D"apple-converted=
-space">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"=
><span style=3D"color:windowtext;text-decoration:none">https://www.ietf.org=
/mailman/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; __________________________________=
_____________</span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt; stir mailing list</span><o:p></o:p=
></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"mailto:stir@ietf.org"><span style=3D"color:windo=
wtext;text-decoration:none">stir@ietf.org</span></a></span><o:p></o:p></p>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&gt;<span class=3D"apple-converted-spac=
e">&nbsp;</span><a href=3D"https://www.ietf.org/mailman/listinfo/stir"><spa=
n style=3D"color:windowtext;text-decoration:none">https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p>
</div>
</div>
</div>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:10.5pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;">&nbsp;</span><o:p></o:p></p>
</div>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center"><span=
 style=3D"font-size:10.5pt;font-family:&quot;Calibri&quot;,&quot;sans-serif=
&quot;">
<hr size=3D"3" width=3D"100%" align=3D"center">
</span></div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:9.0pt;font-family:&quot;Hel=
vetica&quot;,&quot;sans-serif&quot;">______________________________________=
_________<br>
stir mailing list<br>
<a href=3D"mailto:stir@ietf.org"><span style=3D"color:purple">stir@ietf.org=
</span></a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/stir"><span style=3D"color=
:purple">https://www.ietf.org/mailman/listinfo/stir</span></a></span><o:p><=
/o:p></p>
</div>
</blockquote>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
</div>
</div>
<div>
<p class=3D"MsoNormal">&nbsp;<o:p></o:p></p>
</div>
<div class=3D"MsoNormal" align=3D"center" style=3D"text-align:center">
<hr size=3D"2" width=3D"100%" align=3D"center">
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"font-size:7.5pt;font-family:&quot;Ari=
al&quot;,&quot;sans-serif&quot;;color:gray"><br>
This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.</span><o:p></o:p></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
</div>
</body>
</html>

--_000_E6A16181E5FD2F46B962315BB05962D01FC23ABCp2pxmb13fccnetw_--

From kent@bbn.com  Thu Nov  7 09:18:46 2013
Return-Path: <kent@bbn.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AABB721E811D for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:18:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.535
X-Spam-Level: 
X-Spam-Status: No, score=-106.535 tagged_above=-999 required=5 tests=[AWL=0.063, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ZPKhK5HQx26g for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:18:41 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 563A121F9343 for <cnit@ietf.org>; Thu,  7 Nov 2013 09:18:26 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:34104 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VeTDs-000Glx-At for cnit@ietf.org; Thu, 07 Nov 2013 12:18:24 -0500
Message-ID: <527BCB5F.1080001@bbn.com>
Date: Thu, 07 Nov 2013 12:18:23 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: cnit@ietf.org
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov>
In-Reply-To: <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov>
Content-Type: multipart/alternative; boundary="------------020501010107010508000703"
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:18:46 -0000

This is a multi-part message in MIME format.
--------------020501010107010508000703
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Henning,

> As a thought experiment, Kumiko Ono and I had published a draft
>
> http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00
>
> to allow third parties to validate property information. If the 
> validating party (e.g., a bank regulator) is willing to sign a 
> certificate, similar in spirit to the framed gold-leaf diplomas in 
> your dentist's office or, more lowly, to the health departments rating 
> in a restaurant window, and it can be tied to a phone number, this 
> shouldn't be too hard.
>
> It's a bit harder if the certifying authority (regulator, Realtor 
> board, local bar association, ...) is not involved.
>
The tricky part is ensuring that a certificate (using the term broadly) 
issued by some
organization is not interpreted by relying parties as meaning more than 
it should.

It is not clear to me that most entities are good choices for the 
binding of a name
to a phone number. In part this is because these entities do not 
consider the phone
number to be a critical aspect of the attributes for which they vouch.

My dentist's diploma is valid irrespective of the location (much less 
the phone number)
for his office. BTW, as the geographic boundaries for area code change, 
phone numbers
change. My home didn't move and it took a while for many of the records 
held by other
parties to be updated. So, no, I would not rely on many parties of the 
sort you seem to suggest,
to issue a credential binding my name to a phone nmber

Steve

--------------020501010107010508000703
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Henning,<br>
    <br>
    <blockquote
      cite="mid:E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      <meta name="Generator" content="Microsoft Word 14 (filtered
        medium)">
      <!--[if !mso]><style>v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]-->
      <style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
p.msochpdefault, li.msochpdefault, div.msochpdefault
	{mso-style-name:msochpdefault;
	mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:10.0pt;
	font-family:"Times New Roman","serif";}
span.emailstyle18
	{mso-style-name:emailstyle18;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.balloontextchar0
	{mso-style-name:balloontextchar;
	font-family:"Tahoma","sans-serif";}
span.emailstyle21
	{mso-style-name:emailstyle21;
	font-family:"Arial","sans-serif";
	color:#0000CC;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle24
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext="edit" spidmax="1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext="edit">
<o:idmap v:ext="edit" data="1" />
</o:shapelayout></xml><![endif]-->
      <div class="WordSection1">
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">As
            a thought experiment, Kumiko Ono and I had published a draft
            <o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><a class="moz-txt-link-freetext" href="http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00">http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00</a><o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">to
            allow third parties to validate property information. If the
            validating party (e.g., a bank regulator) is willing to sign
            a certificate, similar in spirit to the framed gold-leaf
            diplomas in your dentist&#8217;s office or, more lowly, to the
            health departments rating in a restaurant window, and it can
            be tied to a phone number, this shouldn&#8217;t be too hard.<o:p></o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span></p>
        <p class="MsoNormal"><span
style="font-size:11.0pt;font-family:&quot;Calibri&quot;,&quot;sans-serif&quot;;color:#1F497D">It&#8217;s
            a bit harder if the certifying authority (regulator, Realtor
            board, local bar association, &#8230;) is not involved.</span></p>
      </div>
    </blockquote>
    The tricky part is ensuring that a certificate (using the term
    broadly) issued by some<br>
    organization is not interpreted by relying parties as meaning more
    than it should.<br>
    <br>
    It is not clear to me that most entities are good choices for the
    binding of a name<br>
    to a phone number. In part this is because these entities do not
    consider the phone<br>
    number to be a critical aspect of the attributes for which they
    vouch.<br>
    <br>
    My dentist's diploma is valid irrespective of the location (much
    less the phone number)<br>
    for his office. BTW, as the geographic boundaries for area code
    change, phone numbers<br>
    change. My home didn't move and it took a while for many of the
    records held by other <br>
    parties to be updated. So, no, I would not rely on many parties of
    the sort you seem to suggest,<br>
    to issue a credential binding my name to a phone nmber<br>
    <br>
    Steve<br>
  </body>
</html>

--------------020501010107010508000703--

From michael.hammer@yaanatech.com  Thu Nov  7 09:21:44 2013
Return-Path: <michael.hammer@yaanatech.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 61EB621E81FE; Thu,  7 Nov 2013 09:21:44 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.276
X-Spam-Level: 
X-Spam-Status: No, score=-2.276 tagged_above=-999 required=5 tests=[AWL=0.322,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xPE+QagjjTuR; Thu,  7 Nov 2013 09:21:31 -0800 (PST)
Received: from email1.corp.yaanatech.com (webmail10.yaanatech.com [63.128.177.10]) by ietfa.amsl.com (Postfix) with ESMTP id A4E9C11E822F; Thu,  7 Nov 2013 09:21:09 -0800 (PST)
Received: from SC9-EX2K10MB1.corp.yaanatech.com ([fe80::149d:c2e1:8065:2a47]) by ex2k10hub1.corp.yaanatech.com ([::1]) with mapi id 14.01.0218.012; Thu, 7 Nov 2013 09:21:09 -0800
From: Michael Hammer <michael.hammer@yaanatech.com>
To: "Henning.Schulzrinne@fcc.gov" <Henning.Schulzrinne@fcc.gov>, "br@brianrosen.net" <br@brianrosen.net>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQIJuyR31NLy1lMhJkGcqWArv1sc1QINOqbRAr/2giEC0l///wF434JzmR/4cmCAAD+vQIABiMQAgAABSwCAABcWAIA3YVcAgAAInoCAAAXVgIAA6nqAgAB5wgCAAAhegIAAk5aAgACVVgCAAAHaAP//gKwwgACTmgCAAA4fAP//exIAgACINID//3rI4A==
Date: Thu, 7 Nov 2013 17:21:07 +0000
Message-ID: <00C069FD01E0324C9FFCADF539701DB3BBEF7EFE@sc9-ex2k10mb1.corp.yaanatech.com>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov> <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net> <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC23ABC@fcc.gov>
In-Reply-To: <E6A16181E5FD2F46B962315BB05962D01FC23ABC@fcc.gov>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator: 
x-originating-ip: [10.17.100.142]
Content-Type: multipart/signed; protocol="application/x-pkcs7-signature"; micalg=SHA1; boundary="----=_NextPart_000_0095_01CEDBB3.D514C460"
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "Pierce.Gorman@sprint.com" <Pierce.Gorman@sprint.com>, "fmousinh@cisco.com" <fmousinh@cisco.com>, "cnit@ietf.org" <cnit@ietf.org>, "richard@shockey.us" <richard@shockey.us>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:21:44 -0000

------=_NextPart_000_0095_01CEDBB3.D514C460
Content-Type: multipart/alternative;
	boundary="----=_NextPart_001_0096_01CEDBB3.D514C460"


------=_NextPart_001_0096_01CEDBB3.D514C460
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

Agree, the user may trust the carrier or someone like FTC or FCC.

But, if it goes beyond a small handful, forget it.

 

Bottom line, the average user needs to know that someone has actually 

gone to the business site and knocked on the door, met the people, 

and seen that it is a real business.

Not, just some fly-by-night operation that logged into some website.

 

Mike

 

 

From: Henning Schulzrinne [mailto:Henning.Schulzrinne@fcc.gov] 
Sent: Thursday, November 07, 2013 12:15 PM
To: Michael Hammer; br@brianrosen.net
Cc: Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org;
fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

The user shouldn't and wouldn't - they would trust a third party (often,
their carrier, I suspect) to figure out who can attest to the bankiness of a
bank. This is not new - there are a number of existing outfits that do this
for web sites. (Example: Avast has a bar graph that shows trustworthiness.)

 

 

From: Michael Hammer [mailto:michael.hammer@yaanatech.com] 
Sent: Thursday, November 07, 2013 12:10 PM
To: br@brianrosen.net; Henning Schulzrinne
Cc: Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org;
fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

So, how does the average user know who is an authority?

(Note, we are not designing for IETF geniuses here.)

 

Is some well-known central authority going to certify all of these?

Are each of these going to cross-certify all the others? (federated model)

 

We need to always answer that fundamental user question:

Why should I TRUST this information?

 

Mike

 

 

From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: Thursday, November 07, 2013 12:03 PM
To: Henning Schulzrinne
Cc: Michael Hammer; Pierce.Gorman@sprint.com; Richard Shockey;
stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Right.  I believe we can do this pretty easily.  We probably could have a
100 categories that would have similar authorities, and there are
classifications maintained by folks like Dun Bradstreet that can go even
farther.

 

What I think would be substantially harder is to validate an entire V/X/J
card.  How is a validator to know your nickname is Fluffy?  Name, phone
number and, if a business, a classification, yes, we can do that.  Content
of a business card - very hard.

 

Brian

 

 

On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne
<Henning.Schulzrinne@fcc.gov> wrote:

 

Yes, that's a problem, but as long as the number of categories is small, you
can build UIs that only render information that's appropriate to the
declaration. For practical reasons, I think the number of useful categories
is likely going to be fairly limited:

-          Financial institution (FDIC and a few others)

-          Health care (each health care facility has a gov't number)

-          Charity (501c3, state registered)

-          Contractor (state-licensed)

-          Public safety organization (police, fire)

-          Lawyer (bar association)

-          Local, state and federal government (.gov in the US)

 

I suspect that list encompasses a large fraction of the fraudulent
(impersonation) calls. For all of the above, at least within a country, it's
pretty clear who can attest to the membership. Yes, this requires some UI
work or some server logic, but these categories and the organizations don't
change all that often - in most cases, the certifying entities have probably
been the same for the past 50+ years. I'm not as worried about figuring out
whether the beautician, mortician or florist is licensed and properly
identified, although I'm sure we can all come up with potential fraud
stories.

 

From: Michael Hammer [mailto:michael.hammer@yaanatech.com] 
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net;
richard@shockey.us
Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

So, would you trust a certificate from the City of Reston, Virginia police
department?

 

(Hint:  you can find Reston on a map, but there is no City of Reston. 

  The only police are Fairfax County.)

 

My concern is that one you dilute or disperse authority, it becomes a
free-for-all again, and anybody's guess.

 

Mike

 

 

From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of
Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc:  <mailto:stir@ietf.org> stir@ietf.org List; Fernando Mousinho
(fmousinh);  <mailto:cnit@ietf.org> cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

As a thought experiment, Kumiko Ono and I had published a draft

 

 <http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00>
http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

 

to allow third parties to validate property information. If the validating
party (e.g., a bank regulator) is willing to sign a certificate, similar in
spirit to the framed gold-leaf diplomas in your dentist's office or, more
lowly, to the health departments rating in a restaurant window, and it can
be tied to a phone number, this shouldn't be too hard.

 

It's a bit harder if the certifying authority (regulator, Realtor board,
local bar association, .) is not involved.

 

Henning

 

From:  <mailto:cnit-bounces@ietf.org> cnit-bounces@ietf.org
<mailto:[mailto:cnit-bounces@ietf.org]> [mailto:cnit-bounces@ietf.org] On
Behalf Of Gorman, Pierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc:  <mailto:stir@ietf.org> stir@ietf.org List;  <mailto:cnit@ietf.org>
cnit@ietf.org; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

 

I'll admit I am not familiar with v/x/jcard encoding differences or the
implications of their use so I'll encourage educating me if it isn't too
onerous.

 

I'm not sure what is the concern with a 3rd party providing "validation"
though.  There are numerous examples of 3rd parties providing validation of
information including NASDAQ, NYSE, Barron's, Moody's, and the federal
reserve banking system to name a few.

 

Pierce

 

From: Brian Rosen [ <mailto:br@brianrosen.net> mailto:br@brianrosen.net] 
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK];
<mailto:stir@ietf.org> stir@ietf.org List;  <mailto:cnit@ietf.org>
cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I think this would be a heavy lift.

 

If the responsible entity was a carrier, then it would have to validate the
data, which it has very little basis to validate.  It could get a 3rd party
to do the validation, but then it's putting its reputation on the back of
some hired hand validator.

 

If the responsibility is the end user/device, then the signature has no
value.

 

I do not argue that Call-Info is suitable,  it is.

 

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is
XML described by schema, not json.

 

Brian

 

On Nov 6, 2013, at 1:10 PM, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us> wrote:

 

URI for a JCARD in the CALL INFO header provisioned by the calling party and
ultimately signed by the responsible entity.  The carrier could provision
this for their mobile or hosted customers.  Enterprises could do this
themselves.  This also has advantages in Enterprise to Enterprise UC as well
where the data is derived from the Enterprise "directory" and could
facilitate end to end PPX to PBX communications especially in point to point
video communications.

 

There are certainly privacy and security issues to be addressed.  The Push
vs Pull model.  This really would be PII in the clear but then its done
voluntarily.

 

There would have to be some work around restructuring the Header and adding
some parameters but it's underutilized right now and this Use Case is a
perfectly appropriate use.

 

 <https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06>
https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

 

Obviously it would need to be signed but we don't need to worry about that
..yet.

 

>From 3261

 

20.9 Call-Info

 

   The Call-Info header field provides additional information about the

   caller or callee, depending on whether it is found in a request or

   response.  The purpose of the URI is described by the "purpose"

   parameter.  The "icon" parameter designates an image suitable as an

   iconic representation of the caller or callee.  The "info" parameter

   describes the caller or callee in general, for example, through a web

   page.  The "card" parameter provides a business card, for example, in

   vCard [36] or LDIF [37] formats.  Additional tokens can be registered

   using IANA and the procedures in Section 27.

 

   Use of the Call-Info header field can pose a security risk.  If a

   callee fetches the URIs provided by a malicious caller, the callee

   may be at risk for displaying inappropriate or offensive content,

   dangerous or illegal content, and so on.  Therefore, it is

   RECOMMENDED that a UA only render the information in the Call-Info

   header field if it can verify the authenticity of the element that

   originated the header field and trusts that element.  This need not

   be the peer UA; a proxy can insert this header field into requests.

 

   Example:

 

   Call-Info: < <http://wwww.example.com/alice/photo.jpg>
http://wwww.example.com/alice/photo.jpg> ;purpose=icon,

     < <http://www.example.com/alice/> http://www.example.com/alice/>
;purpose=info

 

From: Brian Rosen [ <mailto:br@brianrosen.net> mailto:br@brianrosen.net] 
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK];
<mailto:stir@ietf.org> stir@ietf.org List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

We've considered adding some information that is not number and is not name,
but is something like "bank", which might have some sort of validation
behind it.

 

Is that along the lines you were thinking?

 

Brian

On Nov 6, 2013, at 5:25 AM, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us> wrote:

 

I agree with Pierce here and respectfully disagree that STIR might eliminate
the need for other forms of caller identification.  Though your use case of
credit card validation is a useful one and you are right there are still
applications that use SS7 for things that have nothing to do with call
setup. I agree with you STIR may have more applications beyond the obvious
ones of realtime session validation.

 

It's been my experience recently that there is a use case for something MORE
in the identification of the session as it is presented to the called party.
This is the CNAM + idea we are kicking around on the CNIT list.

 

_______________________________________________

cnit mailing list

 <mailto:cnit@ietf.org> cnit@ietf.org

 <https://www.ietf.org/mailman/listinfo/cnit>
https://www.ietf.org/mailman/listinfo/cnit

 

But your use case of a bank wanting to make sure they could properly
identify themselves to the consumer before establishing a conversation is
exactly what this process is about.  STIR is essential but it's a
multi-faceted problem that may require multi-faceted solutions.. and
enhanced CNAM + being only one of them.   Its not unreasonable to discuss
those.

 

The obviously analogy is I would want to see some real identification of a
utility worker before I let them into my house to make repairs.  I would
want some validation that the call to me to reconfirm the appointments was
in fact from the utility in question.

 

 

 

From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of
Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK];  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Let me rephrase it. it may eliminate the need for other forms of caller
identification beyond what STIR will provide, depending on the specific use
case. For example, a credit card company may choose to rely entirely on STIR
before allowing a card to be unblocked by an IVR (and as I said earlier,
many companies do it today). In other use cases, the TN alone is not
sufficient information - my health care provider will want to know which
member of the family is calling.

 

I agree that ANI is already broadly used to improve customer service today.
However, it is not usually deemed as a secure enough mechanism to validate
the caller (therefore this WG!), except if you are a large organization that
can leverage things like SS7. STIR would make this type of validation
available to a broader number of companies.

 

 

Going on a tangent. perhaps this is out of scope, but there is not a lot of
discussion about called party hijacking. Couldn't a man-in-the-middle try to
answer calls on my behalf? If my bank is calling me, I want to make sure
it's really them before carrying a conversation, but wouldn't they want the
same? 

 

 

From: <Gorman>, "Pierce A [NTK]" < <mailto:Pierce.Gorman@sprint.com>
Pierce.Gorman@sprint.com>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho < <mailto:fmousinh@cisco.com> fmousinh@cisco.com>, "
<mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

I agree with your characterization of businesses as victim of caller ID
fraud however contact centers also use TN as a key to improve information
available to call agents to reduce average time-per-call and increase
capacity of the call center.  So I don't agree that STIR would "eliminate
the need for caller identification from known TNs."

 

But perhaps I misunderstood your last sentence?

 

 

From: Fernando Mousinho (fmousinh) [ <mailto:fmousinh@cisco.com>
mailto:fmousinh@cisco.com] 
Sent: November 05, 2013 4:34 PM
To:  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I would suggest we add a new attack type to section 3. More and more
companies are using the caller ID for account validation. For example, if I
call my credit card provider from my office number, they ask me for
identification. If I call from my home phone number, I'm informed that I
don't need to provide any further identification because my number is on
file. Some (all?) companies that implement this type of validation rely on
SS7 today.

 

Ultimately, this is yet another variation of impersonation - but in this
case, the "victim" is a business, unlike the other two scenarios we've
listed so far.

 

Addressing this scenario would actually turn STIR into a feature, given it
would enable contact centers of all sizes to eliminate the need for caller
identification from known TNs.

 

 

 

From: Alex Bobotek < <mailto:alex@bobotek.net> alex@bobotek.net>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen < <mailto:br@brianrosen.net> br@brianrosen.net>, "Peterson,
Jon" < <mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>
Cc: " <mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us>, "'DOLLY, MARTIN C'" < <mailto:md3135@att.com>
md3135@att.com>, 'Robert Sparks' < <mailto:rjsparks@nostrum.com>
rjsparks@nostrum.com>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Jon,

 

Thanks for the response.  The intention in #1 below is to clarify the
following sentence:

 

The primary attack vector is

   therefore one where the attacker contrives for the calling telephone

   number in signaling to be a particular chosen number, one that the

   attacker does not have the authority to call from, in order for that

   number to be rendered on the terminating side. 

 

This might be misconstrued as indicating that the objective of spoofing is
simply the rendering of a spoofed number on the receiving display, causing
mistaken conclusions that defenses might be limited to securing the rendered
information.  No issues with leaving this as it's a valid point.  Another
(increasing) motivation is to evade network and/or endpoint defenses that
may block based on CPN. 

 

So however it's worded, I think it's important to allow for both attack
objectives of a spoofed presentation at the endpoint and in transit.   

 

Regards,

 

Alex

 

> -----Original Message-----

> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc:  <mailto:stir@ietf.org> stir@ietf.org; Alex Bobotek; 'Robert Sparks';
'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> 

> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

> 

> Brian

> 

> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <
<mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>

> wrote:

> 

> > Thanks for these notes, Alex. Some responses below.

> >

> >> Here are several comments that should feed into the IETF Peterson
draft:

> >>

> >> *   Remove any assumptions that the solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions should be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can usually be

> > implemented in either endpoints or in intermediaries of various kinds.

> > If I see text that implies otherwise, I'll certainly change it.

> >

> >> *   Add a sessionless attack scenario.  A spam payload may be carried
in

> a

> >> SIP INVITE or MESSAGE, which might contain stock market advice even

> >> in a display name field.  These attacks do NOT require session

> establishment.

> >> More generally, we should be mindful of the fact that SIP is used in

> >> telephony form more than voice session setup.

> >

> > Probably if we were going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the PSTN over

> > TCAP or with some Internet protocol, including MESSAGE) rather than

> > with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this below with your suggested

> text.

> >

> >> Here's some suggested markup:

> >>

> >>

> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:

> >>

> >> The primary attack vector is

> >>  therefore one where the attacker contrives for the calling telephone

> >> number in signaling to be a particular chosen number that the

> >> attacker does not have the authority to call from.

> >

> > What you want here is to remove the implication that the number will

> > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, I would say it is significant

> > in the primary attack vectors that concern us.

> >

> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:

> >>

> >>     Smart devices are generally based on computers with some degree

> >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio and/or images.  This includes

> >> smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.

> >

> > I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3.3 Attack Scenarios:

> >>

> >>       Impersonation, IP-Mobile Text Message

> >>

> >>        An attacker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using randomized calling

> >> party numbers.

> >>

> >>       Countermeasure: in-band authenticated identity

> >

> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeasure. I am curious though

> > whether practically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over MESSAGE

> > today. Either way, no problem having an attack scenario of this form in
the

> document.

> >

> > Jon Peterson

> > Neustar, Inc.

> >

> >> Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of Richard Shockey

> >>> Sent: Monday, September 30, 2013 1:11 PM

> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> +1

> >>>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM

> >>> To: Robert Sparks

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> Yes, ok

> >>>

> >>> Martin Dolly

> >>> Lead Member of Technical Staff

> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network

> >>> Technology

> >>> +1-609-903-3360

> >>>  <mailto:md3135@att.com> md3135@att.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"

> >>>> < <mailto:rjsparks@nostrum.com> rjsparks@nostrum.com>

> >>> wrote:

> >>>>

> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:

> >>>>> With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >>>>

> >>>> Just to make sure - I think you're referring to Hadriel's comments

> >>>> on the

> >>> problem statement document?

> >>>> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

> >>>> In any case, we _are_ talking about a starting place, not a

> >>>> finished

> >>> product.

> >>>>

> >>>> If there's no other objection, I'd like to get Jon to submit the

> >>>> threats

> >>> document as a WG -00 as soon as it's convenient.

> >>>>

> >>>> RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On

> >>>>> Behalf Of Russ Housley

> >>>>> Sent: Thursday, September 26, 2013 4:37 PM

> >>>>> To: IETF STIR Mail List

> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from more people about this

> >>> document.  Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>>> Russ

> >>>>>

> >>>>>

> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:

> >>>>>>

> >>>>>>  <http://www.ietf.org/id/draft-peterson-stir-threats-00.txt>
http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group adopt this I-D as the starting point for

> >>>>>> the

> >>> STIR threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _______________________________________________

> >>>>> stir mailing list

> >>>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>>

> >>>> _______________________________________________

> >>>> stir mailing list

> >>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >> _______________________________________________

> >> stir mailing list

> >>  <mailto:stir@ietf.org> stir@ietf.org

> >>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >

> > _______________________________________________

> > stir mailing list

> >  <mailto:stir@ietf.org> stir@ietf.org

> >  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> 

> _______________________________________________

> stir mailing list

>  <mailto:stir@ietf.org> stir@ietf.org

>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


  _____  



This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

_______________________________________________
stir mailing list
 <mailto:stir@ietf.org> stir@ietf.org
 <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 

 

 

  _____  


This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

 


------=_NextPart_001_0096_01CEDBB3.D514C460
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 14 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
p.MsoAcetate, li.MsoAcetate, div.MsoAcetate
	{mso-style-priority:99;
	mso-style-link:"Balloon Text Char";
	margin:0in;
	margin-bottom:.0001pt;
	font-size:8.0pt;
	font-family:"Tahoma","sans-serif";}
span.BalloonTextChar
	{mso-style-name:"Balloon Text Char";
	mso-style-priority:99;
	mso-style-link:"Balloon Text";
	font-family:"Tahoma","sans-serif";}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle20
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle21
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle22
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Agree, the user may trust the carrier or someone like FTC or =
FCC.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But, if it goes beyond a small handful, forget =
it.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Bottom line, the average user needs to know that someone has actually =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>gone to the business site and knocked on the door, met the people, =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>and seen that it is a real business.<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Not, just some fly-by-night operation that logged into some =
website.<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Mike<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Henning Schulzrinne [mailto:Henning.Schulzrinne@fcc.gov] =
<br><b>Sent:</b> Thursday, November 07, 2013 12:15 PM<br><b>To:</b> =
Michael Hammer; br@brianrosen.net<br><b>Cc:</b> =
Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org; =
fmousinh@cisco.com; cnit@ietf.org<br><b>Subject:</b> RE: [stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The user shouldn&#8217;t and wouldn&#8217;t &#8211; they would trust =
a third party (often, their carrier, I suspect) to figure out who can =
attest to the bankiness of a bank. This is not new &#8211; there are a =
number of existing outfits that do this for web sites. (Example: Avast =
has a bar graph that shows trustworthiness.)<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Michael Hammer <a =
href=3D"mailto:[mailto:michael.hammer@yaanatech.com]">[mailto:michael.ham=
mer@yaanatech.com]</a> <br><b>Sent:</b> Thursday, November 07, 2013 =
12:10 PM<br><b>To:</b> <a =
href=3D"mailto:br@brianrosen.net">br@brianrosen.net</a>; Henning =
Schulzrinne<br><b>Cc:</b> <a =
href=3D"mailto:Pierce.Gorman@sprint.com">Pierce.Gorman@sprint.com</a>; =
<a href=3D"mailto:richard@shockey.us">richard@shockey.us</a>; <a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a =
href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b> RE: =
[stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>So, how does the average user know who is an =
authority?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>(Note, we are not designing for IETF geniuses =
here.)<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Is some well-known central authority going to certify all of =
these?<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Are each of these going to cross-certify all the others? (federated =
model)<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>We need to always answer that fundamental user =
question:<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Why should I TRUST this information?<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Mike<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'> =
Brian Rosen [<a =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>] =
<br><b>Sent:</b> Thursday, November 07, 2013 12:03 PM<br><b>To:</b> =
Henning Schulzrinne<br><b>Cc:</b> Michael Hammer; <a =
href=3D"mailto:Pierce.Gorman@sprint.com">Pierce.Gorman@sprint.com</a>; =
Richard Shockey; <a href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a =
href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b> Re: =
[stir] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>Right. =
&nbsp;I believe we can do this pretty easily. &nbsp;We probably could =
have a 100 categories that would have similar authorities, and there are =
classifications maintained by folks like Dun Bradstreet that can go even =
farther.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>What I think would be substantially harder is to =
validate an entire V/X/J card. &nbsp;How is a validator to know your =
nickname is Fluffy? &nbsp;Name, phone number and, if a business, a =
classification, yes, we can do that. &nbsp;Content of a business card - =
very hard.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><div><div><p class=3DMsoNormal>On =
Nov 7, 2013, at 8:12 AM, Henning Schulzrinne &lt;<a =
href=3D"mailto:Henning.Schulzrinne@fcc.gov">Henning.Schulzrinne@fcc.gov</=
a>&gt; wrote:<o:p></o:p></p></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'><o:p>&nbsp;</o:p></p><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Yes, that&#8217;s a problem, but as long as the number of categories =
is small, you can build UIs that only render information that&#8217;s =
appropriate to the declaration. For practical reasons, I think the =
number of useful categories is likely going to be fairly =
limited:</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Financial institution (FDIC and a few =
others)</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Health care (each health care facility has a gov&#8217;t =
number)</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Charity (501c3, state registered)</span><o:p></o:p></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Contractor (state-licensed)</span><o:p></o:p></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Public safety organization (police, =
fire)</span><o:p></o:p></p></div><div style=3D'margin-left:.5in'><p =
class=3DMsoNormal style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Lawyer (bar association)</span><o:p></o:p></p></div><div =
style=3D'margin-left:.5in'><p class=3DMsoNormal =
style=3D'text-indent:-.25in'><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>-</span><span =
style=3D'font-size:7.0pt;color:#1F497D'>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;<span =
class=3Dapple-converted-space>&nbsp;</span></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Local, state and federal government (.gov in the =
US)</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I suspect that list encompasses a large fraction of the fraudulent =
(impersonation) calls. For all of the above, at least within a country, =
it&#8217;s pretty clear who can attest to the membership. Yes, this =
requires some UI work or some server logic, but these categories and the =
organizations don&#8217;t change all that often &#8211; in most cases, =
the certifying entities have probably been the same for the past 50+ =
years. I&#8217;m not as worried about figuring out whether the =
beautician, mortician or florist is licensed and properly identified, =
although I&#8217;m sure we can all come up with potential fraud =
stories.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Michael =
Hammer [<a =
href=3D"mailto:michael.hammer@yaanatech.com">mailto:michael.hammer@yaanat=
ech.com</a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
10:28 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Henning Schulzrinne; <a =
href=3D"mailto:Pierce.Gorman@sprint.com">Pierce.Gorman@sprint.com</a>; =
<a href=3D"mailto:br@brianrosen.net">br@brianrosen.net</a>; <a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a><br><b>Cc:</b><s=
pan class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a>; <a =
href=3D"mailto:fmousinh@cisco.com">fmousinh@cisco.com</a>; <a =
href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>So, would you trust a certificate from the City of Reston, Virginia =
police department?</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>(Hint:&nbsp; you can find Reston on a map, but there is no City of =
Reston.&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;The only police are Fairfax =
County.)</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>My concern is that one you dilute or disperse authority, it becomes a =
free-for-all again, and anybody&#8217;s =
guess.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Mike</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>mailto:stir-bounces@ietf.org</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Henning =
Schulzrinne<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
10:00 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>'Gorman, Pierce A [NTK]'; =
Brian Rosen; Richard Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List; Fernando Mousinho =
(fmousinh);<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:purple'>cnit@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>As a thought experiment, Kumiko Ono and I had published a =
draft</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"http://tools.ietf.org/html/draft-ono-dispatch-attribute-validatio=
n-00"><span =
style=3D'color:purple'>http://tools.ietf.org/html/draft-ono-dispatch-attr=
ibute-validation-00</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>to allow third parties to validate property information. If the =
validating party (e.g., a bank regulator) is willing to sign a =
certificate, similar in spirit to the framed gold-leaf diplomas in your =
dentist&#8217;s office or, more lowly, to the health departments rating =
in a restaurant window, and it can be tied to a phone number, this =
shouldn&#8217;t be too hard.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s a bit harder if the certifying authority (regulator, =
Realtor board, local bar association, &#8230;) is not =
involved.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Henning</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'><a =
href=3D"mailto:cnit-bounces@ietf.org"><span =
style=3D'color:purple'>cnit-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:[mailto:cnit-bounces@ietf.org]"><span =
style=3D'color:purple'>[mailto:cnit-bounces@ietf.org]</span></a><span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Gorman, Pierce A =
[NTK]<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
9:54 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Brian Rosen; Richard =
Shockey<br><b>Cc:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:purple'>cnit@ietf.org</span></a>; Fernando Mousinho =
(fmousinh)<br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I&#8217;ll admit I am not familiar with v/x/jcard encoding differences =
or the implications of their use so I&#8217;ll encourage educating me if =
it isn&#8217;t too onerous.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I&#8217;m not sure what is the concern with a 3<sup>rd</sup><span =
class=3Dapple-converted-space>&nbsp;</span>party providing =
&#8220;validation&#8221; though.&nbsp; There are numerous examples of =
3<sup>rd</sup><span class=3Dapple-converted-space>&nbsp;</span>parties =
providing validation of information including NASDAQ, NYSE, =
Barron&#8217;s, Moody&#8217;s, and the federal reserve banking system to =
name a few.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif"'>Pierce</span>=
<o:p></o:p></p></div></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Brian Rosen =
[<a href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:purple'>mailto:br@brianrosen.net</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 06, 2013 11:59 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Fernando Mousinho (fmousinh); =
Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:purple'>cnit@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>I think this would be a heavy =
lift.<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>If the responsible entity was a carrier, then it would =
have to validate the data, which it has very little basis to validate. =
&nbsp;It could get a 3rd party to do the validation, but then it&#8217;s =
putting its reputation on the back of some hired hand =
validator.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>If the responsibility is the end user/device, then the =
signature has no value.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>I do question JCARD vs xCard, but that&#8217;s an =
encoding detail. &nbsp;All of SIP Is XML described by schema, not =
json.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><div><div><p=
 class=3DMsoNormal>On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us"><span =
style=3D'color:purple'>richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>&nbsp;<o:p></o:p></p><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity. &nbsp;The carrier =
could provision this for their mobile or hosted customers.&nbsp; =
Enterprises could do this themselves.&nbsp; This also has advantages in =
Enterprise to Enterprise UC as well where the data is derived from the =
Enterprise &#8220;directory&#8221; and could facilitate end to end PPX =
to PBX communications especially in point to point video =
communications.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There are certainly privacy and security issues to be =
addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be PII =
in the clear but then its done =
voluntarily.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There would have to be some work around restructuring the Header and =
adding some parameters but it&#8217;s underutilized right now and this =
Use Case is a perfectly appropriate =
use.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06"><span =
style=3D'color:purple'>https://tools.ietf.org/html/draft-ietf-jcardcal-jc=
ard-06</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Obviously it would need to be signed but we don&#8217;t need to worry =
about that ..yet.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>From 3261</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>20.9 Call-Info</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; The Call-Info header field provides additional =
information about the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; caller or callee, depending on whether it is found in a =
request or</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; response.&nbsp; The purpose of the URI is described by =
the &quot;purpose&quot;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; parameter.&nbsp; The &quot;icon&quot; parameter =
designates an image suitable as an</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; iconic representation of the caller or callee.&nbsp; The =
&quot;info&quot; parameter</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; describes the caller or callee in general, for example, =
through a web</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; page.&nbsp; The &quot;card&quot; parameter provides a =
business card, for example, in</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; Additional tokens =
can be registered</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Use of the Call-Info header field can pose a security =
risk.&nbsp; If a</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; callee fetches the URIs provided by a malicious caller, =
the callee</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; may be at risk for displaying inappropriate or offensive =
content,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; dangerous or illegal content, and so on.&nbsp; =
Therefore, it is</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; RECOMMENDED that a UA only render the information in the =
Call-Info</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; header field if it can verify the authenticity of the =
element that</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; originated the header field and trusts that =
element.&nbsp; This need not</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; be the peer UA; a proxy can insert this header field =
into requests.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Example:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg"><span =
style=3D'color:purple'>http://wwww.example.com/alice/photo.jpg</span></a>=
&gt; ;purpose=3Dicon,</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/"><span =
style=3D'color:purple'>http://www.example.com/alice/</span></a>&gt; =
;purpose=3Dinfo</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Brian =
Rosen [<a href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:purple'>mailto:br@brianrosen.net</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Wednesday, November 06, 2013 =
3:41 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Fernando Mousinho (fmousinh); =
Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List<br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>We&#8217;ve considered adding some information that is =
not number and is not name, but is something like &#8220;bank&#8221;, =
which might have some sort of validation behind =
it.<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Is that along the lines you were =
thinking?<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><div><div><p =
class=3DMsoNormal>On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us"><span =
style=3D'color:purple'>richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></p></div></div><p class=3DMsoNormal =
style=3D'margin-bottom:12.0pt'>&nbsp;<o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.&nbsp; =
Though your use case of credit card validation is a useful one and you =
are right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session =
validation.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>_______________________________________________</span><o:p></o:p></p><=
/div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>cnit mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:#954F72'>cnit@ietf.org</span></a></span><o:p></o:p></p></d=
iv></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/cnit</span>=
</a></span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.&nbsp; STIR is essential but =
it&#8217;s a multi-faceted problem that may require multi-faceted =
solutions.. and enhanced CNAM + being only one of them.&nbsp;&nbsp; Its =
not unreasonable to discuss =
those.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs. =
&nbsp;I would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in =
question.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>mailto:stir-bounces@ietf.org</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Let me =
rephrase it&#8230; it may eliminate the need for other forms of caller =
identification beyond what STIR will provide, depending on the specific =
use case. For example, a credit card company may choose to rely entirely =
on STIR before allowing a card to be unblocked by an IVR (and as I said =
earlier, many companies do it today). In other use cases, the TN alone =
is not sufficient information &#8211; my health care provider will want =
to know which member of the family is =
calling.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I agree =
that ANI is already broadly used to improve customer service today. =
However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of =
companies.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Going on a =
tangent&#8230; perhaps this is out of scope, but there is not a lot of =
discussion about called party hijacking. Couldn&#8217;t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it&#8217;s really them before carrying a =
conversation, but wouldn&#8217;t they want the =
same?&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&lt;Gorman&=
gt;, &quot;Pierce A [NTK]&quot; &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D'color:#954F72'>Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Dat=
e:<span class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, November =
5, 2013 at 6:05 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho &lt;<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>fmousinh@cisco.com</span></a>&gt;, &quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3Dapple-converted-space>&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I agree with your characterization of businesses as victim of caller ID =
fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.&nbsp; So I don&#8217;t agree that =
STIR would &#8220;eliminate the need for caller identification from =
known TNs.&#8221;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fernando =
Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>mailto:fmousinh@cisco.com</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I would =
suggest we add a new attack type to section 3. More and more companies =
are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I&#8217;m informed =
that I don&#8217;t need to provide any further identification because my =
number is on file. Some (all?) companies that implement this type of =
validation rely on SS7 =
today.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Ultimately,=
 this is yet another variation of impersonation &#8211; but in this =
case, the &#8220;victim&#8221; is a business, unlike the other two =
scenarios we&#8217;ve listed so =
far.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Addressing =
this scenario would actually turn STIR into a feature, given it would =
enable contact centers of all sizes to eliminate the need for caller =
identification from known =
TNs.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D'color:#954F72'>alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, October 1, 2013 =
at 12:51 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:#954F72'>br@brianrosen.net</span></a>&gt;, =
&quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:#954F72'>jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:=
<span class=3Dapple-converted-space>&nbsp;</span></b>&quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D'color:#954F72'>richard@shockey.us</span></a>&gt;, &quot;'DOLLY, =
MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D'color:#954F72'>md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:#954F72'>rjsparks@nostrum.com</span></a>&gt;<br><b>Subject=
:<span class=3Dapple-converted-space>&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Jon,</span>=
<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Thanks for =
the response.&nbsp; The intention in #1 below is to clarify the =
following sentence:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>The<span =
class=3Dapple-converted-space>&nbsp;</span><b>primary</b><span =
class=3Dapple-converted-space>&nbsp;</span>attack vector =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; therefore one where the attacker contrives for the calling =
telephone</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number in signaling to be a particular chosen number, one that =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; attacker does not have the authority to call from,<span =
class=3Dapple-converted-space>&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number to be rendered on the terminating side</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>.&nbsp;</sp=
an><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>This might =
be misconstrued as indicating that the objective of spoofing is simply =
the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the =
rendered information. &nbsp;No issues with leaving this as it&#8217;s a =
valid point.&nbsp; Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on =
CPN.&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>So however =
it&#8217;s worded, I think it&#8217;s important to allow for both attack =
objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Regards,</s=
pan><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex</span>=
<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
-----Original Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Brian =
Rosen</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Sent: =
Tuesday, October 01, 2013 9:29 =
AM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; To: =
Peterson, Jon</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; =
Richard</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Shockey</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Don't =
think there is much MESSAGE.&nbsp; MSRP is about all we see, and XMPP =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; more =
likely than that.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Brian</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; On =
Oct 1, 2013, at 12:24 PM, &quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:windowtext;text-decoration:none'>jon.peterson@neustar.biz<=
/span></a>&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Thanks for these notes, Alex. Some responses =
below.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here are several comments that should feed into the IETF =
Peterson draft:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
[IMO,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; both endpoint and in-network solutions should be =
facilitated]</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Agreed that both in-band and out-of-band solutions can usually =
be</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
implemented in either endpoints or in intermediaries of various =
kinds.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
If I see text that implies otherwise, I'll certainly change =
it.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Add a sessionless attack scenario.&nbsp; A spam =
payload may be carried in</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
a</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
establishment.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; More generally, we should be mindful of the fact that SIP is =
used in</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; telephony form more than voice session =
setup.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Probably if we were going to include a sessionless attack scenario, =
it</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
would be with regular text messages (whether carried on the PSTN =
over</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
TCAP or with some Internet protocol, including MESSAGE) rather =
than</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
with an INVITE, which typically wouldn't result in a payload =
being</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
immediately rendered to a user. More on this below with your =
suggested</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
text.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; The primary attack vector =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; number in signaling to be a particular chosen number that =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
in the primary attack vectors that concern =
us.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; of programmability, the capacity to access the Internet, =
and</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; capabilities of rendering text, audio and/or images.&nbsp; This =
includes</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
I can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
images as you suggest.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Provided we're talking about end-to-end SIP use of MESSAGE, =
agreed</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
that in-band would be the right countermeasure. I am curious =
though</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
document.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Jon Peterson</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Regards,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Alex</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of Richard =
Shockey</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN =
C</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: Robert =
Sparks</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Yes, ok</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Martin Dolly</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Technology</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
+1-609-903-3360</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D'color:windowtext;text-decoration:none'>md3135@att.com</span></a>=
</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, &quot;Robert =
Sparks&quot;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:windowtext;text-decoration:none'>rjsparks@nostrum.com</spa=
n></a>&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Hi Martin =
-</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Just to make sure - I think you're referring to =
Hadriel's comments</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; on the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; I don't think Hadriel's commented directly on =
stir-threats yet.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; In any case, we _are_ talking about a starting place, =
not a</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; finished</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; If there's no other objection, I'd like to get Jon to =
submit the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; threats</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; RjS</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; From:<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear from more =
people about this</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; hear from him =
soon.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ Housley =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D'color:windowtext;text-decoration:none'>http://www.ietf.org/id/dr=
aft-peterson-stir-threats-00.txt</span></a></span><o:p></o:p></p></div></=
div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt this I-D as the =
starting point for</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; STIR threat =
docuent?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; stir mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
stir mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; stir =
mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'><hr =
size=3D3 width=3D"100%" align=3Dcenter></span></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'>__________=
_____________________________________<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:purple'>https://www.ietf.org/mailman/listinfo/stir</span><=
/a></span><o:p></o:p></p></div></blockquote></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div></div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div class=3DMsoNormal =
align=3Dcenter style=3D'text-align:center'><hr size=3D2 width=3D"100%" =
align=3Dcenter></div><div><p class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></body></html>
------=_NextPart_001_0096_01CEDBB3.D514C460--

------=_NextPart_000_0095_01CEDBB3.D514C460
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Transfer-Encoding: base64
Content-Disposition: attachment; filename="smime.p7s"
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------=_NextPart_000_0095_01CEDBB3.D514C460--

From Henning.Schulzrinne@fcc.gov  Thu Nov  7 09:23:20 2013
Return-Path: <Henning.Schulzrinne@fcc.gov>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 48E1C11E8150; Thu,  7 Nov 2013 09:23:20 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.227
X-Spam-Level: 
X-Spam-Status: No, score=-2.227 tagged_above=-999 required=5 tests=[AWL=0.372,  BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UQGEEYXQknXg; Thu,  7 Nov 2013 09:23:16 -0800 (PST)
Received: from DC-IP-1.fcc.gov (dc-ip-1.fcc.gov [192.104.54.97]) by ietfa.amsl.com (Postfix) with ESMTP id 3DAE211E8208; Thu,  7 Nov 2013 09:22:47 -0800 (PST)
Message-ID: <E6A16181E5FD2F46B962315BB05962D01FC23AE9@fcc.gov>
From: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
To: "'Gorman, Pierce A [NTK]'" <Pierce.Gorman@sprint.com>, 'Michael Hammer' <michael.hammer@yaanatech.com>, "br@brianrosen.net" <br@brianrosen.net>, "richard@shockey.us" <richard@shockey.us>
Thread-Topic: [stir] draft-peterson-stir-threats-00.txt
Thread-Index: Ac7b2+d8m7MQs/E/Y0C8yrTGiGFz4wAAUJDw
Date: Thu, 7 Nov 2013 17:22:46 +0000
References: <B4C06A5710F0ED4583B3CF5E9C6B21D85515BE41@PDAWM10A.ad.sprint.com>
In-Reply-To: <B4C06A5710F0ED4583B3CF5E9C6B21D85515BE41@PDAWM10A.ad.sprint.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
Cc: "stir@ietf.org" <stir@ietf.org>, "fmousinh@cisco.com" <fmousinh@cisco.com>, "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:23:20 -0000

Yes, I think category matters. Otherwise, fraudsters will register an authe=
ntic shell company (which they already do) and will be "authentic" (i.e., t=
hey have a record with the state of registration), but peddle Ponzi schemes=
 or pretend to collect money for starving, blind police officers with cance=
r.=20

You, separately, could have entities that provide business reputation servi=
ces, such as the Better Business Bureau. However, as BBB illustrates, this =
is not an easy job. (Google BBB and some of the "issues" they have had.)

Many of the entities you name are primarily in the business of attesting to=
 business-to-business creditworthiness. That's interesting if you're about =
to sell something to the caller or buy their bonds (ignoring the AAA-rated =
mortgage junk), but not all that useful for consumers. Most consumer-facing=
 businesses are too small to have much useful information with most of thes=
e rating entities.

-----Original Message-----
From: Gorman, Pierce A [NTK] [mailto:Pierce.Gorman@sprint.com]=20
Sent: Thursday, November 07, 2013 12:10 PM
To: Henning Schulzrinne; 'Michael Hammer'; br@brianrosen.net; richard@shock=
ey.us
Cc: stir@ietf.org; cnit@ietf.org; fmousinh@cisco.com
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

In addition to the examples of certifying organizations that Henning provid=
ed, there are Barron's, Moody's, Dun & Bradstreet, Equifax, Experion, KPMG,=
 Deloitte-Touche, NYSE, NASDAQ, et cetera.

Do we even need the categories, or do we just need 3rd parties to be expert=
 at vetting the authenticity of an originator?  If it is the latter, I rema=
in unconcerned about the business model aspects.

Pierce

-----Original Message-----
From: Henning Schulzrinne [mailto:Henning.Schulzrinne@fcc.gov]
Sent: November 07, 2013 10:13 AM
To: 'Michael Hammer'; Gorman, Pierce A [NTK]; br@brianrosen.net; richard@sh=
ockey.us
Cc: stir@ietf.org; cnit@ietf.org; fmousinh@cisco.com
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

Yes, that's a problem, but as long as the number of categories is small, yo=
u can build UIs that only render information that's appropriate to the decl=
aration. For practical reasons, I think the number of useful categories is =
likely going to be fairly limited:

-          Financial institution (FDIC and a few others)

-          Health care (each health care facility has a gov't number)

-          Charity (501c3, state registered)

-          Contractor (state-licensed)

-          Public safety organization (police, fire)

-          Lawyer (bar association)

-          Local, state and federal government (.gov in the US)

I suspect that list encompasses a large fraction of the fraudulent (imperso=
nation) calls. For all of the above, at least within a country, it's pretty=
 clear who can attest to the membership. Yes, this requires some UI work or=
 some server logic, but these categories and the organizations don't change=
 all that often - in most cases, the certifying entities have probably been=
 the same for the past 50+ years. I'm not as worried about figuring out whe=
ther the beautician, mortician or florist is licensed and properly identifi=
ed, although I'm sure we can all come up with potential fraud stories.

From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net; richa=
rd@shockey.us
Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

So, would you trust a certificate from the City of Reston, Virginia police =
department?

(Hint:  you can find Reston on a map, but there is no City of Reston.
  The only police are Fairfax County.)

My concern is that one you dilute or disperse authority, it becomes a free-=
for-all again, and anybody's guess.

Mike


From: stir-bounces@ietf.org<mailto:stir-bounces@ietf.org> [mailto:stir-boun=
ces@ietf.org] On Behalf Of Henning Schulzrinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; Fernando Mousinho (fmousinh);=
 cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

As a thought experiment, Kumiko Ono and I had published a draft

http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00

to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.

It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, ...) is not involved.

Henning

From: cnit-bounces@ietf.org<mailto:cnit-bounces@ietf.org> [mailto:cnit-boun=
ces@ietf.org]<mailto:[mailto:cnit-bounces@ietf.org]> On Behalf Of Gorman, P=
ierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc: stir@ietf.org<mailto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@iet=
f.org>; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.

I'm not sure what is the concern with a 3rd party providing "validation" th=
ough.  There are numerous examples of 3rd parties providing validation of i=
nformation including NASDAQ, NYSE, Barron's, Moody's, and the federal reser=
ve banking system to name a few.

Pierce

From: Brian Rosen [mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; stir@ietf.org<mai=
lto:stir@ietf.org> List; cnit@ietf.org<mailto:cnit@ietf.org>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

I think this would be a heavy lift.

If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.

If the responsibility is the end user/device, then the signature has no val=
ue.

I do not argue that Call-Info is suitable,  it is.

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.

Brian

On Nov 6, 2013, at 1:10 PM, Richard Shockey <richard@shockey.us<mailto:rich=
ard@shockey.us>> wrote:

URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.

There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.

There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.

https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

Obviously it would need to be signed but we don't need to worry about that =
..yet.

________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.


From br@brianrosen.net  Thu Nov  7 09:36:47 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4FCB11E818D for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:36:47 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.598
X-Spam-Level: 
X-Spam-Status: No, score=-103.598 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UqPcHLbWyP09 for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 09:36:43 -0800 (PST)
Received: from mail-qc0-f179.google.com (mail-qc0-f179.google.com [209.85.216.179]) by ietfa.amsl.com (Postfix) with ESMTP id D752E11E8149 for <cnit@ietf.org>; Thu,  7 Nov 2013 09:36:42 -0800 (PST)
Received: by mail-qc0-f179.google.com with SMTP id k18so698308qcv.24 for <cnit@ietf.org>; Thu, 07 Nov 2013 09:36:39 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:message-id:references:to; bh=x5uzqivUQfvyBiDhdBdIj6Oje9NxSD5KA+jXAlf+7nQ=; b=jdbDtoiXWdpDJtD6J/bMwLi04ct7YIfZHnrLre/eUAvP63Whmz9GeXAM1K/kcCgIku wiQ9RjzggW22m1LpjJ7z6ohv2Y7D/Sks4D/eo+7UMH19O4DRxfxs0aOeV2d4Lp8uSAhy g3bGcEdG5/9Q6OmNg/7Lk4m4QRdcDitLPs6BfoiIpv1XObJVzoVFlA7EOQpghPlogOpq FP79kWkgAZXfL0j4UtibHI1bpDJ67ZgY/wJmEFhdkZq8kvDniLlrmHkAAYcrkCZQ5uyZ 2gyqY8k5KITGGy+Btw/Ll97Xx2uSVPuCKTLEFPPehif5IMCVYkWSIHWyxySTr9Mu/oYI SO6Q==
X-Gm-Message-State: ALoCoQk0yRH05fIYT7xPRI7QaVvOW0w/mqDlFTRP338GrvJr1ToAKtQulF6YrA4+8j8ywaOvzHK8
X-Received: by 10.49.17.98 with SMTP id n2mr14928353qed.61.1383845799482; Thu, 07 Nov 2013 09:36:39 -0800 (PST)
Received: from wireless-a-v6.meeting.ietf.org ([2001:67c:370:176:9d97:144b:5e61:753]) by mx.google.com with ESMTPSA id r5sm9638671qeh.1.2013.11.07.09.36.37 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 07 Nov 2013 09:36:38 -0800 (PST)
Content-Type: multipart/alternative; boundary="Apple-Mail=_BD7413B8-CF2E-46DB-BB3E-FFC9F29C022E"
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <527BCB5F.1080001@bbn.com>
Date: Thu, 7 Nov 2013 09:36:34 -0800
Message-Id: <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com>
To: Stephen Kent <kent@bbn.com>
X-Mailer: Apple Mail (2.1816)
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 17:36:47 -0000

--Apple-Mail=_BD7413B8-CF2E-46DB-BB3E-FFC9F29C022E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=windows-1252

Yes, but we might be able to thread certification of various aspects to =
a single identity that we can use to coalesce the information.

That identity COULD be the phone number (using proof of possession), but =
I suspect that isn=92t quite enough.

Brian

On Nov 7, 2013, at 9:18 AM, Stephen Kent <kent@bbn.com> wrote:

> Henning,
>=20
>> As a thought experiment, Kumiko Ono and I had published a draft
>> =20
>> http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00
>> =20
>> to allow third parties to validate property information. If the =
validating party (e.g., a bank regulator) is willing to sign a =
certificate, similar in spirit to the framed gold-leaf diplomas in your =
dentist=92s office or, more lowly, to the health departments rating in a =
restaurant window, and it can be tied to a phone number, this shouldn=92t =
be too hard.
>> =20
>> It=92s a bit harder if the certifying authority (regulator, Realtor =
board, local bar association, =85) is not involved.
> The tricky part is ensuring that a certificate (using the term =
broadly) issued by some
> organization is not interpreted by relying parties as meaning more =
than it should.
>=20
> It is not clear to me that most entities are good choices for the =
binding of a name
> to a phone number. In part this is because these entities do not =
consider the phone
> number to be a critical aspect of the attributes for which they vouch.
>=20
> My dentist's diploma is valid irrespective of the location (much less =
the phone number)
> for his office. BTW, as the geographic boundaries for area code =
change, phone numbers
> change. My home didn't move and it took a while for many of the =
records held by other=20
> parties to be updated. So, no, I would not rely on many parties of the =
sort you seem to suggest,
> to issue a credential binding my name to a phone nmber
>=20
> Steve
> _______________________________________________
> cnit mailing list
> cnit@ietf.org
> https://www.ietf.org/mailman/listinfo/cnit


--Apple-Mail=_BD7413B8-CF2E-46DB-BB3E-FFC9F29C022E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=windows-1252

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html =
charset=3Dwindows-1252"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; -webkit-line-break: after-white-space;">Yes, =
but we might be able to thread certification of various aspects to a =
single identity that we can use to coalesce the =
information.<div><br></div><div>That identity COULD be the phone number =
(using proof of possession), but I suspect that isn=92t quite =
enough.</div><div><br></div><div>Brian<br><div><br><div><div>On Nov 7, =
2013, at 9:18 AM, Stephen Kent &lt;<a =
href=3D"mailto:kent@bbn.com">kent@bbn.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><blockquote type=3D"cite"><div =
text=3D"#000000" bgcolor=3D"#FFFFFF" style=3D"font-family: Helvetica; =
font-size: 12px; font-style: normal; font-variant: normal; font-weight: =
normal; letter-spacing: normal; line-height: normal; orphans: auto; =
text-align: start; text-indent: 0px; text-transform: none; white-space: =
normal; widows: auto; word-spacing: 0px; -webkit-text-stroke-width: =
0px;">Henning,<br><br><blockquote =
cite=3D"mid:E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov" =
type=3D"cite"><div class=3D"WordSection1" style=3D"page: =
WordSection1;"><div style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; =
font-family: 'Times New Roman', serif;"><span style=3D"font-size: 11pt; =
font-family: Calibri, sans-serif; color: rgb(31, 73, 125);">As a thought =
experiment, Kumiko Ono and I had published a =
draft<o:p></o:p></span></div><div style=3D"margin: 0in 0in 0.0001pt; =
font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);"><a class=3D"moz-txt-link-freetext" =
href=3D"http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation=
-00" style=3D"color: purple; text-decoration: =
underline;">http://tools.ietf.org/html/draft-ono-dispatch-attribute-valida=
tion-00</a><o:p></o:p></span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">&nbsp;</span></div><div style=3D"margin: 0in 0in =
0.0001pt; font-size: 12pt; font-family: 'Times New Roman', serif;"><span =
style=3D"font-size: 11pt; font-family: Calibri, sans-serif; color: =
rgb(31, 73, 125);">to allow third parties to validate property =
information. If the validating party (e.g., a bank regulator) is willing =
to sign a certificate, similar in spirit to the framed gold-leaf =
diplomas in your dentist=92s office or, more lowly, to the health =
departments rating in a restaurant window, and it can be tied to a phone =
number, this shouldn=92t be too hard.<o:p></o:p></span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">&nbsp;</span></div><div =
style=3D"margin: 0in 0in 0.0001pt; font-size: 12pt; font-family: 'Times =
New Roman', serif;"><span style=3D"font-size: 11pt; font-family: =
Calibri, sans-serif; color: rgb(31, 73, 125);">It=92s a bit harder if =
the certifying authority (regulator, Realtor board, local bar =
association, =85) is not involved.</span></div></div></blockquote>The =
tricky part is ensuring that a certificate (using the term broadly) =
issued by some<br>organization is not interpreted by relying parties as =
meaning more than it should.<br><br>It is not clear to me that most =
entities are good choices for the binding of a name<br>to a phone =
number. In part this is because these entities do not consider the =
phone<br>number to be a critical aspect of the attributes for which they =
vouch.<br><br>My dentist's diploma is valid irrespective of the location =
(much less the phone number)<br>for his office. BTW, as the geographic =
boundaries for area code change, phone numbers<br>change. My home didn't =
move and it took a while for many of the records held by other<span =
class=3D"Apple-converted-space">&nbsp;</span><br>parties to be updated. =
So, no, I would not rely on many parties of the sort you seem to =
suggest,<br>to issue a credential binding my name to a phone =
nmber<br><br>Steve<br>_______________________________________________<br>c=
nit mailing list<br><a href=3D"mailto:cnit@ietf.org" style=3D"color: =
purple; text-decoration: underline;">cnit@ietf.org</a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/cnit" style=3D"color: =
purple; text-decoration: =
underline;">https://www.ietf.org/mailman/listinfo/cnit</a><br></div></bloc=
kquote></div><br></div></div></body></html>=

--Apple-Mail=_BD7413B8-CF2E-46DB-BB3E-FFC9F29C022E--

From Pierce.Gorman@sprint.com  Thu Nov  7 10:40:53 2013
Return-Path: <Pierce.Gorman@sprint.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1398221E81F1; Thu,  7 Nov 2013 10:40:46 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.969
X-Spam-Level: 
X-Spam-Status: No, score=-2.969 tagged_above=-999 required=5 tests=[AWL=-0.370, BAYES_00=-2.599]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pmnTy8RGuv-U; Thu,  7 Nov 2013 10:40:40 -0800 (PST)
Received: from db9outboundpool.messaging.microsoft.com (mail-db9lp0248.outbound.messaging.microsoft.com [213.199.154.248]) by ietfa.amsl.com (Postfix) with ESMTP id A943421E81E7; Thu,  7 Nov 2013 10:39:27 -0800 (PST)
Received: from mail93-db9-R.bigfish.com (10.174.16.243) by DB9EHSOBE023.bigfish.com (10.174.14.86) with Microsoft SMTP Server id 14.1.225.22; Thu, 7 Nov 2013 18:39:25 +0000
Received: from mail93-db9 (localhost [127.0.0.1])	by mail93-db9-R.bigfish.com (Postfix) with ESMTP id 495F11C0356; Thu,  7 Nov 2013 18:39:25 +0000 (UTC)
X-Forefront-Antispam-Report: CIP:144.229.32.56; KIP:(null); UIP:(null); IPV:NLI; H:pdaasdm1.corp.sprint.com; RD:smtpda1.sprint.com; EFVD:NLI
X-SpamScore: -24
X-BigFish: VS-24(zz98dI9371I542I1fdcIzz1f42h208ch1ee6h1de0h1fdah2073h2146h1202h1e76h1d1ah1d2ah1fc6hzz8275ch1de098h1033IL17326ah8275dh1de097h186068hz2fh109h2a8h839h944hd25hf0ah1220h1288h12a5h12a9h12bdh137ah13b6h1441h1504h1537h153bh15d0h162dh1631h1758h18e1h1946h19b5h1b0ah224fh1d0ch1d2eh1d3fh1dfeh1dffh1e1dh1fe8h1ff5h2216h1155h)
Received-SPF: pass (mail93-db9: domain of sprint.com designates 144.229.32.56 as permitted sender) client-ip=144.229.32.56; envelope-from=Pierce.Gorman@sprint.com; helo=pdaasdm1.corp.sprint.com ; p.sprint.com ; 
Received: from mail93-db9 (localhost.localdomain [127.0.0.1]) by mail93-db9 (MessageSwitch) id 1383849561883559_8282; Thu,  7 Nov 2013 18:39:21 +0000 (UTC)
Received: from DB9EHSMHS025.bigfish.com (unknown [10.174.16.240])	by mail93-db9.bigfish.com (Postfix) with ESMTP id CAB3E3E00A5; Thu,  7 Nov 2013 18:39:21 +0000 (UTC)
Received: from pdaasdm1.corp.sprint.com (144.229.32.56) by DB9EHSMHS025.bigfish.com (10.174.14.35) with Microsoft SMTP Server (TLS) id 14.16.227.3; Thu, 7 Nov 2013 18:39:20 +0000
Received: from PLSWEH03.ad.sprint.com (plsweh03.corp.sprint.com [144.226.242.132])	by pdaasdm1.corp.sprint.com (Sentrion-MTA-4.2.2/Sentrion-MTA-4.2.2) with ESMTP id rA7IdISC000975 (version=TLSv1/SSLv3 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 7 Nov 2013 12:39:18 -0600
Received: from pdawm10a.ad.sprint.com ([144.226.111.33]) by PLSWEH03.ad.sprint.com ([144.226.242.132]) with mapi id 14.03.0123.003; Thu, 7 Nov 2013 12:39:17 -0600
From: "Gorman, Pierce A [NTK]" <Pierce.Gorman@sprint.com>
To: Michael Hammer <michael.hammer@yaanatech.com>, "Henning.Schulzrinne@fcc.gov" <Henning.Schulzrinne@fcc.gov>, "br@brianrosen.net" <br@brianrosen.net>
Thread-Topic: [cnit] [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO2nc0UwzhVvA23kepk+N3A5gBjZoXQFMAgAIHxfuAAI6Z8IAAbRgAgAAH4QCAAAxlAIAADh8AgAAB9wCAAAFPgIAAAa+AgAAUxyA=
Date: Thu, 7 Nov 2013 18:39:17 +0000
Message-ID: <B4C06A5710F0ED4583B3CF5E9C6B21D85515D116@PDAWM10A.ad.sprint.com>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7D86@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC238EE@fcc.gov> <6A94C6CF-69F6-42D9-9A6C-32361A0A4755@brianrosen.net> <00C069FD01E0324C9FFCADF539701DB3BBEF7E71@sc9-ex2k10mb1.corp.yaanatech.com> <E6A16181E5FD2F46B962315BB05962D01FC23ABC@fcc.gov> <00C069FD01E0324C9FFCADF539701DB3BBEF7EFE@sc9-ex2k10mb1.corp.yaanatech.com>
In-Reply-To: <00C069FD01E0324C9FFCADF539701DB3BBEF7EFE@sc9-ex2k10mb1.corp.yaanatech.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
x-originating-ip: [10.229.76.114]
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: sprint.com
X-FOPE-CONNECTOR: Id%0$Dn%*$RO%0$TLS%0$FQDN%$TlsDn%
Cc: "stir@ietf.org" <stir@ietf.org>, "cnit@ietf.org" <cnit@ietf.org>, "richard@shockey.us" <richard@shockey.us>, "fmousinh@cisco.com" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 18:40:56 -0000

The issues we keep circling are trust and value.

For practical reasons, carriers are going to continue to want to use CNAM c=
learinghouse information providers, and consumers are going to continue to =
want better information.  If the consumes are like me, they're going to be =
willing to pay a little extra to get better information, or be unwilling to=
 pay but willing to just deal with liars calling.  Nobody is forced to answ=
er or to believe anything they're told if they do answer.

Mechanisms are already in place to support real-time per-call per-subscribe=
r 3rd party telecommunications services.  If KPMG or Prudential started off=
ering information security services for CNAM, I'd pay for it.

IMHO, the focus of STIR and CNIT WGs should be mechanisms which 1) validate=
 that a calling number is authentic (not trustworthy), and 2) provide a car=
rier or CNAM provider a key for retrieving (potentially untrustworthy)  inf=
ormation that has been associated with that calling number.

Ensuring the trustworthiness of the calling number or the information assoc=
iated with the calling number should not be the domain of the IETF.

If trustworthiness of information is VALUABLE (and we've described multiple=
 examples of this being so), then the marketplace can determine how the val=
ue is to be extracted and applied.

Pierce

-----Original Message-----
From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: November 07, 2013 11:21 AM
To: Henning.Schulzrinne@fcc.gov; br@brianrosen.net
Cc: stir@ietf.org; Gorman, Pierce A [NTK]; fmousinh@cisco.com; cnit@ietf.or=
g; richard@shockey.us
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

Agree, the user may trust the carrier or someone like FTC or FCC.

But, if it goes beyond a small handful, forget it.



Bottom line, the average user needs to know that someone has actually

gone to the business site and knocked on the door, met the people,

and seen that it is a real business.

Not, just some fly-by-night operation that logged into some website.



Mike





From: Henning Schulzrinne [mailto:Henning.Schulzrinne@fcc.gov]
Sent: Thursday, November 07, 2013 12:15 PM
To: Michael Hammer; br@brianrosen.net
Cc: Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org; fmousinh@c=
isco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt



The user shouldn't and wouldn't - they would trust a third party (often, th=
eir carrier, I suspect) to figure out who can attest to the bankiness of a =
bank. This is not new - there are a number of existing outfits that do this=
 for web sites. (Example: Avast has a bar graph that shows trustworthiness.=
)





From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 12:10 PM
To: br@brianrosen.net; Henning Schulzrinne
Cc: Pierce.Gorman@sprint.com; richard@shockey.us; stir@ietf.org; fmousinh@c=
isco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt



So, how does the average user know who is an authority?

(Note, we are not designing for IETF geniuses here.)



Is some well-known central authority going to certify all of these?

Are each of these going to cross-certify all the others? (federated model)



We need to always answer that fundamental user question:

Why should I TRUST this information?



Mike





From: Brian Rosen [mailto:br@brianrosen.net]
Sent: Thursday, November 07, 2013 12:03 PM
To: Henning Schulzrinne
Cc: Michael Hammer; Pierce.Gorman@sprint.com; Richard Shockey; stir@ietf.or=
g; fmousinh@cisco.com; cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt



Right.  I believe we can do this pretty easily.  We probably could have a
100 categories that would have similar authorities, and there are classific=
ations maintained by folks like Dun Bradstreet that can go even farther.



What I think would be substantially harder is to validate an entire V/X/J c=
ard.  How is a validator to know your nickname is Fluffy?  Name, phone numb=
er and, if a business, a classification, yes, we can do that.  Content of a=
 business card - very hard.



Brian





On Nov 7, 2013, at 8:12 AM, Henning Schulzrinne <Henning.Schulzrinne@fcc.go=
v> wrote:



Yes, that's a problem, but as long as the number of categories is small, yo=
u can build UIs that only render information that's appropriate to the decl=
aration. For practical reasons, I think the number of useful categories is =
likely going to be fairly limited:

-          Financial institution (FDIC and a few others)

-          Health care (each health care facility has a gov't number)

-          Charity (501c3, state registered)

-          Contractor (state-licensed)

-          Public safety organization (police, fire)

-          Lawyer (bar association)

-          Local, state and federal government (.gov in the US)



I suspect that list encompasses a large fraction of the fraudulent
(impersonation) calls. For all of the above, at least within a country, it'=
s pretty clear who can attest to the membership. Yes, this requires some UI=
 work or some server logic, but these categories and the organizations don'=
t change all that often - in most cases, the certifying entities have proba=
bly been the same for the past 50+ years. I'm not as worried about figuring=
 out whether the beautician, mortician or florist is licensed and properly =
identified, although I'm sure we can all come up with potential fraud stori=
es.



From: Michael Hammer [mailto:michael.hammer@yaanatech.com]
Sent: Thursday, November 07, 2013 10:28 AM
To: Henning Schulzrinne; Pierce.Gorman@sprint.com; br@brianrosen.net; richa=
rd@shockey.us
Cc: stir@ietf.org; fmousinh@cisco.com; cnit@ietf.org
Subject: RE: [stir] draft-peterson-stir-threats-00.txt



So, would you trust a certificate from the City of Reston, Virginia police =
department?



(Hint:  you can find Reston on a map, but there is no City of Reston.

  The only police are Fairfax County.)



My concern is that one you dilute or disperse authority, it becomes a free-=
for-all again, and anybody's guess.



Mike





From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [ <mailto:stir-=
bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of Henning Schulz=
rinne
Sent: Thursday, November 07, 2013 10:00 AM
To: 'Gorman, Pierce A [NTK]'; Brian Rosen; Richard Shockey
Cc:  <mailto:stir@ietf.org> stir@ietf.org List; Fernando Mousinho (fmousinh=
);  <mailto:cnit@ietf.org> cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt



As a thought experiment, Kumiko Ono and I had published a draft



 <http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00>
http://tools.ietf.org/html/draft-ono-dispatch-attribute-validation-00



to allow third parties to validate property information. If the validating =
party (e.g., a bank regulator) is willing to sign a certificate, similar in=
 spirit to the framed gold-leaf diplomas in your dentist's office or, more =
lowly, to the health departments rating in a restaurant window, and it can =
be tied to a phone number, this shouldn't be too hard.



It's a bit harder if the certifying authority (regulator, Realtor board, lo=
cal bar association, .) is not involved.



Henning



From:  <mailto:cnit-bounces@ietf.org> cnit-bounces@ietf.org <mailto:[mailto=
:cnit-bounces@ietf.org]> [mailto:cnit-bounces@ietf.org] On Behalf Of Gorman=
, Pierce A [NTK]
Sent: Thursday, November 07, 2013 9:54 AM
To: Brian Rosen; Richard Shockey
Cc:  <mailto:stir@ietf.org> stir@ietf.org List;  <mailto:cnit@ietf.org> cni=
t@ietf.org; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt



I'll admit I am not familiar with v/x/jcard encoding differences or the imp=
lications of their use so I'll encourage educating me if it isn't too onero=
us.



I'm not sure what is the concern with a 3rd party providing "validation"
though.  There are numerous examples of 3rd parties providing validation of=
 information including NASDAQ, NYSE, Barron's, Moody's, and the federal res=
erve banking system to name a few.



Pierce



From: Brian Rosen [ <mailto:br@brianrosen.net> mailto:br@brianrosen.net]
Sent: November 06, 2013 11:59 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK]; <mailto:stir@ietf=
.org> stir@ietf.org List;  <mailto:cnit@ietf.org> cnit@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt



I think this would be a heavy lift.



If the responsible entity was a carrier, then it would have to validate the=
 data, which it has very little basis to validate.  It could get a 3rd part=
y to do the validation, but then it's putting its reputation on the back of=
 some hired hand validator.



If the responsibility is the end user/device, then the signature has no val=
ue.



I do not argue that Call-Info is suitable,  it is.



I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is=
 XML described by schema, not json.



Brian



On Nov 6, 2013, at 1:10 PM, Richard Shockey < <mailto:richard@shockey.us> r=
ichard@shockey.us> wrote:



URI for a JCARD in the CALL INFO header provisioned by the calling party an=
d ultimately signed by the responsible entity.  The carrier could provision=
 this for their mobile or hosted customers.  Enterprises could do this them=
selves.  This also has advantages in Enterprise to Enterprise UC as well wh=
ere the data is derived from the Enterprise "directory" and could facilitat=
e end to end PPX to PBX communications especially in point to point video c=
ommunications.



There are certainly privacy and security issues to be addressed.  The Push =
vs Pull model.  This really would be PII in the clear but then its done vol=
untarily.



There would have to be some work around restructuring the Header and adding=
 some parameters but it's underutilized right now and this Use Case is a pe=
rfectly appropriate use.



 <https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06>
https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06



Obviously it would need to be signed but we don't need to worry about that =
..yet.



________________________________

This e-mail may contain Sprint proprietary information intended for the sol=
e use of the recipient(s). Any use by others is prohibited. If you are not =
the intended recipient, please contact the sender and delete all copies of =
the message.


From kent@bbn.com  Thu Nov  7 10:44:58 2013
Return-Path: <kent@bbn.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3FAA921E8233 for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 10:44:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.538
X-Spam-Level: 
X-Spam-Status: No, score=-106.538 tagged_above=-999 required=5 tests=[AWL=0.060, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7u7Zdc1M2gAu for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 10:44:24 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 8E82E21E820C for <cnit@ietf.org>; Thu,  7 Nov 2013 10:43:35 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:33833 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VeUY7-000HnQ-Du; Thu, 07 Nov 2013 13:43:23 -0500
Message-ID: <527BDF4A.8050008@bbn.com>
Date: Thu, 07 Nov 2013 13:43:22 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com> <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net>
In-Reply-To: <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net>
Content-Type: multipart/alternative; boundary="------------050605090400020607040300"
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 18:44:59 -0000

This is a multi-part message in MIME format.
--------------050605090400020607040300
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit

Brian,

> Yes, but we might be able to thread certification of various aspects 
> to a single identity that we can use to coalesce the information.
>
> That identity COULD be the phone number (using proof of possession), 
> but I suspect that isn't quite enough.
The approach you suggest is used by various folks to establish identity, 
in several contexts.

It's often viewed as "good enough" but it is also vulnerable to folks 
who want to game
a system for fraud. What constitutes "good enough" is very much function 
of the value
to an attacker if the system can be subverted.

I'm a bit more comfortable with the group-level assertion that Henning 
later suggested, for
groups where we believe the motivation to impersonate is high. But, I 
question how well
the folks who manage the databases for these groups do their job wrt 
this piece of
data. And, if they elect to outsource the generation of credentials, 
e.g., certificates,
a whole new set of vulnerabilities will be introduced.

Steve

--------------050605090400020607040300
Content-Type: text/html; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit

<html>
  <head>
    <meta content="text/html; charset=ISO-8859-1"
      http-equiv="Content-Type">
  </head>
  <body text="#000000" bgcolor="#FFFFFF">
    Brian,<br>
    <br>
    <blockquote
      cite="mid:2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net"
      type="cite">
      <meta http-equiv="Content-Type" content="text/html;
        charset=ISO-8859-1">
      Yes, but we might be able to thread certification of various
      aspects to a single identity that we can use to coalesce the
      information.
      <div><br>
      </div>
      <div>That identity COULD be the phone number (using proof of
        possession), but I suspect that isn&#8217;t quite enough.</div>
    </blockquote>
    The approach you suggest is used by various folks to establish
    identity, in several contexts.<br>
    <br>
    It's often viewed as "good enough" but it is also vulnerable to
    folks who want to game<br>
    a system for fraud. What constitutes "good enough" is very much
    function of the value<br>
    to an attacker if the system can be subverted.<br>
    <br>
    I'm a bit more comfortable with the group-level assertion that
    Henning later suggested, for<br>
    groups where we believe the motivation to impersonate is high. But,
    I question how well<br>
    the folks who manage the databases for these groups do their job wrt
    this piece of<br>
    data. And, if they elect to outsource the generation of credentials,
    e.g., certificates,<br>
    a whole new set of vulnerabilities will be introduced.<br>
    <br>
    Steve<br>
  </body>
</html>

--------------050605090400020607040300--

From Henning.Schulzrinne@fcc.gov  Thu Nov  7 10:52:01 2013
Return-Path: <Henning.Schulzrinne@fcc.gov>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2EF5211E8118 for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 10:52:01 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.273
X-Spam-Level: 
X-Spam-Status: No, score=-2.273 tagged_above=-999 required=5 tests=[AWL=0.325,  BAYES_00=-2.599, HTML_MESSAGE=0.001]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M4bLATvKnG0B for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 10:51:56 -0800 (PST)
Received: from DC-IP-1.fcc.gov (dc-ip-1.fcc.gov [192.104.54.97]) by ietfa.amsl.com (Postfix) with ESMTP id A75BA21E8132 for <cnit@ietf.org>; Thu,  7 Nov 2013 10:51:54 -0800 (PST)
Message-ID: <E6A16181E5FD2F46B962315BB05962D01FC23C3D@fcc.gov>
From: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
To: 'Stephen Kent' <kent@bbn.com>, Brian Rosen <br@brianrosen.net>
Thread-Topic: [cnit] [stir] draft-peterson-stir-threats-00.txt
Thread-Index: AQHO28lBm7MQs/E/Y0C8yrTGiGFz45oZ21rggAB7noCAAAUVAIAAEqoA//+tHeA=
Date: Thu, 7 Nov 2013 18:51:53 +0000
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com> <CE9EE40A.2DA2E%fmousinh@cisco.com> <013601cedaf3$a05d72f0$e11858d0$@shockey.us> <0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net> <02e301cedb34$af790790$0e6b16b0$@shockey.us> <8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net> <B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com> <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net> <527BDF4A.8050008@bbn.com>
In-Reply-To: <527BDF4A.8050008@bbn.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
Content-Type: multipart/alternative; boundary="_000_E6A16181E5FD2F46B962315BB05962D01FC23C3Dp2pxmb13fccnetw_"
MIME-Version: 1.0
Cc: "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 18:52:01 -0000

--_000_E6A16181E5FD2F46B962315BB05962D01FC23C3Dp2pxmb13fccnetw_
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

I'm sure somebody has managed to pretend to be a licensed financial institu=
tion and is a fraud (see Madoff), but my main objective is to raise the bar=
. If some dicey charity has to convince a state registrar that they are leg=
it, that's a significant hurdle. Plus, after the first few fraud attempts, =
they'd likely be blacklisted immediately. Plus, they'd be committing fraud =
along the way, which has much higher (and criminal) penalties than just rob=
ocalling. Also, there is a feedback loop - after NJ had issued a bunch of d=
river's licenses based on bribery, the press coverage got the governor's at=
tention. I suspect that headlines of "State licensed charity defrauded gran=
dmothers" would similarly yield results.

From: cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.org] On Behalf Of Ste=
phen Kent
Sent: Thursday, November 07, 2013 1:43 PM
To: Brian Rosen
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

Brian,


Yes, but we might be able to thread certification of various aspects to a s=
ingle identity that we can use to coalesce the information.

That identity COULD be the phone number (using proof of possession), but I =
suspect that isn't quite enough.
The approach you suggest is used by various folks to establish identity, in=
 several contexts.

It's often viewed as "good enough" but it is also vulnerable to folks who w=
ant to game
a system for fraud. What constitutes "good enough" is very much function of=
 the value
to an attacker if the system can be subverted.

I'm a bit more comfortable with the group-level assertion that Henning late=
r suggested, for
groups where we believe the motivation to impersonate is high. But, I quest=
ion how well
the folks who manage the databases for these groups do their job wrt this p=
iece of
data. And, if they elect to outsource the generation of credentials, e.g., =
certificates,
a whole new set of vulnerabilities will be introduced.

Steve

--_000_E6A16181E5FD2F46B962315BB05962D01FC23C3Dp2pxmb13fccnetw_
Content-Type: text/html; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" xmlns:o=3D"urn:schemas-micr=
osoft-com:office:office" xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" xmlns=3D"http:=
//www.w3.org/TR/REC-html40">
<head>
<meta http-equiv=3D"Content-Type" content=3D"text/html; charset=3Dus-ascii"=
>
<meta name=3D"Generator" content=3D"Microsoft Word 14 (filtered medium)">
<style><!--
/* Font Definitions */
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";
	color:black;}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.EmailStyle17
	{mso-style-type:personal-reply;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]-->
</head>
<body bgcolor=3D"white" lang=3D"EN-US" link=3D"blue" vlink=3D"purple">
<div class=3D"WordSection1">
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D">I&#8217;m sure somebody h=
as managed to pretend to be a licensed financial institution and is a fraud=
 (see Madoff), but my main objective is to raise the bar. If some
 dicey charity has to convince a state registrar that they are legit, that&=
#8217;s a significant hurdle. Plus, after the first few fraud attempts, the=
y&#8217;d likely be blacklisted immediately. Plus, they&#8217;d be committi=
ng fraud along the way, which has much higher (and
 criminal) penalties than just robocalling. Also, there is a feedback loop =
&#8211; after NJ had issued a bunch of driver&#8217;s licenses based on bri=
bery, the press coverage got the governor&#8217;s attention. I suspect that=
 headlines of &#8220;State licensed charity defrauded grandmothers&#8221;
 would similarly yield results.<o:p></o:p></span></p>
<p class=3D"MsoNormal"><span style=3D"font-size:11.0pt;font-family:&quot;Ca=
libri&quot;,&quot;sans-serif&quot;;color:#1F497D"><o:p>&nbsp;</o:p></span><=
/p>
<div>
<div style=3D"border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in">
<p class=3D"MsoNormal"><b><span style=3D"font-size:10.0pt;font-family:&quot=
;Tahoma&quot;,&quot;sans-serif&quot;;color:windowtext">From:</span></b><spa=
n style=3D"font-size:10.0pt;font-family:&quot;Tahoma&quot;,&quot;sans-serif=
&quot;;color:windowtext"> cnit-bounces@ietf.org [mailto:cnit-bounces@ietf.o=
rg]
<b>On Behalf Of </b>Stephen Kent<br>
<b>Sent:</b> Thursday, November 07, 2013 1:43 PM<br>
<b>To:</b> Brian Rosen<br>
<b>Cc:</b> cnit@ietf.org<br>
<b>Subject:</b> Re: [cnit] [stir] draft-peterson-stir-threats-00.txt<o:p></=
o:p></span></p>
</div>
</div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
<p class=3D"MsoNormal">Brian,<br>
<br>
<br>
<o:p></o:p></p>
<p class=3D"MsoNormal">Yes, but we might be able to thread certification of=
 various aspects to a single identity that we can use to coalesce the infor=
mation.
<o:p></o:p></p>
<div>
<p class=3D"MsoNormal"><o:p>&nbsp;</o:p></p>
</div>
<div>
<p class=3D"MsoNormal">That identity COULD be the phone number (using proof=
 of possession), but I suspect that isn&#8217;t quite enough.<o:p></o:p></p=
>
</div>
<p class=3D"MsoNormal">The approach you suggest is used by various folks to=
 establish identity, in several contexts.<br>
<br>
It's often viewed as &quot;good enough&quot; but it is also vulnerable to f=
olks who want to game<br>
a system for fraud. What constitutes &quot;good enough&quot; is very much f=
unction of the value<br>
to an attacker if the system can be subverted.<br>
<br>
I'm a bit more comfortable with the group-level assertion that Henning late=
r suggested, for<br>
groups where we believe the motivation to impersonate is high. But, I quest=
ion how well<br>
the folks who manage the databases for these groups do their job wrt this p=
iece of<br>
data. And, if they elect to outsource the generation of credentials, e.g., =
certificates,<br>
a whole new set of vulnerabilities will be introduced.<br>
<br>
Steve<o:p></o:p></p>
</div>
</body>
</html>

--_000_E6A16181E5FD2F46B962315BB05962D01FC23C3Dp2pxmb13fccnetw_--

From br@brianrosen.net  Thu Nov  7 11:02:55 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A5ED721E8219 for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 11:02:55 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.599
X-Spam-Level: 
X-Spam-Status: No, score=-103.599 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id wsLF-pB-192h for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 11:02:50 -0800 (PST)
Received: from mail-qa0-f45.google.com (mail-qa0-f45.google.com [209.85.216.45]) by ietfa.amsl.com (Postfix) with ESMTP id 743B011E825F for <cnit@ietf.org>; Thu,  7 Nov 2013 11:01:10 -0800 (PST)
Received: by mail-qa0-f45.google.com with SMTP id hu16so817253qab.11 for <cnit@ietf.org>; Thu, 07 Nov 2013 11:00:56 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=PKWdAukfMJKGmbaDSa5zhS6/5hj/9nqruUGiYbkk6dE=; b=SImFFgdYTKO3LX7rQBcjTmAannTLz2clEx62CqnO6wOieqrg+7IDSvMIPF+6OELzIm w7Hm0m98DuCpP5tk6YoeogBeMvm1v4764gOXsYOTK4cIWOKRWc+TBrCnGt0qZJQ5WNqK eWd/BbkKVFtUhD6LtTS+e1BqYy4zwDk7jgbrw56RPEJ/YZW4eurFxc2PRzpcL1WHSh+m 2/Q+tCFhUyqsTj0e8wRRjPQFbeR9THb3eBNxIYsUu+p1latzLV/uypvOFu6+pegZM+re lLhg/alwuUc/n+Lu4AmvssCkZI0g1fG2Flh/dL/LLKhC0xkfyNOj5Yp293m3+/IyLx6m hGww==
X-Gm-Message-State: ALoCoQm7qQ6gLPJW7vsgjuke1Sqgq+O+0ZiYMwyCVQESrSk6YY+1vjrPV7n4dnmPWKoR3ldxFdSS
X-Received: by 10.49.95.233 with SMTP id dn9mr15607093qeb.54.1383850856353; Thu, 07 Nov 2013 11:00:56 -0800 (PST)
Received: from wireless-a-v6.meeting.ietf.org ([2001:67c:370:176:9d97:144b:5e61:753]) by mx.google.com with ESMTPSA id k2sm12888107qan.8.2013.11.07.11.00.54 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Thu, 07 Nov 2013 11:00:55 -0800 (PST)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1816\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <527BDF4A.8050008@bbn.com>
Date: Thu, 7 Nov 2013 11:00:51 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <FDA96CAA-5F4D-402D-B683-51671859D1D5@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com> <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net> <527BDF4A.8050008@bbn.com>
To: Stephen Kent <kent@bbn.com>
X-Mailer: Apple Mail (2.1816)
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 19:02:55 -0000

Okay, so my wife is a Social Worker, and there is the National =
Association of Social Workers who accredits social workers, and there is =
a state licensing board that licenses social workers.
NASW is always looking for value-add programs, for example, they offer a =
liability insurance program for members.

So, let=92s say the Federal Trade Commission sets up a CA, and issues a =
cert to NASW.  Let=92s say NASW offers to issue a signed assertion that =
my wife is an accredited social worker associated with her telephone =
number.  To do so, she goes to the NASW web site, signs up, and clicks =
=93call to confirm=94.  Her office phone rings, and an IVR asks her to =
enter (via DTMF) the confirmation code displaying on her screen.  She =
then gets an email that has an attachment, which is some blob signed by =
NASW with a cert traceable to the FTC.  She forwards the email, with the =
attachment, to her carrier, say Verizon.  The email address at Verizon =
is an automaton which lifts the attachment and stores it.  Since it =
contains the phone number, they know what to associate the blob with.

When a client gets a call from her on their smartphone, it contains her =
name, and =93Social Worker=94 on the display.  Details of how the blob =
gets retrieved by the validator need to be worked out.

Is this breakable?  Sure.  NASW has a pretty conventional =
username/password scheme, which could be compromised.  Someone has to =
provide the code to do the signing, although we could pretty easily open =
source what is needed for every such organization.  Carriers need code =
to lift the attachment and store it.

But it seems to me to be eminently doable.

Brian
On Nov 7, 2013, at 10:43 AM, Stephen Kent <kent@bbn.com> wrote:

> Brian,
>=20
>> Yes, but we might be able to thread certification of various aspects =
to a single identity that we can use to coalesce the information.
>>=20
>> That identity COULD be the phone number (using proof of possession), =
but I suspect that isn=92t quite enough.
> The approach you suggest is used by various folks to establish =
identity, in several contexts.
>=20
> It's often viewed as "good enough" but it is also vulnerable to folks =
who want to game
> a system for fraud. What constitutes "good enough" is very much =
function of the value
> to an attacker if the system can be subverted.
>=20
> I'm a bit more comfortable with the group-level assertion that Henning =
later suggested, for
> groups where we believe the motivation to impersonate is high. But, I =
question how well
> the folks who manage the databases for these groups do their job wrt =
this piece of
> data. And, if they elect to outsource the generation of credentials, =
e.g., certificates,
> a whole new set of vulnerabilities will be introduced.
>=20
> Steve


From richard@shockey.us  Thu Nov  7 15:33:34 2013
Return-Path: <richard@shockey.us>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E587D21E818B for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 15:33:34 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.007
X-Spam-Level: 
X-Spam-Status: No, score=-102.007 tagged_above=-999 required=5 tests=[AWL=0.257, BAYES_00=-2.599, HTML_MESSAGE=0.001, IP_NOT_FRIENDLY=0.334, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hO9G+Ek7rMOv for <cnit@ietfa.amsl.com>; Thu,  7 Nov 2013 15:33:24 -0800 (PST)
Received: from oproxy9-pub.mail.unifiedlayer.com (oproxy9-pub.mail.unifiedlayer.com [69.89.24.6]) by ietfa.amsl.com (Postfix) with SMTP id EE7FD21E816F for <cnit@ietf.org>; Thu,  7 Nov 2013 15:33:18 -0800 (PST)
Received: (qmail 20474 invoked by uid 0); 7 Nov 2013 23:32:55 -0000
Received: from unknown (HELO box462.bluehost.com) (74.220.219.62) by oproxy9.mail.unifiedlayer.com with SMTP; 7 Nov 2013 23:32:55 -0000
DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=shockey.us; s=default;  h=Content-Type:MIME-Version:Message-ID:Date:Subject:In-Reply-To:References:Cc:To:From; bh=e0BXa+zVXc0sTd+AZFISWdd+KGGl5AYPhifaDlG5QWE=;  b=Nr6yKEBwiemL1CH/cSPUX2sMXs21qo5gGR7qv20MHi7pmsWFerfovHof/Czl61VTgMxHgwH43dNL/u91X9FuToJYr/HA0Gxp0fbTPKE+Olwd1e5m2QsPQVMw/5LfgMZx;
Received: from [173.79.179.104] (port=65219 helo=RSHOCKEYPC) by box462.bluehost.com with esmtpa (Exim 4.80) (envelope-from <richard@shockey.us>) id 1VeZ4I-00007D-3J; Thu, 07 Nov 2013 16:32:54 -0700
From: "Richard Shockey" <richard@shockey.us>
To: "'Brian Rosen'" <br@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<00f401cedbcc$4a7e3700$df7aa500$@shockey.us> <61DECB8D-A41A-41B8-B43C-DC11D3E2AE1B@brianrosen.net>
In-Reply-To: <61DECB8D-A41A-41B8-B43C-DC11D3E2AE1B@brianrosen.net>
Date: Thu, 7 Nov 2013 18:32:51 -0500
Message-ID: <038301cedc11$ae2f4010$0a8dc030$@shockey.us>
MIME-Version: 1.0
Content-Type: multipart/alternative; boundary="----=_NextPart_000_0384_01CEDBE7.C56B8790"
X-Mailer: Microsoft Outlook 15.0
Content-Language: en-us
Thread-Index: AQKuxOgdsFN95Qgmj4nb3bGbN4Q20wEejKIqAhCsH9QBYcTrswHCXLsVAZF++goCZ/4yCQGECT5Ql/wPvjA=
X-Identified-User: {3286:box462.bluehost.com:shockeyu:shockey.us} {sentby:smtp auth 173.79.179.104 authed with richard@shockey.us}
Cc: stir@ietf.org, "'Gorman, Pierce A \[NTK\]'" <Pierce.Gorman@sprint.com>, cnit@ietf.org, "'Fernando Mousinho \(fmousinh\)'" <fmousinh@cisco.com>
Subject: Re: [cnit] [stir]   draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 07 Nov 2013 23:33:35 -0000

This is a multipart message in MIME format.

------=_NextPart_000_0384_01CEDBE7.C56B8790
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: 7bit

 

VCARD SCHMEECARD.. whatever. I don't think you want to reinvent the wheel
here but I won't argue about that. 

 

The issue is defining what set of data from a called party increases the
level of trust in the session establishment process that the consumer
generally would understand and can the network validate that data in a
reasonable manner that does not increase costs or significantly increase
post dial delay.  

 

Oh ..how would it be displayed . what would Google and Apple need to do to
put the data on the devices?  WebRTC for that matter since IMHO its going to
end up being used as a SIP client quite often. 

 

And again I think a in band solution will not work and never actually be
used by..sort of like VIPR. 

 

From: stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] On Behalf Of
Brian Rosen
Sent: Thursday, November 07, 2013 12:10 PM
To: Richard Shockey
Cc: stir@ietf.org List; Gorman, Pierce A [NTK]; Fernando Mousinho
(fmousinh); cnit@ietf.org
Subject: Re: [stir] [cnit] draft-peterson-stir-threats-00.txt

 

We're agreeing CNAM doesn't work, it lies, and we have to fix that.

 

Billing relationships are useful, but only give you return routability
properties.  Not very interesting, and billing addresses aren't often what
is wanted.  Given various corporate relationships that are tolerated by
carriers, it would be trivial to make the billing name be anything you
wanted it to be and get service from most carriers.  

 

I think it IS possible to validate a name, as long as you allow a
probability of that validation to be carried, because the techniques we have
aren't definitive.  

 

See prior reply on the category idea, which I think is workable.

 

FWIW, I am in favor of an in band solution for CNAM - display name of From.

 

You proposed a VCARD.  I think that is unworkable.  Name is hard enough.  We
might be able to get an address.  All the other fields in a VCARD are pretty
dicey.

 

 

On Nov 7, 2013, at 7:16 AM, Richard Shockey <richard@shockey.us
<mailto:richard@shockey.us> > wrote:





 

Like CNAM is so accurate today. ??  When certain companies get the data from
scanning phone books that are not even printed anymore?

 

The carrier has the billing relationship. As you well know that is where the
data comes from now but it is not granular. 

 

The carrier permits the customer to create the record(s). What are you
trying to validate? The Accuracy of the data?  . In any event none of that
is our problem.   We make the tools. Someone else worries about policy.

 

You are making this way too complicated thus defeating the basic use case.  

 

Well from time to time I've discovered I'm not a big fan of the end to end
principal.  It just doesn't work for every use case.  This is a carrier
service or in certain cases hosted.

 

Much like I'm convinced the out of band solution in STIR is total fantasy
and like VIPR will almost never actually be used in practice.

 

As for encoding I mentioned JCARD since there seems to be a faction in the
IETF that is anti-XML

 

From: cnit-bounces@ietf.org <mailto:cnit-bounces@ietf.org>
[mailto:cnit-bounces@ietf.org] On Behalf Of Brian Rosen
Sent: Thursday, November 07, 2013 12:59 AM
To: Richard Shockey
Cc: stir@ietf.org <mailto:stir@ietf.org>  List; Gorman, Pierce A [NTK];
cnit@ietf.org <mailto:cnit@ietf.org> ; Fernando Mousinho (fmousinh)
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt

 

I think this would be a heavy lift.

 

If the responsible entity was a carrier, then it would have to validate the
data, which it has very little basis to validate.  It could get a 3rd party
to do the validation, but then it's putting its reputation on the back of
some hired hand validator.

 

If the responsibility is the end user/device, then the signature has no
value.

 

I do not argue that Call-Info is suitable,  it is.

 

I do question JCARD vs xCard, but that's an encoding detail.  All of SIP Is
XML described by schema, not json.

 

Brian

 

On Nov 6, 2013, at 1:10 PM, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us> wrote:






URI for a JCARD in the CALL INFO header provisioned by the calling party and
ultimately signed by the responsible entity.  The carrier could provision
this for their mobile or hosted customers.  Enterprises could do this
themselves.  This also has advantages in Enterprise to Enterprise UC as well
where the data is derived from the Enterprise "directory" and could
facilitate end to end PPX to PBX communications especially in point to point
video communications.

 

There are certainly privacy and security issues to be addressed.  The Push
vs Pull model.  This really would be PII in the clear but then its done
voluntarily.

 

There would have to be some work around restructuring the Header and adding
some parameters but it's underutilized right now and this Use Case is a
perfectly appropriate use.

 

 <https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06>
https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06

 

Obviously it would need to be signed but we don't need to worry about that
..yet.

 

>From 3261

 

20.9 Call-Info

 

   The Call-Info header field provides additional information about the

   caller or callee, depending on whether it is found in a request or

   response.  The purpose of the URI is described by the "purpose"

   parameter.  The "icon" parameter designates an image suitable as an

   iconic representation of the caller or callee.  The "info" parameter

   describes the caller or callee in general, for example, through a web

   page.  The "card" parameter provides a business card, for example, in

   vCard [36] or LDIF [37] formats.  Additional tokens can be registered

   using IANA and the procedures in Section 27.

 

   Use of the Call-Info header field can pose a security risk.  If a

   callee fetches the URIs provided by a malicious caller, the callee

   may be at risk for displaying inappropriate or offensive content,

   dangerous or illegal content, and so on.  Therefore, it is

   RECOMMENDED that a UA only render the information in the Call-Info

   header field if it can verify the authenticity of the element that

   originated the header field and trusts that element.  This need not

   be the peer UA; a proxy can insert this header field into requests.

 

   Example:

 

   Call-Info: < <http://wwww.example.com/alice/photo.jpg>
http://wwww.example.com/alice/photo.jpg> ;purpose=icon,

     < <http://www.example.com/alice/> http://www.example.com/alice/>
;purpose=info

 

From: Brian Rosen [ <mailto:br@brianrosen.net> mailto:br@brianrosen.net] 
Sent: Wednesday, November 06, 2013 3:41 PM
To: Richard Shockey
Cc: Fernando Mousinho (fmousinh); Gorman, Pierce A [NTK];
<mailto:stir@ietf.org> stir@ietf.org List
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

We've considered adding some information that is not number and is not name,
but is something like "bank", which might have some sort of validation
behind it.

 

Is that along the lines you were thinking?

 

Brian

On Nov 6, 2013, at 5:25 AM, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us> wrote:







I agree with Pierce here and respectfully disagree that STIR might eliminate
the need for other forms of caller identification.  Though your use case of
credit card validation is a useful one and you are right there are still
applications that use SS7 for things that have nothing to do with call
setup. I agree with you STIR may have more applications beyond the obvious
ones of realtime session validation.

 

It's been my experience recently that there is a use case for something MORE
in the identification of the session as it is presented to the called party.
This is the CNAM + idea we are kicking around on the CNIT list.

 

_______________________________________________

cnit mailing list

 <mailto:cnit@ietf.org> cnit@ietf.org

 <https://www.ietf.org/mailman/listinfo/cnit>
https://www.ietf.org/mailman/listinfo/cnit

 

But your use case of a bank wanting to make sure they could properly
identify themselves to the consumer before establishing a conversation is
exactly what this process is about.  STIR is essential but it's a
multi-faceted problem that may require multi-faceted solutions.. and
enhanced CNAM + being only one of them.   Its not unreasonable to discuss
those.

 

The obviously analogy is I would want to see some real identification of a
utility worker before I let them into my house to make repairs.  I would
want some validation that the call to me to reconfirm the appointments was
in fact from the utility in question.

 

 

 

From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of
Fernando Mousinho (fmousinh)
Sent: Tuesday, November 05, 2013 6:26 PM
To: Gorman, Pierce A [NTK];  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Let me rephrase it. it may eliminate the need for other forms of caller
identification beyond what STIR will provide, depending on the specific use
case. For example, a credit card company may choose to rely entirely on STIR
before allowing a card to be unblocked by an IVR (and as I said earlier,
many companies do it today). In other use cases, the TN alone is not
sufficient information - my health care provider will want to know which
member of the family is calling.

 

I agree that ANI is already broadly used to improve customer service today.
However, it is not usually deemed as a secure enough mechanism to validate
the caller (therefore this WG!), except if you are a large organization that
can leverage things like SS7. STIR would make this type of validation
available to a broader number of companies.

 

 

Going on a tangent. perhaps this is out of scope, but there is not a lot of
discussion about called party hijacking. Couldn't a man-in-the-middle try to
answer calls on my behalf? If my bank is calling me, I want to make sure
it's really them before carrying a conversation, but wouldn't they want the
same? 

 

 

From: <Gorman>, "Pierce A [NTK]" < <mailto:Pierce.Gorman@sprint.com>
Pierce.Gorman@sprint.com>
Date: Tuesday, November 5, 2013 at 6:05 PM
To: Fernando Mousinho < <mailto:fmousinh@cisco.com> fmousinh@cisco.com>, "
<mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>
Subject: RE: [stir] draft-peterson-stir-threats-00.txt

 

I agree with your characterization of businesses as victim of caller ID
fraud however contact centers also use TN as a key to improve information
available to call agents to reduce average time-per-call and increase
capacity of the call center.  So I don't agree that STIR would "eliminate
the need for caller identification from known TNs."

 

But perhaps I misunderstood your last sentence?

 

 

From: Fernando Mousinho (fmousinh) [ <mailto:fmousinh@cisco.com>
mailto:fmousinh@cisco.com] 
Sent: November 05, 2013 4:34 PM
To:  <mailto:stir@ietf.org> stir@ietf.org
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

I would suggest we add a new attack type to section 3. More and more
companies are using the caller ID for account validation. For example, if I
call my credit card provider from my office number, they ask me for
identification. If I call from my home phone number, I'm informed that I
don't need to provide any further identification because my number is on
file. Some (all?) companies that implement this type of validation rely on
SS7 today.

 

Ultimately, this is yet another variation of impersonation - but in this
case, the "victim" is a business, unlike the other two scenarios we've
listed so far.

 

Addressing this scenario would actually turn STIR into a feature, given it
would enable contact centers of all sizes to eliminate the need for caller
identification from known TNs.

 

 

 

From: Alex Bobotek < <mailto:alex@bobotek.net> alex@bobotek.net>
Date: Tuesday, October 1, 2013 at 12:51 PM
To: Brian Rosen < <mailto:br@brianrosen.net> br@brianrosen.net>, "Peterson,
Jon" < <mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>
Cc: " <mailto:stir@ietf.org> stir@ietf.org" < <mailto:stir@ietf.org>
stir@ietf.org>, Richard Shockey < <mailto:richard@shockey.us>
richard@shockey.us>, "'DOLLY, MARTIN C'" < <mailto:md3135@att.com>
md3135@att.com>, 'Robert Sparks' < <mailto:rjsparks@nostrum.com>
rjsparks@nostrum.com>
Subject: Re: [stir] draft-peterson-stir-threats-00.txt

 

Jon,

 

Thanks for the response.  The intention in #1 below is to clarify the
following sentence:

 

The primary attack vector is

   therefore one where the attacker contrives for the calling telephone

   number in signaling to be a particular chosen number, one that the

   attacker does not have the authority to call from, in order for that

   number to be rendered on the terminating side. 

 

This might be misconstrued as indicating that the objective of spoofing is
simply the rendering of a spoofed number on the receiving display, causing
mistaken conclusions that defenses might be limited to securing the rendered
information.  No issues with leaving this as it's a valid point.  Another
(increasing) motivation is to evade network and/or endpoint defenses that
may block based on CPN. 

 

So however it's worded, I think it's important to allow for both attack
objectives of a spoofed presentation at the endpoint and in transit.   

 

Regards,

 

Alex

 

> -----Original Message-----

> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf Of

> Brian Rosen

> Sent: Tuesday, October 01, 2013 9:29 AM

> To: Peterson, Jon

> Cc:  <mailto:stir@ietf.org> stir@ietf.org; Alex Bobotek; 'Robert Sparks';
'DOLLY, MARTIN C'; Richard

> Shockey

> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> 

> Don't think there is much MESSAGE.  MSRP is about all we see, and XMPP is

> more likely than that.

> 

> Brian

> 

> On Oct 1, 2013, at 12:24 PM, "Peterson, Jon" <
<mailto:jon.peterson@neustar.biz> jon.peterson@neustar.biz>

> wrote:

> 

> > Thanks for these notes, Alex. Some responses below.

> >

> >> Here are several comments that should feed into the IETF Peterson
draft:

> >>

> >> *   Remove any assumptions that the solution cannot be in-network

> [IMO,

> >> both endpoint and in-network solutions should be facilitated]

> >

> > Agreed that both in-band and out-of-band solutions can usually be

> > implemented in either endpoints or in intermediaries of various kinds.

> > If I see text that implies otherwise, I'll certainly change it.

> >

> >> *   Add a sessionless attack scenario.  A spam payload may be carried
in

> a

> >> SIP INVITE or MESSAGE, which might contain stock market advice even

> >> in a display name field.  These attacks do NOT require session

> establishment.

> >> More generally, we should be mindful of the fact that SIP is used in

> >> telephony form more than voice session setup.

> >

> > Probably if we were going to include a sessionless attack scenario, it

> > would be with regular text messages (whether carried on the PSTN over

> > TCAP or with some Internet protocol, including MESSAGE) rather than

> > with an INVITE, which typically wouldn't result in a payload being

> > immediately rendered to a user. More on this below with your suggested

> text.

> >

> >> Here's some suggested markup:

> >>

> >>

> >> 1.    Replace 2nd sentence of 2nd paragraph of 1.0 Introduction with:

> >>

> >> The primary attack vector is

> >>  therefore one where the attacker contrives for the calling telephone

> >> number in signaling to be a particular chosen number that the

> >> attacker does not have the authority to call from.

> >

> > What you want here is to remove the implication that the number will

> > be rendered on the terminating side? While there are some attacks

> > where that isn't significant, perhaps, I would say it is significant

> > in the primary attack vectors that concern us.

> >

> >> 2.  Replace 3rd paragraph of 2.1 Endpoints with:

> >>

> >>     Smart devices are generally based on computers with some degree

> >> of programmability, the capacity to access the Internet, and

> >> capabilities of rendering text, audio and/or images.  This includes

> >> smart phones, telephone applications on desktop and laptop computers,

> >> IP private branch exchanges, and so on.

> >

> > I can add the notion that smart devices can render text, audio and/or

> > images as you suggest.

> >

> >> 3.  Add to 3.3 Attack Scenarios:

> >>

> >>       Impersonation, IP-Mobile Text Message

> >>

> >>        An attacker with an computer sends a high volume of SIP MESSAGE

> >> spam message to IP-enabled smart phones using randomized calling

> >> party numbers.

> >>

> >>       Countermeasure: in-band authenticated identity

> >

> > Provided we're talking about end-to-end SIP use of MESSAGE, agreed

> > that in-band would be the right countermeasure. I am curious though

> > whether practically speaking there is enough use of MESSAGE in this

> > fashion that we're actually seeing high-volume spam over MESSAGE

> > today. Either way, no problem having an attack scenario of this form in
the

> document.

> >

> > Jon Peterson

> > Neustar, Inc.

> >

> >> Regards,

> >>

> >> Alex

> >>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of Richard Shockey

> >>> Sent: Monday, September 30, 2013 1:11 PM

> >>> To: 'DOLLY, MARTIN C'; 'Robert Sparks'

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> +1

> >>>

> >>> -----Original Message-----

> >>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On Behalf

> >>> Of DOLLY, MARTIN C

> >>> Sent: Monday, September 30, 2013 12:58 PM

> >>> To: Robert Sparks

> >>> Cc:  <mailto:stir@ietf.org> stir@ietf.org

> >>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>

> >>> Yes, ok

> >>>

> >>> Martin Dolly

> >>> Lead Member of Technical Staff

> >>> Core Network & Gov't/Regulatory Standards AT&T Labs - Network

> >>> Technology

> >>> +1-609-903-3360

> >>>  <mailto:md3135@att.com> md3135@att.com

> >>>

> >>>> On Sep 30, 2013, at 12:47 PM, "Robert Sparks"

> >>>> < <mailto:rjsparks@nostrum.com> rjsparks@nostrum.com>

> >>> wrote:

> >>>>

> >>>>> On 9/26/13 3:42 PM, DOLLY, MARTIN C wrote:

> >>>>> With Hadriel comments incorporated, it is a start

> >>>> Hi Martin -

> >>>>

> >>>> Just to make sure - I think you're referring to Hadriel's comments

> >>>> on the

> >>> problem statement document?

> >>>> I don't think Hadriel's commented directly on stir-threats yet.

> >>>>

> >>>> In any case, we _are_ talking about a starting place, not a

> >>>> finished

> >>> product.

> >>>>

> >>>> If there's no other objection, I'd like to get Jon to submit the

> >>>> threats

> >>> document as a WG -00 as soon as it's convenient.

> >>>>

> >>>> RjS

> >>>>>

> >>>>> -----Original Message-----

> >>>>> From:  <mailto:stir-bounces@ietf.org> stir-bounces@ietf.org [
<mailto:stir-bounces@ietf.org> mailto:stir-bounces@ietf.org] On

> >>>>> Behalf Of Russ Housley

> >>>>> Sent: Thursday, September 26, 2013 4:37 PM

> >>>>> To: IETF STIR Mail List

> >>>>> Subject: Re: [stir] draft-peterson-stir-threats-00.txt

> >>>>>

> >>>>> It has been six days, I'd like to hear from more people about this

> >>> document.  Martin asked for an additional week, so I'm sure we will

> >>> hear from him soon.

> >>>>>

> >>>>> Russ

> >>>>>

> >>>>>

> >>>>>> On Sep 20, 2013, at 5:23 PM, Russ Housley wrote:

> >>>>>>

> >>>>>>  <http://www.ietf.org/id/draft-peterson-stir-threats-00.txt>
http://www.ietf.org/id/draft-peterson-stir-threats-00.txt

> >>>>>>

> >>>>>> Should the working group adopt this I-D as the starting point for

> >>>>>> the

> >>> STIR threat docuent?

> >>>>>>

> >>>>>> Russ

> >>>>> _______________________________________________

> >>>>> stir mailing list

> >>>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>>

> >>>> _______________________________________________

> >>>> stir mailing list

> >>>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >>>

> >>> _______________________________________________

> >>> stir mailing list

> >>>  <mailto:stir@ietf.org> stir@ietf.org

> >>>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >> _______________________________________________

> >> stir mailing list

> >>  <mailto:stir@ietf.org> stir@ietf.org

> >>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> >

> > _______________________________________________

> > stir mailing list

> >  <mailto:stir@ietf.org> stir@ietf.org

> >  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

> 

> _______________________________________________

> stir mailing list

>  <mailto:stir@ietf.org> stir@ietf.org

>  <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


  _____  



This e-mail may contain Sprint proprietary information intended for the sole
use of the recipient(s). Any use by others is prohibited. If you are not the
intended recipient, please contact the sender and delete all copies of the
message.

_______________________________________________
stir mailing list
 <mailto:stir@ietf.org> stir@ietf.org
 <https://www.ietf.org/mailman/listinfo/stir>
https://www.ietf.org/mailman/listinfo/stir

 


------=_NextPart_000_0384_01CEDBE7.C56B8790
Content-Type: text/html;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:m=3D"http://schemas.microsoft.com/office/2004/12/omml" =
xmlns=3D"http://www.w3.org/TR/REC-html40"><head><META =
HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii"><meta name=3DGenerator content=3D"Microsoft Word 15 =
(filtered medium)"><!--[if !mso]><style>v\:* =
{behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style><![endif]--><style><!--
/* Font Definitions */
@font-face
	{font-family:Helvetica;
	panose-1:2 11 6 4 2 2 2 2 2 4;}
@font-face
	{font-family:"Cambria Math";
	panose-1:2 4 5 3 5 4 6 3 2 4;}
@font-face
	{font-family:Calibri;
	panose-1:2 15 5 2 2 2 4 3 2 4;}
@font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
/* Style Definitions */
p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman","serif";}
a:link, span.MsoHyperlink
	{mso-style-priority:99;
	color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{mso-style-priority:99;
	color:purple;
	text-decoration:underline;}
span.apple-converted-space
	{mso-style-name:apple-converted-space;}
span.EmailStyle18
	{mso-style-type:personal;
	font-family:"Calibri","sans-serif";
	color:#1F497D;}
span.EmailStyle19
	{mso-style-type:personal-compose;
	font-family:"Calibri","sans-serif";
	color:windowtext;}
.MsoChpDefault
	{mso-style-type:export-only;
	font-size:10.0pt;}
@page WordSection1
	{size:8.5in 11.0in;
	margin:1.0in 1.0in 1.0in 1.0in;}
div.WordSection1
	{page:WordSection1;}
--></style><!--[if gte mso 9]><xml>
<o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
<o:shapelayout v:ext=3D"edit">
<o:idmap v:ext=3D"edit" data=3D"1" />
</o:shapelayout></xml><![endif]--></head><body lang=3DEN-US link=3Dblue =
vlink=3Dpurple><div class=3DWordSection1><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>VCARD SCHMEECARD.. whatever. I don&#8217;t think you want to reinvent =
the wheel here but I won&#8217;t argue about that. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The issue is defining what set of data from a called party increases =
the level of trust in the session establishment process that the =
consumer generally would understand and can the network validate that =
data in a reasonable manner that does not increase costs or =
significantly increase post dial delay. &nbsp;<o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Oh ..how would it be displayed &#8230; what would Google and Apple =
need to do to put the data on the devices?&nbsp; WebRTC for that matter =
since IMHO its going to end up being used as a SIP client quite often. =
<o:p></o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>And again I think a in band solution will not work and never actually =
be used by..sort of like VIPR. <o:p></o:p></span></p><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><o:p>&nbsp;</o:p></span></p><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'> =
stir-bounces@ietf.org [mailto:stir-bounces@ietf.org] <b>On Behalf Of =
</b>Brian Rosen<br><b>Sent:</b> Thursday, November 07, 2013 12:10 =
PM<br><b>To:</b> Richard Shockey<br><b>Cc:</b> stir@ietf.org List; =
Gorman, Pierce A [NTK]; Fernando Mousinho (fmousinh); =
cnit@ietf.org<br><b>Subject:</b> Re: [stir] [cnit] =
draft-peterson-stir-threats-00.txt<o:p></o:p></span></p></div></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p><p class=3DMsoNormal>We&#8217;re =
agreeing CNAM doesn&#8217;t work, it lies, and we have to fix =
that.<o:p></o:p></p><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>Billing relationships are useful, but only give you =
return routability properties. &nbsp;Not very interesting, and billing =
addresses aren&#8217;t often what is wanted. &nbsp;Given various =
corporate relationships that are tolerated by carriers, it would be =
trivial to make the billing name be anything you wanted it to be and get =
service from most carriers. &nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p class=3DMsoNormal>I =
think it IS possible to validate a name, as long as you allow a =
probability of that validation to be carried, because the techniques we =
have aren&#8217;t definitive. &nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>See prior reply on the category idea, which I think is =
workable.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>FWIW, I am in favor of an in band solution for CNAM - =
display name of From.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal>You proposed a VCARD. &nbsp;I think that is =
unworkable. &nbsp;Name is hard enough. &nbsp;We might be able to get an =
address. &nbsp;All the other fields in a VCARD are pretty =
dicey.<o:p></o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div><div><div><div><div><p =
class=3DMsoNormal>On Nov 7, 2013, at 7:16 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us">richard@shockey.us</a>&gt; =
wrote:<o:p></o:p></p></div><p =
class=3DMsoNormal><br><br><o:p></o:p></p><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Like CNAM is so accurate today&#8230; ??&nbsp; When certain companies =
get the data from scanning phone books that are not even printed =
anymore?</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The carrier has the billing relationship. As you well know that is =
where the data comes from now but it is not =
granular.&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The carrier permits the customer to create the record(s). What are =
you trying to validate? The Accuracy of the data?&nbsp; &#8230; In any =
event none of that is our problem.&nbsp; &nbsp;We make the tools. =
Someone else worries about policy.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>You are making this way too complicated thus defeating the basic use =
case.&nbsp;&nbsp;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Well from time to time I&#8217;ve discovered I&#8217;m not a big fan =
of the end to end principal.&nbsp; It just doesn&#8217;t work for every =
use case.&nbsp; This is a carrier service or in certain cases =
hosted.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Much like I&#8217;m convinced the out of band solution in STIR is =
total fantasy and like VIPR will almost never actually be used in =
practice.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>As for encoding I mentioned JCARD since there seems to be a faction =
in the IETF that is anti-XML</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:cnit-bounces@ietf.org">cnit-bounces@ietf.org</a> [<a =
href=3D"mailto:cnit-bounces@ietf.org">mailto:cnit-bounces@ietf.org</a>]<s=
pan class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian =
Rosen<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Thursday, November 07, 2013 =
12:59 AM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org">stir@ietf.org</a> List; Gorman, Pierce A =
[NTK]; <a href=3D"mailto:cnit@ietf.org">cnit@ietf.org</a>; Fernando =
Mousinho (fmousinh)<br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [cnit] [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>I think this would be a heavy =
lift.<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>If the responsible entity was a carrier, then it would =
have to validate the data, which it has very little basis to validate. =
&nbsp;It could get a 3rd party to do the validation, but then it&#8217;s =
putting its reputation on the back of some hired hand =
validator.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>If the responsibility is the end user/device, then the =
signature has no value.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>I do not argue that Call-Info is suitable, &nbsp;it =
is.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>I do question JCARD vs xCard, but that&#8217;s an =
encoding detail. &nbsp;All of SIP Is XML described by schema, not =
json.<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><div><p =
class=3DMsoNormal>On Nov 6, 2013, at 1:10 PM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us"><span =
style=3D'color:purple'>richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><br><br><br><o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>URI for a JCARD in the CALL INFO header provisioned by the calling =
party and ultimately signed by the responsible entity. &nbsp;The carrier =
could provision this for their mobile or hosted customers.&nbsp; =
Enterprises could do this themselves.&nbsp; This also has advantages in =
Enterprise to Enterprise UC as well where the data is derived from the =
Enterprise &#8220;directory&#8221; and could facilitate end to end PPX =
to PBX communications especially in point to point video =
communications.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There are certainly privacy and security issues to be =
addressed.&nbsp; The Push vs Pull model.&nbsp; This really would be PII =
in the clear but then its done =
voluntarily.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>There would have to be some work around restructuring the Header and =
adding some parameters but it&#8217;s underutilized right now and this =
Use Case is a perfectly appropriate =
use.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a =
href=3D"https://tools.ietf.org/html/draft-ietf-jcardcal-jcard-06"><span =
style=3D'color:purple'>https://tools.ietf.org/html/draft-ietf-jcardcal-jc=
ard-06</span></a></span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>Obviously it would need to be signed but we don&#8217;t need to worry =
about that ..yet.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>From 3261</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>20.9 Call-Info</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; The Call-Info header field provides additional =
information about the</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; caller or callee, depending on whether it is found in a =
request or</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; response.&nbsp; The purpose of the URI is described by =
the &quot;purpose&quot;</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; parameter.&nbsp; The &quot;icon&quot; parameter =
designates an image suitable as an</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; iconic representation of the caller or callee.&nbsp; The =
&quot;info&quot; parameter</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; describes the caller or callee in general, for example, =
through a web</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; page.&nbsp; The &quot;card&quot; parameter provides a =
business card, for example, in</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; vCard [36] or LDIF [37] formats.&nbsp; Additional tokens =
can be registered</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; using IANA and the procedures in Section =
27.</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Use of the Call-Info header field can pose a security =
risk.&nbsp; If a</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; callee fetches the URIs provided by a malicious caller, =
the callee</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; may be at risk for displaying inappropriate or offensive =
content,</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; dangerous or illegal content, and so on.&nbsp; =
Therefore, it is</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; RECOMMENDED that a UA only render the information in the =
Call-Info</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; header field if it can verify the authenticity of the =
element that</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; originated the header field and trusts that =
element.&nbsp; This need not</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; be the peer UA; a proxy can insert this header field =
into requests.</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Example:</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp; Call-Info: &lt;<a =
href=3D"http://wwww.example.com/alice/photo.jpg"><span =
style=3D'color:purple'>http://wwww.example.com/alice/photo.jpg</span></a>=
&gt; ;purpose=3Dicon,</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;&nbsp;&nbsp;&nbsp; &lt;<a =
href=3D"http://www.example.com/alice/"><span =
style=3D'color:purple'>http://www.example.com/alice/</span></a>&gt; =
;purpose=3Dinfo</span><o:p></o:p></p></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Brian =
Rosen [<a href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:purple'>mailto:br@brianrosen.net</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Wednesday, November 06, 2013 =
3:41 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Richard =
Shockey<br><b>Cc:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Fernando Mousinho (fmousinh); =
Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>List<br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><p class=3DMsoNormal>&nbsp;<o:p></o:p></p></div><div><p =
class=3DMsoNormal>We&#8217;ve considered adding some information that is =
not number and is not name, but is something like &#8220;bank&#8221;, =
which might have some sort of validation behind =
it.<o:p></o:p></p></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Is that along the lines you were =
thinking?<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>&nbsp;<o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal>Brian<o:p></o:p></p></div><div><div><div><p =
class=3DMsoNormal>On Nov 6, 2013, at 5:25 AM, Richard Shockey &lt;<a =
href=3D"mailto:richard@shockey.us"><span =
style=3D'color:purple'>richard@shockey.us</span></a>&gt; =
wrote:<o:p></o:p></p></div></div><div><p =
class=3DMsoNormal><br><br><br><br><o:p></o:p></p></div><blockquote =
style=3D'margin-top:5.0pt;margin-bottom:5.0pt'><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>I agree with Pierce here and respectfully disagree that STIR might =
eliminate the need for other forms of caller identification.&nbsp; =
Though your use case of credit card validation is a useful one and you =
are right there are still applications that use SS7 for things that have =
nothing to do with call setup. I agree with you STIR may have more =
applications beyond the obvious ones of realtime session =
validation.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>It&#8217;s been my experience recently that there is a use case for =
something MORE in the identification of the session as it is presented =
to the called party. This is the CNAM + idea we are kicking around on =
the CNIT list.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>_______________________________________________</span><o:p></o:p></p><=
/div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>cnit mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"mailto:cnit@ietf.org"><span =
style=3D'color:#954F72'>cnit@ietf.org</span></a></span><o:p></o:p></p></d=
iv></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'><a href=3D"https://www.ietf.org/mailman/listinfo/cnit"><span =
style=3D'color:#954F72'>https://www.ietf.org/mailman/listinfo/cnit</span>=
</a></span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>But your use case of a bank wanting to make sure they could properly =
identify themselves to the consumer before establishing a conversation =
is exactly what this process is about.&nbsp; STIR is essential but =
it&#8217;s a multi-faceted problem that may require multi-faceted =
solutions.. and enhanced CNAM + being only one of them.&nbsp;&nbsp; Its =
not unreasonable to discuss =
those.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>The obviously analogy is I would want to see some real identification =
of a utility worker before I let them into my house to make repairs. =
&nbsp;I would want some validation that the call to me to reconfirm the =
appointments was in fact from the utility in =
question.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif";color:#1F497=
D'>&nbsp;</span><o:p></o:p></p></div></div><div><div =
style=3D'border:none;border-top:solid #E1E1E1 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:</span=
></b><span class=3Dapple-converted-space><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n></span><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:purple'>mailto:stir-bounces@ietf.org</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><b>On Behalf Of<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho =
(fmousinh)<br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Tuesday, November 05, 2013 =
6:26 PM<br><b>To:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Gorman, Pierce A [NTK];<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Let me =
rephrase it&#8230; it may eliminate the need for other forms of caller =
identification beyond what STIR will provide, depending on the specific =
use case. For example, a credit card company may choose to rely entirely =
on STIR before allowing a card to be unblocked by an IVR (and as I said =
earlier, many companies do it today). In other use cases, the TN alone =
is not sufficient information &#8211; my health care provider will want =
to know which member of the family is =
calling.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I agree =
that ANI is already broadly used to improve customer service today. =
However, it is not usually deemed as a secure enough mechanism to =
validate the caller (therefore this WG!), except if you are a large =
organization that can leverage things like SS7. STIR would make this =
type of validation available to a broader number of =
companies.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Going on a =
tangent&#8230; perhaps this is out of scope, but there is not a lot of =
discussion about called party hijacking. Couldn&#8217;t a =
man-in-the-middle try to answer calls on my behalf? If my bank is =
calling me, I want to make sure it&#8217;s really them before carrying a =
conversation, but wouldn&#8217;t they want the =
same?&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&lt;Gorman&=
gt;, &quot;Pierce A [NTK]&quot; &lt;<a =
href=3D"mailto:Pierce.Gorman@sprint.com"><span =
style=3D'color:#954F72'>Pierce.Gorman@sprint.com</span></a>&gt;<br><b>Dat=
e:<span class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, November =
5, 2013 at 6:05 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Fernando Mousinho &lt;<a =
href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>fmousinh@cisco.com</span></a>&gt;, &quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;<br><b>Subject:<span =
class=3Dapple-converted-space>&nbsp;</span></b>RE: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>I agree with your characterization of businesses as victim of caller ID =
fraud however contact centers also use TN as a key to improve =
information available to call agents to reduce average time-per-call and =
increase capacity of the call center.&nbsp; So I don&#8217;t agree that =
STIR would &#8220;eliminate the need for caller identification from =
known TNs.&#8221;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>But perhaps I misunderstood your last =
sentence?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Arial","sans-serif";color:#0000CC'=
>&nbsp;</span><o:p></o:p></p></div></div><div><div =
style=3D'border:none;border-top:solid #B5C4DF 1.0pt;padding:3.0pt 0in =
0in 0in'><div><p class=3DMsoNormal><b><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>From:</span>=
</b><span class=3Dapple-converted-space><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>&nbsp;</span=
></span><span =
style=3D'font-size:10.0pt;font-family:"Tahoma","sans-serif"'>Fernando =
Mousinho (fmousinh) [<a href=3D"mailto:fmousinh@cisco.com"><span =
style=3D'color:#954F72'>mailto:fmousinh@cisco.com</span></a>]<span =
class=3Dapple-converted-space>&nbsp;</span><br><b>Sent:</b><span =
class=3Dapple-converted-space>&nbsp;</span>November 05, 2013 4:34 =
PM<br><b>To:</b><span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a><br><b>Subject:</b><span =
class=3Dapple-converted-space>&nbsp;</span>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>I would =
suggest we add a new attack type to section 3. More and more companies =
are using the caller ID for account validation. For example, if I call =
my credit card provider from my office number, they ask me for =
identification. If I call from my home phone number, I&#8217;m informed =
that I don&#8217;t need to provide any further identification because my =
number is on file. Some (all?) companies that implement this type of =
validation rely on SS7 =
today.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Ultimately,=
 this is yet another variation of impersonation &#8211; but in this =
case, the &#8220;victim&#8221; is a business, unlike the other two =
scenarios we&#8217;ve listed so =
far.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>Addressing =
this scenario would actually turn STIR into a feature, given it would =
enable contact centers of all sizes to eliminate the need for caller =
identification from known =
TNs.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div style=3D'border:none;border-top:solid =
#B5C4DF 1.0pt;padding:3.0pt 0in 0in 0in'><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>From:<span =
class=3Dapple-converted-space>&nbsp;</span></span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex =
Bobotek &lt;<a href=3D"mailto:alex@bobotek.net"><span =
style=3D'color:#954F72'>alex@bobotek.net</span></a>&gt;<br><b>Date:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Tuesday, October 1, 2013 =
at 12:51 PM<br><b>To:<span =
class=3Dapple-converted-space>&nbsp;</span></b>Brian Rosen &lt;<a =
href=3D"mailto:br@brianrosen.net"><span =
style=3D'color:#954F72'>br@brianrosen.net</span></a>&gt;, =
&quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:#954F72'>jon.peterson@neustar.biz</span></a>&gt;<br><b>Cc:=
<span class=3Dapple-converted-space>&nbsp;</span></b>&quot;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&quot; &lt;<a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>&gt;, Richard Shockey =
&lt;<a href=3D"mailto:richard@shockey.us"><span =
style=3D'color:#954F72'>richard@shockey.us</span></a>&gt;, &quot;'DOLLY, =
MARTIN C'&quot; &lt;<a href=3D"mailto:md3135@att.com"><span =
style=3D'color:#954F72'>md3135@att.com</span></a>&gt;, 'Robert Sparks' =
&lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:#954F72'>rjsparks@nostrum.com</span></a>&gt;<br><b>Subject=
:<span class=3Dapple-converted-space>&nbsp;</span></b>Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Jon,</span>=
<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Thanks for =
the response.&nbsp; The intention in #1 below is to clarify the =
following sentence:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>The<span =
class=3Dapple-converted-space>&nbsp;</span><b>primary</b><span =
class=3Dapple-converted-space>&nbsp;</span>attack vector =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; therefore one where the attacker contrives for the calling =
telephone</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number in signaling to be a particular chosen number, one that =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; attacker does not have the authority to call from,<span =
class=3Dapple-converted-space>&nbsp;</span><b>in order for =
that</b></span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;&nbsp=
; number to be rendered on the terminating side</span></b><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>.&nbsp;</sp=
an><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>This might =
be misconstrued as indicating that the objective of spoofing is simply =
the rendering of a spoofed number on the receiving display, causing =
mistaken conclusions that defenses might be limited to securing the =
rendered information. &nbsp;No issues with leaving this as it&#8217;s a =
valid point.&nbsp; Another (increasing) motivation is to evade network =
and/or endpoint defenses that may block based on =
CPN.&nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>So however =
it&#8217;s worded, I think it&#8217;s important to allow for both attack =
objectives of a spoofed presentation at the endpoint and in =
transit.&nbsp; &nbsp;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Regards,</s=
pan><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>Alex</span>=
<o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
-----Original Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>stir-bounces@ietf.org</span></a><span =
class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:#954F72'>mailto:stir-bounces@ietf.org</span></a>] On =
Behalf Of</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Brian =
Rosen</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Sent: =
Tuesday, October 01, 2013 9:29 =
AM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; To: =
Peterson, Jon</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:#954F72'>stir@ietf.org</span></a>; Alex Bobotek; 'Robert =
Sparks'; 'DOLLY, MARTIN C'; =
Richard</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Shockey</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; Don't =
think there is much MESSAGE.&nbsp; MSRP is about all we see, and XMPP =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; more =
likely than that.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
Brian</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; On =
Oct 1, 2013, at 12:24 PM, &quot;Peterson, Jon&quot; &lt;<a =
href=3D"mailto:jon.peterson@neustar.biz"><span =
style=3D'color:windowtext;text-decoration:none'>jon.peterson@neustar.biz<=
/span></a>&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Thanks for these notes, Alex. Some responses =
below.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here are several comments that should feed into the IETF =
Peterson draft:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Remove any assumptions that the solution cannot =
be in-network</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
[IMO,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; both endpoint and in-network solutions should be =
facilitated]</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Agreed that both in-band and out-of-band solutions can usually =
be</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
implemented in either endpoints or in intermediaries of various =
kinds.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
If I see text that implies otherwise, I'll certainly change =
it.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; *&nbsp;&nbsp; Add a sessionless attack scenario.&nbsp; A spam =
payload may be carried in</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
a</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; SIP INVITE or MESSAGE, which might contain stock market advice =
even</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; in a display name field.&nbsp; These attacks do NOT require =
session</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
establishment.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; More generally, we should be mindful of the fact that SIP is =
used in</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; telephony form more than voice session =
setup.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Probably if we were going to include a sessionless attack scenario, =
it</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
would be with regular text messages (whether carried on the PSTN =
over</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
TCAP or with some Internet protocol, including MESSAGE) rather =
than</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
with an INVITE, which typically wouldn't result in a payload =
being</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
immediately rendered to a user. More on this below with your =
suggested</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
text.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Here's some suggested =
markup:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 1.&nbsp;&nbsp;&nbsp; Replace 2nd sentence of 2nd paragraph of =
1.0 Introduction with:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; The primary attack vector =
is</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; therefore one where the attacker contrives for the =
calling telephone</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; number in signaling to be a particular chosen number that =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; attacker does not have the authority to call =
from.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
What you want here is to remove the implication that the number =
will</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
be rendered on the terminating side? While there are some =
attacks</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
where that isn't significant, perhaps, I would say it is =
significant</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
in the primary attack vectors that concern =
us.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 2.&nbsp; Replace 3rd paragraph of 2.1 Endpoints =
with:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp;&nbsp;&nbsp;&nbsp; Smart devices are generally based on =
computers with some degree</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; of programmability, the capacity to access the Internet, =
and</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; capabilities of rendering text, audio and/or images.&nbsp; This =
includes</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; smart phones, telephone applications on desktop and laptop =
computers,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; IP private branch exchanges, and so =
on.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
I can add the notion that smart devices can render text, audio =
and/or</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
images as you suggest.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; 3.&nbsp; Add to 3.3 Attack =
Scenarios:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Impersonation, IP-Mobile Text =
Message</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp; &nbsp;An attacker with an =
computer sends a high volume of SIP =
MESSAGE</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; spam message to IP-enabled smart phones using randomized =
calling</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; party numbers.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&nbsp; &nbsp;&nbsp;&nbsp;&nbsp; Countermeasure: in-band =
authenticated identity</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Provided we're talking about end-to-end SIP use of MESSAGE, =
agreed</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
that in-band would be the right countermeasure. I am curious =
though</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
whether practically speaking there is enough use of MESSAGE in =
this</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
fashion that we're actually seeing high-volume spam over =
MESSAGE</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
today. Either way, no problem having an attack scenario of this form in =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
document.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Jon Peterson</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
Neustar, Inc.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Regards,</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; Alex</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of Richard =
Shockey</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 1:11 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: 'DOLLY, MARTIN C'; 'Robert =
Sparks'</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; +1</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; From:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On Behalf</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Of DOLLY, MARTIN =
C</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Sent: Monday, September 30, 2013 12:58 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; To: Robert =
Sparks</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Cc:<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Yes, ok</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Martin Dolly</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Lead Member of Technical =
Staff</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Core Network &amp; Gov't/Regulatory Standards AT&amp;T Labs =
- Network</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; Technology</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
+1-609-903-3360</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:md3135@att.com"><span =
style=3D'color:windowtext;text-decoration:none'>md3135@att.com</span></a>=
</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; On Sep 30, 2013, at 12:47 PM, &quot;Robert =
Sparks&quot;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; &lt;<a href=3D"mailto:rjsparks@nostrum.com"><span =
style=3D'color:windowtext;text-decoration:none'>rjsparks@nostrum.com</spa=
n></a>&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; On 9/26/13 3:42 PM, DOLLY, MARTIN C =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; With Hadriel comments incorporated, it is a =
start</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Hi Martin =
-</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; Just to make sure - I think you're referring to =
Hadriel's comments</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; on the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; problem statement =
document?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; I don't think Hadriel's commented directly on =
stir-threats yet.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; In any case, we _are_ talking about a starting place, =
not a</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; finished</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; product.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; If there's no other objection, I'd like to get Jon to =
submit the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; threats</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document as a WG -00 as soon as it's =
convenient.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; RjS</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; -----Original =
Message-----</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; From:<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir-bounces@ietf.org</sp=
an></a><span class=3Dapple-converted-space>&nbsp;</span>[<a =
href=3D"mailto:stir-bounces@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>mailto:stir-bounces@ietf.=
org</span></a>] On</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Behalf Of Russ =
Housley</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Sent: Thursday, September 26, 2013 4:37 =
PM</span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; To: IETF STIR Mail =
List</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Subject: Re: [stir] =
draft-peterson-stir-threats-00.txt</span><o:p></o:p></p></div></div><div>=
<div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; It has been six days, I'd like to hear from more =
people about this</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; document.&nbsp; Martin asked for an additional week, so I'm =
sure we will</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; hear from him =
soon.</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; Russ</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; On Sep 20, 2013, at 5:23 PM, Russ Housley =
wrote:</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"http://www.ietf.org/id/draft-peterson-stir-threats-00.txt"><span =
style=3D'color:windowtext;text-decoration:none'>http://www.ietf.org/id/dr=
aft-peterson-stir-threats-00.txt</span></a></span><o:p></o:p></p></div></=
div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; Should the working group adopt this I-D as the =
starting point for</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; =
the</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; STIR threat =
docuent?</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;&gt; =
Russ</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt; stir mailing =
list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt; stir mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; &gt; =
stir mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
&gt;<span class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div><div><div><=
p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;&nbsp;<=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; =
_______________________________________________</span><o:p></o:p></p></di=
v></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt; stir =
mailing list</span><o:p></o:p></p></div></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:windowtext;text-decoration:none'>stir@ietf.org</span></a><=
/span><o:p></o:p></p></div></div><div><div><p class=3DMsoNormal><span =
style=3D'font-size:11.0pt;font-family:"Calibri","sans-serif"'>&gt;<span =
class=3Dapple-converted-space>&nbsp;</span><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:windowtext;text-decoration:none'>https://www.ietf.org/mail=
man/listinfo/stir</span></a></span><o:p></o:p></p></div></div></div></div=
><div><div><p class=3DMsoNormal><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'>&nbsp;</spa=
n><o:p></o:p></p></div></div><div class=3DMsoNormal align=3Dcenter =
style=3D'text-align:center'><span =
style=3D'font-size:10.5pt;font-family:"Calibri","sans-serif"'><hr =
size=3D3 width=3D"100%" align=3Dcenter></span></div><div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:7.5pt;font-family:"Arial","sans-serif";color:gray'><br=
>This e-mail may contain Sprint proprietary information intended for the =
sole use of the recipient(s). Any use by others is prohibited. If you =
are not the intended recipient, please contact the sender and delete all =
copies of the message.</span><o:p></o:p></p></div></div></div><div><p =
class=3DMsoNormal><span =
style=3D'font-size:9.0pt;font-family:"Helvetica","sans-serif"'>__________=
_____________________________________<br>stir mailing list<br><a =
href=3D"mailto:stir@ietf.org"><span =
style=3D'color:purple'>stir@ietf.org</span></a><br><a =
href=3D"https://www.ietf.org/mailman/listinfo/stir"><span =
style=3D'color:purple'>https://www.ietf.org/mailman/listinfo/stir</span><=
/a></span><o:p></o:p></p></div></blockquote></div></div></blockquote></di=
v></div></blockquote></div><p =
class=3DMsoNormal><o:p>&nbsp;</o:p></p></div></div></div></body></html>
------=_NextPart_000_0384_01CEDBE7.C56B8790--


From kent@bbn.com  Fri Nov  8 10:08:03 2013
Return-Path: <kent@bbn.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 754BB11E81CF for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:08:00 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.547
X-Spam-Level: 
X-Spam-Status: No, score=-106.547 tagged_above=-999 required=5 tests=[AWL=0.052, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tjFrjIGZfCve for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:07:52 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.0.80]) by ietfa.amsl.com (Postfix) with ESMTP id E164111E818D for <cnit@ietf.org>; Fri,  8 Nov 2013 10:07:50 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:50656 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VeqTF-0006Yw-Ax; Fri, 08 Nov 2013 13:07:49 -0500
Message-ID: <527D2876.8080501@bbn.com>
Date: Fri, 08 Nov 2013 13:07:50 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com> <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net> <527BDF4A.8050008@bbn.com> <FDA96CAA-5F4D-402D-B683-51671859D1D5@brianrosen.net>
In-Reply-To: <FDA96CAA-5F4D-402D-B683-51671859D1D5@brianrosen.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 7bit
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Nov 2013 18:08:04 -0000

Brian,

yes, what you described is doable. Will NASW do it, or will it hire some 
third party
to do it, just as they work with an insurance company to offer policies 
to its members?
I but the latter. In which case that third party will probably offer 
analogous services
for a number of other organizations. There will be competing third 
parties that
decide this is a good business, and thus offer the same services. Price 
(rather than
security) will become a major factor in determining which third parties 
win the contracts.
Since outsourcing will lower costs, eventually, this will be done by 
some folks in
Elbonia.

What could possibly go wrong ;-) ?

Steve

From kent@bbn.com  Fri Nov  8 10:12:28 2013
Return-Path: <kent@bbn.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E92BD21E81DE for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:12:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.549
X-Spam-Level: 
X-Spam-Status: No, score=-106.549 tagged_above=-999 required=5 tests=[AWL=0.050, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id EQFWfcB7gJ6h for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:12:22 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id CCCA321E81E4 for <cnit@ietf.org>; Fri,  8 Nov 2013 10:12:21 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:41449 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VeqXa-0002dw-8u; Fri, 08 Nov 2013 13:12:18 -0500
Message-ID: <527D2982.3090606@bbn.com>
Date: Fri, 08 Nov 2013 13:12:18 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: Henning Schulzrinne <Henning.Schulzrinne@fcc.gov>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com>	<E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov>	<527BCB5F.1080001@bbn.com>	<2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net> <527BDF4A.8050008@bbn.com> <E6A16181E5FD2F46B962315BB05962D01FC23C3D@fcc.gov>
In-Reply-To: <E6A16181E5FD2F46B962315BB05962D01FC23C3D@fcc.gov>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
Cc: "cnit@ietf.org" <cnit@ietf.org>
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Nov 2013 18:12:28 -0000

So the threat model is that bad guys will engage in fraud, but we 
believe that law enforcement
will respond quickly enough, and impose sufficient penalties, so that 
the bad guys will not
stay one jump ahead, and thus will be deterred.

I can't argue that your model will prove to be wrong. It's a future 
scenario and the
outcome is uncertain. I just want to understand what model folks have in 
mind when
they propose solutions.

Steve


From br@brianrosen.net  Fri Nov  8 10:19:05 2013
Return-Path: <br@brianrosen.net>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E8F2421E81CD for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:19:05 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -103.5
X-Spam-Level: 
X-Spam-Status: No, score=-103.5 tagged_above=-999 required=5 tests=[AWL=0.099,  BAYES_00=-2.599, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id i--ldYymn3bq for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:19:00 -0800 (PST)
Received: from mail-qe0-f47.google.com (mail-qe0-f47.google.com [209.85.128.47]) by ietfa.amsl.com (Postfix) with ESMTP id 318F121E81D5 for <cnit@ietf.org>; Fri,  8 Nov 2013 10:18:38 -0800 (PST)
Received: by mail-qe0-f47.google.com with SMTP id b4so2250149qen.6 for <cnit@ietf.org>; Fri, 08 Nov 2013 10:18:37 -0800 (PST)
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20130820; h=x-gm-message-state:content-type:mime-version:subject:from :in-reply-to:date:cc:content-transfer-encoding:message-id:references :to; bh=A5QlQ/a54j9DYLGmWAdVbc6/H56mcrlCcS9uu2EQa/A=; b=ZrhvR5HHXAXsPx4TNFB0O+wy1rhTGH/fiv9lx+bd4C/Zwa0kZZAk4PV+on4BwEoM3b XAg1vCLzH1aF3lwFlNfWwmEM2zC8V7IqHp5aKKYE2ZHg0FRZwa8DO/TLAevCj7mIHOvU +P+G5AybwEBSUdnqy0ArKfwDRgXmZABHXZkkZ4N6rHydcSu6HMaz0Zgu1Gl77OPQMhjq wNsiHZzrcz4hlUHuDx6xScw4wVaQ/K9LdfE+xLTJQgS3lNWoGSa1Fxl32bQeNleK5jlN n6WO33BLuEgA7IGGfExZoOLpwo9uew3Vmr23z1JlMpiB363B0PbtHlYMP5lZ7OyFjwmN /hDg==
X-Gm-Message-State: ALoCoQnZxQvhhz3Wc06LvFNESWRx4Qoa073FN58Ttn67o33oxDLYR7sLPD9bRrh0GYsMkIbr7rxU
X-Received: by 10.224.45.197 with SMTP id g5mr26698388qaf.2.1383934717638; Fri, 08 Nov 2013 10:18:37 -0800 (PST)
Received: from [192.168.128.255] (neustargw.va.neustar.com. [209.173.53.233]) by mx.google.com with ESMTPSA id n7sm24826476qai.1.2013.11.08.10.18.36 for <multiple recipients> (version=TLSv1 cipher=ECDHE-RSA-RC4-SHA bits=128/128); Fri, 08 Nov 2013 10:18:37 -0800 (PST)
Content-Type: text/plain; charset=windows-1252
Mime-Version: 1.0 (Mac OS X Mail 7.0 \(1822\))
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <527D2876.8080501@bbn.com>
Date: Fri, 8 Nov 2013 10:18:33 -0800
Content-Transfer-Encoding: quoted-printable
Message-Id: <2FCDE887-FF74-4DDA-9025-C597DB166BAF@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com> <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net> <527BDF4A.8050008@bbn.com> <FDA96CAA-5F4D-402D-B683-51671859D1D5@brianrosen.net> <527D2876.8080501@bbn.com>
To: Stephen Kent <kent@bbn.com>
X-Mailer: Apple Mail (2.1822)
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Nov 2013 18:19:06 -0000

I=92m going to take this response as =93good idea, let=92s do it=94
If I take it as face value, then no situation involving a contractor =
with clue could ever work on any security problem.

I suggested in another message that maybe a piece of FOSS would be =
helpful for this.

Brian

On Nov 8, 2013, at 10:07 AM, Stephen Kent <kent@bbn.com> wrote:

> Brian,
>=20
> yes, what you described is doable. Will NASW do it, or will it hire =
some third party
> to do it, just as they work with an insurance company to offer =
policies to its members?
> I but the latter. In which case that third party will probably offer =
analogous services
> for a number of other organizations. There will be competing third =
parties that
> decide this is a good business, and thus offer the same services. =
Price (rather than
> security) will become a major factor in determining which third =
parties win the contracts.
> Since outsourcing will lower costs, eventually, this will be done by =
some folks in
> Elbonia.
>=20
> What could possibly go wrong ;-) ?
>=20
> Steve


From kent@bbn.com  Fri Nov  8 10:38:22 2013
Return-Path: <kent@bbn.com>
X-Original-To: cnit@ietfa.amsl.com
Delivered-To: cnit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 28E7621E811B for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:38:22 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.551
X-Spam-Level: 
X-Spam-Status: No, score=-106.551 tagged_above=-999 required=5 tests=[AWL=0.048, BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id GL8hfVqfczqZ for <cnit@ietfa.amsl.com>; Fri,  8 Nov 2013 10:38:09 -0800 (PST)
Received: from smtp.bbn.com (smtp.bbn.com [128.33.1.81]) by ietfa.amsl.com (Postfix) with ESMTP id 3A94A21E8099 for <cnit@ietf.org>; Fri,  8 Nov 2013 10:38:09 -0800 (PST)
Received: from dommiel.bbn.com ([192.1.122.15]:36652 helo=fritz.local) by smtp.bbn.com with esmtp (Exim 4.77 (FreeBSD)) (envelope-from <kent@bbn.com>) id 1VeqwZ-0002xv-OG; Fri, 08 Nov 2013 13:38:07 -0500
Message-ID: <527D2F90.10805@bbn.com>
Date: Fri, 08 Nov 2013 13:38:08 -0500
From: Stephen Kent <kent@bbn.com>
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.7; rv:24.0) Gecko/20100101 Thunderbird/24.1.0
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
References: <B4C06A5710F0ED4583B3CF5E9C6B21D855159DAC@PDAWM10A.ad.sprint.com>	<CE9EE40A.2DA2E%fmousinh@cisco.com>	<013601cedaf3$a05d72f0$e11858d0$@shockey.us>	<0FDE6309-92B1-4031-AF72-2EDC11A5FE9E@brianrosen.net>	<02e301cedb34$af790790$0e6b16b0$@shockey.us>	<8285AA4C-2E08-46F7-B3A3-892FF793486E@brianrosen.net>	<B4C06A5710F0ED4583B3CF5E9C6B21D85515B88F@PDAWM10A.ad.sprint.com> <E6A16181E5FD2F46B962315BB05962D01FC237B6@fcc.gov> <527BCB5F.1080001@bbn.com> <2E8BE11E-4010-4BFE-9FD1-3ABE04E2265B@brianrosen.net> <527BDF4A.8050008@bbn.com> <FDA96CAA-5F4D-402D-B683-51671859D1D5@brianrosen.net> <527D2876.8080501@bbn.com> <2FCDE887-FF74-4DDA-9025-C597DB166BAF@brianrosen.net>
In-Reply-To: <2FCDE887-FF74-4DDA-9025-C597DB166BAF@brianrosen.net>
Content-Type: text/plain; charset=windows-1252; format=flowed
Content-Transfer-Encoding: 8bit
Cc: cnit@ietf.org
Subject: Re: [cnit] [stir] draft-peterson-stir-threats-00.txt
X-BeenThere: cnit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Calling Name Identity Trust discussion list <cnit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/cnit>, <mailto:cnit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/cnit>
List-Post: <mailto:cnit@ietf.org>
List-Help: <mailto:cnit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/cnit>, <mailto:cnit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 08 Nov 2013 18:38:22 -0000

Brian,
> I’m going to take this response as “good idea, let’s do it”
Rather think of it as establishing an "I told you so" landmark :-).
> If I take it as face value, then no situation involving a contractor with clue could ever work on any security problem.
That is not a valid inference from my example. What I said is that when
authoritative entities outsource credential issuance and outsource
providers focus on maximizing revenue opportunities, quality is sacrificed.

Steve
