John,
On Jul 8, 2008, at 3:13 AM, Elwell, John wrote:
Thanks for writing this, which I believe is an important part of the
whole SIP Identity discussion going on at present.
You're welcome.
Even if (as is
likely) the IETF does not standardise such a visual indicator, the
IETF
should still give consideration to what sort of indicators are needed
and ensure that its protocols are able to supply sufficient
information
for a UA to be able to select the appropriate indicator.
Agreed.
The only other comment I have is that I didn't see anything about the
impact of PSTN interworking. So there would seem to be at least 3
elements that make up the security status of a call:
- the strength of authentication of the peer user or domain;
- the strength of encryption;
- whether the call is via PSTN.
So as I read this comment, there are really two separate issues I see
here:
1. How do you symbolize the "trusted identity" of the PSTN Caller ID
transmitted by the PSTN-to-SIP gateway? Assuming we can come up with a
mechanism to arrive at end-to-end authenticated identity between two
SIP endpoints, we could get a "trusted identity" of the *PSTN
gateway*, but we have no way of really knowing whether the Caller ID
of the call was spoofed out on the PSTN before it reached the
gateway. We therefore can't really trust the "identity" of the caller
provided to us by the PSTN gateway - even if we can get an
authenticated *SIP* identity of the gateway itself. Perhaps this is
represented to the end user as any other "untrusted" call would be.
Perhaps some systems could display that this is an inbound call from
the PSTN?
2. Should the "visual identifier" be for more than just "trusted
identity"? In the draft, I specifically was focusing on the issue of
trusted identity and NOT on the issue of the call being encrypted.
But in your comments you mention the "security status" of a call which
is really something more. In the context of identity, there are
several possibilities for a call two SIP endpoints:
a. "Trusted identity" without signaling or media encryption.
b. Trusted identity with signaling encryption but without media
encryption.
c. Trusted identity with both signaling and media encryption.
And really there are another identical three possibilities for a call
between a SIP endpoint and PSTN gateway, for a total of at least six
possibilities. (Since you note you could also add in the *strength*
of the encryption.)
We are rapidly leaving simple-icon-that-nontechnical-people-can-
understand land.
And probably getting into nuances (like encryption strength) that may
be of interest to the more paranoid of us (like me) but not at all to
the vast majority of people using the actual systems.
My guess is that probably the average user *might* care about:
1. When I dial this number, am I really talking to my bank? (Or when
they called me, is it really them?)
2. Can I give them my credit card number without fear of some hacker
in ______ getting that number?
Ideally, they'd get both in one icon or identifier.... but I'm not
sure that's always possible. There may be times when I want to be
sure it really is Hadriel Kaplan calling me but I don't really care
whether what we talk about is encrypted. But for many SIP endpoints
is it desirable - or even possible - to have multiple icons?
It's an interesting problem.
Dan
--
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO Voxeo Corporation [EMAIL PROTECTED]
Phone: +1-407-455-5859 Skype: danyork http://www.voxeo.com
Blogs: http://blogs.voxeo.com http://www.disruptivetelephony.com
Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip