Agreed

On Sun, 22 Oct 2023 at 23:22, Oleg Belousov via sr-users <
sr-users@lists.kamailio.org> wrote:

> Hi, Ben.
> Inline is how we implemented mentioned points in our project, If that will
> be helpful.
> Not sure if SS helps much to prevent spoofed calls, but there could be
> other bonuses like rcd/branded calling which sounds like a promising cnam
> extension.
> --
> obelousov.tel
>
>
> On Fri, 20 Oct 2023 at 16:25, Ben Kaufman via sr-users <
> sr-users@lists.kamailio.org> wrote:
>
>> My point was simply that there's more challenge in the bureaucracy than
>> technical implementation.
>>
>> From a technical standpoint, the corner cases to consider are:
>>
>> 1. Number validity. Sure things that fit into an e.164 and/or
>> recognizable number patterns are simple.  What happens when someone sends a
>> From: URI of `sip:anonym...@domain.com` - IIRC, the orig_tn field within
>> the identity header is supposed to be numeric.  Do you reject the call?
>> Attest it as "C" and provide this in the `orig_tn` field or in a separate
>> field?
>>
> [Oleg] We are using P-Asserted-Identity instead of From, it keeps the
> number even if CLIR is enabled. As per ATIS-1000074
> The ‘orig’ claim ‘tn’ value shall be derived using the following rules:
> - The P-Asserted-Identity header field value shall be used as the
> telephone identity, if present, otherwise the From header field value shall
> be used.
> - If there are two P-Asserted-Identity header field values, the
> authentication service shall have logic to choose the most appropriate one
> based on local service provider policy.
> - The action taken when neither the P-Asserted-Identity header field value
> nor the From header contain tel URI identities is outside the scope of the
> SHAKEN framework.
>
>>
>> 2. Handling of forwarded calls - If you're sending a Diversion: header,
>> do you also add an Identity header with a `div` passport?  Rewrite the From
>> header?  How do you determine the attestation in that case?
>>
>  [Oleg] For the forwarded calls (with enabled diversion) we are checking
> if Identity is present. If yes - send call as it is, otherwise assign
> attestation C,
>
>>
>> 3. Known customers sending numbers for which you're not the provider?
>> Strictly speaking this should attest as "B", but supposing that you're a
>> secondary vendor for the customer, and they're sending their primary number
>> which is with a different provider?  Do you then allow them to submit an
>> LOA (or whatever your jurisdictional equivalent is) and attest as A?
>>
>  [Oleg] If A-number does nor belong to operator - we assign attestation B
>
>>
>> The questions above are strictly for STI Authentication.  Verification
>> has some other idiosyncrasies.   Consider that there's three attestation
>> levels for authentication, and normally as a carrier it is not desirable to
>> pass the Identity header to the customer (consider if Privacy: is on).  The
>> general practice is to assign this to a verstat parameter to the user
>> portion of a PAI header's **USER** field, which is syntactically awkward in
>> Kamailio.  Also strictly speaking AFAIK, the verstat only has two values -
>> passed or failed - so there's three possible attestation levels but they
>> only map to two verification levels.  Therea are suggestions on how to deal
>> with this, but I'm not sure on their official status.
>>
>> This brings up the final complexity:  It's a rapidly evolving system
>> without a high degree of consistency vendor to vendor, so there's as much
>> of a challenge of staying on top of things as anything else.
>>
>> -----Original Message-----
>> From: Olle E. Johansson via sr-users <sr-users@lists.kamailio.org>
>> Sent: Friday, October 20, 2023 2:08 AM
>> To: Kamailio (SER) - Users Mailing List <sr-users@lists.kamailio.org>
>> Cc: Olle E. Johansson <o...@edvina.net>
>> Subject: [SR-Users] Re: STIR/SHAKEN with Kamailio
>>
>> CAUTION: This email originated from outside the organization. Do not
>> click links or open attachments unless you recognize the sender and know
>> the content is safe.
>>
>>
>> > On 19 Oct 2023, at 18:46, Alex Balashov via sr-users <
>> sr-users@lists.kamailio.org> wrote:
>> >
>> > Would join Kaufman here to say that free-range STIR/SHAKEN
>> > implementations in the US are limited by the small number of certified
>> > authentication providers, but presumably the EU version will to some
>> > extent avoid US-style Guilded Age corporate welfare...
>> Sadly that's my view of the US implementation. I can't say if it solved
>> the problem, but I can see that a lot of new and old actors got an
>> oppurtunity to earn more money.
>>
>> There's no EU-wide implementation or regulation at this point. I am aware
>> of France. There are certainly discussions.
>> /O
>> >
>> > -- Alex
>> >
>> >> On 19 Oct 2023, at 09:33, Ben Kaufman via sr-users <
>> sr-users@lists.kamailio.org> wrote:
>> >>
>> >> Like some of the other posters here, we've implemented it as a
>> 302-redirect server. This was the primary reason for using the secsipid
>> rather than stirshaken module.  Both modules have a function to append an
>> Identity header, but secsipid also has functions to simply build the
>> identity header which can then easily be appended to the reply, rather than
>> only appending to the request and plucking the Identity header from there.
>> Secsipid also has a function secsipid_sign() which allows for creating your
>> own JWT.  This is useful if you want to create some variations on the
>> Identity header - we use this to create div passports (as opposed to shaken
>> passports) in some situations.
>> >>
>> >> Not sure how it will be implemented there, but the biggest challenge
>> for me in the US was acquiring certificates because there is a very limited
>> number of regulatory approved vendors.
>> >
>> > --
>> > Alex Balashov
>> > Principal Consultant
>> > Evariste Systems LLC
>> > Web:
>> > https://nam11.safelinks.protection.outlook.com/?url=https%3A%2F%2Fevar
>> > istesys.com%2F&data=05%7C01%7Cbkaufman%40bcmone.com%7C31a9da72c1db4b26
>> > 7ff308dbd13cd073%7Cafc1818e7b6848568913201b9396c4fc%7C1%7C0%7C63833383
>> > 1362925788%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzI
>> > iLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000%7C%7C%7C&sdata=w9TCfesrCll46onz
>> > GqiIndpnonmKJpi06JrS1s3FJK4%3D&reserved=0
>> > Tel: +1-706-510-6800
>> >
>> > __________________________________________________________
>> > Kamailio - Users Mailing List - Non Commercial Discussions To
>> > unsubscribe send an email to sr-users-le...@lists.kamailio.org
>> > Important: keep the mailing list in the recipients, do not reply only
>> to the sender!
>> > Edit mailing list options or unsubscribe:
>>
>> __________________________________________________________
>> Kamailio - Users Mailing List - Non Commercial Discussions To unsubscribe
>> send an email to sr-users-le...@lists.kamailio.org
>> Important: keep the mailing list in the recipients, do not reply only to
>> the sender!
>> Edit mailing list options or unsubscribe:
>> __________________________________________________________
>> Kamailio - Users Mailing List - Non Commercial Discussions
>> To unsubscribe send an email to sr-users-le...@lists.kamailio.org
>> Important: keep the mailing list in the recipients, do not reply only to
>> the sender!
>> Edit mailing list options or unsubscribe:
>>
> __________________________________________________________
> Kamailio - Users Mailing List - Non Commercial Discussions
> To unsubscribe send an email to sr-users-le...@lists.kamailio.org
> Important: keep the mailing list in the recipients, do not reply only to
> the sender!
> Edit mailing list options or unsubscribe:
>
__________________________________________________________
Kamailio - Users Mailing List - Non Commercial Discussions
To unsubscribe send an email to sr-users-le...@lists.kamailio.org
Important: keep the mailing list in the recipients, do not reply only to the 
sender!
Edit mailing list options or unsubscribe:

Reply via email to