TOC |
|
One of the main challenges in inter-domain federation of Session Initiation Protocol (SIP) calls is that many domains continue to utilize phone numbers, and not email-style SIP URI. Consequently, a mechanism is needed that enables secure mappings from phone numbers to domains. The main technical challenge in doing this securely is to verify that the domain in question truly is the "owner" of the phone number. This specification defines the PSTN Validation Protocol (PVP), which can be used by a domain to verify this ownership by means of a forward routability check in the PSTN.
This documents and the information contained therein are provided on an "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION THEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on May 13, 2010.
Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the BSD License.
1.
Introduction
2.
The Wrong Way
3.
EKE Protocols
4.
Protocol Overview
5.
Username and Password Algorithms
6.
Originating Node Procedures
6.1.
Establishing a Connection
6.2.
Constructing a Username and Password
6.2.1.
Method A
6.2.2.
Method B
6.3.
Requesting Validation
7.
Terminating Node Procedures
7.1.
Waiting for SRP-TLS
7.2.
Receiving Validation Requests
8.
Security Considerations
8.1.
Entropy
8.2.
Forward Routing Assumptions
9.
IANA Considerations
10.
References
10.1.
Normative References
10.2.
Informative References
§
Authors' Addresses
TOC |
The validation protocol is the key security mechanism in ViPR. It is used to couple together PSTN calls with IP destinations based on shared knowledge of a PSTN call. This document relies heavily on the concepts and terminology defined in [I‑D.rosenberg‑dispatch‑vipr‑overview] (Rosenberg, J. and C. Jennings, “Verification Involving PSTN Reachability: Requirements and Architecture Overview,” November 2009.) and will not make sense if you have not read that document first.
The protocol assumes that two enterprises, the originating one (enterprise O) initiates a call on the PSTN to an E.164 number ECALLED that terminates on the terminating enterprise (enterprise T). Each enterprise has a ViPR server, acting as a P2P node. The node in enterprise O is PO, and the node in enterprise T is PT. This PSTN call completes successfully, and knowledge of this call is known to PO and PT. Later on, PO will query the P2P network with number ECALLED. It comes back with a peerID PCAND for a node. At this time, PO can't know for sure that PCAND is in fact PT. All it knows is that some node, PCAND, wrote an entry into the DHT claiming that it was the owner of number ECALLED. The objective of the protocol is for PO to determine that node PCAND can legitimately claim ownership of number ECALLED, by demonstrating knowledge of the previous PSTN call. It demonstrates that knowledge by demonstrating it knows the start time, stop timer, and possibly caller ID for the PSTN call made previously.
/-----------\ /// \\\ || || | ViPR \ || DHT ||\ X\\ /// \ / \-----------/ \ ---------/- ----\------ /// \\\ /// \\\ // \\ // \\ | |///---\\\ | | | Enterprise O | PSTN | Enterprise T | | |\\\---/// | | \\ // \\ // \\\ /// \\\ /// -----+----- ------+---- +---+----+ +---+----+ | Phone O| |Phone T | +--------+ +--------+
Figure 102: Validation Model |
If node PCAND can demonstrate such knowledge, then enterprise O can assume that node PCAND had in fact received the call, which could only have happened if it had knowledge of the call to number ECALLED, which could only have happened if PCAND is in enterprise T, and thus it is PT. This is because PSTN routing is assumed to be "secure", in that, if someone calls some number through the PSTN, it will in fact reach a terminating line (whether it be analog, PRI, or other) which is the rightful "owner" of that number. If enterprise T was not the owner of the number, if would not have received the call, would not know its start/stop/callerID, not be able to provide that information to PT, and not be able to satisfy the knowledge proof. This basic approach is shown in Figure 102.
A first question commonly asked is, why not just do regular authentication? What if we give each node a certificate, and then have the nodes authenticate each other? The answer is that a certificate certifies that a particular node belongs to a domain - for example, that node PT is part of example.com. A certificate does not assert that, not only is PT example.com, but example.com owns the following phone numbers. Therefore simple certificate authentication does not provide any guarantee over ownership of phone numbers.
In principle, it might be possible to ask certificate authorities, such as Verisign, to assert just that. However, traditionally, certificate authorities have been extremely hesitant to certify much at all. The reason is, the certifier needs to be able to assure that the information is correct. How can a certifier like Verisign verify that, in fact, a particular enterprise owns phone numbers? It could make a few test calls, perhaps, to check if they look right. However, these test calls are disruptive to users that own the numbers (since their phones will ring!). If the test calls are done for a subset of the numbers, it is not secure. If the certifier simply required, as part of the business agreement, that the enterprises provided correct information, the certifier might avoid legal liability, but the legitimacy of the service will be compromised and customers will stop using it. Furthermore, it has proven incredibly hard to do this kind of certification worldwide with a single certificate authority.
ViPR has, as a goal, to work anywhere in the world and do guarantee correct call routing with five nines of reliability. Consequently, traditional certificates and authentication do not work. It turns out to be quite hard to design a secure version of this validation protocol. To demonstrate this, we will walk through some initial attempts at it, and show how they fail.
TOC |
The first attempt one might make is the following. PO takes the callerID for the call, ECALLING and called number ECALLED for the call, and sends them to candidate node PCAND. These two identifiers - the called number E and the caller ID, form a unique handle that can be used to identify the call in question. Node PCAND looks at all of the VCRs of the calls over the last 48 hours, and takes those with the given called party number and calling party number. If there is more than one match, the most recent one is used. We now have a unique call.
Now, node PCAND demonstrates knowledge of this call by handing back the start and stop times for this call in a message back to PO. This approach is shown in Figure 103.
Po Pt | | | | | | |Tell me start+stop |------------->| | | | | | |Retrieve records | | | | | | |start and stop| |<-------------| | | | | | | | |
Figure 103: Incorrect Validation Protocol: Take 1 |
Unfortunately, this method has a major problem, shown in Figure 104.
Po Pbad Pt DHT | | | | | | | | | | | | | |I own Ecalled | | | |---------------------------->| | | | | | | | | | | |I own Ecalled | | | |------------->| | | | | | | | | |Who owns Ecalled? | | |------------------------------------------->| | | | | | | | | |Pbad and Pt | | | |<-------------------------------------------| | | | | | | | | |Tell me start+stop | | |------------->| | | | | | | | | | | | |Tell me start+stop | | |------------->| | | | | | | | | | | | |Retrieve records | | | | | | | | | | | | | |start+stop | | | |<-------------| | | | | | | | | | |start+stop | | | |<-------------| | | | | | | | | | | | | | | | | | |
Figure 104: Attack for Incorrect Validation Protocol |
Consider an attacker BadGuy PBAD. PBAD joins the P2P network, and advertises a number prefix they do NOT own, but which is owned by enterprise T and node PT. Now, when PO queries the DHT with number ECALLED, it comes back with two results - the one from PBAD and the one from node PT. Details of querying the DHT are provided in [I‑D.rosenberg‑dispatch‑vipr‑reload‑usage] (Rosenberg, J. and C. Jennings, “A Usage of Resource Location and Discovery (RELOAD) for Public Switched Telephone Network (PSTN) Verification,” November 2009.). It begins validation procedures with both. PBAD will now be asked to show the start and stop times for the call, given ECALLED and ECALLING. It doesn't know that information. However, node PT does. So now, PBAD, acting as if it where the originating party, begins the validation protocol with node PT. It passes the calling and called numbers sent by PO. PT finds a match and returns the call start and stop times to PBAD. PBAD, in turn, relays them back to PO. They are correct, and as a consequence, PO has just validated PBAD!
Typically, the first response to this is, "Well the problem is, you let two separate people write the same number into the DHT. Why don't you make sure on the right one is allowed to write it in?". That is not possible, since there is no mechanism by which an arbitrary node in the DHT can determine who is the rightful owner of this number. "OK", the reader responds, "So instead, why don't you define a rule that says, if there are two entries in the DHT for a particular number, consider this an attack and don't try to validate the number". That would prevent the attack above. However, it introduces a Denial of service attack. An attacker can pick a target number, write it into the DHT, and prevent successful validation from happening towards that number. They can't misroute calls, but they can stop ViPR from working for targeted numbers. That is not acceptable. ViPR has to be immune from attacks like this; it should not be possible, through simple means such as configuration, for an attacker to cause a targeted number to never be validated.
One might be tempted to add a signature over the call start and stop times, but it does not help. BadGuy can just resign them and relay them on.
In essence, this simple approach is like a login protocol where the client sends the password in the clear. Such mechanisms have serious security problems.
Realizing the similarities between the validation protocol and a login protocol, a next attempt would be to use a much more secure login mechanism - digest authentication. To do this, domain O takes the called number E and the caller ID, and send them to node P. Node P treats these as a "username" of sorts - an index to find a single matching call. The start time and stop times of the call become the "password". Enterprise O also sends a big random number - a nonce - to node P. Node P then takes the random number, takes the password, hashes them together, and sends back the hash. All of this is done over a TLS connection between enterprise O and node P. Digest over TLS is very secure, so surely this must be secure too, right? Wrong!
It is not. Indeed it is susceptible to EXACTLY the same attack described previously. This is shown in Figure 105.
Po Pbad Pt DHT | | | | | | | | | | | | | |I own Ecalled | | | |---------------------------->| | | | | | | | | | | |I own Ecalled | | | |------------->| | | | | | | | | |Who owns Ecalled? | | |------------------------------------------->| | | | | | | | | |Pbad and Pt | | | |<-------------------------------------------| | | | | | | | | |TLS | | | |------------->| | | | | | | | | | | |Login user=Ecaller+Ecalled | | |------------->| | | | | | | | | | | | |Login user=Ecaller+Ecalled | | |------------->| | | | | | | | | | | | |Retrieve records | | | | | | | | | | | | | |Digest response | | |<-------------| | | | | | | | | | |Digest response | | |<-------------| | | | | | | | | | | | | | | | | | |
Figure 105: Trying Digest for Validation |
In a similar attack, PBAD could pick a random called number it is interested in, query the P2P network for it, find node PT. Then, provide node PT the number ECALLED to attack, and ECALLING, assuming it can guess a likely callerID. It then takes the received digest response, and goes through every possible start/stop time over the last 24 hours, running them through the hash function. When the hash produces a match, the PBAD has just found a full VCR for node PT. It can then write into the DHT using number E as a key, pointing to itself, and satisfy validation requests against it, without even needing to ask node P again. Our first attempt is susceptible to this attack too.
The problem here is that the call start and stop times have "low entropy" - they are not very random and are easily guessable, just like a poorly chosen password.
What we really want to do here is have a "login" protocol that creates a secure connection between a client and a server, where we use the called number and callerID as a "username" to identify a PSTN call, and then use the start and stop times as a "password". But our login protocol has to have some key features:
TOC |
EKE protocols were proposed in 1992 by Steve Bellovin. Since their proposal, numerous variations have been defined. One of them, the Secure Remote Password protocol, was standardized by the IETF in RFC 2945 (Wu, T., “The SRP Authentication and Key Exchange System,” September 2000.) [RFC2945]. A TLS mode of SRP was later defined in RFC 5054 (Taylor, D., Wu, T., Mavrogiannopoulos, N., and T. Perrin, “Using the Secure Remote Password (SRP) Protocol for TLS Authentication,” November 2007.) [RFC5054]. It is the latter protocol which is actually used by ViPR. A high level overview of EKE protocols is shown in Figure 106. Alice and Bob share a shared secret P. Alice generates a public/private keypair. She then takes her public key, and encrypts it using her password as a symmetric encryption key. She sends this encrypted key to Bob. Bob, who shares the password, uses it as a symmetric key and decrypts the message, obtaining Alice's new public key. Bob then constructs a big random number R, which is to be used as a session key. Bob then encrypts R with the public key he just got from Alice, and sends that to Alice. Now, Alice, using her public key, decrypts the message and obtains the session key R.
Alice Bob | | | | | | |Bob knows P | | | | | | | |Generate PUB+PRIV | | | | | | | |E(PUB,P) | |----------------------->| | | | | | |decrypt with P, get PUB | | | | | | | |create session key R | | | | | | |E(R,PUB) | |<-----------------------| | | | | |decrypt with PUB, get R | | | | | | | |shares R with Bob | | | | | | | | | | |
Figure 106: High Level EKE Model |
At this point Alice and Bob share a session key R which can be used for authentication (by having Alice and Bob prove to each other that they have the same value for R) or for encrypting data back and forth. How does this help? Consider our man-in-the-middle attack again, in Figure 107. Once again, Alice shares a password with legitimate user Bob. However, she begins the "login" process with BadGuy. She passes E(PUB,P) to BadGuy. BadGuy doesn't know P, so he can't decrypt the message. More importantly, he can't run through each possible password P and decrypt the message. If he did, he wouldn't be able to tell if he got it right, since PUB appears random; the decryption process would produce a random string of bits whether it was successful or not. So for now, BadGuy can only pass it on. BadGuy now intercepts E(R,PUB). Now, BadGuy can try the following. He can run through each P, decrypt E(PUB,R), obtain PUB. However, since we are using asymmetric encryption (i.e., public key encryption), even with PUB he cannot DECRYPT E(R,PUB)! BadGuy does not have the private key, which he needs to decrypt. Given a public key, he cannot guess the private key either. That is how public/private keying systems work. That is the secret here to making this work. So, once again, BadGuy has no choice but to pass the message on. Now, Alice and Bob share R but it is unknown to BadGuy. Bob now takes his peerID, encrypts it with R, and sends to Alice. Once again, BadGuy doesn't have R and can't get it, so he has no choice but to pass it on. Alice decrypts this peerID with R, and now knows that she is actually talking to Bob - since she has Bob's peerID. Other data can be substituted for the peerID, and indeed this is what happens in the actual validation protocol.
Alice Bad Bob | | | | | | | | | |Bob knows P | | | | | | | | | | | |Generate PUB+PRIV | | | | | | | | | | | |E(PUB,P) | | |------------------>| | | | | | | | | |E(PUB,P) | | |------------------>| | | | | | | | | |decrypt w P, get PUB | | | | | | | | | | | |create session key R | | | | | | | | | | |E(R,PUB) | | |<------------------| | | | | | | |E(R,PUB) | | |<------------------| | | | | | | | |decrypt with PUB, get R | | | | | | | | | | |shares R with Bob | | | | | | | | | | | | |E(Bob PeerID, R) | | |<------------------| | | | | | | |E(Bob PeerID, R) | | |<------------------| | | | | | | | | | | | | |
Figure 107: Attacking EKE Protocols |
However, the main point of this exercise is to demonstrate that EKE protocols have the desired properties.
TOC |
The validation protocol begins with the following assumptions:
The validation protocol operates by having the originating node make a series of attempts to connect to, and "login" to the terminating node. Each "login" attempt consists of establishment of a TCP connection, and then execution of TLS-SRP procedures over that connection. TLS-SRP[RFC5054] (Taylor, D., Wu, T., Mavrogiannopoulos, N., and T. Perrin, “Using the Secure Remote Password (SRP) Protocol for TLS Authentication,” November 2007.) relies on a shared secret - in the form of a username and password - in order to secure the connection. In ViPR, the username and password are constructed by using information from a target VCR along with the VServiceID learned from the DHT. The "username", instead of identifying a user, identifies a (hopefully) unique VCR shared between the originating and terminating nodes. The "password" is constructed from the VCR such that it knowledge of the information is unique to knowledge of the VCR itself.
Unfortunately, it is difficult to construct usernames and passwords that always uniquely identify a VCR. To deal with this, the validation protocol requires the originator to construct a series of usernames and passwords against a series of different nodes and their corresponding IP addresses and ports, and then run through them until a connection is securely established.
TOC |
ViPR provides two different algorithms for mapping from a particular VCR to a username and password:
The originating node will first try validations with method A, and if those all fail, then try with method B. The method itself, along with necessary information on how to use the method, is encoded into the username itself. The format of the username is always:
Username = method ":" method-data Method = "a" / "b" / future-methods Future-methods = 1alpha Method-data ? 1*(alphanum/method-unreserved)
This format starts with the method, followed by a colon, followed by a sequence of characters that are specific to the method. Both methods a and b rely on conveyance of information attributes that make up the username. Each attribute follows a specific format
Attribute = (originating-number / terminating-number / timekey / rounding-time / vserviceid / new-attribute) ";" new-attribute = att-name "=" att-value att-name = 1*(alphanum / att-unreserved) att-value = 1*(alphanum / att-unreserved) originating-number = "op=+" 1*16DIGIT terminating-number = "tp=+" 1*16DIGIT timekey = "tk=" 1*16DIGIT ?.? 1*16DIGIT rounding-time = "r=" 1*6DIGIT vserviceid = "vs=" 1*32 HEXDIGIT HEXDIGIT = DIGIT / "a" / "b" / "c" / "d" / "e" / "f"
The method data for Method A and B is defined as:
Methoda = vserviceid originating-number terminating-number rounding-time Methodb = vserviceid terminating-number timekey rounding-time
Examples include:
a:vs=7g5a8630b6365bf2;op=+17327662496;tp=+14089023084;r=1000; b:vs=7g5a8630b6365bf2;tp=+14089023084;tk=172636364.133622;r=1000;
Both methods use a rounding factor R. This is used to round the start and stop times in the password to a specific nearest multiple of R (which is in milliseconds). This rounding is done because the passwords need to be bit exact and we need to compensate for different measured values.
If we will fallback to method B (which works more often), why have both? There are two answers:
The sections below detail precisely how these are constructed.
TOC |
Most of the work for validation is on the side of the originator. It establishes connections and performs a series of validation checks.
TOC |
The first step in the process is to establish a TCP connection to PCAND. To do that, PO sends a DHT PING message targeted towards PCAND. This will return one or two IP addresses and ports. This provides one or two targets to which a connection attempt is made. An attempt is made first to the public address, then if that connection times out, to the private. Once connected, TLS-SRP is run over the connection.
TOC |
When a terminating node receives a username in a format it doesn't understand, it fails the validation. This allows for graceful upgrade to new mechanisms in the future.
TOC |
The PO examines the VCR it is using for validation. It extracts the calling and called party numbers, both of which are E.164 based. This VCR will have been uploaded at a previous point in time. PO then examines the VCRs posted in the time since this one was uploaded, and looks for any more recent VCRs with the same calling and called party numbers regardless of VService. If it finds one or more, it takes the most recent one (as measured by its end time). If it finds no more recent, it uses the VCR which triggered the validation in the first place.
Why do this? This deals with the following case. User A calls user B, causing a VCR to be uploaded. The originating node sets a timer, which fires 12 hours later. However, within that 12 hour period, A called B again. If node A provides the callerID and called party numbers as the "key" to select a VCR, it will match multiple records over the past day. We need to pick one, so the most recent is always used. This requires the originating node to know and use the most recent VCR. Furthermore, we most choose the most recent VCR regardless of its Vservice, because the originating Upload VCRs are sent using an arbitrary Vservice. Thus, the more recent call may have been done using a different VService than the one which triggered the validation. Since the actual Vservices are not common between originating and terminating sides, we must choose the VCR on the originating side regardless of Vservice. The username is constructed by using the syntax for method A described above. The calling party number is set to "op", and the called party number is set to "tp", and "r" is the value of Tr as an integral number of milliseconds. The VServiceID learned from the dictionary entry is used as the value of "vs".
This username will select the identical VCR at the terminating node, under the following conditions:
Next, the password is selected. The password is basically the start and stop times for the call. However, the SRP protocol requires a bit exact agreement on the password. Unfortunately, the calling and called parties will not have the same values for the start and stop times, for several reasons:
It is also important to note that agreement on a call acceptance and termination time assumes an explicit signaling message is sent for these two events. In the case of analog FXO ports, there is no signaling at all, and consequently, these points in time cannot be measured. It is possible to agree upon other call characteristics when analog lines are in use, but they have much worse accuracy and consequently much, much lower entropy. For this reason, this specification of ViPR only works in telephony systems with explicit messaging for call acceptance and termination, which includes PRI, SS7, BRI, analog trunks with answer and disconnect supervision, and CAS trunks. To deal with these inaccuracies in timing, the start and stop times need to be rounded. Let Tr be the rounding interval, so that each time is rounded to the value of N*Tr for integral N, such that N*Tr is less than the start or stop time, and (N+1)Tr is greater than it. In other words, "round down". If Tr=1 second, this would round down to the nearest second.
Unfortunately, rounding doesn't fully help. Lets say that the difference between the start times on the originating and terminating nodes is delta. We can still have different values for the start time if one side rounds to one value, and the other side to a different value. If delta=100ms and Tr=1s, consider a start time of 10.08 seconds on one side, and 9.98 on the other side. One side will round to 10 seconds and the other to nine seconds. The probability of this happening is approximately delta/Tr. We could just make Tr really large to compensate, but this reduces the entropy of the system (see below).
To deal with this, the originating node will actually compute FOUR different passwords. For the start time and stop time both, the originating node will round down as follows. Let T be the time in question. Let N be the value such that N*Tr <= T < (N+1)*Tr. In other words, N*Tr is the nearest round-down value, and (N+1)*Tr is the nearest round up. Let T1 and T2 be the two rounded values of T. We have:
if (T >= ((2N+1)/2) * Tr) then: T1 = N*Tr T2 = (N+1)*Tr if (T < ((2N+1)/2) * Tr) then: T1 = N*Tr T2 = (N-1)*Tr
In other words, if T is in the top half of the rounding interval, we try the rounded values above and below. If T is in the bottom half, we try the rounded values below, and below again. Pictorially:
TBD
Figure 108: Rounding mechanism for validation protocol |
These are tried in the following sequence:
For example, if the originating side has a start time of 10.08 and a stop time of 30.87, the four start and stop times with Tr=1s are:
Start | Stop |
---|---|
10 | 30 |
9 | 30 |
10 | 31 |
9 | 31 |
Each of these times is represented in 64 bit NTP time (Tr can be configured to less than 1s in which case there will be non-zero values in the least significant 32 bits). Each password is then computed by taking the 64 bit start time, followed by the 64 bit end time, resulting in a 128 bit word. This word is base-64 encoded to produce an ascii string representation of 21 characters. To perform the caller-ID based validation, the SRP-TLS procedure is done four times, once with each of the four username/password combinations (of course the username is identical in all four cases). As long as delta is less than Tr/2, one of this is guaranteed to work.
TOC |
Unfortunately, in many cases caller ID cannot be used as an identifier for the VCR. This is because:
Consequently, if no caller ID was delivered at all, the terminating side will not have a matching record. IN that case, it informs the calling side that it should abort and revert to method B. If munged, it will also abort for the same reason.
If the callerID attempt aborts, PO now tries a different approach. In this approach, the "username" is the combination of the called party number and a point during the call, selected at random. The password is equal to the start and stop times of the call. This method uses the method-tag "B" in the username.
Unlike method A, with method B, the VCR which triggered the validation is used, regardless of whether there were other, more recent, calls to the same calledparty number! This is because, in method B (unlike method A), the time itself is used as a key to select a VCR. Furthermore, using a more recent VCR does not interact properly with multi-tenancy. The called number and point during that call will select an identical VCR on the terminating side if the following conditions are met:
The username encodes the called party number, Tkey, the DHT, and the VserviceID learned from the DHT query. The password is computed identically to method A.
TOC |
Once the SRP-TLS connection is up, data is exchanged. This is done through a single VAP transaction initiated by PO. This transaction is only VAP in the sense that it utilizes the basic syntax (the header and TLV attribute structure), and its request/response model. Other than that, it is effectively a different protocol - the validation protocol.
PO sends a VAP request with method ValExchange (0x00d). It contains one attribute, Domain. The originating ViPR server obtains this domain by looking at the Vservice of the VCR that was eventually used for the validation. Note that, in cases where the VCR which triggered the validation, is different than the one actually used for validation (because a more recent VCR to the same number was found), it is important to use the Vservice associated with the VCR which was actually used for validation, and NOT the Vservice associated with the VCR which triggered the attempt. Multi-tenancy does not work properly without this. The domain from the Vservice is placed into the message. This is basically the domain name of the originating enterprise. It is included since it is needed by PT to compute the ticket.
PO will then receive a response. If it never receives a response within a timeout, it considers the validation to have failed, and continues to the next choice. If it receives any kind of error response, including a rejection due to a blacklisted domain, it considers validation to have failed, and continues to the next choice. If it is a success response, it will contain one attribute - ServiceContent, which contains a ValInfo XML object. ValInfo is an XML object which contains the SIPURIs and the ticket. The ViPR server must parse the ValInfo XML object and perform verification on it to avoid attacks. The following checks are done:
TOC |
TOC |
PT will listen on its configured port for TCP connections, and once one is received, it begins waiting for SRP-TLS. The TLS messaging will provide PT with a username.
It parses the username and determines the method. If the value of the method is not "a" or "b", this is a new method not supported by the node. The SRP-TLS procedures should be failed. If the method is "a", it is the callerID mechanism. The called number, calling number, Vservice, and rounding time are extracted. PT then searches through its VCRs over the last 48 hours for one with a matching called number and caller ID and Vservice whose VserviceID matches the one from the username:
The start and stop times from the selected VCR are taken. Using the value of Tr from the username, both times are rounded down to the nearest multiple of Tr. Note that, this rounding is different than the one used on the originating side. The values are ALWAYS rounded down. So if the stop time is 10.99 and Tr is one second, the rounded down value of 10 is used. The start and stop times are then represented as 64 bit NTP times (after rounding), concatenated, and base64ed to produce a 21 character password. This is the password used with SRP-TLS.
Note that, the originating node will try up to four different password combinations. One of these should work, the others will cause SRP-TLS to fail due to differing shared secrets. However, it is the job of the originator to perform these four; to the terminating node, they are four separate attempts. Processing of SRP-TLS login attempts is stateless on the terminating side. This means that each attempt is treated independently by PT. It performs identical processing on each SRP-TLS attempt - examine the username, find a matching VCR, extract password, and fail the attempt or continue to success. The originating side has the main burden of sequencing through the various mechanisms.
If the method is "b", PT uses the extracted called party ID and a time in the middle of the call. It searches through all VCR records whose called number matches and whose VserviceID matches, and of those, takes the ones where Tkey is between Tstart and Tstop. Of those, if more than one match, the one with the most recent Tstop is used. Tstart and Tstop for that VCR are extracted, and converted to a password just as is done for the PO. The resulting SRP-TLS procedure will then either succeed or fail. Note that, if a domain has multiple Vservices that contain the same number, there will be multiple VCRs for calls to that number, and there will be multiple validation attempts, one for each of the Vservices.
TOC |
PT listens for incoming VAP/validation requests once the TLS connection is up. It rejects anything but a ValExchange method with a 400 response. This allows for future extensibility of the validation protocol. If the request was ValExchange, it extracts the domain name. This will be something like "example.com". PT knows the VCR against which validation succeeded. That VCR is associated with a Vservice. The ViPR server checks the domain in the ValExchange request against the black/white list associated with that Vservice. If no Vservice is currently active, the ValExchange is rejected with a 403. If there is one active, and if the domain appears on the black list, or does not appear in the white list, the ViPR server rejects the ValExchange request with a 403 error response, indicating that this domain is not allowed to call.
If the domain was in the whitelist or not in the blacklist, or there was no whitelist/blacklist, PT constructs a successful response to the ValExchange request. It contains one attribute: ServiceContent. It has a ValInfo XML object, which contains a number, a ticket, and a series of routes.
The number is always the E164 number which was just validated, including the plus sign. Note that this will also appear in the ticket. The route element is the sequence of route elements for each instance associated with the vservice.
Details of the ticker are provied in [I‑D.rosenberg‑dispatch‑vipr‑sip‑antispam] (Rosenberg, J. and C. Jennings, “Session Initiation Protocol (SIP) Extensions for Blocking VoIP Spam Using PSTN Validation,” November 2009.) but the ticket attribute is constructed as follows:
The resulting sequence of TLVs is base64 encoded and that is placed into the Ticket attribute in the ValExchange response.
TOC |
This section is mostly missing and needs to be done.
TOC |
The entropy obtained in the information from the PSTN calls significantly impacts the security of this protocol. This section needs to provide an analysis of how much entropy actually exists in this information.
Defines the worst case of conference calls and resulting entropy
Describe the idea of doing multiple validations to aggregate entropy
TOC |
Discuss forward routing security in PSTN and explain how this protocol is reliant on that.
TOC |
TBD Define ports used.
TOC |
TOC |
[RFC5054] | Taylor, D., Wu, T., Mavrogiannopoulos, N., and T. Perrin, “Using the Secure Remote Password (SRP) Protocol for TLS Authentication,” RFC 5054, November 2007 (TXT). |
[I-D.rosenberg-dispatch-vipr-sip-antispam] | Rosenberg, J. and C. Jennings, “Session Initiation Protocol (SIP) Extensions for Blocking VoIP Spam Using PSTN Validation,” November 2009. |
[I-D.draft-rosenberg-dispatch-vipr-vap] | Rosenberg, J. and C. Jennings, “Validation Access Protocol (VAP),” November 2009. |
[I-D.rosenberg-dispatch-vipr-overview] | Rosenberg, J. and C. Jennings, “Verification Involving PSTN Reachability: Requirements and Architecture Overview,” November 2009. |
TOC |
[RFC2945] | Wu, T., “The SRP Authentication and Key Exchange System,” RFC 2945, September 2000 (TXT). |
[I-D.rosenberg-dispatch-vipr-reload-usage] | Rosenberg, J. and C. Jennings, “A Usage of Resource Location and Discovery (RELOAD) for Public Switched Telephone Network (PSTN) Verification,” November 2009. |
TOC |
Jonathan Rosenberg | |
jdrosen.net | |
Monmouth, NJ | |
US | |
Email: | jdrosen@jdrosen.net |
URI: | http://www.jdrosen.net |
Cullen Jennings | |
Cisco | |
170 West Tasman Drive | |
MS: SJC-21/2 | |
San Jose, CA 95134 | |
USA | |
Phone: | +1 408 421-9990 |
Email: | fluffy@cisco.com |