On 6/30/21 12:17 PM, Paul Timmins wrote:
On 6/30/21 2:56 PM, Michael Thomas wrote:
Just because you can know (fsvo "know") that a call is allowed to
assert a number doesn't change anything unless other actions are
taken. With DKIM which is far simpler than STIR it would require
reputation systems that don't seem to have been deployed, submission
auth which thankfully was deployed, policy enforcement (ie ADSP)
which is not deployed, and user indicators which are sporadically
deployed.
In any indication, the carrier closest to the originator is signing
the call metadata with their digital certificate. While this won't
mean much to the active user, for those tracking down robocalls, this
is the holy grail - finding the carrier who is letting the calls into
the network and being able to reach out to them to stop the
abusive/illegal traffic.
As I said, STIR solved the wrong problem. I know domains as a user. I
have no clue about e.164 address ranges. Also: this is 2021 and e.164
address need to go the way of the dodo.
From an automated standpoint, I really don't care about whether a phone
number is authentic, I care about the domain that onramped it so I can
theoretically punish it. It's the people who are allowing the spoofing
that is the real problem which directly analogous to email open relays.
Also: reputation is nice in theory but I am dubious that it is deployed
in reality. Given the entire ARC farce which was driven by Google -- who
owns gmail -- to supposedly "solve" the mailing list traversal problem
but boils down to a reputation system, that strongly suggests that they
don't have one either. I'm not sure why we should be optimistic about
that for STIR which solves for a much harder problem which is inherently
not entirely secure given SS7 gateways.
That it might say we've taken the time to verify the end user is who
they say they are is just icing on the cake. The goal is to make the
calls accountable to someone, which despite the patchwork of systems
in the US that might prevent the signature from coming through, can
help a lot since the biggest wholesalers have implemented it
(Inteliquent and Lumen among many others)
The other big deal is that now all carriers are actually expected to
police their network for spoofed callers who are exhibiting
robocalling behavior. This is a big deal! For the first time, carriers
are going to be held responsible for proactively finding the abuse,
and showing what their plans are to do such a thing, and sharing
information with each other (via the FCC) who can be contacted to
chase down robocall traffic if another carrier sees it.
I'm not trying to say that it's not a good thing to have authentication,
but as implemented by STIR it's ridiculously more complex than it needed
to be had they chosen the right problem to solve which is to know the
domain that is onramping the call. This could have been trivially rolled
out a decade ago and I even experimented DKIM signing SIP message about
15 years ago.
It's never been entirely clear whether DKIM was the impetus for cleaning
up open relays. I'd like to think it was, but the more likely
explanation was that it was in the water at the time. The FCC could have
at any time just clamped down on that from a regulatory standpoint
without going to all of the rigamarole of STIR. Email doesn't have a
similar regulatory body to lean on so we had to take it into our own hands.
Given the giant security holes caused by solving the wrong problem
(ie trying to authenticate the e.164 address rather than the
originating domain) it's just going to push spammers to exploit those
holes. It's very much to be seen whether victory can be declared, IMO.
Fortunately, positive identification of the caller isn't the intent.
Preventing people from pretending to be the IRS is the intent.
e.164 addresses don't allow me to know if something is from the IRS.
irs.gov does. Also, papers have shown that UI identification is a net
positive which is a shame given how sporadically they are done and how
inconsistent the UI's are. If they were widespread it would probably
much better.
Mike