Skip to main content

The Session Initiation Protocol (SIP) and Spam
draft-ietf-sipping-spam-05

Revision differences

Document history

Date Rev. By Action
2012-08-22
05 (System) post-migration administrative database adjustment to the Yes position for Chris Newman
2007-08-22
05 (System) IANA Action state changed to No IC from In Progress
2007-08-22
05 (System) IANA Action state changed to In Progress
2007-08-21
05 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2007-08-21
05 Amy Vezza IESG state changed to Approved-announcement sent
2007-08-21
05 Amy Vezza IESG has approved the document
2007-08-21
05 Amy Vezza Closed "Approve" ballot
2007-08-21
05 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Amy Vezza
2007-07-12
05 Chris Newman [Ballot Position Update] Position for Chris Newman has been changed to Yes from Discuss by Chris Newman
2007-07-09
05 (System) New version available: draft-ietf-sipping-spam-05.txt
2007-05-25
05 (System) Removed from agenda for telechat - 2007-05-24
2007-05-24
05 Amy Vezza State Changes to IESG Evaluation::AD Followup from IESG Evaluation by Amy Vezza
2007-05-24
05 Chris Newman
[Ballot discuss]
This is a "please consider fixing" DISCUSS.  See my comments for things I
think are worth fixing or considering improving.  However, I'm willing …
[Ballot discuss]
This is a "please consider fixing" DISCUSS.  See my comments for things I
think are worth fixing or considering improving.  However, I'm willing to
clear this discuss if asked as publication of even this version of the
document would be better than excessive delay.
2007-05-24
05 Chris Newman [Ballot Position Update] New position, Discuss, has been recorded by Chris Newman
2007-05-24
05 Chris Newman
[Ballot comment]
This is an important document and I believe it would benefit the
community to have this published soon.

However, this document repeatly makes …
[Ballot comment]
This is an important document and I believe it would benefit the
community to have this published soon.

However, this document repeatly makes the mistake of being too
authoritative in an area which is more of a research problem space.  As
a result, it includes several statements that are factually incorrect or
execessively authoritative.  This weakens the document significantly. I
recommend one editing pass to try to at least fix the factual errors.


The first problem I noticed was this:

"  a plague on the Internet email system, rendering it nearly useless."

The phrase "rendering it nearly useless" is a factual error.  Spam has
done a great deal of damage to the Internet mail system -- made it
_much_ more expensive to run, it has made it annoying, it has swaped
solicited/desired traffic with unsolicited/undesired traffic, and it has
basically destroyed the robustness principle.  But it has not made email
"nearly useless".  Starting this document with a false statement greatly
weakens an otherwise interesting analysis.

Other factual errors:

  "These kinds of consent-based systems are used widely in presence and
  IM but not in email."

Factually incorrect -- most email mailing lists use consent-based systems, including IETF mailing lists.

  "This is likely due to the need for a secure
  authenticated identity mechanism, which is a pre-requisite for this
  kind of solution."

Email mailing lists provide a consent-based mechanism without a secure authenticated identity mechanism.  They leverage the fact that it is quite difficult to intercept mail destined for a specific address.

  "Email does not have this kind of secure
  domain identification, although new techniques are being investigated
  to add it using reverse DNS checks (see below)."

What about RFC 4871?

  "In email, there are no standards established for
  securely identifying the identity of the sending domain of a message."

RFC 4871 is such a standard.  Also SMTP STARTTLS could be used for inter-domain transfers (although deployment of the key infrastructure is likely impractical for this purpose at the moment).



I also think it's very easy to fall into pitfalls when talking about
spam absent an attack tree analysis of spamming.  An attack tree looks
at what kinds of spammers are out there and what their motivations are.
I would put 3 nodes under the root of the spam attack tree:
"pranksters", "commercial" and "organized international crime".  Under
"commercial", we have in-house and out-sourced UBE sub-nodes.  An
important sub-node of the organized international crime node is phising
(very profitable and thus largely immune to costs).  The anlaysis in
this document applies well to the in-house sub-node of the commercial
node.  The analysis starts to fall apart on some of the other nodes in
the attack tree.

Examples of text which is too authoritative:

"As a result, the problem of forged senders can be eliminated, making the
  white list solution feasible."

The problem may be largely addressed, but it's not eliminated as there are always attacks that work (as a last resort, social engineering or coersion of
the identity the attacker is forging).

  "Fortunately, it is possible to apply traditional content
  filtering systems to the header fields in the SIP messages, thus
  blocking these kinds of consent requests."

Content filtering only partially blocks such requests. 

  "Thus, if consent is required first, and nearly all users do not give consent
  to spammers, the value in sending spam is reduced"

This varies based on the node in the attack tree, while true for commercial
spam this is much less true for phishers.

  "One way to prevent spam is to make your address difficult or impossible to
  gather."

This is a way to _reduce_ spam, not prevent it.

  "This technique has the potential to truly make it prohibitively
  expensive to send spam of any sort."

It depends on how profitable the spam product happens to be.  In the case of phishing, I doubt this statement is true.

  "Since spam is a consequence of untrusted domains and users that get
  connected to the network,"

Spam can be a consequence of a _trusted_ user who manages their Windows machine poorly. ;-)
2007-05-24
05 Jari Arkko [Ballot Position Update] New position, Yes, has been recorded by Jari Arkko
2007-05-24
05 Jari Arkko [Ballot comment]
> magntiude cheaper to send than traditional circuit-based telemarketer

Typo
2007-05-24
05 Lars Eggert [Ballot Position Update] New position, No Objection, has been recorded by Lars Eggert
2007-05-24
05 Magnus Westerlund [Ballot Position Update] New position, No Objection, has been recorded by Magnus Westerlund
2007-05-23
05 Ross Callon [Ballot Position Update] New position, No Objection, has been recorded by Ross Callon
2007-05-23
05 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded by Mark Townsley
2007-05-23
05 Lisa Dusseault
[Ballot comment]
Section 3.2 on Black Lists and section 3.3 on White lists should mention zombie spam.  Both blacklists and whitelists are problematic because spam …
[Ballot comment]
Section 3.2 on Black Lists and section 3.3 on White lists should mention zombie spam.  Both blacklists and whitelists are problematic because spam can come from infected machines in domains, or from addresses, that we'd otherwise like to receive messages from.  Zombies are mentioned elsewhere in the document but they're particularly harmful to blacklist and whitelist solutions.  For that matter, reputation systems are quite undermined by zombies.  It might be useful to point out that existing botnets can be quickly adapted to SIP -- a set of existing compromised machines can easily be given new code to send SIP spam.

(Indeed, in section 3.9, the text reads as if whitelists are a solution to zombie networks which they're not, and botnets are also ignored in section 4.2.)

3.4: "Since most of today's IM systems are closed" -- I don't know what is meant by "closed"
2007-05-23
05 Ron Bonica [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica
2007-05-23
05 Lisa Dusseault [Ballot Position Update] New position, No Objection, has been recorded by Lisa Dusseault
2007-05-23
05 Sam Hartman
[Ballot comment]
I've registered a no objection position.  However there are a lot of
statements in this draft that seem to ignore dkim.  As far …
[Ballot comment]
I've registered a no objection position.  However there are a lot of
statements in this draft that seem to ignore dkim.  As far as I can
tell dkim and sip identity are very similar solutions.

I'm not sure that the advice here will work, but it does seem like the
best advice I've read on the subject.  There is a lot of good stuff
here.
2007-05-23
05 Sam Hartman [Ballot Position Update] New position, No Objection, has been recorded by Sam Hartman
2007-05-22
05 Tim Polk [Ballot Position Update] New position, No Objection, has been recorded by Tim Polk
2007-05-22
05 Tim Polk
[Ballot comment]
Section 2.3 Presence Spam

Unlike sections 2.1 (Call Spam) and 2.2 (IM Spam), there are no cost
estimates.  Since cost is used to …
[Ballot comment]
Section 2.3 Presence Spam

Unlike sections 2.1 (Call Spam) and 2.2 (IM Spam), there are no cost
estimates.  Since cost is used to estimate the likelihood of spam in
the parallel subsections, it seems that cost should be addressed here
as well.

Section 3.8 Turing Tests

7th paragraph:  I believe the cost should be .50 cents per test and per
message, rather than 50 cents per test and message.

3.10 Payments at Risk

Third paragraph: If the sender is allowed, the provider takes .64 cents
rather than 64 cents.  The total cost to the sender for a legitimate
transaction should be 1.39 cents (.75 plus .64 cents).  For ten new
recipients per day, the cost would be $4.17 per month (assuming 30
days in the month).

The remaining comments are from the SecDir Review by Donald Eastlake:

This draft is a reasonably thorough review of potential "spam" problems
with SIP and a survey of possible solutions including anti-spam
recommendations.

The Security Considerations section says merely

  This memo is entirely devoted to issues relating to secure usage of
  SIP services on the Internet.

I'm fine with a very short Security Considerations section for this
document, given its survey nature, but I don't think "secure usage" is
really accurate. Maybe

  This memo is entirely devoted to issues related to the amelioration
  of spam in SIP and references a variety of security mechanisms in
  support of that goal.

Also, at the end of section 3.4, in the paragraph split between pages 11
and 12, the possibility of automatically granting permission for a
limited length IM for the purpose of examining the content of that IM
and discarding it without bothering the user if it is judged to be spam,
and maybe then blocking that sender for a while, appears not to be
considered.

++++++++++++++++++

Editorial/trivia:

"UAC" is used exactly once in this document. Suggest spelling it out.

Several places "10s" -> "10 seconds".

Last line of page 12, suggest "grant" -> "give" as "grant" has a
connotation to me of giving something that is positive or favorable.

Section 3.8, page 15, "processing an artificial" -> "processing and
artificial".

First line of the third paragraph in Section 3.8, delete the comma.

Spell out IVR, at least the first time it is used.

Section 3.8, third paragraph on page 16, "50 cents" -> "0.5 cents"
twice.

There are numerous occurrences of "TLS". I assume these are references
to Transport Layer Security but this is never spelled out nor is there
any RFC reference given for this.

Spell out PSTN, at least the first time it is used.

Section 5, first paragraph, second line, suggest deleting "identity of
a".

Section 6, "White Lists" paragraph, 3rd line, suggest deleting "of the".

Thanks,
Donald
2007-05-19
05 Cullen Jennings [Ballot Position Update] New position, Recuse, has been recorded by Cullen Jennings
2007-05-16
05 Jon Peterson State Changes to IESG Evaluation from Waiting for Writeup by Jon Peterson
2007-05-16
05 Jon Peterson Placed on agenda for telechat - 2007-05-24 by Jon Peterson
2007-05-16
05 Jon Peterson [Ballot Position Update] New position, Yes, has been recorded for Jon Peterson
2007-05-16
05 Jon Peterson Ballot has been issued by Jon Peterson
2007-05-16
05 Jon Peterson Created "Approve" ballot
2007-05-11
05 Samuel Weiler Request for Last Call review by SECDIR Completed. Reviewer: Donald Eastlake.
2007-05-09
05 (System) State has been changed to Waiting for Writeup from In Last Call by system
2007-05-09
05 Yoshiko Fong IANA Last Call Comments:


As described in the IANA Considerations section, we
understand this document to have NO IANA Actions.
2007-04-27
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Donald Eastlake
2007-04-27
05 Samuel Weiler Request for Last Call review by SECDIR is assigned to Donald Eastlake
2007-04-25
05 Amy Vezza Last call sent
2007-04-25
05 Amy Vezza State Changes to In Last Call from Last Call Requested by Amy Vezza
2007-04-24
05 Jon Peterson State Changes to Last Call Requested from Publication Requested by Jon Peterson
2007-04-24
05 Jon Peterson Last Call was requested by Jon Peterson
2007-04-24
05 (System) Ballot writeup text was added
2007-04-24
05 (System) Last call text was added
2007-04-24
05 (System) Ballot approval text was added
2007-04-21
05 Cullen Jennings State Change Notice email list have been change to sipping-chairs@tools.ietf.org, jdrosen@cisco.com, fluffy@cisco.com from sipping-chairs@tools.ietf.org
2007-04-02
05 Dinara Suleymanova
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, …
PROTO Write-up

(1.a) Who is the Document Shepherd for this document? Has the
Document Shepherd personally reviewed this version of the
document and, in particular, does he or she believe this
version is ready for forwarding to the IESG for publication?

Gonzalo Camarillo is the shepherd for this document. He believes this
document is ready for publication.

(1.b) Has the document had adequate review both from key WG members
and from key non-WG members? Does the Document Shepherd have
any concerns about the depth or breadth of the reviews that
have been performed?

Yes, this document has been adequately reviewed and the shepherd does
not have any concern at this point.

(1.c) Does the Document Shepherd have concerns that the document
needs more review from a particular or broader perspective,
e.g., security, operational complexity, someone familiar with
AAA, internationalization or XML?

The shepherd does not have any concern.

(1.d) Does the Document Shepherd have any specific concerns or
issues with this document that the Responsible Area Director
and/or the IESG should be aware of? For example, perhaps he
or she is uncomfortable with certain parts of the document, or
has concerns whether there really is a need for it. In any
event, if the WG has discussed those issues and has indicated
that it still wishes to advance the document, detail those
concerns here. Has an IPR disclosure related to this document
been filed? If so, please include a reference to the
disclosure and summarize the WG discussion and conclusion on
this issue.

The shepherd does not have any concern.

(1.e) How solid is the WG consensus behind this document? Does it
represent the strong concurrence of a few individuals, with
others being silent, or does the WG as a whole understand and
agree with it?

The whole WG considers SPAM to be a very important problem. The draft
was formally reviewed by a few individuals within the WG.


(1.f) Has anyone threatened an appeal or otherwise indicated extreme
discontent? If so, please summarise the areas of conflict in
separate email messages to the Responsible Area Director. (It
should be in a separate email because this questionnaire is
entered into the ID Tracker.)

No, nobody threatened an appeal or indicated discontent.

(1.g) Has the Document Shepherd personally verified that the
document satisfies all ID nits? (See
http://www.ietf.org/ID-Checklist.html and
http://tools.ietf.org/tools/idnits/). Boilerplate checks are
not enough; this check needs to be thorough. Has the document
met all formal review criteria it needs to, such as the MIB
Doctor, media type and URI type reviews?

Yes.

(1.h) Has the document split its references into normative and
informative? Are there normative references to documents that
are not ready for advancement or are otherwise in an unclear
state? If such normative references exist, what is the
strategy for their completion? Are there normative references
that are downward references, as described in [RFC3967]? If
so, list these downward references to support the Area
Director in the Last Call procedure for them [RFC3967].

The document only contains informative references.

(1.i) Has the Document Shepherd verified that the document IANA
consideration section exists and is consistent with the body
of the document? If the document specifies protocol
extensions, are reservations requested in appropriate IANA
registries? Are the IANA registries clearly identified? If
the document creates a new registry, does it define the
proposed initial contents of the registry and an allocation
procedure for future registrations? Does it suggest a
reasonable name for the new registry? See [RFC2434]. If the
document describes an Expert Review process has Shepherd
conferred with the Responsible Area Director so that the IESG
can appoint the needed Expert during the IESG Evaluation?

The IANA Considerations Section looks OK.

(1.j) Has the Document Shepherd verified that sections of the
document that are written in a formal language, such as XML
code, BNF rules, MIB definitions, etc., validate correctly in
an automated checker?

The document does not use formal language.

(1.k) The IESG approval announcement includes a Document
Announcement Write-Up. Please provide such a Document
Announcement Write-Up? Recent examples can be found in the
"Action" announcements for approved documents. The approval
announcement contains the following sections:

Technical Summary

Spam, defined as the transmission of bulk unsolicited messages, has
plagued Internet email. Unfortunately, spam is not limited to email.
It can affect any system that enables user to user communications.
The Session Initiation Protocol (SIP) defines a system for user to
user multimedia communications. Therefore, it is susceptible to
spam, just as email is. In this document, we analyze the problem of
spam in SIP. We first identify the ways in which the problem is the
same and the ways in which it is different from email. We then
examine the various possible solutions that have been discussed for
email and consider their applicability to SIP.


Working Group Summary
Was there anything in WG process that is worth noting? For
example, was there controversy about particular points or
were there decisions where the consensus was particularly
rough?

There was strong consensus behind this document.

Document Quality
Are there existing implementations of the protocol? Have a
significant number of vendors indicated their plan to
implement the specification? Are there any reviewers that
merit special mention as having done a thorough review,
e.g., one that resulted in important changes or a
conclusion that the document had no substantive issues? If
there was a MIB Doctor, Media Type or other expert review,
what was its course (briefly)? In the case of a Media Type
review, on what date was the request posted?

Vijay Gurbani performed a dedicated review on this draft.

Personnel
Who is the Document Shepherd for this document? Who is the
Responsible Area Director?


The document shepherd is Gonzalo Camarillo and the responsible area
director is Jon Peterson.
2007-04-02
05 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2007-02-28
04 (System) New version available: draft-ietf-sipping-spam-04.txt
2006-10-23
03 (System) New version available: draft-ietf-sipping-spam-03.txt
2006-03-16
02 (System) New version available: draft-ietf-sipping-spam-02.txt
2005-07-20
01 (System) New version available: draft-ietf-sipping-spam-01.txt
2005-02-14
00 (System) New version available: draft-ietf-sipping-spam-00.txt