Skip to main content

Liaison statement
STIR WG Response to LS on technical measures and mechanism on countering the spoofed call in the visited network of VoLTE

Additional information about IETF liaison relationships is available on the IETF webpage and the Internet Architecture Board liaison webpage.
State Posted
Submitted Date 2015-03-31
From Group stir
From Contact Russ Housley
To Group ITU-T-SG-17
To Contacts luohongwei@chinattl.com
Cc martin.euchner@itu.int
chair@ietf.org
iesg@ietf.org
kremer@rans.ru
ko-nakao@kddi.com
tony@yaanatech.com
Scott.Mansfield@Ericsson.com
Response Contact housley@vigilsec.com
Technical Contact rjsparks@nostrum.com
Purpose In response
Attachments (None)
Liaisons referred by this one LS on technical measures and mechanism on countering the spoofed call in the visited network of VoLTE
Body
Re: Liaison 1353 (ITU SG 17 – COM17_LS149)


The IETF STIR WG appreciates the notification from ITU-T SG 17 of the
adoption of its new work item X.ticsc, on "Technical measures and
mechanism on countering the spoofed call in the visited network of
VoLTE." We note that the approach in X.ticsc focuses on the
identification of spoofed or impersonated calls, and the IETF STIR WG
concurs that impersonation is the primary enabler of robocalling,
voicemail hacking, and swatting attacks today, and is thus a proper
scope of ongoing work to combat those attacks.

The X.ticsc document outlines three measures to address the VoLTE spam
problem: IMS-based approaches, RCS-based approaches, and smartphone
functions.

The IMS-based approach discusses how an application server layer of
IMS might detect a spoofed call.  The IETF STIR WG believes that
intermediaries have a role to play in implementing the functions of an
"authentication service," which decides if a caller is authorized to
claim a calling number/identity, and a "verification service," which
ascertains if a request contains a valid cryptographic assertion of
authority.  Our "verification service" roughly aligns with the notion
that a network-based intermediary in the application server layer of
IMS might detect spoofed calls.

We note that the IETF STIR WG has a charter item for an "out-of-band"
approach to identifying impersonation attacks that relies on smartphone
functions or comparable equipment which may be of interest to SG 17.  We
have deferred this work item until we complete work on the "in-band"
SIP-based approach in the IETF STIR WG, but we expect to continue work
on "out-of-band" shortly.

Broadly, we believe the IETF STIR efforts have applicability beyond the
IMS environment, but that does not preclude the IMS and VoLTE visited
network environment from making use of the technology designed in STIR.
In addition, there is an anti-spoofing Study Item in 3GPP SA3 Security
Working Group where STIR work is being examined for applicability in a
VoLTE/IMS deployment.

We again thank SG 17 for notifying us of this new work item.  We would be
happy to work with SG 17 on the use of any IETF technology that SG 17
considers for this solution.