90 likes | 107 Views
This proposal explores the idea of using the identity chain established by ENUM validation to convey E.164 identity to the internet, leveraging parts of ENUM and Domainkeys technology.
E N D
ENUM and Domainkeysas Distributed Identity Infrastructure draft-mayrhofer-enum-domainkeys-00 Alexander Mayrhofer alexander.mayrhofer@enum.at 20.03.2006 draft-mayrhofer-enum-domainkeys
Motivation • Identity is the NextGreatBuzz(tm) • A phone number is an identity • Most expensive part of ENUM provisioning: Validation • But: Validation takes the identity of the phone number to the ENUM domain • This identity an ENUM domain reflects – its most expensive component - is currently underused • So, let's make use of that! draft-mayrhofer-enum-domainkeys
Leveraging identity – an idea +43 1 5056416 34 PSTN Identity transactions Bank Pizza Friends ENUM validation Internet Web sites Peers "Friends" 4.3.6.1.4.6.5.0.5.1.3.4.e164.arpa draft-mayrhofer-enum-domainkeys
Idea / Proposal • Idea: Use the identity chain established by ENUM validation to convey the E.164 identity to the internet. • Proposal: Use parts of ENUM & Domainkeys technology • ENUM, but no full DDDS (just the domain) • Domainkeys, but just the key stuff/storage • = TXT record with public key in ENUM • ENUM domain owner = signer • Any internet user = verifier draft-mayrhofer-enum-domainkeys
Example flow 4.3.6.1.4.6.5.0.5.1.3.4.e164.arpa ENUM Gateway 3 +43 1 5056416 34 Internet 4 Signed message 2 1 *man in the middle, Replay, etc. to be avoided by eg. Destination challenging sender … 1 – signing the message with private key 2 – transport of mesage to destination 3 – destination identifies E.164 number, fetches public key 4 – destination verfies signature If successful, destination can without prior knowledge assume that Sender is identical with number holder draft-mayrhofer-enum-domainkeys
Features / why ENUM? • Available to any ENUM domain holder • (Note: that's the sales pitch part ;) • Receiving end requires no prior knowledge about sender • Any node on the internet can perform authentication • Domain internationally agreed • Common validation quality: • Number holder == ENUM domain owner draft-mayrhofer-enum-domainkeys
Potential applications • Signing in to P2P networks • Especially when they deal with RTC – users "keep their number" – even on the P2P network • Without prior contact/knowledge • CLI signalling to the PSTN • Anonymous PSTN gateways can assure CLI on outbound calls without prior knowledge of the caller • SPIT prevention • Sender identification and whitelisting • More? draft-mayrhofer-enum-domainkeys
More potential… • Even disconnected nodes could perform authentication, given that public key is cached (or the devices share a number) • PANs (the gadgets in my backpack to each other) • AdHoc (overlay?) networks with identical participants (gadgets in IETF shuttle busses? ;) • Handset to Base station draft-mayrhofer-enum-domainkeys
Status • draft-mayrhofer-enum-domainkeys-00 • Contains idea without gritty details – to be fleshed out in upcoming versions • Few feedback received • Any opinions / feedback? • Volunteers for co-authors? • PKI/crypto knowledge required draft-mayrhofer-enum-domainkeys