SlideShare a Scribd company logo
1 of 50
Download to read offline
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
Kelley Robinson
Account Security Team, Twilio
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
54.6B
US SPAM CALLS IN 2019
GREW 108% SINCE 2018
@kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TABLE OF CONTENTS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
1. Telephony "security"
2. SHAKEN/STIR explained
3. Regulation & Limitations
4. What will happen next?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TELEPHONY "SECURITY"
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony 30 Years Ago
AMERITECH
AT&T US WEST
NYNEX
Business Customer
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony Today
AMERITECH
AT&T
US WEST
NYNEX
U
U
U
U
U
U
U
U
U U
U
U
U
U
U
CustomerBusiness
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Acronym Hell
PSTN - Public Switched Telephone Network. Global
interconnected telephony.
VoIP - Voice over IP. Internet-connected telephony.
SIP - Session Initiation Protocol. Standard used to manage
VoIP calling.
PBX - Private Branch eXchange. Private enterprise network.
@kelleyrobinson
☎ Phun Phact
The word "Hello" has only been around since 1827.
Thomas Edison popularized the greeting and urged
people to say "hello" when answering his phone.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THE PROBLEM:
UNWANTED ROBOCALLS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📈 Robocall spam & spoofing
• Automated dialing is cheap
• A lot of access points to the PSTN
• Easy to spoof "From" number
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
Legitimate use cases for masking phone numbers
Doctor calls from personal #
displays office number
Business calls from
contact center
displays toll-free callback
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
2009 Truth in Caller ID Act
• Spoofing is illegal if there is "intent to defraud, cause
harm or wrongly obtain anything of value"
• Difficult to enforce
@kelleyrobinson
☎ Phun Phact
Alexander Graham Bell campaigned to use
"Ahoy-hoy" as the standard telephone greeting
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT IS SHAKEN/STIR?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
LEMON-TWIST - LEveraging MOdels for
Enterprise dialiNg - Tnauth list With an
enterprise Identity Secured Token
@kelleyrobinson
😱
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Calls would have their caller ID
“signed” as legitimate by originating
carriers and validated by other carriers
before reaching consumers.
SHAKEN/STIR defined | FCC.gov
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Borrowing from other
web authentication
• Public Key Infrastructure (PKI)
• Certificates
• JSON Web Tokens (JWT)
• Similar to email's DKIM/DMARC
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📲Caller
Originating
Service Provider
Other
Service Providers
Terminating
Service Provider
🔒Signing Service
✅Verification Service
📳Callee
🏛Certificate
Authorities
SHAKEN/STIR
signing and verification
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Certificate authorities
• Approved by the STI-GA (Secure Telephone Identity
Governance Authority)
• Managed by ATIS (Alliance for Telecommunications
Industry Solutions)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SIP IDENTITY HEADER
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
{
"attest": "A", " Attestation Level
"dest": {"tn":["14155550101"]}, " Destination Phone #
"iat": 1548859982,
"orig": {"tn":"14155550171"}, " Origination Phone #
"origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254"
} " Orig. Customer ID
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Attestation Levels
I know this
customer
and they
can use
the calling
number
A
✅
I know the
customer
but I don't
know the
calling
number
B
🤷
I don't
know the
customer
but I know
where this
call came
from
C
🤔
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
]
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
- cryptographic signature
- certificate URL
- algorithm
- passport type
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
ENFORCEMENT
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TRACED Act
• Signed into law 2019-12-30
• Allows $10,000 fine for offenders
• Requires telecom companies to implement call
authentication in the next 18 months
(Telephone Robocall Abuse Criminal Enforcement Deterrence)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
• VOIP: Implement STIR/SHAKEN
• Non VOIP: "Reasonable measures to implement an effective call authentication framework"
TRACED Act
Authentication Requirements
@kelleyrobinson
☎ Phun Phact
Not every 555 number is fake. Only 555-0100
through 555-0199 are specifically reserved for
fictional use.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: TV Tropes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
LIMITATIONS OF SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
"The phone network is an
ungodly beast."
- Randy Weinberger, curmudgeon, telecom expert
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Part of the ungodly beast:
Time-division multiplexing (TDM)
• Physical switches used by the PSTN
• TRACED Act explicitly acknowledges TDM as a potential
burden to SHAKEN/STIR rollout
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
The long tail of service providers
• 4000 service providers in the US alone
• Requires significant investment to comply
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
And what about...
• Disconnected and reassigned phone numbers?
• International numbers and calls?
• Text messages?
@kelleyrobinson
☎ Phun Phact
Phone calls from The New York Times showed up
as (111) 111-1111 until 2011. They now use a (212)
number you can actually call back.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: NYTimes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT HAPPENS NEXT?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Ongoing legislation
• FCC gave telcos authority to block unwanted robocalls
without explicit subscriber permission
• TRACED Act enforcement will begin at the end of 2020
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Motivations driving implementation
• Consumer pressure to decrease robocalls
• Business pressure to increase answered calls
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
APPLICATION SECURITY
PROTECTIONS TODAY
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Mitigate damage from unwanted
inbound calls
• Protect your numbers from web scraping bots
• Don't assign sequential phone numbers to your employees
• Challenge suspicious callers with a voice CAPTCHA
• Use actual authentication in your call centers
• Install the FCC blacklist DB on your PBX
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Apps for spam detection
• Nomorobo, Robokiller, Call App, etc.
• AT&T partnership with Hiya
@kelleyrobinson
Telephony is complicated.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
But it will help rebuilt trust in telephony.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THANK YOU
@kelleyrobinson

More Related Content

What's hot

Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
Olya Saiko
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
mrkhanlodhi
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
Ayodele Thomas
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consent
Alexandria Bishop
 

What's hot (20)

Subex cv akhil_singh_rawat
Subex cv akhil_singh_rawatSubex cv akhil_singh_rawat
Subex cv akhil_singh_rawat
 
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consent
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Sim box
Sim boxSim box
Sim box
 

Similar to Intro to SHAKEN/STIR

The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFThe Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
Michael Einbinder-Schatz
 
1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct
Samantha Park
 

Similar to Intro to SHAKEN/STIR (20)

Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
 
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
 
Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
PSD2, SCA, WTF?
PSD2, SCA, WTF?PSD2, SCA, WTF?
PSD2, SCA, WTF?
 
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFThe Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
 
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
 
Tips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part IITips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part II
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)
 
POPI and Email Marketing
POPI and Email Marketing POPI and Email Marketing
POPI and Email Marketing
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
 
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020
 
10 Things To Consider Before Buying a Condo
10 Things To Consider Before Buying a Condo10 Things To Consider Before Buying a Condo
10 Things To Consider Before Buying a Condo
 

More from Kelley Robinson

More from Kelley Robinson (20)

Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
WebAuthn
WebAuthnWebAuthn
WebAuthn
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
 
2FA in 2020 and Beyond
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and Beyond
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ Startups
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
Authentication Beyond SMS
Authentication Beyond SMSAuthentication Beyond SMS
Authentication Beyond SMS
 
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling AuthenticationBSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
2FA, WTF!?
2FA, WTF!?2FA, WTF!?
2FA, WTF!?
 
2FA WTF
2FA WTF2FA WTF
2FA WTF
 
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
 
2FA, OTP, WTF?
2FA, OTP, WTF?2FA, OTP, WTF?
2FA, OTP, WTF?
 

Recently uploaded

Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Dr.Costas Sachpazis
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
ankushspencer015
 

Recently uploaded (20)

Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Porous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writingPorous Ceramics seminar and technical writing
Porous Ceramics seminar and technical writing
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINEDJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
DJARUM4D - SLOT GACOR ONLINE | SLOT DEMO ONLINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
Structural Analysis and Design of Foundations: A Comprehensive Handbook for S...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
AKTU Computer Networks notes --- Unit 3.pdf
AKTU Computer Networks notes ---  Unit 3.pdfAKTU Computer Networks notes ---  Unit 3.pdf
AKTU Computer Networks notes --- Unit 3.pdf
 
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
Sheet Pile Wall Design and Construction: A Practical Guide for Civil Engineer...
 

Intro to SHAKEN/STIR

  • 1. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR Kelley Robinson Account Security Team, Twilio @kelleyrobinson © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 2. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 3. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 54.6B US SPAM CALLS IN 2019 GREW 108% SINCE 2018 @kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
  • 4. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 5. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 6. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 7. TABLE OF CONTENTS © 2019 TWILIO INC. ALL RIGHTS RESERVED. 1. Telephony "security" 2. SHAKEN/STIR explained 3. Regulation & Limitations 4. What will happen next?
  • 8. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TELEPHONY "SECURITY"
  • 9. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony 30 Years Ago AMERITECH AT&T US WEST NYNEX Business Customer
  • 10. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony Today AMERITECH AT&T US WEST NYNEX U U U U U U U U U U U U U U U CustomerBusiness
  • 11. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Acronym Hell PSTN - Public Switched Telephone Network. Global interconnected telephony. VoIP - Voice over IP. Internet-connected telephony. SIP - Session Initiation Protocol. Standard used to manage VoIP calling. PBX - Private Branch eXchange. Private enterprise network. @kelleyrobinson
  • 12. ☎ Phun Phact The word "Hello" has only been around since 1827. Thomas Edison popularized the greeting and urged people to say "hello" when answering his phone. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 13. © 2019 TWILIO INC. ALL RIGHTS RESERVED. THE PROBLEM: UNWANTED ROBOCALLS
  • 14. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📈 Robocall spam & spoofing • Automated dialing is cheap • A lot of access points to the PSTN • Easy to spoof "From" number @kelleyrobinson
  • 15. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson Legitimate use cases for masking phone numbers Doctor calls from personal # displays office number Business calls from contact center displays toll-free callback
  • 16. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 2009 Truth in Caller ID Act • Spoofing is illegal if there is "intent to defraud, cause harm or wrongly obtain anything of value" • Difficult to enforce @kelleyrobinson
  • 17. ☎ Phun Phact Alexander Graham Bell campaigned to use "Ahoy-hoy" as the standard telephone greeting © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 18. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT IS SHAKEN/STIR?
  • 19. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited @kelleyrobinson
  • 20. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited LEMON-TWIST - LEveraging MOdels for Enterprise dialiNg - Tnauth list With an enterprise Identity Secured Token @kelleyrobinson 😱
  • 21. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Calls would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. SHAKEN/STIR defined | FCC.gov
  • 22. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Borrowing from other web authentication • Public Key Infrastructure (PKI) • Certificates • JSON Web Tokens (JWT) • Similar to email's DKIM/DMARC @kelleyrobinson
  • 23. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📲Caller Originating Service Provider Other Service Providers Terminating Service Provider 🔒Signing Service ✅Verification Service 📳Callee 🏛Certificate Authorities SHAKEN/STIR signing and verification
  • 24. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Certificate authorities • Approved by the STI-GA (Secure Telephone Identity Governance Authority) • Managed by ATIS (Alliance for Telecommunications Industry Solutions) @kelleyrobinson
  • 25. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SIP IDENTITY HEADER
  • 26. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 @kelleyrobinson
  • 27. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken @kelleyrobinson
  • 28. © 2019 TWILIO INC. ALL RIGHTS RESERVED. dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken { "attest": "A", " Attestation Level "dest": {"tn":["14155550101"]}, " Destination Phone # "iat": 1548859982, "orig": {"tn":"14155550171"}, " Origination Phone # "origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254" } " Orig. Customer ID @kelleyrobinson
  • 29. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Attestation Levels I know this customer and they can use the calling number A ✅ I know the customer but I don't know the calling number B 🤷 I don't know the customer but I know where this call came from C 🤔
  • 30. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ] MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken - cryptographic signature - certificate URL - algorithm - passport type @kelleyrobinson
  • 31. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ENFORCEMENT
  • 32. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TRACED Act • Signed into law 2019-12-30 • Allows $10,000 fine for offenders • Requires telecom companies to implement call authentication in the next 18 months (Telephone Robocall Abuse Criminal Enforcement Deterrence) @kelleyrobinson
  • 33. © 2019 TWILIO INC. ALL RIGHTS RESERVED. • VOIP: Implement STIR/SHAKEN • Non VOIP: "Reasonable measures to implement an effective call authentication framework" TRACED Act Authentication Requirements @kelleyrobinson
  • 34. ☎ Phun Phact Not every 555 number is fake. Only 555-0100 through 555-0199 are specifically reserved for fictional use. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: TV Tropes
  • 35. © 2019 TWILIO INC. ALL RIGHTS RESERVED. LIMITATIONS OF SHAKEN/STIR
  • 36. © 2019 TWILIO INC. ALL RIGHTS RESERVED. "The phone network is an ungodly beast." - Randy Weinberger, curmudgeon, telecom expert
  • 37. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Part of the ungodly beast: Time-division multiplexing (TDM) • Physical switches used by the PSTN • TRACED Act explicitly acknowledges TDM as a potential burden to SHAKEN/STIR rollout @kelleyrobinson
  • 38. © 2019 TWILIO INC. ALL RIGHTS RESERVED. The long tail of service providers • 4000 service providers in the US alone • Requires significant investment to comply @kelleyrobinson
  • 39. © 2019 TWILIO INC. ALL RIGHTS RESERVED. And what about... • Disconnected and reassigned phone numbers? • International numbers and calls? • Text messages? @kelleyrobinson
  • 40. ☎ Phun Phact Phone calls from The New York Times showed up as (111) 111-1111 until 2011. They now use a (212) number you can actually call back. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: NYTimes
  • 41. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT HAPPENS NEXT?
  • 42. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Ongoing legislation • FCC gave telcos authority to block unwanted robocalls without explicit subscriber permission • TRACED Act enforcement will begin at the end of 2020 @kelleyrobinson
  • 43. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Motivations driving implementation • Consumer pressure to decrease robocalls • Business pressure to increase answered calls @kelleyrobinson
  • 44. © 2019 TWILIO INC. ALL RIGHTS RESERVED. APPLICATION SECURITY PROTECTIONS TODAY
  • 45. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Mitigate damage from unwanted inbound calls • Protect your numbers from web scraping bots • Don't assign sequential phone numbers to your employees • Challenge suspicious callers with a voice CAPTCHA • Use actual authentication in your call centers • Install the FCC blacklist DB on your PBX @kelleyrobinson
  • 46. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Apps for spam detection • Nomorobo, Robokiller, Call App, etc. • AT&T partnership with Hiya @kelleyrobinson
  • 47. Telephony is complicated. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 48. Telephony is complicated. SHAKEN/STIR won't fix everything. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 49. Telephony is complicated. SHAKEN/STIR won't fix everything. But it will help rebuilt trust in telephony. © 2019 TWILIO INC. ALL RIGHTS RESERVED.