SlideShare ist ein Scribd-Unternehmen logo
1 von 50
Downloaden Sie, um offline zu lesen
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
Kelley Robinson
Account Security Team, Twilio
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
54.6B
US SPAM CALLS IN 2019
GREW 108% SINCE 2018
@kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TABLE OF CONTENTS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
1. Telephony "security"
2. SHAKEN/STIR explained
3. Regulation & Limitations
4. What will happen next?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TELEPHONY "SECURITY"
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony 30 Years Ago
AMERITECH
AT&T US WEST
NYNEX
Business Customer
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony Today
AMERITECH
AT&T
US WEST
NYNEX
U
U
U
U
U
U
U
U
U U
U
U
U
U
U
CustomerBusiness
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Acronym Hell
PSTN - Public Switched Telephone Network. Global
interconnected telephony.
VoIP - Voice over IP. Internet-connected telephony.
SIP - Session Initiation Protocol. Standard used to manage
VoIP calling.
PBX - Private Branch eXchange. Private enterprise network.
@kelleyrobinson
☎ Phun Phact
The word "Hello" has only been around since 1827.
Thomas Edison popularized the greeting and urged
people to say "hello" when answering his phone.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THE PROBLEM:
UNWANTED ROBOCALLS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📈 Robocall spam & spoofing
• Automated dialing is cheap
• A lot of access points to the PSTN
• Easy to spoof "From" number
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
Legitimate use cases for masking phone numbers
Doctor calls from personal #
displays office number
Business calls from
contact center
displays toll-free callback
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
2009 Truth in Caller ID Act
• Spoofing is illegal if there is "intent to defraud, cause
harm or wrongly obtain anything of value"
• Difficult to enforce
@kelleyrobinson
☎ Phun Phact
Alexander Graham Bell campaigned to use
"Ahoy-hoy" as the standard telephone greeting
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT IS SHAKEN/STIR?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
LEMON-TWIST - LEveraging MOdels for
Enterprise dialiNg - Tnauth list With an
enterprise Identity Secured Token
@kelleyrobinson
😱
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Calls would have their caller ID
“signed” as legitimate by originating
carriers and validated by other carriers
before reaching consumers.
SHAKEN/STIR defined | FCC.gov
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Borrowing from other
web authentication
• Public Key Infrastructure (PKI)
• Certificates
• JSON Web Tokens (JWT)
• Similar to email's DKIM/DMARC
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📲Caller
Originating
Service Provider
Other
Service Providers
Terminating
Service Provider
🔒Signing Service
✅Verification Service
📳Callee
🏛Certificate
Authorities
SHAKEN/STIR
signing and verification
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Certificate authorities
• Approved by the STI-GA (Secure Telephone Identity
Governance Authority)
• Managed by ATIS (Alliance for Telecommunications
Industry Solutions)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SIP IDENTITY HEADER
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
{
"attest": "A", " Attestation Level
"dest": {"tn":["14155550101"]}, " Destination Phone #
"iat": 1548859982,
"orig": {"tn":"14155550171"}, " Origination Phone #
"origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254"
} " Orig. Customer ID
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Attestation Levels
I know this
customer
and they
can use
the calling
number
A
✅
I know the
customer
but I don't
know the
calling
number
B
🤷
I don't
know the
customer
but I know
where this
call came
from
C
🤔
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
]
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
- cryptographic signature
- certificate URL
- algorithm
- passport type
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
ENFORCEMENT
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TRACED Act
• Signed into law 2019-12-30
• Allows $10,000 fine for offenders
• Requires telecom companies to implement call
authentication in the next 18 months
(Telephone Robocall Abuse Criminal Enforcement Deterrence)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
• VOIP: Implement STIR/SHAKEN
• Non VOIP: "Reasonable measures to implement an effective call authentication framework"
TRACED Act
Authentication Requirements
@kelleyrobinson
☎ Phun Phact
Not every 555 number is fake. Only 555-0100
through 555-0199 are specifically reserved for
fictional use.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: TV Tropes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
LIMITATIONS OF SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
"The phone network is an
ungodly beast."
- Randy Weinberger, curmudgeon, telecom expert
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Part of the ungodly beast:
Time-division multiplexing (TDM)
• Physical switches used by the PSTN
• TRACED Act explicitly acknowledges TDM as a potential
burden to SHAKEN/STIR rollout
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
The long tail of service providers
• 4000 service providers in the US alone
• Requires significant investment to comply
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
And what about...
• Disconnected and reassigned phone numbers?
• International numbers and calls?
• Text messages?
@kelleyrobinson
☎ Phun Phact
Phone calls from The New York Times showed up
as (111) 111-1111 until 2011. They now use a (212)
number you can actually call back.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: NYTimes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT HAPPENS NEXT?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Ongoing legislation
• FCC gave telcos authority to block unwanted robocalls
without explicit subscriber permission
• TRACED Act enforcement will begin at the end of 2020
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Motivations driving implementation
• Consumer pressure to decrease robocalls
• Business pressure to increase answered calls
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
APPLICATION SECURITY
PROTECTIONS TODAY
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Mitigate damage from unwanted
inbound calls
• Protect your numbers from web scraping bots
• Don't assign sequential phone numbers to your employees
• Challenge suspicious callers with a voice CAPTCHA
• Use actual authentication in your call centers
• Install the FCC blacklist DB on your PBX
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Apps for spam detection
• Nomorobo, Robokiller, Call App, etc.
• AT&T partnership with Hiya
@kelleyrobinson
Telephony is complicated.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
But it will help rebuilt trust in telephony.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THANK YOU
@kelleyrobinson

Weitere ähnliche Inhalte

Was ist angesagt?

Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Clive Aldred
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Ryan Thurman
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Firdaus Fadzil
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcosmrkhanlodhi
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinarXINTEC
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - officialAyodele Thomas
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraudXINTEC
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consentAlexandria Bishop
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning pptHema Sharma
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)RaniPatil11
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions TeleSign Corporation
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationThomas McNally
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminarSreedevV
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technologymaham4569
 

Was ist angesagt? (20)

Subex cv akhil_singh_rawat
Subex cv akhil_singh_rawatSubex cv akhil_singh_rawat
Subex cv akhil_singh_rawat
 
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
 
Presentation antrax 30.10.13
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
 
FraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
 
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
 
IRSF Protection with PRISM
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
 
Mobile cloning report
Mobile cloning reportMobile cloning report
Mobile cloning report
 
Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
 
Reveneu frauds and telcos
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
 
International Revenue Share Fraud webinar
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
 
Fonreg presentation - official
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
 
Sim box fraud
Sim box fraudSim box fraud
Sim box fraud
 
Recording conversations without consent
Recording conversations without consentRecording conversations without consent
Recording conversations without consent
 
Cse mobile phone cloning ppt
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
 
shubhadappt(3273)
shubhadappt(3273)shubhadappt(3273)
shubhadappt(3273)
 
How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions How to Increase Mobile Registration Conversions
How to Increase Mobile Registration Conversions
 
Neustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
 
Cell phone cloning seminar
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
 
Mobile Cloning Technology
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
 
Sim box
Sim boxSim box
Sim box
 

Ähnlich wie Intro to SHAKEN/STIR

Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIRKelley Robinson
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldKelley Robinson
 
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays
 
Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street MAD//Fest London
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
 
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFThe Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFMichael Einbinder-Schatz
 
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019Elizabeth (Lizzie) Siegle
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...apidays
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAKelley Robinson
 
Tips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part IITips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part IICSFCorp
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseKelley Robinson
 
Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)Financial Poise
 
POPI and Email Marketing
POPI and Email Marketing POPI and Email Marketing
POPI and Email Marketing Everlytic
 
How to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the CloudHow to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the CloudDaniel Zivkovic
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationForgeRock
 
1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_OctSamantha Park
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Alan Quayle
 
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020Elizabeth (Lizzie) Siegle
 

Ähnlich wie Intro to SHAKEN/STIR (20)

Introduction to SHAKEN/STIR
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIR
 
Designing customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
 
2FA Best Practices
2FA Best Practices2FA Best Practices
2FA Best Practices
 
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
 
Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street
 
Identity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
 
PSD2, SCA, WTF?
PSD2, SCA, WTF?PSD2, SCA, WTF?
PSD2, SCA, WTF?
 
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDFThe Ultimate Guide To Choosing the RIGHT VoIP System.PDF
The Ultimate Guide To Choosing the RIGHT VoIP System.PDF
 
Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019Chatbots & Voice Assistants London March 2019
Chatbots & Voice Assistants London March 2019
 
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
2022 apidays LIVE Helsinki & North_APIs are the Last Missing Piece to Enable ...
 
Identiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
 
Tips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part IITips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part II
 
Protecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
 
Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)
 
POPI and Email Marketing
POPI and Email Marketing POPI and Email Marketing
POPI and Email Marketing
 
How to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the CloudHow to augment On-premise Call Centers to Scale-out to the Cloud
How to augment On-premise Call Centers to Scale-out to the Cloud
 
Identity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
 
1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct
 
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
 
Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020Autopilot workshop for Brazil Hackathon 4/2020
Autopilot workshop for Brazil Hackathon 4/2020
 

Mehr von Kelley Robinson

Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Kelley Robinson
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authenticationKelley Robinson
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key CryptographyKelley Robinson
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala CommunityKelley Robinson
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationKelley Robinson
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ StartupsKelley Robinson
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center AuthenticationKelley Robinson
 
Authentication Beyond SMS
Authentication Beyond SMSAuthentication Beyond SMS
Authentication Beyond SMSKelley Robinson
 
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling AuthenticationBSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling AuthenticationKelley Robinson
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical CryptographyKelley Robinson
 
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Kelley Robinson
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaKelley Robinson
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaKelley Robinson
 

Mehr von Kelley Robinson (20)

Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)Preventing phone verification fraud (SMS pumping)
Preventing phone verification fraud (SMS pumping)
 
Auth on the web: better authentication
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
 
WebAuthn
WebAuthnWebAuthn
WebAuthn
 
Introduction to Public Key Cryptography
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
 
2FA in 2020 and Beyond
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and Beyond
 
Building a Better Scala Community
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
 
BSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
 
Communication @ Startups
Communication @ StartupsCommunication @ Startups
Communication @ Startups
 
Contact Center Authentication
Contact Center AuthenticationContact Center Authentication
Contact Center Authentication
 
Authentication Beyond SMS
Authentication Beyond SMSAuthentication Beyond SMS
Authentication Beyond SMS
 
BSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling AuthenticationBSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
 
SIGNAL - Practical Cryptography
SIGNAL - Practical CryptographySIGNAL - Practical Cryptography
SIGNAL - Practical Cryptography
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
2FA, WTF!?
2FA, WTF!?2FA, WTF!?
2FA, WTF!?
 
2FA WTF
2FA WTF2FA WTF
2FA WTF
 
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
 
Practical Cryptography
Practical CryptographyPractical Cryptography
Practical Cryptography
 
Analyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
 
2FA, OTP, WTF?
2FA, OTP, WTF?2FA, OTP, WTF?
2FA, OTP, WTF?
 

Kürzlich hochgeladen

Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueBhangaleSonal
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTbhaskargani46
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756dollysharma2066
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Bookingroncy bisnoi
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Christo Ananth
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdfSuman Jyoti
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 

Kürzlich hochgeladen (20)

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Double Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torqueDouble Revolving field theory-how the rotor develops torque
Double Revolving field theory-how the rotor develops torque
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024Water Industry Process Automation & Control Monthly - April 2024
Water Industry Process Automation & Control Monthly - April 2024
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...Call for Papers - International Journal of Intelligent Systems and Applicatio...
Call for Papers - International Journal of Intelligent Systems and Applicatio...
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank  Design by Working Stress - IS Method.pdfIntze Overhead Water Tank  Design by Working Stress - IS Method.pdf
Intze Overhead Water Tank Design by Working Stress - IS Method.pdf
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 

Intro to SHAKEN/STIR

  • 1. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR Kelley Robinson Account Security Team, Twilio @kelleyrobinson © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 2. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 3. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 54.6B US SPAM CALLS IN 2019 GREW 108% SINCE 2018 @kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
  • 4. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 5. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 6. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 7. TABLE OF CONTENTS © 2019 TWILIO INC. ALL RIGHTS RESERVED. 1. Telephony "security" 2. SHAKEN/STIR explained 3. Regulation & Limitations 4. What will happen next?
  • 8. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TELEPHONY "SECURITY"
  • 9. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony 30 Years Ago AMERITECH AT&T US WEST NYNEX Business Customer
  • 10. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony Today AMERITECH AT&T US WEST NYNEX U U U U U U U U U U U U U U U CustomerBusiness
  • 11. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Acronym Hell PSTN - Public Switched Telephone Network. Global interconnected telephony. VoIP - Voice over IP. Internet-connected telephony. SIP - Session Initiation Protocol. Standard used to manage VoIP calling. PBX - Private Branch eXchange. Private enterprise network. @kelleyrobinson
  • 12. ☎ Phun Phact The word "Hello" has only been around since 1827. Thomas Edison popularized the greeting and urged people to say "hello" when answering his phone. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 13. © 2019 TWILIO INC. ALL RIGHTS RESERVED. THE PROBLEM: UNWANTED ROBOCALLS
  • 14. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📈 Robocall spam & spoofing • Automated dialing is cheap • A lot of access points to the PSTN • Easy to spoof "From" number @kelleyrobinson
  • 15. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson Legitimate use cases for masking phone numbers Doctor calls from personal # displays office number Business calls from contact center displays toll-free callback
  • 16. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 2009 Truth in Caller ID Act • Spoofing is illegal if there is "intent to defraud, cause harm or wrongly obtain anything of value" • Difficult to enforce @kelleyrobinson
  • 17. ☎ Phun Phact Alexander Graham Bell campaigned to use "Ahoy-hoy" as the standard telephone greeting © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 18. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT IS SHAKEN/STIR?
  • 19. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited @kelleyrobinson
  • 20. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited LEMON-TWIST - LEveraging MOdels for Enterprise dialiNg - Tnauth list With an enterprise Identity Secured Token @kelleyrobinson 😱
  • 21. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Calls would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. SHAKEN/STIR defined | FCC.gov
  • 22. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Borrowing from other web authentication • Public Key Infrastructure (PKI) • Certificates • JSON Web Tokens (JWT) • Similar to email's DKIM/DMARC @kelleyrobinson
  • 23. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📲Caller Originating Service Provider Other Service Providers Terminating Service Provider 🔒Signing Service ✅Verification Service 📳Callee 🏛Certificate Authorities SHAKEN/STIR signing and verification
  • 24. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Certificate authorities • Approved by the STI-GA (Secure Telephone Identity Governance Authority) • Managed by ATIS (Alliance for Telecommunications Industry Solutions) @kelleyrobinson
  • 25. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SIP IDENTITY HEADER
  • 26. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 @kelleyrobinson
  • 27. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken @kelleyrobinson
  • 28. © 2019 TWILIO INC. ALL RIGHTS RESERVED. dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken { "attest": "A", " Attestation Level "dest": {"tn":["14155550101"]}, " Destination Phone # "iat": 1548859982, "orig": {"tn":"14155550171"}, " Origination Phone # "origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254" } " Orig. Customer ID @kelleyrobinson
  • 29. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Attestation Levels I know this customer and they can use the calling number A ✅ I know the customer but I don't know the calling number B 🤷 I don't know the customer but I know where this call came from C 🤔
  • 30. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ] MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken - cryptographic signature - certificate URL - algorithm - passport type @kelleyrobinson
  • 31. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ENFORCEMENT
  • 32. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TRACED Act • Signed into law 2019-12-30 • Allows $10,000 fine for offenders • Requires telecom companies to implement call authentication in the next 18 months (Telephone Robocall Abuse Criminal Enforcement Deterrence) @kelleyrobinson
  • 33. © 2019 TWILIO INC. ALL RIGHTS RESERVED. • VOIP: Implement STIR/SHAKEN • Non VOIP: "Reasonable measures to implement an effective call authentication framework" TRACED Act Authentication Requirements @kelleyrobinson
  • 34. ☎ Phun Phact Not every 555 number is fake. Only 555-0100 through 555-0199 are specifically reserved for fictional use. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: TV Tropes
  • 35. © 2019 TWILIO INC. ALL RIGHTS RESERVED. LIMITATIONS OF SHAKEN/STIR
  • 36. © 2019 TWILIO INC. ALL RIGHTS RESERVED. "The phone network is an ungodly beast." - Randy Weinberger, curmudgeon, telecom expert
  • 37. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Part of the ungodly beast: Time-division multiplexing (TDM) • Physical switches used by the PSTN • TRACED Act explicitly acknowledges TDM as a potential burden to SHAKEN/STIR rollout @kelleyrobinson
  • 38. © 2019 TWILIO INC. ALL RIGHTS RESERVED. The long tail of service providers • 4000 service providers in the US alone • Requires significant investment to comply @kelleyrobinson
  • 39. © 2019 TWILIO INC. ALL RIGHTS RESERVED. And what about... • Disconnected and reassigned phone numbers? • International numbers and calls? • Text messages? @kelleyrobinson
  • 40. ☎ Phun Phact Phone calls from The New York Times showed up as (111) 111-1111 until 2011. They now use a (212) number you can actually call back. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: NYTimes
  • 41. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT HAPPENS NEXT?
  • 42. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Ongoing legislation • FCC gave telcos authority to block unwanted robocalls without explicit subscriber permission • TRACED Act enforcement will begin at the end of 2020 @kelleyrobinson
  • 43. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Motivations driving implementation • Consumer pressure to decrease robocalls • Business pressure to increase answered calls @kelleyrobinson
  • 44. © 2019 TWILIO INC. ALL RIGHTS RESERVED. APPLICATION SECURITY PROTECTIONS TODAY
  • 45. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Mitigate damage from unwanted inbound calls • Protect your numbers from web scraping bots • Don't assign sequential phone numbers to your employees • Challenge suspicious callers with a voice CAPTCHA • Use actual authentication in your call centers • Install the FCC blacklist DB on your PBX @kelleyrobinson
  • 46. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Apps for spam detection • Nomorobo, Robokiller, Call App, etc. • AT&T partnership with Hiya @kelleyrobinson
  • 47. Telephony is complicated. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 48. Telephony is complicated. SHAKEN/STIR won't fix everything. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 49. Telephony is complicated. SHAKEN/STIR won't fix everything. But it will help rebuilt trust in telephony. © 2019 TWILIO INC. ALL RIGHTS RESERVED.