Intro to SHAKEN/STIR

What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
Kelley Robinson
Account Security Team, Twilio
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
54.6B
US SPAM CALLS IN 2019
GREW 108% SINCE 2018
@kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
What if we had TLS
for phone numbers?
An introduction to SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TABLE OF CONTENTS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
1. Telephony "security"
2. SHAKEN/STIR explained
3. Regulation & Limitations
4. What will happen next?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TELEPHONY "SECURITY"
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony 30 Years Ago
AMERITECH
AT&T US WEST
NYNEX
Business Customer
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony Today
AMERITECH
AT&T
US WEST
NYNEX
U
U
U
U
U
U
U
U
U U
U
U
U
U
U
CustomerBusiness
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Acronym Hell
PSTN - Public Switched Telephone Network. Global
interconnected telephony.
VoIP - Voice over IP. Internet-connected telephony.
SIP - Session Initiation Protocol. Standard used to manage
VoIP calling.
PBX - Private Branch eXchange. Private enterprise network.
@kelleyrobinson
☎ Phun Phact
The word "Hello" has only been around since 1827.
Thomas Edison popularized the greeting and urged
people to say "hello" when answering his phone.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THE PROBLEM:
UNWANTED ROBOCALLS
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📈 Robocall spam & spoofing
• Automated dialing is cheap
• A lot of access points to the PSTN
• Easy to spoof "From" number
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
@kelleyrobinson
Legitimate use cases for masking phone numbers
Doctor calls from personal #
displays office number
Business calls from
contact center
displays toll-free callback
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
2009 Truth in Caller ID Act
• Spoofing is illegal if there is "intent to defraud, cause
harm or wrongly obtain anything of value"
• Difficult to enforce
@kelleyrobinson
☎ Phun Phact
Alexander Graham Bell campaigned to use
"Ahoy-hoy" as the standard telephone greeting
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: What is Ahoy?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT IS SHAKEN/STIR?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SHAKEN - Signature-based Handling of
Asserted information using toKENs
STIR - Secure Telephony Identity Revisited
LEMON-TWIST - LEveraging MOdels for
Enterprise dialiNg - Tnauth list With an
enterprise Identity Secured Token
@kelleyrobinson
😱
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Calls would have their caller ID
“signed” as legitimate by originating
carriers and validated by other carriers
before reaching consumers.
SHAKEN/STIR defined | FCC.gov
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Borrowing from other
web authentication
• Public Key Infrastructure (PKI)
• Certificates
• JSON Web Tokens (JWT)
• Similar to email's DKIM/DMARC
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
📲Caller
Originating
Service Provider
Other
Service Providers
Terminating
Service Provider
🔒Signing Service
✅Verification Service
📳Callee
🏛Certificate
Authorities
SHAKEN/STIR
signing and verification
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Certificate authorities
• Approved by the STI-GA (Secure Telephone Identity
Governance Authority)
• Managed by ATIS (Alliance for Telecommunications
Industry Solutions)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
SIP IDENTITY HEADER
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
{
"attest": "A", " Attestation Level
"dest": {"tn":["14155550101"]}, " Destination Phone #
"iat": 1548859982,
"orig": {"tn":"14155550171"}, " Origination Phone #
"origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254"
} " Orig. Customer ID
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Attestation Levels
I know this
customer
and they
can use
the calling
number
A
✅
I know the
customer
but I don't
know the
calling
number
B
🤷
I don't
know the
customer
but I know
where this
call came
from
C
🤔
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
]
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
INVITE sip:14151234567@twilio.com:5060 SIP/2.0
Via: SIP/2.0/UDP example.com:5060
From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789
To: "Bob" sip:14155550101@1.2.3.4:5060
Call-ID: 1-12345@5.6.7.8
CSeq: 1 INVITE
Max-Forwards: 70
Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc
3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz
dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT
U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N
TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy
MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW-
dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https://
certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken
- cryptographic signature
- certificate URL
- algorithm
- passport type
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
ENFORCEMENT
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
TRACED Act
• Signed into law 2019-12-30
• Allows $10,000 fine for offenders
• Requires telecom companies to implement call
authentication in the next 18 months
(Telephone Robocall Abuse Criminal Enforcement Deterrence)
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
• VOIP: Implement STIR/SHAKEN
• Non VOIP: "Reasonable measures to implement an effective call authentication framework"
TRACED Act
Authentication Requirements
@kelleyrobinson
☎ Phun Phact
Not every 555 number is fake. Only 555-0100
through 555-0199 are specifically reserved for
fictional use.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: TV Tropes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
LIMITATIONS OF SHAKEN/STIR
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
"The phone network is an
ungodly beast."
- Randy Weinberger, curmudgeon, telecom expert
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Part of the ungodly beast:
Time-division multiplexing (TDM)
• Physical switches used by the PSTN
• TRACED Act explicitly acknowledges TDM as a potential
burden to SHAKEN/STIR rollout
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
The long tail of service providers
• 4000 service providers in the US alone
• Requires significant investment to comply
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
And what about...
• Disconnected and reassigned phone numbers?
• International numbers and calls?
• Text messages?
@kelleyrobinson
☎ Phun Phact
Phone calls from The New York Times showed up
as (111) 111-1111 until 2011. They now use a (212)
number you can actually call back.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Source: NYTimes
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
WHAT HAPPENS NEXT?
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Ongoing legislation
• FCC gave telcos authority to block unwanted robocalls
without explicit subscriber permission
• TRACED Act enforcement will begin at the end of 2020
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Motivations driving implementation
• Consumer pressure to decrease robocalls
• Business pressure to increase answered calls
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
APPLICATION SECURITY
PROTECTIONS TODAY
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Mitigate damage from unwanted
inbound calls
• Protect your numbers from web scraping bots
• Don't assign sequential phone numbers to your employees
• Challenge suspicious callers with a voice CAPTCHA
• Use actual authentication in your call centers
• Install the FCC blacklist DB on your PBX
@kelleyrobinson
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Apps for spam detection
• Nomorobo, Robokiller, Call App, etc.
• AT&T partnership with Hiya
@kelleyrobinson
Telephony is complicated.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
Telephony is complicated.
SHAKEN/STIR won't fix everything.
But it will help rebuilt trust in telephony.
© 2019 TWILIO INC. ALL RIGHTS RESERVED.
THANK YOU
@kelleyrobinson
1 of 50

Recommended

Battling Robocallers - How to Implement STIR-SHAKEN by
Battling Robocallers - How to Implement STIR-SHAKENBattling Robocallers - How to Implement STIR-SHAKEN
Battling Robocallers - How to Implement STIR-SHAKENAlan Percy
767 views30 slides
STIR-SHAKEN Top 10 FAQ by
STIR-SHAKEN Top 10 FAQSTIR-SHAKEN Top 10 FAQ
STIR-SHAKEN Top 10 FAQAlan Percy
1K views32 slides
Effective STIR/SHAKEN and Robocall Solutions that Work Today by
Effective STIR/SHAKEN and Robocall Solutions that Work TodayEffective STIR/SHAKEN and Robocall Solutions that Work Today
Effective STIR/SHAKEN and Robocall Solutions that Work TodayDonaldStDenis1
92 views27 slides
Battling Robocall Fraud with STIR/SHAKEN by
Battling Robocall Fraud with STIR/SHAKENBattling Robocall Fraud with STIR/SHAKEN
Battling Robocall Fraud with STIR/SHAKENAlan Percy
1.4K views30 slides
The Legality of Call Recording by
The Legality of Call RecordingThe Legality of Call Recording
The Legality of Call RecordingShoreTel
7.1K views18 slides
Top 10 Inbound And Outbound Calling Compliance Issues by
Top 10 Inbound And Outbound Calling Compliance IssuesTop 10 Inbound And Outbound Calling Compliance Issues
Top 10 Inbound And Outbound Calling Compliance IssuesRyan Thurman
3.5K views20 slides

More Related Content

What's hot

Subex cv akhil_singh_rawat by
Subex cv akhil_singh_rawatSubex cv akhil_singh_rawat
Subex cv akhil_singh_rawatAkhil Singh Rawat
295 views1 slide
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau... by
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Clive Aldred
2K views72 slides
Presentation antrax 30.10.13 by
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13Olya Saiko
2.2K views40 slides
FraudStrike Bringing IRSF Under Control by
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under ControlRichard Hickson
325 views9 slides
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen... by
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Ryan Thurman
522 views49 slides
IRSF Protection with PRISM by
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISMXINTEC
1.5K views31 slides

What's hot(20)

Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau... by Clive Aldred
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Talking Telephone Numbers - A History of Telephone Fraud - Modem Dialler Frau...
Clive Aldred2K views
Presentation antrax 30.10.13 by Olya Saiko
Presentation antrax 30.10.13Presentation antrax 30.10.13
Presentation antrax 30.10.13
Olya Saiko2.2K views
FraudStrike Bringing IRSF Under Control by Richard Hickson
FraudStrike Bringing IRSF Under ControlFraudStrike Bringing IRSF Under Control
FraudStrike Bringing IRSF Under Control
Richard Hickson325 views
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen... by Ryan Thurman
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Mobile Communications Marketing: Effective Compliance Strategies to Avoid Pen...
Ryan Thurman522 views
IRSF Protection with PRISM by XINTEC
IRSF Protection with PRISMIRSF Protection with PRISM
IRSF Protection with PRISM
XINTEC1.5K views
Telecom Cambodia - SIM Box Issue 2013 by Firdaus Fadzil
Telecom Cambodia - SIM Box Issue 2013Telecom Cambodia - SIM Box Issue 2013
Telecom Cambodia - SIM Box Issue 2013
Firdaus Fadzil2.5K views
Reveneu frauds and telcos by mrkhanlodhi
Reveneu frauds and telcosReveneu frauds and telcos
Reveneu frauds and telcos
mrkhanlodhi1.5K views
International Revenue Share Fraud webinar by XINTEC
International Revenue Share Fraud webinarInternational Revenue Share Fraud webinar
International Revenue Share Fraud webinar
XINTEC4.5K views
Fonreg presentation - official by Ayodele Thomas
Fonreg presentation - officialFonreg presentation - official
Fonreg presentation - official
Ayodele Thomas121 views
Sim box fraud by XINTEC
Sim box fraudSim box fraud
Sim box fraud
XINTEC4.1K views
Cse mobile phone cloning ppt by Hema Sharma
Cse mobile phone cloning pptCse mobile phone cloning ppt
Cse mobile phone cloning ppt
Hema Sharma10.7K views
Neustar guide to_tcpa_risk_mitigation by Thomas McNally
Neustar guide to_tcpa_risk_mitigationNeustar guide to_tcpa_risk_mitigation
Neustar guide to_tcpa_risk_mitigation
Thomas McNally298 views
Cell phone cloning seminar by SreedevV
Cell phone cloning seminarCell phone cloning seminar
Cell phone cloning seminar
SreedevV359 views
Mobile Cloning Technology by maham4569
Mobile Cloning TechnologyMobile Cloning Technology
Mobile Cloning Technology
maham45691.7K views

Similar to Intro to SHAKEN/STIR

Introduction to SHAKEN/STIR by
Introduction to SHAKEN/STIRIntroduction to SHAKEN/STIR
Introduction to SHAKEN/STIRKelley Robinson
104 views40 slides
Designing customer account recovery in a 2FA world by
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA worldKelley Robinson
341 views35 slides
2FA Best Practices by
2FA Best Practices2FA Best Practices
2FA Best PracticesKelley Robinson
381 views33 slides
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee... by
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays
408 views13 slides
Workshop: Conversational Commerce: A Two Way Street by
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street MAD//Fest London
92 views42 slides
Identity, Authentication, and Programmable Telecoms Session by
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms SessionAlan Quayle
231 views24 slides

Similar to Intro to SHAKEN/STIR(20)

Designing customer account recovery in a 2FA world by Kelley Robinson
Designing customer account recovery in a 2FA worldDesigning customer account recovery in a 2FA world
Designing customer account recovery in a 2FA world
Kelley Robinson341 views
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee... by apidays
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays LIVE New York 2021 - Communications APIs Against COVID by Charlie Wee...
apidays408 views
Workshop: Conversational Commerce: A Two Way Street by MAD//Fest London
Workshop: Conversational Commerce: A Two Way Street Workshop: Conversational Commerce: A Two Way Street
Workshop: Conversational Commerce: A Two Way Street
MAD//Fest London92 views
Identity, Authentication, and Programmable Telecoms Session by Alan Quayle
Identity, Authentication, and Programmable Telecoms SessionIdentity, Authentication, and Programmable Telecoms Session
Identity, Authentication, and Programmable Telecoms Session
Alan Quayle231 views
Identiverse 2020 - Account Recovery with 2FA by Kelley Robinson
Identiverse 2020 - Account Recovery with 2FAIdentiverse 2020 - Account Recovery with 2FA
Identiverse 2020 - Account Recovery with 2FA
Kelley Robinson494 views
Tips and Tricks for 8MS Part II by CSFCorp
Tips and Tricks for 8MS Part IITips and Tricks for 8MS Part II
Tips and Tricks for 8MS Part II
CSFCorp51 views
Protecting your phone verification flow from fraud & abuse by Kelley Robinson
Protecting your phone verification flow from fraud & abuseProtecting your phone verification flow from fraud & abuse
Protecting your phone verification flow from fraud & abuse
Kelley Robinson160 views
Data Privacy & Security 101 (Series: One Hour Law School) by Financial Poise
Data Privacy & Security 101 (Series: One Hour Law School)Data Privacy & Security 101 (Series: One Hour Law School)
Data Privacy & Security 101 (Series: One Hour Law School)
Financial Poise111 views
POPI and Email Marketing by Everlytic
POPI and Email Marketing POPI and Email Marketing
POPI and Email Marketing
Everlytic1.1K views
Identity Live Singapore 2018 Keynote Presentation by ForgeRock
Identity Live Singapore 2018 Keynote PresentationIdentity Live Singapore 2018 Keynote Presentation
Identity Live Singapore 2018 Keynote Presentation
ForgeRock435 views
1991 Leg Makes a Comeback_Sept_Oct by Samantha Park
1991 Leg Makes a Comeback_Sept_Oct1991 Leg Makes a Comeback_Sept_Oct
1991 Leg Makes a Comeback_Sept_Oct
Samantha Park34 views
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c... by Alan Quayle
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Skype 1 – 0 Robocalls: How TeleSign helped Skype “Score” against fraudulent c...
Alan Quayle161 views

More from Kelley Robinson

Auth on the web: better authentication by
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authenticationKelley Robinson
138 views40 slides
WebAuthn by
WebAuthnWebAuthn
WebAuthnKelley Robinson
338 views41 slides
Introduction to Public Key Cryptography by
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key CryptographyKelley Robinson
218 views41 slides
2FA in 2020 and Beyond by
2FA in 2020 and Beyond2FA in 2020 and Beyond
2FA in 2020 and BeyondKelley Robinson
213 views44 slides
Building a Better Scala Community by
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala CommunityKelley Robinson
355 views49 slides
BSides SF - Contact Center Authentication by
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center AuthenticationKelley Robinson
382 views42 slides

More from Kelley Robinson(20)

Auth on the web: better authentication by Kelley Robinson
Auth on the web: better authenticationAuth on the web: better authentication
Auth on the web: better authentication
Kelley Robinson138 views
Introduction to Public Key Cryptography by Kelley Robinson
Introduction to Public Key CryptographyIntroduction to Public Key Cryptography
Introduction to Public Key Cryptography
Kelley Robinson218 views
Building a Better Scala Community by Kelley Robinson
Building a Better Scala CommunityBuilding a Better Scala Community
Building a Better Scala Community
Kelley Robinson355 views
BSides SF - Contact Center Authentication by Kelley Robinson
BSides SF - Contact Center AuthenticationBSides SF - Contact Center Authentication
BSides SF - Contact Center Authentication
Kelley Robinson382 views
BSides PDX - Threat Modeling Authentication by Kelley Robinson
BSides PDX - Threat Modeling AuthenticationBSides PDX - Threat Modeling Authentication
BSides PDX - Threat Modeling Authentication
Kelley Robinson325 views
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018 by Kelley Robinson
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Analyzing Pwned Passwords with Spark - OWASP Meetup July 2018
Kelley Robinson185 views
Analyzing Pwned Passwords with Spark and Scala by Kelley Robinson
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Kelley Robinson445 views
Analyzing Pwned Passwords with Spark and Scala by Kelley Robinson
Analyzing Pwned Passwords with Spark and ScalaAnalyzing Pwned Passwords with Spark and Scala
Analyzing Pwned Passwords with Spark and Scala
Kelley Robinson632 views
Forget what you think you know: Redefining functional programming for Scala by Kelley Robinson
Forget what you think you know: Redefining functional programming for ScalaForget what you think you know: Redefining functional programming for Scala
Forget what you think you know: Redefining functional programming for Scala
Kelley Robinson1.8K views

Recently uploaded

Digital Watermarking Of Audio Signals.pptx by
Digital Watermarking Of Audio Signals.pptxDigital Watermarking Of Audio Signals.pptx
Digital Watermarking Of Audio Signals.pptxAyushJaiswal781174
8 views25 slides
Deutsch Crimping by
Deutsch CrimpingDeutsch Crimping
Deutsch CrimpingIwiss Tools Co.,Ltd
19 views7 slides
Pull down shoulder press final report docx (1).pdf by
Pull down shoulder press final report docx (1).pdfPull down shoulder press final report docx (1).pdf
Pull down shoulder press final report docx (1).pdfComsat Universal Islamabad Wah Campus
8 views25 slides
An approach of ontology and knowledge base for railway maintenance by
An approach of ontology and knowledge base for railway maintenanceAn approach of ontology and knowledge base for railway maintenance
An approach of ontology and knowledge base for railway maintenanceIJECEIAES
12 views14 slides
Thermal aware task assignment for multicore processors using genetic algorithm by
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm IJECEIAES
29 views12 slides
SEMI CONDUCTORS by
SEMI CONDUCTORSSEMI CONDUCTORS
SEMI CONDUCTORSpavaniaalla2005
19 views8 slides

Recently uploaded(20)

An approach of ontology and knowledge base for railway maintenance by IJECEIAES
An approach of ontology and knowledge base for railway maintenanceAn approach of ontology and knowledge base for railway maintenance
An approach of ontology and knowledge base for railway maintenance
IJECEIAES12 views
Thermal aware task assignment for multicore processors using genetic algorithm by IJECEIAES
Thermal aware task assignment for multicore processors using genetic algorithm Thermal aware task assignment for multicore processors using genetic algorithm
Thermal aware task assignment for multicore processors using genetic algorithm
IJECEIAES29 views
Electronic Devices - Integrated Circuit.pdf by booksarpita
Electronic Devices - Integrated Circuit.pdfElectronic Devices - Integrated Circuit.pdf
Electronic Devices - Integrated Circuit.pdf
booksarpita11 views
Multi-objective distributed generation integration in radial distribution sy... by IJECEIAES
Multi-objective distributed generation integration in radial  distribution sy...Multi-objective distributed generation integration in radial  distribution sy...
Multi-objective distributed generation integration in radial distribution sy...
IJECEIAES15 views
A multi-microcontroller-based hardware for deploying Tiny machine learning mo... by IJECEIAES
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
A multi-microcontroller-based hardware for deploying Tiny machine learning mo...
IJECEIAES10 views
2_DVD_ASIC_Design_FLow.pdf by Usha Mehta
2_DVD_ASIC_Design_FLow.pdf2_DVD_ASIC_Design_FLow.pdf
2_DVD_ASIC_Design_FLow.pdf
Usha Mehta14 views
fakenews_DBDA_Mar23.pptx by deepmitra8
fakenews_DBDA_Mar23.pptxfakenews_DBDA_Mar23.pptx
fakenews_DBDA_Mar23.pptx
deepmitra812 views
13_DVD_Latch-up_prevention.pdf by Usha Mehta
13_DVD_Latch-up_prevention.pdf13_DVD_Latch-up_prevention.pdf
13_DVD_Latch-up_prevention.pdf
Usha Mehta9 views
What is Whirling Hygrometer.pdf by IIT KHARAGPUR
What is Whirling Hygrometer.pdfWhat is Whirling Hygrometer.pdf
What is Whirling Hygrometer.pdf
IIT KHARAGPUR 11 views

Intro to SHAKEN/STIR

  • 1. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR Kelley Robinson Account Security Team, Twilio @kelleyrobinson © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 2. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 3. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 54.6B US SPAM CALLS IN 2019 GREW 108% SINCE 2018 @kelleyrobinson https://www.businesswire.com/news/home/20191213005058/en/Spam-Calls-Grew-108-2019-Anti-Robocall-Bill
  • 4. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 5. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson
  • 6. What if we had TLS for phone numbers? An introduction to SHAKEN/STIR © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 7. TABLE OF CONTENTS © 2019 TWILIO INC. ALL RIGHTS RESERVED. 1. Telephony "security" 2. SHAKEN/STIR explained 3. Regulation & Limitations 4. What will happen next?
  • 8. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TELEPHONY "SECURITY"
  • 9. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony 30 Years Ago AMERITECH AT&T US WEST NYNEX Business Customer
  • 10. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Telephony Today AMERITECH AT&T US WEST NYNEX U U U U U U U U U U U U U U U CustomerBusiness
  • 11. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Acronym Hell PSTN - Public Switched Telephone Network. Global interconnected telephony. VoIP - Voice over IP. Internet-connected telephony. SIP - Session Initiation Protocol. Standard used to manage VoIP calling. PBX - Private Branch eXchange. Private enterprise network. @kelleyrobinson
  • 12. ☎ Phun Phact The word "Hello" has only been around since 1827. Thomas Edison popularized the greeting and urged people to say "hello" when answering his phone. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 13. © 2019 TWILIO INC. ALL RIGHTS RESERVED. THE PROBLEM: UNWANTED ROBOCALLS
  • 14. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📈 Robocall spam & spoofing • Automated dialing is cheap • A lot of access points to the PSTN • Easy to spoof "From" number @kelleyrobinson
  • 15. © 2019 TWILIO INC. ALL RIGHTS RESERVED. @kelleyrobinson Legitimate use cases for masking phone numbers Doctor calls from personal # displays office number Business calls from contact center displays toll-free callback
  • 16. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 2009 Truth in Caller ID Act • Spoofing is illegal if there is "intent to defraud, cause harm or wrongly obtain anything of value" • Difficult to enforce @kelleyrobinson
  • 17. ☎ Phun Phact Alexander Graham Bell campaigned to use "Ahoy-hoy" as the standard telephone greeting © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: What is Ahoy?
  • 18. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT IS SHAKEN/STIR?
  • 19. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited @kelleyrobinson
  • 20. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SHAKEN - Signature-based Handling of Asserted information using toKENs STIR - Secure Telephony Identity Revisited LEMON-TWIST - LEveraging MOdels for Enterprise dialiNg - Tnauth list With an enterprise Identity Secured Token @kelleyrobinson 😱
  • 21. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Calls would have their caller ID “signed” as legitimate by originating carriers and validated by other carriers before reaching consumers. SHAKEN/STIR defined | FCC.gov
  • 22. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Borrowing from other web authentication • Public Key Infrastructure (PKI) • Certificates • JSON Web Tokens (JWT) • Similar to email's DKIM/DMARC @kelleyrobinson
  • 23. © 2019 TWILIO INC. ALL RIGHTS RESERVED. 📲Caller Originating Service Provider Other Service Providers Terminating Service Provider 🔒Signing Service ✅Verification Service 📳Callee 🏛Certificate Authorities SHAKEN/STIR signing and verification
  • 24. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Certificate authorities • Approved by the STI-GA (Secure Telephone Identity Governance Authority) • Managed by ATIS (Alliance for Telecommunications Industry Solutions) @kelleyrobinson
  • 25. © 2019 TWILIO INC. ALL RIGHTS RESERVED. SIP IDENTITY HEADER
  • 26. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 @kelleyrobinson
  • 27. © 2019 TWILIO INC. ALL RIGHTS RESERVED. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken @kelleyrobinson
  • 28. © 2019 TWILIO INC. ALL RIGHTS RESERVED. dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9. INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken { "attest": "A", " Attestation Level "dest": {"tn":["14155550101"]}, " Destination Phone # "iat": 1548859982, "orig": {"tn":"14155550171"}, " Origination Phone # "origid": "a17afcb5-2965-4837-a9e6-0e6b3f521254" } " Orig. Customer ID @kelleyrobinson
  • 29. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Attestation Levels I know this customer and they can use the calling number A ✅ I know the customer but I don't know the calling number B 🤷 I don't know the customer but I know where this call came from C 🤔
  • 30. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ] MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken INVITE sip:14151234567@twilio.com:5060 SIP/2.0 Via: SIP/2.0/UDP example.com:5060 From: "Alice" sip:14155555555@5.6.7.8:5060;tag=123456789 To: "Bob" sip:14155550101@1.2.3.4:5060 Call-ID: 1-12345@5.6.7.8 CSeq: 1 INVITE Max-Forwards: 70 Identity: eyJhbGciOiAiRVMyNTYiLCJwcHQiOiAic2hha2VuIiwidHlwIjogInBhc 3Nwb3J0IiwieDV1IjogImh0dHBzOi8vY2VydGlmaWNhdGVzLnR3aWxpby5jb20vdGVz dGNlcnQuY3J0In0=.eyJhdHRlc3QiOiAiQSIsImRlc3QiOiB7InRuIjogWyIxNDE1NT U1MDEwMSJdfSwiaWF0IjogMTU0ODg1OTk4Miwib3JpZyI6IHsidG4iOiAiMTQxNTU1N TU1NTUifSwib3JpZ2lkIjogImExN2FmY2I1LTI5NjUtNDgzNy1hOWU2LTBlNmIzZjUy MTI1NCJ9.S_vqkgCk88ee9rtk89P6a6ru0ncDfSrdb1GyK_mJj-10hsLW- dMF7eCjDYARLR7EZSZwiu0fd4H_QD_9Z5U2bg;info=https:// certificates.twilio.com/testcert.crt;alg=ES256;ppt=shaken - cryptographic signature - certificate URL - algorithm - passport type @kelleyrobinson
  • 31. © 2019 TWILIO INC. ALL RIGHTS RESERVED. ENFORCEMENT
  • 32. © 2019 TWILIO INC. ALL RIGHTS RESERVED. TRACED Act • Signed into law 2019-12-30 • Allows $10,000 fine for offenders • Requires telecom companies to implement call authentication in the next 18 months (Telephone Robocall Abuse Criminal Enforcement Deterrence) @kelleyrobinson
  • 33. © 2019 TWILIO INC. ALL RIGHTS RESERVED. • VOIP: Implement STIR/SHAKEN • Non VOIP: "Reasonable measures to implement an effective call authentication framework" TRACED Act Authentication Requirements @kelleyrobinson
  • 34. ☎ Phun Phact Not every 555 number is fake. Only 555-0100 through 555-0199 are specifically reserved for fictional use. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: TV Tropes
  • 35. © 2019 TWILIO INC. ALL RIGHTS RESERVED. LIMITATIONS OF SHAKEN/STIR
  • 36. © 2019 TWILIO INC. ALL RIGHTS RESERVED. "The phone network is an ungodly beast." - Randy Weinberger, curmudgeon, telecom expert
  • 37. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Part of the ungodly beast: Time-division multiplexing (TDM) • Physical switches used by the PSTN • TRACED Act explicitly acknowledges TDM as a potential burden to SHAKEN/STIR rollout @kelleyrobinson
  • 38. © 2019 TWILIO INC. ALL RIGHTS RESERVED. The long tail of service providers • 4000 service providers in the US alone • Requires significant investment to comply @kelleyrobinson
  • 39. © 2019 TWILIO INC. ALL RIGHTS RESERVED. And what about... • Disconnected and reassigned phone numbers? • International numbers and calls? • Text messages? @kelleyrobinson
  • 40. ☎ Phun Phact Phone calls from The New York Times showed up as (111) 111-1111 until 2011. They now use a (212) number you can actually call back. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Source: NYTimes
  • 41. © 2019 TWILIO INC. ALL RIGHTS RESERVED. WHAT HAPPENS NEXT?
  • 42. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Ongoing legislation • FCC gave telcos authority to block unwanted robocalls without explicit subscriber permission • TRACED Act enforcement will begin at the end of 2020 @kelleyrobinson
  • 43. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Motivations driving implementation • Consumer pressure to decrease robocalls • Business pressure to increase answered calls @kelleyrobinson
  • 44. © 2019 TWILIO INC. ALL RIGHTS RESERVED. APPLICATION SECURITY PROTECTIONS TODAY
  • 45. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Mitigate damage from unwanted inbound calls • Protect your numbers from web scraping bots • Don't assign sequential phone numbers to your employees • Challenge suspicious callers with a voice CAPTCHA • Use actual authentication in your call centers • Install the FCC blacklist DB on your PBX @kelleyrobinson
  • 46. © 2019 TWILIO INC. ALL RIGHTS RESERVED. Apps for spam detection • Nomorobo, Robokiller, Call App, etc. • AT&T partnership with Hiya @kelleyrobinson
  • 47. Telephony is complicated. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 48. Telephony is complicated. SHAKEN/STIR won't fix everything. © 2019 TWILIO INC. ALL RIGHTS RESERVED.
  • 49. Telephony is complicated. SHAKEN/STIR won't fix everything. But it will help rebuilt trust in telephony. © 2019 TWILIO INC. ALL RIGHTS RESERVED.