1 / 10

Trust Path Discovery draft-ono-trust-path-discovery-01.txt

Trust Path Discovery draft-ono-trust-path-discovery-01.txt. Kumiko Ono Henning Schulzrinne. Motivation. Protection against unsolicited bulk messages An option for sender filtering Determine whether to accept communication’s requests, e.g., emails, calls, instant messages from a “stranger”

ince
Download Presentation

Trust Path Discovery draft-ono-trust-path-discovery-01.txt

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trust Path Discoverydraft-ono-trust-path-discovery-01.txt Kumiko Ono Henning Schulzrinne

  2. Motivation • Protection against unsolicited bulk messages • An option for sender filtering • Determine whether to accept communication’s requests, e.g., emails, calls, instant messages from a “stranger” • Based on reputation of that stranger • How to get the stranger’s reputation • Query a third-party reputation system or • Query trusted friends and their friends

  3. Anti-spam/spit/spim Content-based filtering Sender-based filtering: (assume anti-spoofing) e.g. Third-party accreditation for servers Trust Path Discovery for servers and individuals Others e.g., Make sending bulk messages burdensome Anti-spoofing For SMTP sender e.g., Sender ID DomainKeys For SIP originator e.g., SIP identity SAML with SIP? Protection Mechanisms for Unsolicited Bulk Messages

  4. Our Approach • Gathering trustworthy opinions on individuals and their domains from our friends or community • Opinions based on trust indicators which represent one’s trust on receiving messages • Chains of trust relationships = Trust paths • Among individuals (users) • Among domains • Between a user and a domain

  5. What are Trust Indicators? • When Alice trusts Bob, Bob is on Alice’s watcher list (= subscribes to Alice) Log of sending email, call, or message NOTIFY Alice Bob Alice Bob trusts trusts

  6. How to Gather “Trust paths” Trust indicators Trust path (one-hop) Trust path (multi-hop) Alice Alice 1. generate 3. aggregate • Watcher list • Log of sending mails • Log of making calls Bob Bob 2. exchange Charlie Bob Alice Charlie

  7. How to Exchange “Trust paths” • Push-based model: propagating trust paths in advance, e.g., at registration phase. • Responsive • More need to disclose trust path. Privacy breach? - Trust-path can only contain public and semi-private information, because propagated trust path might be disclosed to third parties • Query-based model: query trustworthiness when needed. • Less need to disclose trust paths - However, query itself is also privacy-sensitive • Slower. Needs to query multiple servers/individuals • “Who trusts you?” “Who trusts Alice?” Our proposal: Push-based model

  8. Conclusion • Current Status • Propagation mechanism • A new event package, “opinion” • SUBSCRIBE/NOTIFY/(PUBLISH) • Implementation in progress Your feedback is welcome!

  9. Related Work: Domain Name Accreditation draft-ietf-marid-csv-dna-02.txt Third-party Accreditation Service 3. Response 2. Query the trust level of “bar.com” 1. EHLO bar.com SMTP client: bar.com SMTP server: foo.com

More Related