Out-of-Band STIR

This is an archived version of this whitepaper. Please see our Out-of-Band SHAKEN whitepaper for the latest information.

By authenticating and verifying caller ID, STIR/SHAKEN offers relief from spam robocalls with fake caller ID. But the effectiveness of this approach depends on whether caller ID authentication information survives transit over the telephone network.

There are real-world issues that can prevent successful transit of this information across today’s telephone network. These issues limit the effectiveness of STIR/SHAKEN. This whitepaper describes these issues and a solution to overcome them: Out-of-Band STIR.

out-of-band stir icon

STIR/SHAKEN methodology

STIR/SHAKEN requires the originating service provider to create an Identity token, called a PASSporT, for each call they put on the network. In addition to call information, the Identity token includes an attestation level and a unique orig ID for traceback. This information is signed using PKI techniques to prevent tampering or replay attacks.

The token is placed in the SIP INVITE message used to set up the call on the SIP network. Ideally, this Identity token should accompany the call through the entire network until it reaches the terminating service provider, who then uses it to verify caller ID information and present verification status to the called party.

STIR/SHAKEN call flow

SHAKEN Call flow

It’s a brilliant solution. But there are pitfalls using it across the telephone network today.

Call routing issues across the telephone network

Calls are typically routed across many segments of the telephone network.

A Typical Segment of the Telephone Network

A segment of the telephone network

Service providers negotiate network interconnect agreements among themselves that describe the price they will pay to have their calls sent through the network. They use least cost routing software to select available routes based upon quality and price. This leads to extended call paths as calls travel from one carrier to the next. With extended call paths comes increased risk that the Identity token may be lost in transit. Here are three ways that the PASSporT can be lost:

  1. Call path segments in the telephone network today are not all SIP. Legacy network technology is still in widespread use. The old networks cannot transmit SIP messages. When an authenticated call reaches one of these segments, the STIR/SHAKEN information is lost.
  2. Some SIP network software removes the Identity token from the SIP header. Carriers must upgrade their SIP software to enable their network to retain the Identity tokens in calls that transit their network.
  3. Some SIP networks use UDP network technology, which does not provide flow control and retransmission. Because of this, UDP is prone to packet fragmentation and packet loss—a serious problem when sending Identity tokens, which must be delivered perfectly intact, else they cannot be verified. SIP over TCP, which provides flow control and retransmission, delivers Identity tokens much more reliably than UDP.

These issues create obstacles where the original authentication information is lost.

Other segments further down the call path might use SIP and have equipment and software capable of STIR/SHAKEN. Carriers are expected to sign and authenticate calls they put back on the SIP network. So even if the original PASSporT were lost, the call might get another one further down the call path.

But intermediate and terminating carriers don’t know the calling party like the originating provider does, and therefore can’t provide the same level of attestation or traceback. Subsequent tokens aren’t as useful as the original.

Why not just convert everything to SIP?

The ideal solution to this problem would be to replace all legacy technology throughout the entire telephone network with the latest SIP-capable equipment and software running over TCP networks. This would allow STIR/SHAKEN Identity tokens to be exchanged from one end of the network to the other.

The telephone network has been evolving toward SIP for decades. But such changes are costly and take time. And the economics of carrier compensation access fees is, for some providers, a huge financial disincentive to convert from legacy technology to SIP.

The demand for robocall relief requires widespread STIR/SHAKEN deployment long before the transition to an all-SIP network can be completed.

Consumers need spam robocall relief now. And service providers need practical options to provide it.

Solution: Out-of-band STIR

There is a way to enable STIR/SHAKEN for all calls across the current network, and it’s feasible today: Out-of-band STIR. The process is very similar to the one described above, except the Identity token is sent across the internet, out-of-band from the call path, through a Call Placement Service, as shown in this illustration:

Out-of-band STIR

Out-of-band STIR

The steps are very similar to standard STIR/SHAKEN processing, with a few exceptions:

  1. STI-AS authentication is performed by the originating or gateway service provider as usual.
  2. The originating service provider encrypts the Identity token with the terminating service provider’s public key and sends the encrypted token separately, out-of-band, across the internet to the terminating service provider’s Call Placement Service (CPS).
  3. The call is routed through the telephone network as usual. It doesn’t matter whether the call is routed over SIP or legacy networks, or a combination of both.
  4. When the terminating service provider receives the call, they check their CPS for tokens associated with the called number.
  5. Having found and decrypted the Identity token in their CPS, the terminating service provider performs STI-VS verification as usual.

Out-of-Band STIR benefits

There are several compelling advantages of using out-of-band transmission of Identity tokens:

  1. It does not matter what kind of network segments are used to route the call.
  2. There are no concerns about whether any of the network equipment or software along the call path might strip the Identity token from the call.
  3. There are no problems with tokens being corrupted by packet loss or fragmentation.
  4. Since the Identity tokens are secured using asymmetric encryption, there are no security risks or privacy concerns. Nobody can read the tokens except the terminating service providers.
  5. Apart from encrypting and decrypting the Identity token, the STI-AS and STI-VS processes are unchanged whether Identity tokens are transmitted either in-band or out-of-band.
PASSporT delivery method selection

At TransNexus, we welcome innovative ways to solve problems. Network issues that prevent end-to-end transmission of Identity tokens are a serious threat to the success of STIR/SHAKEN. We believe Out-of-Band STIR/SHAKEN call authentication is a viable solution, and so we have implemented both in-band and out-of-band methods in our software. These options enable TransNexus customers to authenticate and verify caller ID today, undeterred by the network issues described above.

TransNexus solutions

We have comprehensive STIR/SHAKEN solutions, including both in-band and out-of-band capabilities, available in our ClearIP and NexOSS software products. Contact us today to learn how we can help you with your STIR/SHAKEN deployment.

Request information

* required

This information will only be used to respond to your inquiry. TransNexus will not share your data with any third parties. We will retain your information for as long as needed to retain a record of your inquiry. For more information about how we use personal data, please see our privacy statement.


More on TransNexus.com

November 4, 2024

FCC proposes new STIR/SHAKEN rules on third-party signing

October 2, 2024

STIR/SHAKEN statistics from September 2024

September 4, 2024

STIR/SHAKEN statistics from August 2024

August 28, 2024

Lingo FCC compliance plan and lessons for other providers

August 12, 2024

STIR/SHAKEN statistics from July 2024

July 3, 2024

STIR/SHAKEN statistics from June 2024

June 5, 2024

STIR/SHAKEN statistics from May 2024

May 29, 2024

Originating provider fined for improper attestation

May 6, 2024

STIR/SHAKEN statistics from April 2024

April 17, 2024

STIR/SHAKEN in France

April 1, 2024

STIR/SHAKEN statistics from March 2024

March 4, 2024

STIR/SHAKEN statistics from February 2024

February 14, 2024

STIR/SHAKEN statistics from January 2024

January 25, 2024

Compliance dates announced for updated SHAKEN rules

January 3, 2024

STIR/SHAKEN statistics from December 2023

December 18, 2023

SHAKEN deadline for non-gateway intermediate providers

December 6, 2023

STIR/SHAKEN statistics from November 2023

November 8, 2023

STIR/SHAKEN statistics from October 2023

October 18, 2023

Out-of-Band SHAKEN revisions

September 20, 2023

How to monitor SHAKEN signer reputation

August 30, 2023

U.K. progress on central number database for STIR/SHAKEN

July 27, 2023

Rich Call Data and caller identity

June 19, 2023

Can Rich Call Data solve incorrect spam call labeling?

May 31, 2023

Branded calling, Know-Your-Customer, and STIR/SHAKEN