Re: [Dime] draft-avasarala-diameter-error-invalid-identity-00

Yuval Lifshitz <ylifshitz@sandvine.com> Wed, 01 November 2017 06:33 UTC

Return-Path: <ylifshitz@sandvine.com>
X-Original-To: dime@ietfa.amsl.com
Delivered-To: dime@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2753613FDA2 for <dime@ietfa.amsl.com>; Tue, 31 Oct 2017 23:33:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: 0.07
X-Spam-Level:
X-Spam-Status: No, score=0.07 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, HTTPS_HTTP_MISMATCH=1.989, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H4=-0.01, RCVD_IN_MSPIKE_WL=-0.01, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id HxXf6X3PO8JK for <dime@ietfa.amsl.com>; Tue, 31 Oct 2017 23:33:38 -0700 (PDT)
Received: from mail1.sandvine.com (Mail1.sandvine.com [64.7.137.134]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 83EFF13FDB6 for <dime@ietf.org>; Tue, 31 Oct 2017 23:33:38 -0700 (PDT)
Received: from WTL-EXCHSV2-1.sandvine.com (192.168.194.58) by WTL-EXCHSV2-1.sandvine.com (192.168.194.58) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256_P256) id 15.1.1034.26; Wed, 1 Nov 2017 02:33:37 -0400
Received: from BLR-EXCHP-2.sandvine.com (192.168.196.172) by WTL-EXCHSV2-1.sandvine.com (192.168.194.58) with Microsoft SMTP Server (version=TLS1_0, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA_P256) id 15.1.1034.26 via Frontend Transport; Wed, 1 Nov 2017 02:33:37 -0400
Received: from WTL-EXCHP-1.sandvine.com ([fe80::ac6b:cc1e:f2ff:93aa]) by blr-exchp-2.sandvine.com ([::1]) with mapi id 14.03.0319.002; Wed, 1 Nov 2017 02:33:36 -0400
From: Yuval Lifshitz <ylifshitz@sandvine.com>
To: "Bertz, Lyle T [CTO]" <Lyle.T.Bertz@sprint.com>, "AVASARALA, RANJIT KUMAR" <ra698k@att.com>, "dime@ietf.org" <dime@ietf.org>
CC: "Gardella, Maryse (Nokia - FR) (maryse.gardella@nokia.com)" <maryse.gardella@nokia.com>, Yuval Lifshitz <ylifshitz@sandvine.com>
Thread-Topic: draft-avasarala-diameter-error-invalid-identity-00
Thread-Index: AdNSZIrJm2O1lnw9Q5e+yrjpjtgOFgABIxwgAAJK+5AAAKJMwAABIT8wAABUNKAAF7UloA==
Date: Wed, 01 Nov 2017 06:33:36 +0000
Message-ID: <C43C255C7106314F8D13D03FA20CFE49ED569963@wtl-exchp-1.sandvine.com>
References: <BD15502709C85D4DAA2DCBF30D38A3B7172894DC@MOSTLS1MSGUSRFG.ITServices.sbc.com> <C43C255C7106314F8D13D03FA20CFE49ED56978C@wtl-exchp-1.sandvine.com> <BD15502709C85D4DAA2DCBF30D38A3B71728D777@MOSTLS1MSGUSRFG.ITServices.sbc.com> <62823085c481447e95e17e4e62c6ce8c@plswe13m04.ad.sprint.com> <BD15502709C85D4DAA2DCBF30D38A3B71728FDFA@MOSTLS1MSGUSRFG.ITServices.sbc.com> <0cc48ec93fd94822a8ca43e1861f44ca@plswe13m04.ad.sprint.com>
In-Reply-To: <0cc48ec93fd94822a8ca43e1861f44ca@plswe13m04.ad.sprint.com>
Accept-Language: en-CA, en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
x-originating-ip: [192.168.142.2]
x-c2processedorg: b2f06e69-072f-40ee-90c5-80a34e700794
Content-Type: multipart/alternative; boundary="_000_C43C255C7106314F8D13D03FA20CFE49ED569963wtlexchp1sandvi_"
MIME-Version: 1.0
Archived-At: <https://mailarchive.ietf.org/arch/msg/dime/kPqsOxa7d3UhfMVt77-urQ3d44w>
Subject: Re: [Dime] draft-avasarala-diameter-error-invalid-identity-00
X-BeenThere: dime@ietf.org
X-Mailman-Version: 2.1.22
Precedence: list
List-Id: Diameter Maintanence and Extentions Working Group <dime.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dime>, <mailto:dime-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dime/>
List-Post: <mailto:dime@ietf.org>
List-Help: <mailto:dime-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dime>, <mailto:dime-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 01 Nov 2017 06:33:42 -0000

Hi Ranjit,
Please look at section 7.1.17 (page 99) of the 3GPP/ETSI Gy specification: http://www.etsi.org/deliver/etsi_ts/132200_132299/132299/14.05.00_60/ts_132299v140500p.pdf
In that document (which is based on RFC4006) they are specifically addressing the case where User-Equipment-Info is of type IMEI/SV, as well as noting on the validation of that AVP.
Please note that in the specification above, section 7.1.11 (pages 96-97), domain specific, result codes were added. Would probably be good to propose the new result code as an enhancement for that spec?
This could be a 5xxx or 4xxx result code, depending whether you think that a retry would resolve the issue. If you think that that would be the way forward with that issue, I would recommend addressing the 3GPP SA5 work group.

Best Regards,

Yuval


From: Bertz, Lyle T [CTO] [mailto:Lyle.T.Bertz@sprint.com]
Sent: Tuesday, October 31, 2017 9:01 PM
To: AVASARALA, RANJIT KUMAR; Yuval Lifshitz; dime@ietf.org
Subject: RE: draft-avasarala-diameter-error-invalid-identity-00

ty

From: AVASARALA, RANJIT KUMAR [mailto:ra698k@att.com]
Sent: Tuesday, October 31, 2017 1:57 PM
To: Bertz, Lyle T [CTO] <Lyle.T.Bertz@sprint.com<mailto:Lyle.T.Bertz@sprint.com>>; Yuval Lifshitz <ylifshitz@sandvine.com<mailto:ylifshitz@sandvine.com>>; dime@ietf.org<mailto:dime@ietf.org>
Subject: RE: draft-avasarala-diameter-error-invalid-identity-00

Hi Lyle

Answers inline <Ranjit>

Regards
Ranjit
VoLTE T4 Support
317-224-9441



From: Bertz, Lyle T [CTO] [mailto:Lyle.T.Bertz@sprint.com]
Sent: Tuesday, October 31, 2017 1:46 PM
To: AVASARALA, RANJIT KUMAR <ra698k@att.com<mailto:ra698k@att.com>>; Yuval Lifshitz <ylifshitz@sandvine.com<mailto:ylifshitz@sandvine.com>>; dime@ietf.org<mailto:dime@ietf.org>
Subject: RE: draft-avasarala-diameter-error-invalid-identity-00

A few questions:


  1.  How did a CTF get and invalid IMEI?  It is typically pulling from somewhere else.
<Ranjit>  invalid iMEI can come from devices reporting invalid IMEI value.  This IMEI value comes from device to MME to PGW and all the way to IMS core.

  1.  When you say invalid in the spec you reference format.  If it is format that is doable but if it is questioning data / associations outside of the AVP or message then this is problematic.   An invalid value in the proposal is too vague. Was it a well formed AVP which did not pass some app level semantic check or was it just bad data?
<Ranjit> by invalid, I mean the data is invalid E.g. the IMEI should be 15 digits long and should follow the rules defined in RFC 7254/7255.  So the CCF that receives the IMEI should validate the IMEI (which the CCFs currently do not) and once they do, and if they determine that the IMEI is invalid, then they should insert the error code into Diameter response (E.g. CCA).

  1.  Is this a IMSI-IMEI(SV) association issue?
<Ranjit> not association - but the value itself.  Technically IMEI and IMEISV are same (except for additional value of SV)

Lyle

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of AVASARALA, RANJIT KUMAR
Sent: Tuesday, October 31, 2017 1:08 PM
To: Yuval Lifshitz <ylifshitz@sandvine.com<mailto:ylifshitz@sandvine.com>>; dime@ietf.org<mailto:dime@ietf.org>
Subject: Re: [Dime] draft-avasarala-diameter-error-invalid-identity-00

Hi Yuval

Thank you for the comments.

I agree that a standard diameter error exists - the AVP error.   The reason I proposed invalid mobile identity is - it will be more specific to mobile identity.  It can be changed to a 5xxx - but I want an option for the entity to re-send the request with a valid value (assuming it can)

Yes User-Equipment-info AVP is optional in Credit Control Request - but we have seen it is present most of the times and all the times the value is IMEI or IMEISV ( though other values can exist) - but in case of VoLTE / IMS scenarios, the value is usually IMEI.

Now we have lot of cases where due to invalid IMEI - the number of bad records being generated is increasing - so need a way to prevent those.

So the proposed solution is for the entities receiving IMEI as part of any AVP - to validate it and if found invalid to respond with a error.  The entity receiving the error has an option to re-send the request with a valid value if it can.


Regards
Ranjit
VoLTE T4 Support
317-224-9441



From: Yuval Lifshitz [mailto:ylifshitz@sandvine.com]
Sent: Tuesday, October 31, 2017 12:07 PM
To: AVASARALA, RANJIT KUMAR <ra698k@att.com<mailto:ra698k@att.com>>; dime@ietf.org<mailto:dime@ietf.org>
Cc: ben@nostrum.com<mailto:ben@nostrum.com>; Yuval Lifshitz <ylifshitz@sandvine.com<mailto:ylifshitz@sandvine.com>>
Subject: RE: draft-avasarala-diameter-error-invalid-identity-00

Dear Ranjit,
I think there are several issues with your proposal:

  *   A standard diameter error already exists for the case described. It is DIAMETER_INVALID_AVP_VALUE (5004)
  *   3xxx level error codes are meant for peer level (per hop) while the case you describe is session level (end 2 end)
  *   User-Equipment-Info is an optional AVP (at least in RFC4006), and its payload is not necessarily IMEI or IMEISV. This mean that specification forcing the credit control server to validate it would contradict the existing specification

Best Regards,

Yuval

From: DiME [mailto:dime-bounces@ietf.org] On Behalf Of AVASARALA, RANJIT KUMAR
Sent: Tuesday, October 31, 2017 6:32 PM
To: dime@ietf.org<mailto:dime@ietf.org>
Cc: ben@nostrum.com<mailto:ben@nostrum.com>
Subject: [Dime] draft-avasarala-diameter-error-invalid-identity-00

Hello all

We published a new Internet draft addressing the issue of invalid IMEI in SIP / Diameter requests.

Here is the background

IMEI is used for uniquely identifying the mobile devices.  IMEI is present in SIP REGISTER request (Contact header) and Diameter CCR Request (user-Equipment-Info AVP).   It is always assumed that the IMEI value is correct and also the entities that receive IMEI usually do not validate the value.

This IMEI goes all the way till CCFs which use it as part of records generation that eventually lead to generation of CDRs.  So in scenarios where IMEI is correct, the records are considered good but if the IMEI is invalid or incorrect, then the records that are generated become "bad" and lead to inconsistency in billing.

So there is a need to reduce or prevent the generation of bad records and this can be done by validating the received IMEI and reporting invalid instances of IMEI.

So in order to report the cases of invalid iMEI, this draft proposes a new diameter protocol error code - DIAMETER_INVALID_MOBILE_IDENTITY

We request everyone to review the draft and comment.

The URL of the draft is - https://tools.ietf.org/html/draft-avasarala-diameter-error-invalid-identity-00.html<https://na01.safelinks.protection.outlook.com/?url=https%3A%2F%2Furldefense.proofpoint.com%2Fv2%2Furl%3Fu%3Dhttps-3A__na01.safelinks.protection.outlook.com_-3Furl-3Dhttps-253A-252F-252Furldefense.proofpoint.com-252Fv2-252Furl-253Fu-253Dhttps-2D3A-5F-5Ftools.ietf.org-5Fhtml-5Fdraft-2D2Davasarala-2D2Ddiameter-2D2Derror-2D2Dinvalid-2D2Didentity-2D2D00.html-2526d-253DDwMFAg-2526c-253DLFYZ-2Do9-5FHUMeMTSQicvjIg-2526r-253DHqz9E2LJHAT14pCYdmHOsQ-2526m-253D9slEZFhalRQfK8W0Qy624FMWppcDpsLJbAfOgESdBug-2526s-253DMP1LfzIYI7pYN8bUqxkF1kdjPlx-2DEQtCfvDNnG9xUXM-2526e-253D-26data-3D02-257C01-257Clyle.t.bertz-2540sprint.com-257C44eb4dec63ce4bfcec0f08d5208a6cd7-257C4f8bc0acbd784bf5b55f1b31301d9adf-257C0-257C0-257C636450701272955406-26sdata-3DQz57rER72b51IojZ3iN21OgJcjdNaQkgX6uSaAc-252Bpsg-253D-26reserved-3D0%26d%3DDwMFAg%26c%3DLFYZ-o9_HUMeMTSQicvjIg%26r%3DHqz9E2LJHAT14pCYdmHOsQ%26m%3DC1X46Oah2dkod6mTzQd2Gucu43Pt0QxtveM6b_VzXnA%26s%3Dk7aQgGjqXY88-5XHB6akQ90W0ewaV11A-e096n0aSdU%26e%3D&data=02%7C01%7CLyle.T.Bertz%40sprint.com%7Cf164561e0c2b489a6c1008d520913f6f%7C4f8bc0acbd784bf5b55f1b31301d9adf%7C0%7C0%7C636450730563394170&sdata=i0m2UY1uNRG14VdyUY7kkzz9JFqo3YwbnDes2kNGIc8%3D&reserved=0>

Regards
Ranjit






________________________________

This e-mail may contain Sprint proprietary information intended for the sole use of the recipient(s). Any use by others is prohibited. If you are not the intended recipient, please contact the sender and delete all copies of the message.