[Ieprep] draft-polk-ieprep-scenarios-00.txt
"King, Kimberly S." <KIMBERLY.S.KING@saic.com> Fri, 20 September 2002 16:11 UTC
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27844 for <ieprep-archive@odin.ietf.org>; Fri, 20 Sep 2002 12:11:23 -0400 (EDT)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id g8KGCig08296 for ieprep-archive@odin.ietf.org; Fri, 20 Sep 2002 12:12:44 -0400
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id g8KGCiv08293 for <ieprep-web-archive@optimus.ietf.org>; Fri, 20 Sep 2002 12:12:44 -0400
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27799 for <ieprep-web-archive@ietf.org>; Fri, 20 Sep 2002 12:10:52 -0400 (EDT)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id g8KG6Lv07499; Fri, 20 Sep 2002 12:06:21 -0400
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id g8KG3iv07164 for <ieprep@optimus.ietf.org>; Fri, 20 Sep 2002 12:03:44 -0400
Received: from mclmx.mail.saic.com (mclmx.mail.saic.com [149.8.64.10] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27316 for <ieprep@ietf.org>; Fri, 20 Sep 2002 12:01:52 -0400 (EDT)
Received: from mcl-its-ieg01.mail.saic.com by mclmx.mail.saic.com for ieprep@ietf.org; Fri, 20 Sep 2002 12:03:31 -0400
Received: from mcl-its-exig01.mail.saic.com ([149.8.64.12]) by mcl-its-ieg01.mail.saic.com (NAVGW 2.5.1.19) with SMTP id M2002092012033115895 ; Fri, 20 Sep 2002 12:03:31 -0400
Received: by mcl-its-exig01.mail.saic.com with Internet Mail Service (5.5.2653.19) id <TFDGMNC3>; Fri, 20 Sep 2002 12:03:20 -0400
Message-Id: <B8030EB94AF1D51196D70002A589D642891988@mcl-its-exs01>
From: "King, Kimberly S." <KIMBERLY.S.KING@saic.com>
To: "'jmpolk@cisco.com'" <jmpolk@cisco.com>
Cc: "Ieprep (E-mail)" <ieprep@ietf.org>
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www1.ietf.org id g8KG3iv07165
Subject: [Ieprep] draft-polk-ieprep-scenarios-00.txt
Sender: ieprep-admin@ietf.org
Errors-To: ieprep-admin@ietf.org
X-BeenThere: ieprep@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ieprep>, <mailto:ieprep-request@ietf.org?subject=unsubscribe>
List-Id: Internet Emergency Preparedness Working Group <ieprep.ietf.org>
List-Post: <mailto:ieprep@ietf.org>
List-Help: <mailto:ieprep-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ieprep>, <mailto:ieprep-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/ieprep/>
Date: Fri, 20 Sep 2002 12:03:29 -0400
Content-Transfer-Encoding: 8bit
Content-Transfer-Encoding: 8bit
Hi James, Comments on draft-polk-ieprep-scenarios-00.txt... "2.0 Overview of IEPREP IEPREP is an international mechanism for signaling preferential treatments of communications used by only a select few of our population." IEPREP isn't limited to signaling nor IP telephony. So, the title of the document "IEPREP Topology Scenarios" doesn't convey your limited scope of IP telephony. I have concluded that IP telephony is the scope you are considering by statements even in the pure IP scenario that indicate "call" and example protocols of SIP and MEGACO. In addition, you aren't just providing scenarios but also mixing comments about when authentication/authorization could/should occur. "3.1 Topology A û IP in the Middle Otherwise known as IP Bridging two CSNs. In this topology, a CSN phone of any type makes a call to another CSN phone with an IP core between the two CSNs. This topology should behave as the GETS (in the US) or GTPS (in the UK) service behaves today, any IP section in the call path should be for transport only, though should convey the appropriate signaling for IEPREP or ETS behaviors within the packets (defined elsewhere)." What do you mean by "should convey the appropriate signaling for IEPREP or ETS behaviors within the packets (defined elsewhere)"? Are you asserting a requirement on the topology? Are you saying that CSN signaling should be preserved, say by encapsulation, or are you indicating some sort of preferential treatment in the IP network should occur? "3.2 Topology B û IP at the Start ...If the caller is authorized to perform some form of preferential treatment with that call, the CSN needs a mechanism to convey that authorization back to the caller's device in such a way that the IP network will understand." Your statement is referring to authorization within a CSN and it implies that the IP network needs to understand that the CSN has authorized the call. Presumably you need this so as to provide some preferential treatment in the IP network? Unless I miss my guess, access to a port on a gateway is a place where real contention for resources could occur. But the above idea of "authorization occurs in the CSN" presumes you've already been granted this resource. To provide any preferential treatment on a gateway without first authorizing in an IP network is a setup for security problems. Are you making requirements of the topology and the CSN? Is "Topology B : IP at the Start" assumed to be a carrier that has deployed VoIP or could this be an enterprise? For example, if a business has an IP-PBX and a local gateway with say a PRI into the CSN's end office, is this "IP at the start"? What is "the start"? If a customer has a POTS phone connected to a LEC's gateway into a LEC IP network, is this IP at the start? "This topology has the calling party placing the call from an CSN phone (somewhere), and the called party being in an IP network. Authentication/Authorization in topology C should occur within the CSN on the originating side of the call path. In time, there might be situations where the CSN is only a transport into the IP network of an IEPREP call, therefore similar attributes to topology B should occur within C; where the IP authentication/authorization mechanism must be conveyed to the CSN Gateway (and on to the calling user) in such a way as to identify that call on an e2e basis to behave according to the goals set forth by the IEPREP WG for that call." I'm afraid I don't understand what you mean. Is "In time, there might be situations where the CSN is only a transport into the IP network of an IEPREP call," by definition topology C or are you defining something new? Is the "'where' in 'In time, there might be situations where the CSN is only a transport into the IP network of an IEPREP call, therefore similar attributes to topology B should occur within C; where the IP authentication/authorization mechanism must be conveyed to the CSN Gateway (and on to the calling user) in such a way as to identify that call on an e2e basis to behave according to the goals set forth by the IEPREP WG for that call" referring to topology B or topology C? "4.0 Security Considerations This document does not suggest anything other than a common naming convention within IEPREP WG discussions, therefore there should be no special security considerations" The document suggests more than a naming convention since it talks about the possible placement of authentication and authorization. _______________________________________________ Ieprep mailing list Ieprep@ietf.org https://www1.ietf.org/mailman/listinfo/ieprep
- [Ieprep] draft-polk-ieprep-scenarios-00.txt King, Kimberly S.
- [Ieprep] Re: draft-polk-ieprep-scenarios-00.txt James M. Polk
- [Ieprep] RE: draft-polk-ieprep-scenarios-00.txt King, Kimberly S.
- [Ieprep] RE: draft-polk-ieprep-scenarios-00.txt James M. Polk
- [Ieprep] RE: draft-polk-ieprep-scenarios-00.txt King, Kimberly S.
- [Ieprep] RE: draft-polk-ieprep-scenarios-00.txt James M. Polk