[Ieprep] draft-polk-ieprep-scenarios-00.txt

"King, Kimberly S." <KIMBERLY.S.KING@saic.com> Fri, 20 September 2002 16:11 UTC

Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27844 for <ieprep-archive@odin.ietf.org>; Fri, 20 Sep 2002 12:11:23 -0400 (EDT)
Received: (from mailnull@localhost) by www1.ietf.org (8.11.6/8.11.6) id g8KGCig08296 for ieprep-archive@odin.ietf.org; Fri, 20 Sep 2002 12:12:44 -0400
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id g8KGCiv08293 for <ieprep-web-archive@optimus.ietf.org>; Fri, 20 Sep 2002 12:12:44 -0400
Received: from www1.ietf.org (ietf.org [132.151.1.19] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27799 for <ieprep-web-archive@ietf.org>; Fri, 20 Sep 2002 12:10:52 -0400 (EDT)
Received: from www1.ietf.org (localhost.localdomain [127.0.0.1]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id g8KG6Lv07499; Fri, 20 Sep 2002 12:06:21 -0400
Received: from ietf.org (odin.ietf.org [132.151.1.176]) by www1.ietf.org (8.11.6/8.11.6) with ESMTP id g8KG3iv07164 for <ieprep@optimus.ietf.org>; Fri, 20 Sep 2002 12:03:44 -0400
Received: from mclmx.mail.saic.com (mclmx.mail.saic.com [149.8.64.10] (may be forged)) by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA27316 for <ieprep@ietf.org>; Fri, 20 Sep 2002 12:01:52 -0400 (EDT)
Received: from mcl-its-ieg01.mail.saic.com by mclmx.mail.saic.com for ieprep@ietf.org; Fri, 20 Sep 2002 12:03:31 -0400
Received: from mcl-its-exig01.mail.saic.com ([149.8.64.12]) by mcl-its-ieg01.mail.saic.com (NAVGW 2.5.1.19) with SMTP id M2002092012033115895 ; Fri, 20 Sep 2002 12:03:31 -0400
Received: by mcl-its-exig01.mail.saic.com with Internet Mail Service (5.5.2653.19) id <TFDGMNC3>; Fri, 20 Sep 2002 12:03:20 -0400
Message-Id: <B8030EB94AF1D51196D70002A589D642891988@mcl-its-exs01>
From: "King, Kimberly S." <KIMBERLY.S.KING@saic.com>
To: "'jmpolk@cisco.com'" <jmpolk@cisco.com>
Cc: "Ieprep (E-mail)" <ieprep@ietf.org>
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 8bit
X-MIME-Autoconverted: from quoted-printable to 8bit by www1.ietf.org id g8KG3iv07165
Subject: [Ieprep] draft-polk-ieprep-scenarios-00.txt
Sender: ieprep-admin@ietf.org
Errors-To: ieprep-admin@ietf.org
X-BeenThere: ieprep@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ieprep>, <mailto:ieprep-request@ietf.org?subject=unsubscribe>
List-Id: Internet Emergency Preparedness Working Group <ieprep.ietf.org>
List-Post: <mailto:ieprep@ietf.org>
List-Help: <mailto:ieprep-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ieprep>, <mailto:ieprep-request@ietf.org?subject=subscribe>
List-Archive: <https://www1.ietf.org/pipermail/ieprep/>
Date: Fri, 20 Sep 2002 12:03:29 -0400
Content-Transfer-Encoding: 8bit
Content-Transfer-Encoding: 8bit

Hi James,

Comments on draft-polk-ieprep-scenarios-00.txt...

"2.0 Overview of IEPREP

IEPREP is an international mechanism for signaling preferential treatments
of communications used by only a select few of our population."

IEPREP isn't limited to signaling nor IP telephony.  So, the title of the
document "IEPREP Topology Scenarios" doesn't convey your limited scope of IP
telephony.  I have concluded that IP telephony is the scope you are
considering by statements even in the pure IP scenario that indicate "call"
and example protocols of SIP and MEGACO.  In addition, you aren't just
providing scenarios but also mixing comments about when
authentication/authorization could/should occur.  




"3.1 Topology A û IP in the Middle

Otherwise known as IP Bridging two CSNs. In this topology, a CSN phone of
any type makes a call to another CSN phone with an IP core between the two
CSNs. This topology should behave as the GETS (in the US) or GTPS (in the
UK) service behaves today, any IP section in the call path should be for
transport only, though should convey the appropriate signaling for IEPREP or
ETS behaviors within the packets (defined elsewhere)."

What do you mean by "should convey the appropriate signaling for IEPREP or
ETS behaviors within the packets (defined elsewhere)"?  Are you asserting a
requirement on the topology?  Are you saying that CSN signaling should be
preserved, say by encapsulation, or are you indicating some sort of
preferential treatment in the IP network should occur?



"3.2 Topology B û IP at the Start
...If the caller is authorized to perform some form of preferential
treatment with that call, the CSN needs a mechanism to convey that
authorization back to the caller's device in such a way that the IP network
will understand."

Your statement is referring to authorization within a CSN and it implies
that the IP network needs to understand that the CSN has
authorized the call.  Presumably you need this so as to provide some
preferential treatment in the IP network?  Unless I miss my guess, access to
a port on a gateway is a place where real contention for resources could
occur.  But the above idea of "authorization occurs in the CSN" presumes
you've already been granted this resource.  To provide any preferential
treatment on a gateway without first authorizing in an IP network is a setup
for security problems.   Are you making requirements of the topology and the
CSN?

Is "Topology B : IP at the Start" assumed to be a carrier that has deployed
VoIP or could this be an enterprise?  For example, if a business has an
IP-PBX and a local gateway with say a PRI into the CSN's end office, is this
"IP at the start"?  

What is "the start"?  If a customer has a POTS phone connected to a LEC's
gateway into a LEC IP network, is this IP at the start?  



"This topology has the calling party placing the call from an CSN phone 
(somewhere), and the called party being in an IP network. 

Authentication/Authorization in topology C should occur within the CSN on 
the originating side of the call path. In time, there might be situations 
where the CSN is only a transport into the IP network of an IEPREP call, 
therefore similar attributes to topology B should occur within C; where 
the IP authentication/authorization mechanism must be conveyed to the CSN 
Gateway (and on to the calling user) in such a way as to identify that 
call on an e2e basis to behave according to the goals set forth by the 
IEPREP WG for that call."

I'm afraid I don't understand what you mean.    

Is "In time, there might be situations 
where the CSN is only a transport into the IP network of an IEPREP call," by
definition topology C or are you defining something new?  

Is the 
"'where' in 'In time, there might be situations 
where the CSN is only a transport into the IP network of an IEPREP call, 
therefore similar attributes to topology B should occur within C; where 
the IP authentication/authorization mechanism must be conveyed to the CSN 
Gateway (and on to the calling user) in such a way as to identify that 
call on an e2e basis to behave according to the goals set forth by the 
IEPREP WG for that call" 
referring to topology B or topology C?  



"4.0 Security Considerations

This document does not suggest anything other than a common naming 
convention within IEPREP WG discussions, therefore there should be no 
special security considerations"

The document suggests more than a naming convention since it talks about the
possible placement of authentication and authorization.  
_______________________________________________
Ieprep mailing list
Ieprep@ietf.org
https://www1.ietf.org/mailman/listinfo/ieprep