Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
Miguel Garcia <Miguel.An.Garcia@nokia.com> Fri, 26 August 2005 07:24 UTC
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1E8YZV-0004z8-N3; Fri, 26 Aug 2005 03:24:17 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1E8YZU-0004z3-D9
for sipping-tispan@megatron.ietf.org; Fri, 26 Aug 2005 03:24:16 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id DAA02461
for <sipping-tispan@ietf.org>; Fri, 26 Aug 2005 03:24:14 -0400 (EDT)
Received: from mgw-ext03.nokia.com ([131.228.20.95])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8Ya9-0003FQ-TR
for sipping-tispan@ietf.org; Fri, 26 Aug 2005 03:24:59 -0400
Received: from esebh107.NOE.Nokia.com (esebh107.ntc.nokia.com [172.21.143.143])
by mgw-ext03.nokia.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id
j7Q7ManD024183; Fri, 26 Aug 2005 10:22:40 +0300
Received: from esebh001.NOE.Nokia.com ([172.21.138.28]) by
esebh107.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.1830);
Fri, 26 Aug 2005 10:23:07 +0300
Received: from [127.0.0.1] ([172.17.166.87]) by esebh001.NOE.Nokia.com with
Microsoft SMTPSVC(5.0.2195.6881); Fri, 26 Aug 2005 10:23:06 +0300
Message-ID: <430EC359.9040803@nokia.com>
Date: Fri, 26 Aug 2005 10:23:05 +0300
From: Miguel Garcia <Miguel.An.Garcia@nokia.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)
X-Accept-Language: en-us, en, es-es
MIME-Version: 1.0
To: Paul Kyzivat <pkyzivat@cisco.com>
Subject: Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
References: <E7666D92C64C2845AEF12636FF94F95202319E91@S4DE8PSAAGQ.blf.telekom.de> <430DBDD2.5090202@nortel.com>
<430DC146.7020307@nokia.com> <430DC949.6000708@nortel.com>
<430E9FCB.4010708@cisco.com>
In-Reply-To: <430E9FCB.4010708@cisco.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
X-OriginalArrivalTime: 26 Aug 2005 07:23:06.0761 (UTC)
FILETIME=[00FB0790:01C5AA0F]
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by mgw-ext03.nokia.com id
j7Q7ManD024183
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8ba8529e77affe49b0f315db98a262ee
Content-Transfer-Encoding: quoted-printable
Cc: sipping-tispan@ietf.org, "Alexeitsev, D" <D.Alexeitsev@t-com.net>
X-BeenThere: sipping-tispan@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Discussion of requirements for SIP introduced by ETSI TISPAN
<sipping-tispan.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/sipping-tispan>
List-Post: <mailto:sipping-tispan@ietf.org>
List-Help: <mailto:sipping-tispan-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=subscribe>
Sender: sipping-tispan-bounces@ietf.org
Errors-To: sipping-tispan-bounces@ietf.org
So Paul seems to be suggesting to add a requirement indicating that someone has to authorize the identities, (perhaps based in roles, perhaps in URIs) who can bypass ACR. I think this is a role ACR service provider. So what about if we add one more requirement along these lines: "It must be possible for the the ACR service provider to determine the callers who can bypass the ACR service of the callee." On the solution space, I think we are heading to adding something like a role parameter to the P-Asserted-Identity. Using the trust required by P-Asserted-Identity, it is possiblet that the ACR service provider if it trusts a P-Asserted-Identity it will also trust the role parameter, than can take the format of "police", "fire", or whatever is needed. Comments? /Miguel Paul Kyzivat wrote: > > > Tom-PT Taylor wrote: > >> I think your requirement is not quite accurate even at this level of >> abstraction. Roland has identified two different cases. One is your >> "certain anonymous users", but the other is the case where the user >> identity is unable due to the network's inability to provide it. > > > I agree with Tom on that. But in addition I think there is another > requirement lurking there: *somebody* has to decide *who* the "certain > anonyous users" are who qualify. I can't yet tell whether this decision > is made entirely at the originating end, or partly at the terminating > end. For instance, as I mentioned in another message, it could be that > the originating end determines that the caller has the role "police" > while it is the terminating end that determines that the role "police" > is entitled to bypass ACR. Or, it could be that the originating end > explicitly determines that the caller, for whatever reason, is entitled > to bypass ACR if need be. Or it could be that the terminating end has to > make the entire decision about whether this caller is entitled to bypass > ACR. > > So I think something about who is expected to make what part of the > decision needs to be a requirement. > >> I guess I can see your point about pushing too hastily to mechanism. >> Roland actually identified the information that might be used to >> resolve the issue at the rejection point: on the one hand, the >> identity of the caller if present in a P-A-Id, and on the other hand, >> the absence of a P-A-Id. It may be that this is all that is needed, >> and no further discussion is required in SIPPING. (Of course, that's >> assuming that the number of authorized caller identities any one >> rejection point has to keep track of is limited and provisionable.) > > > I don't think it is very plausible that the receiving end would have > access to a list of all the police officers (anywhere in world?) that > are entitled to this treatment. > > Paul > >> Miguel Garcia wrote: >> >>> Tom: >>> >>> I agree with you in the essence, but you are referring to a solution, >>> not to a requirement. Essentially, whenever you need to speak about >>> an "indicator", it raises an alarm in my head that you are speaking >>> about a possible solution rather than a requirement. >>> >>> So the requirement is tha there are certain anonymous users that are >>> not subject to be filtered by ACR. Then we can further discuss the >>> solution, which is probably going in the direction you suggest. >>> >>> /Miguel >>> >>> Tom-PT Taylor wrote: >>> >>>> Let's just summarize the requirement. You've tied it to other >>>> mechanism below. I think it will be less confusing to abstract out >>>> the actual information that is needed. >>>> >>>> So: the requirement is that it be possible to include in SIP >>>> signalling an indicator that network-provided Anonymous Call >>>> Rejection should be overridden. This is needed in two >>>> circumstances: when the caller identity is unavailable in the first >>>> place, and when Privacy is invoked. There is an obvious ancillary >>>> requirement that this indicator be acted on only if it comes from a >>>> trusted source. >>>> >>>> Jesske, R wrote: >>>> >>>>> Paul, >>>>> I hope we do understand in future. Next Try. See below. >>>>> >>>>> >>>>> >>>>> >>>>>> -----Ursprüngliche Nachricht----- >>>>>> Von: Paul Kyzivat [mailto:pkyzivat@cisco.com] Gesendet: >>>>>> Donnerstag, 25. August 2005 05:31 >>>>>> An: Jesske, Roland >>>>>> Cc: Miguel.An.Garcia@nokia.com; sipping-tispan@ietf.org; >>>>>> Alexeitsev, Denis >>>>>> Betreff: Re: AW: [Sipping-tispan] TISPAN requirements, first >>>>>> requiements >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Jesske, R wrote: >>>>>> >>>>>>> Paul, >>>>>>> With regard to this feature it must be based on trust >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> relationship as defined within RFC3325 for the P-Asserted-Identity. >>>>>> >>>>>>> So the indication that this is a authorised user is >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> included by a network entity like it is done for the >>>>>> P-Asserted-Identiy. >>>>>> >>>>>>> So the network entity knows it via a database that this >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> registered user is a authorised one. >>>>>> >>>>>> Either I don't understand you, or you don't understand me. >>>>>> >>>>>> RFC3325 is a way for some trusted element of the network that >>>>>> knows the source of the request to assert a trusted identity for >>>>>> the source of the message. It doesn't provide any authorization >>>>>> for anything. >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> For the Marking of a call with a bypass allowance a network element >>>>> must include on behalf of the user this element so that a >>>>> Police-call is really a police call. >>>>> I will try it with some flows: >>>>> >>>>> >>>>> Police >>>>> UA:A Proxy ACR UA:B >>>>> -------------> -----------> -----------> F1:INVITE >>>>> F2:INVITE F3:INVITE >>>>> >>>>> >>>>> F1: INVITE >>>>> No indications From: Anonymous >>>>> >>>>> F2: INVITE >>>>> A indication is added indicating that this communication comes from >>>>> a official authority (Police) >>>>> From: Anonymous >>>>> P-Asserted-Identity with privacy Id >>>>> >>>>> >>>>> F3: INVITE >>>>> ACR server forwards the communication due to the bypass indication >>>>> From: Anonymous >>>>> >>>>> PSTN PSTN/ISDN >>>>> User A GW ACR UA:B >>>>> -------------> -----------> -----------> F1:IAM >>>>> F2:INVITE F3:INVITE >>>>> >>>>> F1: IAM: >>>>> No Calling Party number is included >>>>> Call is marked as restricted by the network >>>>> >>>>> F2: INVITE >>>>> A indication is included that points to the fact that the call is >>>>> Anonymous because of a network restriction >>>>> From: Anonymous >>>>> P-Asserted-Identity absent >>>>> F3: INVITE >>>>> ACR server forwards the communication due to the indication that >>>>> the communication is anonymous because of network restriction >>>>> From: Anonymous >>>>> >>>>> Untrusted my network >>>>> ProxyA Proxy B ACR UA:B >>>>> -------------> -----------> F1:INVITE F2:INVITE >>>>> F1: INVITE >>>>> No indications From: Anonymous >>>>> No P-Asserted-Identity >>>>> >>>>> F2: INVITE >>>>> No indication will be added because the request comes from an >>>>> untrusted proxy >>>>> From: Anonymous >>>>> No Privacy >>>>> >>>>> ACR rejects the communication >>>>> >>>>> >>>>> >>>>>> Ultimately, the ACR service must be implemented near and on behalf >>>>>> of the recipient of the message. It isn't until there that it is >>>>>> known that there is any service to authorize. At that point, the >>>>>> P-Asserted-ID header may be present, but that just says who the >>>>>> caller is, not what role the caller is playing. It seems that you >>>>>> want to do role based authorization, where the role is >>>>>> "entitled-to-override-ACR". >>>>>> >>>>>> So how is this role determined? Surely the recipient can't have a >>>>>> DB of all values of P-Asserted-ID that are authorized. The >>>>>> alternative seems to be that the source inserts not just a simple >>>>>> P-Asserted-ID with a name, but rather also inserts some kind of >>>>>> role identification. >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> That could be the way out. That such a indication shall be bind to >>>>> the P-Asserted identity and is included by the originating >>>>> network-entity. >>>>> Because we bind the ACR service to the P-Asserted-Identity. >>>>> >>>>> We reject the communication if a P-Asserted-Identity is included >>>>> and the priv value is "Id", "user","header" and /or ""critical" and >>>>> if the P-Asserted-Identity is absent. >>>>> >>>>> >>>>>> I'm looking for more indication of what the expectations are in >>>>>> this regard. Is it the expectation that the source will annotate >>>>>> every call with an indication that the caller is permitted to >>>>>> override ACR? >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> Yes. >>>>> >>>>> >>>>>> Or with some other more generic categorization of caller type? >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> That could be also a possibility. For solving the police >>>>> communications but it makes it not easy with the ISDN/PSTN >>>>> interworking. Because if we have such a caller type (What is also >>>>> another requirement) than we have to distinguish at the >>>>> Interworking Unit. Because some caller types can be mapped to the >>>>> Calling parties category and others must be mapped to the network >>>>> restriction indication. >>>>> >>>>> >>>>>> Or what? >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>>>> With regard to the PSTN/ISDN this was solved via a >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> indication that the Calling Party Number is restricted by the >>>>>> network. The network included this indication in three cases: >>>>>> >>>>>>> 1. The call was originated within a network that cannot >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> provide a originating number (e.G.) analogue. >>>>>> >>>>>>> 2. The call has no originated number due to interworking >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> with international networks >>>>>> >>>>>>> 3. The call was send from a authorised user (e.G. police). >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> This indication was then set by the network. This feature is >>>>>> especially used in UK. >>>>>> >>>>>> So you are looking for some kind of enhancement to Privacy, that >>>>>> indicates *why* privacy is requested? >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> >>>>>> From my point of view YES. >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> First Idea was to have a privacy value that says "network >>>>> restricted" (as it is in the PSTN/ISDN) to express that the Id is >>>>> missing because of some network restrictions (like interworking, >>>>> Analogue originating or such police calls). Because to add such >>>>> value to the privacy header would be easy. >>>>> But people had the opinion that this has nothing to do with >>>>> privacy. So we looked fore some other possibility. That is what I >>>>> have showed you above. >>>>> >>>>> I hope that this was better that we can come together and you >>>>> understand me. >>>>> >>>>> Roland >>>>> >>>>> >>>>> >>>>>> Paul >>>>>> >>>>>> >>>>>>> So with the requirement proposed by Miguel we hope to find >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> a solution to cover the 3 above mentioned cases. >>>>>> >>>>>>> With regard to trust we want to have such a indication bind >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> to a trust relationship as it is described within RFC3325. >>>>>> >>>>>>> So trust for interconnection to an other network is based >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> on bilateral agreement. >>>>>> >>>>>>> >>>>>>> Best Regards >>>>>>> >>>>>>> Roland >>>>>>> >>>>>>> >>>>>>> >>>>>>>> -----Ursprüngliche Nachricht----- >>>>>>>> Von: sipping-tispan-bounces@ietf.org >>>>>>>> [mailto:sipping-tispan-bounces@ietf.org] Im Auftrag von Paul >>>>>>>> Kyzivat >>>>>>>> Gesendet: Mittwoch, 24. August 2005 05:07 >>>>>>>> An: Miguel Garcia >>>>>>>> Cc: sipping-tispan@ietf.org; Alexeitsev, Denis >>>>>>>> Betreff: Re: [Sipping-tispan] TISPAN requirements, first >>>>>>>> requiements >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> Miguel Garcia wrote: >>>>>>>> >>>>>>>> >>>>>>>>> Folks: >>>>>>>>> >>>>>>>>> Since we are tasked to re-draft the TISPAN requirements >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> adding as much >>>>>>>> >>>>>>>>> clarifications as possible, we would like to start checking >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> with you if >>>>>>>> >>>>>>>>> the requirements related to the Annonymous Communication >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> Rejection (ACR) >>>>>>>> >>>>>>>>> service is OK and understandable by everyone. >>>>>>>>> >>>>>>>>> So please take a look at the first version of the (much >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> >>>>>>>> incomplete and >>>>>>>> >>>>>>>>> short) draft in either text or HTML: >>>>>>>>> >>>>>>>>> >>>>>>>> >>>>>>>> http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sippin >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> g-tispan-requirements-02a.txt >>>>>>> >>>>>>>> http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sipp >>>>>>> >>>>>>> >>>>> >>>>> >>>>> >>>>> ing-tispan-requirements-02a.html >>>>> >>>>>>> >>>>>>> The document is fairly short at the moment. Please post your >>>>>>> comments here. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> Regarding REQ-ACR-2: >>>>>> >>>>>> >>>>>> >>>>>>> REQ-ACR-2: It must be possible that authorized callers are not >>>>>>> subject to the ACR service, thus, allowing the callee to >>>>>>> receive anonymous requests from authorized callers. >>>>>>> This >>>>>>> effectively requires a mechanism to override the ACR >>>>>>> service depending on the identity and authorization >>>>>>> of the >>>>>>> caller. This is needed, e.g., when a police officer or >>>>>>> any other authority is anonymously calling to a user >>>>>>> having the ACR simulation service activated. >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> How is a caller authorized? Is the mechanism for determining and >>>>>> conveying this authorization in scope for this service? There is >>>>>> mention specifically of Police Officers, among others, as being >>>>>> authorized. Are there a list of attributes like that which must be >>>>>> used to characterize a caller and that are used to determine the >>>>>> authorization? >>>>>> >>>>>> How is this affected by peering and PSTN interconnect? Is an >>>>>> authorization on one side to be conveyed to the other side and >>>>>> then trusted their? >>>>>> >>>>>> Thanks, >>>>>> Paul >>>>>> >>>>>> _______________________________________________ >>>>>> Sipping-tispan mailing list >>>>>> Sipping-tispan@ietf.org >>>>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan >>>>>> >>>>> >>>>> >>>>> _______________________________________________ >>>>> Sipping-tispan mailing list >>>>> Sipping-tispan@ietf.org >>>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan >>>>> >>>>> >>>> >>>> >>>> _______________________________________________ >>>> Sipping-tispan mailing list >>>> Sipping-tispan@ietf.org >>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan >>>> >>> >> >> >> _______________________________________________ >> Sipping-tispan mailing list >> Sipping-tispan@ietf.org >> https://www1.ietf.org/mailman/listinfo/sipping-tispan >> -- Miguel A. Garcia tel:+358-50-4804586 sip:miguel.an.garcia@openlaboratory.net Nokia Research Center Helsinki, Finland _______________________________________________ Sipping-tispan mailing list Sipping-tispan@ietf.org https://www1.ietf.org/mailman/listinfo/sipping-tispan
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Schmidt, Christian
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Alexeitsev, D
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Philip Mart
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Jitender Arora
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- RE: AW: AW: [Sipping-tispan] TISPAN requirements,… Michael Hammer (mhammer)
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat