AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
"Jesske, R" <R.Jesske@t-com.net> Thu, 25 August 2005 11:16 UTC
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1E8Fiq-0003co-K8; Thu, 25 Aug 2005 07:16:40 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1E8Fio-0003cg-AC
for sipping-tispan@megatron.ietf.org; Thu, 25 Aug 2005 07:16:38 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA12618
for <sipping-tispan@ietf.org>; Thu, 25 Aug 2005 07:16:37 -0400 (EDT)
Received: from tcmail33.telekom.de ([217.6.95.240])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8FjJ-0007zA-GA
for sipping-tispan@ietf.org; Thu, 25 Aug 2005 07:17:10 -0400
Received: from S4DE8PSAANQ.mitte.t-com.de by tcmail31.dmz.telekom.de with
ESMTP; Thu, 25 Aug 2005 13:16:28 +0200
Received: by S4DE8PSAANQ.blf.telekom.de with Internet Mail Service
(5.5.2653.19) id <RMLSHK9N>; Thu, 25 Aug 2005 13:16:28 +0200
Message-Id: <E7666D92C64C2845AEF12636FF94F95202319E9B@S4DE8PSAAGQ.blf.telekom.de>
From: "Jesske, R" <R.Jesske@t-com.net>
To: john.elwell@siemens.com, pkyzivat@cisco.com
Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
Date: Thu, 25 Aug 2005 13:16:22 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 958aa603499a3de6b2b87d68741ed60e
Content-Transfer-Encoding: quoted-printable
Cc: sipping-tispan@ietf.org, "Alexeitsev, D" <D.Alexeitsev@t-com.net>
X-BeenThere: sipping-tispan@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Discussion of requirements for SIP introduced by ETSI TISPAN
<sipping-tispan.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/sipping-tispan>
List-Post: <mailto:sipping-tispan@ietf.org>
List-Help: <mailto:sipping-tispan-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=subscribe>
Sender: sipping-tispan-bounces@ietf.org
Errors-To: sipping-tispan-bounces@ietf.org
John, First it is a regulatory service that must be provided by an operator in Europe. Second there is also a marked demand to fulfil such services (not only ACR also others) within the network. We as want to add our networks services to satisfy our customers. Roland > -----Ursprüngliche Nachricht----- > Von: Elwell John [mailto:john.elwell@siemens.com] > Gesendet: Donnerstag, 25. August 2005 13:10 > An: Jesske, Roland; pkyzivat@cisco.com > Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > Betreff: RE: AW: [Sipping-tispan] TISPAN requirements, first > requiements > > > Roland, > > See below. > > John > > > > -----Original Message----- > > From: Jesske, R [mailto:R.Jesske@t-com.net] > > Sent: 25 August 2005 11:59 > > To: Elwell John; pkyzivat@cisco.com > > Cc: sipping-tispan@ietf.org; Alexeitsev, D > > Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first > > requiements > > > > John, > > Yes of course the the UAS can do this. But this is also > > possible in the PSTN/ISDN world where this service is working. > > > > This service with this bypass is especially working in some > > networks (not in Germany). In this countries it is also > > coming from the regulator if my knowledge is correct. > > > > I can do the same manually when unknown is displayed in my > ISDN phone. > > > > But the important is that the originator (Police) has the > > chance to come through. > [JRE] Without the ACR service all requests / calls will get > through to the > UAS. The UAS will decide how to handle individual requests > according to > setting, rules, etc. An ACR service in the network would > merely filter out > some requests before they get to the UAS. What is the benefit? > > > > Best Regards > > > > Roland > > > > > > > > > -----Ursprüngliche Nachricht----- > > > Von: Elwell John [mailto:john.elwell@siemens.com] > > > Gesendet: Donnerstag, 25. August 2005 12:52 > > > An: Jesske, Roland; pkyzivat@cisco.com > > > Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > > > Betreff: RE: AW: [Sipping-tispan] TISPAN requirements, first > > > requiements > > > > > > > > > Roland, > > > > > > What value is the ACR server adding that cannot be provided > > > by the UAS? Or > > > put it another way, even if the ACR server allows certain > > > authorised callers > > > to override ACR, an "ACR" capability at the UAS would > > > presumably not allow > > > this so it would still reject all anonymous calls. So what > > has the ACR > > > server achieved? > > > > > > John > > > > > > > -----Original Message----- > > > > From: Jesske, R [mailto:R.Jesske@t-com.net] > > > > Sent: 25 August 2005 09:52 > > > > To: pkyzivat@cisco.com > > > > Cc: sipping-tispan@ietf.org; Alexeitsev, D > > > > Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first > > > > requiements > > > > > > > > Paul, > > > > I hope we do understand in future. Next Try. See below. > > > > > > > > > > > > > > > > > -----Ursprüngliche Nachricht----- > > > > > Von: Paul Kyzivat [mailto:pkyzivat@cisco.com] > > > > > Gesendet: Donnerstag, 25. August 2005 05:31 > > > > > An: Jesske, Roland > > > > > Cc: Miguel.An.Garcia@nokia.com; sipping-tispan@ietf.org; > > > > > Alexeitsev, Denis > > > > > Betreff: Re: AW: [Sipping-tispan] TISPAN requirements, first > > > > > requiements > > > > > > > > > > > > > > > > > > > > > > > > > Jesske, R wrote: > > > > > > Paul, > > > > > > With regard to this feature it must be based on trust > > > > > relationship as defined within RFC3325 for the > > > P-Asserted-Identity. > > > > > > So the indication that this is a authorised user is > > > > > included by a network entity like it is done for the > > > > > P-Asserted-Identiy. > > > > > > So the network entity knows it via a database that this > > > > > registered user is a authorised one. > > > > > > > > > > Either I don't understand you, or you don't understand me. > > > > > > > > > > RFC3325 is a way for some trusted element of the network that > > > > > knows the > > > > > source of the request to assert a trusted identity for the > > > > > source of the > > > > > message. It doesn't provide any authorization for anything. > > > > For the Marking of a call with a bypass allowance a network > > > > element must include on behalf of the user this element so > > > > that a Police-call is really a police call. > > > > I will try it with some flows: > > > > > > > > > > > > Police > > > > UA:A Proxy ACR UA:B > > > > -------------> -----------> -----------> > > > > F1:INVITE F2:INVITE F3:INVITE > > > > > > > > > > > > F1: INVITE > > > > No indications > > > > From: Anonymous > > > > > > > > F2: INVITE > > > > A indication is added indicating that this communication > > > > comes from a official authority (Police) > > > > From: Anonymous > > > > P-Asserted-Identity with privacy Id > > > > > > > > > > > > F3: INVITE > > > > ACR server forwards the communication due to the bypass > > indication > > > > From: Anonymous > > > > > > > > PSTN PSTN/ISDN > > > > User A GW ACR UA:B > > > > -------------> -----------> -----------> > > > > F1:IAM F2:INVITE F3:INVITE > > > > > > > > F1: IAM: > > > > No Calling Party number is included > > > > Call is marked as restricted by the network > > > > > > > > F2: INVITE > > > > A indication is included that points to the fact that the > > > > call is Anonymous because of a network restriction > > > > From: Anonymous > > > > P-Asserted-Identity absent > > > > > > > > F3: INVITE > > > > ACR server forwards the communication due to the indication > > > > that the communication is anonymous because of network > restriction > > > > From: Anonymous > > > > > > > > Untrusted my network > > > > ProxyA Proxy B ACR UA:B > > > > -------------> -----------> > > > > F1:INVITE F2:INVITE > > > > > > > > > > > > F1: INVITE > > > > No indications > > > > From: Anonymous > > > > No P-Asserted-Identity > > > > > > > > F2: INVITE > > > > No indication will be added because the request comes from an > > > > untrusted proxy > > > > From: Anonymous > > > > No Privacy > > > > > > > > ACR rejects the communication > > > > > > > > > > > > > > > > > > Ultimately, the ACR service must be implemented near and on > > > > behalf of > > > > > the recipient of the message. It isn't until there that it is > > > > > known that > > > > > there is any service to authorize. At that point, the > > > P-Asserted-ID > > > > > header may be present, but that just says who the caller > > > > is, not what > > > > > role the caller is playing. It seems that you want to do > > > role based > > > > > authorization, where the role is "entitled-to-override-ACR". > > > > > > > > > > So how is this role determined? Surely the recipient can't > > > > > have a DB of > > > > > all values of P-Asserted-ID that are authorized. The > > > > > alternative seems > > > > > to be that the source inserts not just a simple > > > > P-Asserted-ID with a > > > > > name, but rather also inserts some kind of role > identification. > > > > > > > > That could be the way out. That such a indication shall be > > > > bind to the P-Asserted identity and is included by the > > > > originating network-entity. > > > > Because we bind the ACR service to the P-Asserted-Identity. > > > > > > > > We reject the communication if a P-Asserted-Identity is > > > > included and the priv value is "Id", "user","header" and /or > > > > ""critical" and if the P-Asserted-Identity is absent. > > > > > > > > > > > > > > I'm looking for more indication of what the expectations > > > > are in this > > > > > regard. Is it the expectation that the source will annotate > > > > > every call > > > > > with an indication that the caller is permitted to override > > > > > ACR? > > > > > > > > Yes. > > > > > > > > >Or with > > > > > some other more generic categorization of caller type? > > > > > > > > That could be also a possibility. For solving the police > > > > communications but it makes it not easy with the ISDN/PSTN > > > > interworking. Because if we have such a caller type (What is > > > > also another requirement) than we have to distinguish at the > > > > Interworking Unit. Because some caller types can be mapped to > > > > the Calling parties category and others must be mapped to the > > > > network restriction indication. > > > > > > > > >Or what? > > > > > > > > > > > > > > > > > > > With regard to the PSTN/ISDN this was solved via a > > > > > indication that the Calling Party Number is restricted by the > > > > > network. The network included this indication in three cases: > > > > > > 1. The call was originated within a network that cannot > > > > > provide a originating number (e.G.) analogue. > > > > > > 2. The call has no originated number due to interworking > > > > > with international networks > > > > > > 3. The call was send from a authorised user (e.G. police). > > > > > This indication was then set by the network. This feature is > > > > > especially used in UK. > > > > > > > > > > So you are looking for some kind of enhancement to > > Privacy, that > > > > > indicates *why* privacy is requested? > > > > > > > > >From my point of view YES. > > > > > > > > First Idea was to have a privacy value that says "network > > > > restricted" (as it is in the PSTN/ISDN) to express that the > > > > Id is missing because of some network restrictions (like > > > > interworking, Analogue originating or such police calls). > > > > Because to add such value to the privacy header would be easy. > > > > But people had the opinion that this has nothing to do with > > > > privacy. So we looked fore some other possibility. That is > > > > what I have showed you above. > > > > > > > > I hope that this was better that we can come together and you > > > > understand me. > > > > > > > > Roland > > > > > > > > > > > > > > > > > > Paul > > > > > > > > > > > So with the requirement proposed by Miguel we hope to find > > > > > a solution to cover the 3 above mentioned cases. > > > > > > > > > > > > With regard to trust we want to have such a indication bind > > > > > to a trust relationship as it is described within RFC3325. > > > > > > So trust for interconnection to an other network is based > > > > > on bilateral agreement. > > > > > > > > > > > > > > > > > > Best Regards > > > > > > > > > > > > Roland > > > > > > > > > > > > > > > > > >>-----Ursprüngliche Nachricht----- > > > > > >>Von: sipping-tispan-bounces@ietf.org > > > > > >>[mailto:sipping-tispan-bounces@ietf.org] Im Auftrag von > > > > Paul Kyzivat > > > > > >>Gesendet: Mittwoch, 24. August 2005 05:07 > > > > > >>An: Miguel Garcia > > > > > >>Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > > > > > >>Betreff: Re: [Sipping-tispan] TISPAN requirements, first > > > > requiements > > > > > >> > > > > > >> > > > > > >> > > > > > >> > > > > > >>Miguel Garcia wrote: > > > > > >> > > > > > >>>Folks: > > > > > >>> > > > > > >>>Since we are tasked to re-draft the TISPAN requirements > > > > > >> > > > > > >>adding as much > > > > > >> > > > > > >>>clarifications as possible, we would like to start > checking > > > > > >> > > > > > >>with you if > > > > > >> > > > > > >>>the requirements related to the Annonymous Communication > > > > > >> > > > > > >>Rejection (ACR) > > > > > >> > > > > > >>>service is OK and understandable by everyone. > > > > > >>> > > > > > >>>So please take a look at the first version of the (much > > > > > >> > > > > > >>incomplete and > > > > > >> > > > > > >>>short) draft in either text or HTML: > > > > > >>> > > > > > >>> > > > > > >> > > > > > > >>http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sippin > > > > > > > > > > > > g-tispan-requirements-02a.txt > > > > > > > > > > > >>http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sipp > > > > ing-tispan-requirements-02a.html > > > > >> > > > > >> > > > > >>The document is fairly short at the moment. Please post > > > > your comments here. > > > > > > > > > > > > > > > Regarding REQ-ACR-2: > > > > > > > > > > > > > > >> REQ-ACR-2: It must be possible that authorized > > callers are not > > > > >> subject to the ACR service, thus, allowing > > > > the callee to > > > > >> receive anonymous requests from authorized > > > > callers. This > > > > >> effectively requires a mechanism to > > override the ACR > > > > >> service depending on the identity and > > > > authorization of the > > > > >> caller. This is needed, e.g., when a police > > > > officer or > > > > >> any other authority is anonymously > > calling to a user > > > > >> having the ACR simulation service activated. > > > > > > > > > > > > > > > How is a caller authorized? Is the mechanism for > > determining and > > > > > conveying this authorization in scope for this service? > > > > There is mention > > > > > specifically of Police Officers, among others, as being > > > > authorized. Are > > > > > there a list of attributes like that which must be used to > > > > characterize > > > > > a caller and that are used to determine the authorization? > > > > > > > > > > How is this affected by peering and PSTN interconnect? Is an > > > > > authorization on one side to be conveyed to the other > > > side and then > > > > > trusted their? > > > > > > > > > > Thanks, > > > > > Paul > > > > > > > > > > _______________________________________________ > > > > > Sipping-tispan mailing list > > > > > Sipping-tispan@ietf.org > > > > > https://www1.ietf.org/mailman/listinfo/sipping-tispan > > > > > > > > > > > > > _______________________________________________ > > > > Sipping-tispan mailing list > > > > Sipping-tispan@ietf.org > > > > https://www1.ietf.org/mailman/listinfo/sipping-tispan > > > > > > > > > > _______________________________________________ Sipping-tispan mailing list Sipping-tispan@ietf.org https://www1.ietf.org/mailman/listinfo/sipping-tispan
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Schmidt, Christian
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Alexeitsev, D
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Philip Mart
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Jitender Arora
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- RE: AW: AW: [Sipping-tispan] TISPAN requirements,… Michael Hammer (mhammer)
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat