Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
"Jitender Arora" <jitender_arora@lycos.com> Thu, 25 August 2005 23:19 UTC
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1E8R0N-0007gI-Ti; Thu, 25 Aug 2005 19:19:31 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1E8R0M-0007dH-1D
for sipping-tispan@megatron.ietf.org; Thu, 25 Aug 2005 19:19:30 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA26982
for <sipping-tispan@ietf.org>; Thu, 25 Aug 2005 19:19:26 -0400 (EDT)
Received: from webmail-outgoing.us4.outblaze.com ([205.158.62.67])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8R0r-0005sM-1C
for sipping-tispan@ietf.org; Thu, 25 Aug 2005 19:20:07 -0400
Received: from unknown (unknown [192.168.9.180])
by webmail-outgoing.us4.outblaze.com (Postfix) with QMQP id
87B3918001D7
for <sipping-tispan@ietf.org>; Thu, 25 Aug 2005 23:19:12 +0000 (GMT)
X-OB-Received: from unknown (208.36.123.31)
by wfilter.us4.outblaze.com; 25 Aug 2005 23:19:12 -0000
Received: by ws7-2.us4.outblaze.com (Postfix, from userid 1001)
id 6F84BE5BC7; Thu, 25 Aug 2005 23:19:12 +0000 (GMT)
Content-Disposition: inline
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain; charset="iso-8859-1"
MIME-Version: 1.0
From: "Jitender Arora" <jitender_arora@lycos.com>
To: "Miguel Garcia" <Miguel.An.Garcia@nokia.com>,
"Tom-PT Taylor" <taylor@nortel.com>
Date: Thu, 25 Aug 2005 18:19:12 -0500
Subject: Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
Received: from [216.41.24.2] by ws7-2.us4.outblaze.com with http for
jitender_arora@lycos.com; Thu, 25 Aug 2005 18:19:12 -0500
X-Originating-Ip: 216.41.24.2
X-Originating-Server: ws7-2.us4.outblaze.com
Message-Id: <20050825231912.6F84BE5BC7@ws7-2.us4.outblaze.com>
X-Spam-Score: 2.9 (++)
X-Scan-Signature: 1e47b908cbd1247f22e7953a41f1c4c6
Content-Transfer-Encoding: quoted-printable
Cc: sipping-tispan@ietf.org, "Alexeitsev, D" <D.Alexeitsev@t-com.net>
X-BeenThere: sipping-tispan@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Discussion of requirements for SIP introduced by ETSI TISPAN
<sipping-tispan.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/sipping-tispan>
List-Post: <mailto:sipping-tispan@ietf.org>
List-Help: <mailto:sipping-tispan-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=subscribe>
Sender: sipping-tispan-bounces@ietf.org
Errors-To: sipping-tispan-bounces@ietf.org
I am slightly confused here , Are we proposing the solution for this problem? or Are we just trying to capture the requirements? Because as people have pointed out that we already have the RFC3323/3325/ which talk about the privacy and how we can provide the privacy at the user/network level. Rgds, Jitender ----- Original Message ----- From: "Miguel Garcia" <Miguel.An.Garcia@nokia.com> To: "Tom-PT Taylor" <taylor@nortel.com> Subject: Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements Date: Thu, 25 Aug 2005 16:41:02 +0300 > > So what is an anonymous user? An anonymous user is one for which > his identity is not determined. The reason why a user is anonymous > is another story (the user want, or the network can't provide an > identity), but they are anonymous in both cases. > > /Miguel > > Tom-PT Taylor wrote: > > > I think your requirement is not quite accurate even at this level > > of abstraction. Roland has identified two different cases. One > > is your "certain anonymous users", but the other is the case > > where the user identity is unable due to the network's inability > > to provide it. > > > > I guess I can see your point about pushing too hastily to > > mechanism. Roland actually identified the information that might > > be used to resolve the issue at the rejection point: on the one > > hand, the identity of the caller if present in a P-A-Id, and on > > the other hand, the absence of a P-A-Id. It may be that this is > > all that is needed, and no further discussion is required in > > SIPPING. (Of course, that's assuming that the number of > > authorized caller identities any one rejection point has to keep > > track of is limited and provisionable.) > > > > Miguel Garcia wrote: > > > >> Tom: > >> > >> I agree with you in the essence, but you are referring to a > >> solution, not to a requirement. Essentially, whenever you need > >> to speak about an "indicator", it raises an alarm in my head > >> that you are speaking about a possible solution rather than a > >> requirement. > >> > >> So the requirement is tha there are certain anonymous users that > >> are not subject to be filtered by ACR. Then we can further > >> discuss the solution, which is probably going in the direction > >> you suggest. > >> > >> /Miguel > >> > >> Tom-PT Taylor wrote: > >> > >>> Let's just summarize the requirement. You've tied it to other > >>> mechanism below. I think it will be less confusing to abstract > >>> out the actual information that is needed. > >>> > >>> So: the requirement is that it be possible to include in SIP > >>> signalling an indicator that network-provided Anonymous Call > >>> Rejection should be overridden. This is needed in two > >>> circumstances: when the caller identity is unavailable in the > >>> first place, and when Privacy is invoked. There is an obvious > >>> ancillary requirement that this indicator be acted on only if > >>> it comes from a trusted source. > >>> > >>> Jesske, R wrote: > >>> > >>>> Paul, > >>>> I hope we do understand in future. Next Try. See below. > >>>> > >>>> > >>>> > >>>> > >>>>> -----Ursprüngliche Nachricht----- > >>>>> Von: Paul Kyzivat [mailto:pkyzivat@cisco.com] Gesendet: > >>>>> Donnerstag, 25. August 2005 05:31 > >>>>> An: Jesske, Roland > >>>>> Cc: Miguel.An.Garcia@nokia.com; sipping-tispan@ietf.org; > >>>>> Alexeitsev, Denis > >>>>> Betreff: Re: AW: [Sipping-tispan] TISPAN requirements, first requiements > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> Jesske, R wrote: > >>>>> > >>>>>> Paul, > >>>>>> With regard to this feature it must be based on trust > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> relationship as defined within RFC3325 for the P-Asserted-Identity. > >>>>> > >>>>>> So the indication that this is a authorised user is > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> included by a network entity like it is done for the P-Asserted-Identiy. > >>>>> > >>>>>> So the network entity knows it via a database that this > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> registered user is a authorised one. > >>>>> > >>>>> Either I don't understand you, or you don't understand me. > >>>>> > >>>>> RFC3325 is a way for some trusted element of the network that > >>>>> knows the source of the request to assert a trusted identity > >>>>> for the source of the message. It doesn't provide any > >>>>> authorization for anything. > >>>> > >>>> > >>>> > >>>> > >>>> For the Marking of a call with a bypass allowance a network > >>>> element must include on behalf of the user this element so > >>>> that a Police-call is really a police call. > >>>> I will try it with some flows: > >>>> > >>>> > >>>> Police > >>>> UA:A Proxy ACR UA:B > >>>> -------------> -----------> -----------> F1:INVITE > >>>> F2:INVITE F3:INVITE > >>>> > >>>> > >>>> F1: INVITE > >>>> No indications From: Anonymous > >>>> > >>>> F2: INVITE > >>>> A indication is added indicating that this communication comes > >>>> from a official authority (Police) > >>>> From: Anonymous > >>>> P-Asserted-Identity with privacy Id > >>>> > >>>> > >>>> F3: INVITE > >>>> ACR server forwards the communication due to the bypass indication > >>>> From: Anonymous > >>>> > >>>> PSTN PSTN/ISDN > >>>> User A GW ACR UA:B > >>>> -------------> -----------> -----------> F1:IAM > >>>> F2:INVITE F3:INVITE > >>>> > >>>> F1: IAM: > >>>> No Calling Party number is included > >>>> Call is marked as restricted by the network > >>>> > >>>> F2: INVITE > >>>> A indication is included that points to the fact that the call > >>>> is Anonymous because of a network restriction > >>>> From: Anonymous > >>>> P-Asserted-Identity absent > >>>> F3: INVITE > >>>> ACR server forwards the communication due to the indication > >>>> that the communication is anonymous because of network > >>>> restriction > >>>> From: Anonymous > >>>> > >>>> Untrusted my network > >>>> ProxyA Proxy B ACR UA:B > >>>> -------------> -----------> F1:INVITE > >>>> F2:INVITE F1: INVITE > >>>> No indications From: Anonymous > >>>> No P-Asserted-Identity > >>>> > >>>> F2: INVITE > >>>> No indication will be added because the request comes from an > >>>> untrusted proxy > >>>> From: Anonymous > >>>> No Privacy > >>>> > >>>> ACR rejects the communication > >>>> > >>>> > >>>> > >>>>> Ultimately, the ACR service must be implemented near and on > >>>>> behalf of the recipient of the message. It isn't until there > >>>>> that it is known that there is any service to authorize. At > >>>>> that point, the P-Asserted-ID header may be present, but that > >>>>> just says who the caller is, not what role the caller is > >>>>> playing. It seems that you want to do role based > >>>>> authorization, where the role is "entitled-to-override-ACR". > >>>>> > >>>>> So how is this role determined? Surely the recipient can't > >>>>> have a DB of all values of P-Asserted-ID that are authorized. > >>>>> The alternative seems to be that the source inserts not just > >>>>> a simple P-Asserted-ID with a name, but rather also inserts > >>>>> some kind of role identification. > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> That could be the way out. That such a indication shall be > >>>> bind to the P-Asserted identity and is included by the > >>>> originating network-entity. > >>>> Because we bind the ACR service to the P-Asserted-Identity. > >>>> > >>>> We reject the communication if a P-Asserted-Identity is > >>>> included and the priv value is "Id", "user","header" and /or > >>>> ""critical" and if the P-Asserted-Identity is absent. > >>>> > >>>> > >>>>> I'm looking for more indication of what the expectations are > >>>>> in this regard. Is it the expectation that the source will > >>>>> annotate every call with an indication that the caller is > >>>>> permitted to override ACR? > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> Yes. > >>>> > >>>> > >>>>> Or with some other more generic categorization of caller type? > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> That could be also a possibility. For solving the police > >>>> communications but it makes it not easy with the ISDN/PSTN > >>>> interworking. Because if we have such a caller type (What is > >>>> also another requirement) than we have to distinguish at the > >>>> Interworking Unit. Because some caller types can be mapped to > >>>> the Calling parties category and others must be mapped to the > >>>> network restriction indication. > >>>> > >>>> > >>>>> Or what? > >>>> > >>>> > >>>> > >>>> > >>>> > >>>> > >>>>>> With regard to the PSTN/ISDN this was solved via a > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> indication that the Calling Party Number is restricted by the > >>>>> network. The network included this indication in three cases: > >>>>> > >>>>>> 1. The call was originated within a network that cannot > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> provide a originating number (e.G.) analogue. > >>>>> > >>>>>> 2. The call has no originated number due to interworking > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> with international networks > >>>>> > >>>>>> 3. The call was send from a authorised user (e.G. police). > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> This indication was then set by the network. This feature is > >>>>> especially used in UK. > >>>>> > >>>>> So you are looking for some kind of enhancement to Privacy, > >>>>> that indicates *why* privacy is requested? > >>>> > >>>> > >>>> > >>>> > >>>> > >>>>> From my point of view YES. > >>>> > >>>> > >>>> > >>>> > >>>> First Idea was to have a privacy value that says "network > >>>> restricted" (as it is in the PSTN/ISDN) to express that the Id > >>>> is missing because of some network restrictions (like > >>>> interworking, Analogue originating or such police calls). > >>>> Because to add such value to the privacy header would be easy. > >>>> But people had the opinion that this has nothing to do with > >>>> privacy. So we looked fore some other possibility. That is > >>>> what I have showed you above. > >>>> > >>>> I hope that this was better that we can come together and you > >>>> understand me. > >>>> > >>>> Roland > >>>> > >>>> > >>>> > >>>>> Paul > >>>>> > >>>>> > >>>>>> So with the requirement proposed by Miguel we hope to find > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> a solution to cover the 3 above mentioned cases. > >>>>> > >>>>>> With regard to trust we want to have such a indication bind > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> to a trust relationship as it is described within RFC3325. > >>>>> > >>>>>> So trust for interconnection to an other network is based > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> on bilateral agreement. > >>>>> > >>>>>> > >>>>>> Best Regards > >>>>>> > >>>>>> Roland > >>>>>> > >>>>>> > >>>>>> > >>>>>>> -----Ursprüngliche Nachricht----- > >>>>>>> Von: sipping-tispan-bounces@ietf.org > >>>>>>> [mailto:sipping-tispan-bounces@ietf.org] Im Auftrag von > >>>>>>> Paul Kyzivat > >>>>>>> Gesendet: Mittwoch, 24. August 2005 05:07 > >>>>>>> An: Miguel Garcia > >>>>>>> Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > >>>>>>> Betreff: Re: [Sipping-tispan] TISPAN requirements, first requiements > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> Miguel Garcia wrote: > >>>>>>> > >>>>>>> > >>>>>>>> Folks: > >>>>>>>> > >>>>>>>> Since we are tasked to re-draft the TISPAN requirements > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> adding as much > >>>>>>> > >>>>>>>> clarifications as possible, we would like to start checking > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> with you if > >>>>>>> > >>>>>>>> the requirements related to the Annonymous Communication > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> Rejection (ACR) > >>>>>>> > >>>>>>>> service is OK and understandable by everyone. > >>>>>>>> > >>>>>>>> So please take a look at the first version of the (much > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> > >>>>>>> incomplete and > >>>>>>> > >>>>>>>> short) draft in either text or HTML: > >>>>>>>> > >>>>>>>> > >>>>>>> > >>>>>>> http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sippin > >>>>>> > >>>>>> > >>>>>> > >>>>>> > >>>>>> g-tispan-requirements-02a.txt > >>>>>> > >>>>>>> http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sipp > >>>> > >>>> > >>>> > >>>> > >>>> ing-tispan-requirements-02a.html > >>>> > >>>>>> > >>>>>> The document is fairly short at the moment. Please post your > >>>>>> comments here. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> Regarding REQ-ACR-2: > >>>>> > >>>>> > >>>>> > >>>>>> REQ-ACR-2: It must be possible that authorized callers are not > >>>>>> subject to the ACR service, thus, allowing the callee to > >>>>>> receive anonymous requests from authorized callers. This > >>>>>> effectively requires a mechanism to override the ACR > >>>>>> service depending on the identity and authorization of the > >>>>>> caller. This is needed, e.g., when a police officer or > >>>>>> any other authority is anonymously calling to a user > >>>>>> having the ACR simulation service activated. > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> > >>>>> How is a caller authorized? Is the mechanism for determining > >>>>> and conveying this authorization in scope for this service? > >>>>> There is mention specifically of Police Officers, among > >>>>> others, as being authorized. Are there a list of attributes > >>>>> like that which must be used to characterize a caller and > >>>>> that are used to determine the authorization? > >>>>> > >>>>> How is this affected by peering and PSTN interconnect? Is an > >>>>> authorization on one side to be conveyed to the other side > >>>>> and then trusted their? > >>>>> > >>>>> Thanks, > >>>>> Paul > >>>>> > >>>>> _______________________________________________ > >>>>> Sipping-tispan mailing list > >>>>> Sipping-tispan@ietf.org > >>>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan > >>>>> > >>>> > >>>> > >>>> _______________________________________________ > >>>> Sipping-tispan mailing list > >>>> Sipping-tispan@ietf.org > >>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan > >>>> > >>>> > >>> > >>> > >>> _______________________________________________ > >>> Sipping-tispan mailing list > >>> Sipping-tispan@ietf.org > >>> https://www1.ietf.org/mailman/listinfo/sipping-tispan > >>> > >> > > > > -- Miguel A. Garcia tel:+358-50-4804586 > sip:miguel.an.garcia@openlaboratory.net > Nokia Research Center Helsinki, Finland > > > _______________________________________________ > Sipping-tispan mailing list > Sipping-tispan@ietf.org > https://www1.ietf.org/mailman/listinfo/sipping-tispan -- _______________________________________________ Search for businesses by name, location, or phone number. -Lycos Yellow Pages http://r.lycos.com/r/yp_emailfooter/http://yellowpages.lycos.com/default.asp?SRC=lycos10 _______________________________________________ Sipping-tispan mailing list Sipping-tispan@ietf.org https://www1.ietf.org/mailman/listinfo/sipping-tispan
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Schmidt, Christian
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Alexeitsev, D
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Philip Mart
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Jitender Arora
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- RE: AW: AW: [Sipping-tispan] TISPAN requirements,… Michael Hammer (mhammer)
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat