AW: AW: [Sipping-tispan] TISPAN requirements, first requiements

"Jesske, R" <R.Jesske@t-com.net> Thu, 25 August 2005 10:59 UTC

Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E8FRu-0007AN-N9; Thu, 25 Aug 2005 06:59:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1E8FRs-0007AI-Q6 for sipping-tispan@megatron.ietf.org; Thu, 25 Aug 2005 06:59:08 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id GAA12260 for <sipping-tispan@ietf.org>; Thu, 25 Aug 2005 06:59:06 -0400 (EDT)
Received: from tcmail33.telekom.de ([217.6.95.240]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8FSO-0007ZH-10 for sipping-tispan@ietf.org; Thu, 25 Aug 2005 06:59:40 -0400
Received: from s4de8psaans.mitte.t-com.de by tcmail31.dmz.telekom.de with ESMTP; Thu, 25 Aug 2005 12:58:58 +0200
Received: by S4DE8PSAANS.blf.telekom.de with Internet Mail Service (5.5.2653.19) id <RMLSCQCN>; Thu, 25 Aug 2005 12:58:58 +0200
Message-Id: <E7666D92C64C2845AEF12636FF94F95202319E98@S4DE8PSAAGQ.blf.telekom.de>
From: "Jesske, R" <R.Jesske@t-com.net>
To: john.elwell@siemens.com, pkyzivat@cisco.com
Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
Date: Thu, 25 Aug 2005 12:58:52 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: 0.0 (/)
X-Scan-Signature: a630332fa112280ecc4c4186b5c9ea83
Content-Transfer-Encoding: quoted-printable
Cc: sipping-tispan@ietf.org, "Alexeitsev, D" <D.Alexeitsev@t-com.net>
X-BeenThere: sipping-tispan@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Discussion of requirements for SIP introduced by ETSI TISPAN <sipping-tispan.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>, <mailto:sipping-tispan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/sipping-tispan>
List-Post: <mailto:sipping-tispan@ietf.org>
List-Help: <mailto:sipping-tispan-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>, <mailto:sipping-tispan-request@ietf.org?subject=subscribe>
Sender: sipping-tispan-bounces@ietf.org
Errors-To: sipping-tispan-bounces@ietf.org

John,
Yes of course the the UAS can do this. But this is also possible in the PSTN/ISDN world where this service is working.

This service with this bypass is especially working in some networks (not in Germany). In this countries it is also coming from the regulator if my knowledge is correct.

I can do the same manually when unknown is displayed in my ISDN phone.

But the important is that the originator (Police) has the chance to come through.

Best Regards

Roland



> -----Ursprüngliche Nachricht-----
> Von: Elwell John [mailto:john.elwell@siemens.com] 
> Gesendet: Donnerstag, 25. August 2005 12:52
> An: Jesske, Roland; pkyzivat@cisco.com
> Cc: sipping-tispan@ietf.org; Alexeitsev, Denis
> Betreff: RE: AW: [Sipping-tispan] TISPAN requirements, first 
> requiements
> 
> 
> Roland,
> 
> What value is the ACR server adding that cannot be provided 
> by the UAS? Or
> put it another way, even if the ACR server allows certain 
> authorised callers
> to override ACR, an "ACR" capability at the UAS would 
> presumably not allow
> this so it would still reject all anonymous calls. So what has the ACR
> server achieved?
> 
> John
> 
> > -----Original Message-----
> > From: Jesske, R [mailto:R.Jesske@t-com.net] 
> > Sent: 25 August 2005 09:52
> > To: pkyzivat@cisco.com
> > Cc: sipping-tispan@ietf.org; Alexeitsev, D
> > Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first 
> > requiements
> > 
> > Paul,
> > I hope we do understand in future. Next Try. See below.
> > 
> > 
> > 
> > > -----Ursprüngliche Nachricht-----
> > > Von: Paul Kyzivat [mailto:pkyzivat@cisco.com] 
> > > Gesendet: Donnerstag, 25. August 2005 05:31
> > > An: Jesske, Roland
> > > Cc: Miguel.An.Garcia@nokia.com; sipping-tispan@ietf.org; 
> > > Alexeitsev, Denis
> > > Betreff: Re: AW: [Sipping-tispan] TISPAN requirements, first 
> > > requiements
> > > 
> > > 
> > > 
> > > 
> > > Jesske, R wrote:
> > > > Paul,
> > > > With regard to this feature it must be based on trust 
> > > relationship as defined within RFC3325 for the 
> P-Asserted-Identity.
> > > > So the indication that this is a authorised user is 
> > > included by a network entity like it is done for the 
> > > P-Asserted-Identiy.
> > > > So the network entity knows it via a database that this 
> > > registered user is a authorised one.
> > > 
> > > Either I don't understand you, or you don't understand me.
> > > 
> > > RFC3325 is a way for some trusted element of the network that 
> > > knows the 
> > > source of the request to assert a trusted identity for the 
> > > source of the 
> > > message. It doesn't provide any authorization for anything.
> > For the Marking of a call with a bypass allowance a network 
> > element must include on behalf of the user this element so 
> > that a Police-call is really a police call.
> > I will try it with some flows:
> > 
> > 
> > Police
> >   UA:A        Proxy            ACR          UA:B
> >    ------------->  ----------->   -----------> 
> >    F1:INVITE         F2:INVITE     F3:INVITE
> > 
> > 
> > F1: INVITE
> > No indications 
> > From: Anonymous
> > 
> > F2: INVITE
> > A indication is added indicating that this communication 
> > comes from a official authority (Police)
> > From: Anonymous
> > P-Asserted-Identity with privacy Id
> > 
> > 
> > F3: INVITE
> > ACR server forwards the communication due to the  bypass indication
> > From: Anonymous
> > 
> > PSTN         PSTN/ISDN
> >   User A         GW           ACR          UA:B
> >    ------------->  ----------->   -----------> 
> >    F1:IAM           F2:INVITE     F3:INVITE
> > 
> > F1: IAM:
> > No Calling Party number is included
> > Call is marked as restricted by the network
> > 
> > F2: INVITE
> > A indication is included that points to the fact that the 
> > call is Anonymous because of a network restriction
> >  From: Anonymous
> > P-Asserted-Identity absent 
> > 
> > F3: INVITE
> > ACR server forwards the communication due to the  indication 
> > that the communication is anonymous because of network restriction
> > From: Anonymous
> > 
> > Untrusted    my network
> >  ProxyA       Proxy B            ACR          UA:B
> >    ------------->  ----------->   
> >    F1:INVITE         F2:INVITE     
> > 
> > 
> > F1: INVITE
> > No indications 
> > From: Anonymous
> > No P-Asserted-Identity
> > 
> > F2: INVITE
> > No indication will be added because the request comes from an 
> > untrusted proxy
> > From: Anonymous
> > No Privacy
> > 
> > ACR rejects the communication
> > 
> > 
> > > 
> > > Ultimately, the ACR service must be implemented near and on 
> > behalf of 
> > > the recipient of the message. It isn't until there that it is 
> > > known that 
> > > there is any service to authorize. At that point, the 
> P-Asserted-ID 
> > > header may be present, but that just says who the caller 
> > is, not what 
> > > role the caller is playing. It seems that you want to do 
> role based 
> > > authorization, where the role is "entitled-to-override-ACR".
> > > 
> > > So how is this role determined? Surely the recipient can't 
> > > have a DB of 
> > > all values of P-Asserted-ID that are authorized. The 
> > > alternative seems 
> > > to be that the source inserts not just a simple 
> > P-Asserted-ID with a 
> > > name, but rather also inserts some kind of role identification.
> > 
> > That could be the way out. That such a indication shall be 
> > bind to the P-Asserted identity and is included by the 
> > originating network-entity.
> > Because we bind the ACR service to the P-Asserted-Identity.
> > 
> > We reject the communication if a P-Asserted-Identity is 
> > included and the priv value is "Id", "user","header" and /or 
> > ""critical" and if the P-Asserted-Identity is absent.
> > 
> > > 
> > > I'm looking for more indication of what the expectations 
> > are in this 
> > > regard. Is it the expectation that the source will annotate 
> > > every call 
> > > with an indication that the caller is permitted to override 
> > > ACR? 
> > 
> > Yes.
> > 
> > >Or with 
> > > some other more generic categorization of caller type? 
> > 
> > That could be also a possibility. For solving the police 
> > communications but it makes it not easy with the ISDN/PSTN 
> > interworking. Because if we have such a caller type (What is 
> > also another requirement) than we have to distinguish at the 
> > Interworking Unit. Because some caller types can be mapped to 
> > the Calling parties category and others must be mapped to the 
> > network restriction indication.
> > 
> > >Or what?
> > 
> > 
> > > 
> > > > With regard to the PSTN/ISDN this was solved via a 
> > > indication that the Calling Party Number is restricted by the 
> > > network. The network included this indication in three cases:
> > > > 1. The call was originated within a network that cannot 
> > > provide a originating number (e.G.) analogue.
> > > > 2. The call has no originated number due to interworking 
> > > with international networks
> > > > 3. The call was send from a authorised user (e.G. police). 
> > > This indication was then set by the network. This feature is 
> > > especially used in UK.
> > > 
> > > So you are looking for some kind of enhancement to Privacy, that 
> > > indicates *why* privacy is requested?
> > 
> > >From my point of view YES.
> > 
> > First Idea was to have a privacy value that says "network 
> > restricted" (as it is in the PSTN/ISDN) to express that the 
> > Id is missing because of some network restrictions (like 
> > interworking, Analogue originating or such police calls). 
> > Because to add such value to the privacy header would be easy.
> > But people had the opinion that this has nothing to do with 
> > privacy. So we looked fore some other possibility. That is 
> > what I have showed you above.
> > 
> > I hope that this was better that we can come together and you 
> > understand me.
> > 
> > Roland
> > 
> > 
> > > 
> > > 	Paul
> > > 
> > > > So with the requirement proposed by Miguel we hope to find 
> > > a solution to cover the 3 above mentioned cases.
> > > > 
> > > > With regard to trust we want to have such a indication bind 
> > > to a trust relationship as it is described within RFC3325.
> > > > So trust for interconnection to an other network is based 
> > > on bilateral agreement.
> > > > 
> > > > 
> > > > Best Regards
> > > > 
> > > > Roland
> > > > 
> > > > 
> > > >>-----Ursprüngliche Nachricht-----
> > > >>Von: sipping-tispan-bounces@ietf.org 
> > > >>[mailto:sipping-tispan-bounces@ietf.org] Im Auftrag von 
> > Paul Kyzivat
> > > >>Gesendet: Mittwoch, 24. August 2005 05:07
> > > >>An: Miguel Garcia
> > > >>Cc: sipping-tispan@ietf.org; Alexeitsev, Denis
> > > >>Betreff: Re: [Sipping-tispan] TISPAN requirements, first 
> > requiements
> > > >>
> > > >>
> > > >>
> > > >>
> > > >>Miguel Garcia wrote:
> > > >>
> > > >>>Folks:
> > > >>>
> > > >>>Since we are tasked to re-draft the TISPAN requirements 
> > > >>
> > > >>adding as much 
> > > >>
> > > >>>clarifications as possible, we would like to start checking 
> > > >>
> > > >>with you if 
> > > >>
> > > >>>the requirements related to the Annonymous Communication 
> > > >>
> > > >>Rejection (ACR) 
> > > >>
> > > >>>service is OK and understandable by everyone.
> > > >>>
> > > >>>So please take a look at the first version of the (much 
> > > >>
> > > >>incomplete and 
> > > >>
> > > >>>short) draft in either text or HTML:
> > > >>>
> > > >>>
> > > >>
> > > >>http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sippin
> > > > 
> > > > g-tispan-requirements-02a.txt 
> > > > 
> > > >>http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sipp
> > ing-tispan-requirements-02a.html 
> > >>
> > >>
> > >>The document is fairly short at the moment. Please post 
> > your comments here.
> > > 
> > > 
> > > Regarding REQ-ACR-2:
> > > 
> > > 
> > >>   REQ-ACR-2: It must be possible that authorized callers are not
> > >>              subject to the ACR service, thus, allowing 
> > the callee to
> > >>              receive anonymous requests from authorized 
> > callers.  This
> > >>              effectively requires a mechanism to override the ACR
> > >>              service depending on the identity and 
> > authorization of the
> > >>              caller.  This is needed, e.g., when a police 
> > officer or
> > >>              any other authority is anonymously calling to a user
> > >>              having the ACR simulation service activated.
> > > 
> > > 
> > > How is a caller authorized? Is the mechanism for determining and 
> > > conveying this authorization in scope for this service? 
> > There is mention 
> > > specifically of Police Officers, among others, as being 
> > authorized. Are 
> > > there a list of attributes like that which must be used to 
> > characterize 
> > > a caller and that are used to determine the authorization?
> > > 
> > > How is this affected by peering and PSTN interconnect? Is an 
> > > authorization on one side to be conveyed to the other 
> side and then 
> > > trusted their?
> > > 
> > > 	Thanks,
> > > 	Paul
> > > 
> > > _______________________________________________
> > > Sipping-tispan mailing list
> > > Sipping-tispan@ietf.org
> > > https://www1.ietf.org/mailman/listinfo/sipping-tispan
> > > 
> > 
> > _______________________________________________
> > Sipping-tispan mailing list
> > Sipping-tispan@ietf.org
> > https://www1.ietf.org/mailman/listinfo/sipping-tispan
> > 
> 

_______________________________________________
Sipping-tispan mailing list
Sipping-tispan@ietf.org
https://www1.ietf.org/mailman/listinfo/sipping-tispan