RE: AW: [Sipping-tispan] TISPAN requirements, first requiements
"GARCIN Sebastien RD-CORE-ISS" <sebastien.garcin@francetelecom.com> Thu, 25 August 2005 11:40 UTC
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1E8G6D-0001Zg-1W; Thu, 25 Aug 2005 07:40:49 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1E8G69-0001X5-Op
for sipping-tispan@megatron.ietf.org; Thu, 25 Aug 2005 07:40:47 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id HAA13200
for <sipping-tispan@ietf.org>; Thu, 25 Aug 2005 07:40:44 -0400 (EDT)
Received: from p-mail1.rd.francetelecom.com ([195.101.245.15])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8G6f-00007d-6Q
for sipping-tispan@ietf.org; Thu, 25 Aug 2005 07:41:17 -0400
Received: from ftrdmel1.rd.francetelecom.fr ([10.193.117.152]) by
ftrdsmtp2.rd.francetelecom.fr with Microsoft SMTPSVC(6.0.3790.211);
Thu, 25 Aug 2005 13:40:40 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: AW: [Sipping-tispan] TISPAN requirements, first requiements
Date: Thu, 25 Aug 2005 13:40:39 +0200
Message-ID: <49E7012A614B024B80A7D175CB9A64EC061F6D82@ftrdmel1.rd.francetelecom.fr>
Thread-Topic: AW: [Sipping-tispan] TISPAN requirements, first requiements
Thread-Index: AcWpZuvSa4sVv3ieRWuAddnq1+ei6QAAodng
From: "GARCIN Sebastien RD-CORE-ISS" <sebastien.garcin@francetelecom.com>
To: "Jesske, R" <R.Jesske@t-com.net>, <john.elwell@siemens.com>,
<pkyzivat@cisco.com>
X-OriginalArrivalTime: 25 Aug 2005 11:40:40.0197 (UTC)
FILETIME=[D1887B50:01C5A969]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 4f585e1bcd209294c6b9386034cecfc6
Content-Transfer-Encoding: quoted-printable
Cc: sipping-tispan@ietf.org, "Alexeitsev, D" <D.Alexeitsev@t-com.net>
X-BeenThere: sipping-tispan@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Discussion of requirements for SIP introduced by ETSI TISPAN
<sipping-tispan.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/sipping-tispan>
List-Post: <mailto:sipping-tispan@ietf.org>
List-Help: <mailto:sipping-tispan-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=subscribe>
Sender: sipping-tispan-bounces@ietf.org
Errors-To: sipping-tispan-bounces@ietf.org
All, As an operator, I'd like to support Roland on this particular point. Also this doesn't prevent anybody from implementing this type on feature on SIP phones. BR, sebastien -----Message d'origine----- De : sipping-tispan-bounces@ietf.org [mailto:sipping-tispan-bounces@ietf.org] De la part de Jesske, R Envoyé : jeudi 25 août 2005 13:16 À : john.elwell@siemens.com; pkyzivat@cisco.com Cc : sipping-tispan@ietf.org; Alexeitsev, D Objet : AW: AW: [Sipping-tispan] TISPAN requirements, first requiements John, First it is a regulatory service that must be provided by an operator in Europe. Second there is also a marked demand to fulfil such services (not only ACR also others) within the network. We as want to add our networks services to satisfy our customers. Roland > -----Ursprüngliche Nachricht----- > Von: Elwell John [mailto:john.elwell@siemens.com] > Gesendet: Donnerstag, 25. August 2005 13:10 > An: Jesske, Roland; pkyzivat@cisco.com > Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > Betreff: RE: AW: [Sipping-tispan] TISPAN requirements, first > requiements > > > Roland, > > See below. > > John > > > > -----Original Message----- > > From: Jesske, R [mailto:R.Jesske@t-com.net] > > Sent: 25 August 2005 11:59 > > To: Elwell John; pkyzivat@cisco.com > > Cc: sipping-tispan@ietf.org; Alexeitsev, D > > Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first > > requiements > > > > John, > > Yes of course the the UAS can do this. But this is also possible in > > the PSTN/ISDN world where this service is working. > > > > This service with this bypass is especially working in some networks > > (not in Germany). In this countries it is also coming from the > > regulator if my knowledge is correct. > > > > I can do the same manually when unknown is displayed in my > ISDN phone. > > > > But the important is that the originator (Police) has the chance to > > come through. > [JRE] Without the ACR service all requests / calls will get through to > the UAS. The UAS will decide how to handle individual requests > according to setting, rules, etc. An ACR service in the network would > merely filter out some requests before they get to the UAS. What is > the benefit? > > > > Best Regards > > > > Roland > > > > > > > > > -----Ursprüngliche Nachricht----- > > > Von: Elwell John [mailto:john.elwell@siemens.com] > > > Gesendet: Donnerstag, 25. August 2005 12:52 > > > An: Jesske, Roland; pkyzivat@cisco.com > > > Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > > > Betreff: RE: AW: [Sipping-tispan] TISPAN requirements, first > > > requiements > > > > > > > > > Roland, > > > > > > What value is the ACR server adding that cannot be provided by the > > > UAS? Or put it another way, even if the ACR server allows certain > > > authorised callers to override ACR, an "ACR" capability at the UAS > > > would presumably not allow this so it would still reject all > > > anonymous calls. So what > > has the ACR > > > server achieved? > > > > > > John > > > > > > > -----Original Message----- > > > > From: Jesske, R [mailto:R.Jesske@t-com.net] > > > > Sent: 25 August 2005 09:52 > > > > To: pkyzivat@cisco.com > > > > Cc: sipping-tispan@ietf.org; Alexeitsev, D > > > > Subject: AW: AW: [Sipping-tispan] TISPAN requirements, first > > > > requiements > > > > > > > > Paul, > > > > I hope we do understand in future. Next Try. See below. > > > > > > > > > > > > > > > > > -----Ursprüngliche Nachricht----- > > > > > Von: Paul Kyzivat [mailto:pkyzivat@cisco.com] > > > > > Gesendet: Donnerstag, 25. August 2005 05:31 > > > > > An: Jesske, Roland > > > > > Cc: Miguel.An.Garcia@nokia.com; sipping-tispan@ietf.org; > > > > > Alexeitsev, Denis > > > > > Betreff: Re: AW: [Sipping-tispan] TISPAN requirements, first > > > > > requiements > > > > > > > > > > > > > > > > > > > > > > > > > Jesske, R wrote: > > > > > > Paul, > > > > > > With regard to this feature it must be based on trust > > > > > relationship as defined within RFC3325 for the > > > P-Asserted-Identity. > > > > > > So the indication that this is a authorised user is > > > > > included by a network entity like it is done for the > > > > > P-Asserted-Identiy. > > > > > > So the network entity knows it via a database that this > > > > > registered user is a authorised one. > > > > > > > > > > Either I don't understand you, or you don't understand me. > > > > > > > > > > RFC3325 is a way for some trusted element of the network that > > > > > knows the source of the request to assert a trusted identity > > > > > for the source of the message. It doesn't provide any > > > > > authorization for anything. > > > > For the Marking of a call with a bypass allowance a network > > > > element must include on behalf of the user this element so that > > > > a Police-call is really a police call. > > > > I will try it with some flows: > > > > > > > > > > > > Police > > > > UA:A Proxy ACR UA:B > > > > -------------> -----------> -----------> > > > > F1:INVITE F2:INVITE F3:INVITE > > > > > > > > > > > > F1: INVITE > > > > No indications > > > > From: Anonymous > > > > > > > > F2: INVITE > > > > A indication is added indicating that this communication comes > > > > from a official authority (Police) > > > > From: Anonymous > > > > P-Asserted-Identity with privacy Id > > > > > > > > > > > > F3: INVITE > > > > ACR server forwards the communication due to the bypass > > indication > > > > From: Anonymous > > > > > > > > PSTN PSTN/ISDN > > > > User A GW ACR UA:B > > > > -------------> -----------> -----------> > > > > F1:IAM F2:INVITE F3:INVITE > > > > > > > > F1: IAM: > > > > No Calling Party number is included Call is marked as restricted > > > > by the network > > > > > > > > F2: INVITE > > > > A indication is included that points to the fact that the call > > > > is Anonymous because of a network restriction > > > > From: Anonymous > > > > P-Asserted-Identity absent > > > > > > > > F3: INVITE > > > > ACR server forwards the communication due to the indication > > > > that the communication is anonymous because of network > restriction > > > > From: Anonymous > > > > > > > > Untrusted my network > > > > ProxyA Proxy B ACR UA:B > > > > -------------> -----------> > > > > F1:INVITE F2:INVITE > > > > > > > > > > > > F1: INVITE > > > > No indications > > > > From: Anonymous > > > > No P-Asserted-Identity > > > > > > > > F2: INVITE > > > > No indication will be added because the request comes from an > > > > untrusted proxy > > > > From: Anonymous > > > > No Privacy > > > > > > > > ACR rejects the communication > > > > > > > > > > > > > > > > > > Ultimately, the ACR service must be implemented near and on > > > > behalf of > > > > > the recipient of the message. It isn't until there that it is > > > > > known that there is any service to authorize. At that point, > > > > > the > > > P-Asserted-ID > > > > > header may be present, but that just says who the caller > > > > is, not what > > > > > role the caller is playing. It seems that you want to do > > > role based > > > > > authorization, where the role is "entitled-to-override-ACR". > > > > > > > > > > So how is this role determined? Surely the recipient can't > > > > > have a DB of all values of P-Asserted-ID that are authorized. > > > > > The alternative seems to be that the source inserts not just a > > > > > simple > > > > P-Asserted-ID with a > > > > > name, but rather also inserts some kind of role > identification. > > > > > > > > That could be the way out. That such a indication shall be bind > > > > to the P-Asserted identity and is included by the originating > > > > network-entity. > > > > Because we bind the ACR service to the P-Asserted-Identity. > > > > > > > > We reject the communication if a P-Asserted-Identity is included > > > > and the priv value is "Id", "user","header" and /or ""critical" > > > > and if the P-Asserted-Identity is absent. > > > > > > > > > > > > > > I'm looking for more indication of what the expectations > > > > are in this > > > > > regard. Is it the expectation that the source will annotate > > > > > every call with an indication that the caller is permitted to > > > > > override ACR? > > > > > > > > Yes. > > > > > > > > >Or with > > > > > some other more generic categorization of caller type? > > > > > > > > That could be also a possibility. For solving the police > > > > communications but it makes it not easy with the ISDN/PSTN > > > > interworking. Because if we have such a caller type (What is > > > > also another requirement) than we have to distinguish at the > > > > Interworking Unit. Because some caller types can be mapped to > > > > the Calling parties category and others must be mapped to the > > > > network restriction indication. > > > > > > > > >Or what? > > > > > > > > > > > > > > > > > > > With regard to the PSTN/ISDN this was solved via a > > > > > indication that the Calling Party Number is restricted by the > > > > > network. The network included this indication in three cases: > > > > > > 1. The call was originated within a network that cannot > > > > > provide a originating number (e.G.) analogue. > > > > > > 2. The call has no originated number due to interworking > > > > > with international networks > > > > > > 3. The call was send from a authorised user (e.G. police). > > > > > This indication was then set by the network. This feature is > > > > > especially used in UK. > > > > > > > > > > So you are looking for some kind of enhancement to > > Privacy, that > > > > > indicates *why* privacy is requested? > > > > > > > > >From my point of view YES. > > > > > > > > First Idea was to have a privacy value that says "network > > > > restricted" (as it is in the PSTN/ISDN) to express that the Id > > > > is missing because of some network restrictions (like > > > > interworking, Analogue originating or such police calls). > > > > Because to add such value to the privacy header would be easy. > > > > But people had the opinion that this has nothing to do with > > > > privacy. So we looked fore some other possibility. That is what > > > > I have showed you above. > > > > > > > > I hope that this was better that we can come together and you > > > > understand me. > > > > > > > > Roland > > > > > > > > > > > > > > > > > > Paul > > > > > > > > > > > So with the requirement proposed by Miguel we hope to find > > > > > a solution to cover the 3 above mentioned cases. > > > > > > > > > > > > With regard to trust we want to have such a indication bind > > > > > to a trust relationship as it is described within RFC3325. > > > > > > So trust for interconnection to an other network is based > > > > > on bilateral agreement. > > > > > > > > > > > > > > > > > > Best Regards > > > > > > > > > > > > Roland > > > > > > > > > > > > > > > > > >>-----Ursprüngliche Nachricht----- > > > > > >>Von: sipping-tispan-bounces@ietf.org > > > > > >>[mailto:sipping-tispan-bounces@ietf.org] Im Auftrag von > > > > Paul Kyzivat > > > > > >>Gesendet: Mittwoch, 24. August 2005 05:07 > > > > > >>An: Miguel Garcia > > > > > >>Cc: sipping-tispan@ietf.org; Alexeitsev, Denis > > > > > >>Betreff: Re: [Sipping-tispan] TISPAN requirements, first > > > > requiements > > > > > >> > > > > > >> > > > > > >> > > > > > >> > > > > > >>Miguel Garcia wrote: > > > > > >> > > > > > >>>Folks: > > > > > >>> > > > > > >>>Since we are tasked to re-draft the TISPAN requirements > > > > > >> > > > > > >>adding as much > > > > > >> > > > > > >>>clarifications as possible, we would like to start > checking > > > > > >> > > > > > >>with you if > > > > > >> > > > > > >>>the requirements related to the Annonymous Communication > > > > > >> > > > > > >>Rejection (ACR) > > > > > >> > > > > > >>>service is OK and understandable by everyone. > > > > > >>> > > > > > >>>So please take a look at the first version of the (much > > > > > >> > > > > > >>incomplete and > > > > > >> > > > > > >>>short) draft in either text or HTML: > > > > > >>> > > > > > >>> > > > > > >> > > > > > > >>http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sippin > > > > > > > > > > > > g-tispan-requirements-02a.txt > > > > > > > > > > > >>http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sipp > > > > ing-tispan-requirements-02a.html > > > > >> > > > > >> > > > > >>The document is fairly short at the moment. Please post > > > > your comments here. > > > > > > > > > > > > > > > Regarding REQ-ACR-2: > > > > > > > > > > > > > > >> REQ-ACR-2: It must be possible that authorized > > callers are not > > > > >> subject to the ACR service, thus, allowing > > > > the callee to > > > > >> receive anonymous requests from authorized > > > > callers. This > > > > >> effectively requires a mechanism to > > override the ACR > > > > >> service depending on the identity and > > > > authorization of the > > > > >> caller. This is needed, e.g., when a police > > > > officer or > > > > >> any other authority is anonymously > > calling to a user > > > > >> having the ACR simulation service activated. > > > > > > > > > > > > > > > How is a caller authorized? Is the mechanism for > > determining and > > > > > conveying this authorization in scope for this service? > > > > There is mention > > > > > specifically of Police Officers, among others, as being > > > > authorized. Are > > > > > there a list of attributes like that which must be used to > > > > characterize > > > > > a caller and that are used to determine the authorization? > > > > > > > > > > How is this affected by peering and PSTN interconnect? Is an > > > > > authorization on one side to be conveyed to the other > > > side and then > > > > > trusted their? > > > > > > > > > > Thanks, > > > > > Paul > > > > > > > > > > _______________________________________________ > > > > > Sipping-tispan mailing list > > > > > Sipping-tispan@ietf.org > > > > > https://www1.ietf.org/mailman/listinfo/sipping-tispan > > > > > > > > > > > > > _______________________________________________ > > > > Sipping-tispan mailing list > > > > Sipping-tispan@ietf.org > > > > https://www1.ietf.org/mailman/listinfo/sipping-tispan > > > > > > > > > > _______________________________________________ Sipping-tispan mailing list Sipping-tispan@ietf.org https://www1.ietf.org/mailman/listinfo/sipping-tispan _______________________________________________ Sipping-tispan mailing list Sipping-tispan@ietf.org https://www1.ietf.org/mailman/listinfo/sipping-tispan
- AW: [Sipping-tispan] TISPAN requirements, first r… Jesske, R
- AW: [Sipping-tispan] TISPAN requirements, first r… Schmidt, Christian
- Re: AW: [Sipping-tispan] TISPAN requirements, fir… Miguel Garcia
- Re: AW: [Sipping-tispan] TISPAN requirements, fir… Miguel Garcia
- RE: AW: [Sipping-tispan] TISPAN requirements, fir… Michael Hammer (mhammer)
- Re: AW: [Sipping-tispan] TISPAN requirements, fir… Paul Kyzivat
- RE: AW: [Sipping-tispan] TISPAN requirements, fir… Elwell John
- RE: AW: [Sipping-tispan] TISPAN requirements, fir… Elwell John
- RE: AW: [Sipping-tispan] TISPAN requirements, fir… GARCIN Sebastien RD-CORE-ISS
- Re: AW: [Sipping-tispan] TISPAN requirements, fir… Paul Kyzivat
- RE: AW: [Sipping-tispan] TISPAN requirements, fir… Michael Hammer (mhammer)
- Re: AW: [Sipping-tispan] TISPAN requirements, fir… Paul Kyzivat