Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
Miguel Garcia <Miguel.An.Garcia@nokia.com> Thu, 25 August 2005 13:41 UTC
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32)
id 1E8Hyj-0004V4-F3; Thu, 25 Aug 2005 09:41:13 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
by megatron.ietf.org with esmtp (Exim 4.32) id 1E8Hyh-0004Uw-78
for sipping-tispan@megatron.ietf.org; Thu, 25 Aug 2005 09:41:11 -0400
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1])
by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA17913
for <sipping-tispan@ietf.org>; Thu, 25 Aug 2005 09:41:09 -0400 (EDT)
Received: from mgw-ext03.nokia.com ([131.228.20.95])
by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1E8HzD-0003aD-Hh
for sipping-tispan@ietf.org; Thu, 25 Aug 2005 09:41:44 -0400
Received: from esebh106.NOE.Nokia.com (esebh106.ntc.nokia.com [172.21.138.213])
by mgw-ext03.nokia.com (Switch-3.1.7/Switch-3.1.7) with ESMTP id
j7PDebaX012521; Thu, 25 Aug 2005 16:40:39 +0300
Received: from esebh001.NOE.Nokia.com ([172.21.138.28]) by
esebh106.NOE.Nokia.com with Microsoft SMTPSVC(6.0.3790.1830);
Thu, 25 Aug 2005 16:41:03 +0300
Received: from [127.0.0.1] ([172.21.36.151]) by esebh001.NOE.Nokia.com with
Microsoft SMTPSVC(5.0.2195.6881); Thu, 25 Aug 2005 16:41:03 +0300
Message-ID: <430DCA6E.9080305@nokia.com>
Date: Thu, 25 Aug 2005 16:41:02 +0300
From: Miguel Garcia <Miguel.An.Garcia@nokia.com>
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US;
rv:1.7.2) Gecko/20040804 Netscape/7.2 (ax)
X-Accept-Language: en-us, en, es-es
MIME-Version: 1.0
To: Tom-PT Taylor <taylor@nortel.com>
Subject: Re: AW: AW: [Sipping-tispan] TISPAN requirements, first requiements
References: <E7666D92C64C2845AEF12636FF94F95202319E91@S4DE8PSAAGQ.blf.telekom.de>
<430DBDD2.5090202@nortel.com> <430DC146.7020307@nokia.com>
<430DC949.6000708@nortel.com>
In-Reply-To: <430DC949.6000708@nortel.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
X-OriginalArrivalTime: 25 Aug 2005 13:41:03.0497 (UTC)
FILETIME=[A2F49790:01C5A97A]
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by mgw-ext03.nokia.com id
j7PDebaX012521
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2c6813ed945e40b4b5bea39da243c669
Content-Transfer-Encoding: quoted-printable
Cc: sipping-tispan@ietf.org, "Alexeitsev, D" <D.Alexeitsev@t-com.net>
X-BeenThere: sipping-tispan@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Discussion of requirements for SIP introduced by ETSI TISPAN
<sipping-tispan.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www1.ietf.org/pipermail/sipping-tispan>
List-Post: <mailto:sipping-tispan@ietf.org>
List-Help: <mailto:sipping-tispan-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping-tispan>,
<mailto:sipping-tispan-request@ietf.org?subject=subscribe>
Sender: sipping-tispan-bounces@ietf.org
Errors-To: sipping-tispan-bounces@ietf.org
So what is an anonymous user? An anonymous user is one for which his identity is not determined. The reason why a user is anonymous is another story (the user want, or the network can't provide an identity), but they are anonymous in both cases. /Miguel Tom-PT Taylor wrote: > I think your requirement is not quite accurate even at this level of > abstraction. Roland has identified two different cases. One is your > "certain anonymous users", but the other is the case where the user > identity is unable due to the network's inability to provide it. > > I guess I can see your point about pushing too hastily to mechanism. > Roland actually identified the information that might be used to resolve > the issue at the rejection point: on the one hand, the identity of the > caller if present in a P-A-Id, and on the other hand, the absence of a > P-A-Id. It may be that this is all that is needed, and no further > discussion is required in SIPPING. (Of course, that's assuming that the > number of authorized caller identities any one rejection point has to > keep track of is limited and provisionable.) > > Miguel Garcia wrote: > >> Tom: >> >> I agree with you in the essence, but you are referring to a solution, >> not to a requirement. Essentially, whenever you need to speak about an >> "indicator", it raises an alarm in my head that you are speaking about >> a possible solution rather than a requirement. >> >> So the requirement is tha there are certain anonymous users that are >> not subject to be filtered by ACR. Then we can further discuss the >> solution, which is probably going in the direction you suggest. >> >> /Miguel >> >> Tom-PT Taylor wrote: >> >>> Let's just summarize the requirement. You've tied it to other >>> mechanism below. I think it will be less confusing to abstract out >>> the actual information that is needed. >>> >>> So: the requirement is that it be possible to include in SIP >>> signalling an indicator that network-provided Anonymous Call >>> Rejection should be overridden. This is needed in two circumstances: >>> when the caller identity is unavailable in the first place, and when >>> Privacy is invoked. There is an obvious ancillary requirement that >>> this indicator be acted on only if it comes from a trusted source. >>> >>> Jesske, R wrote: >>> >>>> Paul, >>>> I hope we do understand in future. Next Try. See below. >>>> >>>> >>>> >>>> >>>>> -----Ursprüngliche Nachricht----- >>>>> Von: Paul Kyzivat [mailto:pkyzivat@cisco.com] Gesendet: Donnerstag, >>>>> 25. August 2005 05:31 >>>>> An: Jesske, Roland >>>>> Cc: Miguel.An.Garcia@nokia.com; sipping-tispan@ietf.org; >>>>> Alexeitsev, Denis >>>>> Betreff: Re: AW: [Sipping-tispan] TISPAN requirements, first >>>>> requiements >>>>> >>>>> >>>>> >>>>> >>>>> Jesske, R wrote: >>>>> >>>>>> Paul, >>>>>> With regard to this feature it must be based on trust >>>>> >>>>> >>>>> >>>>> >>>>> relationship as defined within RFC3325 for the P-Asserted-Identity. >>>>> >>>>>> So the indication that this is a authorised user is >>>>> >>>>> >>>>> >>>>> >>>>> included by a network entity like it is done for the >>>>> P-Asserted-Identiy. >>>>> >>>>>> So the network entity knows it via a database that this >>>>> >>>>> >>>>> >>>>> >>>>> registered user is a authorised one. >>>>> >>>>> Either I don't understand you, or you don't understand me. >>>>> >>>>> RFC3325 is a way for some trusted element of the network that knows >>>>> the source of the request to assert a trusted identity for the >>>>> source of the message. It doesn't provide any authorization for >>>>> anything. >>>> >>>> >>>> >>>> >>>> For the Marking of a call with a bypass allowance a network element >>>> must include on behalf of the user this element so that a >>>> Police-call is really a police call. >>>> I will try it with some flows: >>>> >>>> >>>> Police >>>> UA:A Proxy ACR UA:B >>>> -------------> -----------> -----------> F1:INVITE >>>> F2:INVITE F3:INVITE >>>> >>>> >>>> F1: INVITE >>>> No indications From: Anonymous >>>> >>>> F2: INVITE >>>> A indication is added indicating that this communication comes from >>>> a official authority (Police) >>>> From: Anonymous >>>> P-Asserted-Identity with privacy Id >>>> >>>> >>>> F3: INVITE >>>> ACR server forwards the communication due to the bypass indication >>>> From: Anonymous >>>> >>>> PSTN PSTN/ISDN >>>> User A GW ACR UA:B >>>> -------------> -----------> -----------> F1:IAM >>>> F2:INVITE F3:INVITE >>>> >>>> F1: IAM: >>>> No Calling Party number is included >>>> Call is marked as restricted by the network >>>> >>>> F2: INVITE >>>> A indication is included that points to the fact that the call is >>>> Anonymous because of a network restriction >>>> From: Anonymous >>>> P-Asserted-Identity absent >>>> F3: INVITE >>>> ACR server forwards the communication due to the indication that >>>> the communication is anonymous because of network restriction >>>> From: Anonymous >>>> >>>> Untrusted my network >>>> ProxyA Proxy B ACR UA:B >>>> -------------> -----------> F1:INVITE F2:INVITE >>>> F1: INVITE >>>> No indications From: Anonymous >>>> No P-Asserted-Identity >>>> >>>> F2: INVITE >>>> No indication will be added because the request comes from an >>>> untrusted proxy >>>> From: Anonymous >>>> No Privacy >>>> >>>> ACR rejects the communication >>>> >>>> >>>> >>>>> Ultimately, the ACR service must be implemented near and on behalf >>>>> of the recipient of the message. It isn't until there that it is >>>>> known that there is any service to authorize. At that point, the >>>>> P-Asserted-ID header may be present, but that just says who the >>>>> caller is, not what role the caller is playing. It seems that you >>>>> want to do role based authorization, where the role is >>>>> "entitled-to-override-ACR". >>>>> >>>>> So how is this role determined? Surely the recipient can't have a >>>>> DB of all values of P-Asserted-ID that are authorized. The >>>>> alternative seems to be that the source inserts not just a simple >>>>> P-Asserted-ID with a name, but rather also inserts some kind of >>>>> role identification. >>>> >>>> >>>> >>>> >>>> >>>> That could be the way out. That such a indication shall be bind to >>>> the P-Asserted identity and is included by the originating >>>> network-entity. >>>> Because we bind the ACR service to the P-Asserted-Identity. >>>> >>>> We reject the communication if a P-Asserted-Identity is included and >>>> the priv value is "Id", "user","header" and /or ""critical" and if >>>> the P-Asserted-Identity is absent. >>>> >>>> >>>>> I'm looking for more indication of what the expectations are in >>>>> this regard. Is it the expectation that the source will annotate >>>>> every call with an indication that the caller is permitted to >>>>> override ACR? >>>> >>>> >>>> >>>> >>>> >>>> Yes. >>>> >>>> >>>>> Or with some other more generic categorization of caller type? >>>> >>>> >>>> >>>> >>>> >>>> That could be also a possibility. For solving the police >>>> communications but it makes it not easy with the ISDN/PSTN >>>> interworking. Because if we have such a caller type (What is also >>>> another requirement) than we have to distinguish at the Interworking >>>> Unit. Because some caller types can be mapped to the Calling parties >>>> category and others must be mapped to the network restriction >>>> indication. >>>> >>>> >>>>> Or what? >>>> >>>> >>>> >>>> >>>> >>>> >>>>>> With regard to the PSTN/ISDN this was solved via a >>>>> >>>>> >>>>> >>>>> >>>>> indication that the Calling Party Number is restricted by the >>>>> network. The network included this indication in three cases: >>>>> >>>>>> 1. The call was originated within a network that cannot >>>>> >>>>> >>>>> >>>>> >>>>> provide a originating number (e.G.) analogue. >>>>> >>>>>> 2. The call has no originated number due to interworking >>>>> >>>>> >>>>> >>>>> >>>>> with international networks >>>>> >>>>>> 3. The call was send from a authorised user (e.G. police). >>>>> >>>>> >>>>> >>>>> >>>>> This indication was then set by the network. This feature is >>>>> especially used in UK. >>>>> >>>>> So you are looking for some kind of enhancement to Privacy, that >>>>> indicates *why* privacy is requested? >>>> >>>> >>>> >>>> >>>> >>>>> From my point of view YES. >>>> >>>> >>>> >>>> >>>> First Idea was to have a privacy value that says "network >>>> restricted" (as it is in the PSTN/ISDN) to express that the Id is >>>> missing because of some network restrictions (like interworking, >>>> Analogue originating or such police calls). Because to add such >>>> value to the privacy header would be easy. >>>> But people had the opinion that this has nothing to do with privacy. >>>> So we looked fore some other possibility. That is what I have showed >>>> you above. >>>> >>>> I hope that this was better that we can come together and you >>>> understand me. >>>> >>>> Roland >>>> >>>> >>>> >>>>> Paul >>>>> >>>>> >>>>>> So with the requirement proposed by Miguel we hope to find >>>>> >>>>> >>>>> >>>>> >>>>> a solution to cover the 3 above mentioned cases. >>>>> >>>>>> With regard to trust we want to have such a indication bind >>>>> >>>>> >>>>> >>>>> >>>>> to a trust relationship as it is described within RFC3325. >>>>> >>>>>> So trust for interconnection to an other network is based >>>>> >>>>> >>>>> >>>>> >>>>> on bilateral agreement. >>>>> >>>>>> >>>>>> Best Regards >>>>>> >>>>>> Roland >>>>>> >>>>>> >>>>>> >>>>>>> -----Ursprüngliche Nachricht----- >>>>>>> Von: sipping-tispan-bounces@ietf.org >>>>>>> [mailto:sipping-tispan-bounces@ietf.org] Im Auftrag von Paul Kyzivat >>>>>>> Gesendet: Mittwoch, 24. August 2005 05:07 >>>>>>> An: Miguel Garcia >>>>>>> Cc: sipping-tispan@ietf.org; Alexeitsev, Denis >>>>>>> Betreff: Re: [Sipping-tispan] TISPAN requirements, first requiements >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> Miguel Garcia wrote: >>>>>>> >>>>>>> >>>>>>>> Folks: >>>>>>>> >>>>>>>> Since we are tasked to re-draft the TISPAN requirements >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> adding as much >>>>>>> >>>>>>>> clarifications as possible, we would like to start checking >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> with you if >>>>>>> >>>>>>>> the requirements related to the Annonymous Communication >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> Rejection (ACR) >>>>>>> >>>>>>>> service is OK and understandable by everyone. >>>>>>>> >>>>>>>> So please take a look at the first version of the (much >>>>>>> >>>>>>> >>>>>>> >>>>>>> >>>>>>> incomplete and >>>>>>> >>>>>>>> short) draft in either text or HTML: >>>>>>>> >>>>>>>> >>>>>>> >>>>>>> http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sippin >>>>>> >>>>>> >>>>>> >>>>>> >>>>>> g-tispan-requirements-02a.txt >>>>>> >>>>>>> http://people.nokia.net/~miguel/drafts/pre/draft-jesske-sipp >>>> >>>> >>>> >>>> >>>> ing-tispan-requirements-02a.html >>>> >>>>>> >>>>>> The document is fairly short at the moment. Please post your >>>>>> comments here. >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> Regarding REQ-ACR-2: >>>>> >>>>> >>>>> >>>>>> REQ-ACR-2: It must be possible that authorized callers are not >>>>>> subject to the ACR service, thus, allowing the callee to >>>>>> receive anonymous requests from authorized callers. This >>>>>> effectively requires a mechanism to override the ACR >>>>>> service depending on the identity and authorization of >>>>>> the >>>>>> caller. This is needed, e.g., when a police officer or >>>>>> any other authority is anonymously calling to a user >>>>>> having the ACR simulation service activated. >>>>> >>>>> >>>>> >>>>> >>>>> >>>>> How is a caller authorized? Is the mechanism for determining and >>>>> conveying this authorization in scope for this service? There is >>>>> mention specifically of Police Officers, among others, as being >>>>> authorized. Are there a list of attributes like that which must be >>>>> used to characterize a caller and that are used to determine the >>>>> authorization? >>>>> >>>>> How is this affected by peering and PSTN interconnect? Is an >>>>> authorization on one side to be conveyed to the other side and then >>>>> trusted their? >>>>> >>>>> Thanks, >>>>> Paul >>>>> >>>>> _______________________________________________ >>>>> Sipping-tispan mailing list >>>>> Sipping-tispan@ietf.org >>>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan >>>>> >>>> >>>> >>>> _______________________________________________ >>>> Sipping-tispan mailing list >>>> Sipping-tispan@ietf.org >>>> https://www1.ietf.org/mailman/listinfo/sipping-tispan >>>> >>>> >>> >>> >>> _______________________________________________ >>> Sipping-tispan mailing list >>> Sipping-tispan@ietf.org >>> https://www1.ietf.org/mailman/listinfo/sipping-tispan >>> >> > -- Miguel A. Garcia tel:+358-50-4804586 sip:miguel.an.garcia@openlaboratory.net Nokia Research Center Helsinki, Finland _______________________________________________ Sipping-tispan mailing list Sipping-tispan@ietf.org https://www1.ietf.org/mailman/listinfo/sipping-tispan
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Schmidt, Christian
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Jesske, R
- AW: AW: [Sipping-tispan] TISPAN requirements, fir… Alexeitsev, D
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Philip Mart
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Tom-PT Taylor
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Jitender Arora
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- RE: AW: AW: [Sipping-tispan] TISPAN requirements,… Michael Hammer (mhammer)
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Miguel Garcia
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat
- Re: AW: AW: [Sipping-tispan] TISPAN requirements,… Paul Kyzivat