Re: AW: [Sipping] Re: Question on draft-rosenberg-sipping-acr-code-00

Paul Kyzivat <pkyzivat@cisco.com> Fri, 13 January 2006 13:44 UTC

Received: from localhost.cnri.reston.va.us ([127.0.0.1] helo=megatron.ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1ExPEG-0000kj-Qz; Fri, 13 Jan 2006 08:44:32 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by megatron.ietf.org with esmtp (Exim 4.32) id 1ExPEE-0000ke-UF for sipping@megatron.ietf.org; Fri, 13 Jan 2006 08:44:31 -0500
Received: from ietf-mx.ietf.org (ietf-mx [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA06138 for <sipping@ietf.org>; Fri, 13 Jan 2006 08:43:09 -0500 (EST)
Received: from rtp-iport-2.cisco.com ([64.102.122.149]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1ExPLX-0003g2-S7 for sipping@ietf.org; Fri, 13 Jan 2006 08:52:05 -0500
Received: from rtp-core-2.cisco.com ([64.102.124.13]) by rtp-iport-2.cisco.com with ESMTP; 13 Jan 2006 08:44:21 -0500
X-IronPort-AV: i="3.99,365,1131339600"; d="scan'208"; a="80190502:sNHT37414380"
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com [64.102.31.12]) by rtp-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id k0DDi36T010836; Fri, 13 Jan 2006 08:44:18 -0500 (EST)
Received: from xfe-rtp-202.amer.cisco.com ([64.102.31.21]) by xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211); Fri, 13 Jan 2006 08:43:55 -0500
Received: from [161.44.79.59] ([161.44.79.59]) by xfe-rtp-202.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211); Fri, 13 Jan 2006 08:44:13 -0500
Message-ID: <43C7AEAC.1060606@cisco.com>
Date: Fri, 13 Jan 2006 08:44:12 -0500
From: Paul Kyzivat <pkyzivat@cisco.com>
User-Agent: Mozilla Thunderbird 1.0.6 (Windows/20050716)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Jesske, R" <R.Jesske@t-com.net>
Subject: Re: AW: [Sipping] Re: Question on draft-rosenberg-sipping-acr-code-00
References: <E7666D92C64C2845AEF12636FF94F9520496BC61@S4DE8PSAAGQ.blf.telekom.de>
In-Reply-To: <E7666D92C64C2845AEF12636FF94F9520496BC61@S4DE8PSAAGQ.blf.telekom.de>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
X-OriginalArrivalTime: 13 Jan 2006 13:44:13.0516 (UTC) FILETIME=[7075F0C0:01C61847]
X-Spam-Score: 0.2 (/)
X-Scan-Signature: 55503977758b6a5197d8a2b5141eae86
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by ietf.org id IAA06138
Cc: sipping@ietf.org, john.elwell@siemens.com
X-BeenThere: sipping@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "SIPPING Working Group \(applications of SIP\)" <sipping.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sipping@ietf.org>
List-Help: <mailto:sipping-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=subscribe>
Sender: sipping-bounces@ietf.org
Errors-To: sipping-bounces@ietf.org


Jesske, R wrote:
> John,
> I showed only how TISPAN handle the ACR service, of course other solutions are possible at least also for the UA.
> So I think that there is no problem also to use it as a generic solution.
> The RFC3323 gives guideline how to anonymise the identity of the caller.
> So you can use the privacy header and the From header to do that.
> So from my understanding the privacy header can be sent to the UA so that there is a indication that privacy was required.

That is not how I read 3323. It says that as a token in the Privacy 
header is acted upon the token should be removed from the privacy 
header, and when all are removed the Privacy header should also be 
removed. So in the case of Privacy:id, when a proxy acts upon this by 
removing the P-Asserted-Identity header, it is also to remove the 
Privacy header. The only exception I see to this is Privacy:none, which 
must remain. But that isn't relevant here.

	Paul

> An other possibility is that the URI in the From header is set to Anonymous. In both cases the call can be rejected with the new response code.
> Of course as Paul said there are enough holes to bypass such a mechanism using other names within the From header. Fore these cases I only see the possibility to use a barring mechanism (black/white list).
> 
> I think how it is described within draft-rosenberg-sipping-acr-code-00 fits to the generic approach you are asking for.
> 
> Best Regards
> 
> Roland 
> 
> 
>>-----Ursprüngliche Nachricht-----
>>Von: Elwell, John [mailto:john.elwell@siemens.com] 
>>Gesendet: Freitag, 13. Januar 2006 09:04
>>An: Jesske, Roland; pkyzivat@cisco.com; jdrosen@cisco.com
>>Cc: sipping@ietf.org
>>Betreff: RE: [Sipping] Re: Question on 
>>draft-rosenberg-sipping-acr-code-00
>>
>>
>>Roland,
>>
>>The problem is, I thought the sipping-acr-code draft was 
>>intended to be
>>general purpose, not something that was restricted to use in TISPAN
>>networks. Adding something to the main SIP response code 
>>repertoire means
>>that anyone can use it, and we should have procedures that 
>>explain how it
>>should be used in reasonable situations. I think a reasonable 
>>situation is
>>where a UAS receives a request without an identity it can 
>>trust and where
>>that identity has been withheld for privacy reasons. I fail 
>>to see how I can
>>do this at present.
>>
>>If we want a TISPAN specific solution, let's document it as 
>>such - I would
>>have no problem with that. Otherwise let's make sure we have 
>>a solution that
>>works elsewhere.
>>
>>John 
>>
>>
>>>-----Original Message-----
>>>From: Jesske, R [mailto:R.Jesske@t-com.net] 
>>>Sent: 13 January 2006 05:56
>>>To: Elwell, John; pkyzivat@cisco.com; jdrosen@cisco.com
>>>Cc: sipping@ietf.org
>>>Subject: AW: [Sipping] Re: Question on 
>>>draft-rosenberg-sipping-acr-code-00
>>>
>>>John,
>>>We have only specified the network based/application server 
>>>service. In Europe we have to provide this service within our 
>>>networks.
>>>
>>>For a end device service this would be the best way to 
>>>forward the privacy header, so that a UA based ACR can reject 
>>>the communication. 
>>>
>>>Best Regards
>>>
>>>Roland
>>>
>>>
>>>>-----Ursprüngliche Nachricht-----
>>>>Von: Elwell, John [mailto:john.elwell@siemens.com] 
>>>>Gesendet: Donnerstag, 12. Januar 2006 21:31
>>>>An: Jesske, Roland; pkyzivat@cisco.com; jdrosen@cisco.com
>>>>Cc: sipping@ietf.org
>>>>Betreff: RE: [Sipping] Re: Question on 
>>>>draft-rosenberg-sipping-acr-code-00
>>>>
>>>>
>>>>Roland,
>>>>
>>>>Thanks for the clarification. So in TISPAN networks ACR would 
>>>>apply when PAI
>>>>is missing due to privacy reasons. If a UAS receives a 
>>>>request without PAI,
>>>>how does it know whether it is for privacy reasons or not? Is 
>>>>the Privacy
>>>>header forwarded to the UAS?
>>>>
>>>>John
>>>>
>>>>
>>>>>-----Original Message-----
>>>>>From: Jesske, R [mailto:R.Jesske@t-com.net] 
>>>>>Sent: 12 January 2006 12:51
>>>>>To: Elwell, John; pkyzivat@cisco.com; jdrosen@cisco.com
>>>>>Cc: sipping@ietf.org
>>>>>Subject: AW: [Sipping] Re: Question on 
>>>>>draft-rosenberg-sipping-acr-code-00
>>>>>
>>>>>That what we specified within ETSI is based on the PAI and 
>>>>>the privacy header. When the user expresses his wish to 
>>>>>anonymise it's public ID the ACR service will be invoked.
>>>>>With regard to the from header there is no triggering for the 
>>>>>ACR service.
>>>>>
>>>>>That is the same behaviour as for the equivalent PSTN/ISDN 
>>>>>service and the regarding requirements from regulation.
>>>>>
>>>>>It is not the requirement to block calls where a PAI is 
>>>>>absent due to network reasons like interworking with analogue 
>>>>>networks.
>>>>>
>>>>>The idea of an other response code for an untrusted identity 
>>>>>could be the basis for a new service that is not defined yet. 
>>>>>But thinkable.
>>>>>
>>>>>Best Regards
>>>>>
>>>>>Roland
>>>>>
>>>>>>-----Ursprüngliche Nachricht-----
>>>>>>Von: Elwell, John [mailto:john.elwell@siemens.com] 
>>>>>>Gesendet: Donnerstag, 12. Januar 2006 08:49
>>>>>>An: Paul Kyzivat; Jonathan Rosenberg
>>>>>>Cc: sipping
>>>>>>Betreff: RE: [Sipping] Re: Question on 
>>>>>>draft-rosenberg-sipping-acr-code-00
>>>>>>
>>>>>>
>>>>>>The point that Paul makes about putting a fictitious or 
>>>>>>meaningless caller
>>>>>>ID in the From header was what I had in mind when I asked 
>>>>>
>>>>>my original
>>>>>
>>>>>>question. If I get an ACR response I just substitute a caller 
>>>>>>ID at will,
>>>>>>and if this gets through my own domain then it will also 
>>>>>>avoid ACR. Without
>>>>>>PAI, Identity or AIB, the called domain or UAS has no way of 
>>>>>>detecting this.
>>>>>>
>>>>>>John
>>>>>>
>>>>>>
>>>>>>>-----Original Message-----
>>>>>>>From: Paul Kyzivat [mailto:pkyzivat@cisco.com] 
>>>>>>>Sent: 11 January 2006 22:45
>>>>>>>To: Jonathan Rosenberg
>>>>>>>Cc: Elwell, John; sipping
>>>>>>>Subject: Re: [Sipping] Re: Question on 
>>>>>>>draft-rosenberg-sipping-acr-code-00
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>Jonathan Rosenberg wrote:
>>>>>>>
>>>>>>>>This is an old mail, my apologies for the really 
>>
>>long time 
>>
>>>>>>>to respond. 
>>>>>>>
>>>>>>>>This draft has started to get some attention 
>>
>>again recently.
>>
>>>>>>>>John raises an interesting point. This basic question has 
>>>>>>>
>>>>>>>been discussed 
>>>>>>>
>>>>>>>>almost endlessly in the SIMPLE/GEOPRIV groups as 
>>
>>well. The 
>>
>>>>>>>issue there 
>>>>>>>
>>>>>>>>was that the common policy/presence policy specs have had 
>>>>>>>
>>>>>>>fields that 
>>>>>>>
>>>>>>>>define an "anonymous" condition, and we've 
>>
>>debated whether 
>>
>>>>>>>>unauthenticated counts as anonymous.
>>>>>>>>
>>>>>>>>Unfortunately this never really concluded; we just got 
>>>>>
>>>>>rid of the 
>>>>>
>>>>>>>>anonymous condition :(
>>>>>>>>
>>>>>>>>In this particular case, I don't think it helps to count 
>>>>>>>
>>>>>>>unauthenticated 
>>>>>>>
>>>>>>>>as anonymous. The reason is, the whole point of the 
>>>>>>>
>>>>>>>resposne code is 
>>>>>>>
>>>>>>>>that the caller can do something different in an 
>>
>>attemtp to 
>>
>>>>>>>get the call 
>>>>>>>
>>>>>>>>through. In this case, the caller has not actually 
>>>>
>>>>TRIED to be 
>>>>
>>>>>>>>anonymous; its just that their service provider didn't 
>>>>>
>>>>>do PAID or 
>>>>>
>>>>>>>>sip-identity. So, if the call is rejected as 
>>
>>anonymous, the 
>>
>>>>>>>caller will 
>>>>>>>
>>>>>>>>be surprised, since it wasn't anonymous as far as 
>>
>>they were 
>>
>>>>>>>concerned, 
>>>>>>>
>>>>>>>>and there is nothing they can do about it to make it not 
>>>>>>
>>>>>>anonymous.
>>>>>>
>>>>>>>The problem is that there is no good way to tell the 
>>>>>>>difference between 
>>>>>>>blocked and unavailable. When using Privacy, the Privacy 
>>>>>
>>>>>header is 
>>>>>
>>>>>>>removed before the request gets to the UAS.
>>>>>>>
>>>>>>>While responding to this I noticed something missing from 
>>>>>>>draft-rosenberg-sipping-acr-code-00: it does not specify 
>>>>>>>proxy behavior. 
>>>>>>>This is significant because it is possible for the ACR 
>>>>>>
>>>>>>feature to be 
>>>>>>
>>>>>>>carried out by a proxy acting on behalf of the callee.
>>>>>>>
>>>>>>>If that is happening, and the proxy is in the same trust 
>>>>>>>domain with the 
>>>>>>>caller, then the situation is a *little* different, because 
>>>>>>>it can see 
>>>>>>>the Privacy header. So some blocked cases are 
>>>>>
>>>>>distinguishable from 
>>>>>
>>>>>>>unavailable cases. But that is still only a limited set, 
>>>>>>
>>>>>>because the 
>>>>>>
>>>>>>>caller could be in a different trust domain. So again, 
>>>>
>>>>it becomes 
>>>>
>>>>>>>necessary to fall back to reading the tea leaves to 
>>>>>
>>>>>decide between 
>>>>>
>>>>>>>blocked and unavailable. (Looking for Anonymous in the 
>>>>>
>>>>>From header.)
>>>>>
>>>>>>>Note that looking at From isn't reliable either. If I don't 
>>>>>>>want to be 
>>>>>>>blocked by ACR, I can just set my Privacy:id and set 
>>>
>>>my From to 
>>>
>>>>>>>something like: From: nobody 
>>>>>
>>>>><sip:nobody@nowhere.invalid>. Then the 
>>>>>
>>>>>>>callee will treat me as having an unavailable 
>>
>>address and let 
>>
>>>>>>>the call 
>>>>>>>through.
>>>>>>>
>>>>>>>I think the fundamental problem here is that 
>>>>>
>>>>>distinguishing between 
>>>>>
>>>>>>>unavailable and blocked can only work when all callers and 
>>>>>>>callees are 
>>>>>>>linked to a single trust domain.
>>>>>>>
>>>>>>>	Paul
>>>>>>>
>>>>>>>
>>>>>>>
>>>>>>>>So, I'd suggest that we not include 
>>
>>unauthenticated in the 
>>
>>>>>>>list of cases.
>>>>>>>
>>>>>>>>-Jonathan R.
>>>>>>>>
>>>>>>>>Elwell, John wrote:
>>>>>>>>
>>>>>>>>
>>>>>>>>>What if a UAS receives a request containing an 
>>>>
>>>>unauthenticated 
>>>>
>>>>>>>>>identity in the From header? If the UAS or user is not 
>>>>>>
>>>>>>prepared to 
>>>>>>
>>>>>>>>>trust the unauthenticated identity, the source of the 
>>>>>
>>>>>request is 
>>>>>
>>>>>>>>>basically anonymous. Is the new response code 
>>
>>intended for 
>>
>>>>>>>use in this 
>>>>>>>
>>>>>>>>>situation?
>>>>>>>>>
>>>>>>>>>John
>>>>>>>>>
>>>>>>>>>
>>>>>>>>>
>>>>>>>>
>>>>>>_______________________________________________
>>>>>>Sipping mailing list  
>>>>
>>>>https://www1.ietf.org/mailman/listinfo/sipping
>>>>
>>>>>>This list is for NEW development of the application of SIP
>>>>>>Use sip-implementors@cs.columbia.edu for questions on 
>>>
>>>current sip
>>>
>>>>>>Use sip@ietf.org for new developments of core SIP
>>>>>>
>>>>>
> 

_______________________________________________
Sipping mailing list  https://www1.ietf.org/mailman/listinfo/sipping
This list is for NEW development of the application of SIP
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sip@ietf.org for new developments of core SIP