RE: [XCON] CPCP Requirement: Hidden Participants

"Drage, Keith (Keith)" <drage@lucent.com> Wed, 04 February 2004 09:52 UTC

Received: from optimus.ietf.org (optimus.ietf.org [132.151.1.19]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA28095 for <xcon-archive@odin.ietf.org>; Wed, 4 Feb 2004 04:52:31 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AoJhT-0007bU-My for xcon-archive@odin.ietf.org; Wed, 04 Feb 2004 04:52:03 -0500
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id i149q3qS029226 for xcon-archive@odin.ietf.org; Wed, 4 Feb 2004 04:52:03 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AoJhS-0007bJ-Mg for xcon-web-archive@optimus.ietf.org; Wed, 04 Feb 2004 04:52:02 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA28089 for <xcon-web-archive@ietf.org>; Wed, 4 Feb 2004 04:51:59 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AoJhP-0005IA-00 for xcon-web-archive@ietf.org; Wed, 04 Feb 2004 04:51:59 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AoJgR-0005DP-00 for xcon-web-archive@ietf.org; Wed, 04 Feb 2004 04:50:59 -0500
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1AoJfV-00058l-00 for xcon-web-archive@ietf.org; Wed, 04 Feb 2004 04:50:01 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AoJfU-0007VC-K0; Wed, 04 Feb 2004 04:50:00 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AoJea-0007Tl-AU for xcon@optimus.ietf.org; Wed, 04 Feb 2004 04:49:04 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id EAA28044 for <xcon@ietf.org>; Wed, 4 Feb 2004 04:49:01 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AoJeX-00053E-00 for xcon@ietf.org; Wed, 04 Feb 2004 04:49:01 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AoJdY-0004xt-00 for xcon@ietf.org; Wed, 04 Feb 2004 04:48:01 -0500
Received: from auemail1.lucent.com ([192.11.223.161] helo=auemail1.firewall.lucent.com) by ietf-mx with esmtp (Exim 4.12) id 1AoJd8-0004tO-00 for xcon@ietf.org; Wed, 04 Feb 2004 04:47:34 -0500
Received: from uk0006exch001h.wins.lucent.com (h135-86-145-57.lucent.com [135.86.145.57]) by auemail1.firewall.lucent.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id i149kx719548 for <xcon@ietf.org>; Wed, 4 Feb 2004 03:47:00 -0600 (CST)
Received: by uk0006exch001h.uk.lucent.com with Internet Mail Service (5.5.2657.72) id <D0BVRP17>; Wed, 4 Feb 2004 09:46:58 -0000
Message-ID: <475FF955A05DD411980D00508B6D5FB00B1B13B0@en0033exch001u.uk.lucent.com>
From: "Drage, Keith (Keith)" <drage@lucent.com>
To: Cullen Jennings <fluffy@cisco.com>, Eric Burger <eburger@snowshore.com>, XCON-IETF <xcon@ietf.org>
Subject: RE: [XCON] CPCP Requirement: Hidden Participants
Date: Wed, 04 Feb 2004 09:46:53 -0000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain
Sender: xcon-admin@ietf.org
Errors-To: xcon-admin@ietf.org
X-BeenThere: xcon@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=unsubscribe>
List-Id: Centralized Conferencing <xcon.ietf.org>
List-Post: <mailto:xcon@ietf.org>
List-Help: <mailto:xcon-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.0 required=5.0 tests=none autolearn=no version=2.60

In the current mechanisms I know of for supporting legal intercept (in 3GPP), the interceptor would not even be a participant, therefore I am not convinced that this is relevant to the issue of hidden participants anyway.

regards

Keith

> -----Original Message-----
> From: Cullen Jennings [mailto:fluffy@cisco.com]
> Sent: 03 February 2004 17:08
> To: Eric Burger; XCON-IETF
> Subject: Re: [XCON] CPCP Requirement: Hidden Participants
> 
> 
> 
> I don't care if we support hidden participants but I feel that the
> requirements for Legal Intercept should definitely be out. 
> There are way too
> many land minds over yonder and it is not the point of this 
> WG to solve
> those. 
> 
> Cullen
> 
> 
> 
> On 1/20/04 8:00 AM, "Eric Burger" <eburger@snowshore.com> wrote:
> 
> > Would Legal Intercept be in or out?  E.g., hidden 
> participants that CANNOT be
> > known.
> > 
> >> -----Original Message-----
> >> From: Drage, Keith (Keith) [mailto:drage@lucent.com]
> >> Sent: Friday, December 19, 2003 6:14 AM
> >> To: hisham.khartabil@nokia.com; mhammer@cisco.com
> >> Cc: xcon@ietf.org
> >> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> >> 
> >> 
> >> I believe hidden users are appropriate.
> >> 
> >> I do not believe that this adds complexity to the
> >> specifications (particularly to the specification of CPCP),
> >> so I see no need to make it a DEFER as far as the
> >> specifications are concerned. It may add complexity to the
> >> implementation, so I am quite happy to see it a MAY in the
> >> requirements, so that it is optional to implement.
> >> 
> >> As regards the legal implications of hidden users, then yes,
> >> there may be priveleged users that are able to request the
> >> identity of hidden users (along with an indication that they
> >> are hidden). This of course requires the enabling of such a
> >> privileged user in the first place.
> >> 
> >> Secondly, it may not be necessary to identify hidden users,
> >> but merely that there are hidden users in the conference (in
> >> addition to any that may have made themselves visible). Some
> >> countries require some form of tone or announcement on voice
> >> conferences when someone else is listening in. They also
> >> require an announcement or other indication in the call is
> >> being recorded.
> >> 
> >> regards
> >> 
> >> Keith
> >> 
> >> Keith Drage
> >> Lucent Technologies
> >> drage@lucent.com
> >> tel: +44 1793 776249
> >> 
> >> 
> >>> -----Original Message-----
> >>> From: hisham.khartabil@nokia.com 
> [mailto:hisham.khartabil@nokia.com]
> >>> Sent: 15 December 2003 16:29
> >>> To: mhammer@cisco.com
> >>> Cc: xcon@ietf.org
> >>> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> >>> 
> >>> 
> >>> 
> >>> 
> >>>> -----Original Message-----
> >>>> From: ext Michael Hammer [mailto:mhammer@cisco.com]
> >>>> Sent: 15.December.2003 18:17
> >>>> To: Khartabil Hisham (NMP-MSW/Helsinki)
> >>>> Cc: xcon@ietf.org
> >>>> Subject: Re: [XCON] CPCP Requirement: Hidden Participants
> >>>> 
> >>>> 
> >>>> Related to this is there a requirement that, while not
> >>> revealing the 
> >>>> identity of a hidden user, the conference policy contains
> >>>> state indication
> >>>> about either the presence of hidden users, or the
> >>>> possibility/preclusion
> >>>> that such hidden users may be present?
> >>>> 
> >>>> I am anticipating that:
> >>>> 1) Laws may exist that require notification of such.
> >>> 
> >>> That's a good point. This might require changes to the
> >>> conference event package to indicate if there are hidden
> >>> participants or not, and if so, how many.
> >>> 
> >>> The question remain: is there a need for such a feature (to
> >>> hide users?)?
> >>> 
> >>> Regards,
> >>> Hisham
> >>> 
> >>>> 2) In some conferences, participants may want technical
> >>>> assurance that
> >>>> hidden users are not possible before they speak.
> >>>> 
> >>>> Mike
> >>>> 
> >>>> 
> >>>> At 02:55 PM 12/15/2003 +0200, hisham.khartabil@nokia.com wrote:
> >>>>> This is in reference to requirements REQ-A7 and REQ-E10 in
> >>>> 
> >>> 
http://www.ietf.org/internet-drafts/draft-ietf-xcon-cpcp-reqs-00.txt
>>>> 
>>>>    REQ-A7: It SHOULD be possible to participate in a
>> conference as a
>>>>    hidden user. Hidden user is present in a conference, but
>>> his presence
>>>>    is not revealed.
>>>> 
>>>>    REQ-E10: It MUST be possible to allow and disallow
>>> hidden membership
>>>>    in a conference.
>>>> 
>>>> Should a conference policy, using CPCP, specify if a user
>>> can be hidden? 
>>>> This means that the conference state package does not report the
>>>> participation on the hidden user. CPCP is used to identify
>>> which users are
>>>> hidden. The list of hidden users is only manipulated by a
>>> privileged user
>>>> such as the moderator.
>>>> 
>>>> Regards,
>>>> Hisham
>>>> 
>>>> _______________________________________________
>>>> XCON mailing list
>>>> XCON@ietf.org
>>>> https://www1.ietf.org/mailman/listinfo/xcon
>>> 
>>> 
>> 
>> _______________________________________________
>> XCON mailing list
>> XCON@ietf.org
>> https://www1.ietf.org/mailman/listinfo/xcon
>> 
>> _______________________________________________
>> XCON mailing list
>> XCON@ietf.org
>> https://www1.ietf.org/mailman/listinfo/xcon
>> 
>> 
> 
> 
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon
> 


_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon

_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon