RE: [XCON] CPCP Requirement: Hidden Participants

Adam Roach <adam@dynamicsoft.com> Thu, 26 February 2004 03:50 UTC

Received: from optimus.ietf.org (optimus.ietf.org [132.151.1.19]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA02798 for <xcon-archive@odin.ietf.org>; Wed, 25 Feb 2004 22:50:53 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwCXa-0002XC-Mc for xcon-archive@odin.ietf.org; Wed, 25 Feb 2004 22:50:27 -0500
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id i1Q3oQBt009738 for xcon-archive@odin.ietf.org; Wed, 25 Feb 2004 22:50:26 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwCXa-0002Wz-H7 for xcon-web-archive@optimus.ietf.org; Wed, 25 Feb 2004 22:50:26 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA02792 for <xcon-web-archive@ietf.org>; Wed, 25 Feb 2004 22:50:22 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AwCXX-00051D-00 for xcon-web-archive@ietf.org; Wed, 25 Feb 2004 22:50:23 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AwCWZ-0004vm-00 for xcon-web-archive@ietf.org; Wed, 25 Feb 2004 22:49:24 -0500
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1AwCWA-0004qR-00 for xcon-web-archive@ietf.org; Wed, 25 Feb 2004 22:48:58 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwCWD-0002Rj-Ds; Wed, 25 Feb 2004 22:49:01 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwCVR-0002PZ-KU for xcon@optimus.ietf.org; Wed, 25 Feb 2004 22:48:13 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id WAA02735 for <xcon@ietf.org>; Wed, 25 Feb 2004 22:48:09 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AwCVO-0004on-00 for xcon@ietf.org; Wed, 25 Feb 2004 22:48:10 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AwCUR-0004kS-00 for xcon@ietf.org; Wed, 25 Feb 2004 22:47:12 -0500
Received: from mail4.dynamicsoft.com ([63.110.3.100]) by ietf-mx with esmtp (Exim 4.12) id 1AwCTq-0004cw-00 for xcon@ietf.org; Wed, 25 Feb 2004 22:46:34 -0500
Received: from DYN-TX-EXCH-001.dynamicsoft.com (dyn-tx-exch-001 [63.110.3.8]) by mail4.dynamicsoft.com (8.12.8/8.12.8) with ESMTP id i1Q3joUY029941; Wed, 25 Feb 2004 21:45:58 -0600 (CST)
Received: by dyn-tx-exch-001.dynamicsoft.com with Internet Mail Service (5.5.2653.19) id <10MYQNRZ>; Wed, 25 Feb 2004 21:45:50 -0600
Message-ID: <9ACE0CEE075B494096C86C23878BF85906A326@dyn-tx-exch-001.dynamicsoft.com>
From: Adam Roach <adam@dynamicsoft.com>
To: Eric Burger <eburger@snowshore.com>, "'xcon@ietf.org'" <xcon@ietf.org>
Subject: RE: [XCON] CPCP Requirement: Hidden Participants
Date: Wed, 25 Feb 2004 21:45:40 -0600
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
Content-Type: text/plain; charset="iso-8859-1"
Sender: xcon-admin@ietf.org
Errors-To: xcon-admin@ietf.org
X-BeenThere: xcon@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=unsubscribe>
List-Id: Centralized Conferencing <xcon.ietf.org>
List-Post: <mailto:xcon@ietf.org>
List-Help: <mailto:xcon-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.1 required=5.0 tests=AWL autolearn=no version=2.60

I know this issue has been settled, but just as a general
announcement for any work in any working group: the IAB
and IESG have stated positions on the topic of legal
intercept that are (to my understanding) binding on all
IETF protocols.

These positions are detailed in RFC 2804, and are
summarized as follows: "The IETF has decided not to consider
requirements for wiretapping as part of the process for
creating and maintaining IETF standards."

/a

> -----Original Message-----
> From: Eric Burger [mailto:eburger@snowshore.com]
> Sent: Tuesday, January 20, 2004 10:01
> To: xcon@ietf.org
> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> 
> 
> Would Legal Intercept be in or out?  E.g., hidden 
> participants that CANNOT be known.
> 
> > -----Original Message-----
> > From: Drage, Keith (Keith) [mailto:drage@lucent.com]
> > Sent: Friday, December 19, 2003 6:14 AM
> > To: hisham.khartabil@nokia.com; mhammer@cisco.com
> > Cc: xcon@ietf.org
> > Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> > 
> > 
> > I believe hidden users are appropriate.
> > 
> > I do not believe that this adds complexity to the 
> > specifications (particularly to the specification of CPCP), 
> > so I see no need to make it a DEFER as far as the 
> > specifications are concerned. It may add complexity to the 
> > implementation, so I am quite happy to see it a MAY in the 
> > requirements, so that it is optional to implement.
> > 
> > As regards the legal implications of hidden users, then yes, 
> > there may be priveleged users that are able to request the 
> > identity of hidden users (along with an indication that they 
> > are hidden). This of course requires the enabling of such a 
> > privileged user in the first place.
> > 
> > Secondly, it may not be necessary to identify hidden users, 
> > but merely that there are hidden users in the conference (in 
> > addition to any that may have made themselves visible). Some 
> > countries require some form of tone or announcement on voice 
> > conferences when someone else is listening in. They also 
> > require an announcement or other indication in the call is 
> > being recorded.
> > 
> > regards
> > 
> > Keith
> > 
> > Keith Drage
> > Lucent Technologies
> > drage@lucent.com
> > tel: +44 1793 776249
> > 
> > 
> > > -----Original Message-----
> > > From: hisham.khartabil@nokia.com 
> [mailto:hisham.khartabil@nokia.com]
> > > Sent: 15 December 2003 16:29
> > > To: mhammer@cisco.com
> > > Cc: xcon@ietf.org
> > > Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> > > 
> > > 
> > > 
> > > 
> > > > -----Original Message-----
> > > > From: ext Michael Hammer [mailto:mhammer@cisco.com]
> > > > Sent: 15.December.2003 18:17
> > > > To: Khartabil Hisham (NMP-MSW/Helsinki)
> > > > Cc: xcon@ietf.org
> > > > Subject: Re: [XCON] CPCP Requirement: Hidden Participants
> > > > 
> > > > 
> > > > Related to this is there a requirement that, while not 
> > > revealing the 
> > > > identity of a hidden user, the conference policy contains 
> > > > state indication 
> > > > about either the presence of hidden users, or the 
> > > > possibility/preclusion 
> > > > that such hidden users may be present?
> > > > 
> > > > I am anticipating that:
> > > > 1) Laws may exist that require notification of such.
> > > 
> > > That's a good point. This might require changes to the 
> > > conference event package to indicate if there are hidden 
> > > participants or not, and if so, how many.
> > > 
> > > The question remain: is there a need for such a feature (to 
> > > hide users?)?
> > > 
> > > Regards,
> > > Hisham
> > > 
> > > > 2) In some conferences, participants may want technical 
> > > > assurance that 
> > > > hidden users are not possible before they speak.
> > > > 
> > > > Mike
> > > > 
> > > > 
> > > > At 02:55 PM 12/15/2003 +0200, hisham.khartabil@nokia.com wrote:
> > > > >This is in reference to requirements REQ-A7 and REQ-E10 in 
> > > > 
> > 
>http://www.ietf.org/internet-drafts/draft-ietf-xcon-cpcp-reqs-00.txt
> > >
> > >    REQ-A7: It SHOULD be possible to participate in a 
> conference as a
> > >    hidden user. Hidden user is present in a conference, but 
> > his presence
> > >    is not revealed.
> > >
> > >    REQ-E10: It MUST be possible to allow and disallow 
> > hidden membership
> > >    in a conference.
> > >
> > >Should a conference policy, using CPCP, specify if a user 
> > can be hidden? 
> > >This means that the conference state package does not report the 
> > >participation on the hidden user. CPCP is used to identify 
> > which users are 
> > >hidden. The list of hidden users is only manipulated by a 
> > privileged user 
> > >such as the moderator.
> > >
> > >Regards,
> > >Hisham
> > >
> > >_______________________________________________
> > >XCON mailing list
> > >XCON@ietf.org
> > >https://www1.ietf.org/mailman/listinfo/xcon
> > 
> > 
> 
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon
> 
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon
> 
> 


_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon

_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon