RE: [XCON] CPCP Requirement: Hidden Participants

hisham.khartabil@nokia.com Wed, 21 January 2004 13:22 UTC

Received: from optimus.ietf.org ([132.151.1.19]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA19458 for <xcon-archive@odin.ietf.org>; Wed, 21 Jan 2004 08:22:11 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AjIIg-0000KU-SN for xcon-archive@odin.ietf.org; Wed, 21 Jan 2004 08:21:42 -0500
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id i0LDLgBm001262 for xcon-archive@odin.ietf.org; Wed, 21 Jan 2004 08:21:42 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AjIIg-0000KH-Nx for xcon-web-archive@optimus.ietf.org; Wed, 21 Jan 2004 08:21:42 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA19436 for <xcon-web-archive@ietf.org>; Wed, 21 Jan 2004 08:21:41 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AjIIa-00046P-00 for xcon-web-archive@ietf.org; Wed, 21 Jan 2004 08:21:36 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AjIF5-0003r3-00 for xcon-web-archive@ietf.org; Wed, 21 Jan 2004 08:18:01 -0500
Received: from [132.151.1.19] (helo=optimus.ietf.org) by ietf-mx with esmtp (Exim 4.12) id 1AjIBY-0003ZX-00 for xcon-web-archive@ietf.org; Wed, 21 Jan 2004 08:14:20 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AjIBF-0008JO-KG; Wed, 21 Jan 2004 08:14:01 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AjIB5-0008J2-9U for xcon@optimus.ietf.org; Wed, 21 Jan 2004 08:13:56 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA19153 for <xcon@ietf.org>; Wed, 21 Jan 2004 08:13:49 -0500 (EST)
From: hisham.khartabil@nokia.com
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AjIAz-0003Xn-00 for xcon@ietf.org; Wed, 21 Jan 2004 08:13:45 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AjI6N-0003Hq-00 for xcon@ietf.org; Wed, 21 Jan 2004 08:09:00 -0500
Received: from mgw-x4.nokia.com ([131.228.20.27]) by ietf-mx with esmtp (Exim 4.12) id 1AjI4z-00038n-00 for xcon@ietf.org; Wed, 21 Jan 2004 08:07:33 -0500
Received: from esvir04nok.ntc.nokia.com (esvir04nokt.ntc.nokia.com [172.21.143.36]) by mgw-x4.nokia.com (Switch-2.2.8/Switch-2.2.8) with ESMTP id i0LD7MY12403 for <xcon@ietf.org>; Wed, 21 Jan 2004 15:07:22 +0200 (EET)
Received: from esebh004.NOE.Nokia.com (unverified) by esvir04nok.ntc.nokia.com (Content Technologies SMTPRS 4.2.5) with ESMTP id <T6745615b78ac158f24077@esvir04nok.ntc.nokia.com>; Wed, 21 Jan 2004 15:07:19 +0200
Received: from esebe019.NOE.Nokia.com ([172.21.138.58]) by esebh004.NOE.Nokia.com with Microsoft SMTPSVC(5.0.2195.6747); Wed, 21 Jan 2004 15:07:19 +0200
X-MIMEOLE: Produced By Microsoft Exchange V6.0.6487.1
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [XCON] CPCP Requirement: Hidden Participants
Date: Wed, 21 Jan 2004 15:07:18 +0200
Message-ID: <2038BCC78B1AD641891A0D1AE133DBB7017975F9@esebe019.ntc.nokia.com>
Thread-Topic: [XCON] CPCP Requirement: Hidden Participants
Thread-Index: AcPGIWcIlTiXGJmISm6SBXk6+COhvwY1RK8AAEoo77A=
To: eburger@snowshore.com, xcon@ietf.org
X-OriginalArrivalTime: 21 Jan 2004 13:07:19.0220 (UTC) FILETIME=[7FF9EF40:01C3E01F]
Content-Transfer-Encoding: quoted-printable
Sender: xcon-admin@ietf.org
Errors-To: xcon-admin@ietf.org
X-BeenThere: xcon@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=unsubscribe>
List-Id: Centralized Conferencing <xcon.ietf.org>
List-Post: <mailto:xcon@ietf.org>
List-Help: <mailto:xcon-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.3 required=5.0 tests=AWL, NO_REAL_NAME autolearn=no version=2.60
Content-Transfer-Encoding: quoted-printable
Content-Transfer-Encoding: quoted-printable

We thought of that just before releasing the new requirements draft. We concluded that hidden user policy can be local implementation since the moderator of the conference who sets the policy and decides who is hidden and not could be the terrorist himself. Therefore we concluded that hidden users must be allowed by network administrators for any conference and must not result is a modification to the conference policy.

Regards,
Hisham

> -----Original Message-----
> From: xcon-admin@ietf.org [mailto:xcon-admin@ietf.org]On Behalf Of ext
> Eric Burger
> Sent: 20.January.2004 18:01
> To: xcon@ietf.org
> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> 
> 
> Would Legal Intercept be in or out?  E.g., hidden 
> participants that CANNOT be known.
> 
> > -----Original Message-----
> > From: Drage, Keith (Keith) [mailto:drage@lucent.com]
> > Sent: Friday, December 19, 2003 6:14 AM
> > To: hisham.khartabil@nokia.com; mhammer@cisco.com
> > Cc: xcon@ietf.org
> > Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> > 
> > 
> > I believe hidden users are appropriate.
> > 
> > I do not believe that this adds complexity to the 
> > specifications (particularly to the specification of CPCP), 
> > so I see no need to make it a DEFER as far as the 
> > specifications are concerned. It may add complexity to the 
> > implementation, so I am quite happy to see it a MAY in the 
> > requirements, so that it is optional to implement.
> > 
> > As regards the legal implications of hidden users, then yes, 
> > there may be priveleged users that are able to request the 
> > identity of hidden users (along with an indication that they 
> > are hidden). This of course requires the enabling of such a 
> > privileged user in the first place.
> > 
> > Secondly, it may not be necessary to identify hidden users, 
> > but merely that there are hidden users in the conference (in 
> > addition to any that may have made themselves visible). Some 
> > countries require some form of tone or announcement on voice 
> > conferences when someone else is listening in. They also 
> > require an announcement or other indication in the call is 
> > being recorded.
> > 
> > regards
> > 
> > Keith
> > 
> > Keith Drage
> > Lucent Technologies
> > drage@lucent.com
> > tel: +44 1793 776249
> > 
> > 
> > > -----Original Message-----
> > > From: hisham.khartabil@nokia.com 
> [mailto:hisham.khartabil@nokia.com]
> > > Sent: 15 December 2003 16:29
> > > To: mhammer@cisco.com
> > > Cc: xcon@ietf.org
> > > Subject: RE: [XCON] CPCP Requirement: Hidden Participants
> > > 
> > > 
> > > 
> > > 
> > > > -----Original Message-----
> > > > From: ext Michael Hammer [mailto:mhammer@cisco.com]
> > > > Sent: 15.December.2003 18:17
> > > > To: Khartabil Hisham (NMP-MSW/Helsinki)
> > > > Cc: xcon@ietf.org
> > > > Subject: Re: [XCON] CPCP Requirement: Hidden Participants
> > > > 
> > > > 
> > > > Related to this is there a requirement that, while not 
> > > revealing the 
> > > > identity of a hidden user, the conference policy contains 
> > > > state indication 
> > > > about either the presence of hidden users, or the 
> > > > possibility/preclusion 
> > > > that such hidden users may be present?
> > > > 
> > > > I am anticipating that:
> > > > 1) Laws may exist that require notification of such.
> > > 
> > > That's a good point. This might require changes to the 
> > > conference event package to indicate if there are hidden 
> > > participants or not, and if so, how many.
> > > 
> > > The question remain: is there a need for such a feature (to 
> > > hide users?)?
> > > 
> > > Regards,
> > > Hisham
> > > 
> > > > 2) In some conferences, participants may want technical 
> > > > assurance that 
> > > > hidden users are not possible before they speak.
> > > > 
> > > > Mike
> > > > 
> > > > 
> > > > At 02:55 PM 12/15/2003 +0200, hisham.khartabil@nokia.com wrote:
> > > > >This is in reference to requirements REQ-A7 and REQ-E10 in 
> > > > 
> > 
>http://www.ietf.org/internet-drafts/draft-ietf-xcon-cpcp-reqs-00.txt
> > >
> > >    REQ-A7: It SHOULD be possible to participate in a 
> conference as a
> > >    hidden user. Hidden user is present in a conference, but 
> > his presence
> > >    is not revealed.
> > >
> > >    REQ-E10: It MUST be possible to allow and disallow 
> > hidden membership
> > >    in a conference.
> > >
> > >Should a conference policy, using CPCP, specify if a user 
> > can be hidden? 
> > >This means that the conference state package does not report the 
> > >participation on the hidden user. CPCP is used to identify 
> > which users are 
> > >hidden. The list of hidden users is only manipulated by a 
> > privileged user 
> > >such as the moderator.
> > >
> > >Regards,
> > >Hisham
> > >
> > >_______________________________________________
> > >XCON mailing list
> > >XCON@ietf.org
> > >https://www1.ietf.org/mailman/listinfo/xcon
> > 
> > 
> 
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon
> 
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon
> 
> 


_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon

_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon