Re: [XCON] CPCP Requirement: Hidden Participants

Rohan Mahy <rohan@cisco.com> Thu, 26 February 2004 06:07 UTC

Received: from optimus.ietf.org (optimus.ietf.org [132.151.1.19]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA08050 for <xcon-archive@odin.ietf.org>; Thu, 26 Feb 2004 01:07:55 -0500 (EST)
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwEgA-0003MH-K5 for xcon-archive@odin.ietf.org; Thu, 26 Feb 2004 01:07:26 -0500
Received: (from exim@localhost) by www1.ietf.org (8.12.8/8.12.8/Submit) id i1Q67QeR012901 for xcon-archive@odin.ietf.org; Thu, 26 Feb 2004 01:07:26 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwEgA-0003Ls-4N for xcon-web-archive@optimus.ietf.org; Thu, 26 Feb 2004 01:07:26 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA08041 for <xcon-web-archive@ietf.org>; Thu, 26 Feb 2004 01:07:24 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AwEg7-0002O6-00 for xcon-web-archive@ietf.org; Thu, 26 Feb 2004 01:07:23 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AwEfL-0002J3-00 for xcon-web-archive@ietf.org; Thu, 26 Feb 2004 01:06:36 -0500
Received: from optimus.ietf.org ([132.151.1.19]) by ietf-mx with esmtp (Exim 4.12) id 1AwEem-0002DH-00 for xcon-web-archive@ietf.org; Thu, 26 Feb 2004 01:06:00 -0500
Received: from localhost.localdomain ([127.0.0.1] helo=www1.ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwEen-0002xG-FA; Thu, 26 Feb 2004 01:06:01 -0500
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org) by optimus.ietf.org with esmtp (Exim 4.20) id 1AwEeD-0002wE-9Y for xcon@optimus.ietf.org; Thu, 26 Feb 2004 01:05:25 -0500
Received: from ietf-mx (ietf-mx.ietf.org [132.151.6.1]) by ietf.org (8.9.1a/8.9.1a) with ESMTP id BAA07914 for <xcon@ietf.org>; Thu, 26 Feb 2004 01:05:23 -0500 (EST)
Received: from ietf-mx ([132.151.6.1]) by ietf-mx with esmtp (Exim 4.12) id 1AwEeA-0002C6-00 for xcon@ietf.org; Thu, 26 Feb 2004 01:05:22 -0500
Received: from exim by ietf-mx with spam-scanned (Exim 4.12) id 1AwEdJ-00027R-00 for xcon@ietf.org; Thu, 26 Feb 2004 01:04:30 -0500
Received: from sj-iport-4.cisco.com ([171.68.10.86]) by ietf-mx with esmtp (Exim 4.12) id 1AwEcx-00021t-00 for xcon@ietf.org; Thu, 26 Feb 2004 01:04:07 -0500
Received: from mira-sjc5-b.cisco.com (IDENT:mirapoint@mira-sjc5-b.cisco.com [171.71.163.14]) by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id i1Q63K4U011110; Wed, 25 Feb 2004 22:03:20 -0800 (PST)
Received: from [127.0.0.1] (ssh-sjc-1.cisco.com [171.68.225.134]) by mira-sjc5-b.cisco.com (Mirapoint Messaging Server MOS 3.3.6-GR) with ESMTP id AQQ73539; Wed, 25 Feb 2004 22:03:19 -0800 (PST)
In-Reply-To: <9ACE0CEE075B494096C86C23878BF85906A326@dyn-tx-exch-001.dynamicsoft.com>
References: <9ACE0CEE075B494096C86C23878BF85906A326@dyn-tx-exch-001.dynamicsoft.com>
Mime-Version: 1.0 (Apple Message framework v612)
Content-Type: text/plain; charset="US-ASCII"; format="flowed"
Message-Id: <91D82640-6821-11D8-B826-0003938AF740@cisco.com>
Content-Transfer-Encoding: 7bit
Cc: "'xcon@ietf.org'" <xcon@ietf.org>, Rohan Mahy <rohan@cisco.com>, Eric Burger <eburger@snowshore.com>
From: Rohan Mahy <rohan@cisco.com>
Subject: Re: [XCON] CPCP Requirement: Hidden Participants
Date: Wed, 25 Feb 2004 22:03:59 -0800
To: Adam Roach <adam@dynamicsoft.com>
X-Mailer: Apple Mail (2.612)
Content-Transfer-Encoding: 7bit
Sender: xcon-admin@ietf.org
Errors-To: xcon-admin@ietf.org
X-BeenThere: xcon@ietf.org
X-Mailman-Version: 2.0.12
Precedence: bulk
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=unsubscribe>
List-Id: Centralized Conferencing <xcon.ietf.org>
List-Post: <mailto:xcon@ietf.org>
List-Help: <mailto:xcon-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/xcon>, <mailto:xcon-request@ietf.org?subject=subscribe>
X-Spam-Checker-Version: SpamAssassin 2.60 (1.212-2003-09-23-exp) on ietf-mx.ietf.org
X-Spam-Status: No, hits=0.1 required=5.0 tests=AWL autolearn=no version=2.60
Content-Transfer-Encoding: 7bit
Content-Transfer-Encoding: 7bit

In any case.  Wiretaps are not hidden users.  They are just there.  The 
thing that announces that Eric has joined the conference is hidden.  
Not because the identity of the announcer is private, but because 
displaying the identity of the announcer would be annoying.

thx,
-rohan




On Feb 25, 2004, at 7:45 PM, Adam Roach wrote:

> I know this issue has been settled, but just as a general
> announcement for any work in any working group: the IAB
> and IESG have stated positions on the topic of legal
> intercept that are (to my understanding) binding on all
> IETF protocols.
>
> These positions are detailed in RFC 2804, and are
> summarized as follows: "The IETF has decided not to consider
> requirements for wiretapping as part of the process for
> creating and maintaining IETF standards."
>
> /a
>
>> -----Original Message-----
>> From: Eric Burger [mailto:eburger@snowshore.com]
>> Sent: Tuesday, January 20, 2004 10:01
>> To: xcon@ietf.org
>> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
>>
>>
>> Would Legal Intercept be in or out?  E.g., hidden
>> participants that CANNOT be known.
>>
>>> -----Original Message-----
>>> From: Drage, Keith (Keith) [mailto:drage@lucent.com]
>>> Sent: Friday, December 19, 2003 6:14 AM
>>> To: hisham.khartabil@nokia.com; mhammer@cisco.com
>>> Cc: xcon@ietf.org
>>> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
>>>
>>>
>>> I believe hidden users are appropriate.
>>>
>>> I do not believe that this adds complexity to the
>>> specifications (particularly to the specification of CPCP),
>>> so I see no need to make it a DEFER as far as the
>>> specifications are concerned. It may add complexity to the
>>> implementation, so I am quite happy to see it a MAY in the
>>> requirements, so that it is optional to implement.
>>>
>>> As regards the legal implications of hidden users, then yes,
>>> there may be priveleged users that are able to request the
>>> identity of hidden users (along with an indication that they
>>> are hidden). This of course requires the enabling of such a
>>> privileged user in the first place.
>>>
>>> Secondly, it may not be necessary to identify hidden users,
>>> but merely that there are hidden users in the conference (in
>>> addition to any that may have made themselves visible). Some
>>> countries require some form of tone or announcement on voice
>>> conferences when someone else is listening in. They also
>>> require an announcement or other indication in the call is
>>> being recorded.
>>>
>>> regards
>>>
>>> Keith
>>>
>>> Keith Drage
>>> Lucent Technologies
>>> drage@lucent.com
>>> tel: +44 1793 776249
>>>
>>>
>>>> -----Original Message-----
>>>> From: hisham.khartabil@nokia.com
>> [mailto:hisham.khartabil@nokia.com]
>>>> Sent: 15 December 2003 16:29
>>>> To: mhammer@cisco.com
>>>> Cc: xcon@ietf.org
>>>> Subject: RE: [XCON] CPCP Requirement: Hidden Participants
>>>>
>>>>
>>>>
>>>>
>>>>> -----Original Message-----
>>>>> From: ext Michael Hammer [mailto:mhammer@cisco.com]
>>>>> Sent: 15.December.2003 18:17
>>>>> To: Khartabil Hisham (NMP-MSW/Helsinki)
>>>>> Cc: xcon@ietf.org
>>>>> Subject: Re: [XCON] CPCP Requirement: Hidden Participants
>>>>>
>>>>>
>>>>> Related to this is there a requirement that, while not
>>>> revealing the
>>>>> identity of a hidden user, the conference policy contains
>>>>> state indication
>>>>> about either the presence of hidden users, or the
>>>>> possibility/preclusion
>>>>> that such hidden users may be present?
>>>>>
>>>>> I am anticipating that:
>>>>> 1) Laws may exist that require notification of such.
>>>>
>>>> That's a good point. This might require changes to the
>>>> conference event package to indicate if there are hidden
>>>> participants or not, and if so, how many.
>>>>
>>>> The question remain: is there a need for such a feature (to
>>>> hide users?)?
>>>>
>>>> Regards,
>>>> Hisham
>>>>
>>>>> 2) In some conferences, participants may want technical
>>>>> assurance that
>>>>> hidden users are not possible before they speak.
>>>>>
>>>>> Mike
>>>>>
>>>>>
>>>>> At 02:55 PM 12/15/2003 +0200, hisham.khartabil@nokia.com wrote:
>>>>>> This is in reference to requirements REQ-A7 and REQ-E10 in
>>>>>
>>>
>> http://www.ietf.org/internet-drafts/draft-ietf-xcon-cpcp-reqs-00.txt
>>>>
>>>>    REQ-A7: It SHOULD be possible to participate in a
>> conference as a
>>>>    hidden user. Hidden user is present in a conference, but
>>> his presence
>>>>    is not revealed.
>>>>
>>>>    REQ-E10: It MUST be possible to allow and disallow
>>> hidden membership
>>>>    in a conference.
>>>>
>>>> Should a conference policy, using CPCP, specify if a user
>>> can be hidden?
>>>> This means that the conference state package does not report the
>>>> participation on the hidden user. CPCP is used to identify
>>> which users are
>>>> hidden. The list of hidden users is only manipulated by a
>>> privileged user
>>>> such as the moderator.
>>>>
>>>> Regards,
>>>> Hisham
>>>>
>>>> _______________________________________________
>>>> XCON mailing list
>>>> XCON@ietf.org
>>>> https://www1.ietf.org/mailman/listinfo/xcon
>>>
>>>
>>
>> _______________________________________________
>> XCON mailing list
>> XCON@ietf.org
>> https://www1.ietf.org/mailman/listinfo/xcon
>>
>> _______________________________________________
>> XCON mailing list
>> XCON@ietf.org
>> https://www1.ietf.org/mailman/listinfo/xcon
>>
>>
>
>
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon
>
> _______________________________________________
> XCON mailing list
> XCON@ietf.org
> https://www1.ietf.org/mailman/listinfo/xcon


_______________________________________________
XCON mailing list
XCON@ietf.org
https://www1.ietf.org/mailman/listinfo/xcon