1 CPCP Hisham Khartabil XCON WG IETF 60, San Diego 2 nd August, 2004

Slides:



Advertisements
Similar presentations
XCAP Tutorial Jonathan Rosenberg.
Advertisements

Yunling Wang VoIP Security COMS 4995 Nov 24, 2008 XCAP The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
What is XML? a meta language that allows you to create and format your own document markups a method for putting structured data into a text file; these.
XCON Framework Overview & Issues Editors: Mary Barnes Chris Boulton
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
A RELOAD Usage for Distributed Conference Control (DisCo) – update – draft-knauf-p2psip-disco-00 draft-knauf-p2psip-disco-00 Alexander Knauf, Gabriel Hege,
XML Configuration Access Protocol (XCAP) Jonathan Rosenberg dynamicsoft.
XML Schemas Microsoft XML Schemas W3C XML Schemas.
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
XCON architecture and protocol musings Henning Schulzrinne Columbia University.
Membership and Media Management in Centralized Multimedia Conferences based on Internet Engineering Task Force Protocol Building Blocks Author: Ritu Mittal.
A Use Case for SAML Extensibility Ashish Patel, France Telecom Paul Madsen, NTT.
XCON Framework Overview & Issues Editors: Mary Barnes Chris Boulton
XP New Perspectives on XML Tutorial 4 1 XML Schema Tutorial – Carey ISBN Working with Namespaces and Schemas.
Requirements for DSML 2.0. Summary RFC 2251 fidelity Represent existing directory protocols with new transport syntax Backwards compatibility with DSML.
XP New Perspectives on XML Tutorial 3 1 DTD Tutorial – Carey ISBN
XCON Working Group IETF 61 Washington, DC. The Normal Stuff NOTE WELL statement Minute Taker Jabber Scribe Blue Sheets.
Slide 1 Conferencing with MSRP draft-niemi-simple-chat-02.txt Miguel Garcia, Aki Niemi IETF March-2005.
1 © NOKIA 1999 FILENAMs.PPT/ DATE / NN SIP Service Architecture Markus Isomäki Nokia Research Center.
1 Tutorial 13 Validating Documents with DTDs Working with Document Type Definitions.
XCON Framework Overview & Issues Editors: Mary Barnes Chris Boulton
INTRODUCTION TO JAVASCRIPT AND DOM Internet Engineering Spring 2012.
A Document Format for Expressing Privacy Preferences H. Schulzrinne, J. Morris, H. Tschofenig, J. Cuellar, J. Polk, J. Rosenberg.
XCAP Needed Diffs Jonathan Rosenberg Cisco Systems.
XCON WG IETF-73 Meeting Instant Messaging Sessions with a Centralized Conferencing (XCON) System draft-boulton-xcon-session-chat-02 Authors: Chris Boulton.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Session Peering Protocol over SOAP I-D ( draft-ietf-drinks-spp-over-soap-01) draft-ietf-drinks-spp-over-soap-01 0 Presenter: Vikas Bhatia (On behalf of.
SAML in Authorization Policies draft-guenther-geopriv-saml-policy-00.
XML – Part III. The Element … This type of element either has the element content or the mixed content (child element and data) The attributes of the.
1 Tutorial 14 Validating Documents with Schemas Exploring the XML Schema Vocabulary.
Tutorial 13 Validating Documents with Schemas
XCAP Jonathan Rosenberg dynamicsoft. Changes in Main Spec Removed POST usage Clarified the meaning of PUT for inserts vs. modifies Added AUID grammar.
MEMBERSHIP AND IDENTITY Active server pages (ASP.NET) 1 Chapter-4.
SIP working group IETF#70 Essential corrections Keith Drage.
Event Filtering Hisham Khartabil SIMPLE WG Interim Meeting, Boston 24 th May, 2004
1 CPCP Open Issues Hisham Khartabil XCON WG Interim Meeting, Boston 26 th May, 2004
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Slide #1 Boston, Jan 5 – 6, 2005XCON WG Interim draft-levin-xcon-cccp-01.txt By Orit Levin
Christian Groves Describing Captures in CLUE and relation to multipoint conferencing draft-groves-clue-multi-content-00 CLUE Interim meeting (09/13)
SIP Call Package Jonathan Rosenberg dynamicsoft. Three Separate Pieces Call Leg State Package Conference Package To-Join/To-Replace.
XCON BOF IETF 57 Vienna, Austria July 15, Administriva Conscripting a Scribe Note Well announcement (Read Section 10 of RFC 2026) Blue Sheets.
Media Control Policy Chris Boulton, Umesh Chandra, Roni Even, Cullen Jennings, Alan Johnston, Brian Rosen, Mark Trayer.
1 Pascal URIEN, IETF 63th Paris, France, 2nd August 2005 “draft-urien-eap-smartcard-type-02.txt” EAP Smart Card Protocol (EAP-SC)
OMA Presence 1.0 Presence attribute, composition issues Krisztián Kiss
Slide #1 Nov 6 – 11, 2005XCON WG IETF54 Conference Package Extensions draft-levin-xcon-conference-package-ext-00 by Orit Levin The Discussion Starter.
SIP PUBLISH Method Jonathan Rosenberg dynamicsoft.
XML Validation II Advanced DTDs + Schemas Robin Burke ECT 360.
1 SIPREC Recording Metadata format (draft-ram-siprec-metadata-format- 00) Jan 25-26th SIPREC INTERIM MEETING R Parthasarathi On behalf of the team Team:
Review of Core Dave Reynolds. XML syntax [i1] Section 2.1. The example XML syntax lacks any namespace. Should indicate that the final XML syntax will.
March 20, 2007BLISS BOF IETF-681 Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol.
SIP file directory draft-garcia-sipping-file-sharing-framework-00.txt draft-garcia-sipping-file-event-package-00.txt draft-garcia-sipping-file-desc-pidf-00.txt.
Slide # 1 IETF-62 March 2005Conference Package Conference Package Status March 11 th, 2005 IETF 62, Minnesota draft-sipping-conference-package-09.
1 CPCP Hisham Khartabil XCON WG IETF 59, Seoul
July 28, 2009BLISS WG IETF-751 Shared Appearance of a SIP AOR draft-ietf-bliss-shared-appearances-03 Alan Johnston Mohsen Soroushnejad Venkatesh Venkataramanan.
Portable Symmetric Key Container (PSKC) Mingliang Pei Philip Hoyer Dec. 3, th IETF, Vancouver.
SIPPING Drafts Jonathan Rosenberg dynamicsoft. Conferencing Package Issues Only one – scope Depends on broader work in conferencing May include –Participant.
Slide #1 Nov 7 – 12, 2004XCON WG IETF51 draft-levin-xcon-cccp-00.txt By Orit Levin
 XML derives its strength from a variety of supporting technologies.  Structure and data types: When using XML to exchange data among clients, partners,
Page 1 IETF Speermint Working Group Speermint draft-ietf-speermint-requirements-04 IETF 71 - Wednesday March 12, 2008 Jean-François Mulé -
A Common Conference Information Data Model for XCON draft-novo-xcon-common-data-model-01.txt
Draft-srinivasan-xcon-eventpkg- extension-01 IETF July 2007 Srivatsa Srinivasan Roni Even
Jonathan Rosenberg dynamicsoft
XCON WG IETF-64 Meeting XCON Framework Overview & Issues
Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol (SIP) draft-johnston-bliss-mla-req-00.
Data Modeling II XML Schema & JAXB Marc Dumontier May 4, 2004
draft-ietf-geopriv-lbyr-requirements-02 status update
Un</br>able’s MySecretSecrets
IETF 57 Vienna, Austria July 15, 2003
Jonathan Rosenberg dynamicsoft
A RELOAD Usage for Distributed Conference Control (DisCo) – Update
Presentation transcript:

1 CPCP Hisham Khartabil XCON WG IETF 60, San Diego 2 nd August, 2004

2 Requirements Went through a WGLC The main issue was the definitions of terms defined in draft- ietf-sipping-conferencing-framework-02 and how they related and are used in this requirements draft. Requirements draft does not reference the framework draft for definitions Framework draft does not define Floor Control Policy and that it is part of conference policy Framework defines conference policy to include media policy, yet no media policy requirements are present

3 Solution

4 Common Policy (1/6) Introduced and Extended Common Policy to replace ACL and PCL example.com true allow

5 Common Policy (2/6) Conditions: that has and

6 Common Policy (3/6) Actions: with values Block, allow, confirm with values None, asserted-id, shared-secret and certificate

7 Common Policy (4/6) Transformations

8 Common Policy (5/6) Introduced PIN and password per conference and per individual user The or element can be used to match those participants that are have knowledge on a password for the conference. For example: pass1 allow So the condition is the password. If any user knows the password, ignoring their identity, the user is allowed to join.

9 Common Policy (6/6) A combination of the condition and the condition creates the possibility of assigning users personal passwords to enable them to join a conference. For example: pass2 allow

10 Other Changes From 00 (1/3) Added text on how to use external lists Removed use of wildcards (instead in common- policy is used) Removed all but 1 namespace from XML Schema Added Refer-list Changed URI assignment and conflicts solutions to mirror that of list-usage in SIMPLE Moved conference manipulation text into a separate section making the XCAP section minimal (less than a page) Declared that interface between focus and conference policy server is out of scope Introduced the concept of sidebars, sidebar URIs etc. Changed media-policy to media-streams and introduced media-policy reference (Cullen Jennings' draft)

11 Other Changes From 00 (2/3) Fixed floor policy to enable correlation between media and floor Solved Key participant issue with common-policy Made major changes to conference-time reflecting list consensus Added privileges using common policy Simplified the schema for Dial-out list Changed the schema so the word "conference" does not appear in every element Added a section indicating where in the schema extensions are allowed Made Privileged user the common term replacing policy manipulator, and in some cases creator.

12 Other Changes From 00 (3/3) made consistent when to use single quotes, double quotes and <> in schema discussion text Populated the Security section with text Modified examples to reflect recent changes. Split examples into Conference policy example and XCAP example

13 Open Issues

14 Interpreting the Element “The element is already defined in the common policy framework [1]. However, the rules for interpreting the identities in elements are left for each application to define separately. This document, however, does not define the rules for interpreting identities in elements in conferencing applications since those interpretation rules are signalling protocol specific.” Do we need to say more than this? Specifically, how do you derive the identities (from different using protocols) used in the elements?

15 Conference State Events allows or blocks a user from subscribing to conference state event package Is this sufficient? Do we need “confirm”, “polite-block”? Do we need to break conference state into pieces and authorise certain pieces of state and not others?

16 Floor Control Events allows or blocks a user to receive conference floor events Is this sufficient? Do we need “confirm”, “polite-block”?

17 Conference Information The element controls whether information in the, and elements may be made available publicly. Do we require more granularity for this element? Perhaps an enumerated integer type, with defined levels of information about the conference, or a set of boolean transformations, each granting a single piece of conference information?

18 The need for Refer List In the last XCON meeting, we agreed that a separate refer list is needed, mainly because The list is not a list of users that the focus invites to join the conference (dial-out list) The ACL (now using common policy) is not the place to list users a focus refers to the conference

19 vs. in the draft refers to any authenticated user refers to any unauthenticated user The lack of element in the conditions means any user, so do we need explicitly?

20 Media Stream Security Policy Currently, the draft defines what security measures are needed for the signalling protocol (use of TLS and S/MIME) But what about the media? Do we need to include security policy for media? For example: Audio MUST use SRTP? Can it be a general media security policy or does it have to be per media type? Is this part of media policy? Is is local policy at the focus?

21 Authenticating a User The action defines the mechanism used by the conference focus to authenticate a user. This element is an enumerated integer type, with defined values of: none, asserted-id, shared-secret and certificate. We already have the necessary tools in conditions (, conditions without identities) Is this really useful? What benefit does it have to the average user?

22 Meta Policy (1/3) Many actions are defined that dictate the privileges for users in a conference:

23 Meta Policy (2/3) Should such a policy be defined in a separate document? The separate document indicates the privileged users and their privileges. Advantages: Reduces conference policy complexity Separates the manipulation rules of the conference policy from the conference policy itself Disadvantages: Many of the conditions have to be repeated in this new document. For example: – –Or should this just be using identity? (I.e. privileges are only assigned for identities) A user has to create and manipulate 2 documents.

24 Meta Policy (2/3) The current draft defines write access and assumes read access to users with write access Should there be separate actions defining read access? For example: needs the companion action to allow users to read the Dial-out list but not modify it.

25 vs. element Common policy has a condition that relates to the authorization rules. It defines the time period that a rule exists in element defines the conference lifetime There are cases where a rule might be valid for a portion of the conference time (eg: first half is management only and second half is for everyone in engineering)

26 Providing Anonymity (1/2) Currently a user requests anonymity by authenticating himself to the conference focus and providing an anonymous ID in the signalling protocol (like in the From-header). The conference policy needs to allow anonymous users to join by having a rule allowing it. For example: allow Should there be rules allowing specific users to be anonymous? If so, should there be a condition or transformation to provide anonymity? Or Both

27 Providing Anonymity (2/2) allow Do we mean by ? Or do we need both? allow

28 and Users who are using a PSTN phone to join a conference can authenticate using a PIN (traditional way). We use the condition for this. Users who are aware of the conference password can join, irrespective of their identity. So anyone who knows the password was join. We use the condition for this. Can we combine? The problem here is that it will create confusion since a user creating those pins or passwords will mistakenly put characters in a pin or think that a password is restricted to digits. They serve different purposes and it doesn't hurt to keep them separate BTW, and should be of type digit and string respectively.

29 External Lists (1/2) Currently, the draft states that to use an external list, you just place the list URI (XCAP) into the element that carries the URI Example of normal case: Example of using external list: What does it mean for an element to carry an XCAP URI?

30 External Lists (2/2) Should the use of external list be more explicit in the policy by using element or “external” attribute? OR

31 Unauthenticated Identities The element in element refers to authenticated users only Do we need to list users that need to be authenticated? For example: User can join a conference, but he does not need to be authenticated? So anyone claiming to be Bob can If we allow such a thing, how many Bobs do we allow? I.e. How many are allowed to claim to be Bob and can join?

32 Expelling a User Care must be taken since if one rules allows a user to join and one blocks a user from joining, the result in that the user is allowed to join. For example, Bob can join a conference since an authorization rule has been defined to allow everyone at example.com: example.com allow

33 Expelling a User Setting the following rule will not block Bob from joining nor will it expel him since the above rule overrides it: block

34 Expelling a User So, in order to expel Bob, the original rule has to be modified using the element: example.com allow

35 Floor-id Currently uses floor URI. Needs to be changed to reflect current floor control protocol