Instant Message Delivery Notification (IMDN) for Common Presence and Instant Messaging (CPIM) Messages draft-burger-sipping-imdn-02.

Slides:



Advertisements
Similar presentations
IM Delivery and Read Reports Hisham Khartabil
Advertisements

Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
SIP and Instant Messaging. SIP Summit SIP and Instant Messaging What Does Presence Have to Do With SIP? How to Deliver.
Fall IM 2000 Introduction to SIP Jonathan Rosenberg Chief Scientist.
VON Europe /19/00 SIP and the Future of VON Protocols SIP and the Future of VON Protocols: Presence and IM Jonathan Rosenberg.
Fall VoN 2000 SIP for IP Communications Jonathan Rosenberg Chief Scientist.
Workflows in Archie IMS Support Person: Sonja Henderson
Basic Communication on the Internet:
IETF Trade Working Group January 2000 XML Messaging Overview January 2000.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
Creating a Secured and Trusted Information Sphere in Different Markets Giuseppe Contino.
1 of 2 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
SIMPLEStone – A presence server performance benchmarking standard SIMPLEStone – A presence server performance benchmarking standard Presented by Vishal.
1 of 3 This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. © 2007 Microsoft Corporation.
{ Etiquette Handbook. Feature Creating an Font, colour and sizes etc Sending an Sending using Cc Sending using Bcc Creating a signature.
Hearth Bulk System Divisional Secretaries’ Briefing 2012.
Sending and receiving s Section 6. Objectives Students will deal with messages, send and receive messages, reply to s, sorting s and how.
4 August 2005draft-burger-simple-imdn-011 Instant Message Delivery Notification (IMDN) for Presence and Instant Messaging (CPIM) Messages draft-burger-simple-imdn-01.
SIMPLE MAIL TRANSFER PROTOCOL SECURITY Guided By Prof : Richard Sinn Bhavesh Jadav Mayur Mulani.
Report Splitting and Distribution What is involved in splitting and distributing? What is involved in splitting and distributing? Why split or burst reports?
» Explain the way that electronic mail ( ) works » Configure an client » Identify message components » Create and send messages.
ICT Essential Skills. (electronic mail) Snail Mail.
Norman SecureTide Powerful cloud solution to stop spam and threats before it reaches your network.
Overview What are the provisioning methods used in the Australian registry system? How are these provisioning systems secured?
Anya Brookman. How to create a new message Unwanted messages Folders Messages you have sent to someone Logging out when you have finished sending.
1 Bag – O – Bytes Organization FPB Helpdesk X /3/04.
Social effect: Facebook is a site available to anyone. Many people use it in order to contact friends and relatives from all around the world, and to meet.
Applicability Statement v1.1 Feedback: DirectTrust May 5, 2015.
ETIQUETTE AND EVIDENCE
Information guide.
A form of communication in which electronic messages are created and transferred between two or more devices connected to a network.
Security+ All-In-One Edition Chapter 14 – and Instant Messaging Brian E. Brzezicki.
The Internet 8th Edition Tutorial 2 Basic Communication on the Internet: .
Module 6 Planning and Deploying Messaging Security.
GroupWise 6.5 Junk Mail Handling July 28, Configuring Junk Mail Handling Junk Mail Handling enables you to have actions taken automatically on any.
Tired of Spam? The solution is MailWasher
Presented By Team Netgeeks SIP Session Initiation Protocol.
Outlook 2007 basics. Create an account An account must be created before sending/receiving . Follow these steps to create an account:
April 5, 2004 Prof. Paul Lin 1 CPET 355 Data Communications & Networking 7. The Application Layer: Paul I-Hai Lin, Professor Electrical and Computer.
Company Guidelines and Basic Rules for …. No text words or slang, all s sent have to be polite and formal Use suitable, relevant subject lines.
SIMPLE MAIL TRANSFER PROTOCOL. Introduction Simple Mail Transfer Protocol is the standard protocol on the Internet and part of the TCP/IP protocol.
 When you receive a new you will be shown a highlighted in yellow box where your can be found  To open your new just double click.
Features Help (Adding Attachments) (Adding Auto Signatures) (Setting Priorities)
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
July 2007 (IETF 69)IETF - SIPPING1 Replace Instant Message in SIP draft-ren-sipping-replace-instant-message-00 Da Qi Ren Qian Sun Linyi Tian IETF 69, Chicago.
July 2007 (IETF 69)IETF - SIPPING1 Replace Instant Message in SIP draft-ren-sipping-replace-instant-message-00 Da Qi Ren, Qian Sun and Linyi Tian IETF.
Mobile Communication MMS. Mobile Communication The MM7 interface enables interactions between Value Added Service applications and an MMSC. The technical.
SIP INFO Event Framework (draft-kaplan-sip-info-events-00) Hadriel Kaplan Christer Holmberg 70th IETF, Vancouver, Canada.
Sieve Mail Filtering Language WG (sieve) SIEVE Alexey Melnikov Cyrus Daboo.
Managing Your Inbox. Flagging Messages Message requires a specific response or action from the recipient Flagging draws attention to your request Quick.
Messages 1. Outline Fields of an Subject line One point per The expected response Be a good correspondent Final tips 2.
tool kit. USER GUIDE Etiquette (Acceptable use policy) – a list of rules that we observe Use a suitable subject in the - this helps.
SIP file directory draft-garcia-sipping-file-sharing-framework-00.txt draft-garcia-sipping-file-event-package-00.txt draft-garcia-sipping-file-desc-pidf-00.txt.
OMA Instant Messaging Rel 1.0 Requirements with Possible Relevance to IETF Markus Isomäki OMA Issues BoF IETF #62.
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
Spoofing The False Digital Identity. What is Spoofing?  Spoofing is the action of making something look like something that it is not in order to gain.
Spam Wrangling on UC Berkeley's CalMail. Spam detection CalMail uses Sophos PureMessage, running on CommuniGate Pro's front-end servers PureMessage.
Your File System LIBS100 January 26, Word of the Day Network Administrator An information technology professional responsible for setting up, maintaining,
Yahoo! Mail We gave Google some good press so we’ll use Yahoo! mail as our example for web s. If you don’t have an account Yahoo! will provide.
Postech DP&NM Lab Session Initiation Protocol (SIP) Date: Seongcheol Hong DP&NM Lab., Dept. of CSE, POSTECH Date: Seongcheol.
Network System Security - Task 2. Russell Johnston.
End-to-middle Security in SIP
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
Transcoding Framework
How to Automatically Delete Spam Mails on Mac PC?.
draft-ietf-dmm-4283mnids Charlie Perkins
Transcoding Framework
Hearth Bulk System Divisional Secretaries Briefing 2011.
Outline The spoofing problem Approaches to handle spoofing
Presentation transcript:

Instant Message Delivery Notification (IMDN) for Common Presence and Instant Messaging (CPIM) Messages draft-burger-sipping-imdn-02

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-022 Open Issues Issue 1: Requiring IMDN’s to be end-to- end encrypted. Issue 2: Sender keeping state Issue 3: No disposition time in IMDN Issue 4: Recipient of IMDN can appear to be different than sender Issue 5: Deleted state (automatic versus manual) Issue 6: Report Consolidation

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-023 Issue 1: IMDN Security Always Encrypt Body (because of B2BUA’s) Never Encrypt Body Encrypt Body if UAC Requires it –Reject message if UAS cannot comply –Following privacy rules Encrypt Body if Message Was Encrypted –Requires examining message

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-024 Issue 2: Sender Keeping State Draft assumes UAC will keep state of messages IMDN’s requested for –Little as Message-ID, as much as Sent Message folder –Drawback is memory / storage limitations of mobile devices Keep in mind human factors: a long time between sent message and IMDN usually results in alternate communication path choice “Good” or “Big” UAC’s can keep persistent state “Small” UAC’s don’t really need state; they get minimum info from IMDN itself Timeout is a local matter

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-025 Issue 3: No Disposition Time in IMDN Pro –Data Element Exists in CPIM and Transport Protocol –Trivially Easy to Spoof –Saves Bytes Con –UAC Has to Read CPIM Wrapper –We’re Only Talking 42 Bytes

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-026 Issue 4: Recipient Of IMDN Can Appear To Be Different Than Sender Pro –Enables Stateless B2BUA’s –Enables “role” addresses (e.g., Con –Imposes Authenticated Transport for IM Transport (TLS) Close well-known MDN SPAM attack

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-027 Issue 5: Deleted State Discussion started as automatic versus manual delete Came from world where you could delete a message without reading it (from headers only) or having a sieve filter delete messages for you –Probably not applicable for IM Propose to drop deleted state altogether

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-028 Issue 6: Report Consolidation B2BUA’s could consolidate IMDNs –B2BUA’s can always do whatever they want to do How they populate Disposition-Notification-To How they process IMDN’s How they generate IMDN’s UAC directs B2BUA if IMDN request is for B2BUA or Final Destination (OK?) Is consolidation subject of standardization, now? Propose to say, “no”; protocol machinery is in place to enable it in future extension

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-029 Does Anyone Care? Gotten repeated feedback informally that 3GPP really needs this Three people came up to me after presentation in Paris this was critically important to their business model (financial and medical verticals) Absolutely no feedback on the SIMPLE list

Armistice Day, 2005IETF 64 - draft-burger-simple-imdn-0210 Next Steps If people care, make work group item –Flesh out examples –Work out consensus on 6 open items (my way is easiest ) If people don’t care, we are finished