Session Recording Protocol Requirements IETF 75, Stockholm (Leon Portman on behalf of the team)

Slides:



Advertisements
Similar presentations
The leader in session border control for trusted, first class interactive communications.
Advertisements

Encrypting Wireless Data with VPN Techniques
SIPREC draft-ietf-siprec-req-03 Requirements for Media Recording using SIP Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain, H. Lum IETF 78.2 Interim.
Lync /11/2017 © 2014 Microsoft Corporation. All rights reserved. Microsoft, Windows, and other product names are or may be registered trademarks.
Security in VoIP Networks Juan C Pelaez Florida Atlantic University Security in VoIP Networks Juan C Pelaez Florida Atlantic University.
Internet Security CS457 Seminar Zhao Cheng. Security attacks interruption, interception, modification, fabrication passive attack, active attack.
January 23-26, 2007 Ft. Lauderdale, Florida An introduction to SIP Simon Millard Professional Services Manager Aculab.
Enabling SIP to the Enterprise Steve Johnson, Ingate Systems Security: How SIP Improves Telephony.
SIPREC draft-ietf-siprec-req-06 Working Group Last Call Requirements for Media Recording using SIP Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain,
H. 323 and firewalls: Problem Statement and Solution Framework Author: Melinda Shore, Nokia Presenter: Shannon McCracken.
1 SIPREC Protocol (draft-ietf-siprec-protocol-06) August 3, 2012 IETF 84 Authors: L. Portman, H. Lum, A. Johnston, A. Hutton, C. Eckel.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
Palpatine: a P2PM IMS Video Share Architecture and Implementation Second International Conference and Exhibition on Next Generations Mobile Applications.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
 3G is the third generation of tele standards and technology for mobile networking, superseding 2.5G. It is based on the International Telecommunication.
SIP, NAT, Firewall SIP NAT Firewall How to Traversal NAT/Firewall for SIP.
Academic Advisor: Dr. Yuval Elovici Professional Advisor: Yuri Granovsky Team: Yuri Manusov Yevgeny Fishman Boris Umansky.
Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen Dr. Mark Stamp SJSU - CS 265 Spring 2003 STEM is proposed as a solution to network vulnerabilities,
Martin Dolly, Gary Munson AT&T Labs James Rafferty Cantata Roni Even Polycom draft-dolly-xcon-mediacntrlframe-03.txt draft-even-media-server-req-02.txt.
“Lossless” recording in SIPREC Gerben Stam, NICE Systems.
1 SIPREC Requirements IETF #80 Authors: K. Rehor, A. Hutton, L. Portman, R. Jain, H. Lam.
IETF 89 SIPREC WG SIPREC Working Group IETF89 - Friday, March 7 th 2014, 11:50-13:20 Mailing list:
Membership and Media Management in Centralized Multimedia Conferences based on Internet Engineering Task Force Protocol Building Blocks Author: Ritu Mittal.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
IT Expo SECURITY Scott Beer Director, Product Support Ingate
Session-ID Requirements for IETF84 draft-ietf-insipid-session-id-reqts-00 1 August 2012 Paul Jones, Gonzalo Salgueiro, James Polk, Laura Liess, Hadriel.
Host Identity Protocol
1 RTCWEB interim Remote recording use case / requirements John Elwell.
DTLS-SRTP Handling in SIP B2BUAs draft-ram-straw-b2bua-dtls-srtp IETF-91 Hawaii, Nov 12, 2014 Presenter: Tirumaleswar Reddy Authors: Ram Mohan, Tirumaleswar.
Ingate & Dialogic Technical Presentation SIP Trunking Focused.
Fall VON - September 28, 1999 C O N N E C T I N G T H E W O R L D W I T H A P P L I C A T I O N S SIP - Ready to Deploy Jim Nelson,
March 10, 2008SIPPING WG IETF-711 Secure Media Recording and Transcoding with the Session Initiation Protocol draft-wing-sipping-srtp-key-03 Dan Wing Francois.
Enterprise JavaBeans. What is EJB? l An EJB is a specialized, non-visual JavaBean that runs on a server. l EJB technology supports application development.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
B2BUA – A New Type of SIP Server Name: Stephen Cipolli Title: System Architect Date: Feb. 12, 2004.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
SIPREC Conference Recording (draft-kyzivat-siprec-conference-use-cases-01) IETF 89, March 7, 2014 Authors: Michael Yan, Paul Kyzivat, Simon Romano.
Larry Amiot Northwestern University Internet2 Commons Site Coordinator Training September 27, 2004 Austin, Texas Introduction to.
A Conference Gateway Supporting Interoperability Between SIP and H.323 Jiann-Min Ho (Presenter) Jia-Cheng Hu Information Networking Institute Peter Steenkiste.
1 Security Protocols in the Internet Source: Chapter 31 Data Communications & Networking Forouzan Third Edition.
SIP Performance Benchmarking draft-ietf-bmwg-sip-bench-term-02 draft-ietf-bmwg-sip-bench-meth-02 July 24, 2010 Prof. Carol Davids, Illinois Inst. of Tech.
VoN September ‘98 1 9/17/98 VoN Standards Update Jonathan Rosenberg Bell Laboratories September 17, 1998.
SIPREC draft-ietf-siprec-req-02 Requirements for Media Recording using SIP Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain, H. Lum IETF 78.5 Interim.
Authentication of Signaling in VoIP Applications Authors: Srinivasan et al. (MIT Campus of Anna University, India) Source: IJNS review paper Reporter:
Draft-miniero-mediactrl-escs- 00.txt Alessandro Amirante Tobia Castaldi Lorenzo Miniero Simon Pietro Romano (University of Napoli Federico II)
1 SIPREC draft-ietf-siprec-architecture-00 An Architecture for Media Recording using SIP IETF SIPREC INTERIM – Sept 28 th 2010 Andrew Hutton.
Mediactrl Framework draft-melanchuk-mediactrl-framework-00 Tim Melanchuk
Simon Millard Professional Services Manager Aculab – booth 402 The State of SIP.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
IETF70, Vancouver, December 2007draft-wing-sipping-srtp-key-021 Disclosing Secure RTP (SRTP) Session Keys draft-wing-sipping-srtp-key-02 Dan Wing,
SIPREC draft-ietf-siprec-req-00 Requirements for Media Recording using SIP Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain, H. Lum IETF 78 Ken.
Session Recording (SIPREC) Protocol (draft-ietf-siprec-protocol-09) Leon Portman Henry Lum
IETF67 DIME WG Towards the specification of a Diameter Resource Control Application Dong Sun IETF 67, San Diego, Nov 2006 draft-sun-dime-diameter-resource-control-requirements-00.txt.
SIP Performance Benchmarking draft-ietf-bmwg-sip-bench-term-01 draft-ietf-bmwg-sip-bench-meth-01 March 22, 2010 Prof. Carol Davids, Illinois Inst. of Tech.
May 9th 2011 IETF SIPREC INTERIM - draft-ietf-siprec-architecture 1 An Architecture for Media Recording using the Session Initiation Protocol draft-ietf-siprec-architecture.
1 Objectives Wireless Access IPSec Discuss Network Access Protection Install Network Access Protection.
1 SIPREC Protocol (draft-portman-siprec-protocol-05) June 28, 2011 IETF 81 Authors: L. Portman, H. Lum, A. Johnston, A. Hutton.
1 Internet Telephony: Architecture and Protocols an IETF Perspective Authors:Henning Schulzrinne, Jonathan Rosenberg. Presenter: Sambhrama Mundkur.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
The Session Initiation Protocol - SIP
SIPREC draft-ietf-siprec-req-04 Requirements for Media Recording using SIP Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain, H. Lum IETF 79 Beijing.
1 SIPREC Protocol draft-portman-siprec-protocol Virtual interim meeting Dec 16, 2010 Authors: L. Portman, H. Lum.
SIPREC Requirements for Media Recording using SIP IETF 77, Anaheim Ken Rehor on behalf of the team Draft authors: K. Rehor, A. Hutton, L. Portman, R. Jain,
SIPREC Conference Recording (draft-kyzivat-siprec-conference-use-cases-00) IETF 87, November 4, 2013 Authors: Michael Yan, Paul Kyzivat, Simon Romano.
1 Session Recording Protocol Requirements and Charter IETF 76, Hiroshima Andy Hutton and Leon Portman on behalf of the team Draft authors: Kenneth Rehor,
1 Session Recording Protocol Requirements IETF 75, Stockholm (Leon Portman on behalf of the team) Draft authors: Rajnish Jain, Leon Portman, Vijay Gurbani,
WebRTC enabled multimedia conferencing and collaboration solution
IETF 78 Ken Rehor on behalf of the team
An Architecture for Media Recording using the Session Initiation Protocol draft-ietf-siprec-architecture Andy Hutton
Presentation transcript:

Session Recording Protocol Requirements IETF 75, Stockholm (Leon Portman on behalf of the team)

Requirements Draft Authors R. Jain, IPC Systems L. Portman, NICE Systems V. Gurbani, Bell Laboratories, Alcatel-Lucent H. Kaplan, Acme Packet A. Hutton, Siemens Enterprise Communications K. Rehor, Cisco Systems Other contributors to this presentation A. Johnston, Avaya D. Wing, Cisco Systems

Main use cases for recording Trading floor compliance Contact Center quality management Customer analytics Financial institution transactions Insurance and healthcare regulations Emergency services regulations In many cases it’s not a legal requirement, it’s a user requirement – users wanting to protect themselves (i.e., non-repudiation)

Reasons for Standardization Lack of well defined and standard protocol for the recording currently limits or even blocks adoption of IP telephony in the enterprises There is a strong demand from customers and communications systems vendors for such protocol Transforming multiple implementations of proprietary protocols to non-proprietary standard

Main Definitions Recording Server (RS): A Recording Server (RS) is a specialized media server or collector that acts as the sink of the recorded media and metadata events Recording Client (RC): A Recording Client (RC) is a SIP User Agent (UA), SIP Media Server or a Back-to-Back User Agent (B2BUA) that acts as the source of the recorded media and metadata events, sending it to the RS.

Requirements Overview Support for recording control both from RC to RS and from RS to RC Loss-less delivery of the media from RC to RS Support for RS and RC failures Security Mixed and separated recordings Pause and resume of the recordings Support for Session Metadata events Correlation between media and SIP sessions Silent and visible recording

General Overview- Example 1 UA-AB2BUAUA-B Recorder Session Recording Protocol Call Middle-box as Recording Client IP-PBX, MS, SBC, Mixer, Gateway RC RS

General Overview- Example 2 UA-AUA-B Recorder Session Recording Protocol Call End Point as Recording Client RC RS...

Required SRP interfaces Recording Control (RC-> RS or RS->RC) Recorded Media (RC->RS) Call Metadata (RC->RS) (not covered yet)

Why use SIP for SRP? Recording session (SRP) is a media session Call Control functionality: JOIN, REFER SIP Events framework already available Reuse of existing mechanisms: – Codec and transport negotiation – Security mechanisms – Firewall traversal

Scope UA-B UA-C Media Server A/S Recorder (RS) Recorded media MEDIACTRL RTP Session Recording Protocol and Call Metadata events SIP RTP logical or physical B2BUA (the RC)

Other approaches MEDIACTRL and XCON focus on how actually to implement RC and not on the interface between RS and RC Lacks support for integrated signaling and media B2BUA, nor UA/Endpoint acting as RC Does not address all requirements – Recording transparency – Persistent mode – RS invoking recording (instead of RC invoking it)

SRTP Support – current plan If RC has cleartext RTP, it can negotiate/use SRTP for the SRP interface – SRP is an independent RTP/SRTP layer connection If RC only has encrypted SRTP, it can send them as raw “media” payload to RS, to be recorded – Providing any keys to decrypt it is out-of-scope of this work – SRP media layer would not be “RTP” or “SRTP” – it’s a new “raw” or “mirrored” media-layer

Next Steps Is there interest in this? Dispatch to charter a new WG? This document as the starting-point for a charter?

Security Considerations Authentication, authorization, eavesdropping protection, and non-repudiation The RC needs to know the RS it is communicating with is legitimate, and vice- versa, even if they are in different domains. Both the signaling and media for the SRP needs the ability to be authenticated and protected from eavesdropping and non- repudiation.