SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan,

Slides:



Advertisements
Similar presentations
August 2, 2005SIPPING WG IETF 63 ETSI TISPAN ISDN simulation services Roland Jesske Denis Alexeitsev Miguel Garcia-Martin.
Advertisements

SIPPING 3GPP Requirements Ad Hoc Meeting Georg Mayer IETF#53, Minneapolis.
July 13, 2006SIPPING WG IETF 66Slide # 1 ETSI TISPAN call completion services (draft-poetzl-sipping-call-completion-00) Roland
Early Media Authorization Under what conditions should negotiated media flow prior to 200 OK (INVITE)? Richard Ejzak.
THIS IS THE WAY ENUM Variants Jim McEachern Carrier VoIP Standards Strategy THIS IS.
SIP issues with S/MIME and CMS Rohan Mahy SIP, SIPPING co-chair.
Downgrade Design Team Discussion Results IETF 77 DDT.
IETF 91 DISPATCH draft-jesske-dispatch-forking- answer-correlation-02 Roland Jesske.
Opaque MSRP Path Uri Derek MacDonald. Overview Provides topology (IP address) hiding – Hide network architecture – Hide individual IP addresses Depends.
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Certificate Path Building draft-ietf-pkix-certpathbuild-01.txt Peter Hesse Matt Cooper Yuriy Dzambasow Susan Joseph Richard Nicholas.
1 SIP Extensions QoS, Authentication, Privacy, Billing,... Project Packetcable John R. Pickens, PhD VP Technology and CTO
MIF API draft-ietf-mif-api-extension-05 Dapeng Liu.
Proposed Fix to HERFP* (Heterogeneous Error Response Forking Problem) Rohan Mahy * for INVITE transactions.
Proxy Authentication of the Emergency Status of SIP Calls draft-barnes-ecrit-auth-00 Richard Barnes IETF 69, Chicago, IL, USA.
1 SIP WG meeting 73rd IETF - Minneapolis, MN, USA November, 2008 Return Routability Check draft-kuthan-sip-derive-00 Jiri
SIP Action Referral Rifaat Shekh-Yusef Cullen Jennings Alan Johnston Francois Audet 1 IETF 80, SPLICES WG, Prague March 29, 2011.
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
DICOM Security Lawrence Tarbox, Ph.D. Chair, WG 14 Mallinckrodt Institute of Radiology Washington University in St. Louis School of Medicine.
Explicit Subscriptions for REFER draft-sparks-sipcore-refer-explicit-subscription-00 SIPCORE – IETF90 Robert Sparks.
Identities and Network Access Identifier in M2M Page 1 © GPP2 3GPP2 and its Organizational Partners claim copyright in this document and individual.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
Page 1IETF 65 ENUM WG IETF 65 – ENUM WG IANA Registration for an Enumservice and “tel” Parameter for Calling Name Delivery (CNAM) Information 20 March.
SIP working group IETF#70 Essential corrections Keith Drage.
Andrew Allen Communication Service Identifier.
SIP Extensions for Caller Identity and Privacy Flemming Andreasen W. Marshall, K. K. Ramakrishnan, E. Miller, G. Russell, B. Beser,
Interworking between SIP and QSIG for call transfer draft-rey-sipping-qsig2sip-transfer-00.txt Jean-Francois Rey Alcatel IETF59.
Caller Prefs and Friends Jonathan Rosenberg dynamicsoft.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
1/7 Clarification of Privacy Mechanism for SIP draft-munakata-sipping-privacy-clarified-00 Mayumi Munakata (NTT) Shida Schubert (NTT) IETF67 SIPPING 1.
SDP Simple Capability Negotiation (SDP Simcap) draft-andreasen-mmusic-sdp-simcap-reqts-00.txt draft-andreasen-mmusic-sdp-simcap-01.txt 50th IETF - March.
SIP PUBLISH Method Jonathan Rosenberg dynamicsoft.
RFC3261 (Almost) Robert Sparks. SIPiT 10 2 Status of the New SIP RFC Passed IETF Last Call In the RFC Editor queue Author’s 48 hours review imminent IMPORTANT:
Name that User John Elwell Cullen Jennings Venkatesh Venkataramanan
A Framework for Session Initiation Protocol User Agent Profile Delivery (draft-ietf-sipping-config-framework-11) SIPPING – IETF 68 Mar 19, 2007 Sumanth.
IETF #65 Network Discovery and Selection Problem draft-ietf-eap-netsel-problem-04 Farooq Bari Jouni Korhonen.
March 20, 2007BLISS BOF IETF-681 Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol.
Call Completion using BFCP draft-roach-sipping-callcomp-bfcp IETF 67 – San Diego November 7, 2006.
1 IETF 72 BLISS WG meeting draft-ietf-bliss-ach-analysis-02 John Elwell.
Slide #1 Nov 6 -11, 2005SIP WG IETF64 Feature Tags with SIP REFER draft-ietf-sip-refer-feature-param-00 Orit
History-Info header and Support of target-uri Solution Requirements Mary Barnes Francois Audet SIPCORE.
March 20th, 2001 SIP WG meeting 50th IETF SIP WG meeting Overlap signalling handling
The “application” Profile Type (draft-channabasappa-sipping-app-profile-type-01) Sumanth Channabasappa Josh Littlefield Salvatore Loreto 70th IETF, Vancouver,
SIP Working Group IETF 72 chaired by Keith Drage, Dean Willis.
1 End-to-middle Security in SIP Kumiko Ono NTT Corporation March 1, 2004 draft-ietf-sipping-e2m-sec-reqs-01.txt draft-ono-sipping-end2middle-security-01.txt.
Andrew Allen ROUTING OUT OF DIALOG REQUESTS draft-allen-dispatch-routing-out-of-dialog-request-01 Dispatch IETF 92 March 23 rd 2015.
Globally Identifiable Number (GIN) Registration Adam Roach draft-martini-roach-gin-01 IETF 77 – Anaheim, CA, USA March 22, 2010.
1 Connectivity Preconditions for SDP Media Stream draft-andreasen-mmusic-connectivityprecondition-00.txt March 3, 2004 Flemming Andreasen
SIP wg Items Jonathan Rosenberg dynamicsoft Caller Preferences: Changes Discussion of Redirects –Previous draft only proxy –Nothing different for redirect.
Volker Hilt SIP Session Policies Volker Hilt
End-to-middle Security in SIP
draft-rescorla-fallback-01
THIS IS THE WAY ENUM Variants Jim McEachern
Transcoding Framework
Request-URI Param Delivery
Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol (SIP) draft-johnston-bliss-mla-req-00.
draft-ietf-geopriv-lbyr-requirements-02 status update
Verstat Related Best Practices
Jean-François Mulé CableLabs
Flemming Andreasen SIP Extensions for Caller Identity and Privacy Flemming Andreasen
draft-ipdvb-sec-01.txt ULE Security Requirements
Transcoding Framework
draft-rocky-sipping-calling-party-category-01 Report
call completion services
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
RFC Verifier Behavior Step 4: Check the Freshness of Date
IPNNI SHAKEN Enterprise Models: LEMON TWIST
SIP Session Timer Glare Handling
draft-ietf-stir-oob-02 Out of Band
Presentation transcript:

SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan, E. Miller, G. Russell, B. Beser, M. Mannette, K. Steinbrenner, D. Oran, F. Andreasen, J. Pickens, P. Lalwaney, J. Fellows, D. Evans, K. Kelly, M. Watson IETF - March 2002

Draft Status Lots of list discussion and off-line comments Currently in WG Last Call

Overview of Changes Applicability Statement about appropriate use –Within administrative domain or cooperating domains –Draft is for network-asserted identity, not user-asserted Anonymity header removed –Issue of IP address privacy still described, but no solution offered (general service invocation issue) Extensions must be documented in an RFC and undergo designated expert review Grammar fixes and 2543bis alignment Various editorial changes

Open Issue #1 Proxy handling of a Remote-Party-ID received from untrusted entity (proxy or UA) –Option 1 If verifiable, set “screen=yes” If not verifiable, set “screen=no” –Option 2 Always remove untrusted Remote-Party-ID If identity can be determined, add new Remote-Party-ID with identity information –Option 1 more general than option 2 Option 1 allows unsupported identity types to be passed while still supporting the general privacy handling functions Option 2 assumes that an untrusted Remote-Party-ID is always useless. Option 1 lets the user decide –Recommendation:Option 1

Open Issue #2 Explicitly indicate the party type (rpi-pty-type) or infer from message –Option 1 Explicit “calling” and “called” party types –Option 2 Always infer from message, i.e. “calling” in request and “called” in response Deprecate rpi-pty-type –Option 1 more general than option 2 Allows “calling” and “called” in other messages than requests and response respectively (European requirement (?)) Allows for other types of party information in the future (related extensibility issue) –Recommendation:Option 1

Open Issue #3 Types of Identity Information (rpi-id-type) –Option 1 User, Subscriber, and Terminal –Option 2 User only (inferred) Deprecate rpi-id-type –Option 1 more general than option 2 Allows different types of identity information to be conveyed which could be important for some network based services Allows for other types of identity information in the future (related extensibility issue) –Recommendation:Option 1

Open Issue #4 Define “privacy” parameter as a general URI parameter or restrict to Remote-Party-ID –Option 1 Let “privacy” parameter apply only to Remote-Party-ID. –Option 2 Let “privacy” parameter be a general URI parameter –Option 2 more general than option 1 Not clear why the UA couldn’t just make other URIs “private” to begin with Significant draft change –More discussion needed

Open Issue #5 Extensibility of rpi-pty-type and rpi-id-type –Option 1 Make them extensible Require RFC and designated expert review –Option 2 Do not make them extensible –Option 1 more general than option 2 Enables use of existing privacy mechanism for new types of party and identity information in the future Potential for abuse, however the required designated expert review can prevent this –Recommendation:Option 1

Open Issue #6 Names of rpi-pty-types –Currently “calling” and “called”, however somewhat misleading –Alternative suggestions welcome

Open Issue #7 Cryptographically random identifier in From header field –Leftover from 2543 –No longer required given From-tag uniqueness requirement Recommendation: –Use instead