Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
TR-45.6 Combined Ballot Comments on LAES for cdma2000@ Voice over IP (TIA-1066) Post Ballot Resolution (16 August 05) FINISHED! 1. Do not populate this column (Editor will populate) 2. Please enter comment number nnn. 3. Enter your company name in the third column. 4. Enter the Section number in the fifth column. 5. Enter the Page number in the sixth column. 6. Enter the Line number in the seventh column. (If you want to indicate multiple lines, use ‘-‘. For example 24 – 26.) 7. Enter the Type of the comment in the eighth column. E=Purely Editorial (can be left to the editor to fix) T=Technical (requires a change to the technical content) 8. Editor will enter results of comment resolutions. 9. Enter your company’s comment or the supporting filename in the ninth column. Provide an SF File only if the comment affects more than one section. Please do not modify the width of the table 1. # Leave Blank (aaaa) 2. # 3. Source (Company Name) (nnn) Company name CIU-3 1 2 4. Section 2 Lucent Abstract 5. Page 6. Line v 6 v 9 7. Typ e 8. Res. 9. Comment/SF file ID E,T A, AM, W, R 1. Provide a comment if the change is within one chapter and one section. Proposed Text: (Must use revision mark) Rational: 2. Or provide an SF File ID (Supporting File ID) if the comment affects more than one section within one or more chapters. SF File ID= SFaaaa-nnn-company (nnn=comment number entered by the reviewer, same as column#2, aaaa comment number used/provided by Editor from master list) E A ..for Lawfully Authorized Electronic Surveillance (LAES) for Voice over IP (VoIP)… Change to “which includes Voice over IP”. Why is this only applicable to VoIP – implies isolating and reporting only VoIP. AM Page 1 of 36 3 001 CFRI Forward ix 17 E Add “At the time of publication, work is also on-going in the area of MMD intercept in TIA subcommittee TR-45.2 (insert formal committee name), e.g., proposed ANS-TIA-1071 IP Multimedia Subsystem Electronic Surveillance - Technical Aspects. “ AM Note: check Table of Contents and realign page number for Abstract to the right margin. 4 Motorola 1 Sprint xi 10 E A xi 13 T AM 6 Motorola 2 1 18-23 T 7 CIU-4 1 20-22 E AM (1st insert ion accep ted) Mot w/dra ws 2nd com ment AM 5 1 Remove from Forward: As background information, and jurisdictional areas of the legal authorization. NOTE: This para deleted per Mot-3 resolution Change General to read: The network intercepts on identities found in communication-identifying information at the IAP. …is determined by the ability of the network to associate communication(s) and communication-identifying information with the subject’s identity or identities as derived from the lawful authorization. Page 2 of 36 8 Motorola 3 1 23 T AM Add to General: In order to deliver intercepted communications and communication-identifying information, an LEA must serve the SP with the necessary legal authorization identifying the intercept subject, the communications and information to be accessed, and the jurisdictional areas of legal authorization. Remove this paragraph text from fwd so this text is only located this location (in General). Once the authorization is obtained, the SP shall perform delivery of the intercept subject’s communication for transmission toward the government’s procured equipment, facilities, or services. An SP may be able to support LAES for VoIP without the SP having to modify their networks or systems. Note: check for first use of acronyms. Note: delete all “cdma2000®” in “cdma2000® VoIP instances EXCEPT for that in the scope section. 9 1 Nortel A Comment #1: Correct the Purpose Section 1.2 Purpose does not reflect the purpose of the standard in terms of establishing a Safe Harbor specification for cdma2000 VoIP/MMD. This is needed to distinguish between specifications which are not being created for a Safe Harbor position. Add the following text to the purpose: 1.2 Purpose 10 CIU-5 2 10 E A 11 CIU-6 2 11 E A 12 CIU-7 2 13 E A The purpose of this Standard is to facilitate an SP’s assistance to law enforcement. This Standard defines a method to support surveillance for cdma2000® Voice over IP (VoIP) based on MMD. Compliance with this standard is intended to establish a Safe Harbor position as necessary under the CALEA statute. …Network Perspective” identifies the triggering events, usage and information to be report for the VoIP CII event messages and the application level CC delivery formatted and information. …Implementation Perspective” provides the cdma2000® Object Tree and ASN.1 Modules. Annex A (Normative): “SIP CII Surveillance Messages” provides the message and parameter mappings from SIP standard signaling to surveillance messages reported to the LEA by the SP for a VoIP intercept. Page 3 of 36 13 Motorola 4 14 3 Lucent 15 2 Nortel 2 2 17 2 27-28 E AM Add to beginning of Reference section: The following standards contain provisions which, through reference in this text, constitute provisions of this Standard. At the time of publication, the editions indicated were valid. All standards are subject to revision, and parties to agreements based on this Standard are encouraged to investigate the possibility of applying the most recent editions of the standards indicated below. A Section refers to ANSI and TIA standards. For NAM, reference should be to TIA document (TSB-151). Dele SR # and replace w/TSB-151. Title stays the same. Need to split norm/inform references in Section 2 and TSB-151 goes into inform. Comment #2: Improve the Categorization of the References AM J-STD-025-B in 2 Reference is not an ANS. Create separate reference sections for ANS and ATIS-TIA standards as follows. American National Standards Institute (ANSI) Accredited standards: ANSI ATIS and TIA Standards: [TIA-873] 16 CIU-8 2 30 T Resol ved by 15 17 CIU-9 3 25 E A TIA-873, All-IP Core Network Multimedia Domain: IP Multimedia Subsystem. [NAM] S.R0037-0 v3.0 IP Network Architecture Model for cdma2000® Spread Spectrum Systems. [025-B] TIA/EIA-J-STD-025-B, Lawfully Authorized Electronic Surveillance J-STD-25B has not yet passed the second default ballot, so therefore should not be referenced as an ANSI accredited standard in this document. Recommend a separate section for TIA/ATIS approved documents that are not ANSI accredited. Collection Function (CF): where the intercepted communications and communication-identifying information is collected by a law enforcement agency (LEA). Page 4 of 36 18 19 2 20 Motorola 5 3 28 T W Change Definition Section: Communication-identifying information (CII): Signaling information available at the Intercept Access Point for communication processing purposes that identifies the origin, destination, or termination of each communication generated or received by a subscriber by means of any equipment, facility, or service of an SP. Network protocols (except LAESP) do not need to be modified solely for the purpose of intercepting communication-identifying information. The specific elements of communication-identifying information that are reasonably available at an IAP may vary as the technology evolves. Sprint 3 42 T A CIU-10 3 48 E A Delivery Function (DF): a logical entity in the Service Provider’s network which delivers intercepted communications and communications-identifying information toward one or more Collection Functions for each LEA requesting intercept. …. As used herein, also includes the acquisition of communication-identifying information. Acronym SIP URL should be included: SIP URI. (This is referred to in Section 5) Add SIP URI in Section 3 and globally change any SIP URL to SIP URI Replace “User Equipment (UE)” with “Mobile Station (MS)” and put it in the right order. Should be made clear that the user is Law Enforcement: This section presents the law enforcement user perspective…. …based on the Multi-Media Domain (MMD) in cdma2000® Telecommunications Networks;… Add the following sentence to the paragraph: For purposes of this standard, the user is the LEA and not the intercept subject. 21 4 Lucent 3 4 49 22 1 Qualcomm 3 4 60 23 5 Lucent 4.1 6 6 CIU-11 6 7 E A Sprint 6 12 T Cove red by com ment 23 24 25 3 AM E A AM Page 5 of 36 26 Motorola 6 4.1 6 12 T AM Add the following: An SP is required to provide access to the Multi-Media content or communication-identifying information for intercept subjects. Communication-identifying information is encapsulated into discrete messages which shall be transported to an LEA. During encapsulation, CII is not altered. 27 Motorola 7 6 16 E A Some circumstances dictate that the communication-identifying information, content, or both, associated with an intercept subject need to be delivered to more than one LEA Collection Function simultaneously. This will occur when different LEAs are conducting independent investigations on the same subject. The Delivery Function shall duplicate the content, communication-identifying information, or both, and deliver only authorized information. No more than five Collection Functions are required to be supported for any single intercept subject. Add: 4.2 General Background Page 6 of 36 28 Motorola 8 6 18 T AM per 2005. 05.06 .06 Add: The intercept function is viewed as five broad categories: access, delivery, collection, service provider administration, and law enforcement administration. These functions are discussed functionally without regard to their implementation. The relationships between these functional categories are shown in Figure (X). Service Provider Access Service Provider Administration Delivery Lawful Authorization Law Enforcement Collection Administration Law Enforcement Agency Figure (X): Electronic Surveillance Model The Access Function, consisting of one or more Intercept Access Points (IAPs), isolates an intercept subject’s communicationidentifying information unobtrusively. The IAPs may vary between SPs and may not be available on all systems. The Delivery Function, consisting of one or more entities, is responsible for delivering intercepted communications to one or more Collection Functions. The Delivery Function(s) transports messages which report communication-identifying information. The physical delivery entities may be split into communicationidentifying information delivery and communication content delivery, or may be combined. [ED note: see next entry for continued text from this comment] Page 7 of 36 28 cont Motorola-8 29 CIU-12 The Service Provider Administration Function is responsible for controlling the SP Access and Delivery Functions. The Collection Function is responsible for collecting and analyzing intercepted communication-identifying information. The Collection Function is the responsibility of the LEA. It is assumed that the LEA collection equipment maintains current state information concerning the associations between communication identities. The collection equipment assumes that the last reported association remains in effect until a subsequent Multi-Media ES message explicitly changes that association. The Law Enforcement Administration Function is responsible for controlling the LEA Collection Function. The Law Enforcement Administration Function is the responsibility of the LEA. The lawful authorization, while neither a network entity nor an interface reference point, is an important part of Multi-Media Lawfully Authorized Electronic Surveillance (LAES). No intercepts shall take place without specific lawful authorization. 6 19-21 E E 30 2 Qualcomm 4.2.1 6 26 31 6 Lucent 4.2.1 6 26-50 32 7 Lucent 4.2.1 6-7 33 CIU-13 6 31 E 34 Motorola 9 6 31 E 35 CIU-14 6 32 E The cdma2000® MMD system is a distributed architecture that provides MultiMedia services, which includes Voice over IP (VoIP) service. The architecture is based on SIP standard signaling. A Replace “User Equipment (UE)” with “Mobile Station (MS)”. A definition for MS was provided. Clarification: Are IAPS required for every type of CSCF. That is, is each CSCF A; see required to have an IAP or can the CSCFs be considered a collection of IAPs. contr Otherwise, each CSCF will required their own LAES database. Discussion on ibutio reflector. n 2005. 08.15 .09 Architecture section (section 4.2) should be included in Stage 2 section, not Stage A 1.Move to become “NEW” section 5.1 (prior to delivery) Hand The following change may improve the text: “Registration accepts Handles led registration requests and makes its information available through the location by 34 server (e.g., HSS); AM Change to: (1) processes registration requests and makes its information available through the location server (e.g., HSS); AM A …location server (e.g., Home Subscriber System (HSS)); Page 8 of 36 36 Motorola 10 6 37 Motorola 11 6 36 E AM 38 CIU-15 6 47 E R 39 CIU-16 7 T R 40 CIU-17 7 Figur e1 Figur e1 T AM 41 CIU-18 7 38 E A 42 7 39 E W 7 7 40 41-44 E 4.2.1 A W 4.2.1 7 7 42 43 E T A W 43 44 8 Motorola 12 CIU-19 Lucent 45 46 3 CIU-20 Qualcomm 34 E A Change to: (2) provides session control for the registered endpoint’s sessions; Change to: (3) Provides endpoint(s) with service related information (e.g., notification of tones/announcement together with location of additional media resources, billing notification, and forwarding indication) … in the home network and to proxy responses from the home network to the mobile station. Two boxes in Figure 1 are labeled “Breakout Gateway Control Function”. Is one of them mislabeled? The figure omits and consequently fails to address interception for services addressed provided by specialized IMS based servers in the network. This should be corrected. There are cases where communication/communication information is communicated between the subject and the server in a secure manner and only the server may be able to access the unencrypted communications. Add Application Server to diagram. Figure 2 shows a general functional Lawful Intercept (LI) architecture for a cdma2000® Multi-… Add new section “Functional Electronic Surveillance Architecture” 47 CIU-21 7 43-44 E/T Resol ved by 31 48 CIU-22 7 44 T A 49 CIU-23 7 45-46 T 7 47 Satisf ied by 51 W 50 9 Lucent 4.2.1 …and Communication-Identifying Information (CII)… Clarification is needed that IMS SP is same as packet data network provider. Recommend moving assumption to last sentence in paragraph. …SP is providing both Communication Control and packet transport. The Delivery Function (DF) can be separated into CII delivery and CC delivery or can be combined into CII and CC delivery. Where the text discusses the separation of a DF, the text should be clarified to indicate whether two DFs are intended a CII DF and a CC DF (for example, the following could be used: The Delivery Function (DF) can be separated into a CII DF and a CC DF or can be combined into a single CII and CC DF.) Add new text at end of paragraph: There may be one or more IAPs in the network for both CII and CC. This is a major shortfall. This document is limited in its capabilities to support law enforcement by not providing for the separate delivery of VoIP. Modify as follows: “Isolating and only reporting Voice over IP (VoIP) in the Multi-Media Domain (MMD) is not required a part of this specification”. Page 9 of 36 51 3 Nortel AM (usin g T1. 678 soluti on) Comment #3: Correctly State the LI Solution Provided in the Specification The following sentence is found at the end of 4.2.1 Architecture (italics added): This statement is inconsistent with the purpose of the standard as stated in 1.2 Purpose (italics added): “This Standard defines a method to support surveillance for cdma2000® Voice over IP (VoIP) based on MMD.” Change the sentence as follows: 52 53 11 Lucent CIU-24 4.2.1 8 Fig 2 8 Figur e2 W E A The current LI solution in this standard provides an intercept method for all MMD services. Isolating and only reporting Voice over IP (VoIP) in the Multi-Media Domain (MMD) is for further study. (these insertions not needed due to T1.678 solution) Due to distributed nature of architecture, DFs may be in different networks and correlation may not be possible. Should be noted that Inter-entity correlation is not guaranteed. Change “signalling" to “signaling” in both instances to align with spelling elsewhere in the document. Page 10 of 36 54 Motorola 14 8 35 T AM Add to section 4.2.2: A Multi-Media IAP shall access communication-identifying packets sent or received by the equipment, facilities, or services of an intercept subject when a Multi-Media service is provided. IAPs may be on the Serving System or on the Redirecting System. An IAP on the Redirecting System is only able to access some packets delivered to the intercept subject (and possibly none of the packets originated by the intercept subject). This paragraph is not accepted If lawful interception is activated when a Multi-Media (e.g., VoIP) service is already in use, interception should be initiated expeditiously. If lawful interception is deactivated during a Multi-Media (e.g., VoIP) service, interception should be discontinued in an expeditious manner. This paragraph accepted as modified) Communication-identifying information shall be sent to the Collection Function when it is intercepted. The intercepted CII shall be delivered without interpretation or modification, except for enveloping required to transport the information to the Collection Function. . An SP shall be responsible for decrypting or decompressing, or ensuring the government’s ability to decrypt or decompress, any communication or signaling encrypted or compressed by a subscriber or customer, when the encryption or compression was provided by the SP and the SP possesses the information necessary to decrypt or decompress the communication or signaling. An SP that provides the government with information about how to decrypt or decompress a communication or signaling (e.g., identifying the type of compression software used to compress the communication or signaling, directing the government to the appropriate vendor that can provide decryption or decompression equipment, or providing the encryption key used to encrypt the communication or signaling) fully satisfies its obligation under the preceding sentence. This paragraph accepted as modified. Move to 4.4 General Capabilities. Interception of CII does not constitute a guarantee that the intercepted CII was also received by the subject or associates. For example, when signaling to a UE is intercepted, it is not known whether the signaling is actually received by the UE due to extraordinary network conditions (e.g., network congestion/failure and air interface problems). Paragraph accepted as modified. Only the communication (i.e., CC) transmitted to, or received from, the intercept subject under surveillance shall be delivered to the LEA. Only the Pageinformation 11 of 36 (i.e., CII) transmitted to, or received from, or associated with the intercept subject’s equipment, facilities, or service under surveillance shall be delivered to the LEA. Paragraph accepted as modified. 55 8 35 E W 56 Motorola 13 CIU-25 8 36 E AM 57 58 CIU-26 CIU-27 8 8 40 48 E E A AM 59 CIU-28 8 49-51 T 60 61 CIU-29 CIU-30 8 8 53 53 E T A; Conf erenc e repor ting is FFS A AM; resol ved by remo ving refs to spec IAPs W 62 10 Lucent 4.2.2 8 54 63 4 Qualcomm 4.2.2 8 54 T W 64 CIU-31 9 8 E A 65 CIU-32 9 9-10 T A Sprint Motorola 15 9 9 14 20 E E A W 66 67 4 Change section 4.2.2 from “Intercept Access Points” to “Multi-Media Electronic Surveillance Access Points”. With respect to Voice over IP within MMD, Intercept Access Points (IAPs) are places in the network where VoIP communication information and content are intercepted. VoIP Communication-Identifying Information IAPs (CII-IAPs) …act as Intercept Access Points. This does not preclude the use of other network elements as IAPs in some SP implementations. Not all CII is available at the CSCF. Some events are available at other entities such as the MRFC (conferencing events). CC-IAPs are as defined in Section 4.3.2.2 This section refers the reader to section 4.2.2.2 for the identification of the CCIAP. Section 4.2.2.2 does NOT identify what network element(s) may be CCIAPs but references the reader to section 4.3.2, which refers the reader to [025B] for cdma2000® packet data system and associated CII events. This document should clearly identify what network element(s) may function as CCIAPs. An additional bullet should be added for the Serving System Event as defined in Section 4.2.2.2. By looking at section 4.2.2.2 is not clear which element is responsible for the intercepting CC. …can be made available without the SP being unduly burdened with network modifications. The determination of what does or does not “unduly burden” the SP is beyond the scope of this specification. Network protocols…. …with network modifications. Network protocols (except LAES Protocol [LAESP]) do not need to be modified solely for the purpose of passing communication identifying information. The specific elements of communication-identifying information that are reasonably available at any one IAP may vary. 4.2.2.2 VoIP CC-IAPs Add Section 4.3 “Assumptions” Page 12 of 36 68 Motorola 16 9 20 T W Add to Assumptions Section: Isolating and only reporting Voice over IP (VoIP) in the Multi-Media Domain (MMD) is not a requirement of this specification. Multi-Media LAES capabilities allow an SP to deliver the intercepted communication-identifying information to an authorized LEA. For interception to occur at an IAP, each intercept subject under surveillance must be readily identifiable within the network by identifiers appropriate and available to that IAP for that technology (e.g., IP address, URLs). For interception of a communication involving an intercept subject, the communication must be reasonably available at the IAP. Therefore, a communication involving an intercept subject can be intercepted at an Intercept Access Point if and only if that intercept subject is readily identifiable at that IAP. Synchronization of network element time-of-day clocks is not required. There is no requirement to provide message integrity to ensure that the message has not been altered in transmission. There is no requirement to provide message sender authentication to ensure the integrity of message sender identification. Reporting of network signaling applied toward the associate is not required. Whenever a capability is described in this Standard, it is assumed that LEAs shall order and acquire adequate capacity in a timely manner for the capability to be performed. The communication-identifying information can only be delivered by a system for activities on that system (e.g., home system, serving system). This document defines requirements and capabilities to support electronic surveillance of packet-mode telecommunications services in order to serve as a standardized method to meet intercept obligations for such services. For some types of messages used by the subject (e.g., SIP REQUEST), the content may be transported with the communication-identifying information. Page 13 of 36 CIU-33 Sprint 9 9 25-26 26 E E A A 71 CIU-34 9 Sectio n 4.3.1. 1 T AM; resol ved by 2005. 08.15 .20r1 72 CIU-35 9 35-36 T A T A 69 70 5 73 5 Qualcomm 4.3 9 27 74 12 Lucent 4.3.1.1 9 38 9 9 41 48 10 2 10 9 T 11-13 E CIU-36 CIU-37 75 76 77 13 80 4.3.1.1 CIU-38 78 79 Lucent 14 Lucent Motorola 19 4.3.1.1 AM. E E Remove “or an associate” (accepted) Add new bullet after this one: An indication of redirection by an associate to the subject relative to a subject’s communication is reported (e.g., REFER). The text and the example are not consistent. Either the text should be changed A to focus on a session initiation request or the example should be changed to BYE. Example changed to BYE Bullet list – is this an exhaustive list or illustrative. Add Note: The above list AM is not an all inclusive list. At end of list before section 4.3.1.2 Remove bulleted item as it is not CII information. 4.3.1 and 4.3.1.1.stays the AM same. 4.3.1.2 becomes 4.3.2 and text stays the same. New 4.3.3. is registration event bullet with new lead in text: “The cdma2000 registration event shall be used to report subject registration information.” Section 4.3.1.3 becomes 4.3.1.2. And move Registration bullet under 4.3 and 4.3.2 Comm Content Intercept becomes 4.3.4. Section references consistent. Page 14 of 36 AM 9-10 10 A A …interest to law enforcement. The section… This section addresses interception events associated with lawful authorizations for which only communication-identifying information is to be delivered to the LEA (Section 4.3.1), and interception events associated with lawful authorizations for which content is to be delivered to the LEA (Section 4.3.2). There is a significant shortfall in delivering the CII in this manner. Law enforcement’s requirement is for discrete LAES messages for each event and not the receipt of all SIP signaling messages in an encapsulated form. For example, for each event reported, the LE expects to receive important event related information including but not limited to: identification of subject (including more specific identification for multiple devices and sessions), unique identification of the VoIP communications session, etc. This shortfall is compounded by the fact that intercepted VoIP is NOT reported to LE separately from the rest of the SIP/IMS/MMD messages. See CIU-23. cdma2000® SIP Message Reporting is one reporting method that intercepts and provides CII to the CF. As part of the cdma2000® SIP Message Reporting, all SIP signaling message that the Multi-…. The section addresses interception events associated with lawful authorizations for which only communication-identifying information is to be delivered to the LEA (Section 4.3.1), and interception events associated with lawful authorizations for which both communication-identifying information and content are to be delivered to the LEA (Section 4.3.2). “on behalf of the intercept subject. Clarify what this means. Does this imply that all intermediate messages (from Application Server) need to be provided to LEA. Add the following parens…on behalf of the intercept subject (e.g., forking). Provided a reference: TIA-873 …Multi-Media information (Voice over IP) when … …associate, has been invited or added to the communications… 81 4 Nortel Resol ved by contr ibutio n 2005. 08.15 .13r1 82 CIU-40 10 25 and 28 E 83 CIU-39 10 28 T 84 Motorola 20 10 28-29 E 10 34 T 85 6 Qualcomm 4.3.2 A. Orig text delete d by 2005. 08.15 .13r1 AM; Orig text delete d by 2005. 08.15 .13r1 A; Orig text delete d by 2005. 08.15 .13r1 R Comment #4: Provide Flexibility for Reporting the Serving System Text in 4.3.1.2 Cdma2000® Serving System Event implies, and this has been interpreted to mean, that the event can only be reported for roaming scenarios. It will take more development work to disable this ‘registration’ reporting at the home system than just reporting the event in all cases. Add a sentence, as follows, to allow this option: 4.3.1.2 Cdma2000® Service Serving System Event The cdma2000® PacketDataServingSystem event specified in [025-B] shall be used to report the serving system identity currently serving the intercept subject when that system is not the home system. The event may be optionally reported when the subject is registering in the home network. …Packet Data CII [025-B]… SIP Multi-Media CII is not defined in this document. This text also implies that ALL Packet Data CII shall be reported. Replace “SIP Multi-Media CII” with “SIP Message Reporting (Section 4.3.1)” and add same EG as in first para to second paragraph. Move sentence to new second paragraph under 4.3.2 as it discusses CC. Remember to make changed for comment 83. Title should be “Communication Content and CII Events Intercept The group decided that what is currently there is sufficient and changing would be too confusing. For CC, you always get CII as well. Page 15 of 36 86 87 7 Qualcomm CIU-41 4.3.2 10 37 T 10 37 T W based on 2005. 08.15 .13r1 AM; resol ved by confe renci ng is FFS Communication content for VoIP based on MMD is intercepted and delivered as part of the content of the cdma2000® packet data system [025-B]. Are Mobile IP bearers used to support signaling and VoIP CC? No. PDSN and HA tunnel. App packets flow thru tunnel. If so, how does a P-CSCF in visited networks ever become realized or used? In this case, how is VoIP CC handled/reported? Thru SIP signaling mechanism. If conferencing is to be provided, how is the bearer established with the MRFC? Internal signaling between MRFC and MRFP is not captured. P-SCSF should be able to report all the call legs of the conference (signaling). Where is content intercepted and delivered to the LEA? If in a conf call and the subject on hold, content still needs to be collected. Need to verify that if subject is on hold and it it’s the subject’s service, then all traffic goes thru subject’s PDSN. Page 16 of 36 88 5 Nortel AM Comment #5: Correct the Implied Limitation on how Subject Signaling, to be Intercepted, is Detected There may be a need to identify signaling associated with the subject’s communication by means other means than a SIP URI or TEL URL (e.g., a Conference URI). The specification should not be limiting in the means of identifying the signaling to be reported. Change the text in 4.4. General Capabilities as follows: 4.4 General Capabilities This section describes the general capabilities that are applicable for Multi-Media (e.g., Voice over IP) LAES for cdma2000®: 89 Motorola 17 10 40 E A The CSCFs shall be capable of duplicating and forwarding to the DF all relevant SIP messages sent or received for a target subscriber along with other information (e.g., Case Identity used to identify the intercept subject) as required by this specification for CII reporting. With respect to the duplication of SIP messages, all SIP messages to or from a targeted subscriber, and all SIP messages executed on behalf of a targeted subscriber for Multi-Media session control are intercepted at the IAPs and sent to the DF. The CII should be sent with a reliable transport mechanism as agreed to between the SP and the LEA. Signaling associated with the subject’s communication, to be intercepted, may be identified by SIP URI, TEL URL, or by other means such as a Conference URI Added definition of Conference URI to definitions; added a statement on conferencing for mapped that states Event mapping of conferencing is FFS.. Add “Communication Associated Information Surveillance Service Description – Communication Identifying IAP” as Section 4.4 Page 17 of 36 90 Motorola 18 10 40 T Add to section 4.4: AM Communication associated information surveillance services access information pertains to communication and service processing. This processing may span several functional entities. The CII-IAP provides expeditious access to the reasonably available communication-identifying information for communications made by an intercept subject or for communications made to an intercept subject. A communication event is a user action or signal that may cause a communication state change. These events are not intended to reflect a particular technology, but to describe the event in general. Move this paragraph to 4.3 and clarify that CII only. The CII-IAP shall access the communication-identifying information for the intercept subject unobtrusively. Access to communication-identifying information shall not deny the availability of any service to either the subject or associates Replace the phrase “target subscriber” with the phrase “intercept subject” Add at end of last sentence in first bullet: “as required for CII reporting”. The CII shall be sent with a reliable transport mechanism as agreed to between the SP and the LEA. This negotiation may include provisions of ensuring message integrity of intercept messages to ensure that the messages were not altered during transmission as well as message sender authentication. 10 10 46 52 E E A A 93 CIU-42 Motorola 21 CIU-43 10 53 T R 94 CIU-44 10 55 T 95 Motorola22 11 21-25 T Resol ved by com ment 88 W 11 23 E A 91 92 96 8 Qualcomm 4.4.2 The identification of traffic should not be limited to SIP URI and TEL URL. Terminal identity and subscription identity may also be used. Identification of VoIP CC to law enforcement may be by use of IP Addresses and port numbers. Change: The following timing requirements from shall apply to the delivery of CII: A call-identifying message must be sent from the carrier’s IAP to the LEA’s Collection Function within eight seconds of receipt of that message by the IAP at least 95% of the time, and with the call event time-stamped to an accuracy of at least 1 second. Replace “must” to “shall”. Page 18 of 36 97 CIU-45 11 23-25 E A 98 CIU-46 11 25 T AM 99 CIU-47 11 Sectio n 4.4.3 T Resol ved by 2005. 08.15 .13r1 Resol ved by 2005. 08.15 .13r1 100 8a Nortel A communication-identifying message must be sent from the carrier's IAP to the LEA's Collection Function within eight seconds of receipt of that message by the IAP at least 95% of the time, and with the communication event timestamped to an accuracy of at least 200 milliseconds. Add new text after text on CII: The following timing requirements shall apply to the delivery of intercepted VoIP content: Intercepted VoIP content shall be expeditiously transmitted by the IAP towards the DF with its interception. Is this true for back-to-back calls when the signaling is manipulated in the network? How is correlation done for such disjointed messages? Comment #8: Provide the Ability to Correlate the Intercepted SIP Signaling with its Intercepted Content and Provide the Flexibility to Correlate the SIP CII as Necessary a) Given a subject may have multiple, concurrent PPP connections being intercepted, there is a need to be able to correlate the intercepted SIP signaling with its intercepted content. b) Given that a network application served by the S-CSCF can alter SIP signaling in such a way as to prevent external correlation (e.g., forking) a means is needed to allow that correlation. 4.4.3 Correlation of CII-to-CC and CII-to-CII In cases where multiple, independent subject CCs are being intercepted (see [025-B] for CC interception), there may be a need to correlate the intercepted CII for that CC with its CC. A correlation value is defined to provide that capability. 101 CIU-48 11 30-34 T Resol ved by 2005. 08.15 .13r1 Correlation of the SIP messages involved in a communication between the subject and associate(s) is typically done via the information in the actual SIP messages reported (e.g., Request-URI, To, From, Call-ID, and CSeq). However, there may be cases which prevent this correlation externally. A correlation value is defined to provide this capability. What if the Call-ID is changed by the CSCF? How is correlation provided between the CII messages? Page 19 of 36 102 6 103 104 6 Sprint 11 31 T Resol ved by 2005. 08.15 .13r1 CIU-49 11 33-34 T Resol ved by 2005. 08.15 .13r1 AM Nortel Correlation of the SIP messages between CII and CC for a subject involved in multiple SIP sessions is critical. A correlation parameters shall be used to enable correlation of SIP messages containing CII with SIP messages containing CC when delivered to the LEA. These parameters need not be the same value between CII and CC messages, but shall provide a mechanism for correlation of the CC and CII messages for the same session for the same subject. …URI, To, From, Call-ID, and CSeq). Reason for deleting text: The correlation of CC and CII is must be within the scope of this document as without correlation, this delivery of intercepted communication can be rendered meaningless. See CIU-51. Comment #6: Correct the Grammar and the Implied Limitation on How Subject Signaling, to be Intercepted, is Detected Under 5 Stage 2 Description: a) correct the implied restraint of identifying subject communication signaling only via the SIP URI of the subject; b) correct the grammar. Correct the expansion of CF (not the first instance - see 4.3.1.1). 5 Stage 2 Description: Network Perspective This section identifies the triggering events and usage for the VoIP CII event messages, identifies and describes the information to be reported with each VoIP CII event message, and also describes the application level CC delivery format and associated delivery information. 105 CIU-50 12 11 T Resol ved by 2005. 08.15 .13r1 The CII-IAP shall provide to the Delivery Function (DF) the intercepted CII . The DF shall send the intercepted CII to the CF. Some SIP messages contain content. For CII-only orders, that content should be removed. However, some SIP body information may be CII, such as some information contained in the SDP (see text 39-40). This specification needs to account for this. Page 20 of 36 106 Motorola 22 12 12 T W Add 5.1 “Stage 2 Methodology”: The methodology and organization for the development of the Stage 2 network perspective is described. A network reference model is developed and then information flows between functional entities over reference points are described. Information is described in terms of a causing event and information associated with that event. Within each service description there is a set of events to support the particular service. Stage 2 for Multi-Media LAES deals with the movement of information between the Access, Delivery, and Collection Functions. The Stage 2 description focuses on the information being transferred, rather than the transfer mechanism. Page 21 of 36 107 Motorola 23 12 12 T W Add 5.2 “Stage 2 Network Reference Model”: The Network Reference model, as shown in Figure XX, consists of a set of functional entities and interface reference points between some of those functional entities. The functional entities provide the functions of the system, and an interface reference point allows information to be exchanged between the two functional entities connected by the interface reference point. Telecommunication Service Provider Access Function d a Service Provider Administratiion Function c Delivery Function e Law Enforcement Administration Function Law Enforcement Agency Page 22 of 36 b Collection Function The Scope of this Standard is limited to the e reference point. 108 Motorola 24 12 12 E W Add explanation of Functional Entities: Access Function (AF) The Access Function, through its constituent Intercept Access Points (IAPs), is responsible for providing access to an intercept subject’s communications, communication identifying information, or both. The Access Function typically includes the ability: to access intercept subject’s communication-identifying information unobtrusively and make the information available to the Delivery Function; to access intercept subject communication content unobtrusively and make the communication content available to the Delivery Function; and to protect (e.g., prevent unauthorized access, manipulation, and disclosure) intercept controls, intercepted communication content and communication-identifying information consistent with SP security policies and practices. Delivery Function (DF) The Delivery Function is responsible for delivering intercepted communications and communication-identifying information to one or more Collection Functions. The Delivery Function typically includes the ability: Page 23 of 36 to accept communication content for each intercept subject over one or more channels from the Access Function(s); (Cont.) to deliver communication content for each intercept subject over one or more Communication Content links to a Collection Function; to accept communication -identifying or packet-mode content information for each intercept subject over one or more channels and deliver that information to the Collection Function over one or more Communication-identifying information links; to ensure that the communication-identifying information and communication content delivered to a Collection Function is authorized for a particular LEA; to duplicate and deliver authorized communicationidentifying information and content for the intercept subject to one or more Collection Functions (up to a total of five); and to protect (e.g., prevent unauthorized access, manipulation, and disclosure) intercept controls, intercepted communication content and communication-identifying information consistent with SP security policies and practices. Cont. Collection Function The Collection Function is responsible for collecting lawfully authorized intercepted communications (i.e., communication content) and communicationidentifying information for an LEA. The Collection Function is the responsibility of the LEA. The Collection Function typically includes the ability: Page 24 of 36 to receive and process CII and CC for each intercept subject. Cont. Service Provider Administration Function (SPAF) The Service Provider Administration Function is responsible for controlling SP electronic surveillance functions. The functions of the SPAF are beyond the scope of this Standard. Law Enforcement Administration Function (LEAF) The Law Enforcement Administration Function is responsible for controlling LEA electronic surveillance functions. The Law Enforcement Administration Function is the responsibility of the LEA. The functions of the LEAF are beyond the scope of this Standard. Page 25 of 36 109 Motorola 25 12 13 W Add Interface Reference Point Information: Reference Point a Reference point a, or the a-interface, is the interface between the Service Provider Administration Function and the Access Function. Reference point a is beyond the scope of this Standard.1 Reference Point b Reference point b, or the b-interface, is the interface between the Law Enforcement Administration Function and the Collection Function. Reference point b is beyond the scope of this Standard. Reference Point c Reference point c, or the c-interface, is the interface between the Service Provider Administration Function and the Delivery Function. Reference point c is beyond the scope of this Standard.1 Reference Point d Reference point d, or the d-interface, is the interface between the Access Function and the Delivery Function. Reference point d is beyond the scope of this Standard.1 Reference Point e Reference point e, or the e-interface, is the interface between the Delivery Function and the Collection Function. Reference point e is defined by this Standard 1 This reference point is required to protect (e.g., prevent unauthorized access, manipulation, and disclosure) 1) the privacy and security of communications and communication-identifying information not authorized to be intercepted; and 2) information regarding the government’s interception of communications and access to communication-identifying information. Page 26 of 36 110 Motorola 26 12 13 T AM; 2005. 08.15 .07 Add Message Descriptions: The communication events described in Stage 1 convey the basic information for reporting the disposition of a communication. This section describes those events and supporting information. Each message is described as consisting of a set of parameters. Each parameter is either: 111 Motorola 27 12 15 T W 112 CIU-51 12 26-36 T 12 12 36-37 39-40 Resol ved by 2005. 08.13 r1 W W 113 114 15 16 Lucent Lucent 5.1.1.1 5.1.1.1 mandatory (M)—required for the message, conditional (C)—required in situations where a condition (defined in the usage column of the table where it occurs) is met, or optional (O)—provided implementation. at the discretion of the The information to be carried by each parameter is identified. Please note that both optional and conditional parameters at Stage 2 are considered to be OPTIONAL syntactically in ASN.1 Stage 3 descriptions. The Stage 2 inclusion requirements take precedence over the Stage 3 syntax.. Add 5.1.1 “Underlying Data Transmission”: The messages defined by this Standard are an Open System Interconnection (OSI) Layer 7 or Application Layer protocol. The protocol for the messages is called the lawfully Authorized Electronic Surveillance Protocol (LAESP). The LAESP messages shall be delivered employing a standard or widely used data communication protocol. Law Enforcement needs to have a method to correlate all messages related to the surveillance subject. SPs must provide a method to correlate all messages for each communication session within their network. For example, networks can provide anonymization, in which case, the SP needs to provide Law Enforcement with the “tie” between the messages from the user side to those on the network side. Add an example of when this situation can occur.. Clarification is also needed with respect to the handling of SIP body information other than application SIP. Page 27 of 36 115 CIU-52 12 41-42 E W 116 CIU-53 13 Table 1 T 117 CIU-54 13 T 118 CIU-55 13 Table 1 Table 1 AM; resol ved by pheade r stuff W 119 CIU-56 13 Table 1 T T Resol ved 2005. 08.15 .13r1 Resol ved 2005. 08.15 .13r1 Messages are described as consisting of a set of parameters. Each parameter is either “mandatory” (M) meaning that it is required for the message; “conditional” (C) meaning that it is required in situations when a condition (defined in the usage column of the table) is met; or “optional” (O) meaning that it is provided at the discretion of the implementation. The information to be carried by each parameter is identified. Both optional and conditional parameters are considered to be optional syntactically in ASN.1 Stage 3 descriptions. Law Enforcement requires, at a minimum, location information for the intercept subject at the beginning and end of the VoIP communication. This critical capability is not provided in this document nor is the capability to provide location updates. These capabilities need to be satisfied. This document does not clearly specify where the case identity is generated. How is correlation done between CII and CC messages? See CIU-49 and CIU51. The table is lacking a number of parameters (e.g., subjectID, callID) which are needed to address comment CIU-34. Page 28 of 36 120 8b Nortel Resol ved 2005. 08.15 .13r1 5.1.1.1 cdma2000 SIP Message Reporting Table 1: CDMA2000® SIP Message Reporting Parameters Parameter CaseIdentity IAPSystemIdentity MOC M C TimeStamp M CorrelationValues C SIPMessage M 121 145 7 1 Sprint SSG 13 5.1.1.2 8 21 T E Description/Conditions Identifies the intercept subject. Included to identify the system containing the IAP when the underlying data carriage does not imply that system. Time and date that the event was detected. A unique value for correlating CC and CII when CII and CC are both reported. May also be used for correlating CII when necessary. The signalling message received from the intercept subject, sent to the intercept subject, or sent or received on behalf of the intercept subject, which stimulated the sending of the SIP Message Reporting. Only the message is included (i.e., without the IP and transport headers). Resol ved 2005. 08.15 .13r1 Insert a parameter into the table: A Change “cmda2000” to “cdma2000” Correlation Value Page 29 of 36 C Identifies a CC or CII message flow for purposes of correlation at LEA. 122 123 Motorola 28 Motorola 29 14 14 5 5 T T W W Add Section 6.1 “Protocol Definition”: A protocol is defined in three basic aspects: a. Transfer Syntax, b. Transfer Semantics, and c. Procedures. The transfer syntax defines the messages passed between two functional entities. This definition may include various structures, but eventually defines the entire message structure down to the bit level. The syntax specifies the ways in which bits of messages are encoded for exchanging information between two functional entities. The transfer semantics assigns meanings to the bits, bytes and structures of the transfer syntax. The exchanges of meanings allows the functional entities to share information and to act upon that information. Procedures define the behavior of the functional entities. Procedures define which functional entities are allowed to initiate a particular transaction. Procedures define the possible responses to a given stimulus especially when dependent upon prior exchanges. Add “CII Parameter Encoding Objectives”: The following are the objectives of the parameter encoding: Allow flexible usage of the LAESP to transport a variety of information. Provide a consistent and complete syntax for transferring information. Facilitate implementation of message encoding and decoding software by using standardized techniques. Allow as much syntactical checking as practical to be performed by the message parsers rather than deferring to the application. 124 CIU-59 14 32 T W Allow for parameter extension and modification throughout the life of the protocol. Has anyone actually compiled the ASN.1 to ensure that there are no errors?= Page 30 of 36 125 8c Nortel Resol ved by 2005. 08.15 .14 6.2 Abstract Syntax Modules CDMA2000-sip-MessageReporting::= SEQUENCE { caseId [0] CaseIdentity, iAPSystemId [1] IAPSystemIdentity timestamp [2] TimeStamp, correlationValues [3] CorrelationValues sipMsg [4] SIPMessage } OPTIONAL, OPTIONAL, -- Parameter Definitions SIPMessage ::= OCTET STRING CorrelationValues ::= CHOICE { cii-cc-Correlation [0] OCTET STRING, -- correlates CII-to-CC cii-cii-Corrrelation [1] OCTET STRING, -- correlates CII-to-CII both-CorrrelationValues [2] SEQUENCE { -- provides both CII-toCC and CII-to-CII correlation cii-CC [0] OCTET STRING, cii-CII [1] OCTET STRING } END -- of CDMA2000-SIP-CII-Module Page 31 of 36 126 9 Nortel Resol ved 2005. 08.15 .13r1 Comment #9: Hard Code the Module ID in the ASN.1 6.2 Abstract Syntax Modules CDMA2000-SIP-CII-Module {iso(1) member-body(2) us(840) tia(113737) laes(2) tr45(0) cdma2000(1) ciisip(2) version-1(0)} DEFINITIONS IMPLICIT TAGS ::= BEGIN IMPORTS CaseIdentity, IAPSystemIdentity, Timestamp FROM Laesp-j-std-025-b {iso(1) member-body(2) us(840) tia(113737) laes(2) tr45(0) j-std-025(0) j-std-025-b(2) version-1(0)} cdma2000-SIP-CII-Module-OID OBJECT IDENTIFIER ::= {iso(1) memberbody(2) us(840) tia(113737) laes(2) tr45(0) cdma2000(1) cii-sip(2) version1(0)} -- OID for CDMA2000-SIP-CII-Module CDMA2000-SIP-Protocol ::= SEQUENCE { protocolIdentifier OBJECT IDENTIFIER {cdma2000-SIP-CIIModule-OID}, mmdMessage CDMA2000mmdMessage } 127 CIU-57 14 52-56 E Resol ved 2005. 08.15 .14 Change the ASN.1 as follows. Simplifies construct and eliminates unused parts: mmdMessage CDMA2000mmdMessageCDMA2000-sip-MessageReporting CDMA2000mmdMessage::=CHOICE { SipMessage [0] CDMA2000-sip-MessageReporting, } Page 32 of 36 CIU-58 128 129 130 17 131 8 Lucent Motorola 30 Sprint Annex A 15 6 E 15 16 15 4 T Resol ved 2005. 08.15 .13r1 W W 16 20 T W CDMA2000-sip-MessageReporting ::=SEQUENCE { SIPMessage::= OCTET STRING. Limit should be specified. Annex A: Change from Normative to Informative as it does not add any requirements to the standard. This section defines a minimal list of SIP messages to be intercepted and reported for VoIP based on MMD and the mapping of SIP messages to surveillance messages defined in this Standard. Page 33 of 36 132 11 Nortel AM; resol ved by 2005. 08.15 .13r1 Comment #11: Correct the Reference in Annex A and Clean up the Text Annex A SIP CII Messages Mapping (Normative) This annex is normative and is considered part of this Standard. This annex provides the message and parameter mappings from SIP standard signaling to the surveillance messages reported to the LEA by the SP for a VoIP intercept. When information reporting is triggered by SIP signaling as described in 4.3.1.1, SIP messages are intercepted at a CII-IAP and presented to the DF. The DF sends the CII to the CF. The message mappings in this annex are described from the perspective of the ‘e’ interface (the interface between the DF and the CF). A.1 Message Mappings This section defines a non-exhaustive list of SIP messages to be intercepted and reported for VoIP based on MMD and the mapping of SIP messages to CII surveillance messages defined in this Standard. Table A-1: SIP Message Mapping SIP Request Messages INVITE ACK BYE CANCEL REGISTER REFER NOTIFY 133 134 9 Qualcomm CIU-1 Annex A 16 Genera l 11 E T A Resol ved 2005. 08.15 .13r1 SIP Response Messages 1xx, 2xx, 3xx, 4xx, 5xx, 6xx CII Surveillance Message CDMA2000-sipMessage-Reporting Description CII Surveillance Message Parameter sipMsg [3] SIPMessage The intercepted SIP message is stored in parameter sipMsg [3] of CII surveillance message CDMA2000sip-MessageReporting. There is no section 6.2.1.1. There is no solution provided to address the reporting of Dialed Digits. That is the Dialed Digit Extraction capability is not addressed by the VoIP LI solution in the document. This is a major shortfall.. Page 34 of 36 CIU-2 135 136 7 Nortel Genera l T Resol ved by com ment 54 resol ution A This document does not address the encryption/decryption and compressions/decompression. SPs have a responsibility if they provided encryption or compression to ensure decryption/decompression during delivery to Law Enforcement. This omission is a shortfall. See comment 54 resolution. Comment #7: Cdma2000 Trade Mark Question Both cdma2000® and CDMA2000® are registered trademarks. Cdma2000 is also used in the specification. Is Cdma2000® a registered trade mark? 137 10 Nortel AM; resol ved by confe rence repor ting FFS. 138 1 Ericsson W 139 2 Ericsson W 140 141 3 4 Ericsson Ericsson W W Comment #10: Further Study is Needed on How to Report Multi-Party Events and Subject Conference on Hold Add the following to the end of 4.3.1.1 cdma2000® SIP Message Reporting Event: Reporting of Multi-Party events when using network CMS services (e.g., adding and removing parties to a conference call) is for further study. Reporting of communication events and CC for subject conferences placed on hold using network based CMS services is for further study.. 1) It's technically unreasonable to do service level interception at CSCF on SIP signalings, meaning the CSCF has to single out SIP messages for the VoIP session. 2) It's technically unreasonable to do service level interception at PDSN on content of communications. This means the PDSN has to extract the packets pertaining to a VoIP conversation, from the data stream of an established packet data session. 3) J-STD-025-B will have to be reworked as the consequence of 2). 4) cdma2000 will be deviating from WCDMA thought they're both using the same IMS/MMD. Page 35 of 36 142 1 Nokia W (1) The document seeks to provide an intercept standard specifically for one service (VoIP) that is provided over an MMD network. It is Nokia's opinion that an intercept specification for MMD does not need to differentiate services in this manner - all services can be generically intercepted at the S-CSCF. Nokia's proposal would be therefore to replace "VoIP service based on MMD" with MMD throughout the document. Although we do recognize that, at present, the document does not require service (VoIP) specific intercept, it is our opinion that this is safeguarded only by the phrase in section 4.2.1 "Isolating and only reporting Voice over IP (VoIP) in the Multi-Media Domain (MMD) is not a part of this specification. " We consider that it would be comparatively easy to remove such a small caveat from the document at a later date. A consequence of this would be that service based intercept would then be implied by the specification. See SHS liaison for resolution (to be received). 143 2 Nokia W (2) For this particular specification, due to the ongoing issues with the set up of the CWG (a group within TIA distinct from the technical working groups whose charter would be to explicitly consider CALEA issues), at no stage has any consideration been made as to what in the document would be needed for CALEA compliance and what would be additional capabilities. Since CALEA gives industry the opportunity to take the first stab at what is believe to be within or outside of CALEA, this represents a serious omission. An example issue would be that of timing requirments, which is such a contentious subject that it was recently the subject of a industry JEM. The purpose of the JEM was to determine an industry wide position on the issue of CALEA timing requirements in packet networks. In view of this, Nokia propose that CALEA complaince is considered before accepting this specification as an American national standard. 144 1 Lucent W PN-3-0196 is not sufficient as is as a standalone document. More descriptive text is needed, particularly to describe the underlying infrastructure on which the MMD Services (VoIP) are supported. References are not clear enough. Text from J-STD-025B (e.g., for call content) should be included, or very specific references to sections of J-STD-025B. Page 36 of 36