Internet DRAFT - draft-elwell-sip-tispan-connected-identity
draft-elwell-sip-tispan-connected-identity
SIP WG J. Elwell
Internet-Draft Siemens plc
Expires: December 28, 2006 K. Drage
Lucent Technologies
R. Jesske
Deutsche Telekom
June 26, 2006
Analysis of TISPAN requirements for Connected Identity in the Session
Initiation Protocol (SIP)
draft-elwell-sip-tispan-connected-identity-01.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 28, 2006.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
ETSI TISPAN has presented Next Generation Network (NGN) requirements
for the delivery of two identities for the caller and two identities
for the callee in a SIP INVITE-initiated dialog. Although the
solution for this in SIP is relatively straightforward for caller
Elwell, et al. Expires December 28, 2006 [Page 1]
Internet-Draft TISPAN Connected ID June 2006
identity, the delivery of callee identity presents some additional
problems. This document discusses the issues and suggests some
candidate solutions.
This work is being discussed on the sip@ietf.org mailing list.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Overview of the two identities . . . . . . . . . . . . . . . . 3
3. Transporting the two caller identities . . . . . . . . . . . . 4
4. Transporting two callee identities . . . . . . . . . . . . . . 5
5. Discussion . . . . . . . . . . . . . . . . . . . . . . . . . . 5
5.1. Authentication of connected identity . . . . . . . . . . . 6
5.2. Use of an additional signalling round trip . . . . . . . . 6
5.3. Compatibility with RFC 3261 . . . . . . . . . . . . . . . 8
6. Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
7. Normative References . . . . . . . . . . . . . . . . . . . . . 8
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 10
Intellectual Property and Copyright Statements . . . . . . . . . . 11
Elwell, et al. Expires December 28, 2006 [Page 2]
Internet-Draft TISPAN Connected ID June 2006
1. Introduction
ETSI TISPAN has presented Next Generation Network (NGN) requirements
[4] for the delivery of two identities for the caller and two
identities for the callee in a SIP [1] INVITE-initiated dialog.
Although the solution for this in SIP is relatively straightforward
for caller identity, the delivery of callee identity presents some
additional problems. This document discusses the issues and suggests
some candidate solutions.
2. Overview of the two identities
The first type of identity (ID1) is used by the NGN for billing and
authorization purposes (e.g. for the provision of services by the
NGN) and therefore must be authenticated by the NGN or a trusted
partner. It typically identifies the NGN's customer. The second
type of identity (ID2) can be used by the peer user for purposes such
as call logging or making return or repeat calls. This too may
identify the NGN's customer, or alternatively it may identify a
particular user within the customer's domain.
A typical case where ID1 and ID2 can differ is where the caller (or
callee) is in an enterprise network. ID1 might identify the
enterprise, which would be billed for any charges incurred. Although
it might be possible to use ID1 for making a return or repeat call,
it would lead to a default user, e.g., an attendant. ID2 might
identity the particular calling or called user within the enterprise.
Neither identity necessarily represents an address back to the
terminal or other user equipment making the call, i.e. they are not a
GRUU.
Neither identity has a rigorously defined usage, and both identities
are expected to be presented to the other user. As such both
identities are expected to be subject to privacy requirements as
detailed in RFC 3323.
There are existing solutions to this problem in the ISDN/PSTN and any
SIP solution needs to interwork with these ISDN/PSTN mechanisms, both
in the enterprise network and in the public network.
An example application of the use of two identities is if a user
calls a special hotline for e.g., computer services on +496151830.
This is the main number of a PBX with several extensions. The user
will eventually be connected to a service expert, say on extension
no: +496151835940. So now there is an ID1 (+496151830) that
identifies the PBX, is trusted by the public network and to which all
Elwell, et al. Expires December 28, 2006 [Page 3]
Internet-Draft TISPAN Connected ID June 2006
billing is bound. In addition there is an ID2 identifying the
expert, which is useful information for the caller.
3. Transporting the two caller identities
TISPAN has chosen the P-Asserted-Identity header [5] for ID1. This
follows the equivalent decision made by 3GPP. The NGN identifies and
authenticates the customer by some means and then uses that identity
in the P-Asserted-Identity header to identify the customer to
downstream entities in its own network, to other downstream networks
and to the downstream user.
The From header field URI is used for ID2 and is placed there by the
UAC. This is, of course, open to forgery, but it can be
authenticated by means of the Identity header [2] added by an
authentication service within the caller's domain. If this is added
by an enterprise network, the From header field URI and the Identity
header can then be delivered to the NGN for delivery unchanged to the
UAS. Figure 1 shows an example of this. Use of the From header for
this purpose would preclude both TISPAN and 3GPP using the Identity
header mechanism for ID1.
UAC Enterprise NGN proxy UAS
proxy
1 INVITE request 2 INVITE request 3 INVITE request
From: ID2 From: ID2 From: ID2
Identity: Identity
P-AI: ID1
--------------> -------------> ------------->
Figure 1
In 1 the UAC issues the INVITE request with a From header field URI,
which will be ID2.
In 2 the enterprise proxy adds an Identity header to authenticate the
From header field URI (the proxy having authenticated the UAC by some
means, e.g., HTTP digest authentication), i.e., to authenticate ID2.
In 3 the NGN proxy adds the P-Asserted-Identity header field URI
(ID1) based on authentication of the enterprise network by some means
(e.g., TLS).
Note: 1 could also include a P-Preferred-Identity, but this adds
little value in this particular scenario, as the full set of valid
P-Asserted-Numbers may well not be known at the UAC in the
enterprise network.
Elwell, et al. Expires December 28, 2006 [Page 4]
Internet-Draft TISPAN Connected ID June 2006
4. Transporting two callee identities
The same principle can apply to callee (connected) identities.
TISPAN. However, whereas TISPAN plans to use the P-Asserted-Identity
header in the 2xx response to the INVITE request for ID1, the
transport of ID2 is less clear. Three options have been suggested.
Option 1: Use [3], i.e., send a subsequent request such as UPDATE in
the reverse direction containing the ID2 in the From header field URI
and the Identity header to provide authentication.
Option 2: Use the To header field URI in the 2xx response to provide
unauthenticated ID2.
Option 3: Use a new header field in the 2xx response to provide
unauthenticated ID2.
Option 4: Longer term it is possible that SAML could also be used to
carry the appropriate assertions about the identities. This work
however is still under consideration in the SIP WG and it is too
early to assess its applicability
Option 5: Use of a header parameter within an existing identity, for
example in the Contact header. However it is assumed that any such
header parameter must be covered by the scope of the header itself,
and ID2 is an address of record, whereas the Contact header describes
the current URI of the UA. This option is therefore not considered
further.
5. Discussion
All the proposals above assume that distinct mechanisms are used to
transport the multiple identities, and any other identities that are
transported directly as headers between the UAC and UAS. No solution
has the ability to repeat the header field in order to indicate a
different identity with different semantics for generation or
assertion. Therefore due consideration has to given to the impact of
using a mechanism for one purpose, when other entities on the path
wish to use that mechanism for other purposes.
There are two key differences between option 1 and the other options:
option 1 provides authentication of the identity, and option 1
requires an extra round trip of signalling. Between option 2 and
option 3, the issue is compatibility with RFC 3261. These issues are
discussed in more detail below.
Forking has been mentioned as an issue to be considered for the
Elwell, et al. Expires December 28, 2006 [Page 5]
Internet-Draft TISPAN Connected ID June 2006
delivery of ID2. However, if ID2 is provided only within or after
the 2xx final response, no complications with regard to forking are
expected.
5.1. Authentication of connected identity
There is no requirement from TISPAN to provide an authenticated ID2,
because the service provided by TISPAN is based on the so-called
special arrangement from PSTN. This is an arrangement between a
customer and an operator/service provider whereby a customer-supplied
ID2 is not screened by the operator's/service provider's network.
Although not laid down as a requirement by TISPAN, authentication of
callee ID2 could be of significant value, both to users within the
same enterprise network and to users who otherwise have some form of
relationship with the enterprise network. Firstly it prevents
falsification beyond the bounds of what the NGN is able to guarantee
and therefore provides the recipient with greater confidence.
Nevertheless ID1 as an authenticated identity gives enough
information to reach the responsible NGN customer (e.g., switchboard)
and might be considered sufficient.
Secondly, authentication of ID2 may be of use in conjunction with
certain key management methods for media encryption. For example, by
using the Identity header in both directions, this could provide
cryptographic authentication of the source of Diffie-Hellman
components used for key agreement or the source of a self-signed
certificate used as the basis for encrypted key exchange.
Some members of the community are of the opinion that an
unauthenticated identity in a response is of little or no value.
Other members of the community, including TISPAN, do not see this
value in an unauthenticated callee ID2.
The benefit of option 1 over options 2 and 3 therefore depends on
one's view of the need for authentication.
5.2. Use of an additional signalling round trip
The main issue here is interworking with PSTN. PSTN signalling
protocols provide callee ID2 in the same message that indicates
answer. This has impact on calls in the direction PSTN to SIP. The
PSTN gateway would need to wait for the UPDATE request, as shown in
figure 2.
Elwell, et al. Expires December 28, 2006 [Page 6]
Internet-Draft TISPAN Connected ID June 2006
UAC Enterprise NGN proxy UAS
proxy
PSTN Gateway NGN proxy Enterprise
1 Call Request 2 INVITE request 3 INVITE request
--------------> -------------> ------------->
5 2xx 4 2xx
<------------- <-------------
6 ACK 7 ACK
-------------> ------------->
10 Call answer 9 UPDATE request 8 UPDATE request
<-------------- <------------- <-------------
11 2xx 12 2xx
-------------> ------------->
Figure 2
It can be seen that the gateway must wait for the UPDATE request (9),
which will contain callee ID2 in the From header field with
authentication by means of the Identity header field, before
generating the PSTN call answer message (10). This is not a severe
problem, unless the UPDATE request fails to arrive, which would
happen if the UAS does not support [3]. This could be avoided by
defining an option tag indicating support of connected identity and
using this tag in the Supported header of the 2xx response to the
INVITE request (4)(5) to indicate that an UPDATE request will follow.
But nevertheless the call procedure at the PSTN/ISDN gateway will be
delayed and could cause problems on answering the call in a given
timeframe.
If a reliable provision response had been sent to the INVITE request,
then the UPDATE request can be sent before the 2xx response. This
obviously does not provide a solution where the 2xx response is sent
immediately by the destination user.
Further, any solution must also deal with the case where the PSTN
gateway does not support this extension. There is no point in the
enterprise network sending the subsequent request if the PSTN gateway
has no way of handling the Identity header that is included. The
INVITE request that initiated the dialog will contain an indication
that the gateway supports the UPDATE method, but this will not
indicate what applications this can be used for. Consideration
should also therefore be given to an option-tag in the INVITE request
indicating that the gateway is capable of waiting for the UPDATE
request and the contained Identity header, and then processing that
for use in the ISDN/PSTN
Seen from the UA perspective, additional procedures must be
implemented. This might mean implementing the UPDATE method, if not
Elwell, et al. Expires December 28, 2006 [Page 7]
Internet-Draft TISPAN Connected ID June 2006
supported for other reasons. However, there are several other
reasons for implementing the UPDATE method (e.g., session timer,
early session, ICE), so this might not be significant in practice.
Options 2 and 3 are less complex compared with option 1 (using an
additional roundtrip) and option 4 (using SAML). Option 3 adds a
further identity header to SIP.
5.3. Compatibility with RFC 3261
Different opinions have been expressed as to whether option 2
violates RFC 3261, which does not clearly say whether the To header
field URI may change in a response (compared with the request). It
is not clear what harm would be done by changing the To header field
URI, and whether such harm would be to fully compliant SIP
implementations or only to non-compliant SIP implementations. An
option tag could be used to ensure support at the UAC, but there is
no way to ensure that proxies would not be harmed. Unlike the change
of the From header field URI mid-dialog, as specified in [3], the
change of To header field URI in a response is not mentioned in RFC
3261.
6. Summary
If authentication is considered important, option 1 should be
adopted. This probably needs the additional option tag proposed
above to improve PSTN interworking.
Otherwise options 2 and 3 are technically less complex.
A further alternative would be a hybrid solution, e.g., both option 1
and either option 2 or option 3. Option 2 or 3 would be used when
option 1 is not available. It could also be used prior to option 1
to avoid the delay in sending the answer signal to the PSTN.
However, this would give potential for the authenticated callee ID2
in the UPDATE request to differ from that in the 2xx response to the
INVITE request.
7. Normative References
[1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
Session Initiation Protocol", RFC 3261, June 2002.
[2] Peterson, J. and C. Jennings, "Enhancements for Authenticated
Identity Management in the Session Initiation Protocol (SIP)",
draft-ietf-sip-identity-06 (work in progress), October 2005.
Elwell, et al. Expires December 28, 2006 [Page 8]
Internet-Draft TISPAN Connected ID June 2006
[3] Elwell, J., "Connected Identity in the Session Initiation
Protocol (SIP)", draft-ietf-sip-connected-identity-00 (work in
progress), April 2006.
[4] Jesske, R., Alexeitsev, D., and M. Garcia-Martin, "Input
Requirements for the Session Initiation Protocol (SIP) in
support for the European Telecommunications Standards
Institute", draft-jesske-sipping-tispan-requirements-o2 (work in
progress), October 2005.
[5] Jennings, C., Peterson, J., and M. Watson, "Private Extensions
to the Session Initiation Protocol (SIP) for Asserted Identity
within Trusted Networks", RFC 3325, October 2005.
Elwell, et al. Expires December 28, 2006 [Page 9]
Internet-Draft TISPAN Connected ID June 2006
Authors' Addresses
John Elwell
Siemens plc
Technology Drive
Beeston, Nottingham NG9 1LA
UK
Phone: +44 115 943 4989
Email: john.elwell@siemens.com
Keith Drage
Lucent Technologies
Optimus, Windmill Hill Business Park
Swindon, Wilts
UK
Phone: +44 1793 776249
Email: drage@lucent.com
Roland Jesske
Deutsche Telekom
Deutsche-Telekom-Allee 1
Darmstadt,
Germany
Phone: +49 6151 835940
Email: r.jesske@t-com.net
Elwell, et al. Expires December 28, 2006 [Page 10]
Internet-Draft TISPAN Connected ID June 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Elwell, et al. Expires December 28, 2006 [Page 11]