Internet DRAFT - draft-sriram-sipping-poc-lip

draft-sriram-sipping-poc-lip








SIPPING Working Group 
Document: draft-sriram-sipping-poc-lip-02.txt        <S.Sriram> 
Internet-Draft                                        Motorola 
Expires: February 17, 2006                         August 17, 2005


Lawful Intercept procedure via the Session Initiation Protocol (SIP) for 
the Open Mobile Alliance (OMA) Push to talk over Cellular (PoC)


 	       draft-sriram-sipping-poc-lip-02.txt


Status of this Memo

By submitting this Internet-Draft, each author represents that any 
applicable patent or other IPR claims of which he or she is aware have 
been or will be disclosed, and any of which he or she becomes aware will 
be disclosed, in accordance with Section 6 of BCP 79.

Internet-Drafts are working documents of the Internet Engineering Task 
Force (IETF), its areas, and its working groups.  Note that other groups 
may also distribute working documents as Internet-Drafts.

Internet-Drafts are draft documents valid for a maximum of six months 
and may be updated, replaced, or obsoleted by other documents at any 
time. It is inappropriate to use Internet-Drafts as reference material 
or to cite them other than as "work in progress."

The list of current Internet-Drafts can be accessed at 
http://www.ietf.org/ietf/1id-abstracts.txt.

The list of Internet-Draft Shadow Directories can be accessed at 
http://www.ietf.org/shadow.html.

This Internet-Draft will expire on February 17, 2006.


Copyright Notice

Copyright (C) The Internet Society (2005).


Abstract

   This document describes the Lawful Intercept Procedure using Session 
   Initiation Protocol (SIP) used by the Open Mobile Alliance (OMA), for 
   
S.Sriram                Expires - February, 2006                [Page 1] 

                     LIR: Lawful Intercept Request             May 2005 

   Push to talk over Cellular (PoC) along with their applicability, which 
   is limited to the OMA PoC application.
   
Table of Contents

   1          Overall Applicability ...............................    2 
   2          Conventions .........................................    2
   3          Overview ............................................    3
   4          Definitions .........................................    4   
   5          Lawful Interception Operation in PoC ................    4
   5.1        Procedure at the PoC User to perform Legal 
               Interception .......................................    4
   5.2        Procedures at the PoC Server performing the Lawful 
               Intercept function .................................    5
   5.2.1      PoC Control Plane Procedure .........................    5
   5.2.2      PoC User Plane Procedure ............................    6
   5.3        Procedure at the PoC User to stop Legal 
               Interception .......................................    7
   5.4        Procedure at the PoC Server to stop Legal 
               Interception .......................................    7
   6          Lawful Intercept Request Protocol Syntax ............    7
   6.1        Header Fields .......................................    8
   6.1.1      Mode-of-Tapping ......................................   8
   6.1.2      Direction ...........................................    9
   6.1.3      PoC-User-to-be-Tapped ...............................    9
   7          Illustrative Examples ...............................    9
   8          IANA considerations .................................   10
   8.1        The "application/lir" mime type .....................   10
   9          Formal Syntax .......................................   10
   10         Security Considerations .............................   11
   11         References ..........................................   12
   12         Copyright Statement .................................   13
   13         Disclaimer of Validity ..............................   13
   14         Acknowledgment ......................................   13
   15         Author's Address ....................................   13
1 Overall Applicability

   The SIP extensions specified in this document make certain assumptions 
   regarding network topology, and the availability of transitive trust. 
   These assumptions are generally NOT APPLICABLE in the Internet as a 
   whole.  The mechanisms specified here were designed to satisfy the 
   requirements specified by the Open Mobile Alliance for Push-to-talk 
   over cellular for which either no general-purpose solution was found, 
   where insufficient operational experience was available to understand 
   if a general solution is needed, or where a more general solution 
   is not yet mature. For more details about the assumptions made about 
   these extensions, consult the Applicability subsection for each 
   extension.

2 Conventions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 

S.Sriram                Expires - February, 2006                [Page 2] 
                     LIR: Lawful Intercept Request             May 2005 

   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 
   document are to be interpreted as described in BCP 14, RFC 2119 [2].

3 Overview

   The Open Mobile Alliance (OMA) (http://www.openmobilealliance.org) is 
   specifying the Push-to-talk Over Cellular (PoC) service where SIP is 
   the protocol used to establish half duplex media sessions across 
   different participants. Push to talk over Cellular (PoC) is intended 
   to provide rapid communications for business and consumer customers of 
   mobile networks. PoC will allow user voice and data communications 
   shared with a single recipient, (1-to-1) or between groups of 
   recipients as in a group chat session, (1-to-many).  This document 
   describes the procedure for Lawful Interception of the PoC via SIP 
   signaling.

   The PoC Server implements the application level network functionality 
   for the PoC service and shall provide centralized PoC Session 
   handling, media distribution and Talk Burst Control functionality. The 
   PoC Service uses a half duplex type of communication and only one PoC 
   User in a PoC Session can send media at the time. The PoC User does 
   not send a continuous stream of RTP Media packets instead the media is 
   sent in bursts, in this document referred to as a Talk Burst. A PoC 
   Server located between the PoC Users communicating with each other 
   acts as an arbitrator and controls the sending of Talk Burst using a 
   Talk Burst Control Protocol (TBCP). PoC Users are located on mobile 
   devices hence the quality of the transmission may vary depending on 
   access network and distance to the base station.

   All RTP Media packets, RTCP packets and TBCP messages (RTCP APP or 
   other negotiated TBCP) flow through the PoC Server performing the 
   Participating PoC function (if inserted in the transport path) and are 
   terminated in the PoC Server performing the Controlling PoC Function.

   The transport path between the PoC User and the PoC Server performing 
   the Controlling PoC Function is established on a per PoC Session 
   basis.
   
   When the PoC Session is established, the PoC Server performing the 
   Participating PoC Function normally includes itself into the transport 
   path to relay the RTP Media packets, RTCP packets and TBCP messages 
   between the PoC User and the PoC Server performing the Controlling PoC 
   Function and act as a translator according to [RFC3550].

   Considering a case where a PoC Server performing the Participating PoC 
   Function has inserted itself in the transport path. When the transport 
   path includes the Participating PoC Function, the PoC Server 
   (performing the Participating PoC Function) forwards RTP Media 
   packets, RTCP packets and TBCP messages between the PoC User and the 
   PoC Server (performing the Controlling PoC Function). This is done 
   when the PoC server is used to support lawful intercept procedures. 


S.Sriram                Expires - February, 2006                [Page 3] 
                     LIR: Lawful Intercept Request             May 2005 
   
   This document proposes the approach to perform the the Lawful 
   Intercept procedure via SIP signaling for OMA PoC. The PoC server 
   processes the Lawful Intercept request information generated in the 
   SIP request received from the PoC user and performs the Lawful 
   Intercept procedure.
   
4 Definitions

   The following OMA PoC related definitions are relevant to this 
   document
   
   PoC Address: A PoC Address identifies a PoC User. The PoC Address can 
   be used by one PoC User to request communication with other PoC Users.

   PoC User: A PoC User is a user of the PoC service.
   
   PoC Client: A PoC Client is a PoC functional entity that resides on 
   the PoC User Equipment that supports the PoC service.

   Talk Burst: A Talk Burst is the flow of media from a PoC User while 
   that has the permission to send media.
   
   The following definitions are relevant to this document
   
   FBI Agent:  The FBI Agent is a PoC Client/User who has special access 
   to tap any other PoC user supported by the PoC server.

   Mode-of-Tapping: The tapping shall be done in split or combined mode. 
   In Split mode, the FBI agent SHALL be able to listen to either SEND or 
   RECEIVE media stream of the PoC user who is tapped. The "Direction" in 
   this context specifies SEND stream or RECEIVE stream. In combined 
   mode, the FBI agent SHALL be able to listen to both the SEND and 
   RECEIVE media streams of the PoC user who is tapped.
   
5 Lawful Interception Operation in PoC

   The Lawful Interception request information contains a series of 
   information lines.  Each line contains some part of the operation 
   information and follows text based encoding rules and procedures that 
   could be carried in the SIP signaling message.


5.1 Procedure at the PoC User to perform Legal Interception:

   The FBI Agent, who has the special privileges to listen to any PoC 
   User, is himself a PoC User. The FBI Agent (PoC User) 

   1. SHALL Set the Request-URI of the SIP INVITE request to the 
      Conference-factory-URI for the PoC service in the Home PoC Network.
   
S.Sriram                Expires - February, 2006                [Page 4] 
                     LIR: Lawful Intercept Request             May 2005 
   2. SHALL add the Lawful Intercept Message body which carries the 
      information regarding 

       a. PoC User to be tapped. 
       
       b. The mode in which the tapping should be done.(Split or 
          Combined mode) 
          
       c. The direction in which the tapping should be done.(Only in 
          case of split mode.(send or receive))
          
           i. If "direction=send", the FBI agent (PoC User) requests for 
              tapping only the media streams sent out by the PoC User who
              is to be tapped. 
              
           ii.If "direction=receive", the FBI agent (PoC User) requests 
              for tapping only the media streams that is received the PoC 
              User who is to be tapped. 
              
   3. SHALL generate an initial SIP INVITE request according to the rules 
      and procedures of [RFC3261] and the general procedure as in section 
      6.1.3.1 with the media stream direction as "sendonly" in the 
      session description parameter

   FBI Agent (PoC User) SHALLL be challenged and authenticated by the 
   PoC Server for authorization credentials and the same shall be 
   sent by the FBI Agent (PoC User) in the second INVITE request 
   towards the PoC Server. 

   If the authentication was successful and if the PoC server was able
   to successfully extract the Lawful Intercept message and process it
   successfully, then the FBI Agent (PoC User) SHALL receive a 200 OK 
   from the PoC Server with the media description parameters of the 
   PoC Server. The FBI Agent (PoC User) SHALL send an ACK for 200 OK and 
   listen on the RTP port for media streams sent by the PoC server.
   
5.2 Procedures at the PoC Server performing the Lawful Intercept 
   function:
   
5.2.1 PoC Control Plane Procedure
   
   1. Upon receiving an initial SIP INVITE request the PoC Server SHALL
      check
        - if it is the Terminating PoC Service Point. 
	- if the SIP URI in the Request-URI of the SIP INVITE request 
          corresponds to the Conference-factory-URI of the PoC service in 
          the network served by the PoC Server.
       If both the checks are valid, then the PoC Server SHALL check if 
       the SIP message contains the Lawful Intercept Message body. 
       If this message body is present,the PoC server SHALL challenge the 
       authenticity of the FBI agent by sending a 407 SIP response 
       message with the realm, nonce, qop, opaque and algorithm to the 
       FBI Agent (PoC User).

S.Sriram                Expires - February, 2006               [Page 5] 
                     LIR: Lawful Intercept Request             May 2005 

   2. Upon receiving the second INVITE from the FBI Agent (PoC User), the 
      PoC server shall authenticate all the credentials to confirm that 
      the PoC user(FBI Agent) has all the privileges to use the Lawful 
      Intercept Message body. 

   3. If the credentials supplied by the FBI Agent (PoC User) are valid, 
      then the PoC server SHALL read the Lawful Intercept Message body 
      and get the details of 
        
       a. PoC User to be tapped. 
       
       b. The mode in which the tapping should be done.(Split or 
          Combined mode explained below) 
          
       c. The direction in which the tapping should be done.(Only in 
          case of split mode.(send or receive))
     
   4. The PoC server shall check if it is the terminating PoC Service 
      Point for the PoC User URI mentioned in the Lawful Intercept 
      Message body. If so, then the PoC Server SHALL send a 200 OK for 
      the INVITE with the SDP answer according to the rules and 
      procedures of [RFC 3264] and [RFC 3267].

   5. The PoC server SHALL interact with the PoC User Plane and 
      instruct the Controlling PoC Function to start the legal intercept
      procedure by providing the following information: 
      a. FBI Agent's (PoC User's) SDP profile 
      b. The PoC User identification to be tapped. 
      c. The mode of tapping to be followed.
   
5.2.2 PoC User Plane Procedure
   
   The Controlling PoC Function performing the Lawful Intercept function: 
   
   1. SHALL receive the identification of the PoC User to be tapped;(RTP 
      port and IP address).
   
   2. SHALL receive the identification of the FBI agent(s)(PoC User(s));
      (RTP port and IP address).
      
   3. SHALL receive the mode in which the tapping is to be done on the 
      PoC User;(Combined or Split mode).
   
   4. SHALL perform the tapping functionality via two modes of operation 
      as listed:

      a. In Combined mode, The Controlling PoC Function takes on 
         additional responsibility:
      
         - To transmit the RTCP SR and RTP packets sent by the PoC User 
           that is tapped to the FBI agent (PoC User).
         
S.Sriram                Expires - February, 2006               [Page 6] 
                     LIR: Lawful Intercept Request             May 2005 

         - To transmit the RTP SR and RTP packets sent by all other PoC 
           Users in the same group call to the FBI agent (PoC User).
        
       b. In Split mode, The Controlling PoC Function takes on additional 
         responsibility:

         - To transmit the RTCP SR and RTP packets sent by the PoC User 
           that is tapped to the FBI agent (PoC User) if the direction 
           requested for the tap creation is onl for 'send' media 
           streams. 
           
         - To transmit the RTP SR and RTP packets sent by all other PoC 
           Users in the same group call to the FBI agent (PoC User) if 
           the direction requested for the tap creation is only for 
           'receive' media streams. 

   
   Note: As the FBI Agent(s) (PoC User(s)) are invisible to all other PoC 
   users in the active group call, the controlling PoC function should 
   not inform the RTCP SR compound packet sent by the FBI Agent(s) (PoC 
   User(s)) to any of the PoC Users in the PoC Session.

   When the FBI agent (PoC User) wants to release the tap, the same SHALL 
   be informed via the Control Plane and the Controlling PoC Function 
   shall stop sending the multicast RTP packets to the FBI Agent(s) RTP 
   port and shall release the reserved resources.

   
5.3 Procedure at the PoC User to stop Legal Interception:
   
   This procedure is same as the one mentioned in the section 6.1.6 in 
   the PoC Control Plane document [Reference 3].
   
   
5.4 Procedure at the PoC Server to stop Legal Interception:
   
   This procedure is same as the one mentioned in the section 7.2.1.9.1 
   in the PoC Control Plane document [Reference 3].
   
   
6  Lawful Intercept Request Protocol Syntax 
       
   The media type follows the conventions of the SIP (RFC 3261 [1]) for 
   Lawful intercept request header information formatting. The Lawful 
   intercept request header information contains a series of information 
   headers with each of the information header lines terminated by a 
   CRLF. 

   Lawful-intercept request-info  =  *info-header 
   info-header = "header-name" HCOLON header-value *(COMMA header value) 
   CRLF

S.Sriram                Expires - February, 2006                [Page 7] 
                     LIR: Lawful Intercept Request             May 2005 


   The basic set of information header fields are defined in this 
   document. However the information elements can be extended adhering to 
   the generic framework of header format defined above.

   The header field formats strictly adhere to the conventions defined 
   for SIP in section 7.3.1 of RFC 3261.  Each header field consists of a 
   field name followed by a colon (":") and the field value. 

   field-name: field-value 
         
   The header names and the header values are case sensitive.
   
   
6.1 Header Fields 
       
   This section lists the full set of header fields along with notes on 
   syntax, meaning, and usage. The ABNF [8] definitions for the headers 
   follow the notations on the basis of section 25 of SIP(RFC 3261[1]).   

   The conditions for the presence of the header fields in the lawful 
   intercept request information are summarized in Table 1.  
   
   The following codes are used in the table. 

   c: Conditional; requirements on the header field depend on  other 
      fields in the information. 
   
   m: The header field is mandatory. 
          
   o: The header field is optional. 
       
   Header Field                    presence 
   ____________________________________________________ 
   
   Mode-of-Tapping                  m 
   Direction                        c 
   PoC-User-to-be-Tapped            m 

      Table 1: Presence of headers
   
   There is a specific requirement for the order in which the information 
   headers should be present in the charging information. It is required 
   that the Mode-of-Tapping header field be present as the first header 
   field. The other header fields following this first header field shall 
   be present in any order.
   
6.1.1 Mode-of-Tapping
   
   The Mode-of-Tapping header field defines the mode in which the tapping 
   shall be done. There are two modes of tapping defined in this 
   document: split mode, combined mode.

S.Sriram                Expires - February, 2006               [Page 8] 
                     LIR: Lawful Intercept Request             May 2005 

   This header field MUST be present one and only once per Lawful 
   intercept information. 
       
   Mode-of-Tapping = " Mode-of-Tapping" HCOLON Modes-of-Tapping 
   Modes-of-Tapping = "split" | "combined" 

   Example: Mode-of-Tapping: split
  
6.1.2 Direction

   The Direction header field defines the direction in which the split 
   mode of tapping is done. This header field shall be present only if 
   the 'Mode-of-Tapping' is 'split' mode. This field can take two 
   values: 
        - 'send' indicating the SEND stream of the PoC user to be tapped, 
        - 'receive'indicating the RECEIVE stream of the PoC user to be 
          tapped.

   This header field MUST be present one and only once per billing 
   information. 
       
   Direction = "Direction" HCOLON Directions 
   Directions = "send" | "receive" 
   
   Example: Direction: send
   
   
6.1.3 PoC-User-to-be-Tapped

   The PoC-User-to-be-Tapped field defines the SIP/TEL URI of the PoC 
   user who is to be tapped.
   This header field MUST be present one and only once per billing 
   information. 
       
   PoC-User-to-be-Tapped = "PoC-User-to-be-Tapped" HCOLON SIP-URI or TEL-
   URI
   SIP-URI = "sip:" [ userinfo ] hostport uri-parameters [ headers ]
   
   Example: PoC-User-to-be-Tapped: sip:sriram@motorola.com
 
   
7 Illustrative Examples

   The Lawful Intercept request information is sent in the INVITE method 
   by the FBI Agent who wants to tap a PoC User listed in his request 
   information.
   
   INVITE sip:FBI_Agent@conference-factoryURI.net SIP/2.0 
   P-Preferred-Identity: "FBI_Agent" <sip: FBI_Agent @networkA.net> 
   Accept-Contact:*;+g.poc.talkburst; require;explicit 

S.Sriram                Expires - February, 2006               [Page 9] 
                     LIR: Lawful Intercept Request             May 2005 

   User-Agent: PoC-User/OMA1.0 Acme-Talk5000/v1.01 
   Authorization: Digest username=" FBI_Agent-private@networkA.net", 
   realm="registrar.networkA.net", nonce="",
   uri="sip:registrar.networkA.net", response="" 
   Privacy: Id 
   Contact: <sip: FBI_Agent @conference-factoryURInet > 
   Supported: Timer 
   Session-Expires: 1800;refresher=uac 
   Allow: INVITE,ACK,CANCEL,BYE,REFER,MESSAGE,SUBSCRIBE, NOTIFY,PUBLISH
   Content-Type: multipart/mixed; boundary=unique-boundary-1
   Content-Length: 407

   --unique-boundary-1
   Content-Type: application/SDP
   
   v=0
   o=ezimmerer 2890844526 2890842807 IN IP4 126.16.64.4
   c=IN IP4 motds.mot.com 
   m=audio 3456 RTP/AVP 97 
   a=Rtpmap:97 AMR 
   a=rtcp:5560 
   m=application 2000 udp TBCP 
   a=recvonly 
   a=fmtp:TBCP queuing=1; tb_priority=2; timestamp=1
   
   --unique-boundary-1
   Content-Type: application/lir
   
   Mode-of-Tapping: split
   Direction: send
   PoC-User-to-be-Tapped: sip:sriram@motorola.com
   --unique-boundary-1--


8 IANA considerations 
    
8.1 The "application/lir" mime type 
       
   This draft registers the "application/lir" MIME media type. 
       
   The Lawful intercept request (lir) information is text-based. It 
   follows the recommendations of RFC 2045[10] for the usage of text-
   based data for MIME. 

   This media type is defined by the following information: 
  
   Media type name: application 
   Media subtype name: lir 
   Required Parameters: None 
   Encoding scheme: ASCII 
   Security considerations: See section 10 

S.Sriram                Expires - February, 2006               [Page 10] 
                     LIR: Lawful Intercept Request             May 2005 
9 Formal Syntax 
       
   The following syntax specification uses the augmented Backus-Naur Form 
   (BNF) as described in RFC-2234 [3]. 

   The grammar for this mime-type is mostly derived out of the SIP 
   specification (RFC 3261[1]).  The following definitions are derived 
   from the SIP specification (RFC 3261[1]) token DIGIT HCOLON 
   quoted-string 

   Lawful-Intercept-Request-Info = *(Information-Header) 
       
   Information-Header  =   (Advice-State  /  Mode-of-Tapping / 
                           Direction /  PoC-User-to-be-Tapped)

   Mode-of-Tapping =  " Mode-of-Tapping" HCOLON Modes-of-Tapping Modes-
   of- Tapping = "split" | "combined" 
   
   Direction = "Direction" HCOLON Directions Directions = "send" | 
    "receive" 
    
   PoC-User-to-be-Tapped = "PoC-User-to-be-Tapped" HCOLON SIP-URI or TEL-
   URI SIP-URI = "sip:" [ userinfo ] hostport  
                        uri-parameters [ headers ]

10 Security Considerations 
       
   The Lawful Intercept request message body contains sensitive 
   information that requires the use of encryption. Lawful Intercept 
   request information should not be trusted until it is ensured that it 
   is received through reliable sources.

   As a reference, security mechanisms provided in SIP [1] (section 
   26.1.3) can be used as this is appropriate for both the SIP message 
   and the encapsulated Lawful intercept request information. Encryption 
   of the Lawful intercept request information is also considered a good 
   solution. Some form of cryptographic hashing on the Lawful intercept 
   request information may be used to ensure there is no tampering of the 
   message en-route.  MD5 (RFC 1321[14]) is a good choice.

   However, OMA PoC standards does not mandate any security mechanisms, a 
   cryptographic hash of the Lawful intercept request information along 

S.Sriram                Expires - February, 2006              [Page 11] 
                     LIR: Lawful Intercept Request             May 2005 

   with a shared key SHOULD be carried as a part of the Lawful intercept 
   request information. PoC Server SHALL authenticate the FBI Agent (PoC 
   User) credentials and SHALL process the Lawful Intercept Message body
   only after confirming that the PoC User has the rights to intercept 
   the call of another PoC User.

11 References  
   
   1  Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., 
      Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP: 
      Session Initiation Protocol", RFC 3261, June 2002.

   2  Bradner, S., "Key words for use in RFCs to Indicate Requirement 
      Levels", BCP 14, RFC 2119, March 1997 
   
   3  OMA PoC Control Plane
      Candidate Version 1.0 û 17 March 2005, Open Mobile Alliance
      OMA-TS-POC-ControlPlane-V1_0-20050317-C
   
   4  PoC User Plane Version
      Candidate Version 1.0 û 17 March 2005, Open Mobile Alliance
      OMA-TS_PoC-UserPlane-V1_0-20050317-C
   
   5  Push to talk over Cellular (PoC) - Architecture
      Candidate Version 1.0 û 17 March 2005, Open Mobile Alliance
      OMA-AD_PoC-V1_0-20050317-C
      
   6  J. Galvin, Security Multiparts for MIME:
      Multipart/Signed and Multipart/Encrypted, RFC:1847, October 1995
      
   7  B. Ramsdell, Editor,
      S/MIME Version 3 Message Specification, RFC:2633, June 1999
   
   8  Crocker, D. and Overell, P.(Editors), "Augmented BNF for Syntax 
      Specifications: ABNF", RFC 2234, Internet Mail Consortium and 
      Demon Internet Ltd., November 1997 

   9  Freed, N., Klensin, J. and J. Postel, "Multipart Internet Mail 
      Extensions (MIME) Part Four: Registration Procedures", BCP 13, 
      RFC 2048, November 1996. 

   10 Freed, N. and N. Borenstein, "Multipart Internet Mail 
      Extensions(MIME) Part One: Format of Internet Message Bodies", 
      RFC 2045, November 1996. 

   11 Freed, N. and N. Borenstein, "Multipart Internet Mail Extensions 
      (MIME) Part Two: Media Types", RFC 2046, November 1996.
   
   12 Troost, R., Dorner, S. and K. Moore, "Communicating Presentation 
      Information in Internet Messages: The Content-Disposition Header 
      Field", RFC 2183, August 1997.
   
   
S.Sriram                Expires - February, 2006              [Page 12] 
                     LIR: Lawful Intercept Request             May 2005 
                     
   13 W. Marshall, Ed., F. Andreasen, Ed Private Session Initiation 
      Protocol (SIP) Proxy-to-Proxy Extensions for Supporting the 
      PacketCable Distributed Call Signaling Architecture, RFC 3603,
      October 2003
      
   14 IAB, IETF Policy on Wiretapping, RFC 2804,May 2000

12 Copyright Statement

   This document is subject to the rights, licenses and restrictions 
   contained in BCP 78, and except as set forth therein, the authors 
   retain all their rights.

13 Disclaimer of Validity
   
   This document and the information contained herein are provided on an 
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
   

14 Acknowledgment
       
   I would like to thank my Manager Mr S Hariprasad for constant support 
   and encouragement for proposing a draft on Lawful intercept procedure 
   in OMA PoC via SIP signaling.
   

15 Author's Addresses 
    
   S.Sriram 
   4-D9-170, Motorola 
   No.66/1, Plot No. 5, Bagmane Techpark
   CV Raman Nagar Post
   Bangalore - 560 093
   DID phone: 91-80-26014170
   Mobile: 91-9886704956
   Fax: 91-80-25343100
   Email: sriram.s@motorola.com 



















S.Sriram                Expires - February, 2006               [Page 13]