VoIP and CLI. Trusted Identification. RIPE 46 VoIP and ENUM Tutorial 1. September 2003. Richard STASTNY



Similar documents
ENUM and VoIP. Numbering and Dialing Plans. RIPE 46 VoIP and ENUM Tutorial 1. September Richard STASTNY

Plain Old Telephone System

NICC ND 1016 V<2.1.1> ( )

ETSI TR V1.1.2 ( )

NUMBERING FOR VoIP SERVICES

ScopTEL TM IP PBX Software. Back to Back SIP Trunking Configuration

VoIP Gateway/IP-PBX Interworking with Skype

Connecting with Free IP Call

Preparatory Meeting for Phase 2 of Philippine National ENUM Trial

SIP Trunk Configuration Guide. using

SIP Trunk Configuration Guide. using

Solution Architecture

NGN Interconnection Standards & Protocols

Hosted IP PBX brings value back to voice

Configuring H.323 over Port Network Address Translation (PNAT) for Avaya IP Endpoints using the Avaya SG200 Security Gateway - Issue 1.

Written Testimony of John L. Barnes Director of Product Development Verizon Business. Hearing on VoIP: Who Has Jurisdiction to Tax It?

WAN Data Link Protocols

SIP Trunking Quick Reference Document

FortiVoice. Version 7.00 User Guide

SIP Session Initiation Protocol Part 2. Multiple Call Opportunities

Connecting with Vonage

Connecting with sipgate

Three Network Technologies

Configuring SIP Trunking and Networking for the NetVanta 7000 Series

VoIP & Internet Telephony

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

Session Border Controllers in Enterprise

VoIP Services. Maurice Duault 2001, Cisco Systems, Inc. All rights reserved.

Reduce Mobile Phone Expense with Avaya Unified Communications

PSTN Calling & Network Features

Xiaoling Zhen. Professor: Raimo Kantola Instructor: Jose M. Costa

Copyright and Trademark Statement

OpenScape Business. Tutorial Networking OpenScape Business OpenScape Voice Configuration Guide. Version: 1.0

Configuring Quadro IP PBXs with "SIP Connect"

MANUAL HOW AND TO WHOM SELL VOIP

Configuring Positron s V114 as a VoIP gateway for a 3cx system

Parlay i60 - Application

Avaya Solution & Interoperability Test Lab. Abstract

Wave SIP Trunk Configuration Guide FOR BROADVOX

Implementing Cisco Voice Communications and QoS

RT Series IP PBX Products Introduction. All in one telephone system

WebRTC IMS in Comparison to Proprietary Islands

ISDN (PRI) GSM Gateway

Direct IP Calls. Quick IP Call Mode

METHODS OF INTEGRATING mvoip IN ADDITION TO A VoIP ENVIRONMENT

ETSI TS V3.1.1 ( ) Technical Specification

Feature Interaction in Internet Telephony

3GPP TS V8.1.0 ( )

How To Implement A Cisco Vip From Scratch

How to Configure the Allworx 6x, 24x and 48x for use with Integra Telecom SIP Solutions

Operation Manual Voice Overview (Voice Volume) Table of Contents

NCAS National Caller ID Authentication System

Internet Telephony Terminology

GSM Gateway Function Overview

The Verizon - Vonage Decision

Ram Dantu. VOIP: Are We Secured?

ACCELERATOR 6.3 AASTRA MX-ONE INTEGRATION GUIDE

SIPPBX 6200GS, 6200S PRODUCT DATA. IP-PBX for Enterprise office PBX application. SIPPBX 6200GS, Up-to 400 employees. SIPPBX 6200S, Up-to 200 employees

SIP Proxy Server. Administrator Installation and Configuration Guide. V2.31b. 09SIPXM.SY2.31b.EN3

ERS Canada Service Guide. Version

AG Projects Denic ENUM day Number portability. Using ENUM and SIP. Adrian Georgescu AG Projects

EXPLOITING SIMILARITIES BETWEEN SIP AND RAS: THE ROLE OF THE RAS PROVIDER IN INTERNET TELEPHONY. Nick Marly, Dominique Chantrain, Jurgen Hofkens

mobile unified communications client and docking station

BROADSOFT PARTNER CONFIGURATION GUIDE VEGASTREAM VEGA 100

RMX 2000 Installation & Configuration Guide

Link Gate SIP. (Firmware version 1.20)

TETRA Security for Poland

3CX Guide sip.orbtalk.co.uk

Definitions for KRS , , , and As used in KRS , , , and : (1) "Ancillary services"

SIP Essentials Training

Special-Purpose Connections

Regulatory Framework for Communications Security and Privacy in Greece

How to Configure the NEC SV8100 for use with Integra Telecom SIP Solutions

IOCOM Whitepaper: Connecting to Third Party Organizations

XO SIP Service Customer Configuration Guide for Interactive Intelligence Customer Interaction Center (CIC) with XO SIP

Gateways and Their Roles

OpenScape Business V1

Telephone numbers for Relay Users (TRU) Brian Rosen NeuStar

ADVOSS SIP APPLICATION SERVERS

VOLUME 1, SECTION 9: TECHNICAL NARRATIVE TO AMPLIFY TECHNICAL NARRATIVE TABLES

Usage scenarios and trees B. Höneisen, Switch

Telecommunications systems (Part 1)

Taiwan SIP/ENUM Trial Project. Vincent W.S. Chen Executive Director, TWNIC

Configuring Instant Messaging and Presence capability for Avaya IP Agent using Avaya SIP Enablement Services - Issue 1.0

Cisco Virtual Office Unified Contact Center Architecture

TECH ARTICLE Date: 03/04/08

How To Make A Phone Line A Network Connection With An Ipnet (Ipnet) On An Ip Network On An Hp Network On A Pc Or Ipnet On A Microsoft Phone (Ip) On A Pbnet On An Pc Or P

Integration of GSM Module with PC Mother Board (GSM Trunking) WHITE/Technical PAPER. Author: Srinivasa Rao Bommana

NTP VoIP Platform: A SIP VoIP Platform and Its Services

Configuration guide for Switchvox and Cbeyond.

Voice over IP Basics for IT Technicians

MIT s Current SIP Infrastructure. Mark Silis MIT Information Services and Technology February 2, 2006

Technical Notes TN 1 - ETG FactoryCast Gateway TSX ETG 3021 / 3022 modules. How to Setup a GPRS Connection?

SIP Trunking Application Notes V1.3

Implementing Intercluster Lookup Service

Nokia Call Connect v1.1 for Cisco User s Guide. Part Number: N Rev 003 Issue 1

Network Overview. Background Traditional PSTN Equipment CHAPTER

Version: 0.102c. Date: 17 th December Information Supplement:

2 Voice over IP Network

VPN. Date: 4/15/2004 By: Heena Patel

Transcription:

VoIP and CLI Trusted Identification RIPE 46 VoIP and ENUM Tutorial 1. September 2003 Richard STASTNY ÖFEG/TELEKOM AUSTRIA, Postbox 147, 1103-Vienna enum:+43 664 420 4100 E-Mail: richard.stastny@oefeg.at richard@stastny.com

Today's Roadmap on Numbering 1. POTS from Comfort to Numbering Why are the numbers in the PSTN in the way they are? A History 2. ENUM and VoIP Numbering and Dialing Plans ENUM Mapping of E.164 Numbers to Internet Names and Addresses E.164 Numbers for VoIP and Routing on the PSTN Numbering and Dialing Plans for VoIP An Overview and a Proposal 3. VoIP and CLI Trusted Identification Calling Line Identification on VoIP A Proposal Richard Stastny 2

Calling Line Identification Numbers are also used for CLI the CLI serves different purposes: Call back information to the called user (as dial string) Identification of the user and his location to emergency services and for legal intercept Identification of the user for malicious call identification (MCI) Identification of the user for accounting purposes (e.g. carrier selection) In the PSTN the CLI is tagged with a Screening Indicator (SI) and a Presentation Indicator (PI) set by the user (CLIR) In the PSTN all networks are in a Circle of Trust so the information is transmitted via all Network-Network Interfaces (NNI) and is withheld on most User-Network-Interfaces (UNI) (except emergency services) if requested by the PI Richard Stastny 3

CLI in the PSTN In the PSTN the CLI is tagged with a screening indicator: network provided, user provided, verified and passed user provided, unscreened This information is set by the calling party and is neither screened by the PBX or by the switch, if transmitted via the User-Network-Interface. It is always replaced by the switch with the network provided number in the calling party identification. Only if there is the possibility of transmitting a second CLI as generic number, this information is transmitted IN ADDITION. The subscriber may request with a (mandatory) supplementary service (CLIR) (permanent or call-by-call) that the presentation of the network provided number is restricted with the PI presentation restricted presentation allowed Richard Stastny 4

Trust Circle PSTN networks are able to rely on this information because they trust each other To extend this trust to VoIP and the Internet, the following is necessary: Network-network-Interfaces between the PSTN and the Internet (SS7 Gateways), because on UNIs always the network provided number is inserted A Circle of Trusted VoIP service providers (SP) Secure signaling between the servers operated by the SP Proper identification of subscribers and authentication of users properly assigned E.164 numbers Secure signaling between users and servers See work on SIM card authentication, trusted Remote Party IDs and network asserted identities (NAI) Richard Stastny 5

Reliable CLI of E.164 Numbers on VoIP 1. E.164 Number provided by service provider Currently the normal case may be implemented immediately Identity of subscriber held by service provider 2. E.164 number provided by user requires E.164 certificates allows in connection with accounting certificates ad-hoc or call-by-call subscription may be implemented later in addition Identity of subscriber held by E.164 number issuer or credit card company Richard Stastny 6

E.164 Number provided by Service Provider The user MUST have a subscription with a VoIP SP with proper identification The E.164 number SHALL be either assigned by the VoIP SP or ported in by the subscriber (REQUIRES proper validation or certificate) The user MUST register by the VoIP SP in a secure manner The user is setting up a call via secure signaling and MUST be able to indicate the VoIP SP if the presentation of his identification (the E.164 number) to other users SHALL be restricted (CLIR) The VoIP SP SHALL send this identification only to trusted partners and only via secure signaling (e.g. TLS or VPN). The user MAY set up a different identification as user provided If the trusted partner is a gateway to the PSTN, the gateway SHALL set up the trusted identification as network provided and set the proper Presentation Indicator (this requires SS7 Signaling) The gateway MAY in addition set up the user provided identification as generic number, if available. A trusted partner MUST withhold the transmission of the identification to a UA or an untrusted service provoder (proxy) if presentation is restricted If a communication to an untrusted partner is established, only the user provided information SHALL be delivered if the presentation is restricted. In case of law enforcement, the identity of the user (subscriber) holding the E.164 number MUST be retrievable from the VoIP service provider Richard Stastny 7

E.164 Number provided by User The user MUST have a E.164 Number assigned by a certified entity and also MUST have a certificate showing the right to use this number The user MAY have a subscription with a VoIP SP, but MAY also subscribe ad-hoc The user MUST register by the VoIP SP in a secure manner providing his certificate. The user is setting up a call via secure signaling and MUST be able to indicate the VoIP SP if the presentation of his identification (the E.164 number) to other users SHALL be restricted (CLIR) The VoIP SP SHALL send this identification only to trusted partners and only via secure signaling (e.g. TLS or VPN). The user MAY set up a different identification as user provided If the trusted partner is a gateway to the PSTN, the gateway SHALL set up the identification as network provided and set the proper Presentation Indicator (this requires SS7 Signaling) The gateway MAY in addition set up the user provided identification as generic number, if available. A trusted partner MUST withhold the transmission of the identification to a UA if presentation is restricted If a communication to an untrusted partner is established, only the user provided information SHALL be delivered if the presentation is restricted. In case of law enforcement, the identity of the user (subscriber) holding the E.164 number MUST be retrievable from the entity assigning the E.164 Number Richard Stastny 8

Proposal It is proposed to set up a global field trial for exchanging trusted CLIs This requires: creation a Circle of Trust between (some) of the ITADs currently interworking already in VoIP and ENUM Note: this does not prevent communication with "untrusted" entities (on the contrary, you just have to stick with the rules) establishing a secure communication between the trusted entities some entities should provide SS7 based interworking with the PSTN/ISDN Trusted entities need to get access to genuine E.164 numbers Trusted entities need to identify their subscribers Richard Stastny 9

The End Thank you for your attention Richard Stastny 10