STIR and SHAKEN Framework Overview. IIT Real-Time Conference 2016 Chris Wendt

Size: px
Start display at page:

Download "STIR and SHAKEN Framework Overview. IIT Real-Time Conference 2016 Chris Wendt"

Transcription

1 STIR and SHAKEN Framework Overview IIT Real-Time Conference 2016 Chris Wendt 1

2 Introduction - Telephone Network The telephone network is a complex set of interconnecting devices and network devices This has been a positive part of the evolution of how we communicate and use the telephone network But the negative impact is that bad actors have been able to take advantage of that proliferation 2

3 Introduction - VoIP Network The TDM/SS7 equipment in the network is 10 s of years old, the software for these systems hasn t been touched in years. Cable world has mostly moved to SIP/VoIP Mobile world is moving quickly to VoLTE or end to end SIP There has been a consistent message to industry to sunset the PSTN network and move to all-ip For call spoofing problem, the only practical place we can solve this problem is in SIP network 3

4 User Experience Google and Apple are starting to put in the hooks for supporting call spam warnings Caller ID on TV would be an obvious place to help alert users to potential spam Positive verification would also be a beneficial service to offer customers including enhanced verified Caller information 4

5 Authentication Standards Activities Three industry standards body activities related to VoIP calls: IETF STIR - defining core protocols and technologies for SIP and certificate usage for applying digital signatures to validate the telephone identity of the calling party ATIS SHAKEN - defining the industry framework for using STIR technologies and how service providers will interwork on VoIP based calls 3GPP - definition of a verstat parameter to carry a verification status from the verification service to a 3GPP managed UE These standards are forward looking in the sense that SS7/TDM traffic should be rapidly converting as wireless carriers move to VoLTE calling 5

6 IETF - Standards Overview IETF - protocol related standards Base digital signature specification - PASSporT (Persona Assertion Token) draft-ietf-stir-passport SIP usage of PASSporT draft-ietf-stir-rfc4474bis Certificate usage definition draft-ietf-stir-certificates SIP Call-Info Parameters for Labeling and Classifying Calls draft-schulzrinne-dispatch-callinfo-spam-00 A SIP Response Code for Unwanted Calls - defines 666 as unwanted call draft-schulzrinne-dispatch-status-unwanted 6

7 ATIS/3GPP - Standards Overview ATIS/SIPForum NNI Task Force SHAKEN (Signature-based Handling of Asserted information using tokens) defines the network architecture and NNI dependencies around the usage of the PASSporT and 4474bis based framework SHAKEN framework - defines a service provider profile for the deployment of: STIR Authentication Service STIR Verification Service SHAKEN Certificate framework 3GPP Certificate Management/Administration TS signaling verification status, WID & CR in progress TS for NNI & X for Verification/Authentication Service Functions tel URI parameter in the P-Asserted-Identity or FROM header field in a SIP requests Example: P-Asserted-Identity: tel: ;verstat=tn-validation-passed 7

8 PASSporT Overview PASSporT uses the JSON Web Token (JWT) and JSON Web Signature (JWS) formats and defines a standard set of base claims and signature secure cryptographic validation of the owner of the claims made Claims are a JSON object of key value pairs Passport defines a minimum set of claims/key value pairs to assert the identity of the call originator with some additional key pairs for protection against replay and man-in-the-middle attacks It is also extensible to cover other scenarios, like CNAM or GETS/ WPS, assertion and/or authorization 8

9 PASSporT Signature The PASSporT Signature is a standard JWS X.509 based digital signature of the header and claims. There is text specifying the specific canonicalization of the header and claims JSON, including removing white space etc. JWT form of the token is <header>.<claims>.<signature> Example from draft-ietf-stir-passport: eyj0exaioijwyxnzcg9ydcisimfszyi6ikvtmju2iiwiedv1ijoiahr0chm6ly9j ZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9. eyjpyxqioiixndqzmja4mzq1iiwib3ruijoimtixntu1nteymtiilcjkdxjpijoi c2lwomfsawnlqgv4yw1wbguuy29tin0. SQ3r3U9kew2e4Ej-tS4vbWQgs9kSQzHgzqK_xP4TL70al7XwWwF4R2mP9sxQey9n pzqoytnx_wzsljjpic_f_a 9

10 RFC4474bis Overview RFC4474bis defines how PASSporT is used in a SIP message RFC4474 is deprecated but was the first attempt at signing the entire SIP message, however as we know SBCs like to change SIP headers, so it wasn t a practical approach. RFC4474bis defines three main components The syntax of the newly defined identity header and a few required parameters. This includes the PASSporT signature. Authentication Service - the logical component that creates the PASSporT token signature and puts it in a newly defined identity header Verification Service - the logical component that validates the PASSport token signature 10

11 Map between SIP message and PASSporT claims SIP INVITE INVITE SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hg4bk776asdhds Max-Forwards: 70 To: Bob user=phone> From: Alice user=phone>;tag= Call-ID: CSeq: INVITE Date: Sat, 13 Nov :29:00 GMT Identity: sv5cto05kqpsmtht3dceio/1cwts ZtnG3iV+1nmurLXV/HmtyNS7Ltrg9dlxkWzoeU 7d7OV8HweTTDobV3itTmgPwCFjaEmMyEI 3d7SyN21yNDo2ER/Ovgtw0Lu5csIppPqOg1uX ndzhbg7mr6rl9bnuhhufvrbp51mn3w0gfus; info=< biloxi.cer>;alg=es256 Contact: Content-Type: application/sdp Content-Length: 142 Header { alg :"ES256", "typ":"passport", x5u :" biloxi.cer" } Claim { "iat": , "dtn":" ", "otn":" "} 11

12 SHAKEN Framework Overview SHAKEN is an industry framework document that specifies the deployment and interworking points for building a interoperable set of services for STIR It provides specifications for both SIP and certificate management deployment for the current VoIP based telephone network and NNI. The intent is to evolve the SHAKEN framework over time as participation, functionality, and policy evolves around STIR deployment for VoIP calls over service provider networks. 12

13 SHAKEN Reference Architecture Certificate provisioning portal HTTPS TN-CR HTTPS STI-AS HTTPS STI-VS SKS SIP SIP SIP CSCF SIP SIP CSCF SIP SIP SIP UA RTP IBCF/TrGW RTP IBCF/TrGW SIP UA Service Provider A Originating/Authorization Service Provider B Terminating/Verification Shown in the context of 3GPP IMS components, but not limited to that Defines the logical components needed and a high level call flow 13

14 SHAKEN PASSporT extension- Attestation and Originating Identifier Attestation (attest): The service provider will classify the origination of the call into three categories: Full Attestation: The signing provider: is responsible for the origination of the call onto the IP based service provider voice network has a direct authenticated relationship with the customer and can identify the customer has established a verified association with the telephone number used for the call. Partial Attestation: The signing provider: is responsible for the origination of the call onto its IP based voice network has a direct authenticated relationship with the customer and can identify the customer has NOT established a verified association with the telephone number being used for the call Gateway Attestation: The signing provider: is the entry point of the call onto its IP based voice network has no relationship with the initiator of the call (e.g., international gateways). Originating Identifier (origid): This is a unique and opaque UUID (RFC4122) that will be used for two reasons traceback identification of originator, either service provider, wholesale customer, enterprise can be used by verification and call spam classification/analytics as an opaque identity to associate reputation scores and identify bad actors to authorities for potential follow up 14

15 Example SHAKEN PASSporT extension Protected Header { alg : ES256, ppt : shaken, typ : passport", "x5u":" } Payload { attest : A dest :{ tn : "} iat : , orig :{ tn :" "}, origid : 123e4567-e89b-12d3-a } 15

16 SHAKEN - Telephone Authority Model Private Key SKS TAMS CSR ACME SP-KMS Public Key TN-CR HTTPS Public Interface Telephone Authority is a new model that corresponds to the Certificate Authority for web/https Uses similar X.509 mechanisms for certificate creation and validation Associated with an authority for assertion of the ownership of either telephone numbers or the authorization to perform telephone call routing Evolve to support for TN or block TN level certificates 16

17 SHAKEN - Certificate Management Start with a straight forward X.509 based CSR key signing mechanism, similar to web certificate authorities today, but likely more manual process for initial deployment Move to automated process, adopt ACME based automatic certificate management protocols going forward. Forward looking, and likely policy/industry related issues more than technical Service provider authorization and verification process, likely number management and other policy decisions will impact this process. Definition of how authorities can revoke bad actors if necessary using OCSP and other more advanced certificate management techniques. 17

18 Telephone Authority Administration/Security Governance Authority - this entity would manage, likely tied with identification and potential prosecution of bad actors, the authority for service providers to originate signed calls to the telephone network TA Administrator - this entity would do the manual process of working with service providers to validate they are who they say they are and manage credentials of Telephone Authorities to have a secret key and the Service Providers to do CSR transactions with the Telephone Authorities. They should also have a periodic re-validation and new key issuance, as part of good practice to protect the Telephone Authority services. Note: Governance and Administration are two logical functions but could be supported by a common low administrative overhead organization. Telephone Authorities - Can process automated CSR requests via ACME protocol from Service Providers creating new certificates Service provider - Own and manage a SP certificate key, that they must have signed by TA. 18

19 SHAKEN - Status and Next Steps STIR documents just finished WGLC in IETF SHAKEN SIP profile document in Letter Ballot and Approval process in ATIS and SIP Forum SHAKEN Certificate Management Framework document targeted completion for end of year FCC Robocalling Strike Force will issue report on Interoperability tests at SIPit and ATIS Testbed Focus Group 19

20 Vesper - open source STIR/SHAKEN implementation 20

SHAKEN STI- AS and STI- VS Overview with API ATIS ATIS IPNNI R004 IPNNI R000

SHAKEN STI- AS and STI- VS Overview with API ATIS ATIS IPNNI R004 IPNNI R000 SHAKEN STI- AS and STI- VS Overview with API ATIS- 1000074 ATIS- 1000080 IPNNI- 2017-00021R004 IPNNI- 2017-00089R000 1 Overview Architecture API for AuthenDcator and Verifier SSVS Detailed call flows

More information

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar

Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA

More information

SHAKEN - Secure Handling of Asserted information using tokens. August 2015

SHAKEN - Secure Handling of Asserted information using tokens. August 2015 SHAKEN - Secure Handling of Asserted information using tokens August 2015 1 Current Status The current STIR IETF working group is focused on 4474bis which defines a signing mechanism for validating a calling

More information

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98

Robocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98 Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:

More information

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!

Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! ACME Overview! ACME is a protocol being developed in IETF for Automated Certificate Management.!

More information

Ex Parte Advanced Methods to Target and Eliminate Unlawful Robocalls -- CG Docket No

Ex Parte Advanced Methods to Target and Eliminate Unlawful Robocalls -- CG Docket No 1200 G Street, NW P: +1 202-628-6380 Suite 500 W: www.atis.org Washington, DC 20005 May 4, 2017 Via Email Marlene H. Dortch Secretary Federal Communications Commission 445 12th Street, S.W. Washington,

More information

Authority Tokens for ACME. IETF 101 ACME WG Jon - London - Mar 2018

Authority Tokens for ACME. IETF 101 ACME WG Jon - London - Mar 2018 Authority Tokens for ACME IETF 101 ACME WG Jon - London - Mar 2018 STIR and ACME What is STIR? Secure Telephone Identity (Revisited) ART Area WG Providing cryptographic authentication for telephone calls

More information

SHAKEN Governance Model and Cer4ficate Management Overview

SHAKEN Governance Model and Cer4ficate Management Overview SHAKEN Governance Model and Cer4ficate Management Overview ATIS- 1000080 8/2/17 1 STI- PA STI- CA Service Provider Code Token ACME SP- KMS Public Key STI- CR SKS Private Key STI- AS STI- VS 8/2/17 2 STI-

More information

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. RTFM, Inc. C. Wendt Comcast February 2018

Internet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. RTFM, Inc. C. Wendt Comcast February 2018 Internet Engineering Task Force (IETF) Request for Comments: 8224 Obsoletes: 4474 Category: Standards Track ISSN: 2070-1721 J. Peterson NeuStar C. Jennings Cisco E. Rescorla RTFM, Inc. C. Wendt Comcast

More information

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017

Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017 Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track ISSN: 2070-1721 C. Holmberg Ericsson Y. Jiang China Mobile January 2017 Abstract Session Initiation Protocol

More information

Testbeds Landscape Team Assessment and Next Steps, Version 2. October 2015

Testbeds Landscape Team Assessment and Next Steps, Version 2. October 2015 Testbeds Landscape Team Assessment and Next Steps, Version 2 October 2015 As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings

More information

rfc4474bis + PASSporT + certs IETF 98 (Chicago) STIR WG

rfc4474bis + PASSporT + certs IETF 98 (Chicago) STIR WG rfc4474bis + PASSporT + certs IETF 98 (Chicago) STIR WG The good news We re done with the core drafts, pretty much Past IESG review, ballot cleared (!) Still a little cleanup to do, mostly on certs Last

More information

CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS

CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS Media Contact: Will Wiquist, (202) 418-0509 will.wiquist@fcc.gov For Immediate Release CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS Call Authentication

More information

S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen,

S Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen, S-72.333 Postgraduate Course in Radio Communications. Application Layer Mobility in Antti Keurulainen, 13.5.2004 antti.keurulainen@bitville.fi The Mobility Concepts is Link layer Mobility Network layer

More information

Intra-Network Flow (orig SHAKEN arch)

Intra-Network Flow (orig SHAKEN arch) Intra-Network Flow (orig SHAKEN arch) STI- Identity Header added PAI verstat added; Identity removed Orig Proc SRF I-CSCF All originating traffic sent for signing Identity Header presence triggers verification

More information

Intended status: Standards Track Expires: September 14, 2017 March 13, 2017

Intended status: Standards Track Expires: September 14, 2017 March 13, 2017 Network Working Group Internet-Draft Intended status: Standards Track Expires: September 14, 2017 J. Peterson Neustar S. Turner sn3rd March 13, 2017 Secure Telephone Identity Credentials: Certificates

More information

Intended status: Standards Track November 25, 2018 Expires: May 29, 2019

Intended status: Standards Track November 25, 2018 Expires: May 29, 2019 SIPCORE E. Burger Internet-Draft Georgetown University Intended status: Standards Track November 25, 2018 Expires: May 29, 2019 A Session Initiation Protocol (SIP) Response Code for Rejected Calls draft-ietf-sipcore-rejected-01

More information

ATIS Technical Report on a Framework for Display of Verified Caller ID

ATIS Technical Report on a Framework for Display of Verified Caller ID ATIS Standard on ATIS Technical Report on a Framework for Display of Verified Caller ID Alliance for Telecommunications Industry Solutions Approved May 2018 Abstract This technical report provides a framework

More information

NICC ND 1522 V1.1.1 ( )

NICC ND 1522 V1.1.1 ( ) NICC Document Report into implementation of Secure Telephone Identity Revisited (STIR) in the UK c/o TWP ACCOUNTING LLP, The Old Rectory, Church Street, Weybridge, Surrey KT13 8DE Tel.: +44(0) 20 7036

More information

AMERICAN NATIONAL STANDARD

AMERICAN NATIONAL STANDARD ENGINEERING COMMITTEE Data Standards Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 173-3 2017 Specification for Authentication in Preferential Telecommunications over IPCablecom2 Networks NOTICE The

More information

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo

draft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:

More information

ETSI TS V ( )

ETSI TS V ( ) TS 124 196 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; 5G; Enhanced Calling Name (ecnam) (3GPP TS 24.196 version 15.0.0 Release 15) 1 TS 124 196 V15.0.0

More information

Florida 911 Coordinator s Spring 2015 Meeting

Florida 911 Coordinator s Spring 2015 Meeting NENA i3 and Next Generation 9-1-1 Florida 911 Coordinator s Spring 2015 Meeting May - 2015 Mike Nelson Intrado, Senior Technical Officer Intrado Proprietary Selective Routers were designed In the 70 s

More information

Tel-URI Enhancements DAI, CPC, OLI updates + M. Patel, M. Dolly, R. Jesske, D. Hancock, S. Channabasappa IETF#78 Maastricht

Tel-URI Enhancements DAI, CPC, OLI updates + M. Patel, M. Dolly, R. Jesske, D. Hancock, S. Channabasappa IETF#78 Maastricht Tel-URI Enhancements DAI, CPC, OLI updates + M. Patel, M. Dolly, R. Jesske, D. Hancock, S. Channabasappa IETF#78 Maastricht Scope Updates of drafts: draft-yu-tel-dai-08 draft-patel-dispatch-cpc-oli-parameter-03

More information

VoLTE Security in NG PRDs

VoLTE Security in NG PRDs Background A number of different audits and security analysis of various VoLTE networks have been performed. - See also FSAG WP VoLTE Security Threats and Attacks The observation from the audits were in

More information

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo

Expires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo SIP WG J. Peterson Internet-Draft NeuStar Expires: August 2, 2003 February 2003 Status of this Memo SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01 This document is an Internet-Draft

More information

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0

INTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0 8x8 Interface Specification Version 2.0 Table of Contents Introduction....3 Feature Set....3 SIP Interface....3 Supported Standards....3 Supported SIP methods....4 Additional Supported SIP Headers...4

More information

ATIS Technical Report on a Framework for Display of Verified Caller ID

ATIS Technical Report on a Framework for Display of Verified Caller ID ATIS Technical Report on a Framework for Display of Verified Caller ID JOINT STANDARD As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions

More information

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).

Overview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP). This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,

More information

Analysing Protocol Implementations

Analysing Protocol Implementations Analysing Protocol Implementations Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister and Arne-Kristian Groven The 5th Information Security Practice and Experience Conference (ISPEC 2009) Xi'an, China

More information

3GPP TR V7.0.0 ( )

3GPP TR V7.0.0 ( ) TR 24.930 V7.0.0 (2006-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Signalling flows for the session setup in the IP Multimedia core

More information

Interconnection & Roaming IMS Signalling Profile (Release 2.0) May 2013

Interconnection & Roaming IMS Signalling Profile (Release 2.0) May 2013 INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (www.i3forum.org) (i3 FORUM) Source: Workstream Technical Aspects i3 forum keyword: IMS, Signalling Interconnection & Roaming IMS Signalling Profile

More information

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)

SIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA) security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General

More information

3GPP TR V ( )

3GPP TR V ( ) TR 24.930 V10.1.0 (2011-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Signalling flows for the session setup in the IP Multimedia core

More information

A survey of SIP Peering

A survey of SIP Peering A survey of SIP Peering Lars Strand (presenter) and Wolfgang Leister NATO ASI ARCHITECTS OF SECURE NETWORKS (ASIGE10) 17-22 May 2010 Switchboard operators Problem: Scalability the New York Telephone

More information

The Spoofing/Authentication Threat

The Spoofing/Authentication Threat The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally

More information

Industry Robocall Strike Force Report

Industry Robocall Strike Force Report Industry Robocall Strike Force Report April 28, 2017 1. Introduction (AT&T) 1.1. Overview On October 26, 2016, the Industry Robocall Strike Force issued a report describing progress made during the first

More information

Secure Telephony Enabled Middle-box (STEM)

Secure Telephony Enabled Middle-box (STEM) Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components

More information

A New Approach to Authentication Mechanism in IP Multimedia Subsystem

A New Approach to Authentication Mechanism in IP Multimedia Subsystem A New Approach to Authentication Mechanism in IP Multimedia Subsystem Farzad Fekrazad Department of Computer Eng., Islamic Azad University, Tehran Central, Iran E-mail: ffekrazad@gmail;com Abstract. Regarding

More information

Calling/Connected Line Identification Presentation on Yealink IP Phones

Calling/Connected Line Identification Presentation on Yealink IP Phones Calling/Connected Line Identification Presentation on Yealink IP Phones This guide provides some enhancements of calling and connected line identification presentation supported on Yealink IP phones. Yealink

More information

Reflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins

Reflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins Reflections on Security Options for the Real-time Transport Protocol Framework Colin Perkins Real-time Transport Protocol Framework RTP: A Transport Protocol for Real-Time Applications RFCs 3550 and 3551

More information

IP Multimedia Subsystem Application Servers

IP Multimedia Subsystem Application Servers IP Multimedia Subsystem Application Servers Second part of the project Presented by: Masood Khosroshahy B E G I N N I N G 1 June 2006 Project supervisor: Prof. Elie Najm IMS Application Servers HSS IMS

More information

SIP Session Initiation Protocol Part 2. ITS VoIP; 2009 P. Campbell, H.Kruse

SIP Session Initiation Protocol Part 2. ITS VoIP; 2009 P. Campbell, H.Kruse SIP Session Initiation Protocol Part 2 ITS 441 - VoIP; 2009 P. Campbell, H.Kruse Multiple Call Opportunities 2 Alice Calls Bob How? One Way: Alice s UA can set up a SIP trapezoid. Corners: Alice s phone,

More information

Outline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links

Outline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links Update of RTSP draft-ietf-mmusic-rfc2326bis-03.txt Authors: Henning Schulzrinne / Columbia University Robert Lanphier / Real Networks Magnus Westerlund / Ericsson (Presenting) Anup Rao / Cisco Outline

More information

Unsolicited Communication in the NGN

Unsolicited Communication in the NGN Unsolicited Communication in the NGN Overview of Status and Activities in different SDOs Thilo Ewald Research Scientist NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page

More information

Proximus can't be held responsible for any damages due to the use of an outdated version of this specification.

Proximus can't be held responsible for any damages due to the use of an outdated version of this specification. This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

Proximus can't be held responsible for any damages due to the use of an outdated version of this specification.

Proximus can't be held responsible for any damages due to the use of an outdated version of this specification. This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

draft ETSI TR V0.5.0 ( )

draft ETSI TR V0.5.0 ( ) Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Prevention of Unsolicited Communication in the NGN CAUTION: This DRAFT document is provided

More information

ETSI TS V1.1.1 ( )

ETSI TS V1.1.1 ( ) TS 183 028 V1.1.1 (2006-04) Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Common basic communication procedures; Protocol specification

More information

8.4 IMS Network Architecture A Closer Look

8.4 IMS Network Architecture A Closer Look 8.4 IMS Network Architecture A Closer Look 243 The anchoring of the media in TrGW also has an implicit topology-hiding effect. Without anchoring, the SDP answer provided to the other network would contain

More information

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017

Response of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017 Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines

More information

Robocall and fake caller-id detection

Robocall and fake caller-id detection Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

3GPP TS V7.2.0 ( )

3GPP TS V7.2.0 ( ) TS 24.341 V7.2.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Support of SMS over IP networks; Stage 3 (Release 7) GLOBAL

More information

TSIN02 - Internetworking

TSIN02 - Internetworking Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand

More information

Request for Comments: 2976 Category: Standards Track October 2000

Request for Comments: 2976 Category: Standards Track October 2000 Network Working Group S. Donovan Request for Comments: 2976 dynamicsoft Category: Standards Track October 2000 Status of this Memo The SIP INFO Method This document specifies an Internet standards track

More information

CSCF Serving-CSCF Configuration Mode Commands

CSCF Serving-CSCF Configuration Mode Commands CSCF Serving-CSCF Mode Commands The Serving-CSCF Mode is used to set various commands supporting the role of the CSCF service as a Serving CSCF. Exec > Global > Context > CSCF Service > Serving-CSCF Important

More information

Telecommunication Services Engineering Lab. Roch H. Glitho

Telecommunication Services Engineering Lab. Roch H. Glitho 1 2 Outline 1. Introduction 2. Core SIP 3. Selected Extensions 3 Introduction: Signaling vs Media Signaling: Session establishment Session tear down Changes to the session Supplementary services Media:

More information

Technical White Paper for NAT Traversal

Technical White Paper for NAT Traversal V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form

More information

ETSI TS V8.2.0 ( ) Technical Specification

ETSI TS V8.2.0 ( ) Technical Specification TS 124 147 V8.2.0 (2009-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Conferencing using the IP Multimedia (IM)

More information

VoIP Security Threat Analysis

VoIP Security Threat Analysis 2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service

More information

The Technical Interconnect Model for IP-based voice services

The Technical Interconnect Model for IP-based voice services The Technical Interconnect Model for IP-based voice services Alessandro Forcina Chairman WS Technical Aspects Telecom Italia Sparkle I3 Forum, 1st Technical Workshop Warsaw, June 15th 16th 2010 Ver. 1

More information

Spirent Landslide VoLTE

Spirent Landslide VoLTE /IMS Node and SIP UE Emulation Voice over LTE () is the combination of IMS-based voice, messaging and video services over the 4G mobile network. To ensure a successful transition, mobile carriers and equipment

More information

Implementing a Solution to Communicate with APN Server for Sending Push Notifications

Implementing a Solution to Communicate with APN Server for Sending Push Notifications Implementing a Solution to Communicate with APN Server for Sending Push Notifications Petrika Manika Department of Informatics, University of Tirana petrika.manika@fshn.edu.al Elina Jaupllari Ict Solutions

More information

Ingate SIParator /Firewall SIP Security for the Enterprise

Ingate SIParator /Firewall SIP Security for the Enterprise Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3

More information

Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.

Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.0 Abstract These Application

More information

TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management.

TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management. NICC London 8 November 2017 Robert Baker European Managing Director First Orion rbaker@firstorion.com 07983612843 TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call

More information

Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1.

Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These

More information

Application Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.

Application Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These

More information

Internet Engineering Task Force (IETF) Request for Comments: 8292 Category: Standards Track ISSN: November 2017

Internet Engineering Task Force (IETF) Request for Comments: 8292 Category: Standards Track ISSN: November 2017 Internet Engineering Task Force (IETF) Request for Comments: 8292 Category: Standards Track ISSN: 2070-1721 M. Thomson Mozilla P. Beverloo Google November 2017 Voluntary Application Server Identification

More information

WebRTC standards update (September 2014) Victor Pascual

WebRTC standards update (September 2014) Victor Pascual WebRTC standards update (September 2014) Victor Pascual Avila Victor.pascual@quobis.com @victorpascual About Me Technology, Innovation & Strategy Consultant Main focus: help make WebRTC happen involved

More information

IP Multimedia Subsystem Part 5 Marek Średniawa

IP Multimedia Subsystem Part 5 Marek Średniawa IP Multimedia Subsystem Part 5 Marek Średniawa mareks@tele.pw.edu.pl Institute of Telecommunications Project is co-financed by European Union within the European Social Fund 1 Identification in IMS Identities

More information

Media Communications Internet Telephony and Teleconference

Media Communications Internet Telephony and Teleconference Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard

More information

ETSI TS V ( ) Technical Specification

ETSI TS V ( ) Technical Specification TS 124 628 V10.3.0 (2011-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Common Basic Communication procedures

More information

Network Working Group. Expires: April 30, 2002 October 30, The Refer Method draft-ietf-sip-refer-02. Status of this Memo

Network Working Group. Expires: April 30, 2002 October 30, The Refer Method draft-ietf-sip-refer-02. Status of this Memo Network Working Group R. Sparks Internet-Draft dynamicsoft Expires: April 30, 2002 October 30, 2001 Status of this Memo The Refer Method draft-ietf-sip-refer-02 This document is an Internet-Draft and is

More information

DRAFT REVISIONS BR DOMAIN VALIDATION

DRAFT REVISIONS BR DOMAIN VALIDATION DRAFT REVISIONS BR 3.2.2.4 DOMAIN VALIDATION (Feb. 15, 2016) Summary of changes The primary purpose of this change is to replace Domain Validation item 7 "Using any other method of confirmation which has

More information

Emergency Services and Priority Signaling

Emergency Services and Priority Signaling ITU-T / ATIS Workshop Next Generation Technology and Standardization Emergency Services and Priority Signaling Martin Dolly AT&T (With credit to Percy Tarapore (AT&T) for Priority contributions) ITU-T

More information

Unsolicited Communication / SPIT / multimedia-spam

Unsolicited Communication / SPIT / multimedia-spam Unsolicited Communication / SPIT / multimedia-spam overview of this topic in different SDOs Thilo Ewald NGN Group, NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page

More information

3GPP TR V ( )

3GPP TR V ( ) 3GPP TR 29.949 V12.0.0 (2014-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Study on technical aspects on roaming end-to-end scenarios

More information

Secure Communications on VoIP Networks

Secure Communications on VoIP Networks Mediatrix Multi-service Gateways v. 2.0.41.762 2017-12-21 Table of Contents Table of Contents Internet Telephony Network Security 4 Authentication 4 X-509 Certificates 4 Transport Layer Security (TLS)

More information

CS144: Sessions. Cookie : CS144: Web Applications

CS144: Sessions. Cookie : CS144: Web Applications CS144: Sessions HTTP is a stateless protocol. The server s response is purely based on the single request, not anything else Q: How does a web site like Amazon can remember a user and customize its results?

More information

SIP as an Enabling Technology

SIP as an Enabling Technology SIP as an Enabling Technology SIP and VoIP Fundamentals Mike Taylor - CTO spscom.com 888.777.7280 Strategic Products and Services / 300 Littleton Road / Parsippany, NJ 07054 Agenda What is SIP? Acceptance

More information

Reserving N and N+1 Ports with PCP

Reserving N and N+1 Ports with PCP Reserving N and N+1 Ports with PCP draft-boucadair-pcp-rtp-rtcp IETF 83-Paris, March 2012 M. Boucadair and S. Sivakumar 1 Scope Defines a new PCP Option to reserve a pair of ports (N and N+1) in a PCP-controlled

More information

Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1.

Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1. Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1.0 Abstract These Application

More information

atl IP Telephone SIP Compatibility

atl IP Telephone SIP Compatibility atl IP Telephone SIP Compatibility Introduction atl has released a new range of IP Telephones the IP 300S (basic business IP telephone) and IP400 (Multimedia over IP telephone, MOIP or videophone). The

More information

A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00)

A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) IETF 93 / July 2015 Paul E. Jones Nermeen Ismail David Benham Cisco Agenda Security

More information

The Session Initiation Protocol

The Session Initiation Protocol The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?

More information

Request for Comments: Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar R.

Request for Comments: Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar R. Network Working Group J. Rosenberg Request for Comments: 3261 dynamicsoft Obsoletes: 2543 H. Schulzrinne Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar

More information

ECMA st Edition / December Corporate Telecommunication Networks - Signalling Interworking between QSIG and SIP - Call Transfer

ECMA st Edition / December Corporate Telecommunication Networks - Signalling Interworking between QSIG and SIP - Call Transfer EMA-361 1 st Edition / December 2004 orporate Telecommunication Networks - Signalling Interworking between QSIG and SIP - all Transfer Standard EMA-361 1 st Edition / December 2004 orporate Telecommunication

More information

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006

PKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006 PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy

More information

How to implement international IP Voice Interconnections

How to implement international IP Voice Interconnections i3 FORUM www.i3forum.org How to implement international IP Voice Interconnections different solutions for different needs presented by Alessandro Forcina (i3 Forum WS Technical Aspects Chairman) TELECOM

More information

IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES

IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Daitan White Paper IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Highly Reliable Software Development Services http://www.daitangroup.com Daitan Group 2014 IMS, NFV

More information

Session Initiation Protocol (SIP)

Session Initiation Protocol (SIP) Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part

More information

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C ) ) ) ) ) REPLY COMMENTS OF THE USTELECOM ASSOCIATION

BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C ) ) ) ) ) REPLY COMMENTS OF THE USTELECOM ASSOCIATION BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of Call Authentication Trust Anchor ) ) ) ) ) CG Docket No. 17-97 REPLY COMMENTS OF THE USTELECOM ASSOCIATION The USTelecom

More information

3GPP TS V ( )

3GPP TS V ( ) TS 29.165 V10.10.0 (2012-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Inter-IMS Network to Network Interface (NNI) (Release

More information

Oracle Communications Session Router

Oracle Communications Session Router Oracle Communications Session Router An advanced session routing proxy (SRP), Oracle Communications Session Router overcomes the challenges inherent in routing large numbers of Session Initiation Protocol

More information

LONG TERM TECHNICAL OPTIONS

LONG TERM TECHNICAL OPTIONS LONG TERM TECHNICAL OPTIONS CRTC/MAAWG Workshop on Caller ID Spoofing Montreal June 18-19 2014 Richard Shockey Shockey Consulting Chairman of the Board SIP Forum Reston, VA 20291 richard@shockey.us Voice

More information

Proximus can't be held responsible for any damages due to the use of an outdated version of this specification.

Proximus can't be held responsible for any damages due to the use of an outdated version of this specification. This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into

More information

Abstract. Avaya Solution & Interoperability Test Lab

Abstract. Avaya Solution & Interoperability Test Lab Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between the PAETEC Broadsoft based SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract

More information

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype

ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE Final Project Presentation Spring 2001 Implement Session Initiation Protocol (SIP) User Agent Prototype Thomas Pang (ktpang@sfu.ca) Peter Lee (mclee@sfu.ca)

More information

RTCWEB Working Group. Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future

RTCWEB Working Group. Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future RTCWEB Working Group Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future Dan Wing dwing@cisco.com IETF83 - March 2012 v2 1 Agenda Scope Upcoming Questions

More information