STIR and SHAKEN Framework Overview. IIT Real-Time Conference 2016 Chris Wendt
|
|
- Chad Walsh
- 6 years ago
- Views:
Transcription
1 STIR and SHAKEN Framework Overview IIT Real-Time Conference 2016 Chris Wendt 1
2 Introduction - Telephone Network The telephone network is a complex set of interconnecting devices and network devices This has been a positive part of the evolution of how we communicate and use the telephone network But the negative impact is that bad actors have been able to take advantage of that proliferation 2
3 Introduction - VoIP Network The TDM/SS7 equipment in the network is 10 s of years old, the software for these systems hasn t been touched in years. Cable world has mostly moved to SIP/VoIP Mobile world is moving quickly to VoLTE or end to end SIP There has been a consistent message to industry to sunset the PSTN network and move to all-ip For call spoofing problem, the only practical place we can solve this problem is in SIP network 3
4 User Experience Google and Apple are starting to put in the hooks for supporting call spam warnings Caller ID on TV would be an obvious place to help alert users to potential spam Positive verification would also be a beneficial service to offer customers including enhanced verified Caller information 4
5 Authentication Standards Activities Three industry standards body activities related to VoIP calls: IETF STIR - defining core protocols and technologies for SIP and certificate usage for applying digital signatures to validate the telephone identity of the calling party ATIS SHAKEN - defining the industry framework for using STIR technologies and how service providers will interwork on VoIP based calls 3GPP - definition of a verstat parameter to carry a verification status from the verification service to a 3GPP managed UE These standards are forward looking in the sense that SS7/TDM traffic should be rapidly converting as wireless carriers move to VoLTE calling 5
6 IETF - Standards Overview IETF - protocol related standards Base digital signature specification - PASSporT (Persona Assertion Token) draft-ietf-stir-passport SIP usage of PASSporT draft-ietf-stir-rfc4474bis Certificate usage definition draft-ietf-stir-certificates SIP Call-Info Parameters for Labeling and Classifying Calls draft-schulzrinne-dispatch-callinfo-spam-00 A SIP Response Code for Unwanted Calls - defines 666 as unwanted call draft-schulzrinne-dispatch-status-unwanted 6
7 ATIS/3GPP - Standards Overview ATIS/SIPForum NNI Task Force SHAKEN (Signature-based Handling of Asserted information using tokens) defines the network architecture and NNI dependencies around the usage of the PASSporT and 4474bis based framework SHAKEN framework - defines a service provider profile for the deployment of: STIR Authentication Service STIR Verification Service SHAKEN Certificate framework 3GPP Certificate Management/Administration TS signaling verification status, WID & CR in progress TS for NNI & X for Verification/Authentication Service Functions tel URI parameter in the P-Asserted-Identity or FROM header field in a SIP requests Example: P-Asserted-Identity: tel: ;verstat=tn-validation-passed 7
8 PASSporT Overview PASSporT uses the JSON Web Token (JWT) and JSON Web Signature (JWS) formats and defines a standard set of base claims and signature secure cryptographic validation of the owner of the claims made Claims are a JSON object of key value pairs Passport defines a minimum set of claims/key value pairs to assert the identity of the call originator with some additional key pairs for protection against replay and man-in-the-middle attacks It is also extensible to cover other scenarios, like CNAM or GETS/ WPS, assertion and/or authorization 8
9 PASSporT Signature The PASSporT Signature is a standard JWS X.509 based digital signature of the header and claims. There is text specifying the specific canonicalization of the header and claims JSON, including removing white space etc. JWT form of the token is <header>.<claims>.<signature> Example from draft-ietf-stir-passport: eyj0exaioijwyxnzcg9ydcisimfszyi6ikvtmju2iiwiedv1ijoiahr0chm6ly9j ZXJ0LmV4YW1wbGUub3JnL3Bhc3Nwb3J0LmNlciJ9. eyjpyxqioiixndqzmja4mzq1iiwib3ruijoimtixntu1nteymtiilcjkdxjpijoi c2lwomfsawnlqgv4yw1wbguuy29tin0. SQ3r3U9kew2e4Ej-tS4vbWQgs9kSQzHgzqK_xP4TL70al7XwWwF4R2mP9sxQey9n pzqoytnx_wzsljjpic_f_a 9
10 RFC4474bis Overview RFC4474bis defines how PASSporT is used in a SIP message RFC4474 is deprecated but was the first attempt at signing the entire SIP message, however as we know SBCs like to change SIP headers, so it wasn t a practical approach. RFC4474bis defines three main components The syntax of the newly defined identity header and a few required parameters. This includes the PASSporT signature. Authentication Service - the logical component that creates the PASSporT token signature and puts it in a newly defined identity header Verification Service - the logical component that validates the PASSport token signature 10
11 Map between SIP message and PASSporT claims SIP INVITE INVITE SIP/2.0 Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hg4bk776asdhds Max-Forwards: 70 To: Bob user=phone> From: Alice user=phone>;tag= Call-ID: CSeq: INVITE Date: Sat, 13 Nov :29:00 GMT Identity: sv5cto05kqpsmtht3dceio/1cwts ZtnG3iV+1nmurLXV/HmtyNS7Ltrg9dlxkWzoeU 7d7OV8HweTTDobV3itTmgPwCFjaEmMyEI 3d7SyN21yNDo2ER/Ovgtw0Lu5csIppPqOg1uX ndzhbg7mr6rl9bnuhhufvrbp51mn3w0gfus; info=< biloxi.cer>;alg=es256 Contact: Content-Type: application/sdp Content-Length: 142 Header { alg :"ES256", "typ":"passport", x5u :" biloxi.cer" } Claim { "iat": , "dtn":" ", "otn":" "} 11
12 SHAKEN Framework Overview SHAKEN is an industry framework document that specifies the deployment and interworking points for building a interoperable set of services for STIR It provides specifications for both SIP and certificate management deployment for the current VoIP based telephone network and NNI. The intent is to evolve the SHAKEN framework over time as participation, functionality, and policy evolves around STIR deployment for VoIP calls over service provider networks. 12
13 SHAKEN Reference Architecture Certificate provisioning portal HTTPS TN-CR HTTPS STI-AS HTTPS STI-VS SKS SIP SIP SIP CSCF SIP SIP CSCF SIP SIP SIP UA RTP IBCF/TrGW RTP IBCF/TrGW SIP UA Service Provider A Originating/Authorization Service Provider B Terminating/Verification Shown in the context of 3GPP IMS components, but not limited to that Defines the logical components needed and a high level call flow 13
14 SHAKEN PASSporT extension- Attestation and Originating Identifier Attestation (attest): The service provider will classify the origination of the call into three categories: Full Attestation: The signing provider: is responsible for the origination of the call onto the IP based service provider voice network has a direct authenticated relationship with the customer and can identify the customer has established a verified association with the telephone number used for the call. Partial Attestation: The signing provider: is responsible for the origination of the call onto its IP based voice network has a direct authenticated relationship with the customer and can identify the customer has NOT established a verified association with the telephone number being used for the call Gateway Attestation: The signing provider: is the entry point of the call onto its IP based voice network has no relationship with the initiator of the call (e.g., international gateways). Originating Identifier (origid): This is a unique and opaque UUID (RFC4122) that will be used for two reasons traceback identification of originator, either service provider, wholesale customer, enterprise can be used by verification and call spam classification/analytics as an opaque identity to associate reputation scores and identify bad actors to authorities for potential follow up 14
15 Example SHAKEN PASSporT extension Protected Header { alg : ES256, ppt : shaken, typ : passport", "x5u":" } Payload { attest : A dest :{ tn : "} iat : , orig :{ tn :" "}, origid : 123e4567-e89b-12d3-a } 15
16 SHAKEN - Telephone Authority Model Private Key SKS TAMS CSR ACME SP-KMS Public Key TN-CR HTTPS Public Interface Telephone Authority is a new model that corresponds to the Certificate Authority for web/https Uses similar X.509 mechanisms for certificate creation and validation Associated with an authority for assertion of the ownership of either telephone numbers or the authorization to perform telephone call routing Evolve to support for TN or block TN level certificates 16
17 SHAKEN - Certificate Management Start with a straight forward X.509 based CSR key signing mechanism, similar to web certificate authorities today, but likely more manual process for initial deployment Move to automated process, adopt ACME based automatic certificate management protocols going forward. Forward looking, and likely policy/industry related issues more than technical Service provider authorization and verification process, likely number management and other policy decisions will impact this process. Definition of how authorities can revoke bad actors if necessary using OCSP and other more advanced certificate management techniques. 17
18 Telephone Authority Administration/Security Governance Authority - this entity would manage, likely tied with identification and potential prosecution of bad actors, the authority for service providers to originate signed calls to the telephone network TA Administrator - this entity would do the manual process of working with service providers to validate they are who they say they are and manage credentials of Telephone Authorities to have a secret key and the Service Providers to do CSR transactions with the Telephone Authorities. They should also have a periodic re-validation and new key issuance, as part of good practice to protect the Telephone Authority services. Note: Governance and Administration are two logical functions but could be supported by a common low administrative overhead organization. Telephone Authorities - Can process automated CSR requests via ACME protocol from Service Providers creating new certificates Service provider - Own and manage a SP certificate key, that they must have signed by TA. 18
19 SHAKEN - Status and Next Steps STIR documents just finished WGLC in IETF SHAKEN SIP profile document in Letter Ballot and Approval process in ATIS and SIP Forum SHAKEN Certificate Management Framework document targeted completion for end of year FCC Robocalling Strike Force will issue report on Interoperability tests at SIPit and ATIS Testbed Focus Group 19
20 Vesper - open source STIR/SHAKEN implementation 20
SHAKEN STI- AS and STI- VS Overview with API ATIS ATIS IPNNI R004 IPNNI R000
SHAKEN STI- AS and STI- VS Overview with API ATIS- 1000074 ATIS- 1000080 IPNNI- 2017-00021R004 IPNNI- 2017-00089R000 1 Overview Architecture API for AuthenDcator and Verifier SSVS Detailed call flows
More informationShaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar
Shaken 101: Mitigating Illegal Robocalling and Caller ID Scams Webinar Panelists: Dr. Eric Burger Chief Technology Officer FCC Jim McEachern Principal Technologist ATIS Moderator: Brent Struthers STI-GA
More informationSHAKEN - Secure Handling of Asserted information using tokens. August 2015
SHAKEN - Secure Handling of Asserted information using tokens August 2015 1 Current Status The current STIR IETF working group is focused on 4474bis which defines a signing mechanism for validating a calling
More informationRobocall signaling draft-sipcore-callinfo-spam. Henning Schulzrinne IETF 98
Robocall signaling draft-sipcore-callinfo-spam Henning Schulzrinne IETF 98 Background (for the un-stired and un-shaken) Unwanted calls are typically some are illegal, some are just unwanted (by many) example:
More informationOverview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv!
Overview! Automated Certificate Management (ACME) Protocol! IP-NNI Task Force! Mary Barnes - iconectiv! ACME Overview! ACME is a protocol being developed in IETF for Automated Certificate Management.!
More informationEx Parte Advanced Methods to Target and Eliminate Unlawful Robocalls -- CG Docket No
1200 G Street, NW P: +1 202-628-6380 Suite 500 W: www.atis.org Washington, DC 20005 May 4, 2017 Via Email Marlene H. Dortch Secretary Federal Communications Commission 445 12th Street, S.W. Washington,
More informationAuthority Tokens for ACME. IETF 101 ACME WG Jon - London - Mar 2018
Authority Tokens for ACME IETF 101 ACME WG Jon - London - Mar 2018 STIR and ACME What is STIR? Secure Telephone Identity (Revisited) ART Area WG Providing cryptographic authentication for telephone calls
More informationSHAKEN Governance Model and Cer4ficate Management Overview
SHAKEN Governance Model and Cer4ficate Management Overview ATIS- 1000080 8/2/17 1 STI- PA STI- CA Service Provider Code Token ACME SP- KMS Public Key STI- CR SKS Private Key STI- AS STI- VS 8/2/17 2 STI-
More informationInternet Engineering Task Force (IETF) Request for Comments: Category: Standards Track. RTFM, Inc. C. Wendt Comcast February 2018
Internet Engineering Task Force (IETF) Request for Comments: 8224 Obsoletes: 4474 Category: Standards Track ISSN: 2070-1721 J. Peterson NeuStar C. Jennings Cisco E. Rescorla RTFM, Inc. C. Wendt Comcast
More informationInternet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track. January 2017
Internet Engineering Task Force (IETF) Request for Comments: 8055 Category: Standards Track ISSN: 2070-1721 C. Holmberg Ericsson Y. Jiang China Mobile January 2017 Abstract Session Initiation Protocol
More informationTestbeds Landscape Team Assessment and Next Steps, Version 2. October 2015
Testbeds Landscape Team Assessment and Next Steps, Version 2 October 2015 As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions (ATIS) brings
More informationrfc4474bis + PASSporT + certs IETF 98 (Chicago) STIR WG
rfc4474bis + PASSporT + certs IETF 98 (Chicago) STIR WG The good news We re done with the core drafts, pretty much Past IESG review, ballot cleared (!) Still a little cleanup to do, mostly on certs Last
More informationCHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS
Media Contact: Will Wiquist, (202) 418-0509 will.wiquist@fcc.gov For Immediate Release CHAIRMAN PAI CALLS ON INDUSTRY TO ADOPT ANTI-SPOOFING PROTOCOLS TO HELP CONSUMERS COMBAT SCAM ROBOCALLS Call Authentication
More informationS Postgraduate Course in Radio Communications. Application Layer Mobility in WLAN. Antti Keurulainen,
S-72.333 Postgraduate Course in Radio Communications. Application Layer Mobility in Antti Keurulainen, 13.5.2004 antti.keurulainen@bitville.fi The Mobility Concepts is Link layer Mobility Network layer
More informationIntra-Network Flow (orig SHAKEN arch)
Intra-Network Flow (orig SHAKEN arch) STI- Identity Header added PAI verstat added; Identity removed Orig Proc SRF I-CSCF All originating traffic sent for signing Identity Header presence triggers verification
More informationIntended status: Standards Track Expires: September 14, 2017 March 13, 2017
Network Working Group Internet-Draft Intended status: Standards Track Expires: September 14, 2017 J. Peterson Neustar S. Turner sn3rd March 13, 2017 Secure Telephone Identity Credentials: Certificates
More informationIntended status: Standards Track November 25, 2018 Expires: May 29, 2019
SIPCORE E. Burger Internet-Draft Georgetown University Intended status: Standards Track November 25, 2018 Expires: May 29, 2019 A Session Initiation Protocol (SIP) Response Code for Rejected Calls draft-ietf-sipcore-rejected-01
More informationATIS Technical Report on a Framework for Display of Verified Caller ID
ATIS Standard on ATIS Technical Report on a Framework for Display of Verified Caller ID Alliance for Telecommunications Industry Solutions Approved May 2018 Abstract This technical report provides a framework
More informationNICC ND 1522 V1.1.1 ( )
NICC Document Report into implementation of Secure Telephone Identity Revisited (STIR) in the UK c/o TWP ACCOUNTING LLP, The Old Rectory, Church Street, Weybridge, Surrey KT13 8DE Tel.: +44(0) 20 7036
More informationAMERICAN NATIONAL STANDARD
ENGINEERING COMMITTEE Data Standards Subcommittee AMERICAN NATIONAL STANDARD ANSI/SCTE 173-3 2017 Specification for Authentication in Preferential Telecommunications over IPCablecom2 Networks NOTICE The
More informationdraft-ietf-sip-info-method-02.txt February 2000 The SIP INFO Method Status of this Memo
HTTP/1.1 200 OK Date: Tue, 09 Apr 2002 07:53:57 GMT Server: Apache/1.3.20 (Unix) Last-Modified: Tue, 15 Feb 2000 17:03:00 GMT ETag: "3239a5-465b-38a986c4" Accept-Ranges: bytes Content-Length: 18011 Connection:
More informationETSI TS V ( )
TS 124 196 V15.0.0 (2018-07) TECHNICAL SPECIFICATION Universal Mobile Telecommunications System (UMTS); LTE; 5G; Enhanced Calling Name (ecnam) (3GPP TS 24.196 version 15.0.0 Release 15) 1 TS 124 196 V15.0.0
More informationFlorida 911 Coordinator s Spring 2015 Meeting
NENA i3 and Next Generation 9-1-1 Florida 911 Coordinator s Spring 2015 Meeting May - 2015 Mike Nelson Intrado, Senior Technical Officer Intrado Proprietary Selective Routers were designed In the 70 s
More informationTel-URI Enhancements DAI, CPC, OLI updates + M. Patel, M. Dolly, R. Jesske, D. Hancock, S. Channabasappa IETF#78 Maastricht
Tel-URI Enhancements DAI, CPC, OLI updates + M. Patel, M. Dolly, R. Jesske, D. Hancock, S. Channabasappa IETF#78 Maastricht Scope Updates of drafts: draft-yu-tel-dai-08 draft-patel-dispatch-cpc-oli-parameter-03
More informationVoLTE Security in NG PRDs
Background A number of different audits and security analysis of various VoLTE networks have been performed. - See also FSAG WP VoLTE Security Threats and Attacks The observation from the audits were in
More informationExpires: August 2, 2003 February SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01. Status of this Memo
SIP WG J. Peterson Internet-Draft NeuStar Expires: August 2, 2003 February 2003 Status of this Memo SIP Authenticated Identity Body (AIB) Format draft-ietf-sip-authid-body-01 This document is an Internet-Draft
More informationINTERFACE SPECIFICATION SIP Trunking. 8x8 SIP Trunking. Interface Specification. Version 2.0
8x8 Interface Specification Version 2.0 Table of Contents Introduction....3 Feature Set....3 SIP Interface....3 Supported Standards....3 Supported SIP methods....4 Additional Supported SIP Headers...4
More informationATIS Technical Report on a Framework for Display of Verified Caller ID
ATIS Technical Report on a Framework for Display of Verified Caller ID JOINT STANDARD As a leading technology and solutions development organization, the Alliance for Telecommunications Industry Solutions
More informationOverview of SIP. Information About SIP. SIP Capabilities. This chapter provides an overview of the Session Initiation Protocol (SIP).
This chapter provides an overview of the Session Initiation Protocol (SIP). Information About SIP, page 1 How SIP Works, page 4 How SIP Works with a Proxy Server, page 5 How SIP Works with a Redirect Server,
More informationAnalysing Protocol Implementations
Analysing Protocol Implementations Anders Moen Hagalisletto, Lars Strand, Wolfgang Leister and Arne-Kristian Groven The 5th Information Security Practice and Experience Conference (ISPEC 2009) Xi'an, China
More information3GPP TR V7.0.0 ( )
TR 24.930 V7.0.0 (2006-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Signalling flows for the session setup in the IP Multimedia core
More informationInterconnection & Roaming IMS Signalling Profile (Release 2.0) May 2013
INTERNATIONAL INTERCONNECTION FORUM FOR SERVICES OVER IP (www.i3forum.org) (i3 FORUM) Source: Workstream Technical Aspects i3 forum keyword: IMS, Signalling Interconnection & Roaming IMS Signalling Profile
More informationSIP security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, , Atlanta, GA (USA)
security and the great fun with Firewall / NAT Bernie Höneisen SURA / ViDe, 29.03.2006, Atlanta, GA (USA) 2006 SWITCH Content and Firewall and NAT Privacy / Encryption SpIT / Authentication Identity General
More information3GPP TR V ( )
TR 24.930 V10.1.0 (2011-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Signalling flows for the session setup in the IP Multimedia core
More informationA survey of SIP Peering
A survey of SIP Peering Lars Strand (presenter) and Wolfgang Leister NATO ASI ARCHITECTS OF SECURE NETWORKS (ASIGE10) 17-22 May 2010 Switchboard operators Problem: Scalability the New York Telephone
More informationThe Spoofing/Authentication Threat
The Spoofing/Authentication Threat An Analysis of the Spoofing/Authentication Threat in Voice Network Security A Whitepaper From SecureLogix Corporation Introduction Spoofing refers to the act of intentionally
More informationIndustry Robocall Strike Force Report
Industry Robocall Strike Force Report April 28, 2017 1. Introduction (AT&T) 1.1. Overview On October 26, 2016, the Industry Robocall Strike Force issued a report describing progress made during the first
More informationSecure Telephony Enabled Middle-box (STEM)
Report on Secure Telephony Enabled Middle-box (STEM) Maggie Nguyen 04/14/2003 Dr. Mark Stamp - SJSU - CS 265 - Spring 2003 Table of Content 1. Introduction 1 2. IP Telephony Overview.. 1 2.1 Major Components
More informationA New Approach to Authentication Mechanism in IP Multimedia Subsystem
A New Approach to Authentication Mechanism in IP Multimedia Subsystem Farzad Fekrazad Department of Computer Eng., Islamic Azad University, Tehran Central, Iran E-mail: ffekrazad@gmail;com Abstract. Regarding
More informationCalling/Connected Line Identification Presentation on Yealink IP Phones
Calling/Connected Line Identification Presentation on Yealink IP Phones This guide provides some enhancements of calling and connected line identification presentation supported on Yealink IP phones. Yealink
More informationReflections on Security Options for the Real-time Transport Protocol Framework. Colin Perkins
Reflections on Security Options for the Real-time Transport Protocol Framework Colin Perkins Real-time Transport Protocol Framework RTP: A Transport Protocol for Real-Time Applications RFCs 3550 and 3551
More informationIP Multimedia Subsystem Application Servers
IP Multimedia Subsystem Application Servers Second part of the project Presented by: Masood Khosroshahy B E G I N N I N G 1 June 2006 Project supervisor: Prof. Elie Najm IMS Application Servers HSS IMS
More informationSIP Session Initiation Protocol Part 2. ITS VoIP; 2009 P. Campbell, H.Kruse
SIP Session Initiation Protocol Part 2 ITS 441 - VoIP; 2009 P. Campbell, H.Kruse Multiple Call Opportunities 2 Alice Calls Bob How? One Way: Alice s UA can set up a SIP trapezoid. Corners: Alice s phone,
More informationOutline. Goals of work Work since Atlanta Extensions Updates Made Open Issues Ad-hoc meeting & Next Teleconference Links
Update of RTSP draft-ietf-mmusic-rfc2326bis-03.txt Authors: Henning Schulzrinne / Columbia University Robert Lanphier / Real Networks Magnus Westerlund / Ericsson (Presenting) Anup Rao / Cisco Outline
More informationUnsolicited Communication in the NGN
Unsolicited Communication in the NGN Overview of Status and Activities in different SDOs Thilo Ewald Research Scientist NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page
More informationProximus can't be held responsible for any damages due to the use of an outdated version of this specification.
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
More informationProximus can't be held responsible for any damages due to the use of an outdated version of this specification.
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
More informationdraft ETSI TR V0.5.0 ( )
Technical Report Telecommunications and Internet converged Services and Protocols for Advanced Networking (TISPAN); Prevention of Unsolicited Communication in the NGN CAUTION: This DRAFT document is provided
More informationETSI TS V1.1.1 ( )
TS 183 028 V1.1.1 (2006-04) Technical Specification Telecommunications and Internet Converged Services and Protocols for Advanced Networking (TISPAN); Common basic communication procedures; Protocol specification
More information8.4 IMS Network Architecture A Closer Look
8.4 IMS Network Architecture A Closer Look 243 The anchoring of the media in TrGW also has an implicit topology-hiding effect. Without anchoring, the SDP answer provided to the other network would contain
More informationResponse of Microsoft Corporation to Ofcom s consultation document. Guidelines for CLI Facilities. 14 November 2017
Response of Microsoft Corporation to Ofcom s consultation document Guidelines for CLI Facilities 14 November 2017 14 November 2017 Microsoft s response to Ofcom s consultation on changes to the CLI guidelines
More informationRobocall and fake caller-id detection
Technical Disclosure Commons Defensive Publications Series December 01, 2017 Robocall and fake caller-id detection Junda Liu Naveen Kalla Shi Lu Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More information3GPP TS V7.2.0 ( )
TS 24.341 V7.2.0 (2007-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Support of SMS over IP networks; Stage 3 (Release 7) GLOBAL
More informationTSIN02 - Internetworking
Lecture 8: SIP and H323 Litterature: 2004 Image Coding Group, Linköpings Universitet Lecture 8: SIP and H323 Goals: After this lecture you should Understand the basics of SIP and it's architecture Understand
More informationRequest for Comments: 2976 Category: Standards Track October 2000
Network Working Group S. Donovan Request for Comments: 2976 dynamicsoft Category: Standards Track October 2000 Status of this Memo The SIP INFO Method This document specifies an Internet standards track
More informationCSCF Serving-CSCF Configuration Mode Commands
CSCF Serving-CSCF Mode Commands The Serving-CSCF Mode is used to set various commands supporting the role of the CSCF service as a Serving CSCF. Exec > Global > Context > CSCF Service > Serving-CSCF Important
More informationTelecommunication Services Engineering Lab. Roch H. Glitho
1 2 Outline 1. Introduction 2. Core SIP 3. Selected Extensions 3 Introduction: Signaling vs Media Signaling: Session establishment Session tear down Changes to the session Supplementary services Media:
More informationTechnical White Paper for NAT Traversal
V300R002 Technical White Paper for NAT Traversal Issue 01 Date 2016-01-15 HUAWEI TECHNOLOGIES CO., LTD. 2016. All rights reserved. No part of this document may be reproduced or transmitted in any form
More informationETSI TS V8.2.0 ( ) Technical Specification
TS 124 147 V8.2.0 (2009-01) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Conferencing using the IP Multimedia (IM)
More informationVoIP Security Threat Analysis
2005/8/2 VoIP Security Threat Analysis Saverio Niccolini, Jürgen Quittek, Marcus Brunner, Martin Stiemerling (NEC, Network Laboratories, Heidelberg) Introduction Security attacks taxonomy Denial of Service
More informationThe Technical Interconnect Model for IP-based voice services
The Technical Interconnect Model for IP-based voice services Alessandro Forcina Chairman WS Technical Aspects Telecom Italia Sparkle I3 Forum, 1st Technical Workshop Warsaw, June 15th 16th 2010 Ver. 1
More informationSpirent Landslide VoLTE
/IMS Node and SIP UE Emulation Voice over LTE () is the combination of IMS-based voice, messaging and video services over the 4G mobile network. To ensure a successful transition, mobile carriers and equipment
More informationImplementing a Solution to Communicate with APN Server for Sending Push Notifications
Implementing a Solution to Communicate with APN Server for Sending Push Notifications Petrika Manika Department of Informatics, University of Tirana petrika.manika@fshn.edu.al Elina Jaupllari Ict Solutions
More informationIngate SIParator /Firewall SIP Security for the Enterprise
Ingate SIParator /Firewall SIP Security for the Enterprise Ingate Systems Ingate Systems AB (publ) Tel: +46 8 600 77 50 BACKGROUND... 1 1 NETWORK SECURITY... 2 2 WHY IS VOIP SECURITY IMPORTANT?... 3 3
More informationApplication Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between CenturyLink SIP Trunk (Legacy Qwest) Service and Avaya IP Office R8.0 (16) Issue 1.0 Abstract These Application
More informationTELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call Management.
NICC London 8 November 2017 Robert Baker European Managing Director First Orion rbaker@firstorion.com 07983612843 TELEPHONE PREFERENCE SERVICE: The launch of TPS Protect and the future of Nuisance Call
More informationApplication Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Global Crossing SIP Trunking Service and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These
More informationApplication Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between Bandwidth.com SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract These
More informationInternet Engineering Task Force (IETF) Request for Comments: 8292 Category: Standards Track ISSN: November 2017
Internet Engineering Task Force (IETF) Request for Comments: 8292 Category: Standards Track ISSN: 2070-1721 M. Thomson Mozilla P. Beverloo Google November 2017 Voluntary Application Server Identification
More informationWebRTC standards update (September 2014) Victor Pascual
WebRTC standards update (September 2014) Victor Pascual Avila Victor.pascual@quobis.com @victorpascual About Me Technology, Innovation & Strategy Consultant Main focus: help make WebRTC happen involved
More informationIP Multimedia Subsystem Part 5 Marek Średniawa
IP Multimedia Subsystem Part 5 Marek Średniawa mareks@tele.pw.edu.pl Institute of Telecommunications Project is co-financed by European Union within the European Social Fund 1 Identification in IMS Identities
More informationMedia Communications Internet Telephony and Teleconference
Lesson 13 Media Communications Internet Telephony and Teleconference Scenario and Issue of IP Telephony Scenario and Issue of IP Teleconference ITU and IETF Standards for IP Telephony/conf. H.323 Standard
More informationETSI TS V ( ) Technical Specification
TS 124 628 V10.3.0 (2011-06) Technical Specification Digital cellular telecommunications system (Phase 2+); Universal Mobile Telecommunications System (UMTS); LTE; Common Basic Communication procedures
More informationNetwork Working Group. Expires: April 30, 2002 October 30, The Refer Method draft-ietf-sip-refer-02. Status of this Memo
Network Working Group R. Sparks Internet-Draft dynamicsoft Expires: April 30, 2002 October 30, 2001 Status of this Memo The Refer Method draft-ietf-sip-refer-02 This document is an Internet-Draft and is
More informationDRAFT REVISIONS BR DOMAIN VALIDATION
DRAFT REVISIONS BR 3.2.2.4 DOMAIN VALIDATION (Feb. 15, 2016) Summary of changes The primary purpose of this change is to replace Domain Validation item 7 "Using any other method of confirmation which has
More informationEmergency Services and Priority Signaling
ITU-T / ATIS Workshop Next Generation Technology and Standardization Emergency Services and Priority Signaling Martin Dolly AT&T (With credit to Percy Tarapore (AT&T) for Priority contributions) ITU-T
More informationUnsolicited Communication / SPIT / multimedia-spam
Unsolicited Communication / SPIT / multimedia-spam overview of this topic in different SDOs Thilo Ewald NGN Group, NEC Laboratories Europe NEC Europe Ltd., Heidelberg, Germany ewald@nw.neclab.eu Page
More information3GPP TR V ( )
3GPP TR 29.949 V12.0.0 (2014-12) Technical Report 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Study on technical aspects on roaming end-to-end scenarios
More informationSecure Communications on VoIP Networks
Mediatrix Multi-service Gateways v. 2.0.41.762 2017-12-21 Table of Contents Table of Contents Internet Telephony Network Security 4 Authentication 4 X-509 Certificates 4 Transport Layer Security (TLS)
More informationCS144: Sessions. Cookie : CS144: Web Applications
CS144: Sessions HTTP is a stateless protocol. The server s response is purely based on the single request, not anything else Q: How does a web site like Amazon can remember a user and customize its results?
More informationSIP as an Enabling Technology
SIP as an Enabling Technology SIP and VoIP Fundamentals Mike Taylor - CTO spscom.com 888.777.7280 Strategic Products and Services / 300 Littleton Road / Parsippany, NJ 07054 Agenda What is SIP? Acceptance
More informationReserving N and N+1 Ports with PCP
Reserving N and N+1 Ports with PCP draft-boucadair-pcp-rtp-rtcp IETF 83-Paris, March 2012 M. Boucadair and S. Sivakumar 1 Scope Defines a new PCP Option to reserve a pair of ports (N and N+1) in a PCP-controlled
More informationApplication Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1.
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between TelePacific SmartVoice SIP Connect and an Avaya IP Office Telephony Solution 1.0 Abstract These Application
More informationatl IP Telephone SIP Compatibility
atl IP Telephone SIP Compatibility Introduction atl has released a new range of IP Telephones the IP 300S (basic business IP telephone) and IP400 (Multimedia over IP telephone, MOIP or videophone). The
More informationA Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00)
A Solution Framework for Private Media in Privacy Enhanced RTP Conferencing (draft-jones-perc-private-media-framework-00) IETF 93 / July 2015 Paul E. Jones Nermeen Ismail David Benham Cisco Agenda Security
More informationThe Session Initiation Protocol
The Session Initiation Protocol N. C. State University CSC557 Multimedia Computing and Networking Fall 2001 Lecture # 25 Roadmap for Multimedia Networking 2 1. Introduction why QoS? what are the problems?
More informationRequest for Comments: Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar R.
Network Working Group J. Rosenberg Request for Comments: 3261 dynamicsoft Obsoletes: 2543 H. Schulzrinne Category: Standards Track Columbia U. G. Camarillo Ericsson A. Johnston WorldCom J. Peterson Neustar
More informationECMA st Edition / December Corporate Telecommunication Networks - Signalling Interworking between QSIG and SIP - Call Transfer
EMA-361 1 st Edition / December 2004 orporate Telecommunication Networks - Signalling Interworking between QSIG and SIP - all Transfer Standard EMA-361 1 st Edition / December 2004 orporate Telecommunication
More informationPKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006
PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy
More informationHow to implement international IP Voice Interconnections
i3 FORUM www.i3forum.org How to implement international IP Voice Interconnections different solutions for different needs presented by Alessandro Forcina (i3 Forum WS Technical Aspects Chairman) TELECOM
More informationIMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES
Daitan White Paper IMS, NFV and Cloud-based Services BUILDING INTEGRATED CLOUD COMMUNICATION SERVICES Highly Reliable Software Development Services http://www.daitangroup.com Daitan Group 2014 IMS, NFV
More informationSession Initiation Protocol (SIP)
Session Initiation Protocol (SIP) Introduction A powerful alternative to H.323 More flexible, simpler Easier to implement Advanced features Better suited to the support of intelligent user devices A part
More informationBEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C ) ) ) ) ) REPLY COMMENTS OF THE USTELECOM ASSOCIATION
BEFORE THE FEDERAL COMMUNICATIONS COMMISSION WASHINGTON, D.C. 20554 In the Matter of Call Authentication Trust Anchor ) ) ) ) ) CG Docket No. 17-97 REPLY COMMENTS OF THE USTELECOM ASSOCIATION The USTelecom
More information3GPP TS V ( )
TS 29.165 V10.10.0 (2012-12) Technical Specification 3rd Generation Partnership Project; Technical Specification Group Core Network and Terminals; Inter-IMS Network to Network Interface (NNI) (Release
More informationOracle Communications Session Router
Oracle Communications Session Router An advanced session routing proxy (SRP), Oracle Communications Session Router overcomes the challenges inherent in routing large numbers of Session Initiation Protocol
More informationLONG TERM TECHNICAL OPTIONS
LONG TERM TECHNICAL OPTIONS CRTC/MAAWG Workshop on Caller ID Spoofing Montreal June 18-19 2014 Richard Shockey Shockey Consulting Chairman of the Board SIP Forum Reston, VA 20291 richard@shockey.us Voice
More informationProximus can't be held responsible for any damages due to the use of an outdated version of this specification.
This specification describes the situation of the Proximus network and services. It will be subject to modifications for corrections or when the network or the services will be modified. Please take into
More informationAbstract. Avaya Solution & Interoperability Test Lab
Avaya Solution & Interoperability Test Lab Application Notes for Configuring SIP Trunking between the PAETEC Broadsoft based SIP Trunking Solution and an Avaya IP Office Telephony Solution Issue 1.0 Abstract
More informationENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE. Implement Session Initiation Protocol (SIP) User Agent Prototype
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE Final Project Presentation Spring 2001 Implement Session Initiation Protocol (SIP) User Agent Prototype Thomas Pang (ktpang@sfu.ca) Peter Lee (mclee@sfu.ca)
More informationRTCWEB Working Group. Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future
RTCWEB Working Group Media Security: A chat about RTP, SRTP, Security Descriptions, DTLS-SRTP, EKT, the past and the future Dan Wing dwing@cisco.com IETF83 - March 2012 v2 1 Agenda Scope Upcoming Questions
More information