summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc3924.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3924.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3924.txt')
-rw-r--r--doc/rfc/rfc3924.txt1011
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc3924.txt b/doc/rfc/rfc3924.txt
new file mode 100644
index 0000000..240054f
--- /dev/null
+++ b/doc/rfc/rfc3924.txt
@@ -0,0 +1,1011 @@
+
+
+
+
+
+
+Network Working Group F. Baker
+Request for Comments: 3924 B. Foster
+Category: Informational C. Sharp
+ Cisco Systems
+ October 2004
+
+
+ Cisco Architecture for Lawful Intercept in IP Networks
+
+Status of this Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2004).
+
+IESG Note
+
+ This RFC is not a candidate for any level of Internet Standard. The
+ IETF disclaims any knowledge of the fitness of this RFC for any
+ purpose, and in particular notes that the decision to publish is not
+ based on IETF review for such things as security, congestion control
+ or inappropriate interaction with deployed protocols. The RFC Editor
+ has chosen to publish this document at its discretion. Readers of
+ this document should exercise caution in evaluating its value for
+ implementation and deployment.
+
+Abstract
+
+ For the purposes of this document, lawful intercept is the lawfully
+ authorized interception and monitoring of communications. Service
+ providers are being asked to meet legal and regulatory requirements
+ for the interception of voice as well as data communications in IP
+ networks in a variety of countries worldwide. Although requirements
+ vary from country to country, some requirements remain common even
+ though details such as delivery formats may differ. This document
+ describes Cisco's Architecture for supporting lawful intercept in IP
+ networks. It provides a general solution that has a minimum set of
+ common interfaces. This document does not attempt to address any of
+ the specific legal requirements or obligations that may exist in a
+ particular country.
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 1]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+Table of Contents
+
+ 1. Introduction. . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 1.1. Requirements Motivating the Architecture . . . . . . . . . 3
+ 1.2. Document Organization. . . . . . . . . . . . . . . . . . . 4
+ 2. Reference Model . . . . . . . . . . . . . . . . . . . . . . . . 5
+ 2.1. Reference Model Components . . . . . . . . . . . . . . . . 6
+ 2.2. Operational Considerations . . . . . . . . . . . . . . . . 7
+ 3. Interfaces. . . . . . . . . . . . . . . . . . . . . . . . . . . 9
+ 3.1. Content Intercept Request Interface. . . . . . . . . . . . 9
+ 3.2. Intercept Content Interface (f). . . . . . . . . . . . . . 10
+ 4. Applying the Reference Model. . . . . . . . . . . . . . . . . . 11
+ 4.1. Voice over IP networks . . . . . . . . . . . . . . . . . . 11
+ 4.1.1. Interception of Voice over IP Services. . . . . . . 11
+ 4.1.2. Local Voice Services. . . . . . . . . . . . . . . . 12
+ 4.2. Data Services. . . . . . . . . . . . . . . . . . . . . . . 13
+ 5. Security Considerations . . . . . . . . . . . . . . . . . . . . 13
+ 5.1. Content Request Interface (d) - SNMPv3 Control . . . . . . 14
+ 6. Informative References. . . . . . . . . . . . . . . . . . . . . 14
+ 7. Acronyms. . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
+ 8. Authors' Addresses. . . . . . . . . . . . . . . . . . . . . . . 17
+ 9. Full Copyright Statement. . . . . . . . . . . . . . . . . . . . 18
+
+1. Introduction
+
+ For the purposes of this document, lawful intercept is the lawfully
+ authorized interception and monitoring of communications of an
+ intercept subject. The term "intercept subject", "subject", "target
+ subscriber" or "target" in this document refers to the subscriber of
+ a telecommunications service whose communications and/or intercept
+ related information (IRI) has been lawfully authorized to be
+ intercepted and delivered to some agency. Note that although the
+ term "Law Enforcement Agency" (LEA) is used throughout this document,
+ this may refer to any agency that is able to request lawfully
+ authorized interception.
+
+ By intercept related information (IRI) we mean information related to
+ the IP traffic of interest. There is currently no standardized
+ definition for IRI for IP traffic. IRI has been defined for a few
+ services that might run over IP (e.g., Voice over IP) or that IP runs
+ on top of (e.g., GPRS). For example, IRI for voice over IP could be
+ the called and calling phone numbers. The definition of IRI from
+ [14] is shown below:
+
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 2]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ Intercept Related Information: collection of
+ information or data associated with
+ telecommunication services involving the target
+ identity, specifically communication associated
+ information or data (e.g., unsuccessful
+ communication attempts), service associated
+ information or data and location
+ information.
+
+ Service providers are being asked to meet legal and regulatory
+ requirements for the interception of voice as well as data
+ communications in IP networks in a variety of countries worldwide.
+ Although requirements vary from country to country, some requirements
+ remain common even though details such as delivery formats may
+ differ. This document describes Cisco's Architecture for supporting
+ lawful intercept in IP networks. It provides a general solution that
+ has a minimum set of common interfaces. This document does not deal
+ with legal requirements or obligations.
+
+ This document describes one method for supporting lawful intercept.
+ Other methods may be available.
+
+ The IESG wishes to draw the reader's attention to RFC 2804 [15] for a
+ description of why architectures such as these are vendor-specific,
+ rather than a topic of standardization for the IETF.
+
+1.1. Requirements Motivating the Architecture
+
+ The purpose of the following list of requirements is to provide an
+ understanding of the motivation behind the architecture and some of
+ the requirements imposed on components and interfaces that are
+ described in the later sections of the document. This does not imply
+ any legal requirements on service providers or equipment vendors
+ although such requirements may coincide.
+
+ Note that there are a variety of requirements that have been defined
+ for lawfully authorized intercept throughout the world. Some of
+ these have been defined by standards bodies (e.g., [13]), while
+ others are country specific. The following itemized list is a
+ distillation of some of these, although a given item may or may not
+ apply to a specific country:
+
+ * Lawful Intercept (LI) should be undetectable by the intercept
+ subject.
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 3]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ * Mechanisms should be in place to limit unauthorized personnel from
+ performing or knowing about lawfully authorized intercepts.
+
+ * There is often a requirement (especially for telecommunications
+ services) to provide intercept related information (IRI)
+ separately from the actual Internet Protocol (IP) traffic (or
+ content) of interest (Note: some authorizations may be restricted
+ to IRI).
+
+ * If IRI is delivered separately from content, there should be some
+ means to correlate the IRI and the content with each other.
+
+ * If the information being intercepted is encrypted by the service
+ provider and the service provider has access to the keys, then the
+ information should be decrypted before delivery to the Law
+ Enforcement Agency (LEA) or the encryption keys should be passed
+ to the Law Enforcement Agency to allow them to decrypt the
+ information.
+
+ * If the information being intercepted is encrypted by the intercept
+ subject and its associate and the service provider has access to
+ the keys, then the service provider may deliver the keys to the
+ LEA.
+
+ * There is often a requirement for a service provider to be able to
+ do multiple simultaneous intercepts on a single subject. The fact
+ that there are multiple intercepts should be transparent to the
+ LEAs.
+
+ * There is often a requirement that the service provider should not
+ deliver any unauthorized information to the LEA.
+
+ The architecture and interfaces described in this document attempts
+ to address these requirements.
+
+1.2. Document Organization
+
+ Section 1 of this document lists requirements motivating the
+ architecture. Section 2 of this document describes a reference model
+ along with some operation considerations. Section 3 provides more
+ detailed requirements on the interfaces related to content
+ interception. Section 4 applies the reference model to voice over IP
+ and data intercepts and Section 5 examines security considerations.
+
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 4]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+2. Reference Model
+
+ This section describes a generic reference model (Figure 1) for
+ lawful intercept.
+
+ +--------------------+ +-----+
+ | LI Administration | HI1(a) | |
+ | Function |<--------------| |
+ +--------------------+ | |
+ | | |
+ | MD Provisioning | |
+ | Interface(b) | LEA |
+ v | |
+ +-----------+ +--------------------+ | |
+ | |<---(c)----| | | |
+ | IRI IAP |--IRI(e)-->| Mediation |----HI2(g)--->| |
+ | | | Device (MD) | | |
+ +-----------+ | |----HI3(h)--->| |
+ +--------------------+ +-----+
+ | ^
+ Intercept | | Intercepted
+ Request(d) | | Content(f)
+ | |
+ v |
+ +--------------------+
+ User | Content | User
+ ------->| IAP |-------->
+ Content +--------------------+ Content
+
+ Figure 1: Intercept Architecture
+
+ A brief description of the interfaces is included in table 1 below.
+ For a more detailed description of the interfaces refer to section 3.
+ For a description of the components refer to section 2.1.
+
+ Table 1 LI Interfaces
+
+ Interface Description
+ --------------------- -------------------------------------------
+ (a) HI1 Handover Interface 1 - Administration
+ Interface: The LEA provides intercept
+ information to the service provider
+ administration function.
+
+ (b) MD Provisioning Mediation Device provisioning interface.
+ Parameters include: target identifier,
+ duration of intercept, type of intercept,
+ etc.
+
+
+
+Baker, et al. Informational [Page 5]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+
+ (c) IRI IAP Provisioning Specifies Target identifier, duration,
+ etc. for provisioning of delivery of
+ Intercept Related Information (IRI).
+
+ (d) Content Intercept Provisioning of the Content IAP.
+ Provisioning
+
+ (e) IRI to MD Internal interface between IRI Intercept
+ Access Point (IAP) and Mediation device
+ (MD) for delivery of IRI.
+
+ (f) Content to MD Internal interface between content
+ IAP and MD for delivery of Content.
+
+ (g) HI2 Handover Interface 2: Interface between
+ the MD and LEA for delivering IRI. This
+ interface may vary from country to
+ country.
+
+ (h) HI3 Handover Interface 3: Interface between
+ the MD and LEA for delivering Content.
+ This interface may vary from country to
+ country.
+
+2.1. Reference Model Components
+
+ A brief description of the key components in the reference model is
+ as follows:
+
+ Lawful Intercept (LI) Administration Function:
+ This function provides the (typically manual) provisioning
+ interface for the intercept as a result of a court order or
+ warrant delivered by the Law Enforcement Agency (LEA). It could
+ involve separate provisioning interfaces for several components,
+ but more typically is a single interface to the Mediation Device
+ (MD), which then takes care of provisioning of other components in
+ the network. Because of the requirement in some laws to limit
+ accessibility to authorized personnel, the provisioning interface
+ has to be strictly controlled. In many cases, the identity of the
+ subject received from the LEA has to be translated into an
+ identity that can be used by the network to enable the intercept.
+
+ Intercept Access Point (IAP):
+ An IAP is a device within the network that is used for
+ intercepting lawfully authorized intercept information. It may be
+ an existing device that has intercept capability or it could be a
+
+
+
+
+Baker, et al. Informational [Page 6]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ special device that is provided for that purpose. Two types of
+ IAP's are discussed here: IAP's that provide content; and IAP's
+ that provide intercept related information (IRI).
+
+ Content IAP:
+ A content IAP is an IAP that is used to intercept the IP traffic
+ of interest.
+
+ IRI IAP: This is an IAP that is used to provide intercept related
+ information (IRI).
+
+ Law Enforcement Agency (LEA):
+ This is the agency that has requested the intercept and to which
+ the service provider delivers the information.
+
+ Mediation Device (MD):
+ The MD requests intercepts from IAPs through interfaces (c) and
+ (d) in Figure 1. The Mediation Device receives the data from the
+ IAP, packages it in the correct format (which may vary from
+ country to country) and delivers it to the LEA. In the case where
+ multiple law enforcement agencies are intercepting the same
+ subject, the mediation device may replicate the information
+ multiple times. The assumption is that the service provider
+ operates the MD (via specially authorized personnel) and that the
+ LEA only has access to interfaces (a), (g) and (h) in Figure 1.
+
+2.2. Operational Considerations
+
+ In a typical operation, a lawfully authorized surveillance request
+ arrives for a specified intercept subject. Authorized personnel
+ provision the intercept using interface (b) in Figure 1, which may be
+ for content only, IRI only or both. Once the intercept is
+ provisioned, the IAP's send the IRI and/or content to the MD, which
+ formats the information into the appropriate format for delivery to
+ the LEA. Some operational issues that need to be considered:
+
+ * Location and Address Information for Content Intercepts: In some
+ cases where the location and/or addressing information for the
+ intercept is not known until the subject registers (or makes a
+ call in the case of voice), the IRI may provide needed information
+ in order to do the content tap (e.g., the IP address and port for
+ the content streams).
+
+ * Content Encryption: If the intercept content is encrypted and the
+ service provider has access to the encryption keys (e.g., receives
+ keys in Session Description Protocol for Voice over IP), then the
+ keys can be sent via IRI. It is, however, possible for end-users
+ to exchange keys by some other means without any knowledge of the
+
+
+
+Baker, et al. Informational [Page 7]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ service provider in which case the service provider will not be
+ able to provide the keys. Content transformations could make
+ decryption at the LEA impossible. This is why the original
+ packets are provided on interface (f) rather than attempting to
+ convert them to some other format.
+
+ * Detection by the Intercept Subject: One requirement is to ensure
+ that the intercept subject is unable to detect that they are being
+ intercepted. This document assumes a sophisticated subject:
+
+ - Able to check IP addresses, use traceroute, etc.
+
+ - Able to check if any unusual signaling is occurring on their
+ customer premises equipment (CPE).
+
+ - Able to detect degradation or interruptions in service.
+
+ This is why the intercept mechanism described here does not
+ involve special requests to the CPE, re-routing of packets or
+ end-to-end changes in IP addresses. Instead, content intercept is
+ done on a device along the normal content path (i.e., no re-
+ routing has occurred) that is within the service provider's
+ network. A convenient content IAP is a router or switch at the
+ edge of the service provider's network to which the intercept
+ subject connects. This is illustrated in Figure 2.
+
+ |
+ Customer Premises | Service Provider's Network
+ |
+ +-------+
+ +-----+ | |
+ | CPE |-------------| Router|----------
+ +-----+ | (IAP) |
+ | |
+ +-------+
+
+ Figure 2 Content IAP - Router
+
+ Another possibility of course is to provide a special device along
+ the path to provide the content IAP capabilities.
+
+ Note that in the case where there is multi-homing (two or more
+ routers connected to provide access for the CPE), intercept taps
+ may have to be installed on more than one access router. If the
+ CPE is multi-homed to multiple service providers, then the
+ intercept will have to be installed on each service provider
+ separately and the LEA will have to correlate the data.
+
+
+
+
+Baker, et al. Informational [Page 8]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ * Unauthorized Creation and Detection: Another concern is the
+ prevention of unauthorized creation and detection of intercepts.
+ This is particularly important when a network element such as a
+ router is used as a content IAP. Those routers that have the
+ capability should be carefully controlled with access to intercept
+ capability and information only via authorized personnel. In one
+ approach using the reference model in Figure 1, the MD is in a
+ controlled environment and the MD does the intercept request to
+ the content IAP over an encrypted link. Logging and auditing are
+ used to detect unauthorized attempts to access the intercept
+ capability.
+
+ * Capacity: Support for lawful intercept on a network element
+ supporting customers consumes resources on that equipment.
+ Therefore, support for lawful intercept requires capacity planning
+ and engineering to ensure that revenue-producing services are not
+ adversely affected.
+
+3. Interfaces
+
+ This section provides a brief description of the interfaces in the
+ reference model (Figure 1). A list of these interfaces is included
+ in Table 1 in Section 2.
+
+ One of the objectives in defining these interfaces is to keep the
+ internal interfaces (b to f) the same regardless of country-specific
+ requirements. The MD then formats the IRI and the content to meet
+ the country specific requirements for interfaces (g) and (h).
+
+3.1. Content Intercept Request Interface
+
+ This section describes some of the requirements for the content
+ intercept request interface (d) in Figure 1. It makes use of a
+ common request protocol (SNMPv3) regardless of the type of
+ application (e.g., voice, data) and suggests the usage of a TAP-MIB,
+ which is defined in a separate document [1]. Some of the
+ considerations that lead to the use of SNMPv3 and to the definition
+ of the specific Management Information Base (MIB) defined in [1] are
+ provided here.
+
+ In order to provide a generic interface for intercepting,
+ replicating, encapsulating and transporting content packets to the
+ MD, the content intercept interface ((d) in Figure 1) should specify:
+
+ * A Filter specification for classifying the packets to be
+ intercepted.
+
+ * The destination address of the MD (where to send the packets).
+
+
+
+Baker, et al. Informational [Page 9]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ * Encapsulation and Transport parameters.
+
+ In addition, a timeout value for the intercept should also be
+ specified. This defines a limited lifetime for the intercept so that
+ failures will not result in intercepts remaining beyond their
+ authorized lifetime. If a failure of the MD occurs such that it is
+ not able to supply the refresh to the timeout, then the intercept
+ will cease to exist after the timeout expires. Similarly, if the IAP
+ re-boots, then the intercept will not survive the re-boot unless the
+ IAP is capable of ascertaining that the intercept lifetime
+ requirements will continue to be met.
+
+ In order for this to work, it must be possible for the mediation
+ device to realize that there is a failure in the IAP such that it
+ must re-establish the intercept. This may be in the form of an audit
+ (from the MD to the IAP), or in the form of a heartbeat mechanism in
+ the content stream, or both.
+
+3.2. Intercept Content Interface (f)
+
+ The encapsulation method should retain all of the information in the
+ original packets (source and destination addresses as well as
+ payload) and provide an identifier for correlating the packets with
+ the IRI. One encapsulation that meets those requirements is
+ described in Section 4 of [2]. For non-voice intercepts, the
+ "Intercepted Information" field in Table 1 of [2] contains the
+ original intercepted IP packet.
+
+ Note, however, that the interface defined in [2] is based on UDP
+ which is an unreliable and unordered transport protocol (i.e.,
+ provides neither retransmission on detection of errors nor ordering
+ of data). If this transport is used, the underlying network (Layers
+ 1 - - 3) should be engineered to meet the overall reliability
+ requirements for delivery of content.
+
+ If a more reliable transport protocol is required, then a mechanism
+ that provides timely delivery as well as limits the burden (both
+ processing and buffering) on the Content IAP should be used. One
+ mechanism that meets these requirements is a NACK-oriented
+ retransmission scheme based on [12].
+
+ If [12] is used, the call content channel identifier may be placed in
+ the SSRC field of the encapsulating RTP packet. The payload type may
+ be used to identify the type of packet encapsulated in RTP (e.g., IP,
+ PPP, Ethernet MAC). Note that usage of [12] is still under
+ investigation and may need further specification. Usage of [12] in
+ the content IAP places more processing burden on the content IAP than
+ a UDP-based intercept and can affect the capacity of the content IAP.
+
+
+
+Baker, et al. Informational [Page 10]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+4. Applying the Reference Model
+
+ This section applies the reference model to some example
+ applications.
+
+4.1. Voice over IP networks
+
+ This section will look at some of the issues surrounding interception
+ of voice over IP calls, taking local voice services as a specific
+ service example. The reference model from Figure 1 will be applied
+ with the use of a common set of interfaces that are independent of
+ the call signaling protocols in use.
+
+4.1.1. Interception of Voice over IP Services
+
+ There are a variety of architectures in use for voice over IP (e.g.,
+ centralized versus distributed) as well as various protocols (SIP
+ [6], H.323 [9], MGCP [7], H.248 [8]). There are also a variety of
+ services that may be offered:
+
+ * Local Voice Services (i.e., service to a user that has an IP phone
+ or a phone connected to a gateway)
+
+ * Transit services
+
+ * Long distance access services (e.g., calling/debit card).
+
+ This document does not address any obligations that a service
+ provider might or might not have to support intercepts. It simply
+ describes how intercept might be done using the reference model in
+ Figure 1.
+
+ Note that in the case of services where the intercept subject
+ accesses the network via a non-IP endpoint (e.g., TDM), the
+ detectability issue is less acute (e.g., re-routing of packets to
+ intercept them in a special device is a possible option), since the
+ intercept subject does not have access to the IP addresses or to
+ traceroute.
+
+ However, in the case of local services, this is a much more difficult
+ problem. The intercept for a call originating and terminating on-net
+ (i.e., a call that is voice over IP end-to-end) has to be intercepted
+ along its normal route in order to be undetectable. In addition, the
+ call-forwarding feature that is often provided as a local service
+ feature makes interception even more difficult: If call forwarding is
+ invoked, a call that was intended to terminate on the intercept
+ subject may be forwarded anywhere in the network resulting in the
+ media stream bypassing the original content IAP (since in voice over
+
+
+
+Baker, et al. Informational [Page 11]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ IP, the media stream goes directly from end-to-end). Also, since
+ call forwarding can often be set up on a call-by-call basis, the
+ location of the content IAP will often not be known until the call is
+ set up.
+
+4.1.2. Local Voice Services
+
+ This sub-section will look at the specific case in which the
+ intercept subject under surveillance is being provided with a local
+ voice service by the same provider that also provides the network
+ access (e.g., controls the edge router or switch). This is an
+ important assumption, since in VoIP the entity providing call control
+ (e.g., SIP server) can be totally separate from the entity providing
+ network access (e.g., operates edge routers).
+
+ Suppose that a subscriber that subscribes to a local (e.g.,
+ residential) voice service is a target for a lawfully authorized
+ surveillance. Part of the system providing these services is a
+ subscriber database that includes addressing information about the
+ subscriber as well information on what features are in effect (e.g.,
+ call forwarding). Some call control entity (CCE) accesses that
+ database in order to provide local services. For example, if the
+ subject has call forwarding invoked, that fact (and where to forward
+ the call) is indicated in the subscriber database. A call arriving
+ at the CCE that "owns" that subscriber can then take the appropriate
+ action (e.g., forward the call).
+
+ The CCE that "owns" the target subscriber (which could be an H.323
+ gatekeeper, a SIP proxy or a Media Gateway Controller) is provisioned
+ with the intercept parameters (e.g., subject identification
+ information such as the telephone number and where to deliver the
+ IRI). The provisioning of this CCE could be through interface (c) in
+ Figure 1. The CCE in question is the IRI IAP and once provisioned,
+ it passes the IRI to the MD. In the scenario being discussed, the
+ CCE typically remains in the signaling path throughout the call, even
+ in the call-forwarding case. Part of the IRI it passes to the MD is
+ the media signaling information (i.e., SDP [11] or H.245 [10]), which
+ includes endpoint IP address and port information for the media
+ (content) streams. Armed with this media address information, the MD
+ can determine the content IAP (e.g., [5]) and make the request via
+ interface (d). The request identifies the voice stream to be
+ intercepted based on information received in the call signaling
+ (i.e., IP addresses and UDP port numbers).
+
+ Note that the content IAP in the case of voice over IP could be an
+ edge router or a PSTN gateway (e.g., a call from the PSTN forwarded
+ to the PSTN). SIP, H.323, MGCP or H.248 call signaling protocols
+ could be used. However, the protocol (SNMPv3 [1]) used for interface
+
+
+
+Baker, et al. Informational [Page 12]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ (d), is not dependent on the type of call signaling protocol used;
+ nor is the encapsulation format and transport protocol (interface
+ "f"). The same reference model (Figure 1) with the same interfaces
+ can be used for lawfully authorized surveillance, regardless of the
+ signaling protocol and regardless of the type of service being
+ provided (Note: even though a local voice service was used in this
+ example, other voice services could use the same model and
+ interfaces).
+
+4.2. Data Services
+
+ The same model (Figure 1) can also be used for data services. In
+ this case the IRI IAP could be a server that acts as registration,
+ authentication and authorization point for the data service (e.g., a
+ RADIUS server). If a potential IRI IAP does not have the available
+ interfaces (c) and (e), the MD may have to do a content tap on
+ registration signaling in order to obtain the IRI.
+
+ The IRI in the case of a data service could include:
+
+ * The time that the user registered or de-registered for the
+ service.
+ * Addressing information (i.e., given the user identity, what IP
+ address or other information is available that could be used in
+ interface (d) to do the content tap).
+
+ Once suitable addressing information is available in order to do
+ content tapping the MD can invoke the tap via interface (d).
+
+ Clearly the IRI interfaces (c, e, g) are different for data than they
+ are for voice services. However, the content IAP is typically the
+ same (an edge router). Interfaces (d, f, and h) may also be the
+ same.
+
+5. Security Considerations
+
+ Given the sensitive nature of lawful intercept (LI) -- both from the
+ standpoint of the need to protect sensitive data, as well as conceal
+ the identities of the intercept subjects, the LI solution should have
+ the ability to provide stringent security measures to combat threats
+ such as impersonation of MD's, privacy and confidentiality breaches,
+ as well as message forgery and replay attacks.
+
+ While this document doesn't discuss issues of physical security,
+ operating system, or application hardening within the principals of
+ the LI solution, they are clearly important. In particular, the MD
+ server would be considered a prime target for attacks.
+
+
+
+
+Baker, et al. Informational [Page 13]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ In general, all interfaces should have the capability of providing
+ strong cryptographic authentication to establish the identity of the
+ principals, and be able to correlate the identity of the principal
+ with the action they are attempting to perform. All interfaces
+ should be capable of performing some sort of cryptographic message
+ integrity checking such as, for example, HMAC-MD5. Message integrity
+ checking can also be used to counter replay attacks. Privacy and
+ confidentiality considerations, may also require the use of
+ encryption.
+
+ The content and IRI IAPs also should also provide protection of the
+ identity of the intercept subject and the existence of an intercept.
+
+5.1. Content Request Interface (d) - SNMPv3 Control
+
+ For interface (d,) native SNMPv3 security module mechanism is used.
+ The additional requirement is that the IAP should support the ability
+ to protect the TAP MIB's [1] from disclosure or control by
+ unauthorized USM [3] users. VACM [4] provides the necessary tools to
+ limit the views to particular USM users, but there are also special
+ considerations:
+
+ * The ability to limit access to the appropriate TAP MIB's by only
+ those SNMPv3 USM users which have keys established and the proper
+ VACM views defined.
+
+ * Segregation of the TAP MIB such that only operators of sufficient
+ privilege level can create VACM views that include the TAP MIB
+ [1].
+
+6. Informative References
+
+ [1] Baker, F., "Cisco Lawful Intercept Control MIB", Work in
+ Progress, April 2004.
+
+ [2] PacketCable(TM) Electronic Surveillance Specification, PKT-SP-
+ ESP-I04-040723, http://www.packetcable.com/specifications/
+
+ [3] Blumenthal, U. and B. Wijnen, "User-based Security Model (USM)
+ for version 3 of the Simple Network Management Protocol
+ (SNMPv3)", STD 62, RFC 3414, December 2002.
+
+ [4] Wijnen, B., Presuhn, R., and K. McCloghrie, "View-based Access
+ Control Model (VACM) for the Simple Network Management Protocol
+ (SNMP)", STD 62, RFC 3415, December 2002.
+
+
+
+
+
+
+Baker, et al. Informational [Page 14]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+ [5] Warnicke, E., "A Suggested Scheme for DNS Resolution of Networks
+ and Gateways", Work in Progress.
+
+ [6] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
+ Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
+ Session Initiation Protocol", RFC 3261, June 2002.
+
+ [7] Andreasen, F. and B. Foster, "Media Gateway Control Protocol
+ (MGCP) Version 1.0", RFC 3435, January 2003.
+
+ [8] ITU-T Recommendation H.248.1, Gateway Control Protocol: Version
+ 2, May 2002.
+
+ [9] ITU-T Recommendation H.323, Packet-based Multimedia
+ Communications Systems, July 2003.
+
+ [10] ITU-T Recommendation H.245, Control Protocol for Multimedia
+ Communications, July 2003.
+
+ [11] Handley, M. and V. Jacobson, "SDP: Session Description
+ Protocol", RFC 2327, April 1998.
+
+ [12] Rey, J., Leon, D., Miyazaki, A., Varsa, V., and R. Hakenber,
+ "RTP Retransmission Payload Format", Work in Progress.
+
+ [13] ETSI TS 101 331, Telecommunications security; Lawful
+ Interception (LI); Requirements of law enforcement agencies.
+
+ [14] ETSI TS 33.108 v6.7.0, 3rd Generation Partnership Project;
+ Technical Specification Group Services and System Aspects; 3G
+ Security; Handover Interface for Lawful Interception (Release
+ 6).
+
+ [15] IAB and IESG, "IETF Policy on Wiretapping", RFC 2804, May 2000.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 15]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+7. Acronyms
+
+ CCE Call Control Entity
+ CMTS Cable Modem Termination System
+ CPE Customer Premises Equipment
+ ETSI European Telecommunications Standards Institute
+ GPRS Generalized Packet Radio Service
+ HMAC-MD5 Hash-based Message Authentication Code -
+ Message Digest 5
+ IAP Intercept Access Point
+ IETF Internet Engineering Task Force
+ IRI Intercept Related Information
+ ITU-T International Telecommunications Union -
+ Telecommunications Sector
+ LEA Law Enforcement Agency
+ LI Lawful Intercept
+ MGCP Media Gateway Control Protocol
+ MD Mediation Device
+ MIB Management Information Base
+ NACK Negative Acknowledgement
+ PSTN Public Switched Telecommunications Network
+ RFC Request for Comment
+ RTP Real-time Transport Protocol
+ SDP Session Description Protocol
+ SIP Session Initiation Protocol
+ SSRC Synchronization Source
+ TDM Time Division Multiplex
+ UDP User Datagram Protocol
+ USM User Service Model
+ VACM View-based Access Control Model
+ VoIP Voice over IP
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 16]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+8. Authors' Addresses
+
+ Fred Baker
+ Cisco Systems
+ 1121 Via Del Rey
+ Santa Barbara, CA 93117
+ US
+
+ Phone: +1-408-526-4257
+ Fax: +1-413-473-2403
+ EMail: fred@cisco.com
+
+
+ Bill Foster
+ Cisco Systems
+ Suite 2150
+ 1050 West Pender St.
+ Vancouver, BC, V6E 3S7
+ Canada
+
+ Phone: +1-604-647-2315
+ EMail: bfoster@cisco.com
+
+
+ Chip Sharp
+ Cisco Systems
+ 7025 Kit Creek Road
+ RTP, NC 27709 USA
+
+ Tel:+1.919.392.3121
+ EMail: chsharp@cisco.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 17]
+
+RFC 3924 Architecture for Lawful Intercept October 2004
+
+
+9. Full Copyright Statement
+
+ Copyright (C) The Internet Society (2004).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and at www.rfc-editor.org, and except as set
+ forth therein, the authors retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the ISOC's procedures with respect to rights in ISOC Documents can
+ be found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at ietf-
+ ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is currently provided by the
+ Internet Society.
+
+
+
+
+
+
+
+Baker, et al. Informational [Page 18]
+