Re: caller ID and implementer's guide
Pete,
Just a note about the security matter you mention. Some PC based H.323 endpoints allow one, with just a little knowledge, to persuade them to output debugging which includes all elements of decoded RAS/Q.931-H.225.0/H.245 messages. This is clearly "undesirable" when security of information contained in such messages is required! It also might be quite hard for some people to switch off. I don't have a solution to this: I just raise it as an issue.
Regards, Chris -- Dr Chris Purvis - Senior Development Engineer, WAVE CC Software Madge Networks Ltd, Wexham Springs, Framewood Road, Wexham, Berks. ENGLAND Phone: +44 1753 661 359 email: cpurvis@madge.com
-----Original Message----- From: Pete Cordell [mailto:pete.cordell@BTINTERNET.COM] Sent: 13 May 1999 10:05 To: ITU-SG16@MAILBAG.INTEL.COM Subject: Re: caller ID and implementer's guide
Paul,
I now understand where you are coming from when you say that the first scheme is proprietary.
However, I think it's slightly different because, although someone might be upset if you sent H.261 data to an H.263 decoder, they are unlikely to sue you for disclosing information that has been requested to be kept private, as might be the case if the calling party's telephone number is displayed when it has been requested not to be. Hence the need for trust, because if the entity you send the information to does not honour your request, you could end up with some very expensive legal fees!
(As a side note, some sort of calling party id is probably required for legal reasons, such as tracing emergency calls. Hence remaining private by not including the calling party id is not an option. I'm not sure if this is what we are talking about , but what is really needed is something that only lets those that are allowed to know to access the information. The case of the switched network is slightly different to that of IP because the former is essentially a secure network behind a firewall. The Internet and most other IP networks does not generally mirror this model and so a different solution is required. What is probably required is a supplementary service that does call tracing using suitable cryptographically secure tokens that are known only to those that are allowed to do call tracing.)
Pete
============================================= Pete Cordell pete.cordell@btinternet.com =============================================
-----Original Message----- From: Paul Long Plong@SMITHMICRO.COM To: ITU-SG16@MAILBAG.INTEL.COM ITU-SG16@MAILBAG.INTEL.COM Date: 12 May 1999 14:20 Subject: Re: caller ID and implementer's guide
Pete,
Sorry. I did indeed believe that you were saying that a
vendor could take
ownership of an IE, which would be a proprietary and rather dangerous solution. "We" or "SG16" in place of "you" might have been a
better choice of
words. Your first solution is still proprietary, though. Your counter
argument
is weak because one could use it for all otherwise
proprietary features, e.g.,
"only send H.261 on a channel established for H.263 to an
entity that you
trust to expect this."
Paul Long Smith Micro Software, Inc.
-----Original Message----- From: Pete Cordell [SMTP:pete.cordell@BTINTERNET.COM] Sent: Wednesday, May 12, 1999 6:27 AM To: ITU-SG16@MAILBAG.INTEL.COM Subject: Re: caller ID and implementer's guide Paul, I disagree that these are proprietary solutions. The first is a matter of policy and so falls into a
slightly grey
area, but ideally the standard would say something like 'only send
presentation
restricted information to an entity that you trust
to honour the
request.'
The second is definitely NOT an action you could take at a
proprietary
level as the standards body still holds the right to
define new IEs. Any
such action would have to be approved by the standards
body. When I said
'...YOU could take further ownership...', the 'you' was
intended to refer to
SG16.
As such a change is small and localised, it would be safe to
implement
it even if it was mentioned only in a determined
document (which is the
way the procedure is supposed to work after all anyway!)
which could be
achieved at the Chile meeting. A fix in the ASN.1 would have to
wait for the
decided version as that needs to wait until all such
additions are present.
Pete ============================================= Pete Cordell pete.cordell@btinternet.com =============================================
participants (1)
-
Chris Purvis