overview of calea conformance proposed standard ptsc laes 2006 084r6 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6 PowerPoint Presentation
Download Presentation
Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6

Loading in 2 Seconds...

play fullscreen
1 / 29

Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6 - PowerPoint PPT Presentation


  • 112 Views
  • Uploaded on

Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6. Manish Karir. Outline. Architectural Assumptions Internet Access Service Provider Model Electronic Surveillance Model Vocabulary Building CALEA Functions Functional Breakdown of Components

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6' - tiponya


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
overview of calea conformance proposed standard ptsc laes 2006 084r6

Overview of CALEA Conformance Proposed Standard PTSC-LAES-2006-084R6

Manish Karir

outline
Outline
  • Architectural Assumptions
    • Internet Access Service Provider Model
    • Electronic Surveillance Model
    • Vocabulary Building
  • CALEA Functions
    • Functional Breakdown of Components
    • Architecture, Interfaces and Intercept Access Points
  • CALEA conformance
    • Timing Requirements
    • CmII/CmC Packet Formats and Encapsulation
    • General IASP Requirements
  • Re-Cap and Conclusions
internet access services model
Internet Access Services Model

Source: PTSC-LAES-2006-084R6

internet access and services model user s three steps to gaining access
Internet Access and Services ModelUser’sThree Steps to Gaining Access
  • Reg-F - Registration Function:
      • The act of a user getting access to the network (e.g. login/authentication of any sort)
  • Res-F - Reservation Function:
      • The user requesting resources from the network (e.g. requesting an IP address, temporary addresses are not included)
  • PT-F - Packet Transfer Function:
      • Transfer of Layer-3 packets to/from the Internet
electronic surveillance model components and responsibilities
Electronic Surveillance ModelComponents and Responsibilities
  • Service Provider Administration

Responsible for the Access and Delivery Functions

  • Access Function (AF)

Consists of one or more Intercept Access Points (IAPs)

  • Delivery Function (DF)

Transfer of data from the Access Function to the Delivery Function

  • Law Enforcement Administration

Controls the LEA collection function

  • Collection Function (CF)

Location where the communication intercepts are stored

Internet Access Service

Provider Responsibility

Law Enforcement

Responsibility

electronic surveillance model
Electronic Surveillance Model

Source: PTSC-LAES-2006-084R6

more definitions acronyms
More Definitions /Acronyms
  • LI - Lawful Intercept
  • CmII - Communication Identifying Information (e.g. packet headers…but more…)
  • CmC - Communication Content (e.g. the packets)
  • IAP - Intercept Access Point
  • Combinations:
    • AACmII - Access Associated CmII
    • CACmII - Content Associated CmII
    • CmC-IAPs - The point in the network where communication content is intercepted
    • CmII-IAPs - The point in the network where communication headers are intercepted
    • Note: CmC-IAPs might be different from CmII-IAPs
the 3 key concepts
The 3 Key Concepts
  • CmC - Communication Content
    • Captured at CmC-IAPs, full packets
    • Packets are passed to Delivery Function(DF)
    • The DF transfers these to the LEA Collection Function (CF)
  • AACmII - Access Associated CmII
    • Essentially login/logout and authorization activity
    • DHCP IP address assigned
    • Information provided to CF via the DF

cont.

the 3 key concepts cont
The 3 Key Conceptscont.

3. CACmII - Content Associated CmII - 2 methods

  • Intercept packet stream to/from subject and extract IP header information, port information is optional,(but might be authorized) finally deliver all header information to DF or deliver summary records
  • Sample subjects flows such that no flow can exist without being sampled and deliver summary records to LEA
functional breakdown
Functional Breakdown
  • CmC/CmII Access Function (AF):
    • Responsible for identifying/isolating CmC/CmII for the subject and presenting it to the MF/DF
  • CmC/CmII Mediation Function (MF):
    • Responsible for the presentation of captured information into the appropriate format for delivery to LEA
  • CmC/CmII Deliver Function (DF):
    • Responsible transmitting data from IASP to the collection function of the LEA
functional lawful intercept architecture
Functional Lawful Intercept Architecture

Source: PTSC-LAES-2006-084R6

packet delivery interface df cf interface
Packet Delivery Interface DF-CF Interface

Source: PTSC-LAES-2006-084R6

delivery timing requirements
Delivery Timing Requirements
  • Event Timestamps: Each intercepted message should contain an accurate timestamp
    • CmII: timestamp should be accurate to within 200ms
    • CmC: timestamps need to be provided with each packet
  • Event Timing: Intercepted messages should be sent to LEA within specified time window
    • CmII should be sent by the DF to the CF within 8 seconds 95% of the time
    • CmC: ???
timing requirements
Timing Requirements

Source: PTSC-LAES-2006-084R6

T1 is dependent in IASP

T2 is jointly determined by IASP and LEA by choice of agreed upon protocols and facilities

cmii access messages
CmII Access Messages

Access Messages: Notify LEA of access related functions performed by the subject including:

  • Access Attempt (login) - subject begins the network authentication process
  • Access Accepted - sent when subject has successfully authenticated with network AAA
  • Access Failed - user provides invalid username/ password or MAC address

cont.

cmii access messages cont
CmII Access Messagescont.
  • Access Session End (logout) - subject initiates disconnect
  • Access Rejected - network rejects login attempt e.g. user is already logged in somewhere else and network does not allow multiple logins
  • Signaling Message Report - (RADIUS, DIAMETER, etc.) may be used in place of the previous messages
cmii packet data messages
CmII Packet Data Messages

Packet Data Messages: Notify LEA of data related events performed by the subject

  • Packet Data Session Start - sent when subject completes login and and IP address has been assigned
  • Packet Data Session Failed - login is successful but no IP address, e.g. DHCP pool exhausted
  • Packet Data Session End - session timeout
cmii packet data messages1
CmII Packet Data Messages

Packet Data Messages: Notify LEA of data related events performed by the subject

  • Packet Data Session Already Established - when surveillance starts after subject login
  • Packet Data Header Report - packet header reports on a per-packet basis
  • Packet Summary Report - periodic summary reports of packet header data
example cmii message formats
Example CmII Message Formats

Packet Header Data

Report CmII Message

Access Accepted

CmII Message

cmc message delivery options
CmC Message Delivery Options
  • SCTE Datagram Format
  • ATIS
  • IAS Datagram
    • Encapsulation Approach - one packet per encapsulated datagram
    • UDP/IP based encapsulation; TCP or other transport protocols are optional
    • IC-APDU - Protocol Data Unit Approach - multiple packets per Datagram
  • We focus on the IAS Datagram approach as it is the simplest
ias datagram encapsulation approach
IAS Datagram Encapsulation Approach
  • One intercepted packet in each encapsulated UDP datagram
  • Src IP is the address of DF Dst IP is address of CF
  • Port numbers in UDP header may be agreed upon by LEA and IASP
  • ContentID field is ASCII value that allows correlation between CmC and CmII

**Timestamp is RFC3339 compliant:

YYYY-MDDThh:mm:ss.sssZ

**Intercepted Packet includes all headers

ias datagram apdu approach
IAS Datagram - APDU Approach

A simple extension of theencapsulation approach, to include multiple intercepted packets in a single encapsulated packet.

subject identification two aspects
Subject IdentificationTwo Aspects
  • Login Identification:
    • When network requires authentication prior to use
    • CmC and CmII is performed only after subject has been identified on the network
    • After login; subject can be identified via unique IP address or session identifier assigned to subject during login

cont.

subject identification two aspects cont
Subject IdentificationTwo Aspects, cont.
  • Equipment Identification:
    • When network does not require authentication prior to use
    • Subject is identified via unique address or interface
    • Intercept in this scenario may be based on MAC address, IP address or physical/logical port
six iasp requirements
Six IASP Requirements
  • Privacy: IASP shall not monitor or permanently record subjects communications
  • Isolation: IASP shall ensure that only the subjects communication is intercepted
  • Transparency: IASP shall perform the intercept in a manner such that the subject cannot reasonably detect that intercept is being performed

cont.

six iasp requirements cont
Six IASP Requirementscont.

4.Encryption/Compression: IASP shall deliver the intercept data unencrypted or provide the LEA with encryption method and keys. IASP shall provide data uncompressed or identify means to decompress

5.Security/Integrity: IASP shall ensure unaltered delivery of intercept data. Security is to be negotiated between IASP and LEA

6.Performance/Quality: IASP should be able to perform multiple intercepts at the same time

re cap and conclusions
Re-cap and Conclusions
  • This is a simplified overview of the standard

- Not a substitute for a detailed reading and interpretation.

  • This is a broad introduction to the draft standard.

- Terminology used

    • Rough of the structure of the proposed standard

cont.

re cap and conclusions remember
Re-cap and Conclusions – Remember:
  • The standard itself is unclear in certain areas - for example:
    • The use of encryption by IASP to protect the CmC
    • Specifics such as what is the caseID and how is it different from content identifier, IAP system identity, subscriber ID etc.
    • Implementation details such as what are the sizes of the various fields in the packet headers, what are the timing requirements for CmC delivery
  • Important to remember that it is still a “draft” standard and subject to revision.