Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services

RTS/LI-00159-5

General Information

Status
Published
Publication Date
10-Sep-2018
Technical Committee
Current Stage
12 - Completion
Due Date
24-Sep-2018
Completion Date
11-Sep-2018
Ref Project

Buy Standard

Standard
ETSI TS 102 232-5 V3.9.1 (2018-09) - Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services
English language
29 pages
sale 15% off
Preview
sale 15% off
Preview

Standards Content (Sample)

ETSI TS 102 232-5 V3.9.1 (2018-09)






TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 5: Service-specific details for IP Multimedia Services



---------------------- Page: 1 ----------------------
2 ETSI TS 102 232-5 V3.9.1 (2018-09)



Reference
RTS/LI-00159-5
Keywords
IMS, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE

Tel.: +33 4 92 94 42 00  Fax: +33 4 93 65 47 16

Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88

Important notice
The present document can be downloaded from:
http://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.

© ETSI 2018.
All rights reserved.

TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.
TM TM
3GPP and LTE are trademarks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
oneM2M logo is protected for the benefit of its Members.
®
GSM and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI

---------------------- Page: 2 ----------------------
3 ETSI TS 102 232-5 V3.9.1 (2018-09)
Contents
Intellectual Property Rights . 5
Foreword . 5
Modal verbs terminology . 5
Introduction . 5
1 Scope . 6
2 References . 6
2.1 Normative references . 6
2.2 Informative references . 7
3 Definitions and abbreviations . 7
3.1 Definitions . 7
3.2 Abbreviations . 8
4 General . 9
4.1 Reference Model for Lawful Interception . 9
4.2 Reference system model . 10
4.2.0 Overview . 10
4.2.1 Network layer Interception . 11
4.2.2 Service layer Interception . 11
4.3 General Requirements . 12
5 Interception of IP Multimedia services . 12
5.1 Identification of target of interception . 12
5.1.1 SIP Target Identification . 12
5.1.2 H.323 Target Identification . 13
5.1.3 Other Target Identifiers . 13
5.2 Interception of signalling . 13
5.2.1 Provisioning of the SIP IRI IIF . 13
5.2.2 Provisioning of the H.323 IRI IIF . 13
5.2.3 Location information . 13
5.2.4 Supplementary Services . 13
5.2.5 Additional signalling information . 14
5.3 Assigning a value to the Communication Identity Number . 14
5.3.0 Introduction. 14
5.3.1 Assigning a CIN value to SIP related IRI . 14
5.3.2 Assigning a CIN value to H.323 related IRI . 14
5.4 Events and IRI record types . 14
5.5 Interception of Content of Communication . 15
5.6 Direction for IMS IRI for Signalling Messages . 16
5.7 Direction for IMS sessions . 16
5.7.1 Direction for SIP sessions . 16
5.7.2 Direction for H.323 sessions . 16
6 Handover Interface . 16
6.1 Intercepted Related Information . 16
6.2 Correlation of IRI and CC . 17
7 ASN.1 specification for IRI and CC. 17
Annex A (informative): Interception using H.248 . 20
A.1 Purpose of this annex . 20
A.2 Notes on interception using H.248 . 20
A.2.1 Target identification (see also clause 5.1) . 20
A.2.2 Provisioning of the H.248 IRI IIF (see also clause 5.2) . 21
A.3 Problems in H.248 interception . 21
ETSI

---------------------- Page: 3 ----------------------
4 ETSI TS 102 232-5 V3.9.1 (2018-09)
A.3.1 Missing information in H.248 signalling . 21
A.3.2 Missing call content. 22
Annex B (normative): Minimum set of functional attributes to be provided . 23
B.0 Overview . 23
B.1 General requirements . 23
B.2 Result of interception . 24
B.3 Location information . 24
B.4 Time constraints . 24
B.5 Technical handover interfaces and format requirements . 25
Annex C (informative): Change request history . 26
History . 29

ETSI

---------------------- Page: 4 ----------------------
5 ETSI TS 102 232-5 V3.9.1 (2018-09)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).
The present document is part 5 of a multi-part deliverable. Full details of the entire series can be found in part 1 [2].
The ASN.1 module is also available as an electronic attachment to the original document from the ETSI site (see
clause 7 for details).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
Introduction
The present document focuses on Lawful Interception of IP Multimedia Services. It is to be used in conjunction with
ETSI TS 102 232-1 [2], in which the handling of the intercepted information is described.
ETSI

---------------------- Page: 5 ----------------------
6 ETSI TS 102 232-5 V3.9.1 (2018-09)
1 Scope
The present document specifies interception of Internet Protocol (IP) Multimedia (MM) Services based on the Session
Initiation Protocol (SIP) and Real Time Transport Protocol (RTP) and Message Session Relay Protocol (MSRP) and IP
MM services as described by the Recommendations ITU-T H.323 [6] and H.248 [7].
The present document is consistent with the definition of the Handover Interface, as described in ETSI
TS 102 232-1 [2].
The present document does not override or supersede any specifications or requirements in ETSI TS 133 108 [9] and
ETSI TS 101 671 [1].
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
NOTE: ETSI TS 101 671 is in status "historical" and is not maintained.
[2] ETSI TS 102 232-1: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 1: Handover specification for IP delivery".
[3] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation".
[4] IETF RFC 3261: "SIP: Session Initiation Protocol".
[5] IETF RFC 3550: "RTP: A Transport Protocol for Real-Time Applications".
[6] Recommendation ITU-T H.323: "Packet-based multimedia communications systems".
[7] Recommendation ITU-T H.248: "Gateway control protocol".
NOTE: H.248 was renumbered when revised on 2002-03-29. H.248 main body, Annexes A to E and Appendix I
were included in H.248.1. Subsequent annexes were sequentially numbered in the series, e.g. H.248
Annex F became H.248.2.
[8] Void.
[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; 3G security;
Handover interface for Lawful Interception (LI) (3GPP TS 33.108).
[10] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[11] ATIS-PP-1000678.2006: "Lawfully Authorized Electronic Surveillance (LAES) for Voice over
Packet Technologies in Wireline Telecommunications Networks", Version 2 (Revision of
T1.678-2004).
ETSI

---------------------- Page: 6 ----------------------
7 ETSI TS 102 232-5 V3.9.1 (2018-09)
[12] Recommendation ITU-T H.225.0: "Call signalling protocols and media stream packetization for
packet-based multimedia communication systems".
[13] Recommendation ITU-T H.245: "Control protocol for multimedia communication".
[14] Void.
[15] IETF RFC 4975: "The Message Session Relay Protocol (MSRP)".
[16] Recommendation ITU-T T.38: "Procedures for real-time Group 3 facsimile communication over
IP networks".
[17] IETF RFC 4825: "The Extensible Markup Language (XML) Configuration Access Protocol
(XCAP)".
[18] ETSI TS 124 623: "Digital cellular telecommunications system (Phase 2+); Universal Mobile
Telecommunications System (UMTS); LTE; Extensible Markup Language (XML) Configuration
Access Protocol (XCAP) over the Ut interface for Manipulating Supplementary Services (3GPP
TS 24.623)".
[19] IETF RFC 5322: "Internet Message Format".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TR 102 528: "Lawful Interception (LI); Interception domain Architecture for IP networks".
[i.2] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications".
3 Definitions and abbreviations
3.1 Definitions
For the purposes of the present document, the terms and definitions given in ETSI TS 101 671 [1], ETSI
TS 102 232-1 [2] and the following apply:
context: logical collection of H.248 terminations
IP MultiMedia service: multimedia service that utilizes the Internet Protocol (IP) for the transport of data
MultiMedia (MM): use of computers to present text, graphics, video, animation, and sound in an integrated way
MultiMedia service: communication service that offers Multimedia communication to end-users
termination: entity in H.248 that acts as a source or sink of media
NOTE: Terminations may be physical, such as a given channel on a TDM line, or ephemeral, such as an IP
endpoint.
ETSI

---------------------- Page: 7 ----------------------
8 ETSI TS 102 232-5 V3.9.1 (2018-09)
TSAP identifier: piece of information used to multiplex several transport connections of the same type on a single
H.323 entity with all transport connections sharing the same Network Address (e.g. the port number in a TCP/UDP/IP
environment)
NOTE: Transport layer Service Access Point (TSAP) identifiers may be (pre)assigned statically by some
international authority or may be allocated dynamically during the setup of a call. Dynamically assigned
TSAP identifiers are of transient nature, i.e. their values are only valid for the duration of a single call.
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
AF Administration Function
ASN.1 Abstract Syntax Notation One
CC IIF CC Internal Interception Function
CC Content of Communication
CCCI Content of Communication Control Interface
CCTF Content of Communication Trigger Function
CCTI Content of Communication Trigger Interface
CID Communication IDentifier
CIN Communication Identity Number
CLI Calling Line Identity
CSP Communications Service Provider
NOTE: Covers all AP/NWO/SvP.
DTMF Dual Tone Multi Frequency
GW GateWay
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
HTTP Hyper Text Transfer Protocol
ID IDentity
IF Interception Function
IIF Internal Interception Function
IMEI International Mobile Equipment Identity
IMS IP Multimedia Subsystem
IMPI IMS Private Identity
IMPU IMS Public Identity
IMSI International Mobile Station Identity
INI Internal Network Interface
IP Internet Protocol
IRI IIF IRI Internal Interception Function
IRI Intercept Related Information
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LI Lawful Interception
LIAF Lawful Interception Administration Function
LIID Lawful Interception IDentifier
MF Mediation Function
MG Media Gateway
MGC Media Gateway Controller
MM MultiMedia
MSRP Message Session Relay Protocol
OID Object IDentifier
PDU Protocol Data Unit
RAS Registration, Administration and Status
RTCP RTP Control Protocol
RTP Realtime Transport Protocol
SDP Session Description Protocol
SIP Session Initiation Protocol
SSD Service-Specific Details
ETSI

---------------------- Page: 8 ----------------------
9 ETSI TS 102 232-5 V3.9.1 (2018-09)
SvP Service Provider
TCP Transmission Control Protocol
TDM Time Division Multiplex
TSAP Transport layer Service Access Point
UDP User Datagram Protocol
UDPTL Facsimile UDP Transport Layer (protocol)
UE User Equipment
URI Uniform Resource Identifier
URL Uniform Resource Locator
XCAP eXtensible Markup Language (XML) Configuration Access Protocol
4 General
4.1 Reference Model for Lawful Interception
The present document adopts the generic reference model for the interception domain from ETSI TR 102 528 [i.1], its
internal intercept functions, Intercept Related Information Interception Function (IRI IIF), Content of Communication
Trigger Function (CCTF), and Content of Communication Internal Interception Function (CC IIF), and the Internal
Network Interfaces INI1, INI2, INI3, Content of Communication Trigger Interface (CCTI) and Content of
Communication Control Interface (CCCI) as shown in figure 1.

NWO/AP/SP DOMAIN LEA DOMAIN

HI
LEA
HI1
Administration Function (AF)
Administration
Function
INI1b INI1a
INI1c
IRI Internal Intercept
Function
INI2

(IRI IIF)
HI2




Law
Mediation
Enforcement
CCTI Function
Monitoring
CC Trigger
(MF)
Facility
Function
(LEMF)
(CCTF)
CCCI
CC Internal Intercept
Function
HI3
INI3
(CC IIF)

Figure 1: Reference Model for Lawful Interception
The reference model depicts the following functions and interfaces:
• INI1a provisions Intercept Related Information Internal Interception Function (IRI IIF).
• INI1b may (statically) provision Content of Communications Trigger Function (CCTF).
• INI1c provisions the Mediation Function (MF).
ETSI

---------------------- Page: 9 ----------------------
10 ETSI TS 102 232-5 V3.9.1 (2018-09)
• Intercept Related Information Internal Intercept Function (IRI IIF) generates IRI.
• Content of Communication Internal Interception Function (CC IIF) generates CC.
• Content of Communication Trigger Function (CCTF) controls CC IIF.
• Content of Communication Control Interface (CCCI) provisions CC IIF.
• Content of Communication Trigger Interface (CCTI) may trigger CCTF for provisioning of the CC IIF.
• Content of Communication Control Interface (CCCI) may dynamically provision the CC IIF.
• Internal interface INI1 carries provisioning information from LIAF to the Internal Intercept Functions (IIF).
• Internal interface INI2 carries Intercept Related Information (IRI) from IRI IIF to the MF.
• Internal interface INI3 carries Content of Communication (CC) information from CC IIF to the MF.
For an in-depth explanation of the functions and interface, refer to clause 4 of ETSI TR 102 528 [i.1].
4.2 Reference system model
4.2.0 Overview
The reference system model applied in the present document, as depicted in figure 2, provides a simplified model of a
technology independent, IP MultiMedia (MM) service platform, accessed by multiple different access networks. The
access networks may provide different forms of network access, using different technologies; they all have in common
that they provide IP connectivity among end-users and between end-users and the IP MM services provided by the IP
MM service platform.

Communication Signalling server
services

SvP IP Core network
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 2: Reference System Model
Access from the access networks into the IP Core network of the IP MM service provider is assumed to be protected by
some gateway device (e.g. a session border controller, border gateway controller or a firewall/router combination).
The IP MM Service platform contains a signalling server that provides session initiation functionality (e.g. a SIP call
manager or an H.323 gatekeeper) among end-users and between end-users and communication services (e.g. unified
messaging, audio or video conference servers).
ETSI

---------------------- Page: 10 ----------------------
11 ETSI TS 102 232-5 V3.9.1 (2018-09)
4.2.1 Network layer Interception
Network Layer interception requires a copy of all signalling information as well as call content exchanged in the
platform to be available at a central point in the infrastructure.

Communication Signalling server
services
IRI

IIF
MF
CC
SvP IP Core network
IIF
GW GW GW
IP MM SvP
IAP / NWO
Access Access Access
network network network

Figure 3: Network layer Interception Model
This can be achieved by means of span-ports in the layer 2 switching backbone or by means of passive splitters (either
copper or fibre) at strategic points in the SvP's core network. Either way, due to the bandwidth of copied network
traffic, some form of filtering will most likely be required (e.g. by means of a layer 3 switch).
4.2.2 Service layer Interception
Service Layer interception requires LI interfaces and functionality to be available in both the signalling server and the
gateways.

Communication Signalling
IRI


services server
IIF


MF
SvP IP Core network
CC CC CC
GW  GW  GW
IP MM SvP
IIF IIF IIF
IAP / NWO
Access Access Access
network network network

Figure 4: Service layer Interception Model
Typically the IRI IIF in the signalling server is provisioned with the target ID. At detection of a session setup for a
target, the IRI IIF will provide the IRI for the intercepted session and may provide session information to be used for
ad-hoc provisioning of the gateway devices. In some implementations, the gateway devices are also provisioned with
the target ID beforehand and are capable of detecting sessions independent from the signalling server.
ETSI

---------------------- Page: 11 ----------------------
12 ETSI TS 102 232-5 V3.9.1 (2018-09)
4.3 General Requirements
The following requirements regarding the interception of signalling shall apply:
1) Annex B provides the functional description of the minimal set of information that is to be provided to Law
Enforcement for each intercepted communication.
2) The present document supports the interception of communication services defined in the following
IETF/ITU-T standards and recommendations:
- IETF RFC 3261 [4] (SIP);
- IETF RFC 3550 [5] (RTP);
- IETF RFC 4975 [15] (MSRP);
- Recommendation ITU-T H.323 [6];
- Recommendation ITU-T H.225.0 [12];
- Recommendation ITU-T H.245 [13];
- Recommendation ITU-T T.38 [16].
3) Any deviation from the supported IETF and ITU-T specifications identified in item 2, e.g. vendor specific
parameters, shall be agreed in advance between the Communications Service Provider (CSP) and Law
Enforcement Agency (LEA).
4) The present document specifies the handover of intercepted signalling containing all information required in
ETSI TS 101 331 [10] by encapsulating that intercepted signalling.
5) IRI that is not part of intercepted signalling shall also be delivered. The format of such information on the
handover interface shall be agreed in advance between the CSP and LEA.
6) As a national option, mapping of the IRI information onto specific messages at the handover interface may be
mandated, e.g. according to the ATIS-PP-1000678 [11] specification.
5 Interception of IP Multimedia services
5.1 Identification of target of interception
5.1.1 SIP Target Identification
The target identity is not a network layer or transport layer address. The target identity shall be a public or private
address type that uniquely identifies the target in the CSP's network and by means of which sessions a
...

Questions, Comments and Discussion

Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.