ImageVerifierCode 换一换
格式:PDF , 页数:37 ,大小:218.42KB ,
资源ID:739915      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-739915.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ETSI TS 103 221-1-2018 Lawful Interception (LI) Part 1 Internal Network Interface X1 for Lawful Interception (V1 2 1 Includes Diskette).pdf)为本站会员(王申宇)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ETSI TS 103 221-1-2018 Lawful Interception (LI) Part 1 Internal Network Interface X1 for Lawful Interception (V1 2 1 Includes Diskette).pdf

1、 ETSI TS 103 221-1 V1.2.1 (2018-03) Lawful Interception (LI); Part 1: Internal Network Interface X1 for Lawful Interception floppy3TECHNICAL SPECIFICATION ETSI ETSI TS 103 221-1 V1.2.1 (2018-03)2 Reference RTS/LI-00156-1 Keywords interface, lawful interception ETSI 650 Route des Lucioles F-06921 Sop

2、hia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice The present document can be downloaded from: http:/www.etsi.org/standards-search The p

3、resent document may be made available in electronic versions and/or in print. The content of any electronic and/or print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any existing or perceived difference in contents between such ve

4、rsions and/or in print, the only prevailing document is the print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the

5、 current status of this and other ETSI documents is available at https:/portal.etsi.org/TB/ETSIDeliverableStatus.aspx If you find errors in the present document, please send your comment to one of the following services: https:/portal.etsi.org/People/CommiteeSupportStaff.aspx Copyright Notification

6、No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and microfilm except as authorized by written permission of ETSI. The content of the PDF version shall not be modified without the written authorization of ETSI. The copyright and the

7、foregoing restriction extend to reproduction in all media. ETSI 2018. All rights reserved. DECTTM, PLUGTESTSTM, UMTSTMand the ETSI logo are trademarks of ETSI registered for the benefit of its Members. 3GPPTM and LTETMare trademarks of ETSI registered for the benefit of its Members and of the 3GPP O

8、rganizational Partners. oneM2M logo is protected for the benefit of its Members. GSMand the GSM logo are trademarks registered and owned by the GSM Association. ETSI ETSI TS 103 221-1 V1.2.1 (2018-03)3 Contents Intellectual Property Rights 5g3Foreword . 5g3Modal verbs terminology 5g31 Scope 6g32 Ref

9、erences 6g32.1 Normative references . 6g32.2 Informative references 7g33 Definitions and abbreviations . 7g33.1 Definitions 7g33.2 Abbreviations . 8g34 Overview 9g34.1 Reference model . 9g34.2 Reference model for X1: requesting and responding . 9g34.3 Overview of security 10g34.4 Relationship to oth

10、er standards 10g34.5 Release management 10g35 Basic concepts 11g35.1 The lifecycle of a Task . 11g35.1.1 Start and end of a Task . 11g35.1.2 Identification of a Task . 11g35.1.3 Destinations 11g35.2 The lifecycle of an X1 request/response . 11g35.2.1 Identification of X1 request/response . 11g35.2.2

11、 Responding to the request . 11g35.2.3 Behaviour if a response is not received 12g35.3 Warnings and Faults . 12g36 Message Structure and Data Definitions 12g36.1 X1 Message details . 12g36.2 Message definitions: starting, modifying and stopping tasks . 13g36.2.1 ActivateTask . 13g36.2.1.1 Summary. 1

12、3g36.2.1.2 TaskDetails 14g36.2.2 ModifyTask. 16g36.2.3 DeactivateTask . 16g36.2.4 DeactivateAllTasks . 16g36.3 Message definitions: creating, modifying and removing Destinations . 17g36.3.1 CreateDestination . 17g36.3.1.1 Summary . 17g36.3.1.2 DestinationDetails . 17g36.3.2 ModifyDestination 18g36.3

13、.3 RemoveDestination . 18g36.3.4 RemoveAllDestinations 19g36.4 Message details: Getting information from NE 19g36.4.1 Introduction. 19g36.4.2 GetTaskDetails . 19g36.4.2.1 Summary . 19g36.4.2.2 TaskStatus . 20g36.4.3 GetDestinationDetails . 20g36.4.3.1 Summary . 20g36.4.3.2 DestinationStatus 21g36.4.

14、4 GetNEStatus . 21g36.4.4.1 Summary. 21g36.4.5 GetAllDetails 22g3ETSI ETSI TS 103 221-1 V1.2.1 (2018-03)4 6.4.5.1 Summary . 22g36.4.6 ListAllDetails 22g36.4.6.1 Summary . 22g36.5 Message details: Reporting issues from the NE . 23g36.5.1 Introduction. 23g36.5.2 ReportTaskIssue on given XID . 23g36.5.

15、2.1 Summary . 23g36.5.2.2 Task report types . 23g36.5.3 ReportDestinationIssue on given DID 24g36.5.3.1 Summary . 24g36.5.4 ReportNEIssue 24g36.6 Message details: Pings and Keepalives 25g36.6.1 Ping . 25g36.6.2 Keepalive 25g36.7 Protocol error details 26g37 Transport and Encoding . 27g37.1 Introduct

16、ion 27g37.2 Profile A . 28g37.2.1 Encoding . 28g37.2.2 Transport layer 28g37.2.2.1 HTTPS and HTTP . 28g37.2.2.2 How HTTP is used 28g37.2.2.3 Profile 28g38 Security. 29g38.1 Introduction 29g38.2 Transport Security 29g38.2.1 Summary . 29g38.2.2 Profile . 29g38.2.3 Key generation, deployment and storag

17、e 29g38.2.4 Authentication . 29g38.3 Additional security measures (beyond transport layer) 30g3Annex A (normative): Requirements . 31g3A.1 Basic requirements . 31g3A.1.1 Existing standards. 31g3A.2 Protocol Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, whi

18、ch is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (https:/ipr.etsi.org/). Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced i

19、n ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Trademarks The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners. ETSI claims no ownership of these except fo

20、r any which are indicated as being the property of ETSI, and conveys no right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks. Fo

21、reword This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI). The present document is part 1 of a multi-part deliverable covering the internal network interfaces for Lawful Interception as identified below: Part 1: “Internal network interface X1 for

22、 Lawful Interception“; Part 2: “Internal network interface X2 for Lawful Interception“; Part 3: “Internal network interface X3 for Lawful Interception“. Modal verbs terminology In the present document “shall“, “shall not“, “should“, “should not“, “may“, “need not“, “will“, “will not“, “can“ and “can

23、not“ are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions). “must“ and “must not“ are NOT allowed in ETSI deliverables except when used in direct citation. ETSI ETSI TS 103 221-1 V1.2.1 (2018-03)6 1 Scope The present document defi

24、nes an electronic interface for the exchange of information relating to the establishment and management of Lawful Interception. Typically, this interface would be used between a central LI administration function and the network internal interception points. Typical reference models for LI define a

25、n interface between law enforcement agencies (LEAs) and communication service providers (CSPs), called the handover interface. They also define an internal network interface within the CSP domain between administration and mediation functions for lawful interception and network internal functions, w

26、hich facilitates the interception of communication. This internal network interface typically consists of three sub-interfaces; administration (called X1), transmission of intercept related information (X2) and transmission of content of communication (X3). The present document specifies the adminis

27、tration interface X1. 2 References 2.1 Normative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the refe

28、renced document (including any amendments) applies. Referenced documents which are not found to be publicly available in the expected location might be found at https:/docbox.etsi.org/Reference/. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot gu

29、arantee their long term validity. The following referenced documents are necessary for the application of the present document. 1 ETSI TS 133 107: “Universal Mobile Telecommunications System (UMTS); LTE; 3G security; Lawful interception architecture and functions (3GPP TS 33.107)“. 2 IETF RFC 4122:

30、“A Universally Unique Identifier (UUID) URN Namespace“. 3 W3C Recommendation 28 October 2004: “XML Schema Part 2: Datatypes Second Edition“. 4 ETSI TS 103 280: “Lawful Interception (LI); Dictionary for common parameters“. 5 Recommendation ITU-T E.212: “The international identification plan for publi

31、c networks and subscriptions“. 6 ETSI TS 123 003: “Digital cellular telecommunications system (Phase 2+) (GSM); Universal Mobile Telecommunications System (UMTS); Numbering, addressing and identification (3GPP TS 23.003)“. 7 IETF RFC 3261: “SIP: Session Initiation Protocol“. 8 IETF RFC 3966: “The te

32、l URI for Telephone Numbers“. 9 IETF RFC 3508: “H.323 Uniform Resource Locator (URL) Scheme Registration“. 10 IETF RFC 4282: “The Network Access Identifier“. 11 IETF RFC 2865: “Remote Authentication Dial In User Service (RADIUS)“. 12 IETF RFC 2818: “HTTP over TLS“. 13 IETF RFC 7230: “Hypertext Trans

33、fer Protocol (HTTP/1.1): Message Syntax and Routing“. 14 IETF RFC 5246: “The Transport Layer Security (TLS) Protocol Version 1.2“. 15 IETF RFC 6176: “Prohibiting Secure Sockets Layer (SSL) Version 2.0“. ETSI ETSI TS 103 221-1 V1.2.1 (2018-03)7 16 IETF RFC 7525: “Recommendations for Secure Use of Tra

34、nsport Layer Security (TLS) and Datagram Transport Layer Security (DTLS)“. 17 IETF RFC 6125: “Representation and Verification of Domain-Based Application Service Identity within Internet Public Key Infrastructure Using X.509 (PKIX) Certificates in the Context of Transport Layer Security (TLS)“. 18 I

35、ETF RFC 4519: “Lightweight Directory Access Protocol (LDAP): Schema for User Applications“. 2.2 Informative references References are either specific (identified by date of publication and/or edition number or version number) or non-specific. For specific references, only the cited version applies.

36、For non-specific references, the latest version of the referenced document (including any amendments) applies. NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee their long term validity. The following referenced documents are not necessar

37、y for the application of the present document but they assist the user with regard to a particular subject area. i.1 OWASP TLS Cheat Sheet. NOTE: Available at https:/www.owasp.org/index.php/Transport_Layer_Protection_Cheat_Sheet. i.2 ETSI TR 103 308: “CYBER; Security baseline regarding LI and RD for

38、 NFV and related platforms“. i.3 ETSI GS NFV-SEC 009: “Network Functions Virtualisation (NFV); NFV Security; Report on use cases and technical approaches for multi-layer host administration“. i.4 ETSI GS NFV-SEC 012: “Network Functions Virtualisation (NFV) Release 3; Security; System architecture sp

39、ecification for execution of sensitive NFV components“. i.5 OWASP XML Security Cheat Sheet. NOTE: Available at https:/www.owasp.org/index.php/XML_Security_Cheat_Sheet. 3 Definitions and abbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply:

40、 destination: point to which IRI and/or CC is delivered by the NE Destination IDentifier (DID): identifier to uniquely identify a Destination internally to the X1 interface protocol error: error at the X1 protocol level (rather than any fault with ADMF or NE) NOTE: In the present document, the term

41、“error“ in general refers to a protocol error, whereas issues with systems not behaving correctly are called “faults“. task: continuous instance of interception at a single NE carried out against a set of target identifiers, identified by an X1 Identifier, starting from an activate command and endin

42、g with a deactivate command or terminating fault terminating fault: fault signalled from NE to ADMF which terminates the specific Task X1: LI interfaces internal to the CSP for management tasking X2: LI interfaces internal to the CSP for IRI delivery ETSI ETSI TS 103 221-1 V1.2.1 (2018-03)8 X3: LI i

43、nterfaces internal to the CSP for CC delivery X1 Identifier (XID): identifier to uniquely identify a Task internally to the X1 interface X1 Transaction ID: identifier used to identify a specific request/response pair 3.2 Abbreviations For the purposes of the present document, the following abbreviat

44、ions apply: ADMF ADMinistration Function AVP Attribute-Value Pair CC Content of Communication CIDR Classless Inter Domain Routing CSP Communication Service Provider DID Destination IDentifier FQDN Full Qualified Domain Name FTP File Transfer Protocol GTP-C GPRS Tunnel Protocol (Control plane) GTP-U

45、GPRS Tunnel Protocol (User plane) HI Handover Interface HTML HyperText Markup Language HTTP HyperText Transfer Protocol HTTPS HTTP over TLS IMEI International Mobile Equipment Identity IMPI IP Multimedia Private Identity IMPU IP Multimedia PUblic identity IMSI International Mobile Station Identity I

46、P Internet Protocol IRI Intercept Related Information LEA Law Enforcement AgencyLEMF Law Enforcement Monitoring Facility LI Lawful Interception MAC Media Access Control NAI Network Access Identifier NAT Network Address Translation NE Network Element NOTE: The element or function performing the inter

47、ception. NFV Network Functions Virtualisation OWASP Open Web Application Security Project SGSN Serving GPRS Support Node SIP Session Initiation Protocol SNMP Simple Network Management Protocol TCP Transmission Control Protocol TISPAN Telecommunication and Internet converged Services and Protocols fo

48、r Advanced Networking TLS Transport Layer Security TPM Trusted Platform Module UDP User Datagram Protocol UID Unique IDentifier URI Uniform Resource Identifier UTF UCS Transformation FormatsUUID Universally Unique IDentifier XID X1 IDentifier XML eXtended Markup Language XSD XML Schema Definition ET

49、SI ETSI TS 103 221-1 V1.2.1 (2018-03)9 4 Overview 4.1 Reference model The X1 interface is based on communication between two entities; the CSP Administration Function (ADMF), and the Network Element (NE) performing interception. The X1 reference model is shown in figure 1. ADMF Law EnforcementNENENENETasking interface e.g. HI-1 (out of scope)X1X1X1X1Figure 1: X1 reference model Only one ADMF shall make changes by X1 to a given NE. This is called the ADMF which is “responsible“ for that NE. Onward delivery of information from the

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1