Tech-
invite
3GPP
space
IETF
space
21
22
23
24
25
26
27
28
29
31
32
33
34
35
36
37
38
4‑5x
Content for
TR 23.784
Word version: 16.0.0
1…
4…
4
Scenarios
5
Key Issues
6
Solutions
7
Overall Evaluation
8
Conclusions
A
Reproduction of stage 1 requirements
$
Change History
4
Scenarios
p. 8
4.1
General
p. 8
4.2
Scenario 1: Discreet listening of MCPTT and MCVideo private calls
p. 8
4.2.1
Scenario 1.1: Discreet listening of MCPTT and MCVideo private calls in same MC service server
p. 8
4.2.2
Scenario 1.2: Discreet listening of MCPTT and MCVideo private calls with target receiving service from different MC service server
p. 9
4.3
Scenario 2: Discreet listening of MCPTT and MCVideo group calls
p. 10
4.4
Scenario 3: Discreet listening of MCVideo pull
p. 11
4.4.1
Scenario 3.1: Discreet listening of one to one MCVideo pull
p. 11
4.4.2
Scenario 3.2: Discreet listening of one from server MCVideo pull
p. 12
4.5
Scenario 4: Discreet listening of MCVideo push
p. 12
4.5.1
Scenario 4.1: Discreet listening of one to one MCVideo push
p. 12
4.5.2
Scenario 4.2: Discreet listening of one to server MCVideo push
p. 13
4.5.3
Scenario 4.3: Discreet listening of remotely initiated MCVideo push
p. 13
4.6
Scenario 5: Discreet listening of MCData SDS
p. 14
4.7
Scenario 6: Discreet listening of MCData file distribution
p. 15
4.7.1
Scenario 6.1: Discreet listening of file upload and file download
p. 15
4.7.2
Scenario 6.2: Discreet listening of one to one file distribution
p. 15
4.8
Scenario 7: Logging scenarios
p. 16
4.8.1
General
p. 16
4.9
Scenario 8: Limitations on discreet listening due to regulatory constraints and operator security policies
p. 17
4.9.1
Scenario 8.1: Private communication transmissions
p. 17
4.9.2
Scenario 8.2: Group communication transmissions
p. 17
5
Key Issues
p. 18
5.1
Key Issue 1: Selection of MC service for discreet listening
p. 18
5.2
Key issue 2: Group membership of authorized MC user for discreet listening
p. 19
5.3
Key issue 3: Discreet listening for MCVideo push and pull and MCData file upload and download
p. 19
5.4
Key issue 4: Discreet listening of end to end encrypted calls
p. 20
5.5
Key issue 5: Logging and replay of end to end encrypted calls
p. 20
5.6
Key issue 6: Source MC service server for discreet listening of user in group call
p. 21
5.7
Key issue 7: Discreet listening and logging for interconnected MC system
p. 21
5.8
Key issue 8: Discreet listening and logging for migrated MC service user
p. 22
5.9
Key Issue 9: Discreet listening and logging for user receiving MC service on multiple devices
p. 22
5.10
Key Issue 10: Logging of MC service users and MC service groups
p. 23
5.11
Key Issue 11: Logging of MCData content server and message store services
p. 23
5.12
Key Issue 12: Discreet listening of MCData content server and message store services
p. 24
5.13
Key issue 13: Discreet listening towards an MC service group
p. 24
5.14
Key Issue 14: Limitations on discreet listening due to regulatory constraints and operator security policies
p. 24
6
Solutions
p. 25
6.1
Solution 1: Functionality for discreet listening
p. 25
6.1.1
Description
p. 25
6.1.1.1
Functional model
p. 25
6.1.1.2
Configuration
p. 25
6.1.1.3
Procedures
p. 26
6.1.1.3.1
General
p. 26
6.1.1.3.2
Discreet listening invocation and revocation procedures
p. 26
6.1.1.3.3
Provision of discreet listening content for private communications
p. 26
6.1.1.3.4
Provision of discreet listening content for group communications
p. 27
6.1.1.3.5
Information flows for discreet listening
p. 28
6.1.2
Impacts on existing nodes and functionality
p. 28
6.1.3
Solution Evaluation
p. 28
6.2
Solution 2: Discreet listening of MCVideo push and pull
p. 28
6.2.1
Description
p. 28
6.2.1.1
Overview
p. 28
6.2.1.2
Invocation
p. 29
6.2.1.3
MCVideo push discreet listening procedure
p. 29
6.2.1.4
MCVideo pull discreet listening procedure
p. 30
6.2.1.5
Information flows for discreet listening of MCVideo push and pull
p. 31
6.2.2
Impacts on existing nodes and functionality
p. 31
6.2.3
Solution Evaluation
p. 32
6.3
Solution 3: Functionality for on-network logging and replay
p. 32
6.3.1
Description
p. 32
6.3.1.1
Functional model
p. 32
6.3.1.2
Configuration
p. 34
6.3.1.3
Procedures
p. 35
6.3.2
Impacts on existing nodes and functionality
p. 36
6.3.3
Solution Evaluation
p. 36
6.4
Solution 4: On-network logging for interconnection and migration
p. 37
6.4.1
Description
p. 37
6.4.1.1
General
p. 37
6.4.1.2
Functional model
p. 37
6.4.1.3
Configuration
p. 38
6.4.1.3.1
General
p. 38
6.4.1.3.2
Logging of group communications in partner system
p. 38
6.4.1.3.3
Logging of individual communications - option 1
p. 39
6.4.1.3.4
Logging of individual communications - option 2
p. 39
6.4.1.3.5
Logging of individual communications - option 3
p. 39
6.4.1.4
Procedures
p. 40
6.4.2
Impacts on existing nodes and functionality
p. 40
6.4.3
Solution Evaluation
p. 40
6.5
Solution 5: Discreet listening for interconnection and migration
p. 40
6.5.1
Description
p. 40
6.5.1.1
Functional model
p. 40
6.5.1.2
Configuration
p. 40
6.5.1.2.1
General
p. 40
6.5.1.2.2
User profile authorization of discreet listening - option 1
p. 41
6.5.1.2.3
Sharing the user profile for authorized users - option 2
p. 41
6.5.1.2.4
New configuration table of authorized users - option 3
p. 42
6.5.1.3
Procedures
p. 42
6.5.2
Impacts on existing nodes and functionality
p. 42
6.5.3
Solution Evaluation
p. 42
6.6
Solution 6: Discreet listening to an MCPTT group
p. 43
6.6.1
Description
p. 43
6.6.1.1
Overview
p. 43
6.6.1.2
Configuration
p. 43
6.6.1.3
Procedures
p. 44
6.6.1.3.1
Discreet listening activation and deactivation
p. 44
6.6.1.3.2
Provision of discreet listening to groups
p. 44
6.6.1.3.3
Release discreet listening to groups
p. 45
6.6.1.4
Information flows
p. 46
6.6.2
Impacts on existing nodes and functionality
p. 48
6.6.3
Solution Evaluation
p. 48
6.7
Solution 7: Logging of MCData message store and MCData content server
p. 48
6.7.1
Description
p. 48
6.7.1.1
Overview
p. 48
6.7.1.2
Logging of MCData message store services
p. 48
6.7.1.3
Logging of MCData content server transactions
p. 49
6.7.2
Impacts on existing nodes and functionality
p. 50
6.7.3
Solution Evaluation
p. 50
6.8
Solution 8: Discreet listening of MCData message store and MCData content server
p. 50
6.8.1
Description
p. 50
6.8.1.1
Overview
p. 50
6.8.1.2
Discreet listening of MCData message store services
p. 50
6.8.1.3
Discreet listening of MCData content server transactions
p. 51
6.8.2
Impacts on existing nodes and functionality
p. 52
6.8.3
Solution Evaluation
p. 52
6.9
Solution 9: Functionality for discreet listening with regulatory constraints and operator security policies
p. 52
6.9.1
Description
p. 52
6.9.1.1
Functional model
p. 52
6.9.1.2
Configuration
p. 53
6.9.1.3
Procedures
p. 53
6.9.1.3.1
General
p. 53
6.9.1.3.2
Discreet listening invocation and revocation procedures
p. 53
6.9.1.3.3
Provision of discreet listening content for private communications
p. 54
6.9.1.3.4
Provision of discreet listening content for group communications
p. 55
6.9.1.3.5
Information flows for discreet listening
p. 55
6.9.2
Impacts on existing nodes and functionality
p. 55
6.9.3
Solution Evaluation
p. 56
6.10
Solution 10: Functionality for on-network logging and replay
p. 56
6.10.1
Description
p. 56
6.10.1.1
Functional model
p. 56
6.10.1.2
Configuration
p. 57
6.10.1.3
Procedures
p. 57
6.10.2
Impacts on existing nodes and functionality
p. 57
6.10.3
Solution Evaluation
p. 58
7
Overall Evaluation
p. 58
7.1
General
p. 58
7.2
Solution evaluation
p. 58
7.3
Key issues with security implications
p. 62
8
Conclusions
p. 62
A
Reproduction of stage 1 requirements
p. 62
A.1
Requirements for discreet listening
p. 62
A.2
Requirements for recording and audit
p. 63
$
Change History
p. 64