欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ETSI TS 102 233-2006 Lawful Interception (LI) Service specific details for E-mail services (V1 3 1)《合法侦听(LI) 电子邮件业务的特定业务细节(版本1 3 1)》.pdf

    • 资源ID:738872       资源大小:210.79KB        全文页数:38页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ETSI TS 102 233-2006 Lawful Interception (LI) Service specific details for E-mail services (V1 3 1)《合法侦听(LI) 电子邮件业务的特定业务细节(版本1 3 1)》.pdf

    1、 ETSI TS 102 233 V1.3.1 (2006-09)Technical Specification Lawful Interception (LI);Service specific details for E-mail servicesETSI ETSI TS 102 233 V1.3.1 (2006-09) 2 Reference RTS/LI-00035 Keywords email, handover, interface, IP, Lawful Interception, security, traffic ETSI 650 Route des Lucioles F-0

    2、6921 Sophia Antipolis Cedex - FRANCE Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16 Siret N 348 623 562 00017 - NAF 742 C Association but non lucratif enregistre la Sous-Prfecture de Grasse (06) N 7803/88 Important notice Individual copies of the present document can be downloaded from: http:/www.et

    3、si.org The present document may be made available in more than one electronic version or in print. In any case of existing or perceived difference in contents between such versions, the reference version is the Portable Document Format (PDF). In case of dispute, the reference shall be the printing o

    4、n ETSI printers of the PDF version kept on a specific network drive within ETSI Secretariat. Users of the present document should be aware that the document may be subject to revision or change of status. Information on the current status of this and other ETSI documents is available at http:/portal

    5、.etsi.org/tb/status/status.asp If you find errors in the present document, please send your comment to one of the following services: http:/portal.etsi.org/chaircor/ETSI_support.asp Copyright Notification No part may be reproduced except as authorized by written permission. The copyright and the for

    6、egoing restriction extend to reproduction in all media. European Telecommunications Standards Institute 2006. All rights reserved. DECTTM, PLUGTESTSTM and UMTSTM are Trade Marks of ETSI registered for the benefit of its Members. TIPHONTMand the TIPHON logo are Trade Marks currently being registered

    7、by ETSI for the benefit of its Members. 3GPPTM is a Trade Mark of ETSI registered for the benefit of its Members and of the 3GPP Organizational Partners. ETSI ETSI TS 102 233 V1.3.1 (2006-09) 3 Contents Intellectual Property Rights5 Foreword.5 Introduction 5 1 Scope 6 2 References 6 3 Definitions an

    8、d abbreviations.7 3.1 Definitions7 3.2 Abbreviations .7 4 General .8 4.1 E-mail services .8 5 System model .8 5.1 Reference network topology.8 5.2 Reference scenarios9 5.2.1 E-mail send failure9 5.2.2 E-mail send success 10 5.2.3 E-mail download detail.11 5.2.4 E-mail send detail .12 6 E-mail events

    9、13 6.1 Introduction 13 6.2 E-mail send event .13 6.2.1 Introduction.13 6.2.2 E-mail send captured content14 6.2.3 E-mail send IRI.14 6.3 E-mail receive event.14 6.3.1 Introduction.14 6.3.2 E-mail receive captured content15 6.3.3 E-mail receive IRI.15 6.4 E-mail download event.15 6.4.1 Introduction.1

    10、5 6.4.2 E-mail download captured content .16 6.4.3 E-mail download IRI 16 7 E-mail attributes .16 7.1 E-mail protocol ID16 7.2 E-mail address 17 7.3 E-mail recipient list 17 7.4 E-mail sender17 7.5 Total recipient count.17 7.6 Message ID.17 7.7 Status 17 7.8 Server and client port .18 7.9 Server and

    11、 client octets sent .18 7.10 AAAInformation 18 Annex A (normative): SMTP 19 A.1 SMTP introduction.19 A.2 SMTP HI2 events .19 A.2.1 E-mail login event 19 A.2.2 E-mail send event .19 A.2.3 E-mail receive event.19 A.3 SMTP HI2 attributes 20 ETSI ETSI TS 102 233 V1.3.1 (2006-09) 4 A.4 SMTP HI2 event-rec

    12、ord mapping 20 Annex B (normative): POP3 .21 B.1 POP3 introduction21 B.2 POP3 HI2 events 21 B.2.1 E-mail login event 21 B.2.2 E-mail download event.21 B.2.3 E-mail partial download event21 B.3 POP3 HI2 attributes .22 B.4 POP3 HI2 event-record mapping .22 Annex C (normative): IMAP4.23 C.1 IMAP4 intro

    13、duction .23 Annex D (normative): E-mail ASN.124 Annex E (informative): E-mail LI requirements.27 E.1 HI2 requirements27 E.2 HI3 requirements28 E.3 General requirements .29 E.4 Requirements mapping.29 Annex F (informative): SMTP characteristics 30 F.1 SMTP service characteristics .30 F.2 SMTP protoco

    14、l characteristics .30 Annex G (informative): POP3 characteristics31 G.1 POP3 service characteristics 31 G.2 POP3 protocol characteristics 31 Annex H (informative): Discussion of webmail interception32 H.1 Webmail network topology32 H.2 Webmail protocols .32 H.3 Webmail interception .33 Annex I (info

    15、rmative): Discussion for Driving HI2 of HI334 I.1 Introduction 34 I.2 Discussion 34 I.2.1 Introduction 34 I.2.2 IP packets .35 I.2.3 TCP packets35 I.2.4 SMTP packets 35 I.2.5 E-mail messages.35 I.3 Conclusion36 Annex J (informative): Change Request History37 History 38 ETSI ETSI TS 102 233 V1.3.1 (2

    16、006-09) 5 Intellectual Property Rights IPRs essential or potentially essential to the present document may have been declared to ETSI. The information pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found in ETSI SR 000 314: “Intellectua

    17、l Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in respect of ETSI standards“, which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web server (http:/webapp.etsi.org/IPR/home.asp). Pursuant to the ETSI IPR Policy, no investigatio

    18、n, including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become, essential to the present document. Foreword This Technical Specification

    19、 (TS) has been produced by ETSI Technical Committee Lawful Interception (LI). Introduction The present document describes what information is required for the handover of intercepted IP-based E-mail traffic from a Communications Service Provider to an LEMF. The present document covers a stage 2 desc

    20、ription of the data, but does not specify any functionality within the scope of TS 102 232 3. The ITU-T Recommendation I.130 6 method for characterizing a service will be used as a general framework for the present document. The modified concept of a “stage 1“ will be called the “attributes“ of the

    21、interface. The attributes of the interface are the sum total of all the constituent attributes that an interface may need to communicate. The modified concept of a “stage 2“ will be called the “events“ of the interface. The events of the interface define the rules of the relationships between the at

    22、tributes that are required to arrange the disjoint attributes into meaningful information for an E-mail service interaction. The present document is intended to be general enough to be used in a variety of E-mail services. It should be recognized that a side effect of this approach is some IRI field

    23、s identified may be difficult to extract or non-existent depending on the E-mail service being intercepted. In such cases it may be completely reasonable that the delivered IRI contain empty fields or fields with the value 0. ETSI ETSI TS 102 233 V1.3.1 (2006-09) 6 1 Scope The present document conta

    24、ins a stage 1 like description of the interception information in relation to the process of sending and receiving E-mail. The present document also contains a stage 2 like description of when Intercept Related Information (IRI) and Content of Communication (CC) shall be sent, and what information i

    25、t shall contain. It is recognized that “Instant Messenger“ and “Chat“ applications are another way of exchanging electronic text messages. While the present document may be applicable to such applications it is in no way a goal of the present document to address these methods of electronic text mess

    26、aging. The definition of handover transport and encoding of HI2 and HI3 is outside the scope of the present document. Refer to TS 102 232 3. The present document is designed to be used where appropriate in conjunction with other deliverables that define the service specific IRI data formats. The pre

    27、sent document aligns with TS 133 108 5, TS 101 671 4, TS 101 331 1 and TR 101 944 2. 2 References The following documents contain provisions which, through reference in this text, constitute provisions of the present document. References are either specific (identified by date of publication and/or

    28、edition number or version number) or non-specific. For a specific reference, subsequent revisions do not apply. For a non-specific reference, the latest version applies. Referenced documents which are not found to be publicly available in the expected location might be found at http:/docbox.etsi.org

    29、/Reference. 1 ETSI TS 101 331: “Lawful Interception (LI); Requirements of Law Enforcement Agencies“. 2 ETSI TR 101 944: “Telecommunications security; Lawful Interception (LI); Issues on IP Interception“. 3 ETSI TS 102 232: “Lawful Interception (LI); Handover specification for IP delivery“. 4 ETSI TS

    30、 101 671: “Lawful Interception (LI); Handover interface for the lawful interception of telecommunications traffic“. 5 ETSI TS 133 108: “Universal Mobile Telecommunications System (UMTS); 3G security; Handover interface for Lawful Interception (LI) (3GPP TS 33.108)“. 6 ITU-T Recommendation I.130: “Me

    31、thod for the characterization of telecommunication services supported by an ISDN and network capabilities of an ISDN“. 7 IETF RFC 0822: “Standard for the format of ARPA Internet text messages“. 8 IETF RFC 1939: “Post Office Protocol - Version 3“. 9 IETF RFC 2821: “Simple Mail Transfer Protocol“. 10

    32、IETF RFC 3501: “Internet Message Access Protocol - Version 4 rev1“. 11 ITU-T Recommendation X.680/ISO/IEC 8824-1: “Information technology - Abstract Syntax Notation One (ASN.1): Specification of basic notation“. 12 ISO 3166-1: “Codes for the representation of names of countries and their subdivision

    33、s - Part 1: Country codes“. ETSI ETSI TS 102 233 V1.3.1 (2006-09) 7 13 IETF RFC 2554: “SMTP Service Extension for Authentication“. 14 ETSI TR 102 503: “ASN.1 Object Identifiers in Lawful Interception Specifications“. 15 IETF RFC 3493: “Basic Socket Interface Extensions for IPv6“. 3 Definitions and a

    34、bbreviations 3.1 Definitions For the purposes of the present document, the following terms and definitions apply: E-mail Address: ARPANET E-mail address NOTE: As described in RFC 0822 7, clause 6. IMAP4: protocol used to manipulate mailbox parameters on a server NOTE: Described in RFC 3501 10. mailb

    35、ox: destination point of E-mail messages POP3: widely used protocol for downloading E-mails from a server to a client NOTE: Described in RFC 1939 8. recipient: E-mail address of a destination mailbox for an E-mail being transmitted NOTE 1: Each E-mail may contain one or more recipients. NOTE 2: In t

    36、his definition there is no distinction made between E-mail addresses on a “To:“ line and E-mail addresses on a “Cc:“ or “Bcc:“ line. They are all “recipients“ of the E-mail. sender: E-mail address of the mailbox that originated an E-mail being transmitted NOTE: Each E-mail contains only one sender.

    37、SMTP: widely used protocol for transferring E-mails between computers NOTE: Described in RFC 2821 9. 3.2 Abbreviations For the purposes of the present document, the following abbreviations apply: APOP POP3 authentication message ASN.1 Abstract Syntax Notation One CC Content of Communication CPE Cust

    38、omer Premises Equipment HI2 Handover Interface port 2 (for Intercept Related Information) HI3 Handover Interface port 3 (for Content of Communication) HTTP Hyper Text Transfer Protocol IMAP4 Internet Message Access Protocol version 4 IP Internet Protocol IRI Intercept Related Information ISDN Integr

    39、ated Services Digital Network ISP Internet Service Provider LEA Law Enforcement Agency LEMF Law Enforcement Monitoring Facility MF Mediation Function MTA Mail Transfer Agents ETSI ETSI TS 102 233 V1.3.1 (2006-09) 8 NWO Network Operator OID Object Identifier POP3 Post-Office Protocol version 3 PSTN P

    40、ublic Switched Telecommunication Network RETR POP3 Retrieve message SMTP Simple Mail Transfer Protocol SP Service Provider TCP Transmission Control Protocol 4 General 4.1 E-mail services E-mail services are those services which offer the capability to transmit or receive ARPANET text messages. The f

    41、ollowing description is taken from RFC 0822 7: “In this context, messages are viewed as having an envelope and contents. The envelope contains whatever information is needed to accomplish transmission and delivery. The contents compose the object to be delivered to the recipient“. E-mail service, in

    42、 general, can be divided into two categories: those services which allow a computer to transfer a message to another computer; and those services which allow users to manipulate their mailbox by doing such things as downloading messages from the mailbox and deleting messages from the mailbox. Both o

    43、f these categories of E-mail services can be of interest to Law Enforcement Agencies (LEAs) and are therefore within the scope of the present document. NOTE: When using IP-packet delivery, control level packets that are associated with the targeted E-mail may be delivered as content. Control level p

    44、ackets are those packets that are used by the E-mail transfer protocol to set-up the E-mail communication and to terminate the E-mail communication and are outside of the traditional RFC 0822 7 formatted E-mail. This allows for different interception solutions without burdening the Mediation Functio

    45、n (MF) with the responsibility of “cleaning“ up said differences in input. 5 System model 5.1 Reference network topology The network topology shown in figure 1 is intended to represent the many relationships that may exist between the entities involved in E-mail communications. Actual scenarios usin

    46、g this diagram are enumerated in clause 5.2. The following should be considered when viewing figure 1: The term “Mail Server“ is used to represent a logical entity that relays mail for its mail clients, receives and (temporarily) stores mail for its mail clients, and allows mail clients access to th

    47、e aforementioned stored mail and the ability to delete it from the mail server. The term “Mail Client“ is used to represent a logical entity that either injects mail into the network or removes mail from the network or reads mail from the network. Mail Client and Mail Server numbers are used to indi

    48、cate what entities share a client-server relationship, so Mail Client1 is a client of Mail Server1, etc. A Mail Server may communicate with any other Mail Server within figure 1. NOTE: Web access to mail is commonly used; web mail is addressed in annex H. ETSI ETSI TS 102 233 V1.3.1 (2006-09) 9 Mail

    49、 Server2 Mail Server1 Customer CPE Mail ClientCustomer CPE Mail Client 3a CPE Mail ClientCPE Mail Client 3b IP Network IP Network IP Network IP Network Mail Server4 Log Mail Server3 Log Log Log Figure 1: Reference network topology 5.2 Reference scenarios 5.2.1 E-mail send failure It may occur that E-mails sent into the Internet do not reach their intended target. The most common reason for this would seem to be a mistaken E-mail address, but could also be problems contacting the receiving mail server or other


    注意事项

    本文(ETSI TS 102 233-2006 Lawful Interception (LI) Service specific details for E-mail services (V1 3 1)《合法侦听(LI) 电子邮件业务的特定业务细节(版本1 3 1)》.pdf)为本站会员(proposalcash356)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开