Registration of media type "application/nss"
Scott Hollenbeck
sah at 428cobrajet.net
Wed Jan 5 00:11:06 CET 2005
Forwarding a link to the published specification for the request described
below:
http://www.itu.int/rec/recommendation.asp?type=folders&lang=e&parent=T-REC-Q
.1980.1
Note that it's not available without paying a fee.
-Scott-
> -----Original Message-----
> From: Scott Hollenbeck [mailto:sah at 428cobrajet.net]
> Sent: Thursday, December 30, 2004 7:59 PM
> To: 'Mike Hammer'; iesg at ietf.org
> Cc: ietf-types at iana.org; iana at iana.org
> Subject: RE: Registration of media type "application/nss"
>
> Mike,
>
> Request received. I will shepherd your request once the
> ietf-types review has been completed and any comments have
> been addressed. Please contact me directly at the end of the
> two-week review period and we'll go from there.
>
> Can you provide a link to the published specification
> referenced below?
>
> -Scott-
>
> > -----Original Message-----
> > From: Mike Hammer [mailto:mhammer at cisco.com]
> > Sent: Thursday, December 30, 2004 1:52 PM
> > To: iesg at ietf.org
> > Cc: ietf-types at iana.org; iana at iana.org
> > Subject: Registration of media type "application/nss"
> >
> > This email requests that the IESG approve the assignment of
> the media
> > subtype as described in the registration template below.
> >
> > Reference: draft-freed-media-type-reg-01.txt, August 17, 2004,
> > Media Type Specifications and Registration Procedures,
> > Section 5, Registration Procedures,
> > Section 10, Registration Template.
> >
> > To: ietf-types at iana.org
> > Subject: Registration of media type "application/nss"
> >
> > Type name: application
> >
> > Subtype name: nss
> >
> > Required parameters: none
> >
> > Optional parameters: charset
> >
> > Encoding considerations: binary (Note: Data is in US-ASCII range.)
> >
> > Restrictions on usage: none
> >
> > Security considerations:
> >
> > NSS has the potential to disclose private customer information
> > and the potential for modification of NSS bodies during message
> > transport to manipulate call setup, mid-call events, or call
> > release. Modification means the addition of an NSS body where
> > none existed, the removal of an NSS body where one existed, or
> > the changing of contents of existing NSS bodies in messages.
> > NSS can reveal information about telephone subscribers that is
> > requested to remain private. Security mechanisms must be
> > provided to meet privacy agreements and regulations.
> >
> > NSS can be deployed as an interdomain signaling mechanism and
> > may be subject to trust relationships and agreements between
> > administrative domains as well as legal requirements in various
> > jurisdictions. NSS can affect routing of telephone calls and
> > associated billing. Security mechanisms must be provided to
> > control fraud, malicious intents, and unintended consequences.
> > Such mechanisms include the ability to selectively filter or map
> > and forward each information element within NSS upon
> entry or exit
> > of an administrative domain. All information from
> unauthenticated
> > entities must be validated and authorized before being
> mapped and
> > forwarded in subsequent signaling messages. Such checks are
> > particularly needed when information is mapped to/from
> SIP headers.
> >
> > When encapsulated by SIP, the integrity and
> confidentiality of SIP
> > messages containing NSS bodies MUST be addressed through
> the use of
> > Transport Layer Security (TLS) or Internet Protocol Security
> > (IPSEC)
> > mechanisms as described in the Session Initiation
> Protocol RFC 3261
> > on signaling hops between nodes trusted to handle PSTN
> signaling.
> > When intermediate hops are not trusted, end-to-end integrity and
> > confidentiality may be addressed using RFC 2633,
> > "Secure/Multipurpose
> > Internet Mail Extensions (S/MIME) Version 3 Message
> Specification",
> > June 1999. NSS MIME bodies SHOULD be secured using S/MIME to
> > mitigate
> > concerns with authentication of the sender, integrity protection
> > during transit, and confidentiality protection from
> disclosure to
> > unauthorized third parties. NSS endpoints MUST support S/MIME
> > signatures and SHOULD support S/MIME encryption.
> >
> > For H.323-based encapsulation of NSS bodies, the security
> > mechanisms
> > of ITU-T Recommendation H.235, "Security and encryption for
> > H-series
> > (H.323 and other H.245-based) multimedia terminals",
> August 2003,
> > must
> > be used to provide integrity and confidentiality.
> >
> > NSS consists of well defined message types and parameters.
> > Arbitrary
> > content or directives within field values is not permitted.
> >
> > NSS does not employ "active content."
> >
> > NSS contains fields which instruct whether privacy data such as
> > calling party's number is to be presented or restricted.
> >
> > NSS is used without and is silent about compression. Use of
> > compression
> > in conjunction with NSS does not present any security issues.
> >
> > Interoperability considerations: Compatibility mechanisms are
> > defined in Q.1980.1.
> >
> > Published specification: ITU-T Recommendation Q.1980.1, "The
> > Narrowband
> > Signalling Syntax (NSS) - Syntax Definition", December 2004.
> >
> > Applications which use this media type: Applications in PSTN
> > Gateways and call control application servers.
> >
> > Additional Information:
> >
> > Magic numbers: None
> >
> > File Extensions: None
> >
> > Macintosh File Type Codes: None
> >
> > Object Identifiers: {itu-t(0) recommendation(0) q(17) 1980 1}
> > (0.0.17.1980.1)
> > See ITU-T Recommendation H.323 Annex M.4 "Tunnelling of
> > Narrowband Signalling Syntax (NSS) for H.323", December 2004.
> >
> > Intended Usage: COMMON
> >
> > Person to contact for further information:
> >
> > Name: Michael Hammer
> > E-Mail: mhammer at cisco.com
> > Author/Change controller: ITU-T Study Group 11
> >
> > END
> >
> >
>
>
More information about the Ietf-types
mailing list