ETSI TS 102 232-1 V3.31.1 (2024-01)
Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery
Lawful Interception (LI); Handover Interface and Service-Specific Details (SSD) for IP delivery; Part 1: Handover specification for IP delivery
RTS/LI-00248-1
Zakonito prestrezanje (LI) - Izročilni vmesnik in storitveno specifične podrobnosti (SSD) za IP-dostavo vsebin - 1. del: Izročilna specifikacija za IP-dostavo vsebin
Ta dokument določa splošne vidike vmesnikov HI2 in HI3 za izročanje prek omrežij, ki temeljijo na internetnem protokolu (IP).
Ta dokument:
• določa modularni pristop za določanje izročilnih vmesnikov na podlagi internetnega protokola;
• določa glavo oziroma glave, ki se dodajo podatkom o prestreženi komunikaciji (IRI) in vsebini komunikacije (CC), poslanim prek vmesnika HI2 oziroma HI3;
• določa protokole za prenos podatkov o prestreženi komunikaciji in vsebine komunikacije prek izročilnih vmesnikov;
• določa profile protokolov za izročilni vmesnik.
Kjer je to ustrezno, je treba ta dokument uporabljati v povezavi z drugimi dokumenti, ki določajo storitveno specifične oblike zapisa podatkov o prestreženi komunikaciji (vključno z dokumenti ETSI TS 102 227 [i.1], ETSI TS 101 909-20-1 [33], ETSI TS 101 909-20-2 [34], ETSI TS 102 232-2 [5], ETSI TS 102 232-3 [6], ETSI TS 102 232-4 [32], ETSI TS 102 232-5 [37], ETSI TS 102 232-6 [36] in ETSI TS 102 232-7 [38]). Kjer je mogoče, je ta dokument usklajen z dokumentoma 3GPP TS 33.108 [9] in ETSI TS 101 671 [4] ter podpira zahteve in zmogljivosti, opredeljene v dokumentih ETSI TS 101 331 [i.9] in ETSI TR 101 944 [i.4].
Ta dokument v zvezi z izročanjem prestreženih podatkov znotraj domen PS in CS v omrežju GSM/UMTS ne razveljavlja ali nadomešča nobene specifikacije ali zahteve v dokumentih 3GPP TS 33.108 [9] in ETSI TS 101 671 [4].
V zvezi z izročanjem storitev, opredeljenih v dokumentu 3GPP TS 33.128 [46], se v primeru nasprotja med tem dokumentom in dokumentom 3GPP TS 33.128 [46] uporabljajo izrazi iz dokumenta 3GPP TS 33.128 [46].
General Information
Standards Content (Sample)
TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 1: Handover specification for IP delivery
2 ETSI TS 102 232-1 V3.31.1 (2024-01)
Reference
RTS/LI-00248-1
Keywords
handover, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
https://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
No representation or warranty is made that this deliverable is technically accurate or sufficient or conforms to any law
anty is made of merchantability or fitness
and/or governmental rule and/or regulation and further, no representation or warr
for any particular purpose or against infringement of intellectual property rights.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 ETSI TS 102 232-1 V3.31.1 (2024-01)
Contents
Intellectual Property Rights . 6
Foreword . 6
Modal verbs terminology . 6
Introduction . 7
1 Scope . 8
2 References . 8
2.1 Normative references . 8
2.2 Informative references . 10
3 Definition of terms, symbols and abbreviations . 11
3.1 Terms . 11
3.2 Symbols . 11
3.3 Abbreviations . 11
4 General . 13
4.1 Functionality . 13
4.2 Intercepted data types . 13
4.2.1 Introduction. 13
4.2.2 Interception at network operator or access provider . 14
4.2.3 Interception at service providers . 14
4.3 Relationship to other standards . 14
4.4 Handover for GPRS/UMTS/EPS and 3GPP CS Domains . 16
4.4.1 PS Access . 16
4.4.2 Applications . 16
4.4.3 3GPP CS domain . 16
4.5 Common parameters. 16
4.6 Handover for services defined in 3GPP TS 33.128 . 16
5 Headers . 16
5.1 General . 16
5.2 Description and purpose of the header fields . 17
5.2.1 Version . 17
5.2.2 LIID . 17
5.2.3 Authorization country code. 17
5.2.4 Communication identifier . 17
5.2.5 Sequence number . 18
5.2.6 Payload timestamp . 19
5.2.7 Payload direction . 19
5.2.8 Payload type. 19
5.2.9 Interception type . 20
5.2.10 IRI type . 20
5.2.11 Interception Point Identifier . 20
5.2.12 Session direction . 20
5.2.13 Extended Interception Point Identifier . 20
5.2.14 Network Function Identifier . 21
5.3 Encoding of header fields . 21
6 Data exchange . 21
6.1 Overview . 21
6.2 Handover layer . 22
6.2.1 General . 22
6.2.2 Error reporting . 23
6.2.3 Aggregation of payloads . 23
6.2.4 Sending a large block of application-level data . 24
6.2.5 Padding data. 24
6.2.6 Payload encryption . 24
ETSI
4 ETSI TS 102 232-1 V3.31.1 (2024-01)
6.3 Session layer . 24
6.3.1 General . 24
6.3.2 Opening and closing connections . 25
6.3.3 Buffering . 25
6.3.4 Keep-alives . 25
6.3.5 Option negotiation . 26
6.3.5.1 Introduction . 26
6.3.5.2 Option negotiation message exchange . 26
6.3.6 PDU acknowledgement . 27
6.4 Transport layer . 28
6.4.1 Overview . 28
6.4.2 TCP settings . 28
6.4.3 Acknowledging data . 28
6.5 Network layer . 29
7 Delivery networks . 29
7.1 Types of network . 29
7.1.1 General . 29
7.1.2 Private networks . 29
7.1.3 Public networks with strict control . 29
7.1.4 Public networks with loose control . 29
7.2 Security requirements . 30
7.2.1 General . 30
7.2.2 Confidentiality and authentication . 30
7.2.3 Integrity . 30
7.3 Further delivery requirements . 30
7.3.1 Test data . 30
7.3.2 Timeliness . 30
Annex A (normative): ASN.1 syntax trees . 31
A.1 ASN.1 syntax tree for HI2 and HI3 headers. 31
A.2 ASN.1 specification. 32
A.3 Importing parameters from other standards . 32
Annex B (informative): Recommendation . 33
Annex C (informative): Notes on TCP tuning. 34
C.1 Implement IETF RFC 5681 . 34
C.2 Minimize roundtrip times . 34
C.3 Enable maximum segment size option . 34
C.4 Path MTU discovery . 34
C.5 Selective acknowledgement . 34
C.6 High speed options . 34
C.7 PUSH flag . 35
C.8 Nagle's algorithm . 35
C.9 Buffer size . 35
Annex D (informative): IRI-only interception . 36
D.1 Overview . 36
D.2 Definition HI information . 36
D.3 IRI deriving . 36
D.4 IRI by post and pre-processing HI3 information . 37
ETSI
5 ETSI TS 102 232-1 V3.31.1 (2024-01)
Annex E (informative): Purpose of profiles . 38
E.0 Background . 38
E.1 Formal definitions . 38
E.2 Purpose of profiles . 38
Annex F (informative): Traffic management of the handover interface . 40
F.0 Rationale . 40
F.1 Factors to consider . 40
F.1.0 Background . 40
F.1.1 Burstiness . 40
F.1.2 Mixed content . 40
F.1.3 Network facilities for traffic management . 41
F.1.4 Evidentiary considerations . 41
F.1.5 National considerations . 41
F.2 Traffic management strategies . 41
F.3 Bandwidth estimation . 42
F.4 National considerations . 42
F.5 Implementation considerations . 42
F.5.1 Volatile versus non-volatile storage . 42
F.5.2 Maximum buffering time . 43
F.5.3 Transmission order of buffered data . 43
F.5.4 Buffer overflow processing . 43
Annex G (normative): Implementation of payload encryption . 44
Annex H (informative): ETSI TS 102 232 family relationship . 45
Annex I (informative): Option negotiation . 49
I.0 Summary . 49
I.1 Example use cases . 49
I.1.1 Option negotiation not supported in LGW . 49
I.1.2 Simple negotiation by both endpoints . 50
I.1.3 Simple DF-only option request . 51
I.1.4 Simple LGW-only option request . 52
I.1.5 Complex negotiation . 53
Annex J (normative): Implementation of Integrity Checks . 54
J.1 Definitions . 54
J.2 Process description . 54
J.3 Example integrity Chain . 55
Annex K (informative): Change request history . 57
History . 63
ETSI
6 ETSI TS 102 232-1 V3.31.1 (2024-01)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).
The present document is part 1 of a multi-part deliverable covering the Handover Interface and Service-Specific Details
(SSD) for IP delivery, as identified below:
Part 1: "Handover specification for IP delivery";
Part 2: "Service-specific details for messaging services";
Part 3: "Service-specific details for internet access services";
Part 4: "Service-specific details for Layer 2 services";
Part 5: "Service-specific details for IP Multimedia services";
Part 6: "Service-specific details for PSTN/ISDN services";
Part 7: "Service-specific details for Mobile Services".
The ASN.1 module is available as an electronic attachment to the present document (see clause A.2 for more details).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
7 ETSI TS 102 232-1 V3.31.1 (2024-01)
Introduction
The objective of the present document is to form the basis for a standardized handover interface for use by both
telecommunications service providers and network operators, including Internet Service Providers that will deliver the
interception information required by Law Enforcement Authorities under various European treaties and national
regulations.
The present document describes how to handover intercepted information via IP-based networks from a CSP to an
LEMF. The present document covers the transportation of traffic, but does not specify functionality within CSPs or
LEMF (see clause 4.1). The present document handles the transportation of intercepted Content of Communication
(CC), Intercept-Related Information (IRI), Transport Related Information (TRI) and HI1 notification information. The
tasking and management of Lawful Interception via the HI1 interface is outside the scope of the present document.
The present document is intended to be general enough to be used in a variety of situations: it is not focused on a
particular IP-based service. The present document therefore provides information that is not dependent on the type of
service being intercepted. In particular the present document describes delivery mechanisms (clause 6), and the
structure and header details (clause 5) for both HI2 and HI3 information.
References within the main body of the present document are made if applicable to the 3GPP specification number with
in square brackets the reference number as listed in clause 2. In clause 2 "References" the corresponding ETSI
specification number is indicated with a reference to the 3GPP specification number. 3GPP specifications are available
faster than the equivalent ETSI specifications.
ETSI
8 ETSI TS 102 232-1 V3.31.1 (2024-01)
1 Scope
The present document specifies the general aspects of HI2 and HI3 interfaces for handover via IP based networks.
The present document:
• specifies the modular approach used for specifying IP based handover interfaces;
• specifies the header(s) to be added to IRI and CC sent over the HI2 and HI3 interfaces respectively;
• specifies protocols for the transfer of IRI and CC across the handover interfaces;
• specifies protocol profiles for the handover interface.
The present document is designed to be used where appropriate in conjunction with other deliverables that define the
service-specific IRI data formats (including ETSI TS 102 227 [i.1], ETSI TS 101 909-20-1 [33], ETSI
TS 101 909-20-2 [34], ETSI TS 102 232-2 [5], ETSI TS 102 232-3 [6], ETSI TS 102 232-4 [32], ETSI
TS 102 232-5 [37], ETSI TS 102 232-6 [36] and ETSI TS 102 232-7 [38]). Where possible, the present document aligns
with 3GPP TS 33.108 [9] and ETSI TS 101 671 [4] and supports the requirements and capabilities defined in ETSI
TS 101 331 [i.9] and ETSI TR 101 944 [i.4].
For the handover of intercepted data within GSM/UMTS PS and CS domains, the present document does not override
or supersede any specifications or requirements in 3GPP TS 33.108 [9] and ETSI TS 101 671 [4].
For the handover of services defined in 3GPP TS 33.128 [46], in the event of conflict between the present document
and 3GPP TS 33.128 [46], the terms of 3GPP TS 33.128 [46] apply.
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] Void.
[2] Void.
[3] Void.
[4] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
NOTE: ETSI TS 101 671 is in status "historical" and is not maintained.
[5] ETSI TS 102 232-2: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 2: Service-specific details for messaging services".
[6] ETSI TS 102 232-3: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 3: Service-specific details for internet access services".
[7] Void.
ETSI
9 ETSI TS 102 232-1 V3.31.1 (2024-01)
[8] Void.
[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; Digital cellular
telecommunications system (Phase 2+) (GSM); 3G security; Handover interface for Lawful
Interception (LI) (3GPP TS 33.108)".
[10] ISO 3166-1: "Codes for the representation of names of countries and their subdivisions -- Part 1:
Country code".
[11] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation".
[12] Recommendation ITU-T X.690: "Information technology - ASN.1 encoding rules: Specification of
Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding
Rules (DER)".
[13] Void.
[14] IETF RFC 791: "Internet Protocol".
[15] Void.
[16] IETF RFC 793: "Transmission Control Protocol".
[17] IETF RFC 1122: "Requirements for Internet Hosts - Communication Layers".
[18] Void.
[19] Void.
[20] Void.
[21] IETF RFC 5246: "The Transport Layer Security (TLS) Protocol Version 1.2".
NOTE 1: IETF RFC 5246 obsoletes IETF RFC 4346: "The Transport Layer Security (TLS) Protocol Version 1.1"
and IETF RFC 3268: "Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security
(TLS)" which was referenced until ETSI TS 102 232-1 (V2.6.1).
NOTE 2: IETF RFC 4346 obsoletes IETF RFC 2246: "The TLS Protocol Version 1.0".
[22] Void.
[23] IETF RFC 5681: "TCP Congestion Control".
NOTE: IETF RFC 5681 obsoletes IETF RFC 2581: "TCP Congestion Control".
[24] Void.
[25] Void.
[26] Void.
[27] IETF RFC 6298: "Computing TCP's Retransmission Timer".
NOTE: IETF RFC 6298 obsoletes IETF RFC 2988: "Computing TCP's Retransmission Timer".
[28] Void.
[29] Void.
[30] IETF RFC 6818: "Updates to the Internet X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile".
NOTE: IETF RFC 6818 obsoletes IETF RFC 5280: "Internet X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile".
[31] Void.
ETSI
10 ETSI TS 102 232-1 V3.31.1 (2024-01)
[32] ETSI TS 102 232-4: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services".
[33] ETSI TS 101 909-20-1: "Digital Broadband Cable Access to the Public Telecommunications
Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 1: CMS
based Voice Telephony Services".
[34] ETSI TS 101 909-20-2: "Digital Broadband Cable Access to the Public Telecommunications
Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 2:
Streamed multimedia services".
[35] Void.
[36] ETSI TS 102 232-6: "Lawful interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services".
[37] ETSI TS 102 232-5: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services".
[38] ETSI TS 102 232-7: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 7: Service-specific details for Mobile Services".
[39] Void.
[40] FIPS PUB 186-4: "Digital Signature Standard (DSS)".
[41] IETF RFC 7525: "Recommendations for Secure Use of Transport Layer Security (TLS) and
Datagram Transport Layer Security (DTLS)".
[42] FIPS PUB 180-4: "Secure Hash Standard (SHS)".
[43] Void.
[44] ETSI TS 103 280: "Lawful Interception (LI); Dictionary for common parameters".
[45] ETSI TS 103 462: "Lawful Interception (LI); Inter LEMF Handover Interface".
[46] ETSI TS 133 128: "Digital cellular telecommunications system (Phase 2+) (GSM); Universal
Mobile Telecommunications System (UMTS); LTE; 5G; Security; Protocol and procedures for
Lawful Interception (LI); Stage 3 (3GPP TS 33.128)".
[47] IETF RFC 8446: "The Transport Layer Security (TLS) Protocol Version 1.3".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TS 102 227: "Telecommunications and Internet Protocol Harmonization Over Networks
(TIPHON) Release 4; Functional Entities, Information Flow and Reference Point Definitions;
Lawful Interception".
[i.2] Library of Congress document Z39.50.
[i.3] Void.
[i.4] ETSI TR 101 944: "Telecommunications security; Lawful Interception (LI); Issues on IP
Interception".
ETSI
11 ETSI TS 102 232-1 V3.31.1 (2024-01)
[i.5] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications".
[i.6] Void.
[i.7] IETF RFC 2923: "TCP Problems with Path MTU Discovery".
[i.8] ISO/IEC TR 10000-1: "Information technology -- Framework and taxonomy of International
Standardized Profiles -- Part 1: General principles and documentation framework".
[i.9] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[i.10] ETSI ES 201 158: "Telecommunications security; Lawful Interception (LI); Requirements for
network functions".
[i.11] IETF RFC 792: "Internet Control Message Protocol".
[i.12] IETF RFC 7323: "TCP Extensions for High Performance".
[i.13] IETF RFC 1191: "Path MTU discovery".
[i.14] IETF RFC 2018: "TCP Selective Acknowledgement Options".
3 Definition of terms, symbols and abbreviations
3.1 Terms
For the purposes of the present document, the terms given in ETSI TS 101 671 [4], ETSI ES 201 158 [i.10], 3GPP
TS 33.128 [46], ETSI TS 101 331 [i.9] and the following apply:
Communications Service Provider (CSP): organizations (e.g. Service Providers (SvP), Network Operators (NWO) or
Access Providers (AP)) who are obliged by law to provide interception
international standardized profile: internationally agreed-to, harmonised document which describes one or more
profiles
profile: set of one or more base standards and/or international standardized profiles, and, where applicable, the
identification of chosen classes, conforming subsets, options and parameters of those base standards or International
Standardized Profiles necessary to accomplish a particular function
Transport Related Information (TRI): information which is sent across a Handover Interface in order to maintain,
test or secure the interface
NOTE: It does not include any CC or IRI.
3.2 Symbols
For the purposes of the present document, the following symbols apply:
parameters are indicated by angle brackets
kB Kilobyte
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply:
3GPP Third Generation Partnership Project
AP Access Provider
ASCII American Standard Code for Information Interchange
ASN.1 Abstract Syntax Notation One
ETSI
12 ETSI TS 102 232-1 V3.31.1 (2024-01)
ATM Asynchronous Transfer Mode
BER Basic Encoding Rules
CBC Cipher-Block Chaining
CC Content of Communication
CID Communication IDentifier
CIN Communication Identity Number
CMS Call Management Service
CR Change Request
CS Circuit Switched
CSP Communications Service Provider
DCC Delivery Country Code
DER Distinguished Encoding Rules
DF Delivery Function
DSA Digital Signature Algorithm
DSL Digital Subscriber Line
DSS Digital Signature Standard
EIPID Extended Interception Point Identifier
EPS Evolved Packet System
FIFO First-In-First-Out
FIPS Federal Information Processing Standards
GCSE Group Communications System Enablers
GPRS General Packet Radio Service
GSM Global System for Mobile communications
HI Handover Interface
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
HM Handover Manager
HO HandOver
ICMP Internet Control Message Protocol
ID Identifier
ILHI Inter LEMF Handover Interface
IMS IP Multimedia Subsystem
IP Internet Protocol
IPID Interception Point Identifier
IPSec IP Security
IRI Intercept Related Information
ISDN Integrated Services Digital Network
ISP Internet Service Provider
IT Information Technology
IV Initialization Vector
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LGW Law enforcement monitoring facility GateWay
LI Lawful Interception
LIID Lawful Interception IDentifier
MD Mediation Device
MF Mediation Function (at CSP)
MPLS Multi-Protocol Label Switching
MSS Maximum Segment Size
MTU Maximum Transmission Unit
NEID Network Element IDentifier
NID Network IDentifier
NIST National Institute of Standards and Technology
NWO Network Operator
OID Object IDentifier
OPID OPerator IDentifier
OSI Open Systems Interconnection
PDU Protocol Data Unit
PROSE PROximity SErvices
PS Packet Switched
PSTN Public Switched Telephone Network
ETSI
13 ETSI TS 102 232-1 V3.31.1 (2024-01)
PUB PUBlication
QoS Quality of Service
resLEMF responding LEMF
RFC Request For Comments
RTT Round Trip Time
SACK Selective ACKnowledgement
SHA Secure Hash Algorithm
SSD Service-Specific Details
SvP Service Provider
TC Technical Committee
TCP Transmission Control Protocol
TLS Transport Layer Security
TLV Type Length Value element
TRI Transport Related Information
UDP User Datagram Protocol
ULIC UMTS LI Correlation
UMTS Universal Mobile Telecommunications System
VoIP Voice Over Internet Protocol
VPN Virtual Private Network
WLAN Wireless Local Area Network
4 General
4.1 Functionality
Figure 1 shows the stages in the interception chain.
Network
Law Enforcement
Mediation
Monitoring
Functionality (MF )
Facility (LEMF)
Handover
interface
Figure 1: Stages of the interception chain
The first stage includes the creation or separation of intercepted data from the target network or target service, and the
creation of IRI data. It is typically the responsibility of the CSP and is outside the scope of the present document.
The second stage ("Handover interface") consists of formatting the results of interception (except where IRI formats are
specified in other standards), managing the connection between the CSP Mediation Functionality (MF) and the Law
Enforcement Monitoring Facility (LEMF) and transporting the data. It should as far as possible be independent of the
other stages and is the joint responsibility of the CSP and the LEA. The present document focuses on the handover
interface.
The third stage includes functionality for interpreting and displaying the results of interception. It is typically the
responsibility of the LEA and is outside the scope of the present document.
4.2 Intercepted data types
4.2.1 Introduction
I
...
SLOVENSKI STANDARD
01-marec-2024
Zakonito prestrezanje (LI) - Izročilni vmesnik in storitveno specifične podrobnosti
(SSD) za IP-dostavo vsebin - 1. del: Izročilna specifikacija za IP-dostavo vsebin
Lawful Interception (LI) - Handover Interface and Service-Specific Details (SSD) for IP
delivery - Part 1: Handover specification for IP delivery
Ta slovenski standard je istoveten z: ETSI TS 102 232-1 V3.31.1 (2024-01)
ICS:
35.240.95 Spletne uporabniške rešitve Internet applications
2003-01.Slovenski inštitut za standardizacijo. Razmnoževanje celote ali delov tega standarda ni dovoljeno.
TECHNICAL SPECIFICATION
Lawful Interception (LI);
Handover Interface and
Service-Specific Details (SSD) for IP delivery;
Part 1: Handover specification for IP delivery
2 ETSI TS 102 232-1 V3.31.1 (2024-01)
Reference
RTS/LI-00248-1
Keywords
handover, IP, lawful interception, security
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - APE 7112B
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° w061004871
Important notice
The present document can be downloaded from:
https://www.etsi.org/standards-search
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the prevailing version of an ETSI
deliverable is the one made publicly available in PDF format at www.etsi.org/deliver.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
https://portal.etsi.org/TB/ETSIDeliverableStatus.aspx
If you find errors in the present document, please send your comment to one of the following services:
https://portal.etsi.org/People/CommiteeSupportStaff.aspx
If you find a security vulnerability in the present document, please report it through our
Coordinated Vulnerability Disclosure Program:
https://www.etsi.org/standards/coordinated-vulnerability-disclosure
Notice of disclaimer & limitation of liability
The information provided in the present deliverable is directed solely to professionals who have the appropriate degree of
experience to understand and interpret its content in accordance with generally accepted engineering or
other professional standard and applicable regulations.
No recommendation as to products and services or vendors is made or should be implied.
No representation or warranty is made that this deliverable is technically accurate or sufficient or conforms to any law
anty is made of merchantability or fitness
and/or governmental rule and/or regulation and further, no representation or warr
for any particular purpose or against infringement of intellectual property rights.
In no event shall ETSI be held liable for loss of profits or any other incidental or consequential damages.
Any software contained in this deliverable is provided "AS IS" with no warranties, express or implied, including but not
limited to, the warranties of merchantability, fitness for a particular purpose and non-infringement of intellectual property
rights and ETSI shall not be held liable in any event for any damages whatsoever (including, without limitation, damages
for loss of profits, business interruption, loss of information, or any other pecuniary loss) arising out of or related to the use
of or inability to use the software.
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying and
microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2024.
All rights reserved.
ETSI
3 ETSI TS 102 232-1 V3.31.1 (2024-01)
Contents
Intellectual Property Rights . 6
Foreword . 6
Modal verbs terminology . 6
Introduction . 7
1 Scope . 8
2 References . 8
2.1 Normative references . 8
2.2 Informative references . 10
3 Definition of terms, symbols and abbreviations . 11
3.1 Terms . 11
3.2 Symbols . 11
3.3 Abbreviations . 11
4 General . 13
4.1 Functionality . 13
4.2 Intercepted data types . 13
4.2.1 Introduction. 13
4.2.2 Interception at network operator or access provider . 14
4.2.3 Interception at service providers . 14
4.3 Relationship to other standards . 14
4.4 Handover for GPRS/UMTS/EPS and 3GPP CS Domains . 16
4.4.1 PS Access . 16
4.4.2 Applications . 16
4.4.3 3GPP CS domain . 16
4.5 Common parameters. 16
4.6 Handover for services defined in 3GPP TS 33.128 . 16
5 Headers . 16
5.1 General . 16
5.2 Description and purpose of the header fields . 17
5.2.1 Version . 17
5.2.2 LIID . 17
5.2.3 Authorization country code. 17
5.2.4 Communication identifier . 17
5.2.5 Sequence number . 18
5.2.6 Payload timestamp . 19
5.2.7 Payload direction . 19
5.2.8 Payload type. 19
5.2.9 Interception type . 20
5.2.10 IRI type . 20
5.2.11 Interception Point Identifier . 20
5.2.12 Session direction . 20
5.2.13 Extended Interception Point Identifier . 20
5.2.14 Network Function Identifier . 21
5.3 Encoding of header fields . 21
6 Data exchange . 21
6.1 Overview . 21
6.2 Handover layer . 22
6.2.1 General . 22
6.2.2 Error reporting . 23
6.2.3 Aggregation of payloads . 23
6.2.4 Sending a large block of application-level data . 24
6.2.5 Padding data. 24
6.2.6 Payload encryption . 24
ETSI
4 ETSI TS 102 232-1 V3.31.1 (2024-01)
6.3 Session layer . 24
6.3.1 General . 24
6.3.2 Opening and closing connections . 25
6.3.3 Buffering . 25
6.3.4 Keep-alives . 25
6.3.5 Option negotiation . 26
6.3.5.1 Introduction . 26
6.3.5.2 Option negotiation message exchange . 26
6.3.6 PDU acknowledgement . 27
6.4 Transport layer . 28
6.4.1 Overview . 28
6.4.2 TCP settings . 28
6.4.3 Acknowledging data . 28
6.5 Network layer . 29
7 Delivery networks . 29
7.1 Types of network . 29
7.1.1 General . 29
7.1.2 Private networks . 29
7.1.3 Public networks with strict control . 29
7.1.4 Public networks with loose control . 29
7.2 Security requirements . 30
7.2.1 General . 30
7.2.2 Confidentiality and authentication . 30
7.2.3 Integrity . 30
7.3 Further delivery requirements . 30
7.3.1 Test data . 30
7.3.2 Timeliness . 30
Annex A (normative): ASN.1 syntax trees . 31
A.1 ASN.1 syntax tree for HI2 and HI3 headers. 31
A.2 ASN.1 specification. 32
A.3 Importing parameters from other standards . 32
Annex B (informative): Recommendation . 33
Annex C (informative): Notes on TCP tuning. 34
C.1 Implement IETF RFC 5681 . 34
C.2 Minimize roundtrip times . 34
C.3 Enable maximum segment size option . 34
C.4 Path MTU discovery . 34
C.5 Selective acknowledgement . 34
C.6 High speed options . 34
C.7 PUSH flag . 35
C.8 Nagle's algorithm . 35
C.9 Buffer size . 35
Annex D (informative): IRI-only interception . 36
D.1 Overview . 36
D.2 Definition HI information . 36
D.3 IRI deriving . 36
D.4 IRI by post and pre-processing HI3 information . 37
ETSI
5 ETSI TS 102 232-1 V3.31.1 (2024-01)
Annex E (informative): Purpose of profiles . 38
E.0 Background . 38
E.1 Formal definitions . 38
E.2 Purpose of profiles . 38
Annex F (informative): Traffic management of the handover interface . 40
F.0 Rationale . 40
F.1 Factors to consider . 40
F.1.0 Background . 40
F.1.1 Burstiness . 40
F.1.2 Mixed content . 40
F.1.3 Network facilities for traffic management . 41
F.1.4 Evidentiary considerations . 41
F.1.5 National considerations . 41
F.2 Traffic management strategies . 41
F.3 Bandwidth estimation . 42
F.4 National considerations . 42
F.5 Implementation considerations . 42
F.5.1 Volatile versus non-volatile storage . 42
F.5.2 Maximum buffering time . 43
F.5.3 Transmission order of buffered data . 43
F.5.4 Buffer overflow processing . 43
Annex G (normative): Implementation of payload encryption . 44
Annex H (informative): ETSI TS 102 232 family relationship . 45
Annex I (informative): Option negotiation . 49
I.0 Summary . 49
I.1 Example use cases . 49
I.1.1 Option negotiation not supported in LGW . 49
I.1.2 Simple negotiation by both endpoints . 50
I.1.3 Simple DF-only option request . 51
I.1.4 Simple LGW-only option request . 52
I.1.5 Complex negotiation . 53
Annex J (normative): Implementation of Integrity Checks . 54
J.1 Definitions . 54
J.2 Process description . 54
J.3 Example integrity Chain . 55
Annex K (informative): Change request history . 57
History . 63
ETSI
6 ETSI TS 102 232-1 V3.31.1 (2024-01)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The declarations
pertaining to these essential IPRs, if any, are publicly available for ETSI members and non-members, and can be
found in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to
ETSI in respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the
ETSI Web server (https://ipr.etsi.org/).
Pursuant to the ETSI Directives including the ETSI IPR Policy, no investigation regarding the essentiality of IPRs,
including IPR searches, has been carried out by ETSI. No guarantee can be given as to the existence of other IPRs not
referenced in ETSI SR 000 314 (or the updates on the ETSI Web server) which are, or may be, or may become,
essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
DECT™, PLUGTESTS™, UMTS™ and the ETSI logo are trademarks of ETSI registered for the benefit of its
Members. 3GPP™ and LTE™ are trademarks of ETSI registered for the benefit of its Members and of the 3GPP
Organizational Partners. oneM2M™ logo is a trademark of ETSI registered for the benefit of its Members and of the ®
oneM2M Partners. GSM and the GSM logo are trademarks registered and owned by the GSM Association.
Foreword
This Technical Specification (TS) has been produced by ETSI Technical Committee Lawful Interception (LI).
The present document is part 1 of a multi-part deliverable covering the Handover Interface and Service-Specific Details
(SSD) for IP delivery, as identified below:
Part 1: "Handover specification for IP delivery";
Part 2: "Service-specific details for messaging services";
Part 3: "Service-specific details for internet access services";
Part 4: "Service-specific details for Layer 2 services";
Part 5: "Service-specific details for IP Multimedia services";
Part 6: "Service-specific details for PSTN/ISDN services";
Part 7: "Service-specific details for Mobile Services".
The ASN.1 module is available as an electronic attachment to the present document (see clause A.2 for more details).
Modal verbs terminology
In the present document "shall", "shall not", "should", "should not", "may", "need not", "will", "will not", "can" and
"cannot" are to be interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of
provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
7 ETSI TS 102 232-1 V3.31.1 (2024-01)
Introduction
The objective of the present document is to form the basis for a standardized handover interface for use by both
telecommunications service providers and network operators, including Internet Service Providers that will deliver the
interception information required by Law Enforcement Authorities under various European treaties and national
regulations.
The present document describes how to handover intercepted information via IP-based networks from a CSP to an
LEMF. The present document covers the transportation of traffic, but does not specify functionality within CSPs or
LEMF (see clause 4.1). The present document handles the transportation of intercepted Content of Communication
(CC), Intercept-Related Information (IRI), Transport Related Information (TRI) and HI1 notification information. The
tasking and management of Lawful Interception via the HI1 interface is outside the scope of the present document.
The present document is intended to be general enough to be used in a variety of situations: it is not focused on a
particular IP-based service. The present document therefore provides information that is not dependent on the type of
service being intercepted. In particular the present document describes delivery mechanisms (clause 6), and the
structure and header details (clause 5) for both HI2 and HI3 information.
References within the main body of the present document are made if applicable to the 3GPP specification number with
in square brackets the reference number as listed in clause 2. In clause 2 "References" the corresponding ETSI
specification number is indicated with a reference to the 3GPP specification number. 3GPP specifications are available
faster than the equivalent ETSI specifications.
ETSI
8 ETSI TS 102 232-1 V3.31.1 (2024-01)
1 Scope
The present document specifies the general aspects of HI2 and HI3 interfaces for handover via IP based networks.
The present document:
• specifies the modular approach used for specifying IP based handover interfaces;
• specifies the header(s) to be added to IRI and CC sent over the HI2 and HI3 interfaces respectively;
• specifies protocols for the transfer of IRI and CC across the handover interfaces;
• specifies protocol profiles for the handover interface.
The present document is designed to be used where appropriate in conjunction with other deliverables that define the
service-specific IRI data formats (including ETSI TS 102 227 [i.1], ETSI TS 101 909-20-1 [33], ETSI
TS 101 909-20-2 [34], ETSI TS 102 232-2 [5], ETSI TS 102 232-3 [6], ETSI TS 102 232-4 [32], ETSI
TS 102 232-5 [37], ETSI TS 102 232-6 [36] and ETSI TS 102 232-7 [38]). Where possible, the present document aligns
with 3GPP TS 33.108 [9] and ETSI TS 101 671 [4] and supports the requirements and capabilities defined in ETSI
TS 101 331 [i.9] and ETSI TR 101 944 [i.4].
For the handover of intercepted data within GSM/UMTS PS and CS domains, the present document does not override
or supersede any specifications or requirements in 3GPP TS 33.108 [9] and ETSI TS 101 671 [4].
For the handover of services defined in 3GPP TS 33.128 [46], in the event of conflict between the present document
and 3GPP TS 33.128 [46], the terms of 3GPP TS 33.128 [46] apply.
2 References
2.1 Normative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
Referenced documents which are not found to be publicly available in the expected location might be found at
https://docbox.etsi.org/Reference.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are necessary for the application of the present document.
[1] Void.
[2] Void.
[3] Void.
[4] ETSI TS 101 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
NOTE: ETSI TS 101 671 is in status "historical" and is not maintained.
[5] ETSI TS 102 232-2: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 2: Service-specific details for messaging services".
[6] ETSI TS 102 232-3: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 3: Service-specific details for internet access services".
[7] Void.
ETSI
9 ETSI TS 102 232-1 V3.31.1 (2024-01)
[8] Void.
[9] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; Digital cellular
telecommunications system (Phase 2+) (GSM); 3G security; Handover interface for Lawful
Interception (LI) (3GPP TS 33.108)".
[10] ISO 3166-1: "Codes for the representation of names of countries and their subdivisions -- Part 1:
Country code".
[11] Recommendation ITU-T X.680: "Information technology - Abstract Syntax Notation One
(ASN.1): Specification of basic notation".
[12] Recommendation ITU-T X.690: "Information technology - ASN.1 encoding rules: Specification of
Basic Encoding Rules (BER), Canonical Encoding Rules (CER) and Distinguished Encoding
Rules (DER)".
[13] Void.
[14] IETF RFC 791: "Internet Protocol".
[15] Void.
[16] IETF RFC 793: "Transmission Control Protocol".
[17] IETF RFC 1122: "Requirements for Internet Hosts - Communication Layers".
[18] Void.
[19] Void.
[20] Void.
[21] IETF RFC 5246: "The Transport Layer Security (TLS) Protocol Version 1.2".
NOTE 1: IETF RFC 5246 obsoletes IETF RFC 4346: "The Transport Layer Security (TLS) Protocol Version 1.1"
and IETF RFC 3268: "Advanced Encryption Standard (AES) Ciphersuites for Transport Layer Security
(TLS)" which was referenced until ETSI TS 102 232-1 (V2.6.1).
NOTE 2: IETF RFC 4346 obsoletes IETF RFC 2246: "The TLS Protocol Version 1.0".
[22] Void.
[23] IETF RFC 5681: "TCP Congestion Control".
NOTE: IETF RFC 5681 obsoletes IETF RFC 2581: "TCP Congestion Control".
[24] Void.
[25] Void.
[26] Void.
[27] IETF RFC 6298: "Computing TCP's Retransmission Timer".
NOTE: IETF RFC 6298 obsoletes IETF RFC 2988: "Computing TCP's Retransmission Timer".
[28] Void.
[29] Void.
[30] IETF RFC 6818: "Updates to the Internet X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile".
NOTE: IETF RFC 6818 obsoletes IETF RFC 5280: "Internet X.509 Public Key Infrastructure Certificate and
Certificate Revocation List (CRL) Profile".
[31] Void.
ETSI
10 ETSI TS 102 232-1 V3.31.1 (2024-01)
[32] ETSI TS 102 232-4: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services".
[33] ETSI TS 101 909-20-1: "Digital Broadband Cable Access to the Public Telecommunications
Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 1: CMS
based Voice Telephony Services".
[34] ETSI TS 101 909-20-2: "Digital Broadband Cable Access to the Public Telecommunications
Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 2:
Streamed multimedia services".
[35] Void.
[36] ETSI TS 102 232-6: "Lawful interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services".
[37] ETSI TS 102 232-5: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services".
[38] ETSI TS 102 232-7: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 7: Service-specific details for Mobile Services".
[39] Void.
[40] FIPS PUB 186-4: "Digital Signature Standard (DSS)".
[41] IETF RFC 7525: "Recommendations for Secure Use of Transport Layer Security (TLS) and
Datagram Transport Layer Security (DTLS)".
[42] FIPS PUB 180-4: "Secure Hash Standard (SHS)".
[43] Void.
[44] ETSI TS 103 280: "Lawful Interception (LI); Dictionary for common parameters".
[45] ETSI TS 103 462: "Lawful Interception (LI); Inter LEMF Handover Interface".
[46] ETSI TS 133 128: "Digital cellular telecommunications system (Phase 2+) (GSM); Universal
Mobile Telecommunications System (UMTS); LTE; 5G; Security; Protocol and procedures for
Lawful Interception (LI); Stage 3 (3GPP TS 33.128)".
[47] IETF RFC 8446: "The Transport Layer Security (TLS) Protocol Version 1.3".
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] ETSI TS 102 227: "Telecommunications and Internet Protocol Harmonization Over Networks
(TIPHON) Release 4; Functional Entities, Information Flow and Reference Point Definitions;
Lawful Interception".
[i.2] Library of Congress document Z39.50.
[i.3] Void.
[i.4] ETSI TR 101 944: "Telecommunications security; Lawful Interception (LI); Issues on IP
Interception".
ETSI
11 ETSI TS 102 232-1 V3.31.1 (2024-01)
[i.5] ETSI TR 102 503: "Lawful Interception (LI); ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications".
[i.6] Void.
[i.7] IETF RFC 2923: "TCP Problems with Path MTU Discovery".
[i.8] ISO/IEC TR 10000-1: "Information technology -- Framework and taxonomy of International
Standardized Profiles -- Part 1: General principles and documentation framework".
[i.9] ETSI TS 101 331: "Lawful Interception (LI); Requirements of Law Enforcement Agencies".
[i.10] ETSI ES 201 158: "Telecommunications security; Lawful Interception (LI); Requirements for
network functions".
[i.11] IETF RFC 792: "Internet Control Message Protocol".
[i.12] IETF RFC 7323: "TCP Extensions for High Performance".
[i.13] IETF RFC 1191: "Path MTU discovery".
[i.14] IETF RFC 2018: "TCP Selective Acknowledgement Options".
3 Definition of terms, symbols and abbreviations
3.1 Terms
For the purposes of the present document, the terms given in ETSI TS 101 671 [4], ETSI ES 201 158 [i.10], 3GPP
TS 33.128 [46], ETSI TS 101 331 [i.9] and the following apply:
Communications Service Provider (CSP): organizations (e.g. Service Providers (SvP), Network Operators (NWO) or
Access Providers (AP)) who are obliged by law to provide interception
international standardized profile: internationally agreed-to, harmonised document which describes one or more
profiles
profile: set of one or more base standards and/or international standardized profiles, and, where applicable, the
identification of chosen classes, conforming subsets, options and parameters of those base standards or International
Standardized Profiles necessary to accomplish a particular function
Transport Related Information (TRI): information which is sent across a Handover Interface in order to maintain,
test or secure the interface
NOTE: It does not include any CC or IRI.
3.2 Symbols
For the purposes of the present document, the following symbols apply:
parameters are indicated by angle brackets
kB Kilobyte
3.3 Abbreviations
For the purposes of the present document, the following abbreviations apply:
3GPP Third Generation Partnership Project
AP Access Provider
ASCII American Standard Code for Information Interchange
ASN.1 Abstract Syntax Notation One
ETSI
12 ETSI TS 102 232-1 V3.31.1 (2024-01)
ATM Asynchronous Transfer Mode
BER Basic Encoding Rules
CBC Cipher-Block Chaining
CC Content of Communication
CID Communication IDentifier
CIN Communication Identity Number
CMS Call Management Service
CR Change Request
CS Circuit Switched
CSP Communications Service Provider
DCC Delivery Country Code
DER Distinguished Encoding Rules
DF Delivery Function
DSA Digital Signature Algorithm
DSL Digital Subscriber Line
DSS Digital Signature Standard
EIPID Extended Interception Point Identifier
EPS Evolved Packet System
FIFO First-In-First-Out
FIPS Federal Information Processing Standards
GCSE Group Communications System Enablers
GPRS General Packet Radio Service
GSM Global System for Mobile communications
HI Handover Interface
HI1 Handover Interface 1 (for Administrative Information)
HI2 Handover Interface 2 (for Intercept Related Information)
HI3 Handover Interface 3 (for Content of Communication)
HM Handover Manager
HO HandOver
ICMP Internet Control Message Protocol
ID Identifier
ILHI Inter LEMF Handover Interface
IMS IP Multimedia Subsystem
IP Internet Protocol
IPID Interception Point Identifier
IPSec IP Security
IRI Intercept Related Information
ISDN Integrated Services Digital Network
ISP Internet Service Provider
IT Information Technology
IV Initialization Vector
LEA Law Enforcement Agency
LEMF Law Enforcement Monitoring Facility
LGW Law enforcement monitoring facility GateWay
LI Lawful Interception
LIID Lawful Interception IDentifier
MD Mediation Device
MF Mediation Function (at CSP)
MPLS Multi-Protocol Label Switching
MSS Maximum Segment Size
MTU Maximum Transmission Unit
NEID Network Element IDentifier
NID Network IDentifier
NIST National Institute of Standards and Technology
NWO Network Operator
OID Object IDentifier
OPID OPerator IDentifier
OSI Open Systems Interconnection
PDU Protocol Data Unit
PROSE PROximity SErvices
PS Packet Switched
PSTN Public Switched Telephone Network
ETSI
13 ETSI TS 102 232-1 V3.31.1 (2024-01)
PUB PUBlication
QoS Quality of Service
resLEMF responding LEMF
RFC Request For Comments
RTT Round Trip Time
SACK Selective ACKnowledgement
SHA Secure Hash Algorithm
SSD Service-Specific Details
SvP Service Provider
TC Technical Committee
TCP Transmission Control Protocol
TLS Transport Layer Security
TLV Type Length Value element
TRI Transport Related Information
UDP User Datagram Protocol
ULIC UMTS LI Correlation
UMTS Universa
...










Questions, Comments and Discussion
Ask us and Technical Secretary will try to provide an answer. You can facilitate discussion about the standard in here.
Loading comments...