|
TECHNICAL REPORT
Lawful Interception (LI);
ASN.1 Object Identifiers in Lawful Interception and
Retained data handling Specifications
---------------------- Page: 1 ----------------------
2 ETSI TR 102 503 V1.12.1 (2018-10)
Reference
RTR/LI-00164
Keywords
ASN.1, object identifier
ETSI
650 Route des Lucioles
F-06921 Sophia Antipolis Cedex - FRANCE
Tel.: +33 4 92 94 42 00 Fax: +33 4 93 65 47 16
Siret N° 348 623 562 00017 - NAF 742 C
Association à but non lucratif enregistrée à la
Sous-Préfecture de Grasse (06) N° 7803/88
Important notice
The present document can be downloaded from:
The present document may be made available in electronic versions and/or in print. The content of any electronic and/or
print versions of the present document shall not be modified without the prior written authorization of ETSI. In case of any
existing or perceived difference in contents between such versions and/or in print, the only prevailing document is the
print of the Portable Document Format (PDF) version kept on a specific network drive within ETSI Secretariat.
Users of the present document should be aware that the document may be subject to revision or change of status.
Information on the current status of this and other ETSI documents is available at
If you find errors in the present document, please send your comment to one of the following services:
Copyright Notification
No part may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying
and microfilm except as authorized by written permission of ETSI.
The content of the PDF version shall not be modified without the written authorization of ETSI.
The copyright and the foregoing restriction extend to reproduction in all media.
© ETSI 2018.
All rights reserved.
TM TM TM
DECT , PLUGTESTS , UMTS and the ETSI logo are trademarks of ETSI registered for the benefit of its Members.
TM TM
3GPP and LTE are trademarks of ETSI registered for the benefit of its Members and
of the 3GPP Organizational Partners.
oneM2M logo is protected for the benefit of its Members.
GSM and the GSM logo are trademarks registered and owned by the GSM Association.
ETSI
---------------------- Page: 2 ----------------------
3 ETSI TR 102 503 V1.12.1 (2018-10)
Contents
Intellectual Property Rights . 4
Foreword . 4
Modal verbs terminology . 4
1 Scope . 5
2 References . 5
2.1 Normative references . 5
2.2 Informative references . 5
3 Definition of terms and abbreviations. 6
3.1 Terms . 6
3.2 Abbreviations . 6
4 Structure of the ETSI domain . 7
4.1 Tree structure . 7
4.2 Description of the ETSI domain . 7
Annex A: Change Request history . 20
Annex B: Bibliography . 22
History . 23
ETSI
---------------------- Page: 3 ----------------------
4 ETSI TR 102 503 V1.12.1 (2018-10)
Intellectual Property Rights
Essential patents
IPRs essential or potentially essential to normative deliverables may have been declared to ETSI. The information
pertaining to these essential IPRs, if any, is publicly available for ETSI members and non-members, and can be found
in ETSI SR 000 314: "Intellectual Property Rights (IPRs); Essential, or potentially Essential, IPRs notified to ETSI in
respect of ETSI standards", which is available from the ETSI Secretariat. Latest updates are available on the ETSI Web
server (https://ipr.etsi.org/).
Pursuant to the ETSI IPR Policy, no investigation, including IPR searches, has been carried out by ETSI. No guarantee
can be given as to the existence of other IPRs not referenced in ETSI SR 000 314 (or the updates on the ETSI Web
server) which are, or may be, or may become, essential to the present document.
Trademarks
The present document may include trademarks and/or tradenames which are asserted and/or registered by their owners.
ETSI claims no ownership of these except for any which are indicated as being the property of ETSI, and conveys no
right to use or reproduce any trademark and/or tradename. Mention of those trademarks in the present document does
not constitute an endorsement by ETSI of products, services or organizations associated with those trademarks.
Foreword
This Technical Report (TR) has been produced by ETSI Technical Committee Lawful Interception (LI).
Modal verbs terminology
In the present document "should", "should not", "may", "need not", "will", "will not", "can" and "cannot" are to be
interpreted as described in clause 3.2 of the ETSI Drafting Rules (Verbal forms for the expression of provisions).
"must" and "must not" are NOT allowed in ETSI deliverables except when used in direct citation.
ETSI
---------------------- Page: 4 ----------------------
5 ETSI TR 102 503 V1.12.1 (2018-10)
1 Scope
The present document gives an overview over the relevant Object IDentifiers (OID) used in Lawful Interception and
Retained data handling specifications of ETSI and other specifications from ITU-T and ISO.
2 References
2.1 Normative references
Normative references are not applicable in the present document.
2.2 Informative references
References are either specific (identified by date of publication and/or edition number or version number) or
non-specific. For specific references, only the cited version applies. For non-specific references, the latest version of the
referenced document (including any amendments) applies.
NOTE: While any hyperlinks included in this clause were valid at the time of publication, ETSI cannot guarantee
their long term validity.
The following referenced documents are not necessary for the application of the present document but they assist the
user with regard to a particular subject area.
[i.1] Void.
[i.2] ETSI ES 201 671: "Lawful Interception (LI); Handover interface for the lawful interception of
telecommunications traffic".
[i.3] ETSI TS 101 671: "Lawful Interception (LI); Handover Interface for the lawful interception of
telecommunications traffic".
NOTE: ETSI TS 101 671 v3.15.1 (2018-06) and ETSI ES 201 671 v3.2.1 (2018-03) are referred as latest
published documents now made historical.
[i.4] ETSI TS 133 108: "Universal Mobile Telecommunications System (UMTS); LTE; 3G security;
Handover interface for Lawful Interception (LI) (3GPP TS 33.108)".
[i.5] ETSI TS 102 232: "Lawful Interception (LI); Handover specification for IP delivery".
NOTE: ETSI TS 102 232 is replaced by ETSI TS 102 232-1 [i.13].
[i.6] ETSI TS 102 233: "Lawful Interception (LI); Service specific details for E-mail services".
NOTE: ETSI TS 102 233 is replaced by ETSI TS 102 232-2 [i.14].
[i.7] ETSI TS 102 234: "Lawful Interception (LI); Service-specific details for internet access services".
NOTE: ETSI TS 102 234 is replaced by ETSI TS 102 232-3 [i.15].
[i.8] ETSI TS 102 815: "Lawful Interception (LI); Service-specific details for Layer 2 Lawful
Interception".
NOTE: ETSI TS 102 815 is replaced by ETSI TS 102 232-4 [i.16].
[i.9] Recommendation ITU-T X.880: "Information technology - Remote Operations: Concepts, model
and notation".
[i.10] ETSI TS 101 909-20-1: "Digital Broadband Cable Access to the Public Telecommunications
Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 1: CMS
based Voice Telephony Services".
ETSI
---------------------- Page: 5 ----------------------
6 ETSI TR 102 503 V1.12.1 (2018-10)
[i.11] ETSI TS 101 909-20-2: "Digital Broadband Cable Access to the Public Telecommunications
Network; IP Multimedia Time Critical Services; Part 20: Lawful Interception; Sub-part 2:
Streamed multimedia services".
[i.12] ETSI EN 301 040: "Terrestrial Trunked Radio (TETRA); Security; Lawful Interception (LI)
interface".
[i.13] ETSI TS 102 232-1: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 1: Handover specification for IP delivery".
[i.14] ETSI TS 102 232-2: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 2: Service-specific details for messaging services".
[i.15] ETSI TS 102 232-3: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 3: Service-specific details for internet access services".
[i.16] ETSI TS 102 232-4: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 4: Service-specific details for Layer 2 services".
[i.17] ETSI TS 102 232-5: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 5: Service-specific details for IP Multimedia Services".
[i.18] ETSI TS 102 232-6: "Lawful Interception (LI); Handover Interface and Service-Specific Details
(SSD) for IP delivery; Part 6: Service-specific details for PSTN/ISDN services".
[i.19] ETSI TS 102 657: "Lawful Interception (LI); Retained data handling; Handover Interface for the
request and delivery of retained data".
[i.20] ETSI TS 103 462: "Lawful Interception (LI); Inter LEMF Handover Interface".
3 Definition of terms and abbreviations
3.1 Terms
For the purposes of the present document, the following terms apply:
common domain: set of objects, which are part of the definition of a protocol or a set of related protocols
information object: well-defined piece of information, definition, or specification, which requires a name in order to
identify its use in an instance of communication
Object IDentifier (OID): value (distinguishable from all other such values), which is associated with an information
object
NOTE: An object identifier consists of a sequence of integers. Each integer represents a node in the object
identifier tree. So, each successive integer can be thought of as a selection of an end of a branch of the
tree. The branch is traversed to get to the next level in the tree.
3.2 Abbreviations
For the purposes of the present document, the following abbreviations apply:
ASN.1 Abstract Syntax Notation One
AT-D Access and Terminals - Digital
CR Change Request
EP ETSI Project
LI Lawful Interception
OID Object IDentifier
ROSE Remote Operation Service Element
TC Technical Committee
TETRA TErrestrial Trunked RAdio
ETSI
---------------------- Page: 6 ----------------------
7 ETSI TR 102 503 V1.12.1 (2018-10)
4 Structure of the ETSI domain
4.1 Tree structure
Figure 1 contains the structure for the ETSI domain with the included Lawful Intercept and Retained data handling
domain and ASN.1 modules from other Lawful Interception (LI) specifications.
ETSI/TC LI will act as the formal registration authority for the Lawful Intercept and Retained data handling domain,
except for the "threeGPP(4)" subdomain which is administrated by 3GPP/SA3-LI, ETSI/TC AT-D is responsible for the
"ts101909(1909)" subdomain and ETSI/EP TETRA is responsible for the "en301040(1040)" subdomain.
4.2 Description of the ETSI domain
Tables 1 to 4 contain the OIDs of the ETSI domain. The entries in the last column in the tables point to the specification
where the modules can be found.
For information, in addition to those OIDs defined within ETSI/TC LI, table 5 contains the OIDs for the ROSE
operations. Because of the imports, the ASN.1 modules of ROSE will be included when syntax checking or compiling
the LI specific ASN.1 modules.
ETSI
---------------------- Page: 7 ----------------------
8 ETSI TR 102 503 V1.12.1 (2018-10)
root
itu-t (0)
iso (1)
identified-organization (4)
identified–organization (3)
member-body (2)
ETSI domain etsi (0)
dod (6)
us (840)
internet (1)
en301040 (1040) securityDomain (2) tia (113737)
ts101909 (1909)
private (4)
laes (2)
part20 (20)
fraud (1)
lawfulIntercept (2) retainedData (3) informationHandover (4)
enterprise (1)
subpart1(1) subpart2(2)
rdHeader (0)
ilhi(0)
cable-Television
tr45 (0)
Laboratories-Inc (4491)
[TS 103 462]
[TS 102 657]
j-std-025 (0)
clapProject (6)
hi1 (0) hi2 (1)
tetra (6)
hi3 (2) him (3) threeGPP (4) li-ps (5)
[TS 101 671] [TS 133 108] [TS 102 232-1]
clapProjPacketCable (2)
gSMLI (5)
notificationOperations (1) circuitLI (1) tETRALI (2)
gPRSLI (3) cclinkLI (4)
pktcLawfulIntercept (5)
t1 (1)
pstnIsdn (6)
email (2) iPAccess (3) iPMultimedia (5)
genHeader (1) l2Access (4)
pcesp (1)
t1-678 (0)
specific version
Figure 1: Tree structure of ETSI domain
ETSI
---------------------- Page: 8 ----------------------
9 ETSI TR 102 503 V1.12.1 (2018-10)
Table 1: OIDs of the ETSI Lawful Intercept domain
Object IDentifier Specification
ETSI TR 102 503 V1.12.1
(the present document)
fraud(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.4
version1(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.4
version2(2) ETSI ES 201 671 [i.2], V2.1.1 clause D.4
version3(3) ETSI TS 101 671 [i.3], V2.9.1 clause D.4
notification
hi1(0) version4(4) ETSI TS 101 671 [i.3], V2.11.1 clause D.4
Operations (1)
version5(5) ETSI TS 101 671 [i.3], V2.12.1 clause D.4
version6(6) ETSI TS 101 671 [i.3], V3.3.1 clause D.4
version7(7) ETSI TS 101 671 [i.3], V3.13.1 clause D.4
version1(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.5
version2(2) ETSI ES 201 671 [i.2], V2.1.1 clause D.5
version3(3) ETSI TS 101 671 [i.3], V2.5.1 clause D.5
version4(4) ETSI TS 101 671 [i.3], V2.7.1 clause D.5
version5(5) ETSI TS 101 671 [i.3], V2.9.1 clause D.5
version6(6) ETSI TS 101 671 [i.3], V2.10.1 clause D.5
version7(7) ETSI TS 101 671 [i.3], V2.11.1 clause D.5
version8(8) ETSI TS 101 671 [i.3], V2.12.1 clause D.5
version9(9) ETSI TS 101 671 [i.3], V2.13.1 clause D.5
hi2(1)
version10(10) ETSI TS 101 671 [i.3], V2.14.1 clause D.5
version11(11) ETSI TS 101 671 [i.3], V3.5.1 clause D.5
identified-
itu-t (0) etsi(0) securityDomain(2)
version12(12) ETSI TS 101 671 [i.3], V3.6.1 clause D.5
organizations(4)
version13(13) ETSI TS 101 671 [i.3], V3.7.1 clause D.5
lawfulIntercept(2)
version14(14) ETSI TS 101 671 [i.3], V3.8.1 clause D.5
version15(15) ETSI TS 101 671 [i.3], V3.9.1 clause D.5
version16(16) ETSI TS 101 671 [i.3], V3.10.1 clause D.5
version17(17) ETSI TS 101 671 [i.3], V3.11.1 clause D.5
version18(18) ETSI TS 101 671 [i.3], V3.12.1 clause D.5
version1(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.6
version2(2) ETSI ES 201 671 [i.2], V2.1.1 clause D.6
circuitLI(1)
version3(3) ETSI TS 101 671 [i.3], V2.12.1 clause D.6
version4(4) ETSI TS 101 671 [i.3], V3.7.1 clause D.6
ETSI ES 201 671 [i.2], V1.1.1 clause A.7
tETRALI(2) version1(1)
For Further Study
version1(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.8
hi3(2) gPRSLI(3) version2(2) ETSI TS 101 671 [i.3], V2.10.1 clause D.9
version3(3) ETSI TS 101 671 [i.3], V2.12.1 clause D.9
version1(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.9
version2(2) ETSI ES 201 671 [i.2], V2.1.1 clause D.8
cclinkLI(4)
version3(3) ETSI TS 101 671 [i.3], V2.7.1 clause D.8
version4(4) ETSI TS 101 671 [i.3], V2.12.1 clause D.8
ETSI ES 201 671 [i.2], V2.1.1 clause D.2
gSMLI(5)
For Further Study
ETSI
---------------------- Page: 9 ----------------------
10 ETSI TR 102 503 V1.12.1 (2018-10)
Object IDentifier Specification
version1(1) ETSI ES 201 671 [i.2], V1.1.1 clause A.3
him(3) version2(2) ETSI ES 201 671 [i.2], V2.1.1 clause D.3
version3(3) ETSI TS 101 671 [i.3], V2.12.1 clause D.3
Notification
Operations (1)
hi1(0) r12(12) version-0(0) 3GPP TS 33.108 [i.4], V12.7.0 clause M.2
threeGPP
version-1(1) 3GPP TS 33.108 [i.4], V12.8.0 clause M.2
(4)
version-2(2) 3GPP TS 33.108 [i.4], V12.11.0 clause M.2
r13(13) version-0(0) 3GPP TS 33.108 [i.4], V13.2.0 clause M.2
version-1(1) 3GPP TS 33.108 [i.4], V13.4.0 clause M.2
version-1(1) 3GPP TS 33.108 [i.4], V5.0.0 clause B.3
version-2(2) 3GPP TS 33.108 [i.4], V6.0.0 clause B.3
version-3(3) 3GPP TS 33.108 [i.4], V5.7.0 clause B.3
r5(5)
version-4(4) 3GPP TS 33.108 [i.4], V5.8.0 clause B.3
version-3(3) 3GPP TS 33.108 [i.4], V6.5.0 clause B.3
version-4(4) 3GPP TS 33.108 [i.4], V6.6.0 clause B.3
r6(6)
version-5(5) 3GPP TS 33.108 [i.4], V6.7.0 clause B.3
version-6(6) 3GPP TS 33.108 [i.4], V6.8.0 clause B.3
version-1(1) 3GPP TS 33.108 [i.4], V7.2.0 clause B.3
r7(7) version-2(2) 3GPP TS 33.108 [i.4], V7.3.0 clause B.3
version-3(3) 3GPP TS 33.108 [i.4], V7.8.0 clause B.3
r8(8) version-1(1) 3GPP TS 33.108 [i.4], V8.0.0 clause B.3
identified-
itu-t (0) etsi(0) securityDomain(2) lawfulIntercept(2)
organizations(4) version-1(1) 3GPP TS 33.108 [i.4], V10.0.0 clause B.3
r10(10) version-2(2) 3GPP TS 33.108 [i.4], V10.2.0 clause B.3
version-3(3) 3GPP TS 33.108 [i.4], V10.3.0 clause B.3
r11(11) version-0(0) 3GPP TS 33.108 [i.4], V11.3.0 clause B.3
hi2(1)
threeGPP
version-0(0) 3GPP TS 33.108 [i.4], V12.1.0 clause B.3
(4)
version-1(1) 3GPP TS 33.108 [i.4], V12.2.0 clause B.3
version-2(2) 3GPP TS 33.108 [i.4], V12.3.0 clause B.3
version-3(3) 3GPP TS 33.108 [i.4], V12.4.0 clause B.3
r12(12) version-4(4) 3GPP TS 33.108 [i.4], V12.5.0 clause B.3
version-5(5) 3GPP TS 33.108 [i.4], V12.6.0 clause B.3
version-6(6) 3GPP TS 33.108 [i.4], V12.7.0 clause B.3
version-7(7) 3GPP TS 33.108 [i.4], V12.8.0 clause B.3
version-8(8) 3GPP TS 33.108 [i.4], V12.9.0 clause B.3
version-9(9) 3GPP TS 33.108 [i.4], V12.11.0 clause B.3
version-0(0) 3GPP TS 33.108 [i.4], V13.0.0 clause B.3
r13(13)
version-1(1) 3GPP TS 33.108 [i.4], V13.2.0 clause B.3
version-0(0) 3GPP TS 33.108 [i.4], V14.0.0 clause B.3
r14(14) version-1(1) 3GPP TS 33.108 [i.4], V14.1.0 clause B.3
version-2(2) 3GPP TS 33.108 [i.4], V14.5.0 clause B.3
r15(15) version-0(0) 3GPP TS 33.108 [i.4], V15.1.0 clause B.3
version-1(1) 3GPP TS 33.108 [i.4], V5.0.0 clause B.4
hi3(2)
r5(5) version-2(2) 3GPP TS 33.108 [i.4], V5.9.0 clause B.4
ETSI
---------------------- Page: 10 ----------------------
11 ETSI TR 102 503 V1.12.1 (2018-10)
Object IDentifier Specification
version-1(1) 3GPP TS 33.108 [i.4], V6.5.0 clause B.4
r6(6) version-2(2) 3GPP TS 33.108 [i.4], V6.7.0 clause B.4
version-3(3) 3GPP TS 33.108 [i.4], V6.8.0 clause B.4
r7(7) version-0(0) 3GPP TS 33.108 [i.4], V7.3.0 clause B.4
version-1(1) 3GPP TS 33.108 [i.4], V6.1.0 clause B.3a
version-2(2) 3GPP TS 33.108 [i.4], V6.6.0 clause B.3a
r6(6) version-3(3) 3GPP TS 33.108 [i.4], V6.8.0 clause B.3a
version-0(0) 3GPP TS 33.108 [i.4], V7.3.0 clause B.3a
r7(7)
version-1(1) 3GPP TS 33.108 [i.4], V7.8.0 clause B.3a
hi2CS(3)
r11(11) version-1(1) 3GPP TS 33.108 [i.4], V11.0.0 clause B.3a
version-0(0) 3GPP TS 33.108 [i.4], V13.0.0 clause B.3a
r13(0)
version-1(1) 3GPP TS 33.108 [i.4], V13.1.0 clause B.3a
r13(13)
version-2(2) 3GPP TS 33.108 [i.4], V13.4.0 clause B.3a
r14(14) version-0(0) 3GPP TS 33.108 [i.4], V14.0.0 clause B.3a
version1(1) 3GPP TS 33.108 [i.4], V6.5.0 clause B.6
r6(6) version2(2) 3GPP TS 33.108 [i.4], V6.8.0 clause B.6
hi3CS(4)
r7(7) version0(0) 3GPP TS 33.108 [i.4], V7.3.0 clause B.6
r13(13) version0(0) 3GPP TS 33.108 [i.4], V13.2.0 clause B.6
version1(1) 3GPP TS 33.108 [i.4], V6.5.0 clause B.5
him(5) version2(2) 3GPP TS 33.108 [i.4], V7.1.0 clause B.5
version3(3) 3GPP TS 33.108 [i.4], V13.2.0 clause B.5
r7(7) version-1(1) 3GPP TS 33.108 [i.4], V7.8.0 clause B.7
r8(8) version-1(1) 3GPP TS 33.108 [i.4], V8.0.0 clause B.7
version-1(1) 3GPP TS 33.108 [i.4], V12.3.0 clause B.7
hi2wlan(6) r12(12) version-2(2) 3GPP TS 33.108 [i.4], V12.5.0 clause B.7
version-3(3) 3GPP TS 33.108 [i.4], V12.8.0 clause B.7
version-0(0) 3GPP TS 33.108 [i.4], V13.0.0 clause B.7
r13(13)
version-1(1) 3GPP TS 33.108 [i.4], V13.2.0 clause B.7
r8(8) version1(0) 3GPP TS 33.108 [i.4], V8.4.0 clause B.8
hi2mbms(7)
r12(12) version1(0) 3GPP TS 33.108 [i.4], V12.10.0 clause B.8
r8(8) version-3(3) 3GPP TS 33.108 [i.4], V8.4.0 clause B.9
version-1(1) 3GPP TS 33.108 [i.4], V10.0.0 clause B.9
r10(10) version-2(2) 3GPP TS 33.108 [i.4], V10.0.0 clau
...