draft-ietf-geopriv-lbyr-requirements-02 status update

Slides:



Advertisements
Similar presentations
1 © 2001, Cisco Systems, Inc. All rights reserved. © 2004, Cisco Systems, Inc. All rights reserved. Location Conveyance in SIP draft-ietf-sipping-location-requirements-02.
Advertisements

Authentication Applications The Kerberos Protocol Standard
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
CERTIFICATES “a document containing a certified statement, especially as to the truth of something ”
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
Domain Name System Security Extensions (DNSSEC) Hackers 2.
MIF API draft-ietf-mif-api-extension-05 Dapeng Liu.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
11 CONFIGURE INTERNET EXPLORER Chapter 5. Chapter 5: Configure Internet Explorer2 CHAPTER OVERVIEW AND OBJECTIVES  Configuring Accessibility and Language.
Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
-framework Brian Rosen. -11 version deals with IESG comments All comment resolved one way or another One open issue – spec(t)
HELD Location Acquisition Solution James Winterbottom Andrew Corporation March 2007.
Jun Li DHCP Option for Access Network Information draft-lijun-dhc-clf-nass-option-01.
XCON WG IETF-73 Meeting Instant Messaging Sessions with a Centralized Conferencing (XCON) System draft-boulton-xcon-session-chat-02 Authors: Chris Boulton.
Session Peering Protocol over SOAP I-D ( draft-ietf-drinks-spp-over-soap-01) draft-ietf-drinks-spp-over-soap-01 0 Presenter: Vikas Bhatia (On behalf of.
IETF GEOPRIV Status Richard L. Barnes BBN Technologies GEOPRIV Secretary Emergency Services Workshop October 2008.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-ietf-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning Schulzrinne.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan,
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Dec 5, 2007NEA Working Group1 NEA Requirement I-D IETF 70 – Vancouver Mahalingam Mani Avaya Inc.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
PCE 64 th IETF PCE Policy Architecture draft-berger-pce-policy-architecture-00.txt Lou Berger Igor Bryskin Dimitri Papadimitriou.
March 20, 2007BLISS BOF IETF-681 Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Jonathan Rosenberg dynamicsoft
Session-Independent Policies draft-ietf-sipping-session-indep-policy-02 Volker Hilt Jonathan Rosenberg Gonzalo.
Introduction Wireless devices offering IP connectivity
Open issues with PANA Protocol
XCON WG IETF-64 Meeting XCON Framework Overview & Issues
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
OAuth WG Conference Call, 11th Jan. 2013
Phil Hunt, Hannes Tschofenig
ECRIT Interim: SIP Location Conveyance
Kumiko Ono End-to-middle Security in SIP draft-ietf-sipping-e2m-sec-reqs-04 draft-ono-sipping-end2middle-security-03 Kumiko Ono.
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
Channel Control Interim substates for adding new slaves
Request History Capability – Requirements & Solution
Carrying Location Objects in RADIUS
ECRIT Architectural Considerations
IETF-70 EAP Method Update (EMU)
Requirements and Implementation Options for the Multiple Line Appearance Feature using the Session Initiation Protocol (SIP) draft-johnston-bliss-mla-req-00.
draft-ietf-ecrit-rough-loc
Service Layer Dynamic Authorization [SLDA]
DHCP Anonymity Profile Update
HTTP Enabled Location Delivery (HELD)
Using SSL – Secure Socket Layer
Chapter 14: Representing Identity
draft-ipdvb-sec-01.txt ULE Security Requirements
Network Security – Kerberos
Composing Presence Information
Alert Gateway Group (AGG)
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
Presented by: Francisco Martin-Recuerda
LbyR discussion Henning Schulzrinne Hannes Tschofenig Richard Barnes
AD RMS Templates Active Directory Rights Management Services (AD RMS)
Chinese wall model in the internet Environment
AD RMS Exclusions Active Directory Rights Management Services (AD RMS)
Solving the identity crisis draft-ietf-geopriv-common-policy-05
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
IEEE MEDIA INDEPENDENT HANDOVER DCN:
draft-ietf-dtn-bpsec-06
IETF80.
Security in Wireless Metropolitan Area Networks (802.16)
Security in Wireless Metropolitan Area Networks (802.16)
Presentation transcript:

draft-ietf-geopriv-lbyr-requirements-02 status update Roger Marshall IETF71 Philadelphia 2008

Changes since last version (1) A summary of changes from -01 to the current -02: Introduction - reworded "Basic Actors“ section changed to "Overview of Location by Reference" New diagram which includes RM (RuleMaker) element

Changes since last version (2) Changes between -01 and -02 (con’t): Changed C2. Location URI expiration: When a location URI has a limited validity interval, its lifetime MUST be indicated. (Also added to deref req section as D6) Changed C7. Location URI Valid-for: A location URI validity interval, if used, MUST include the validity time, in seconds, as an indication of how long the client can consider a location URI to be valid. (based on dhcp- uri-option example) Needs some text for baseline timestamp – “from now”

Changes since last version (3) Rewording Changes between -01 and -02 (con’t): C5. User Identity Protection: The location URI MUST NOT contain any user identifying information that identifies the user, device or address of record, (e.g., which includes phone extensions, badge numbers, first or last names, etc.), within the URI form. D3. Authentication: The location dereference protocol MUST include mechanisms to authenticate both the client and the server. D4. Dereferenced Location Form: The value returned by the dereference protocol MUST contain a well-formed PIDF-LO document.

Changes since last version (4) Rewording Changes between -01 and -02 (con’t): D5. Location URI Repeated Use: The location dereference protocol MUST support the ability for the same location URI to be resolved more than once, based on dereference server configuration. Added D9 and D10 per R. Barnes: D9. Location Privacy: The location dereference protocol MUST support the application of privacy rules to the dissemination of a requested location object. D10. Location Confidentiality: The dereference protocol MUST support encryption of messages sent between the location dereference client and the location dereference server, and MAY alternatively provide messaging unencrypted. Suggested need for more security related text inside

Changes since last version (5) Changes between -01 and -02 (con’t): Removed C4 Removed C4. Random Generated: The location URI MUST be hard to guess, i.e., it MUST contain a cryptographically random component. Replaced C4 with 3 new requirements C8. Location URI Anonymous: The location URI MUST NOT reveal any information about the Target other than it's location. C9. Location URI Not guessable: Location URIs that do not require authentication and authorization MUST NOT be guessable, based on the use of a cryptographically random sequence somewhere within the URI. (Note that the number of bits depends to some extent on the number of active location URIs that might exist at the one time; 128-bit is most likely enough for the short term.) C10. Location URI Optional: In the case of user-provided authorization policies, where anonymous or non-guessable location URIs are not warranted, the location configuration protocol MAY support optional location URI forms.

Open Issues List Discussion around Location-URIs: Location URI – encoding styles Random alphanumeric string Constrained for MUST use when auth^2 not used Unique if unique one of two things: …through space & time (e.g., SIP Call_ID) …within a domain for specified time Location URI – intention defined by type Static, location doesn’t get updated Dynamic, location updates Location URI – Possession model Under what circumstances? LCP acronym still in use… no heartburn? LCP = Link Control Protocol elsewhere (in IETF)