Trustworthy Location ECRIT WG IETF 80 Tuesday, March 29, 2011

Slides:



Advertisements
Similar presentations
1 © 2001, Cisco Systems, Inc. All rights reserved. © 2004, Cisco Systems, Inc. All rights reserved. Location Conveyance in SIP draft-ietf-sipping-location-requirements-02.
Advertisements

IETF 71 SIPPING WG meeting draft-ietf-sipping-pai-update-00.
HTTP Dereference (draft-winterbottom-geopriv-deref-protocol-00) IETF-71 Philadelphia, March 2008 James Winterbottom Hannes Tschofenig Henning Schulzrinne.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 78 – Maastricht, NL July 29, 2010 Marc Linsner Richard Barnes Roger Marshall.
ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne 1draft-winterbottom-ecrit-direct-01.
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 89 London March 5, 2014.
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
Problem Statement and Architecture for Information Exchange Between Interconnected Traffic Engineered Networks draft-farrel-interconnected-te-info-exchange-03.txt.
IETF ECRIT update Marc Linsner 5/11/10. ECRIT Charter (or a piece of it) ………The group will show how the availability of location data and call routing.
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Emergency Context Resolution with Internet Technologies (ECRIT) Marc Linsner Roger Marshall IETF 92 - Dallas March 24, 2015.
RTCWEB WG draft-aboba-rtcweb-ecrit-00 Bernard Aboba Martin Thomson July 30, 2012 IETF 84, Vancouver Please join the Jabber room:
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
RFC 3039 bis Qualified Certificates Profile Changes from RFC 3039.
-framework Brian Rosen. -11 version deals with IESG comments All comment resolved one way or another One open issue – spec(t)
Emergency Context Resolution with Internet Technologies (ecrit) IETF 76, Hiroshima Nov 11, 2009 Hannes Tschofenig Marc Linsner (attending virtually) Roger.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 81 – Quebec City, QC Canada July 25, 2011 Marc Linsner Richard Barnes Roger Marshall.
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 87 Berlin July 29, 2013.
March 15, 2005 IETF #62 Minneapolis1 EAP Discovery draft-adrangi-eap-network-discovery-10.txt Farid Adrangi ( )
1 Miscellaneous Capabilities for IP Network Infrastructure IETF 64 Vancouver, BC, Canada November 2005.
Doc.: IEEE /0118r0 Submission July 2012 Mika Kasslin, NokiaSlide 1 How to run WSO decision making with coexistence report announcements? Notice:
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
Page 1 IETF Speermint Working Group Speermint Requirements/Guidelines for SIP session peering draft-ietf-speermint-requirements-02 IETF 69 - Monday July.
SIP Extensions for Network-Asserted Caller Identity and Privacy within Trusted Networks Flemming Andreasen W. Marshall, K. K. Ramakrishnan,
ECRIT Basic Reqs draft-stastny-ecrit-requirements Richard Stastny Brian Rosen IETF62 Minneapolis.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
ECRIT IETF 70 December 2007 Vancouver Hannes Tschofenig Marc Linsner Roger Marshall.
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
Doc.: IEEE /1040r0 Submission September 2014 Dorothy Stanley, Aruba NetworksSlide 1 IEEE IETF Liaison Report Date: Authors:
DHCP-DNS Interaction Bernie Volz IETF-61, DHC WG.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linser Chairs.
1 IETF 91, 10 Nov 2014draft-behringer-anima-reference-model-00.txt A Reference Model for Autonomic Networking draft-behringer-anima-reference-model-00.txt.
SIP Extension for Multilevel Precedence and Preemption (MLPP)
Emergency Context Resolution with Internet Technologies (ECRIT) Chairs: Marc Linsner & Roger Marshall Standing In for the Chairs: Brian Rosen IETF 94.
ECRIT WG IETF-75 Trustworthy Location Bernard Aboba
Open issues with PANA Protocol
Enum dip indicator draft-stastny-iptel-tel-enumdi-00
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 86 Orlando March 13, 2013.
ECRIT Interim: SIP Location Conveyance
draft-rosen-nena-ecrit-requirements Brian Rosen
Location Configuration at Layer 7
ECRIT Architectural Considerations
draft-ietf-geopriv-lbyr-requirements-02 status update
draft-ietf-ecrit-rough-loc
March 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [4y SECN Agenda March 2018 Plenary] Date Submitted:
You can access this form from the UGA Foundation->Policies and Forms->Administrative Forms page under the section of Access / IT Forms or by typing the.
Migration-Issues-xx Where it’s been and might be going
<month year> doc.: IEEE < e> <Jan 2018>
IEEE IETF Liaison Report
IEEE IETF Liaison Report
P2PSIP WG IETF 84 P2PSIP WG Agenda & Status Tuesday, July 31st, 2012
English 1301 Week 6, Day 1 February 20, 2018.
STIR WG IETF-100 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-01) November, 2017 Ray P. Singh, Martin Dolly, Subir Das,
IEEE IETF Liaison Report
STIR WG IETF-99 PASSPorT Extension for Resource-Priority Authorization (draft-ietf-stir-rph-00) July, 2017 Ray P. Singh, Martin Dolly, Subir Das, and An.
IEEE IETF Liaison Report
Network Assigned Upstream-label
IEEE IETF Liaison Report
March 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [4y SECN Agenda March 2019 Interim] Date Submitted:
IEEE IETF Liaison Report
Proposal on TSC policy for ONAP release Maintenance
July 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [4y SECN Agenda July 2019 Plenary] Date Submitted:
SOAPAction At F2F in Dinard we narrowed the choice down to:
Marc Linsner Richard Barnes Roger Marshall
IETF80.
September 2019 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [4y SECN Agenda September 2019 Interim]
How to complete a form A step-by-step guide ReSPECT (version 1.0)
Presentation transcript:

Trustworthy Location ECRIT WG IETF 80 Tuesday, March 29, 2011 draft-ietf-ecrit-trustworthy-location-01 ECRIT WG IETF 80 Tuesday, March 29, 2011

Issues Fixed and Outstanding Issues fixed in -01: Issue #1: Threat Analysis: Missing Context Issue #2: Trustworthy Location, Identity and Accountability Issues still outstanding Issue #3: Out of date references Issue #4: Untrusted location and provider intent

Issue #1 -00 Section 4 has discussion of threats, but no discussion of previous ECRIT and GEOPRIV threat model documents. Not clear how threat model in this document relates to threats explored in previous documents. Resolution: summarize RFC 5069 and RFC 3694, describe focus of threat model in this document.

Issue #2 -00 text asserted that “trustworthy location may be more important than identity”, without much explanation. In practice, “Trustworthy Location” and accountability issues need to be analyzed together Where accountability is low, prank calls (including location spoofing) can increase. With the PSTN, it is not possible to contact a PSAP in another country; this may not necessarily be the case with IP-based emergency services. International prank calls possible. Location may be trustworthy, but emergency services call may not be. Call could describe an invented situation at an actual location. (Partial) resolution: add text on the accountability issue. Additional text (and thinking) needed.

Issue #3: Out-of-date References A number of the references are out of date, including references to location hiding, location conveyance, location dependability, HELD deref, etc. Resolution: update Section 9.1 to include latest references (see TRAC for details).

Issue #4: Untrusted Location and Provider Intent Not every LCP is intended for use in emergencies. For example, "location based services" can have terms of service that disclaim fitness for use in an emergency. Not just a legal/liability issue -- the services may not provide a level of reliability and accuracy expected of an emergency services-quality location service.

Issue #4: Potential Resolutions Brian Rosen: "send it, but let us know what you know about it". No entity should withhold location information unless it is certain that the information it is withholding is fraudulent. While the PSAP doesn't like having to decide what to do, it's better that it has the information and knows that some of it MAY be suspect…. We want whatever location to be accurately labeled (source, method, uncertainty).

Issue #4: Potential Resolution (cont’d) Martin Dawson: The response time attribute in the HELD location request allows the client to indicate that the intent is to use the location for emergency services (routing and/or dispatch). Depending on jurisdiction policy then the LIS may choose to provide a location or not depending on whether the operator is required to warrant such information. The client still has the opportunity to ask for location without these qualifiers if it wants to proceed on that basis; in that situation the operator does not know that the intent is to use the location for emergencies.  When it comes to a de-reference between the local emergency service and the network operator, there should be a clear understanding of obligations and undertakings outside the scope of the protocols anyway. I think that de-referencing is always valuable for this sort of validation and it’s good policy to always provide and convey a reference for this purpose.  

Feedback?