Policy Rules for Disclosure and Modification of Geographic Information ( draft-ietf-geopriv-policy-00.txt ) Authors: H. Schulzrinne J. Morris H. Tschofenig.

Slides:



Advertisements
Similar presentations
Presence, Security and Privacy. VON The Current Environment Many Faces of Security Authentication Verify someone is who they.
Advertisements

XCAP Tutorial Jonathan Rosenberg.
IPP Notification and Notification Services White Paper Hugo Parra; Novell, Inc. October 6, 1999 The intent of this paper is to supplement the discussions.
Notification Explosion Calendaring –You have a new meeting request –Your meeting begins in 15 minutes SIP –Hello HTTP/WebDAV –A resource you want to edit.
Yunling Wang VoIP Security COMS 4995 Nov 24, 2008 XCAP The Extensible Markup Language (XML) Configuration Access Protocol (XCAP)
1 CPCP Hisham Khartabil XCON WG IETF 60, San Diego 2 nd August, 2004
Access Control Methodologies
XML Configuration Access Protocol (XCAP) Jonathan Rosenberg dynamicsoft.
Using Presence Information to Develop Converged Telecom Services Standards and Challenges Parijat Garg Computer Science, IIT Bombay.
Instant Message Delivery Notification (IMDN) for Common Presence and Instant Messaging (CPIM) Messages draft-burger-sipping-imdn-02.
Identity, Spheres and Privacy Rules Henning Schulzrinne (with Hannes Tschofenig and Richard Barnes) Workshop on Identity, Information and Context October.
Security in Databases. 2 Outline review of databases reliability & integrity protection of sensitive data protection against inference multi-level security.
SIMPLEStone – A presence server performance benchmarking standard SIMPLEStone – A presence server performance benchmarking standard Presented by Vishal.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
XCON architecture and protocol musings Henning Schulzrinne Columbia University.
Presence Vishal Kumar Singh and Henning Schulzrinne Feb 10, 2006.
1 Network Management and SNMP  What is Network Management?  ISO Network Management Model (FCAPS)  Network Management Architecture  SNMPv1 and SNMPv2.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
IETF 68 – SIMPLE WG SIMPLE Problem Statement draft-ietf-simple-interdomain-scaling-analysis-00 Avshalom Houri – IBM Tim Rang - Microsoft Edwin Aoki – AOL.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Enforcing Concurrent Logon Policies with UserLock.
Chapter 6: Packet Filtering
An XMPP (Extensible Message and Presence Protocol) based implementation for NHIN Direct 1.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
RECALL THE MAIN COMPONENTS OF KIM Functional User Interfaces We just looked at these Reference Implementation We will talk about these later Service Interface.
Abierman-nanog-30may03 1 XML Router Configs BOF Operator Involvement Andy Bierman
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
A Document Format for Expressing Privacy Preferences H. Schulzrinne, J. Morris, H. Tschofenig, J. Cuellar, J. Polk, J. Rosenberg.
Composing Presence Information Henning Schulzrinne Ron Shacham Wolfgang Kellerer Srisakul Thakolsri (ID-schulzrinne-simple-composition-02) IETF 66 SIMPLE.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Database Design and Management CPTG /23/2015Chapter 12 of 38 Functions of a Database Store data Store data School: student records, class schedules,
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
EAI WG meeting IETF-65, March 20, Agenda 17:40 Welcome, blue sheet, scribe, agenda bashing 17:50 Review of WG charter (approved) 17:55 Problem/framing:
(we need your advice!) Jon Peterson MIT– December 2010 IETF & Privacy.
CE Operating Systems Lecture 21 Operating Systems Protection with examples from Linux & Windows.
Data Manipulation Jonathan Rosenberg dynamicsoft.
XCAP Jonathan Rosenberg dynamicsoft. Changes in Main Spec Removed POST usage Clarified the meaning of PUT for inserts vs. modifies Added AUID grammar.
1 CPCP Open Issues Hisham Khartabil XCON WG Interim Meeting, Boston 26 th May, 2004
SIP PUBLISH draft-ietf-simple-publish-01 Aki Niemi
Core VoIP and 911 issues and alternatives Henning Schulzrinne Columbia University August 2003.
ORBIT: Location- based services Henning Schulzrinne Columbia University.
IETF 67 – SIMPLE WG SIMPLE Problem Statement Draft-rang-simple-problem-statement-01 Tim Rang - Microsoft Avshalom Houri – IBM Edwin Aoki – AOL.
Conference Control Manipulation Protocol (CCMP) draft-ietf-xcon-ccmp-03.txt Authors: Mary Barnes Chris Boulton.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
March 2004GEOPRIV - IETF 59 (Seoul)1 GEOPRIV Policy draft-ietf-geopriv-policy draft-ietf-geopriv-common-policy Henning Schulzrinne Columbia University.
SIP PUBLISH Method Jonathan Rosenberg dynamicsoft.
1 draft-sidr-bgpsec-protocol-05 Open Issues. 2 Overview I received many helpful reviews: Thanks Rob, Sandy, Sean, Randy, and Wes Most issues are minor.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 CPCP Hisham Khartabil XCON WG IETF 59, Seoul
SIP Events: Changes and Open Issues IETF 50 / SIP Working Group Adam Roach
W3C Workshop on Languages for Privacy Policy Negotiation and Semantics- Driven Enforcement Report Hannes Tschofenig IETF 67, San Diego, November 2006.
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Company Confidential XCAP Usage for Publishing Presence Information draft-isomaki-simple-xcap-publish-usage-00.
SIPPING Drafts Jonathan Rosenberg dynamicsoft. Conferencing Package Issues Only one – scope Depends on broader work in conferencing May include –Participant.
Module 5: Managing Content. Overview Publishing Content Executing Reports Creating Cached Instances Creating Snapshots and Report History Creating Subscriptions.
ORBIT: Multimedia Messaging & location- based services Henning Schulzrinne Columbia University.
This was written with the assumption that workbooks would be added. Even if these are not introduced until later, the same basic ideas apply Hopefully.
Jonathan Rosenberg dynamicsoft
XCON WG IETF-64 Meeting XCON Framework Overview & Issues
WEB SERVICES From Chapter 19 of Distributed Systems Concepts and Design,4th Edition, By G. Coulouris, J. Dollimore and T. Kindberg Published by Addison.
draft-ietf-simple-message-sessions-00 Ben Campbell
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
Carrying Location Objects in RADIUS
draft-ietf-geopriv-lbyr-requirements-02 status update
Event notification and filtering
Composing Presence Information
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
Jonathan Rosenberg dynamicsoft
WEB SERVICES From Chapter 19, Distributed Systems
Policy enforcement and filtering for geospatial information
Presentation transcript:

Policy Rules for Disclosure and Modification of Geographic Information ( draft-ietf-geopriv-policy-00.txt ) Authors: H. Schulzrinne J. Morris H. Tschofenig J. Cuellar J. Polk

Permissions and Rules Henning Schulzrinne

IETF#58 - Geopriv WG History Design team created after the Vienna IETF (IETF#57) Various drafts were used as input. Discussions lead to a draft which was presented at the Geopriv Interim Meeting in Washington (Sept. 2003): Draft includes — Geopriv interim meeting discussions & decisions — Content of previous drafts such as

IETF#58 - Geopriv WG Architectures for (geo) information access Claim: all using protocols fall into one of these categories Presence or event notification — “circuit-switched” model — subscription: binary decision Messaging — , SMS — basically, event notification without (explicit) subscription — but often out-of-band subscription (mailing list) Request-response — SIP, RPC, HTTP; also DNS, LDAP — typically, already has session-level access control (if any at all) Presence is superset of other two

IETF#58 - Geopriv WG Presence/Event notification Three places for policy enforcement — subscription  binary only policy, no geo information subscriber may provide filter  could reject based on filter (“sorry, you only get county-level information”)  greatly improves scaling since no event-level checks needed — notification  content filtering, suppression of all or parts only policy, no geo information — third-party notification e.g., event aggregator can convert models: gateway subscribes to event source, distributes by both policy and geo data

IETF#58 - Geopriv WG Presence model subscription policy event generator policy subscriber filter rate limiter change to previous notification? for each watcher subscriber (watcher) SUBSCRIBE NOTIFY

IETF#58 - Geopriv WG Protocols Rule Updates XCAP, WebDav, FTP, etc. Rule Holder Location Server Location Recipient Location Generator Policies Location Objects of Targets Location Requests / Responses 'Using protocols' (e.g., SIP, HTTP) Location Updates Watcher = Location Recipient Presentity = Target

IETF#58 - Geopriv WG Architectural Assumption Distributed Policies Decision at Vienna IETF to have two „namespaces“ a) Simple policies b) More complex policies (a) is attached to the location object (b) might either be attached to the location object or somewhere external (e.g., location server) Transformation policies: (b) modifies (a) Multiple location server along the LO transmission path (or "What is the end?"): — Applying policies in an iterative procedure should only add permissions. → Additive permissions

IETF#58 - Geopriv WG Policy rules There is no sharp Geopriv boundary Presence contains other sensitive data (activity, icons, …) and others may be added Example: future extensions to personal medical data — “only my cardiologist may see heart rate, but notify everybody in building if heart rate = 0” Thus, generic policies are necessary

IETF#58 - Geopriv WG Goals Relational table representation Permit only Additive permissions Upgradeable Versioning support Protocol-independent No false assurance

IETF#58 - Geopriv WG Non-Goals No queries No external references No regular expression No all-except conditions No repeat times

Changes and Open Issues Hannes Tschofenig

IETF#58 - Geopriv WG Logging Need for logging functionality has been raised in [Core] draft. Currently not provided. Realization simple but there are some problems: — If policies are attached to the LO then the RM might not know where the log files are stored. — Interaction with retention mechanism. More granularity might be required. Logging on a per-rule basis or "target-wide"/ "system-wide"?

IETF#58 - Geopriv WG Encryption It was decided that Geopriv protects the Location Object using S/MIME (application-layer security) This issue addresses whether encryption (+ info about encryption) should be applied on a per-rule or per-system basis. Some further issues deserve attention such as: — What happens if the public key is not known for the recipient? — What encryption technique should I use? — Should an identity be provided within the rule? — What happens if this identity specifies a SIPS URI (i.e., requiring that the request be via SIP-over-TLS) and the flag is not set, should it be refused? — If encryption is specified and the request was HTTP (not HTTPS), should the request be refused?

IETF#58 - Geopriv WG Identities & Authentication Types Several approaches have been mentioned to implement "Permission to disclose only to someone presenting a specified key" behavior. — XCAP Authz: and with SIP specific authentication mechanisms such as None, TLS, Digest, SMIME and P-Asserted-ID. — Authentication level in previous geopriv draft. Current draft dropped concept. Reason: — Practical problems — Difficult to provide proper meaning — Difficult to understand for end-user

IETF#58 - Geopriv WG Notifications Require notice to the rule maker if location is provided Difficult if you don't specify how. Currently there is no such mechanism define in Geopriv although many protocols support event notifications: — SIP, Jabber, SOAP events, , some kind of RPC mechanism, an HTTP request to a specific address, syslog, etc. Details (such as content) need to be worked out. DoS attacks need to be addressed.

IETF#58 - Geopriv WG Naming Currently, defines protocol-specific identities, rather than generic ones Some protocols (SIP, XMPP, …) naturally have user identities in URIs — — May not be the same as ID used to authenticate (e.g., HTTP/SIP Digest identity) — one authentication identity may allow for multiple protocol (e.g., SIP) identities No obvious way to encode for HTTP — needs: host, realm (?), username — fake: — new URI scheme —  all ugly Probably need to define this for each using protocol

IETF#58 - Geopriv WG Domains and Individuals Currently, only identities represented as URIs XCAP has notion of domain match, e.g., sip:example.com Not all authentication systems have notion of but many do in practice. Somewhat complicates matching, but otherwise no architectural implications Structure of the identity needs to be known for matching.

IETF#58 - Geopriv WG Exceptions Exceptions only useful if domains (or groups) allowed — domains: probably most useful for mid-size organizations — small organizations can enumerate — really large organizations unlikely (give access to all my 753,000 fellow postal employees?) Two kinds of exceptions: — atomic = always part of the same rule in particular, must be very careful about replacing just exception element  temporarily unsafe — override = different rule, overrides more general rule Override breaks additive model — privacy-unsafe if rule cannot be accessed

IETF#58 - Geopriv WG Exceptions, cont’d. Atomic exceptions simply limit matching and are probably ok Need to be sure we understand cases like: — Rule 1: example.com except — Rule 2: example.com except What permissions does Bob get? — If ‘Rule 1’, easy.

IETF#58 - Geopriv WG Relationship to XCAP XCAP  transport (HTTP) + rules + manipulation GEOPRIV has more general model: — carried in LO  may not be HTTP — no requirement that RM-LS interface is HTTP Tying rules and transport together seems unnecessary

IETF#58 - Geopriv WG Default Behavior (1/2) Default behavior: What has to be assumed for omitted values (i.e., for values how appear as 'NULL' values in an attribute of row). Default behavior specified for — Conditions and for — Permissions (Transformations) Differentiation seems to be necessary between — Attributes whose removal may lessen privacy (the R/D/microwave flags) and — Attributes whose removal can only increase privacy (location objects). Seems to be a technical issue only which requires further thoughts.

IETF#58 - Geopriv WG Default Behavior (2/2) Example Figure 1: Policy ConditionsActions/Transforms Target-IDLR-IDD-FlagCivil-Location tedallisonFALSEcity ted*TRUEcountry D-FlagCivil-Location TRUEcity Figure 2: Result of a query by LR "allison" for target "ted" Rule evaluation might lead to a counter-intuitive result. Needs to be fixed.

Questions?