Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.

Slides:



Advertisements
Similar presentations
Ecrit-unauthenticated-access IETF 75, Stockholm July 29, 2009 Hannes Tschofenig (attending virtually) Dirk Kroeselberg.
Advertisements

HTTP Dereference (draft-winterbottom-geopriv-deref-protocol-00) IETF-71 Philadelphia, March 2008 James Winterbottom Hannes Tschofenig Henning Schulzrinne.
March 2008IETF 71 (Philadelphia) - ECRIT1 Unauthenticated emergency communications Henning Schulzrinne Gabor Bajko S. McCann Hannes Tschofenig draft-schulzrinne-ecrit-unauthenticated-access-02.
Extensions for Unauthenticated and Unauthorized Devices draft-ietf-ecrit-unauthenticated-access-01 H. Schulzrinne, S. McCann, G. Bajko, H. Tschofenig,
ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne 1draft-winterbottom-ecrit-direct-01.
Additional Data related to an Emergency Call draft-ietf-ecrit-additional-data-00.txt Hannes Tschofenig Brian Rosen.
BRIAN ROSEN HANNES TSCHOFENIG draft-ietf-ecrit-data-only-ea-02.
ECRIT Virtual Interim Meeting 26th February, 2PM EST Marc Linsner Hannes Tschofenig.
RSVP Cryptographic Authentication "...RSVP requires the ability to protect its messages against corruption and spoofing. This document defines a mechanism.
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.
NSIS Transport Layer draft-ietf-nsis-ntlp-00.txt Slides:
Draft-ietf-ecrit-location-hiding-req Location Hiding: Problem Statement and Requirements Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark,
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
March 2009 (IETF 74)IETF - ECRIT1 LoST synchronization draft-ietf-ecrit-lost-sync-04 Henning Schulzrinne Hannes Tschofenig IETF 74, San Francisco.
August 13-14, 2002 Washington, DC Gary Richenaker Chair ENUM Forum
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
Ernst Langmantel Technical Director, Austrian Regulatory Authority for Broadcasting and Telecommunication (RTR GmbH) The opinions expressed in this presentation.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 76, Hiroshima Nov 11, 2009 Hannes Tschofenig Marc Linsner (attending virtually) Roger.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 81 – Quebec City, QC Canada July 25, 2011 Marc Linsner Richard Barnes Roger Marshall.
NSIS IETF 56 MONDAY, March 17, 2003: Morning Session TUESDAY, March 18, 2003: Afternoon Sessions I.
Requirements, Terminology and Framework for Exigent Communications H. Schulzrinne, S. Norreys, B. Rosen, H. Tschofenig.
 Chapter 14 – Security Engineering 1 Chapter 12 Dependability and Security Specification 1.
Security Requirements of NVO3 draft-hartman-nvo3-security-requirements-01 S. Hartman M. Wasserman D. Zhang 1.
Wireless Network Security. How Does Wireless Differ? Wireless networks are inherently insecure because data is transmitted over a very insecure medium,
PAWS Protocol to Access White Space DB IETF 81 Gabor Bajko, Brian Rosen.
ECRIT Virtual Interim Meeting 3rd June 2009, 1PM EDT (New York) Marc Linsner Hannes Tschofenig.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-ietf-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning Schulzrinne.
Multiple Interfaces (MIF) WG IETF 79, Beijing, China Margaret Wasserman Hui Deng
BRIAN ROSEN HANNES TSCHOFENIG HENNING SCHULZRINNE draft-rosen-ecrit-data-only-ea.
Implications of Trust Relationships for NSIS Signaling (draft-tschofenig-nsis-casp-midcom.txt) Authors: Hannes Tschofenig Henning Schulzrinne.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
Public Safety Answering Point (PSAP) Callbacks draft-ietf-ecrit-psap-callback-02.txt H. Schulzrinne, H. Tschofenig, M. Patel.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
RPsec Minneapolis in March (it’s a tradition!) IETF 62.
ECRIT IETF 70 December 2007 Vancouver Hannes Tschofenig Marc Linsner Roger Marshall.
1 Security Framework for MPLS-TP draft-mpls-tp-security-framework-01.txt Editors: Luyuan Fang Ben Niven-Jenkins
ECRIT requirements update draft-schulzrinne-ecrit-requirements-01 IETF 63 Aug 02, 2005 Roger Marshall
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 65.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
A SIP Load Control Event Package draft-shen-sipping-load-control-event-package-00.txt Charles Shen, Henning Schulzrinne, Arata Koike IETF 72, Dublin Ireland.
NSIS NAT/Firewall Signaling NSIS Interim Meeting Romsey/UK, June 2004 Martin Stiemerling, Hannes Tschofenig, Cedric Aoun.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linser Chairs.
Page 1 IETF Speermint Working Group Speermint draft-ietf-speermint-requirements-04 IETF 71 - Wednesday March 12, 2008 Jean-François Mulé -
Reducing Unwanted Communications in SIP (RUCUS) BOF Hannes Tschofenig Francois Audet.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-03.txt Hannes Tschofenig, Henning.
Applicability Statement of NSIS Protocols in Mobile Environments draft-ietf-nsis-applicability-mobility-signaling-06.txt Takako Sanda, Xiaoming Fu, Seong-Ho.
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 66, Montreal, June 2006.
Problem Statement: Media Independent Handover Signalling draft-hepworth-mipshop-mih-problem-statement-01 Ele Hepworth (*), Greg Daley, Srinivas Sreemanthula,
ECRIT - IETF 62 (March 2005) - Minneapolis 1 Requirements for Emergency Calling draft-schulzrinne-sipping-emergency-req-01 draft-ietf-sipping-sos-01 Henning.
GxxxS * – The NSIS Transport Layer draft-ietf-nsis-ntlp-07.txt Slides: Robert Hancock, Henning.
Technical Standards: Paving the Way to NG9-1-1
12th April 2007, SDO Emergency Services Workshop 2007
draft-rosen-nena-ecrit-requirements Brian Rosen
A. Báder, L. Westberg, G. Karagiannis,
Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba
Henning Schulzrinne Stephen McCann Gabor Bajko Hannes Tschofenig
Protocol for Carrying Authentication for Network Access - PANA -
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Securing the CASP Protocol
Charles Shen, Henning Schulzrinne, Arata Koike
IEEE Emergency Services
Henning Schulzrinne Hannes Tschofenig
Trustworthy Location ECRIT WG IETF 80 Tuesday, March 29, 2011
Presentation transcript:

Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj Shanmugam IETF#63, Paris August 2, 2005

Current Status -00 version at the ECRIT/GEOPRIV interim meeting Provided document as discussion input -01 update for IETF#63

Content (1/2) Terminology, Actors 5. Security Threats 5.1 Denial of Service Attacks 5.2 Call Identity Spoofing 5.3 Location Spoofing 5.4 Impersonating a PSAP 5.5 Signaling Message Modification 5.6 Modification of the Emergency Call 5.7 Loss of confidentiality 5.8 Replay Attack 5.9 Corrupting Configuration Information 5.10 Corrupting Database Information

Content (2/2) Section on security requirements. Most attacks lead to a Denial-of-service (resource exhaustion): –entities affected: directory call routing infrastructure PSAP –resources network bandwidth processing human resources (call takers, first responders) More detailed interim meeting presentation slides can be found at:

Next Steps Problem of this document similar to the -00 version of the requirements draft: –Many threats & requirements are relevant for the big picture of emergency handling but are outside the scope of ECRIT Primary focus should be: –Security threats related to the interaction with the Location->URI lookup mechanism Possible solution: –More detailed treatment of ECRIT specific aspects –Move many parts of the document to a separate document (BCP) Document editor?