Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba

Slides:



Advertisements
Similar presentations
Ecrit-unauthenticated-access IETF 75, Stockholm July 29, 2009 Hannes Tschofenig (attending virtually) Dirk Kroeselberg.
Advertisements

HTTP Dereference (draft-winterbottom-geopriv-deref-protocol-00) IETF-71 Philadelphia, March 2008 James Winterbottom Hannes Tschofenig Henning Schulzrinne.
March 2008IETF 71 (Philadelphia) - ECRIT1 Unauthenticated emergency communications Henning Schulzrinne Gabor Bajko S. McCann Hannes Tschofenig draft-schulzrinne-ecrit-unauthenticated-access-02.
ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne 1draft-winterbottom-ecrit-direct-01.
Additional Data related to an Emergency Call draft-ietf-ecrit-additional-data-00.txt Hannes Tschofenig Brian Rosen.
DOIC Restructuring. Restructuring Purpose Improve readability Separate informative from normative text Isolate loss abatement algorithm behavior into.
Reading and writing reports
Out of Jurisdiction Emergency Routing draft-winterbottom-ecrit-priv-loc-01.txt James Winterbottom, Hannes Tschofenig, Laura Liess.
Risks with IP-based Emergency Services draft-ietf-ecrit-trustworthy-location.
STIR Secure Telephone Identity. Context and drivers STIR Working Group Charter Problem Statement Threats Status of work Related work and links Introduction.
Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
1 Secure DNS Solutions Rooster. 2 Introduction What does security mean for DNS? What security problems exist for DNS, what is being done about them, and.
Session Initiation Protocol (SIP) Event Package for the Common Alerting Protocol (CAP) B. Rosen, H. Schulzrinne, H. Tschofenig.
SDO Emergency Services Coordination Workshop (ESW06) Report Hannes Tschofenig IETF 67, San Diego, November 2006.
Can SIP benefit from HIP (or vice versa)? Exchanging Host Identities in SIP Hannes Tschofenig, Vesa Torvinen, Joerg Ott, Henning Schulzrinne, Tom Henderson,
ECRIT interim meeting - May Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats Hannes Tschofenig Henning.
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
European Interoperability Architecture e-SENS Workshop : Document Interoperability Solutions use case 7-8 January 2015.
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning.
Response to Call Back questions IETF 77 – Anaheim Stephen McCann, RIM.
(we need your advice!) Jon Peterson MIT– December 2010 IETF & Privacy.
IETF70, Vancouver, December 2007draft-wing-sipping-srtp-key-021 Disclosing Secure RTP (SRTP) Session Keys draft-wing-sipping-srtp-key-02 Dan Wing,
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-ietf-geopriv-l7-lcp-ps-00.txt Hannes Tschofenig, Henning Schulzrinne.
BRIAN ROSEN HANNES TSCHOFENIG HENNING SCHULZRINNE draft-rosen-ecrit-data-only-ea.
Things to Think About Eliot Lear IETF 59. What the document ISN’T This is not a requirements document –We did one of those already – RFC 3582 Not an architectural.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
Public Safety Answering Point (PSAP) Callbacks draft-ietf-ecrit-psap-callback-02.txt H. Schulzrinne, H. Tschofenig, M. Patel.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
1 st Reading: SWBAT describe and clarify the idea of “fear” by writing a QuickWrite and identifying the Big Idea of an article 2 nd Reading: SWBAT assess.
ECRIT IETF 70 December 2007 Vancouver Hannes Tschofenig Marc Linsner Roger Marshall.
Security Threats and Requirements for Emergency Calling draft-tschofenig-ecrit-security-threats-01.txt Hannes Tschofenig, Henning Schulzrinne, Murugaraj.
W3C Workshop on Languages for Privacy Policy Negotiation and Semantics- Driven Enforcement Report Hannes Tschofenig IETF 67, San Diego, November 2006.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 65.
Security Hannes Tschofenig. Goal for this Meeting Use the next 2 hours to determine what the security consideration section of the OAuth draft(s) should.
Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices draft-ietf-ecrit-unauthenticated-access-03.txt.
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linser Chairs.
Reducing Unwanted Communications in SIP (RUCUS) BOF Hannes Tschofenig Francois Audet.
GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements draft-tschofenig-geopriv-l7-lcp-ps-03.txt Hannes Tschofenig, Henning.
Web Authorization Protocol WG Hannes Tschofenig, Derek Atkins.
Presentation Material ● PAR ● 5 Criteria ● ✔ Problem tutorial ● ✔ Problem statement (2-6) ● ✔ Why VoIP doesn't work today (7-8) ● ✔ What ECRIT has done.
ECRIT WG IETF-75 Trustworthy Location Bernard Aboba
12th April 2007, SDO Emergency Services Workshop 2007
47th IETF - Adelaide Chris Lonvick
Outcome TFCS-05 // May OICA, Paris
Evaluating Existing Systems
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Request History Capability – Requirements & Solution
Location Configuration at Layer 7
Evaluating Existing Systems
Global Standards Collaboration (GSC) GSC-15
Henning Schulzrinne Stephen McCann Gabor Bajko Hannes Tschofenig
SDLS Protocol Green Book initiation
WMO IT Security Incident Process
Thoughts on VoIP and Emergency Calling
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
Securing the CASP Protocol
Cryptography and Network Security
1 Guidelines for Autonomic Service Agents draft-carpenter-anima-asa-guidelines-00 Brian Carpenter Sheng Jiang IETF 97 November
ATS Architecture Design Solution Intent
Cyber security Policy development and implementation
Key concepts and considerations in thesis writing
LbyR discussion Henning Schulzrinne Hannes Tschofenig Richard Barnes
PAA-2-EP protocol PANA wg - IETF 58 Minneapolis
Technical Communication
An Architecture for Media Recording using the Session Initiation Protocol draft-ietf-siprec-architecture Andy Hutton
Marc Linsner Richard Barnes Roger Marshall
Henning Schulzrinne Columbia University
Presentation transcript:

Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba Trustworthy Location Hannes Tschofenig, Henning Schulzrinne, Bernard Aboba

Status IETF#81 presentation about broader security issues related to location and caller identity in emergency calls. Publication of write-up for the Communications of the ACM on “Security Risks in Next-Generation Emergency Services”, November 1st http://cacm.acm.org/magazines/2011/11/138206-security-risks-in-next-generation-emergency-services/

Current ToC 1. Introduction 2. Terminology 3. Threats 3.1. Location Spoofing 3.2. Identity Spoofing 4. Solution Proposals 4.1. Location Signing 4.2. Location by Reference 4.3. Proxy Adding Location 5. Operational Considerations 5.1. Attribution to a Specific Trusted Source 5.2. Application to a Specific Point in Time 5.3. Linkage to a Specific Endpoint

Current Content Classical IETF writing style. Suitable for IETF audience This is, however, not our main target audience for this writeup. We want to educate those who have concerns about the next generation IP-based emergency services architecture. We want to explain them what the threats are and what can be done about them. We want to address some of their fears (regarding location spoofing, and other forms of DoS attacks). CACM Article provides a better introduction into the topic. Detailed solution approaches currently in the document are more suitable for the appendix.

Concerns typically raised Big picture: We are building on top of the regular IP-based infrastructure and SIP as a communication mechanism. Main focus: Denial of Service against the emergency services infrastructure / PSAP (and call-taker resources in particular) Based on false emergency calls Cast the story as an attribution problem… Requires to identify the agent responsible for the action Determining the identity or location of an attacker (or an attacker’s intermediary). Important to convey that there is cost associated with every solution and that there are non-technical aspects to consider, such as education, operational considerations, and regulatory aspects.

Question to Working Group Do you agree with re-focusing the target audience of the writeup? Requires a fair amount of work and therefore we would like to hear your thoughts first.