Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA.

Slides:



Advertisements
Similar presentations
Internet Standards- Emergency Services Hannes Tschofenig Mail comments to and/or
Advertisements

Emergency Services Chitra S VOIP Security Fall 2008.
Doc.: IEEE /0115r0 Submissions January 2008 Gabor Bajko, NokiaSlide 1 Support for un-authenticated Emergency Services Date: Authors:
Call Server LIS VPC ESGW SR Manhattan PSAP LO=Wall St Route=Manhattan PSAP The Location Object (LO) is provided in the call setup information to the Call.
Out of Jurisdiction Emergency Routing draft-winterbottom-ecrit-priv-loc-01.txt James Winterbottom, Hannes Tschofenig, Laura Liess.
IETF ECRIT update Marc Linsner 5/11/10. ECRIT Charter (or a piece of it) ………The group will show how the availability of location data and call routing.
Risks with IP-based Emergency Services draft-ietf-ecrit-trustworthy-location.
Origins of ECRIT IETF has been working on location since 2000 –Spatial BoF, eventually GEOPRIV chartered in 2001 GEOPRIV provides location information.
Emergency Services IAB Tech Chat 28 th February 2007 Hannes Tschofenig.
LbyV and LbyR Henning Schulzrinne. Definition LbyR –Consumers (recipients) of location information resolves URL and obtains location value LbyV –Target.
Draft-ietf-ecrit-location-hiding-req Location Hiding: Problem Statement and Requirements Henning Schulzrinne, Laura Liess, Hannes Tschofenig, Barbara Stark,
Trustworthy Location Information draft-tschofenig-ecrit-trustworthy- location draft-tschofenig-ecrit-trustworthy- location Hannes Tschofenig, Henning Schulzrinne.
From Extensibility to Evolvability Once upon a time, HTTP was simple – what happened?
Certificate Path Building draft-ietf-pkix-certpathbuild-01.txt Peter Hesse Matt Cooper Yuriy Dzambasow Susan Joseph Richard Nicholas.
An SAIC Company Telcordia View of NENA Progress on VoIP Migration Plan Telcordia Contacts: Nadine Abbott (732) An SAIC Company.
March 2006IETF65 - ECRIT1 Emergency Service Identifiers draft-ietf-ecrit-service-urn-01 Henning Schulzrinne Columbia University
Proxy Authentication of the Emergency Status of SIP Calls draft-barnes-ecrit-auth-00 Richard Barnes IETF 69, Chicago, IL, USA.
RTCWEB WG draft-aboba-rtcweb-ecrit-00 Bernard Aboba Martin Thomson July 30, 2012 IETF 84, Vancouver Please join the Jabber room:
1 © NOKIA Presentation_Name.PPT / DD-MM-YYYY / Initials Emergency calls related work done in IETF Gabor Bajko May 22, 2006.
NENA Next Generation Architecture
-framework Brian Rosen. -11 version deals with IESG comments All comment resolved one way or another One open issue – spec(t)
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Session Initiation Protocol (SIP). What is SIP? An application-layer protocol A control (signaling) protocol.
Practical Considerations for supporting Emergency Calls Brian Rosen Emergicom.
Draft-rosen-ecrit-emergency- framework-00 Brian Rosen NeuStar CPa
1 Location Hiding Henning Schulzrinne Laura Liess Hannes Tschofenig.
IETF – ECRIT Emergency Context Resolution using Internet Technologies ESW 5 – Vienna October 2008 Marc Linsner.
Draft-polk-ecrit-mapping-events-00 James Polk March 21 st, 2006.
CP-a Emergency call stage 2 requirements - A presentation of the requirements from 3GPP TS Keith Drage.
A Routing Extension for HELD draft-winterbottom-ecrit-priv-loc-04 James Winterbottom Hannes Tschofenig Laura Liess.
November 2005IETF64 - ECRIT1 Emergency Service Identifiers draft-ietf-sipping-sos-01 draft-schulzrinne-sipping-service-01 Henning Schulzrinne Columbia.
PSAP Callback draft-ietf-ecrit-psap-callback Phone BCP Status Usage Scenarios.
The State of VoIP Peering Charles Studt Director of Product Management, VoEX.
(we need your advice!) Jon Peterson MIT– December 2010 IETF & Privacy.
The State of SIP Application Development Brian Schwarz VP – Engineering RedSky Technologies, Inc.
1 SPEERMINT Use Cases for Cable IETF 66 Montreal 11 JULY 2006 Presented by Yiu L. Lee.
November 2006IETF67 - GEOPRIV1 A Location Reference Event Package for the Session Initiation Protocol (SIP) draft-schulzrinne-geopriv-locationref-00 Henning.
July 2006IETF66 - ECRIT1 LoST: A Location-to-Service Translation Protocol draft-ietf-ecrit-lost-00 Ted Hardie Andrew Newton Henning Schulzrinne Hannes.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Draft-elwell-sipping- redirection-reason-00 Author: John Elwell
Peering: A Minimalist Approach Rohan Mahy IETF 66 — Speermint WG.
SIP working group IETF#70 Essential corrections Keith Drage.
Rfc4474bis-01 IETF 90 (Toronto) STIR WG Jon. First principles (yet again) Separating the work into two buckets: 1) Signaling – What fields are signed,
ECRIT Basic Reqs draft-stastny-ecrit-requirements Richard Stastny Brian Rosen IETF62 Minneapolis.
ECRIT - Getting Certain URIs, and Alternatives to Getting Emergency Dialstring(s) draft-polk-ecrit-lost-server-uri-00 draft-polk-dhc-ecrit-uri-psap-esrp-00.
NENA-IETF I3 Proposal No carrier presumed No carrier presumed Fixed, nomadic and true mobile clients supported Fixed, nomadic and true mobile clients supported.
Protecting First-Level Responder Resources in an IP-based Emergency Services Architecture 13 th April 2007, THE FIRST INTERNATIONAL WORKSHOP ON RESEARCH.
Simo Veikkolainen Simple Application Configuration Protocol draft-veikkolainen-sipping-app-config-00 Simo Veikkolainen APP area open meeting.
Doc.: IEEE /0xxxr0 Submission March, 2007 Gabor/SriniSlide 1 Joint TGu : Location Configuration for Emergency Services Notice: This document.
Diameter Parameter Query draft-winterbottom-dime-param-query-01.txt J. Winterbottom, H. Tschofenig, R. Bellis.
Location Conveyance in SIP draft-ietf-sip-location-conveyance-01 James M. Polk Brian Rosen 2 nd Aug 05.
ECRIT requirements update draft-schulzrinne-ecrit-requirements-01 IETF 63 Aug 02, 2005 Roger Marshall
7/11/2005ECRIT Security Considerations1 ECRIT Security Considerations draft-taylor-ecrit-security-threats-00.txt Henning Schulzrinne, Raj Shanmugam, Hannes.
SPEERMINT Architecture - Reinaldo Penno Juniper Networks SPEERMINT, IETF 70 Vancouver, Canada 2 December 2007.
ECRIT - IETF 62 (March 2005) - Minneapolis 1 Requirements for Emergency Calling draft-schulzrinne-sipping-emergency-req-01 draft-ietf-sipping-sos-01 Henning.
ECRIT WG IETF-75 Trustworthy Location Bernard Aboba
12th April 2007, SDO Emergency Services Workshop 2007
Joint TGu : Location Configuration for Emergency Services
Trust Anchor Management Problem Statement
Request History Capability – Requirements & Solution
ECRIT Interim: SIP Location Conveyance
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
The Domain Policy DDDS Application
draft-ietf-geopriv-lbyr-requirements-02 status update
draft-ietf-ecrit-rough-loc
Emergency Service Identifiers draft-ietf-ecrit-service-urn-01
Hannes Tschofenig Henning Schulzrinne M. Shanmugam
draft-rocky-sipping-calling-party-category-01 Report
RELO: Retrieving End System Location Information draft-schulzrinne-geopriv-relo-03 Henning Schulzrinne March 2007 IETF68 - GEOPRIV.
IPNNI SHAKEN Enterprise Models: LEMON TWIST
Presentation transcript:

Location Hiding: Problem Statement, Requirements, (and Solutions?) Richard Barnes IETF 71, Philadelphia, PA, USA

Basic facts of ECRIT Three steps in establishing an emergency call:  Fetch endpoint location  Query LoST with location to get PSAP URI(s)‏  Direct call to PSAP  (Verify that call is an emergency call)‏ This process involves four entities  Endpoint  Voice Service Provider (SIP Proxy/proxies)‏  Location Provider  LoST mapping infrastructure

Problem statement The success of an emergency call depends on these entities giving each other information  LP gives location to endpoint or proxy  LoST gives mappings to endpoint or proxy  Proxies route invite to PSAP Use case: The LP is not willing or able to provide precise location information an endpoint or proxy  How does endpoint/proxy get LoST mappings?  How can a proxy recognize emergency calls?

Basic functional requirements Support for LoST routing: The entity that performs LoST routing MUST have access LoST mappings, whether provided by LoST queries or directly Support for proxy verification: A SIP proxy MUST be able to distinguish emergency calls from non-emergency calls Support for dispatch: Precise location MUST be available to the PSAP(s) that receive the emergency call

Two other essential requirements MUST NOT assume any trust relationship between LP and endpoint/VSP SHOULD minimize protocol and processing differences from the case where access to location is not constrained

Paths forward Do nothing Describe a solution; some candidates:  Rough Location: Provide imprecise location to endpoint / VSP  LbyR in LoST: Use a LoST resolver that is authorized to access location information  LP Proxy: Emergency calls are routed through a proxy operated by the location provider  LoST in LCP: Provide LoST mappings directly, without a LoST query

Option 1: Do Nothing This may not be a matter for IETF or ECRIT Location hiding can be supported without protocol or processing changes  “Rough location” solution implements this No normative documents are necessary  Location providers can make local decisions to support this use case  Still might want to provide informational guidance

Option 2: Rough Location Location Provider provides the endpoint/proxy with a location that is  Precise enough that it identifies LoST mappings  Not precise enough to be useful for non-emergency services Advantages  No protocol changes  Burden of hiding is on the location provider Disadvantages  LP must determine imprecise location

Option 3: LbyR in LoST Endpoint / proxy uses a LoST resolver that is authorized to access endpoint location LoST server obtains location to determine mappings Advantages  More difficult for unauthorized parties to get location Disadvantages  Added complexity in LoST  Requires discovery mechanism  Constrains which LoST resolver can be used

Option 4: Location Provider Proxy Call is routed through a proxy that has access to location (a proxy associated with the LP)‏ Advantages  Similar a proxy-routed call without location hiding  All routing decisions are local to the LP Disadvantages  Requires mechanism for proxy/endpoint to find LP proxy  Different routing process from normal calls

Option 5: LoST in LCP Location Information Server (LIS) that provides location (by reference) also provides LoST mappings for emergency services Advantages  Removes a step from the call (no separate LoST)‏  Doesn't require separate discovery Disadvantages  Proxy can't do LoST routing on behalf of endpoint  Additional complexity in LIS and location protocol  Impacts GEOPRIV as well

Questions Is this a problem that ECRIT wants to address? Choice of solutions:  Do Nothing  Rough Location  LbyR in LoST  Location Provider Proxy  LoST in LCP  Others?

References rgencyServices/LocationHiding draft-schulzrinne-ecrit-location-hiding-req-00 draft-barnes-ecrit-rough-location-00