ECRIT IETF 72 July 2008 Dublin Hannes Tschofenig Marc Linsner Roger Marshall.

Slides:



Advertisements
Similar presentations
IETF Calsify.
Advertisements

Emergency Context Resolution with Internet Technologies (ecrit) IETF 78 – Maastricht, NL July 29, 2010 Marc Linsner Richard Barnes Roger Marshall.
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 89 London March 5, 2014.
ECRIT Virtual Interim Meeting 26th February, 2PM EST Marc Linsner Hannes Tschofenig.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 82 – Taipei, Taiwan November 16, 2011 Marc Linsner Richard Barnes Roger Marshall.
Emergency Context Resolution with Internet Technologies (ECRIT) Marc Linsner Roger Marshall IETF 92 - Dallas March 24, 2015.
OAuth 2.0 Security IETF OAuth WG Conference Call, 14th December 2012.
L2VPN WG “NVO3” Meeting IETF 82 Taipei, Taiwan. Agenda Administrivia Framing Today’s Discussions (5 minutes) Cloud Networking: Framework and VPN Applicability.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
PPSP Working Group IETF-89 London, UK 16:10-18:40, Tuesday, Webex: participation.html.
CCAMP Working Group Online Agenda and Slides at: Tools start page:
IETF 90: NetExt WG Meeting. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet- Draft.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 76, Hiroshima Nov 11, 2009 Hannes Tschofenig Marc Linsner (attending virtually) Roger.
Emergency Context Resolution with Internet Technologies (ecrit) IETF 81 – Quebec City, QC Canada July 25, 2011 Marc Linsner Richard Barnes Roger Marshall.
L3VPN WG IETF 78 09/11/ :00-15:00 Chairs: Marshall Eubanks Danny McPherson Ben Niven-Jenkins.
DIME WG IETF 82 Dime WG Agenda & Status THURSDAY, November 17, 2011 Jouni Korhonen & Lionel Morand.
DIME WG IETF 84 DIME WG Agenda & Status Tuesday, July 31 st, 2012 Jouni Korhonen, Lionel Morand.
SIPCLF Working Group Spencer Dawkins Theo Zourzouvillys IETF 76 – November 2009 Hiroshima, Japan.
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 87 Berlin July 29, 2013.
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 84 Vancouver July 31, 2012.
1 NOTE WELL Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
GROW IETF 78 Maastricht, Netherlands. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
ECRIT Virtual Interim Meeting 3rd June 2009, 1PM EDT (New York) Marc Linsner Hannes Tschofenig.
IETF 86 PIM wg meeting. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC.
IETF 79 - Beijing, China1 Martini Working Group IETF 79 Beijing Chairs: Bernard Spencer
Extensible Messaging and Presence Protocol (XMPP) WG Interim Meeting, Monday, January 7,
SIPREC WG, IETF# , GMT+2 John Elwell (WG co-chair) Brian Rosen (WG co-chair)
PAWS Protocol to Access White Space DB IETF 83, Paris Gabor Bajko, Brian Rosen.
CCAMP Working Group Online Agenda and Slides at: Data tracker:
Web Authorization Protocol (oauth) IETF 90, Toronto Chairs: Hannes Tschofenig, Derek Atkins Responsible AD: Kathleen Moriarty Mailing List:
Web Authorization Protocol (oauth) Hannes Tschofenig.
BFD IETF 83. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any.
Emergency Context Resolution with Internet Technologies BOF (ecrit) Jon Peterson, Hannes Tschofenig BOF Chairs.
P2PSIP WG IETF 87 P2PSIP WG Agenda & Status Thursday, August 1 st, 2013 Brian Rosen, Carlos J. Bernardos.
ECRIT IETF 70 December 2007 Vancouver Hannes Tschofenig Marc Linsner Roger Marshall.
Mary Barnes (WG co-chair) Cullen Jennings (WG co-chair) DISPATCH WG IETF 90.
OAuth WG Blaine Cook, Hannes Tschofenig. Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft.
Authentication and Authorization for Constrained Environment (ACE) WG Chairs: Kepeng Li, Hannes
IETF 89, LONDON, UK LISP Working Group. 2 Agenda and slides:  lisp.html Audio Stream 
DMM WG IETF 84 DMM WG Agenda & Status Tuesday, July 31 st, 2012 Jouni Korhonen, Julien Laganier.
LMAP WG IETF 92, Dallas, TX Dan Romascanu Jason Weil.
Transport Layer Security (TLS) IETF-84 Chairs: Eric Rescorla Joe Salowey.
Interface to the Routing System (IRS) BOF IETF 85, Atlanta November 2012.
IPR WG IETF 62 Minneapolis. IPR WG: Administrivia Blue sheets Scribes Use the microphones Note Well.
IETF #81 - NETCONF WG session 1 NETCONF WG IETF 81, Quebec City, Canada MONDAY, July 25, Bert Wijnen Mehmet Ersue.
Transport Layer Security (TLS) IETF 73 Thursday, November Chairs: Eric Rescorla Joe Salowey.
Transport Layer Security (TLS) IETF-78 Chairs Joe Salowey Eric Rescorla
HIP WG Gonzalo Camarillo David Ward IETF 80, Prague, Czech Republic THURSDAY, March 31, 2011, Barcelona/Berlin.
OPSREA Open Meeting Area Directors: Dan Romascanu and Ron Bonica Monday, March 28, 2011 Morning Session, 10:30 – 11:30, Room Barcelona/Berlin Discussion.
Agenda Behcet Sarikaya Dirk von Hugo November 2012 FMC BOF IETF
MODERN BoF Managing, Ordering, Distributing, Exposing, and Registering telephone Numbers IETF 92.
IETF #82 - NETCONF WG session 1 NETCONF WG IETF 82, Taipei, Taiwan TUESDAY, November 15, Afternoon Session III Bert Wijnen Mehmet Ersue.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linser Chairs.
Reducing Unwanted Communications in SIP (RUCUS) BOF Hannes Tschofenig Francois Audet.
IETF #85 - NETCONF WG session 1 NETCONF WG IETF 85, Atlanta, USA WEDNESDAY, November 7, Bert Wijnen Mehmet Ersue.
Agenda Stig Venaas Behcet Sarikaya November 2011 Multimob WG IETF
SALUD WG IETF 78 Maastricht Friday, July 30, London Chair: Dale R. Worley.
Emergency Context Resolution with Internet Technologies (ecrit) Hannes Tschofenig, Marc Linsner IETF 66, Montreal, June 2006.
OPSAWG chairs: Scott Bradner Christopher Liljenstolpe.
Emergency Context Resolution with Internet Technologies (ECRIT) Chairs: Marc Linsner & Roger Marshall Standing In for the Chairs: Brian Rosen IETF 94.
STIR Secure Telephone Identity Revisited
Emergency Context Resolution with Internet Technologies Marc Linsner Roger Marshall IETF 86 Orlando March 13, 2013.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Agenda OAuth WG IETF 87 July, 2013.
MODERN Working Group IETF 97 November 14, 2016.
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Thursday, 20th of July 2017.
SIPREC WG, Interim virtual meeting , GMT
Marc Linsner Richard Barnes Roger Marshall
Scott Bradner & Martin Thomson
Presentation transcript:

ECRIT IETF 72 July 2008 Dublin Hannes Tschofenig Marc Linsner Roger Marshall

Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made within the context of an IETF activity is considered an "IETF Contribution". Such statements include oral statements in IETF sessions, as well as written and electronic communications made at any time or place, which are addressed to: -the IETF plenary session, -any IETF working group or portion thereof, -the IESG or any member thereof on behalf of the IESG, -the IAB or any member thereof on behalf of the IAB, -any IETF mailing list, including the IETF list itself, any working group or design team list, or any other list functioning under IETF auspices, -the RFC Editor or the Internet-Drafts function All IETF Contributions are subject to the rules of RFC 3978 (updated by RFC 4748) and RFC 3979(updated by RFC 4879). Statements made outside of an IETF session, mailing list or other function, that are clearly not intended to be input to an IETF activity, group or function, are not IETF Contributions in the context of this notice. Please consult RFC 3978 (and RFC 4748) for details. A participant in any IETF activity is deemed to accept all IETF rules of process, as documented in Best Current Practices RFCs and IESG Statements. A participant in any IETF activity acknowledges that written, audio and video records of meetings may be made and may be available to the public.

Agenda  Agenda Bashing  Status - Chairs  draft-ietf-ecrit-lost-10 (RFC Editor's queue)  draft-ietf-ecrit-mapping-arch-03 (IESG Evaluation :: AD Followup)  draft-ietf-ecrit-dhc-lost-discovery-03.txt (RFC Editor's queue)  Framework and Phone – Brian Rosen  draft-ietf-ecrit-framework-06  draft-ietf-ecrit-phonebcp-05  Ongoing Work – Henning Schulzrinne  DISCUSS on draft-ietf-ecrit-mapping-arch-03  draft-ietf-ecrit-lost-sync-00  draft-ietf-ecrit-location-hiding-requirements-00  draft-ietf-ecrit-specifying-holes-00

Agenda (con’t)  Re-chartering?  draft-polk-ecrit-local-emergency-rph-namespace-03 (updated)  draft-barnes-ecrit-rough-loc-00 (unchanged)  draft-schulzrinne-ecrit-unauthenticated-access-03  draft-norreys-ecrit-authority2individuals-requirements-01 (updated)  draft-forte-ecrit-lost-extensions-00 (new indiv)  draft-forte-ecrit-service-classification-00 (new indiv)  draft-robins-ecrit-sub-services-00 (new)  draft-rosen-ecrit-ecall-01 (new)  draft-sun-ecrit-shelter-service-00 (new)  draft-sun-ecrit-unsafe-areas-00 (new)  draft-tschofenig-ecrit-trustworthy-location-00 (new)  draft-wolf-ecrit-lost-servicelistboundary-00 (new)

External (to ECRIT) 5th SDO Emergency Service Coordination Workshop –October 21-23, 2008 –Vienna, Austria –Host: Frequentis –

draft-polk-ecrit-local-emergency-rph-namespace-03 This document creates and IANA registers the new Session Initiation Protocol (SIP) Resource Priority header (RPH) namespace "esnet" for local emergency usage to a public safety answering point (PSAP), between PSAPs, and between a PSAP and first responders and their organizations.

draft-barnes-ecrit-rough-loc-00 Emergency calling works best when precise location is available for emergency call routing. However, there are situations in which a location provider is unable or unwilling to provide precise location, yet still wishes to enable subscribers to make emergency calls. This document describes the level of location accuracy that providers must provide to enable emergency call routing. In addition, we descibe how emergency services and non-emergency services can be invoked by an endpoint that does not have access to its precise location.

draft-schulzrinne-ecrit-unauthenticated-access-03 The IETF emergency services architecture assumes that access to a network has already happened using the traditional network access authentication procedures or that no authentication for network access is needed (e.g., in case of public hotspots). Subsequent protocol interactions, such as obtaining location information, learning the address of the Public Safety Answering Point (PSAP) and the emergency call itself are largely decoupled from the underlying network access procedures. There are, however, cases where a device is not in possession of credentials for network access, does not have a VoIP provider, or where the credentials are available but became invalid due to various reasons (e.g., credit exhaustion, expired accounts, etc.). This document provides a problem statement, introduces terminology and describes an extension for the base IETF emergency services architecture.

draft-norreys-ecrit-authority2individuals-requirements-01 Public safety agencies need to provide information to the general public before and during large-scale emergencies. While many aspects of such systems are specific to national or local jurisdictions, emergencies span such boundaries and notifications need to reach visitors from other jurisdictions. This document summarizes requirements for protocols to alert individuals within a defined geographic area.

draft-forte-ecrit-lost-extensions-00 An important class of location-based services answer the question "What instances of this service are closest to me?" Examples include finding restaurants, gas stations, stores, automated teller machines, wireless access points (hot spots) or parking spaces. Currently, the Location-to-Service Translation (LoST) protocol only supports mapping locations to a single service based on service regions. This document describes an extension that allows queries "N nearest" and "within distance X".

draft-forte-ecrit-service-classification-00 This document creates a registry for describing the types of services available at a specific location. The registry is then referenced by other protocols that need a common set of service terms as protocol constants. In particular, we define location-based service as either a point at a specific geographic location (e.g., bus stop) or a service covering a specific region (e.g., pizza delivery)

draft-robins-ecrit-sub-services-00 This document describes, how a LoST client can ask LoST server for the list of sub services that it supports, and to incorporate additional information about the service provider in response.

draft-rosen-ecrit-ecall-01 This document describes how to use a subset of the IETF-based emergency call framework for accomplishing emergency calling support in vehicles. Simplifications are possible due to the nature of the functionality that is going to be provided in vehicles with the usage of GPS. Additionally, further profiling needs to be done regarding the encoding of location information.

draft-sun-ecrit-shelter-service-00 This document defines a new service registration 'shelter', and describes how to find, what instances of shelter service are closest to the user's location.

draft-sun-ecrit-unsafe-areas-00 This document describes how to specify unsafe areas in LoST for emergency services, such as police, mountain, marine and fire.

draft-tschofenig-ecrit-trustworthy-location-00 For location-based applications, such as emergency calling or roadside assistance, the identity of the requestor is less important than accurate and trustworthy location information. A number of protocols are available to supply end systems with either civic or geodetic information. For some applications it is an important requirement that location information has not been modified in transit or by the end point itself. This document investigates different threats, the adversary model, and outlines three possible solutions. The document concludes with a suggestion on how to move forward.

draft-wolf-ecrit-lost-servicelistboundary-00 LOST is able to map service identifiers and location information to service contact URIs. If a LoST client wants to discover available services for a particular location, it will perform a query to the LoST server. However, the response from the LoST server does not give information about the geographical region, for which the returned service list is valid. Therefore this document proposes a ServiceListBoundary, in addition to the ServiceBoundary (which indicates the region a specific service URL is valid).

Potential Charter LoST Maintenance and Extensions for Emergency Services LoST Extensions for non-Emergency Services Emergency Services Extensions –Corrections learned via implementations Authority-to-Citizen Emergency Services –Requirements draft –Architecture draft –Protocol draft (if needed)