ATOCA                                                        M. Lepinski
Internet-Draft                                          BBN Technologies
Intended status: Informational                                    K. Seo
Expires: January 16, 2013                                BBN Technologes
                                                               R. Barnes
                                                        BBN Technologies
                                                           July 15, 2012


                     Alert Metadata Protocol (AMP)
                     draft-barnes-atoca-meta-03.txt

Abstract

   This document specifies a set of mechanisms that devices on an IP
   network can use to discover an alert metadata server able to provide
   information about local emergency alert services.  Additionally, this
   document provides a protocol that devices on an IP network can use to
   retrieve local information from an alert metadata server about
   sources of emergency alerts and register contact information for
   receipt of alerts.

   Please send feedback to the atoca@ietf.org mailing list.

Status of this Memo

   This Internet-Draft is submitted in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF).  Note that other groups may also distribute
   working documents as Internet-Drafts.  The list of current Internet-
   Drafts is at http://datatracker.ietf.org/drafts/current/.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   This Internet-Draft will expire on January 16, 2013.

Copyright Notice

   Copyright (c) 2012 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents



Lepinski, et al.        Expires January 16, 2013                [Page 1]


Internet-Draft                     AMP                         July 2012


   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the Simplified BSD License.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
     1.1.  Open Questions . . . . . . . . . . . . . . . . . . . . . .  4
   2.  Definitions  . . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  Server Discovery . . . . . . . . . . . . . . . . . . . . . . .  4
     3.1.  Discovery using Access Network Domain Name . . . . . . . .  5
       3.1.1.  NAPTR Record Format  . . . . . . . . . . . . . . . . .  6
       3.1.2.  Client Processing  . . . . . . . . . . . . . . . . . .  7
     3.2.  Discovery using LoST . . . . . . . . . . . . . . . . . . .  7
       3.2.1.  LoST Server Discovery  . . . . . . . . . . . . . . . .  7
       3.2.2.  Client Processing  . . . . . . . . . . . . . . . . . .  7
   4.  AMP Protocol . . . . . . . . . . . . . . . . . . . . . . . . .  8
     4.1.  Message Format . . . . . . . . . . . . . . . . . . . . . .  8
       4.1.1.  Advertisement  . . . . . . . . . . . . . . . . . . . .  8
       4.1.2.  Registration . . . . . . . . . . . . . . . . . . . . .  9
       4.1.3.  Refer  . . . . . . . . . . . . . . . . . . . . . . . . 10
       4.1.4.  Alert  . . . . . . . . . . . . . . . . . . . . . . . . 11
     4.2.  AMP Sessions . . . . . . . . . . . . . . . . . . . . . . . 11
   5.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 12
     5.1.  AMP Message Type Registry  . . . . . . . . . . . . . . . . 13
   6.  Security Considerations  . . . . . . . . . . . . . . . . . . . 13
   7.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 14
   8.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     8.1.  Normative References . . . . . . . . . . . . . . . . . . . 14
     8.2.  Informative References . . . . . . . . . . . . . . . . . . 15
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15















Lepinski, et al.        Expires January 16, 2013                [Page 2]


Internet-Draft                     AMP                         July 2012


1.  Introduction

   In order for clients to securely receive alerts, both endpoints and
   servers may need a certain amount of configuration.  Clients need to
   know the identities of trusted alerting authorities so that they can
   reject false alerts.  In some environments, servers need to gather
   location and contact information for end clients to support alert
   targeting and delivery, for example client location, language
   preferences, or device capabilities.

   In this context, alert delivery proceeds in three phases.  First, a
   client device connects to a network where alerts are provided and
   discovers a local alert metadata server.  Second, the device
   discovers an alert metadata server, downloads information about local
   alert servers, and (optionally) registers some information about
   itself.  Third, an alert server delivers an alert to the client.
   These roles are illustrated in Figure 1.  This document addresses the
   first two phases (discovery and configuration), and provides one
   possible channel for alert delivery.
                              +-------------------+
                              |   AMP Discovery   |
          +-(1) AMP Srv. URI--| (DHCP, DNS, LoST) |
          |                   +-------------------+
          |
          |
          |
          |
          V
   +--------+                 +-------------------+
   |  AMP   |--(2) AMP Reg.-->|        AMP        |
   | Client |<-(2) AMP Adv.---|       Server      |
   +--------+                 +-------------------+
          ^
          |
          |
          |
          |
          |                   +-------------------+
          +-(3) Alert Msg.----|   Alert Server    |
                              +-------------------+

                     Figure 1: AMP alert configuration

   This document addresses this problem in two parts.  First, we
   describe the process by which a client discovers an AMP server for a
   local network or for a location of interest.  Second, we define a
   simple protocol that the client can use to interact with the server
   to download metadata, register state, and receive alerts.



Lepinski, et al.        Expires January 16, 2013                [Page 3]


Internet-Draft                     AMP                         July 2012


1.1.  Open Questions

   The current version of this draft specifies transport security (i.e.,
   TLS) as the only mechanism for providing security for AMP messages.
   However, this document could also specify as an option the use the
   mechanisms defined by of the JOSE working group to provide object
   security for the JSON bodies on a per-message basis (independent of
   the underlying transport).

   The current version of this draft specifies only a WebSocket
   transport for AMP messages.  However, as an alternative this document
   could also specify an option to use HTTP as a transport for AMP
   messages.


2.  Definitions

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].

   The following entities are important in the AMP protocol:

   Client:  An end-user device interested in receiving alerts.  The
      device may be connected to a local network in the area covered by
      alerts, or may be remote.

   Alert Metadata Server:  A server that maintains information about
      clients and information about how alerts are delivered within some
      scope (e.g., within a jurisdiction).

   Alert Server:  A server that delivers emergency alerts to clients.

   Alerting Authority:  An entity that is authorized to originate alerts
      in a given context (e.g., a jurisdiction)

   In a given deployment, the Alert Metadata Server and the Alert Server
   may be the same server, but this is not necessarily the case.


3.  Server Discovery

   In this section we describe two mechanisms for clients to discover
   alert metadata servers.  The first mechanism enables a client to rely
   upon its ISP or access network to provide a reference to an
   appropriate alert metadata server.  Many alerting scenarios are local
   (e.g., natural disasters) and ISPs are often well-positioned to
   gather information on their local environment.  Therefore, it can be



Lepinski, et al.        Expires January 16, 2013                [Page 4]


Internet-Draft                     AMP                         July 2012


   useful for an ISP to provide information about local alerting
   resources to clients.  Likewise, clients should be able to discover
   information advertised by their local networks.  This first
   mechanism, is based on the discovery procedure described in RFC 5986
   [RFC5986].  It relies on a DHCP option specifying the Access Network
   Domain Name, and a U-NAPTR resolution that uses the Access Network
   Domain Name to obtain the name of the alert metadata server.

   The second mechanism enables a client to discover an alert metadata
   server with information about alerts relevant to a particular
   location.  This may be the client's own location, or some other
   location of interest.  This mechanism may be used either in cases
   where the client's ISP does not provide explicit support for
   emergency alerting, or in cases where the client is interested in
   receiving alerts for some region that does not include the client's
   current location.  This mechanism makes use of the LoST protocol
   [RFC5222], and its corresponding discovery mechanism [RFC5223].

   Client implementations SHOULD support both discovery using the Access
   Network Domain Name (Section 3.1) and discovery based using LoST
   (Section 3.2).  Additionally, client implementations SHOULD support
   out-of-band discovery by allowing a user to specify a static URI for
   an appropriate alert metadata server.

3.1.  Discovery using Access Network Domain Name

   The mechanism presented here is based on the discovery procedure
   described in RFC 5986 [RFC5986].  It relies on the DHCP option for
   Access Network Domain Name, which is specified in RFC 5986 for both
   DHCPv4 and DHCPv6.  IP networks that support emergency alerting
   SHOULD provide the Access Network Domain Name option to devices on
   network that are configured via DHCP.  This option provides to the
   device a domain name that is suitable for service discovery within
   the access network..  This domain is used as input to the U-NAPTR
   resolution process for alert server discovery.

   In addition to providing the Access Network Domain Name to devices
   via DHCP, an IP network that supports emergency alerting SHOULD
   provision DNS records to support a U-NAPTR lookup for AMP Server
   discovery.  U-NAPTR [RFC4848] is a Dynamic Delegation Discovery
   Service (DDDS) profile that produces a URI (in this case, the URI for
   the appropriate AMP alert server).  Section 3.1.1 specifies the
   format of the DNS NAPTR record used for this discovery, and Section
   3.1,2 provides processing instructions for the client device
   performing the discovery.






Lepinski, et al.        Expires January 16, 2013                [Page 5]


Internet-Draft                     AMP                         July 2012


3.1.1.  NAPTR Record Format

   U-NAPTR resolution for an alert server takes a domain name as input
   and produces a URI that identifies the alert server.  This process
   also requires an Application Service tag and an Application Protocol
   tag, which differentiate NAPTR records for alert server discovery
   from other records for that domain.  Section 5.1 defines an
   Application Service tag of "AMP", which is used to identify the AMP
   alert server that is appropriate for use by devices in a given
   domain.  The Application Protocol tags "ws", and "wss" are used to
   identify alert servers that support the WebSocket protocol and its
   secure variant.  The NAPTR records in the following example
   demonstrate the use of the Application Service and Protocol tags.
   Iterative NAPTR resolution is used to delegate responsibility for the
   alert server from "zonea.example.net." and "zoneb.example.net." to
   "outsource.example.com."
   zonea.example.net.
   ;;       order pref flags
   IN NAPTR 100   10   ""  "AMP:wss" (            ; service
       ""                                          ; regex
       outsource.example.com.                      ; replacement
       )

   zoneb.example.net.
   ;;       order pref flags
   IN NAPTR 100   10   ""  "AMP:wss" (            ; service
       ""                                          ; regex
       outsource.example.com.                      ; replacement
       )

   outsource.example.com.
   ;;       order pref flags
   IN NAPTR 100   10   "u"  "AMP:wss" (            ; service
       "!.*!wss://alerts.example.org:80/!"          ; regex
       .                                            ; replacement
       )
   Figure 1: Sample AMP NAPTR Records

   U-NAPTR resolution might produce multiple results from each iteration
   of the algorithm.  Order and preference values in the NAPTR record
   determine which value is chosen.  A Device MAY attempt to use
   alternative choices if the first choice is not successful.  An WSS
   URI for an alert server that is a product of U-NAPTR MUST be
   authenticated using the domain name method described in Section 3.1
   of RFC 6455 [RFC6455].  The domain name that is used in this
   authentication is the one extracted from the URI, not the one that
   was input to the U-NAPTR resolution process.




Lepinski, et al.        Expires January 16, 2013                [Page 6]


Internet-Draft                     AMP                         July 2012


3.1.2.  Client Processing

   In order to discover an appropriate alert server, a client device
   must first obtain a domain name for the local access network.  The
   client device first attempts to obtain configuration information via
   DHCP.  If the DHCP configuration contains the Access Network Domain
   Name option, then the client uses the domain name in this option as
   the domain name for the local access network.  Once the client has
   the domain name of the local access network, it uses this domain name
   to make a U-NAPTR query [RFC4848] for the Application Service AMP in
   this domain.

   If the DHCP configuration does not contain the Access Network Domain
   Name option, then the client MUST follow the process described in
   [I-D.ietf-geopriv-res-gw-lis-discovery] to search the reverse DNS
   tree for a U-NAPTR record based on the client's IP address.

3.2.  Discovery using LoST

   The mechanism presented here is based on the Location to Service
   Translation protocol (LoST) [RFC5222].  This protocol enables a
   client to query with an arbitrary location (either its own location
   or an alternative location of interest) and obtain the URI for an
   alert metadata server that is able to provide information for alerts
   relevant to the given location.

3.2.1.  LoST Server Discovery

   In order to utilize LoST to discovery an alert metadata server, the
   client must first obtain the address or URI of a LoST server.
   Implementations supporting LoST-based discovery of alert metadata
   servers MUST also support DHCP-based LoST discovery as specified in
   RFC 5223 [RFC5223].  Implementations MAY provide an interface whereby
   a user can directly configure a static LoST server URI or IP address,
   but MUST prefer a discovered LoST server to a configured one.

3.2.2.  Client Processing

   To discover an alert metadata server for a given geography, a client
   makes a LoST <findservice> request.  The client populates the
   <service> element of this request with the URN
   "urn:service:alert-info", the URN specifying the alert metadata
   service.  The client populates the <location> element of the request
   with a location for which the client is interested in receiving
   emergency alerts.  (This may be the client's own location, or may be
   an alternate location of interest to the client.)





Lepinski, et al.        Expires January 16, 2013                [Page 7]


Internet-Draft                     AMP                         July 2012


4.  AMP Protocol

   The Alert Metadata Protocol (AMP) consists of a set of messages
   encoded as JSON objects [RFC4627] exchanged over the WebSocket
   protocol [[WebSocket]].  In this section we describe the format of
   each AMP message type, and the overall flow of an AMP session.

4.1.  Message Format

   Each AMP message is a JSON object containing a "type" and other
   fields that depend on the message type.  An AMP object MUST contain
   the following field:

   "type":  REQUIRED Token.  The type of AMP message encoded in this
      object.

   This document defines four values of the "type" field, corresponding
   to the four different alert types:

   "advertisement":  A message describing local alert servers and
      authorities

   "registration":  A message registering client data with the server

   "refer":  A message referring the client to another AMP server

   "alert":  An emergency alert

   Future documents may define additional message types.
   Implementations MUST ignore any AMP message with an unknown type, or
   any unknown field in an AMP message.

4.1.1.  Advertisement

   Advertisement messages are sent from servers to clients.  These
   messages allow servers to notify clients about local alert
   authorities and local alert servers.  This information enables the
   client to determine whether future alerts are valid, regardless of
   the protocol mechanism used to transport the alert.  An advertisement
   message can contain the following fields:

   "token":  OPTIONAL String.  This field is an opaque string that the
      server uses to identify the client on subsequent requests.

   "contacts":  REQUIRED Array of String.  This field is an array of
      strings, where each string contains a URI from which local alerts
      may be sourced.  This array MUST NOT have length zero.




Lepinski, et al.        Expires January 16, 2013                [Page 8]


Internet-Draft                     AMP                         July 2012


   "certs":  OPTIONAL Array of String.  This field is an array of
      strings, where each string contains an X.509 certificate for a
      local authority.  Each certificate is encoded with DER and
      base64url encoded [[BASE64]].  These certificates are used to
      validate local alerts signed by the given alert authority.

   "public_keys":  OPTIONAL Array of String.  This field is an array of
      strings, where each string contains Subject Public Key Information
      (SPKI) for a local authority, encoded in DER and base64url
      encoded.  These are the public keys used to validate alerts signed
      by the given alert authority.

   "hash_values":  OPTIONAL Array of String.  This field is an array of
      hash values that are used in ESCAPE verification, base64url
      encoded.

   "ttl":  REQUIRED Number.  This field is a positive integer that
      indicates the length of time (in seconds) for which this
      advertisement is valid.  If the client does not receive a new
      advertisement message from the server before the ttl indicates
      that the advertisement is stale, then the client should attempt to
      obtain a new advertisement message by sending a registration
      message to the server.

   An advertisement message MUST contain either a "certs" field or a
   "public_keys" field.

   The "token" field MUST be present except when the server does not
   maintain state for clients.  If the server sets the "token" field,
   then the values it uses MUST be chosen to minimize the possibility
   that one client will be able to guess another's token, since that
   would allow one client to change or delete another client's
   registered state.  One algorithm for generating these tokens would be
   to compute the HMAC of another client identifier (e.g., an IP address
   and timestamp) using a secret key known only to the AMP server.

4.1.2.  Registration

   Registration messages are sent from clients to servers.  They are
   used by the clients to register with a server in order to receive
   future alerts of the proper type and format (e.g., language).  The
   same message is also used to update existing registration information
   or to request deletion of existing registration information.  Note
   that for location information, the Registration makes use of the
   PIDF-LO format, which is defined in [RFC4119].  Registration messages
   contain the following fields:





Lepinski, et al.        Expires January 16, 2013                [Page 9]


Internet-Draft                     AMP                         July 2012


   "token":  REQUIRED String.  An opaque a string that identifies the
      client.  Once a client has received an advertisement message from
      a server, it SHOULD copy the token from that message into all
      future registration messages to that server, so that the server
      can distinguish between new registrations and updates to existing
      registrations.

   "contacts":  OPTIONAL Array of String.  This field is an array of
      strings, where each string contains a URI that can be used contact
      the client.  If this field is included, but the array is empty,
      then the the server MUST delete any existing registration
      information for this client.

   "location":  OPTIONAL String.  This field is a string containing a
      "geopriv" element from a PIDF-LO, base64url encoded.

   "language":  OPTIONAL String.  This field is a string containing the
      language in which the client wishes to receive alerts, in the
      format defined by RFC 5646 [RFC5646].

   If a server receives a new registration message from a previously
   registered client (i.e., a registration message containing a token
   that the server has previously sent in an advertisement message),
   then the server should replace the existing registration information
   for that client with the information contained in the new
   registration message.  If the server receives a registration message
   containing only the token field, then the server should delete any
   existing registration information associated with this client.

4.1.3.  Refer

   Refer messages are sent from servers to clients.  These messages
   allow servers to notify clients of a different AMP server that the
   client should contact.  For example, if an AMP server receives a
   registration message indicating a location outside its jurisdiction,
   it might send a refer message that refers the client to an
   appropriate server for the client's current location.  A refer
   message must contain the following fields:

   "to":  REQUIRED String.  The URI of the AMP server to which the
      client is being referred.

   Upon receiving a Refer message, a client SHOULD send establish a new
   AMP session with the AMP server indicated in the "to" field of the
   refer message.






Lepinski, et al.        Expires January 16, 2013               [Page 10]


Internet-Draft                     AMP                         July 2012


4.1.4.  Alert

   Alert messages are sent from servers to client.  These messages are
   one mechanism for distributing local alerts.  (Other mechanisms for
   transporting local alerts include LEAP [I-D.barnes-atoca-delivery].)
   Alerts sent using an AMP alert message are encoded using ESCAPE
   [I-D.barnes-atoca-escape], then base64url encoded.  An Alert message
   contains the following fields:

   "alert_data":  REQUIRED String.  An ESCAPE-encoded, base64url-encoded
      alert message.

   The procedure for validating ESCAPE-encoded alert messages can be
   found in [I-D.barnes-atoca-escape]

4.2.  AMP Sessions

   An AMP session is a WebSocket connection over which AMP messages are
   conveyed.  The first goal of an AMP session is to inform a client
   about local alerting resources (alerting configuration information),
   but the client may maintain a long-lived AMP session in order to
   provide updated status (e.g., location or contact changes) as well as
   to get updated configuration information over time.

   The client initiates an AMP session by establishing a WebSocket
   connection to the AMP server.  The client sends the first message,
   providing a Registration message with relevant information.

   The AMP Server MUST respond with an Advertisement message containing
   local alert information immediately upon the establishment of a
   session.  If the initial Registration contained a "token" value, then
   the "token" field in the Advertisement MUST be either empty or equal
   to the registered token value.

   Once the initial handshake is complete, either side may send a
   message at any time.  When a message is received, the action taken
   depends on the type of message:

   o  Client receives Refer: The client SHOULD close the current AMP
      session and initiate a new AMP session with the server indicated
      in the "to" field of the message.  If the client received a token
      in the first session, then it SHOULD include that token in the
      initial Registration for the new session.

   o  Client receives Advertisement: The client MUST replace its local
      alert configuration information with the contents of the
      Advertisement.  If the "token" field is present, then the client
      MUST update its token.



Lepinski, et al.        Expires January 16, 2013               [Page 11]


Internet-Draft                     AMP                         July 2012


   o  Client receives Alert: The client MUST decode the encoded
      "alert_data" element and process the resulting ESCAPE message
      according to the ESCAPE validation rules.  If the alert is valid,
      the client renders it to the user.

   o  Server receives Registration: The server MUST replace its current
      state for the client with the state in the message.

      *  If the "token" field is present, the server MUST verify that it
         matches a token that it has assigned in an Advertisement
         message in this session; if not, then this message MUST be
         ignored.

      *  If the Registration message contains only the "type" field,
         then the server MUST delete any state associated with this
         session.

      *  If the location of the client has moved out of the server's
         coverage area, then the server MUST close the connection.  If
         the responsible AMP server for the client's new location is
         known, then the server SHOULD send a Refer message before
         closing the connection.

   If either side receives a message sent in the incorrect direction, it
   MUST ignore it.  For the server, this includes Advertisement, Refer,
   and Alert messages.  For the client, Registration messages.

   Servers SHOULD maintain information about AMP servers covering
   neighboring jurisdictions and their respective coverage areas.  That
   way, the server can issue a Refer message to the client as soon as
   the client reports that it has left the coverage area.  This will
   help ensure that the client always has up-to-date alerting
   configuration information, without the client having to repeatedly
   perform AMP discovery.


5.  IANA Considerations

   This document requires several registrations by IANA into existing
   registries, and creates a new registry of AMP message codes.

   [[ TODO: Register the URN: "urn:service:alert-info" ]]

   [[ TODO: Register NAPTR service tag "AMP" and application protocols
   "http", "https" ]]

   [[ TODO: Register media type application/amp+json ]]




Lepinski, et al.        Expires January 16, 2013               [Page 12]


Internet-Draft                     AMP                         July 2012


5.1.  AMP Message Type Registry

   IANA is requested to create a new registry of AMP Message Types.
   This registry contains two fields, the name of the name of the
   registered message type, and a specification pointer containing a
   reference to the document that defines the registered message type.

   IANA is requested to populate this new registry with the following
   four entries:

       Message Type Name                 Specification Pointer
   +--------------------------------+--------------------------------+
   |   Registration                 |   draft-barnes-atoca-meta      |
   |   Advertisement                |   draft-barnes-atoca-meta      |
   |   Refer                        |   draft-barnes-atoca-meta      |
   |   Alert                        |   draft-barnes-atoca-meta      |
   +--------------------------------+--------------------------------+


6.  Security Considerations

   [Author's Note: The Security Considerations will be fleshed out in
   more detail in the next version of this document.]

   The AMP protocol contains contact and location information for a
   device which for many devices will consist of private information
   regarding the user of the device.  Therefore, confidentiality
   protection should be used when the registration request contains
   private information.

   The modification of AMP messages can cause client devices to accept
   false alerts (in the case where the advertisement is modified) or to
   receive alerts for the improper location (if the registration is
   modified).  Therefore, integrity protection should be applied to AMP
   messages.

   The AMP protocol runs over HTTP.  Therefore, the use of HTTP over TLS
   can provide confidentiality and integrity protection for AMP
   messages.

   Alert server discovery makes use of NAPTR.  Standard security
   considerations involving the use of NAPTR apply.  DNSSEC SHOULD be
   used to protect the DNS responses provided during the discovery
   procedure.







Lepinski, et al.        Expires January 16, 2013               [Page 13]


Internet-Draft                     AMP                         July 2012


7.  Acknowledgements

   The authors would like to thank Derrick Kong for help in creating the
   JSON schema for the AMP protocol.


8.  References

8.1.  Normative References

   [I-D.barnes-atoca-escape]
              Barnes, R., "Encoding of Secure Common Alert Protocol
              Entities (ESCAPE)", draft-barnes-atoca-escape-00 (work in
              progress), October 2011.

   [I-D.ietf-geopriv-res-gw-lis-discovery]
              Thomson, M. and R. Bellis, "Location Information Server
              (LIS) Discovery using IP address and Reverse DNS",
              draft-ietf-geopriv-res-gw-lis-discovery-03 (work in
              progress), March 2012.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC4119]  Peterson, J., "A Presence-based GEOPRIV Location Object
              Format", RFC 4119, December 2005.

   [RFC4627]  Crockford, D., "The application/json Media Type for
              JavaScript Object Notation (JSON)", RFC 4627, July 2006.

   [RFC4648]  Josefsson, S., "The Base16, Base32, and Base64 Data
              Encodings", RFC 4648, October 2006.

   [RFC4848]  Daigle, L., "Domain-Based Application Service Location
              Using URIs and the Dynamic Delegation Discovery Service
              (DDDS)", RFC 4848, April 2007.

   [RFC5222]  Hardie, T., Newton, A., Schulzrinne, H., and H.
              Tschofenig, "LoST: A Location-to-Service Translation
              Protocol", RFC 5222, August 2008.

   [RFC5646]  Phillips, A. and M. Davis, "Tags for Identifying
              Languages", BCP 47, RFC 5646, September 2009.

   [RFC5986]  Thomson, M. and J. Winterbottom, "Discovering the Local
              Location Information Server (LIS)", RFC 5986,
              September 2010.




Lepinski, et al.        Expires January 16, 2013               [Page 14]


Internet-Draft                     AMP                         July 2012


   [RFC6455]  Fette, I. and A. Melnikov, "The WebSocket Protocol",
              RFC 6455, December 2011.

8.2.  Informative References

   [I-D.barnes-atoca-delivery]
              Barnes, R., "Lightweight Emergency Alerting Protocol
              (LEAP)", draft-barnes-atoca-delivery-01 (work in
              progress), October 2011.

   [RFC5223]  Schulzrinne, H., Polk, J., and H. Tschofenig, "Discovering
              Location-to-Service Translation (LoST) Servers Using the
              Dynamic Host Configuration Protocol (DHCP)", RFC 5223,
              August 2008.


Authors' Addresses

   Matt Lepinski
   BBN Technologies
   10 Moulton St
   Cambridge, MA  02138
   US

   Phone: +1 617 873 5939
   Email: mlepinski@bbn.com


   Karen Seo
   BBN Technologes
   10 Moulton St
   Cambridge, MA  02138
   US

   Phone: +1 617 873 3152
   Email: kseo@bbn.com


   Richard Barnes
   BBN Technologies
   9861 Broken Land Parkway
   Columbia, MD  21046
   US

   Phone: +1 410 290 6169
   Email: rbarnes@bbn.com





Lepinski, et al.        Expires January 16, 2013               [Page 15]