ECRIT H. Schulzrinne
Internet-Draft Columbia University
Intended status: Informational L. Liess
Expires: December 19, 2008 Deutsche Telekom
H. Tschofenig
Nokia Siemens Networks
B. Stark
AT&T
A. Kuett
Skype
June 17, 2008
Location Hiding: Problem Statement and Requirements
draft-ietf-ecrit-location-hiding-req-00.txt
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 19, 2008.
Abstract
The emergency services architecture developed in the IETF Emergency
Context Resolution with Internet Technology (ECRIT) working group
describes an architecture where location information is provided by
access networks to end points in order to determine the correct dial
string and information to route the call to a Public Safety Answering
Schulzrinne, et al. Expires December 19, 2008 [Page 1]
Internet-Draft Location Hiding Requirements June 2008
Point (PSAP). For determining the PSAP Uniform Resource Identifier
(URI) the usage of the Location-to-Service Translation (LoST)
Protocol is envisioned.
This document explores the architectural impact for the IETF
emergency services architecture for situations where the Internet
Access Provider (IAP) and/or the Internet Service Provider (ISP) are
only willing to disclose limited or no location information.
This document provides a problem statement and lists requirements.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Emergency Services Architecture . . . . . . . . . . . . . 3
1.2. Location Hiding . . . . . . . . . . . . . . . . . . . . . 3
1.3. Location by Reference . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Requirements . . . . . . . . . . . . . . . . . . . . . . . . . 4
3.1. High-Level Requirements . . . . . . . . . . . . . . . . . 4
3.2. Detailed Requirements . . . . . . . . . . . . . . . . . . 5
3.3. Desirable Properties . . . . . . . . . . . . . . . . . . . 6
4. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . 6
6. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 6
7. References . . . . . . . . . . . . . . . . . . . . . . . . . . 7
7.1. Normative References . . . . . . . . . . . . . . . . . . . 7
7.2. Informative References . . . . . . . . . . . . . . . . . . 7
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 8
Intellectual Property and Copyright Statements . . . . . . . . . . 10
Schulzrinne, et al. Expires December 19, 2008 [Page 2]
Internet-Draft Location Hiding Requirements June 2008
1. Introduction
1.1. Emergency Services Architecture
The emergency services architecture developed in the IETF Emergency
Context Resolution with Internet Technology (ECRIT) working group,
see [I-D.ietf-ecrit-framework], describes an architecture where
location information is provided by access networks to end points in
order to determine the correct dial string and information to route
the call to a Public Safety Answering Point (PSAP). The Location-to-
Service Translation (LoST) Protocol [I-D.ietf-ecrit-lost] allows to
determine the PSAP Uniform Resource Identifier (URI) for a specific
geographical location together with a service URI
[I-D.ietf-ecrit-service-urn]. The basic architecture is shown in
Figure 1 of [I-D.ietf-ecrit-framework] and further detailed in the
message flow in Figure 2 of [I-D.ietf-ecrit-framework].
For emergency services, location information is needed for two
different purposes, namely for routing an emergency call to the PSAP
that is responsible for a specific geographical region (and also for
requested service, such as police or ambulance) and for dispatch of
the emergency personell to the scene of an accident, crime or other
types of incidents.
It is very important to note that this document only discusses
location hiding in the context of location information that is need
for call routing. ISPs have no interest or even legal basis for
hiding location information from emergency services personnel.
1.2. Location Hiding
In some cases, Internet Access Providers (IAPs) and/or the Internet
Service Providers (ISPs) are afraid that allowing users to access
location information for non-emergency purposes or prior to an
emergency call will incur additional server load and thus costs.
Hence, they do not to disclose precise location information (at the
quality suitable for dispatch emergency personell by the PSAP
operator) or not to disclose any location information.
In some other cases IAPs and ISPs may not want to make location
information available without the ability to charge for it. This is
a pure business decision.
1.3. Location by Reference
The work on the Location Configuration Protocol (LCP) indicated the
need to provide the capability to obtain Location-by-References
(LbyRs) in addition to Location-by-Value (LbyV) from a Location
Schulzrinne, et al. Expires December 19, 2008 [Page 3]
Internet-Draft Location Hiding Requirements June 2008
Information Server (LIS).
The LCP problem statement and requirements document can be found in
[I-D.ietf-geopriv-l7-lcp-ps]. The requirements for obtaining an LbyR
via the LCP and the corresponding dereferencing step can be found in
[I-D.ietf-geopriv-lbyr-requirements].
HTTP Enabled Location Delivery (HELD), see
[I-D.ietf-geopriv-http-location-delivery], is an instantiation of the
LCP concept and allows LbyVs and LbyRs to be requested.
A location reference may already satisfy the requirement for location
hiding if the PSAP has the appropriate credentials to resolve the
reference. This requires a trust relationship between the PSAP and
the ISP.
Unfortunately, a location reference is not compatible with LoST, as
LoST requires an information value rather than a reference. Also,
LoST servers may be operated by the VSP, which may not have a trust
relationship with the ISP.
This document explores the architectural impact for the current
architecture and lists requirements.
2. Terminology
The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119], with the
important qualification that, unless otherwise stated, these terms
apply to the design of an solution supporting location hiding, not
its implementation or application.
This document reuses terminology from [I-D.ietf-geopriv-l7-lcp-ps].
3. Requirements
This section presents requirements.
3.1. High-Level Requirements
Req-A: There SHOULD be a way an access network can withhold detailed
location information from any entity it wishes to, and
specifically, the endpoint, and a VSP.
Schulzrinne, et al. Expires December 19, 2008 [Page 4]
Internet-Draft Location Hiding Requirements June 2008
Req-B: The ISP/IAP MUST support the ability of the endpoint or the
VSP to route emergency calls.
Req-C: The VSP MUST be able to validate that a call purported to be
an emergency call is being routed to a bona fide URI, which is
denoted by being a URI in LoST for the designated emergency
service.
Req-D: Precise location information must be conveyed (either LbyR or
LbyV) to the PSAP.
3.2. Detailed Requirements
Req-1: A business or trust relationship between an ISP and a VSP
MUST NOT be assumed.
Req-2: A solution MUST consider deployment scenarios where a VSP is
outside the jurisdiction of the PSAP.
Req-3: The solution MUST offer automated discovery of servers and
other behavior, i.e., no manual configuration can be assumed.
Req-4: The steps needed by the endpoint for emergency calling SHOULD
be no different when location is withheld vs. when location is not
withheld. In particular, user agents cannot require additional
configuration to discover which particular environment (hiding or
no hiding) they find themselves in.
Req-5: The solution SHOULD work for non-SIP entities, without the
ISP/IAP having to support these protocols.
Req-6: The solution MUST work if PSAP boundaries have holes.
Req-7: The solution MUST NOT assume the existence of Emergency
Service Routing Proxies (ESRPs) per country, state and city.
Req-8: The solution MUST consider that service boundaries for
different emergency services may differ, but they overlap at the
location of the caller.
Req-9: UAs MUST NOT have to deduce the desired behavior by trial-
and-error operations, such as LbyR resolutions, fail, as failures
add latency during call setup. The solution MUST NOT
significantly increase call setup latency.
Schulzrinne, et al. Expires December 19, 2008 [Page 5]
Internet-Draft Location Hiding Requirements June 2008
Req-10: The solution MUST allow the end host to determine PSAP/ESRP
URLs prior to the call, for all emergency services.
Req-11: The solution MUST allow UAs to discover at least their dial
string ahead of the emergency call.
Req-12: The solution MUST have minimal impact on UAs.
Req-13: The solution MUST NOT interfere with the use of LoST for
non-emergency services.
Req-14: Deleted
Req-15: Calls may reach a PSTN gateway, rather than the PSAP
directly.
3.3. Desirable Properties
o The solution MUST NOT shift effort(externality), i.e., the
convenience of the location-hiding ISP MUST NOT impose a burden on
user agents or non-hiding ISPs/IAPs and SHOULD NOT impose a burden
on VSPs.
o The solution SHOULD minimize the impact on LoST, SIP conveyance
[I-D.ietf-sip-location-conveyance] and DHCP.
o The solution SHOULD NOT rely on DHCP for LoST configuration, as
the information in the DHCP server provided by the ISP may not
reach the UA, due to NATs.
4. IANA Considerations
This document does not require actions by IANA.
5. Security Considerations
This document does not raise additional security consideration beyond
those mentioned in [I-D.ietf-geopriv-l7-lcp-ps] and discussed in this
document.
6. Acknowledgments
We would like to thank the following ECRIT working group members (in
no particular order) for their contributions:
Schulzrinne, et al. Expires December 19, 2008 [Page 6]
Internet-Draft Location Hiding Requirements June 2008
o Andrew Newton (andy@hxr.us)
o James Winterbottom (James.Winterbottom@andrew.com)
o Brian Rosen (br@brianrosen.net)
o Richard Barnes (rbarnes@bbn.com)
o Marc Linsner (mlinsner@cisco.com)
o Ted Hardie (hardie@qualcomm.com)
7. References
7.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", March 1997.
7.2. Informative References
[I-D.ietf-geopriv-l7-lcp-ps]
Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7
Location Configuration Protocol; Problem Statement and
Requirements", draft-ietf-geopriv-l7-lcp-ps-07 (work in
progress), March 2008.
[I-D.ietf-sip-location-conveyance]
Polk, J. and B. Rosen, "Location Conveyance for the
Session Initiation Protocol",
draft-ietf-sip-location-conveyance-10 (work in progress),
February 2008.
[I-D.ietf-ecrit-framework]
Rosen, B., Schulzrinne, H., Polk, J., and A. Newton,
"Framework for Emergency Calling using Internet
Multimedia", draft-ietf-ecrit-framework-05 (work in
progress), February 2008.
[I-D.ietf-ecrit-lost]
Hardie, T., Newton, A., Schulzrinne, H., and H.
Tschofenig, "LoST: A Location-to-Service Translation
Protocol", draft-ietf-ecrit-lost-10 (work in progress),
May 2008.
[I-D.ietf-geopriv-lbyr-requirements]
Marshall, R., "Requirements for a Location-by-Reference
Mechanism", draft-ietf-geopriv-lbyr-requirements-02 (work
in progress), February 2008.
[I-D.ietf-ecrit-service-urn]
Schulzrinne, H., "A Uniform Resource Name (URN) for
Schulzrinne, et al. Expires December 19, 2008 [Page 7]
Internet-Draft Location Hiding Requirements June 2008
Emergency and Other Well-Known Services",
draft-ietf-ecrit-service-urn-07 (work in progress),
August 2007.
[I-D.ietf-geopriv-http-location-delivery]
Barnes, M., Winterbottom, J., Thomson, M., and B. Stark,
"HTTP Enabled Location Delivery (HELD)",
draft-ietf-geopriv-http-location-delivery-07 (work in
progress), April 2008.
Authors' Addresses
Henning Schulzrinne
Columbia University
Department of Computer Science
450 Computer Science Building
New York, NY 10027
US
Phone: +1 212 939 7004
Email: hgs+ecrit@cs.columbia.edu
URI: http://www.cs.columbia.edu
Laura Liess
Deutsche Telekom Networks
Deutsche Telekom Allee 7
Darmstadt, Hessen 64295
Germany
Phone:
Email: Laura.Liess@t-systems.com
URI: http://www.telekom.de
Hannes Tschofenig
Nokia Siemens Networks
Linnoitustie 6
Espoo 02600
Finland
Phone: +358 (50) 4871445
Email: Hannes.Tschofenig@gmx.net
URI: http://www.tschofenig.priv.at
Schulzrinne, et al. Expires December 19, 2008 [Page 8]
Internet-Draft Location Hiding Requirements June 2008
Barbara Stark
AT&T
725 W Peachtree St, NE
Atlanta, GA 30308
USA
Phone: +1 404 499 7026
Email: barbara.stark@att.com
Andres Kuett
Skype
Email: andres.kytt@skype.net
Schulzrinne, et al. Expires December 19, 2008 [Page 9]
Internet-Draft Location Hiding Requirements June 2008
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Schulzrinne, et al. Expires December 19, 2008 [Page 10]