ECRIT Working Group H. Tschofenig INTERNET-DRAFT Nokia Siemens Networks Category: Informational H. Schulzrinne Expires:April 22,September 12, 2013 Columbia University B. Aboba (ed.) Microsoft Corporation22 October 201213 March 2013 Trustworthy Locationdraft-ietf-ecrit-trustworthy-location-04.txtdraft-ietf-ecrit-trustworthy-location-05.txt Abstract For some location-based applications, such as emergency calling or roadside assistance, the trustworthiness of location information is critically important. This document describes how to convey location in a manner that is inherently secure and reliable. It also provides guidelines for assessing theproblemtrustworthiness of"trustworthy location" as well as potential solutions.location information. Status of This Memo This Internet-Draft is submitted in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF). Note that other groups may also distribute working documents as Internet-Drafts. The list of current Internet- Drafts is at http://datatracker.ietf.org/drafts/current/. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." This Internet-Draft will expire onApril 22,September 12, 2013. Copyright Notice Copyright (c)20122013 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . .3 2. Emergency Services Architecture . . . . . . . . . . . . . . .43.2. Threats . . . . . . . . . . . . . . . . . . . . . . . . . . .4 3.1.5 2.1. Location Spoofing . . . . . . . . . . . . . . . . . . . . 63.2.2.2. Identity Spoofing . . . . . . . . . . . . . . . . . . . . 74. Solution Proposals3. Solutions . . . . . . . . . . . . . . . . . . . . . .8 4.1. Location Signing. . . . 7 3.1. Signed Location by Value . . . . . . . . . . . . . . . . . 84.2.3.2. Location by Reference . . . . . . . . . . . . . . . . . . 104.3.3.3. Proxy Adding Location . . . . . . . . . . . . . . . . . .11 5. Operational Considerations . . . . . . . . . . . . . . . . . . 12 5.1. Attribution to a Specific Trusted Source . . . . . . . . . 12 5.2. Application to a Specific Point in Time . . . .13 4. Location Trust Assessment . . . . .16 5.3. Linkage to a Specific Endpoint. . . . . . . . . . . . .. 17 6.15 5. Security Considerations . . . . . . . . . . . . . . . . . . . 177.6. IANA Considerations . . . . . . . . . . . . . . . . . . . . .18 8. Acknowledgments19 7. References . . . . . . . . . . . . . . . . . . . . . . . .18 9. References. . 19 7.1. Informative references . . . . . . . . . . . . . . . . . . 19 Acknowledgments . . . . . . .18 9.1. Informative references. . . . . . . . . . . . . . . . . .1821 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .2122 1. Introduction Several public and commercial services depend upon location information in their operations. This includes emergency services (such as fire, ambulance and police) as well as commercial services such as food delivery and roadside assistance. Services that depend onaccuratelocation commonly experience security issues today. While prank calls have been a problem for emergency services dating back to the time of street corner call boxes,a recent increase inwith thefrequency and sophistication ofmove to IP-based emergency services, the ability to launch automated attacks hasleadincreased. As the European Emergency Number Association (EENA) has noted [EENA]: "False emergency calls divert emergency services away from people who may be in life-threatening situations and who need urgent help. This can mean the difference between life and death for someone in trouble." EENA [EENA] has attempted to define terminology and describe best current practices for dealing with false emergency calls, which in certain European countries can constitute as much as 70% of all emergency calls. Reducing theFBI issuingnumber of prank calls represents awarning [Swatting].challenge, since emergency services authorities in most countries are required to answer every call (whenever possible). Where the caller cannot be identified, the ability to prosecute is limited. Since prank emergency calls can endanger bystanders or emergency services personnel, or divert resources away from legitimate emergencies, they can be life threatening.It should be kept in mind that issues of location trust and attribution are closely linked. In situations where tracingA particularly dangerous form of prank call is "swatting" - an prank emergency callback to the originator is more difficult, experience has shownthatthe frequency of nuisance calls can rise dramatically. For example, where emergency calls have been alloweddraws a response fromhandsets lackinglaw enforcement (e.g. aSIM card, or where ownershipfake hostage situation that results in dispatching of a "Special Weapons And Tactics" (SWAT) team). In 2008 theSIM card cannot be determined,FBI issued a warning [Swatting] about an increase in the frequency and sophistication ofnuisance calls has often been unacceptably high [TASMANIA][UK][SA]. Conversely, wherethese attacks. Many documented cases of "swatting" involve not only theability exists enablefaking of aninvestigator to determineemergency, but also theoriginatorabsence ofa prank emergency call after the fact,accurate caller identification and thetrustworthinessdelivery of misleading location data. Today these attacks are often carried out by providing false caller identification, since for circuit-switched calls from landlines, location provided to the PSAP islikelydetermined from a lookup using the calling telephone number. With IP-based emergency services, in addition toimprove, even withouttheintroduction of measurespotential for false caller identification, it is also possible tolimitattach misleading locationspoofing. Under a court order, an investigator can have access to additionalinformationbeyond the messages conveyed into the emergency call.For example, in suchIdeally, asituation, audit logs will oftencall taker at a PSAP should bemade available andput inaddition, information relatingthe position to assess, in real-time, theownerlevel ofan unlinked pseudonym couldtrust that can be placed on the information provided within a call. This includes automated location conveyed along with the call and location information communicated by the caller, as well as identity information about the caller. Where real-time assessment is not possible, it is important toinvestigators, enabling thembe able tounraveldetermine thechainsource ofevents that lead totheattack.call in a post-mortem, so as to be able to enforce accountability. This documentreviewsdefines terminology (including theemergency services architecturemeaning of "trustworthy location") in Section2,1.1, investigates security threats in Section3, and2, outlines potential solutions in Section4. Operational considerations are provided3, covers trust assessment in Section54 and discusses security considerationsare discussedin Section6.5. 1.1. Terminology The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119].This document uses termsThe definition for "Target" is taken from[RFC5012] Section 3. 2. Emergency Services Architecture Users of"Geopriv Requirements" [RFC3693]. The term "location determination method" refers to thetelephone network can summon emergency services such as ambulance, fire and police usingmechanism used to determine the location of awell-known emergency service number (e.g., 9-1-1 in North America, 1-1-2 in Europe). LocationTarget. This may be something employed by a location informationisserver (LIS), or by the Target itself. It specifically does not refer to the location configuration protocol (LCP) used toroute emergency callsdeliver location information either to theappropriate regional Public Safety Answering Point (PSAP) that servesTarget or thecallerRecipient. This term is re-used from "GEOPRIV PIDF-LO Usage Clarification, Considerations, and Recommendations" [RFC5491]. The term "source" is used todispatch first-level respondersrefer to theemergency site. In emergency services deployments utilizing voice over IP, many of the assumptions ofLIS, node, or device from which a Recipient (Target or Third-Party) obtains location information. Additionally, thePlain Old Telephone Service (POTS) and public land mobile network (PLMN) no longer hold. While both POTSterms Location-by-Value (LbyV), Location-by- Reference (LbyR), Location Configuration Protocol, Location Dereference Protocol, andPLMN service providers often both physical access as well as phone service, with Voice over IP (VoIP) thereLocation URI are re-used from "Requirements for a Location-by-Reference Mechanism" [RFC5808]. "Trustworthy Location" is defined as location information that can be attributed to asplit between the role of the Access Infrastructure Provider (AIP),trusted source, has been protected against modification in transmit, and has been assessed as trustworthy. "Location Trust Assessment" refers to theApplication (Voice) Service Provider (VSP). The VSP may be located far away fromprocess by which theAIP and may eitherreliability of location information can be assessed. This topic is discussed in Section 4. 2. Threats While previous IETF documents haveno business relationship withanalyzed aspects of theAIPsecurity of emergency services ormay be a competitor. It is also likely thatthreats to geographic location privacy, those documents do not cover theVSP will have no relationship withthreats arising from unreliable location information. A threat analysis of thePSAP. In some situations itemergency services system ispossibleprovided in "Security Threats and Requirements for Emergency Call Marking and Mapping" [RFC5069]. RFC 5069 describes attacks on theend host to determine its own location using technologyemergency services system, such asthe Global Positioning System (GPS). Where the end host cannot determine location on its own, mechanisms have been standardizedattempting tomake civicdeny system services to all users in a given area, to gain fraudulent use of services andgeodetic location availabletothe end host,divert emergency calls to non-emergency sites. [RFC5069] also describes attacks against individuals, includingLLDP-MED [LLDP-MED], DHCP extensions [RFC4776][RFC6225], HELD [RFC5985],attempts to prevent an individual from receiving aid, orlink-layer specifications such as [IEEE-802.11y]. The server offering thisto gain informationis known as a Location Information Server (LIS). The LIS may be deployed byabout anAIP, or it may be run by a Location Service Provider (LSP) which may have no relationship with the AIP, the VSP oremergency. "Threat Analysis of thePSAP. TheGeopriv Protocol" [RFC3694] describes threats against geographic locationinformation, provided by reference or by value, is then conveyed toprivacy, including protocol threats, threats resulting from theservice-providing entities, i.e.storage of geographic locationrecipients, via application protocols, such as HTTP, SIP or XMPP. Wheredata, and threats posed by theend host does not provide location, or is not trusted to do so, it is possible for an intermediary to retrieveabuse of information. This document focuses on threats from attackers providing false location information within emergency calls. Since we do not focus onbehalfattackers gaining control of infrastructure elements (e.g., location servers, call route servers) or the emergency services IP network, theendpoint. 3. Threats This section focuses onthreatsderivingare derived from the introduction of untrustworthy locationinformation, regardless of whether this occurs intentionally or unintentionally.information by end hosts. In addition to threats arising from the intentional forging of location information, end hosts may be induced to provide untrustworthy location information. For example, end hosts may obtain location from civilian GPS, which is vulnerable to spoofing [GPSCounter] or from third party Location Service Providers (LSPs) which may be vulnerable to attack or may not warrant the use of their services for emergency purposes.Emergency services have three finite resources subject to denial of service attacks: the network and server infrastructure, call takers and dispatchers, and the first responders, such as fire fighters and police officers. Protecting the network infrastructure is similar to protecting other high-value service providers, except that location information may be used to filter call setup requests, to weed out requests that are out of area. PSAPs even for large cities may only have a handful of PSAP call takers on duty, so even if they can, by questioning the caller, eliminate a lot of prank calls, they are quickly overwhelmed by even a small-scale attack. Finally, first responder resources are scarce, particularly during mass-casualty events. Legacy emergency services rely on the ability to identify callers, as well as on the difficulty of location spoofing for normal users to limit prank calls. The ability to ascertain identity is important, since the threat of severe punishments reduces prank calls. Mechanically placing a large number of emergency calls that appear to come from different locations is difficult. Calls from pay phones are subject to greater scrutiny by the call taker. In the current system, it would be very difficult for an attacker from country 'Foo' to attack the emergency services infrastructure located in country 'Bar'. One of the main motivations of an adversary in the emergency services context is to prevent callers from utilizing emergency service support. This can be done by a variety of means, such as impersonating a PSAP or directory servers, attacking SIP signaling elements and location servers. Attackers may want to modify, prevent or delay emergency calls. In some cases, this will lead the PSAP to dispatch emergency personnel to an emergency that does not exist and, hence, the personnel might not be available to other callers. It might also be possible for an attacker to impede the users from reaching an appropriate PSAP by modifying the location of an end host or the information returned from the mapping protocol. In some countries, regulators may not require the authenticated identity of the emergency caller, as is true for PSTN-based emergency calls placed from pay phones or SIM- less cell phones today. Furthermore, if identities can easily be crafted (as it is the case with many VoIP offerings today), then the value of emergency caller authentication itself might be limited. As a consequence, an attacker can forge emergency call information without the chance of being held accountable for its own actions. The above-mentioned attacks are mostly targeting individual emergency callers or a very small fraction of them. If attacks are, however, launched against the mapping architecture (see [RFC5582] or against the emergency services IP network (including PSAPs), a larger region and a large number of potential emergency callers are affected. The call takers themselves are a particularly scarce resource and if human interaction by these call takers is required then this can very quickly have severe consequences.To provide a structured analysis we distinguish between three adversary models: External adversary model: The end host, e.g., an emergency caller whose location is going to be communicated, is honest and the adversary may be located between the end host and the location server or between the end host and the PSAP. None of the emergency service infrastructure elements act maliciously. Malicious infrastructure adversary model: The emergency call routing elements, such as the LIS, the LoST infrastructure, used for mapping locations to PSAP address, or call routing elements, may act maliciously. Malicious end host adversary model: The end host itself acts maliciously, whether the owner is aware of this or whether it is acting as a bot. In this document, we focus only on the malicious end host adversary model.3.1.2.1. Location Spoofing An adversary can provide false location information in an emergency call in order to misdirect emergency resources. For calls originating within the PSTN, this attack can be carried out via caller-id spoofing. Where location is attached to the emergency call by an end host, several avenues are available to provide false location information: 1. The end host could fabricate a PIDF-LO and convey it within an emergency call; 2. The VSP (and indirectly a LIS) could be fooled into using the wrong identity (such as an IP address) for location lookup, thereby providing the end host with misleading location information; 3. Inaccurate or out-of-date information (such spoofed GPS signals, a stale wiremap or an inaccurate access point location database) could be utilized by the LIS or theendhostend host in its location determination, thereby leading to an inaccurate determination of location. By analysis of the SIP headers, it may be possible to flag situations where the conveyed location is suspect (e.g. potentially wrong city, state, country or continent). However, in other situations only entities close to the caller may be able to verify the correctness of location information. The following list presents threats specific to location information handling: Place shifting: Trudy, the adversary, pretends to be at an arbitrary location. In some cases, place shifting can be limited in range, e.g., to the coverage area of a particular cell tower. Time shifting: Trudy pretends to be at a location she was a while ago. Location theft: Trudy observes Alice's location and replays it as her own. Location swapping: Trudy and Malory, located in different locations, can collude and swap location information and pretend to be in each other's location.3.2.2.2. Identity Spoofing With calls originating on an IP network, at least two forms of identity are relevant, with the distinction created by the split between the AIP and the VSP: (a) network access identity such as might be determined via authentication (e.g., using the Extensible Authentication Protocol (EAP) [RFC3748]); (b) caller identity, such as might be determined from authentication of the emergency caller at the VoIP application layer. If the adversary did not authenticate itself to the VSP, then accountability may depend on verification of the network access identity. However, this also may not have been authenticated, such as in the case where an open IEEE 802.11 Access Point is used to initiate a nuisance emergency call. Although endpoint information such as the IP or MAC address may have been logged, tying this back to the device owner may be challenging. Unlike the existing telephone system, VoIP emergency calls could require strong identity, which need not necessarily be coupled to a business relationship with the AIP, ISP or VSP. However, due to the time-critical nature of emergency calls, multi-layer authentication is undesirable, so that in most cases, only the device placing the call will be able to be identified, making the system vulnerable to bot-net attacks. Furthermore, deploying additional credentials for emergency service purposes (such as certificates) increases costs, introduces a significant administrative overhead and is only useful if widely deployed.4. Solution Proposals3. Solutions This section presents threepotential solutionsmechanisms which can be used tothe described threats:convey location: signed locationsigningby value (Section4.1),3.1), location by reference (Section4.2)3.2) and proxy added location (Section4.3). 4.1. Location Signing One way3.3). In order for toavoidprovide authentication and integrity protection for the SIP messages conveying location, several security approaches are available. While it is possible for proxies to use security mechanisms such as SIP Identity [RFC4474] to ensure that modifications to the locationspoofingin transit can be detected by the location recipient (e.g., the PSAP), compatibility with Session Border Controllers (SBCs) that modify integrity-protected headers has proven to be an issue in practice. As a result, the use of SIP over TLS is at present a more likely mechanism toletprovide per-message authentication and integrity protection. 3.1. Signed Location by Value With location signing, atrustedlocation serversignsigns the location information before it is sent to the end host,i.e., the(the entity subject to the location determinationprocess.process). The signed location information is then verified by the location recipient and not by the target. Figure 1 shows the communication model with the target requesting signed location in step (a), the location server returns it in step (b) and it is then conveyed to the location recipient in step (c) who verifies it. For SIP, the procedures described in "Location Conveyance for the Session Initiation Protocol" [RFC6442] are applicable for location conveyance. +-----------+ +-----------+ | | | Location | | LIS | | Recipient | | | | | +-+-------+-+ +----+------+ ^ | --^ | | -- Geopriv |Req. | -- Location |Signed |Signed -- Geopriv Configuration |Loc. |Loc. -- Using Protocol Protocol |(a) |(b) -- (e.g., SIP) | v -- (c) +-+-------+-+ -- | Target / | -- | End Host + | | +-----------+ Figure 1: Location SigningAdditionalIn order to limit replay attacks, additional information, such as timestamps or expiration times, has to be included together with the signedlocation to limit replay attacks.location. If the location is retrieved from a location server, even a stationary end host has to periodically obtain a fresh signed location, or incur the additional delay of querying during the emergency call.Bot netsWhile bot-nets arealsounlikely to be deterred by locationsigning. However,signing, accurate location information would limit theusablesubset of thebot net,bot-net that could be used for an attack, as only hosts within the PSAP serving area would be useful in placing emergency calls. To prevent location-swapping attacks it is necessary to include some sometarget specifictarget-specific identity information. Theincludedrequired information depends on whether thepurpose, namely eithergoal is real-time verification by the location recipient orfor the purpose of apost-mortem analysiswhen(where thelocation recipient wants to determinegoal is determination of the legal entitybehind the targetresponsible forprosecution (if this is possible).the attack). As argued in Section6 the operational considerations make a4, real-time verificationdifficult. A strawman proposal for locationis not always possible. Location signing isprovided by [I-D.thomson-geopriv-location-dependability]. Still, for large-scaleunlikely to deter attacks launched bybot nets, this is unlikelybot-nets, since the work required tobe helpful.verify the location signature is considerable. Location signing is also difficult when the hostprovides its ownobtains location via mechanisms such as GPS,which is likely to be a common occurrence for mobile devices. Trustedunless trusted computing approaches, with tamper-proof GPS modules,maycan beneeded in that case. After all, a deviceapplied. Otherwise, an end host canalwayspretend to have a GPSdevicedevice, and the recipienthas no way of verifying this or forcing disclosurewill need to rely on its ability to assess the level ofnon-GPS-derivedtrust that should be placed in the end host locationinformation.claim. A straw-man proposal for location signing is provided in [I- D.thomson-geopriv-location-dependability], and [NENA-i2] Section 3.7 includes operational recommendations relating to location signing: Locationverification may be most useful if itdetermination isusedout of scope for NENA, but we can offer guidance on what should be considered when designing mechanisms to report location: 1. The location object should be digitally signed. 2. The certificate for the signer (LIS operator) should be rooted inconjunction with other mechanisms.VESA. Forexample,this purpose, VPC and ERDB operators should issue certs to LIS operators. 3. The signature should include acall taker can verify thattimestamp. 4. Where possible, theregion that correspondsLocation Object should be refreshed periodically, with the signature (and thus the timestamp) being refreshed as a consequence. 5. Anti-spoofing mechanisms should be applied to theIP addressLocation Reporting method. [Note: The term Valid Emergency Services Authority (VESA) refers to the root certificate authority.] As noted above, signing of location objects implies themedia stream roughly correspondsdevelopment of a trust hierarchy that would enable a certificate chain provided by the LIS operator to be verified by thelocation information reportedPSAP. Rooting the trust hierarchy in VESA can be accomplished either by having thecaller. To makeVESA directly sign theuseLIS certificates, or by the creation ofbot nets more difficult, a CAPTCHA-style test may be appliedintermediate CAs certified by the VESA, which will then issue certificates tosuspicious calls, although this ideathe LIS. In terms of the workload imposed on the VESA, the latter approach isquite controversial for emergency services, athighly preferable. However, this raises thedangerquestion ofdelaying or even rejecting valid calls. 4.2.who would operate the intermediate CAs and what the expectations would be. In particular, the question arises as to the requirements for LIS certificate issuance, and whether they are significantly different from say, requirements for issuance of an SSL/TLS web certificate. 3.2. Location by ReferenceThe location-by-reference conceptLocation-by-reference was developed so that end hostscouldcan avoid having to periodically query the location server for up- to-date location information in a mobile environment. Additionally, if operators do not want to disclose location information to the end host without charging them, location-by-reference provides a reasonable alternative. As noted in "A Location Dereference Protocol Using HTTP-Enabled Location Delivery (HELD)" [RFC6753], a location reference can be obtained via HTTP-Enabled Location Delivery (HELD) [RFC5985] or the Dynamic Host Configuration Protocol (DHCP) location URI option [DHCP-URI-OPT]. Figure 2 shows the communication model with the target requesting a location reference in step (a), the location server returns the reference in step (b), and it is then conveyed to the location recipient in step (c). The location recipient needs to resolve the reference with a request in step (d). Finally, location information is returned to the Location Recipient afterwards. For location conveyance in SIP, the procedures described in[I-D.ietf-sip- location-conveyance][RFC6442] are applicable. +-----------+ Geopriv +-----------+ | | Location | Location | | LIS +<------------->+ Recipient | | | Dereferencing | | +-+-------+-+ Protocol (d) +----+------+ ^ | --^ | | -- Geopriv |Req. | -- Location |LbyR |LbyR -- Geopriv Configuration |(a) |(b) -- Using Protocol Protocol | | -- (e.g., SIP) | V -- (c) +-+-------+-+ -- | Target / | -- | End Host + | | +-----------+ Figure 2: Location by Reference Where location by reference is provided, the recipient needs to deference the LbyR in order to obtain location. The details for the dereferencing operations vary with the type of reference, such as a HTTP, HTTPS, SIP, SIPS URI or a SIP presence URI.HTTP-Enabled Location Delivery (HELD) [RFC5985] is an example of a protocol that is able to return such references.For location-by-reference, the location server needs to maintain one or several URIs for each target, timing out these URIs after a certain amount of time. References need to expire to prevent the recipient of such a URL from being able to permanently track a host and to offer garbage collection functionality for the location server. Off-path adversaries must be prevented from obtaining the target's location. The reference contains a randomized component that prevents third parties from guessing it. When the location recipient fetches up-to-date location information from the location server, it can also be assured that the location information is fresh and not replayed. However, this does not address location swapping.However, location-by-reference does not offer significantWith respect to the securitybenefits ifof the de-reference operation, [RFC6753] Section 6 states: TLS MUST be used for dereferencing location URIs unless confidentiality and integrity are provided by some other mechanism, as discussed in Section 3. Location Recipients MUST authenticate theendhostuses GPS to determine its location. At best,identity using the domain name included in the location URI, using the procedure described in Section 3.1 of [RFC2818]. Local policy determines what anetwork provider can use cell towerLocation Recipient does if authentication fails ortriangulation informationcannot be attempted. The authorization by possession model (Section 4.1) further relies on TLS when transmitting the location URI tolimitprotect the secrecy of the URI. Possession of such a URI implies the same privacy considerations as possession of the PIDF-LO document that the URI references. Location URIs MUST only be disclosed to authorized Location Recipients. The GEOPRIV architecture [RFC6280] designates the Rule Maker to authorize disclosure of theinaccuracyURI. Protection ofuser-providedthe location URI is necessary, since the policy attached to such a location URI permits anyone who has the URI to view the associated location information.4.3. Proxy Adding Location InsteadThis aspect of security is covered in more detail in the specification ofmakinglocationinformation availableconveyance protocols, such as [RFC6442]. For authorizing access to location-by-reference, two authorization models were developed: "Authorization by Possession" and "Authorization via Access Control Lists". With respect to "Authorization by Possession" [RFC6753] Section 4.1 notes: In this model, possession -- or knowledge -- of the location URI is used to control access to location information. A location URI might be constructed such that it is hard to guess (see C8 of [RFC5808]), and theend host,set of entities that it ispossibledisclosed toallowcan be limited. The only authentication this would require by the LS is evidence of possession of the URI. The LS could immediately authorize any request that indicates this URI. Authorization by possession does not require direct interaction with Rule Maker; it is assumed that the Rule Maker is able to exert control over the distribution of the location URI. Therefore, the LIS can operate with limited policy input from a Rule Maker. Limited disclosure is anentity inimportant aspect of this authorization model. The location URI is a secret; therefore, ensuring that adversaries are not able to acquire this information is paramount. Encryption, such as might be offered by TLS [RFC5246] or S/MIME [RFC5751], protects theAIP,information from eavesdroppers. Using possession as a basis for authorization means that, once granted, authorization cannot be easily revoked. Cancellation of a location URI ensures that legitimate users are also affected; application of additional policy is theoretically possible but could be technically infeasible. Expiration of location URIs limits the usable time for a location URI, requiring that an attacker continue o learn new location URIs to retain access to current location information. In situations where "Authorization by Possession" is not suitable (such as where location hiding [RFC6444] is required), the "Authorization via Access Control Lists" model may be preferred. Without the introduction of hierarchy, it would be necessary for the PSAP to obtain client certificates orassociatedDigest credentials for all the LISes in its coverage area, to enable it to successfully dereference LbyRs. In situations with more than a few LISes per PSAP, this would present operational challenges. A certificate hierarchy providing PSAPs with client certificates chaining to theAIP,VESA could be used toretrieveenable the LIS to authenticate and authorize PSAPs for dereferencing. Note that unlike PIDF-LO signing (which mitigates against modification of PIDF-LOs), this merely provides the PSAP with access to a (potentially unsigned) PIDF-LO, albeit over a protected TLS channel. Another approach would be for the local LIS to upload location informationon behalfto a location aggregation point who would in turn manage the relationships with the PSAP. This would shift the management burden from the PSAPs to the location aggregation points. 3.3. Proxy Adding Location Instead of relying upon the endpoint. This solutionhost to provide location, is possiblewhen the application layer messages are routed through an entity withfor a proxy that has the ability to determine the locationinformationof the endpoint, for examplepoint (e.g., based on the endhost'shost IP or MACaddress. Whenaddress) to retrieve and add or override location information. The use of proxy-added location is primarily applicable in scenarios where theuntrustworthyend host does nothave the ability to access location information, it cannot modify it either. Proxies can use various authentication security techniques, includingprovide location. As noted in [RFC6442] Section 4.1: A SIPIdentity [RFC4474],intermediary SHOULD NOT add location toensurea SIP request thatmodificationsalready contains location. This will quite often lead totheconfusion within LRs. However, if a SIP intermediary adds location, even if location was not previously present intransit can be detected bya SIP request, that SIP intermediary is fully responsible for addressing the concerns of any 424 (Bad Location Information) SIP response it receives about this locationrecipient (e.g.,addition and MUST NOT pass on (upstream) thePSAP).424 response. A SIP intermediary that adds a locationValue MUST position the new locationValue as the last locationValue within the Geolocation header field of the SIP request. A SIP intermediary MAY add a Geolocation header field if one is not present -- for example, when a user agent does not support the Geolocation mechanism but their outbound proxy does and knows the Target's location, or any of a number of other use cases (see Section 3). As notedabove,in [RFC6442] Section 3.3: This document takes a "you break it, you bought it" approach to dealing with second locations placed into a SIP request by an intermediary entity. That entity becomes completely responsible for all location within that SIP request (more on this in Section 4). While it isunlikelypossible for the proxy toworkoverride location included by the end host, [RFC6442] Section 3.4 notes the operational limitations: Overriding location information provided by the user requires a deployment where an intermediary necessarily knows better than an end user -- after all, it could be that Alice has an on-board GPS, and the SIP intermediary only knows her nearest cell tower. Which is more accurate location information? Currently, there is no way to tell which entity is more accurate or which is wrong, forGPS-basedthat matter. This document will not specify how to indicate which locationdetermination techniques.is more accurate than another. Theobviousdisadvantage of this approach isthat there is athe need to deploy application layer entities, such as SIP proxies, at AIPs or associated with AIPs. This requires a standardized VoIP profile to be deployed at every end device and at everyAIP, for example, based on SIP.AIP. This might imposea certaininteroperabilitychallenge.challenges. Additionally, the AIPmore or less takes theneeds to take responsibility for emergency calls, even for customers they have no direct or indirect relationship with. To provide identity information about the emergency caller from the VSP it would be necessary to let the AIP and the VSP to interact for authentication (see, for example, [RFC4740]). This interaction along the Authentication, Authorization and Accounting infrastructure(see )is often based on business relationships between the involved entities. The AIP and the VSP are very likely to have no such business relationship, particularly when talking about an arbitrary VSP somewhere on the Internet. In case that the interaction between the AIP and the VSP fails due to the lack of a business relationship then typically a fall-back would be provided where no emergency caller identity information is made available to the PSAP and the emergency call still has to be completed.5. Operational Considerations 5.1. Attribution4. Location Trust Assessment The ability toa Specific Trusted Source [NENA-i2] Section 3.7 describes some ofassess theaspectslevel ofattribution as follows: The i2 solution proposes a Location Information Server (LIS) be the source for distributingtrustworthiness of conveyed location informationwithin an access network. Furthermore the validity, integrity and authenticity ofis important, since thisinformation are directly attributedmakes it possible tothe LIS operator. Section 5.1.1 describes the issues that arise in ensuring the validity ofunderstand how much value should be placed on locationinformation provided by the LIS operator. Section 5.1.2 and Section 5.1.3 describe operational issues that arise in ensuring the integrity and authenticityinformation, as part oflocation information provided bytheLIS operator. 5.1.1. Validity In existing networks wheredecision making process. As an example, if automated location information isboth determined by the access/voice service provider as well as communicated by the AIP/ VSP, responsibility for location validity can be attributed entirelyunderstood to be highly suspect, asingle party, namely the AIP/VSP. However, on the Internet, not only may the AIP and VSP represent different parties, butcall taker can put more effort into obtaining locationdetermination may depend oninformationcontributed by parties trusted by neither the AIP nor VSP, or evenfrom theoperatorcaller. Caller accountability is another important aspect of trust assessment. Can theLocation Information Server (LIS). In such circumstances, mechanisms for enhancingindividual purchasing theintegritydevice orauthenticity of location data contribute little toward ensuring the validity of that data. It shouldactivating service beunderstood thatidentified or did themeans by which location is determined may not necessarily relatecall originate from a non-service initialized (NSI) device whose owner cannot be determined? Prior to themeans by which the endpoint communicates withcall, was theLIS. Just because a Location Configuration Protocol (LCP) operatescaller authenticated ata particular layer does not imply thatthelocation data communicated by that protocol is derived solely based on information obtained at that layer.network or application layer? Insome circumstances, LCP implementations may base their location determination on information gathered from a variety of sources which may merit varying levels of trust, such as information obtained fromthecalling endpoint,event of a prank call, can audit logs be made available to an investigator, orwiremapcan informationthat is time consumingrelating toverify or may rapidly go out of date. For example, considerthecase of a Location Information Server (LIS) that utilizes LLDP-MED [LLDP-MED] endpoint move detection notifications in determining calling endpoint location. Regardlessowner ofwhether the LIS implementation utilizesanLCP operating above the link layer (such as an application layer protocol such as HELD [RFC5985]), the validity of the location information conveyed wouldunlinked pseudonym bedependent onprovided, enabling investigators to unravel thesecurity propertieschain ofLLDP-MED. [LLDP-MED] Section 13.3 defines the endpoint move detection notification as follows: lldpXMedTopologyChangeDetected NOTIFICATION-TYPE OBJECTS { lldpRemChassisIdSubtype, lldpRemChassisId, lldpXMedRemDeviceClass } STATUS current DESCRIPTION "A notification generated byevents that lead to thelocal device sensing a change inattack? In practice, thetopology that indicates a new remote device attachedability to identify alocal port, or a remote device disconnected or moved from one port to another." ::= { lldpXMedNotifications 1 } Figure 3: Interworking Architecture As noted in Section 7.4 of [LLDP-MED],caller may decrease thelldpRemChassisIdSubtype, lldpRemChassisId and lldpXMedRemDeviceClass variables are determinedlikelihood of caller misbehavior. For example, where emergency calls have been allowed fromthe Chassis ID (1) and LLDP-MED Device Type Type-Length-Value (TLV) tuples provided within the LLDP advertisementhandsets lacking a SIM card, or where ownership of thecalling device. As noted in [LLDP-MED] Section 9.2.3, all Endpoint Devices use the Network address ID subtype (5) by default. In order to provide topology change notifications in a timely way, itSIM card cannotnecessarilybeassumed that a Network Connectivity devices will validatedetermined, thenetwork address prior to transmissionfrequency ofthe move detection notification. As a result, there is no guarantee that the network address reported by the endpoint will correspond tonuisance calls has often been unacceptably high [TASMANIA][UK][SA]. Note thatutilized by the device. The discrepancy need not be due to nefarious reasons. For example, an IPv6-capable endpoint may utilize multiple IPv6 addresses. Similarly, an IPv4-capable endpoint may initially utilize a Link- Local IPv4 address [RFC3927] and then may subsequently acquire a DHCP-assigned routable address. All addresses utilized bylocation trust assessment has value regardless of whether theendpoint device may not be advertised in LLDP,location has been conveyed securely (via signed location, location-by-reference oreven if they are, endpoint move detection notification may not be triggered, either because no LinkUp/LinkDown notifications occur (e.g. the host addsproxy-added location) orchanges an addressnot (via location- by-value withoutrebooting) or because these notifications werelocation signing), since secure conveyance does notdetectable by the Network Connectivity device (the endpoint device was connected to a hub rather than directly to a switch). Similar issues may arise in situations where the LIS utilizes DHCP lease dataprovide assurance relating toobtain location information. Wheretheendpoint address was not obtained via DHCP (such as via manual assignment, stateless auto-configuration [RFC4862]validity orLink-Local IPv4 self- assignment), no lease information will be available to enable determinationprovenance ofdevice location. This situation should be expected to become increasingly common as IPv6-capable endpoints are deployed, and Location Configuration Protocol (LCP) interactions occur over IPv6. Even in scenarios in which the LIS relies onlocationdata obtained from the IP MIB [RFC4293] anddata. In practice, theBridge MIB [RFC4188], availabilitysource of the locationdetermination informationdata isnot assured. Inimportant for location trust assessment. For example, location provided by a Location Information Server (LIS) whose administrator has anenterprise scale network, maintenanceestablished history ofcurrentmeeting emergency location accuracy requirements (e.g. Phase II) may be considered more reliable than location informationdepends on the abilityprovided by a third party Location Service Provider (LSP) that disclaims use ofthe management stationlocation information for emergency purposes. However, even where an LSP does not attempt toretrieve data via polling of network devices. Asmeet thenumber of devices increases, constraints of network latency and packet loss may makeaccuracy requirements for emergency location, itincreasingly difficultstill may be able toensure that all devices are polled on a sufficiently frequent interval. In addition,provide information useful inlarge networks, itassessing about how reliable location information is likelythat tables will be large so that when UDP transport is used, query responses will fragment, resulting in increasing packet loss or even difficulties in firewall or NAT traversal. Furthermore, even in situations where the location data can be presumedtoexist and be valid, there may be issues with the integrity of the retrieval process.be. For example,wherewas location determined based on theLIS dependsnearest cell tower or 802.11 Access Point (AP), or was a triangulation method used? If based on cell tower or AP location data, was the information obtained froma MIB notification or query, unless SNMPv3 [RFC3411] is used, data integrity and authenticity is not assured in transit betweenan authoritative source (e.g. thenetwork connectivity devicetower or AP owner) and when was theLIS. From these examples, it should be clearlast time that theavailability or validity oflocationdata is a property of the LIS system design and implementation rather than an inherent propertyof theLCP. As a result, mechanisms utilized to protecttower or access point was verified? For real-time validation, information in theintegritysignaling andauthenticity of location data do not necessarily provide assurances relating to the validity or provenance of that data. 5.1.2. Location Signing [NENA-i2] Section 3.7 includes recommendations relating to location signing: Location determination is out of scope for NENA, but wemedia packets canoffer guidance on what shouldbeconsidered when designing mechanisms to report location: 1. Thecross checked against locationobject should be digitally signed. 2. The certificate for the signer (LIS operator) should be rooted in VESA.information. Forthis purpose, VPC and ERDB operators should issue certsexample, it may be possible toLIS operators. 3. The signature should include a timestamp. 4. Where possible,determine theLocation Object should be refreshed periodically,region associated with thesignature (and thusIP address included within SIP Via: or Contact: headers, or thetimestamp) being refreshed asmedia source address, and compare this against the location information reported by the caller or conveyed in the PIDF-LO. While aconsequence. 5. Anti-spoofing mechanisms shouldCAPTCHA-style test may be applied tothe Location Reporting method. [Note: The term Valid Emergency Services Authority (VESA) referssuspicious calls to lower theroot certificate authority.] Signing of location objects impliesrisk from bot-nets, this is quite controversial for emergency services, due to thedevelopmentrisk ofa trust hierarchy that would enable a certificate chain provided by the LIS operator todelaying or rejecting valid calls. Although privacy-preserving procedures may beverifieddisabled for emergency calls, by design, PIDF-LO objects limit thePSAP. Rooting the trust hierarchyinformation available for real-time attribution. As noted inVESA can be accomplished either by having the VESA directly sign the[RFC5985] Section 6.6: The LIScertificates, or by the creation of intermediate CAs certified by the VESA, which will then issue certificates to the LIS. In termsMUST NOT include any means of identifying theworkload imposed on the VESA,Device in thelatter approachPIDF-LO unless it ishighly preferable. However, this raisesable to verify that thequestionidentifier is correct and inclusion ofwho would operateidentity is expressly permitted by a Rule Maker. Therefore, PIDF parameters that contain identity are either omitted or contain unlinked pseudonyms [RFC3693]. A unique, unlinked presentity URI SHOULD be generated by theintermediate CAs and whatLIS for theexpectations would be. In particular,mandatory presence "entity" attribute of thequestion arisesPIDF document. Optional parameters such astotherequirements for LIS certificate issuance,"contact" andwhether they"deviceID" elements [RFC4479] aresignificantly different from say, requirements for issuance of an SSL/TLS web certificate. 5.1.3. Location by Reference Where location by reference is provided,not used. Also, therecipient needsdevice referred todeference the LbyRinorder to obtain location. Withtheintroduction of location by reference concept two authorization models were developed, see [I-D.ietf-geopriv-deref-protocol], namelyPIDF-LO may not necessarily be the"Authorization by Possession" and "Authorization via Access Control Lists" model. Withsame entity conveying the"Authorization by Possession" model everyonePIDF-LO to the PSAP. As noted inpossession of[RFC6442] Section 1: In no way does this document assume that thereferenceSIP user agent client that sends a request containing a location object isable to obtainnecessarily thecorrespondingTarget. The locationinformation. This might, however, be incompatible with other requirementsof a Target conveyed within SIP typicallyimposed by AIPs, such as location hiding (see [RFC6444]). As such, the "Authorization via Access Control Lists" model is likelycorresponds tobe the preferred model for many AIPs and subject for discussion in the subsequent paragraphs. Just as with PIDF-LO signing,that of a device controlled by theoperational considerations in managing credentialsTarget, foruse in LbyR dereferencingexample, a mobile phone, but such devices can beconsiderable without the introduction ofseparated from their owners, and moreover, in somekind of hierarchy. It does not seem reasonable for a PSAP to manage client certificates or Digest credentials for allcases, theLISes inuser agent may not know itscoverage area, so asown location. Due toenablethese design choices, it is possible for an attacker tosuccessfully dereference LbyRs. In some respects,cut and paste a PIDF-LO obtained by a different device or user into a SIP INVITE and send thisissue is even more formidable thanto thevalidation of signed PIDF- LOs.PSAP. While PIDF-LO signingcredentials are provided to the LIS operator, in the casewould prevent modification ofde-referencing, the PSAP needs to be obtain credentials compatible with the LIS configuration,apotentially more complex operational problem. As withPIDF-LOsigning, the operational issuesor invention ofLbyR can be addressed to some extent by introductionone out ofhierarchy. Rather than requiring the PSAP to obtain credentials for accessing each LIS, the local LIS could be required to upload location information to location aggregation points whowhole cloth, it would not prevent this cut and paste attack. Neither would implementation of "Enhancements for Authenticated Identity Management inturn managetherelationships withSession Initiation Protocol (SIP)" [RFC4474], allowing thePSAP. This would shiftrecipient to verify themanagement burden fromidentity assertion in thePSAPsFrom: header. However, while it might not be possible to detect thelocation aggregation points. 5.2. Application to a Specific Pointcut and paste inTimereal-time, examination of the audit logs might provide enough information to enable events to be reconstructed. Real-time validation of the timestamp contained within PIDF-LO objectscontain a timestamp, which reflects(reflecting the time at which the location wasdetermined.determined) is also challenging. Even if the PIDF-LO issigned,signed the timestamp only represents an assertion by the LIS, which may or may not be trustworthy. For example, the recipient of the signed PIDF-LO may not know whether the LIS supports time synchronization, or whether it is possible to reset the LIS clock manually without detection. Even if the timestamp was valid at the time location was determined, a time period may elapse between when the PIDF-LO was provided and when it is conveyed to the recipient. Periodically refreshing location information to renew the timestamp even though the location information itself is unchanged puts additional load on LISes. As a result, recipients need to validate the timestamp in order to determine whether it is credible.5.3. Linkage to a Specific Endpoint As noted inWhile this document focuses on the"HTTP Enabled Location Delivery (HELD)" [RFC5985] Section 6.6: The LIS MUST NOT include any meansdiscussion ofidentifyingreal-time determination of suspicious emergency calls, theDeviceuse of audit logs may help in enforcing accountability among emergency callers. For example, in thePIDF-LO unless it is ableevent of a prank call, information relating toverify thattheidentifier is correct and inclusionowner ofidentity is expressly permitted by a Rule Maker. Therefore, PIDF parameters that contain identity are either omitted or contain unlinked pseudonyms [RFC3693]. A unique,the unlinkedpresentity URI SHOULDpseudonym could begenerated by the LIS forprovided to investigators, enabling them to unravel themandatory presence "entity" attributechain of events that lead to thePIDF document. Optional parameters such as the "contact" element andattack. However, while auditability is an important deterrent, it is likely to be of most benefit in situations where attacks on the"deviceID" element [RFC4479]emergency services system arenot used. Givenlikely to be relatively infrequent, since therestrictionsresources required to pursue an investigation are likely to be considerable. However, although real-time validation based oninclusionPIDF- LO elements is challenging, where LIS audit logs are available (such as where a law enforcement agency can present a subpoena), linking ofidentification information withina pseudonym to thePIDF-LO,device obtaining location can be accomplished in a post-mortem. Where attacks are frequent and continuous, automated mechanisms are required. For example, itmay notmight bepossible forvaluable to develop mechanisms to exchange audit trails information in arecipientstandardized format between ISPs and PSAPs / VSPs and PSAPs or heuristics toverifydistinguish potentially fraudulent emergency calls from real emergencies. 5. Security Considerations IP-based emergency services face a number of security threats that do not exist within theentitylegacy system. In order to limit prank calls, legacy emergency services rely onwhose behalf location was determined representsthesame entity conveying locationability to identify callers, as well as on therecipient. Where "Enhancementsdifficulty of location spoofing forAuthenticated Identity Management in the Session Initiation Protocol (SIP)" [RFC4474] is used, itnormal users. The ability to ascertain identity ispossible forimportant, since therecipientthreat of punishment reduces prank calls; as an example, calls from pay phones are subject toverifygreater scrutiny by theidentity assertioncall taker. Mechanically placing a large number of emergency calls that appear to come from different locations is difficult in a legacy environment. Also, in theFrom: header. However, if PIDF parameters that contain identity are omitted or contain an unlinked pseudonym, thencurrent system, itmay notwould bepossiblevery difficult forthe recipient to verify whether the conveyed location actually relatesan attacker from country 'Foo' to attack theentity identifiedemergency services infrastructure located inthe From: header. This lackcountry 'Bar'. However, within an IP-based emergency services a number ofbinding between the entity obtainingthese attacks become much easier to mount. Emergency services have three finite resources subject to denial of service attacks: thePIDF-LOnetwork and server infrastructure, call takers and dispatchers, and theentity conveyingfirst responders, such as fire fighters and police officers. Protecting thePIDF-LOnetwork infrastructure is similar tothe recipient enables cut and paste attacks which would enable an attackerprotecting other high-value service providers, except that location information may be used toassertfilter call setup requests, to weed out requests that are out of area. PSAPs even for large cities may only have abogus location,handful of PSAP call takers on duty, so evenwhere bothif they can, by questioning theSIP message and PIDF-LO are signed. Ascaller, eliminate aresult, even implementationlot ofboth [RFC4474] and location signing does not guarantee that location can be tied toprank calls, they are quickly overwhelmed by even aspecific endpoint. 6. Security Considerations IP-basedsmall-scale attack. Finally, first responder resources are scarce, particularly during mass-casualty events. Attackers may want to modify, prevent or delay emergencyservices face many security threats. "Security Threats and Requirements for Emergency Call Marking and Mapping" [RFC5069] describes attacks oncalls. In some cases, this will lead the PSAP to dispatch emergencyservices system, such as attemptingpersonnel todeny system servicesan emergency that does not exist and, hence, the personnel might not be available toall users in a given area,other callers. It might also be possible for an attacker togain fraudulent useimpede the users from reaching an appropriate PSAP by modifying the location ofservices and to divertan end host or the information returned from the mapping protocol. In some countries, regulators may not require the authenticated identity of the emergency caller, as is true for PSTN-based emergency callsto non-placed from pay phones or SIM- less cell phones today. Furthermore, if identities can easily be crafted (as it is the case with many VoIP offerings today), then the value of emergencysites. [RFC5069] also describes attacks against individuals, including attempts to preventcaller authentication itself might be limited. As a consequence, an attacker can forge emergency call information without the chance of being held accountable for its own actions. The above-mentioned attacks are mostly targeting individualfrom receiving aid,emergency callers orto gain information about an emergency. "Threat Analysisa very small fraction of them. If attacks are, however, launched against theGeopriv Protocol" [RFC3694] describes threatsmapping architecture (see [RFC5582] or againstgeographic location privacy, including protocol threats, threats resulting fromthestorageemergency services IP network (including PSAPs), a larger region and a large number ofgeographic location data,potential emergency callers are affected. The call takers themselves are a particularly scarce resource andthreats posedif human interaction bythe abuse of information.these call takers is required then this can very quickly have severe consequences. Although it is important to ensure that location information cannot be faked there will be many GPS-enabled devices that will find it difficult to utilize any of thesecurity mechanismssolutions described in Section5.3. It is also unlikely that users will be willing to upload their location information for "verification" to a nearby location server located in the access network.While auditability is an important deterrent, it is likely to be of most benefit in situations where attacks on the emergency services system are likely to be relatively infrequent, since the resources required to pursue an investigation are likely to be considerable. Where attacks are frequent and continuous, automated mechanisms are required. For example, mechanisms to exchange audit trails information in a standardized format between ISPs and PSAPs / VSPs and PSAPs or heuristics to distinguish potentially fraudulent emergency calls from real emergencies might be valuable. 7.6. IANA Considerations This document does not require actions by IANA.8. Acknowledgments We would like to thank the members of the IETF ECRIT and the IETF GEOPRIV working group for their input to the discussions related to this topic. We would also like to thank Andrew Newton, Murugaraj Shanmugam, Richard Barnes and Matt Lepinski for their feedback to previous versions of this document. Martin Thomson provided valuable input to version -02 of this document. 9.7. References9.1.7.1. Informative References [DHCP-URI-OPT] Polk, J., "Dynamic Host Configuration Protocol (DHCP) IPv4 and IPv6 Option for a Location Uniform Resource Identifier (URI)", Internet draft (work in progress), draft-ietf-geopriv-dhcp- lbyr-uri-option-19, February 2013. [EENA] EENA, "False Emergency Calls", EENA Operations Document, Version 1.0, March 2011, http://www.eena.org/ressource/static/files/ 2011_03_15_3.1.2.fc_v1.0.pdf [GPSCounter] Warner, J. S. and R. G. Johnston, "GPS Spoofing Countermeasures", Los Alamos research paper LAUR-03-6163, December 2003.[I-D.thomson-geopriv-location-dependability] Thomson, M. and J. Winterbottom, "Digital Signature Methods for Location Dependability", draft-thomson-geopriv-location- dependability-07 (work in progress), March 2011. [I-D.ietf-geopriv-deref-protocol] Winterbottom, J., Tschofenig, H., Schulzrinne, H. and M. Thomson, "A Location Dereferencing Protocol Using HELD", draft-ietf-geopriv-deref-protocol-07 (work in progress), July 2012. [IEEE-802.11y] Information technology - Telecommunications and information exchange between systems - Local and metropolitan area networks - Specific requirements - Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications Amendment 3: 3650-3700 MHz Operation in USA, November 2008. [LLDP-MED] "Telecommunications: IP Telephony Infrastructure: Link Layer Discovery Protocol for Media Endpoint Devices, ANSI/ TIA-1057-2006", April 2006.[NENA-i2] "08-001 NENA Interim VoIP Architecture for Enhanced 9-1-1 Services (i2)", December 2005. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997.[RFC3411] Harrington, D., Presuhn, R., and B. Wijnen, "An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks", STD 62,[RFC2818] Rescorla, E., "HTTP over TLS", RFC3411, December 2002.2818, May 2000. [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. Polk, "Geopriv Requirements", RFC 3693, February 2004. [RFC3694] Danley, M., Mulligan, D., Morris, J. and J. Peterson, "Threat Analysis of the Geopriv Protocol", RFC 3694, February 2004. [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. Levkowetz, "Extensible Authentication Protocol (EAP)", RFC 3748, June 2004.[RFC3927] Cheshire, S., Aboba, B., and E. Guttman, "Dynamic Configuration of IPv4 Link-Local Addresses", RFC 3927, May 2005. [RFC4188] Norseth, K. and E. Bell, "Definitions of Managed Objects for Bridges", RFC 4188, September 2005. [RFC4293] Routhier, S., "Management Information Base for the Internet Protocol (IP)", RFC 4293, April 2006.[RFC4474] Peterson, J. and C. Jennings, "Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)", RFC 4474, August 2006. [RFC4479] Rosenberg, J., "A Data Model for Presence", RFC 4479, July 2006. [RFC4740] Garcia-Martin, M., Belinchon, M., Pallares-Lopez, M., Canales- Valenzuela, C., and K. Tammi, "Diameter Session Initiation Protocol (SIP) Application", RFC 4740, November 2006.[RFC4776] Schulzrinne, H., "Dynamic Host Configuration Protocol (DHCPv4 and DHCPv6) Option for Civic Addresses Configuration Information", RFC 4776, November 2006. [RFC4862] Thomson, S., Narten, T., and T. Jinmei, "IPv6 Stateless Address Autoconfiguration", RFC 4862, September 2007. [RFC5012] Schulzrinne, H. and R. Marshall, "Requirements for Emergency Context Resolution with Internet Technologies", RFC 5012, January 2008.[RFC5069] Taylor, T., Tschofenig, H., Schulzrinne, H. and M. Shanmugam, "Security Threats and Requirements for Emergency Call Marking and Mapping", RFC 5069, January 2008. [RFC5246] Dierks, T. and E. Rescorla, "The Transport Level Security (TLS) Protocol Version 1.2", RFC 5246, August 2008. [RFC5491] Winterbottom, J., Thomson, M. and H. Tschofenig, "GEOPRIV Presence Information Data Format Location Object (PIDF-LO) Usage Clarification, Considerations, and Recommendations", RFC 5491, March 2009. [RFC5582] Schulzrinne, H., "Location-to-URL Mapping Architecture and Framework", RFC 5582, September 2009. [RFC5751] Ramsdell, B. and S. Turner, "Secure/Multipurpose Internet Mail Extensions (S/MIME) Version 3.2 Message Specification", RFC 5751, January 2010. [RFC5808] Marshall, R., "Requirements for a Location-by-Reference Mechanism", RFC 5808, May 2010. [RFC5985] Barnes, M., "HTTP Enabled Location Delivery (HELD)", RFC 5985, September 2010.[RFC6225] Polk, J., Linsner, M., Thomson, M. and B. Aboba, "Dynamic Host Configuration Protocol Options[RFC6280] Barnes, R., et. al, "An Architecture forCoordinate-basedLocationConfiguration Information",and Location Privacy in Internet Applications", RFC6225,6280, July 2011. [RFC6442] Polk, J., Rosen, B. and J. Peterson, "Location Conveyance for the Session Initiation Protocol", RFC 6442, December 2011. [RFC6444] Schulzrinne, H., Liess, L., Tschofenig, H., Stark, B., and A. Kuett, "Location Hiding: Problem Statement and Requirements", RFC 6444, January 2012. [RFC6753] Winterbottom, J., Tschofenig. H., Schulzrinne, H. and M. Thomson, "A Location Dereference Protocol Using HTTP-Enabled Location Delivery (HELD)", RFC 6753, October 2012. [SA] "Saudi Arabia - Illegal sale of SIMs blamed for surge in prank calls", Arab News, May 4, 2010, http://www.menafn.com/qn_news_story_s.asp?StoryId=1093319384 [Swatting] "Don't Make the Call: The New Phenomenon of 'Swatting', Federal Bureau of Investigation, February 4, 2008, http://www.fbi.gov/news/stories/2008/february/swatting020408 [TASMANIA] "Emergency services seek SIM-less calls block", ABC News Online, August 18, 2006, http://www.abc.net.au/news/newsitems/200608/s1717956.htm [UK] "Rapper makes thousands of prank 999 emergency calls to UK police", Digital Journal, June 24, 2010, http://www.digitaljournal.com/article/293796?tp=1 Acknowledgments We would like to thank the members of the IETF ECRIT working group, including Marc Linsner, Henning Schulzrinne and Brian Rosen, for their input at IETF 85 that helped get this documented pointed in the right direction. We would also like to thank members of the IETF GEOPRIV WG, including Andrew Newton, Murugaraj Shanmugam, Martin Thomson, Richard Barnes and Matt Lepinski for their feedback to previous versions of this document. Authors' Addresses Hannes Tschofenig Nokia Siemens Networks Linnoitustie 6 Espoo 02600 Finland Phone: +358 (50) 4871445 Email: Hannes.Tschofenig@gmx.net URI: http://www.tschofenig.priv.at Henning Schulzrinne Columbia University Department of Computer Science 450 Computer Science Building, New York, NY 10027 US Phone: +1 212 939 7004 Email: hgs@cs.columbia.edu URI: http://www.cs.columbia.edu Bernard Aboba Microsoft Corporation One Microsoft Way Redmond, WA 98052 US Email: bernard_aboba@hotmail.com