ECRIT S. Norreys Internet-Draft BT Group Intended status: Informational H. Tschofenig Expires:September 9, 2009January 14, 2010 Nokia Siemens Networks H. Schulzrinne Columbia UniversityMarch 8,July 13, 2009Authority-to-Individuals Communication for Emergency Situations:Requirements, Terminology andArchitecture draft-norreys-ecrit-authority2individuals-requirements-02.txtFramework for Exigent Communications draft-norreys-ecrit-authority2individuals-requirements-03.txt Status of this Memo This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79. Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet- Drafts. Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as "work in progress." The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt. The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html. This Internet-Draft will expire onSeptember 9, 2009.January 14, 2010. Copyright Notice Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document. AbstractPublic safetyVarious agencies need to provide information to thegeneralrestricted group of persons or even to the generic publicbefore andbefore, duringlarge-scale emergencies.and after emergency situations. While many aspects of such systems are specific to national or local jurisdictions, emergencies span such boundaries and notifications need to reach visitors from other jurisdictions. This document summarizes requirements for protocols toalert individuals within a defined geographic area.allow alerts to be conveyed to IP-based end points. Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1.1. Classical Early Warning Situations . . . . . . . . . . . . 3 1.2. Exigent Communications . . . . . . . . . . . . . . . . . . 3 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 3.ArchitecturesResponsible Actor Roles . . . . . . . . . . . . . . . . . . . 5 3.1. User Actors . . . . . . . . . . . . .5 3.1. Closed Warning Notification Provider and Aggregator Groups. . . . . . . . . . 5 3.1.1. Author . . . . . . . . . . . . . . . . . . . . . . . . 53.2. Open Communication between Warning Notification Provider and Aggregator3.1.2. Recipient . . . . . . . . . . . . . . . . . . . . . . 63.3. Open Communication towards Warning Notification Customers3.1.3. Return Handler . . . . . . . . . . . . . . . . . . . . 6 3.1.4. Mediator . . . . . . . . . . . . . . . . . . . . . . . 6 3.2. Message Handling Service (MHS) Actors . . . . . . . . . . 7 3.2.1. Originator . . . . . . . . . . . . . . . . . . . . . . 83.4. Notification Population3.2.2. Relay . . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.3. Gateway . . . . . . . . . . . . . . . . . . . . . . . 9 3.2.4. Receiver . . . . . . . . . . . . . . . . . . . . . . . 9 3.3. Administrative Actors . . . . . . . . . . . . . . . . . . 10 4. Requirements . . . . . . . . . . . . . . . . . . . . . . . . .910 4.1. Communication Model Independent Requirements . . . . . . . 11 4.2. Requirements for a Subscription Model . . . . . . . . . . 11 4.3. Requirements for a Push Communication Model . . . . . . . 12 5. IANA Considerations . . . . . . . . . . . . . . . . . . . . .1113 6. Security considerations . . . . . . . . . . . . . . . . . . .1113 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . .1113 8. References . . . . . . . . . . . . . . . . . . . . . . . . . .1113 8.1. Normative References . . . . . . . . . . . . . . . . . . .1113 8.2. Informative References . . . . . . . . . . . . . . . . . .1113 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . .1213 1. Introduction 1.1. Classical Early Warning Situations During large-scale emergencies, public safety authorities need to reliably communicate with citizens in the affected areas, to provide warnings, indicate whether citizens should evacuate and how, and to dispel misinformation. Accurate information can reduce the impact of such emergencies. Traditionally, emergency alerting has used church bells, sirens, loudspeakers, radio and television to warn citizens and to provide information. However,techniquestechniques, such as sirens andbellsbells, provide limited information content; loud speakers cover only very small areas and are often hard to understand, even for those not hearing impaired or fluent in the local language. Radio and television offer larger information volume, but are hard to target geographically and do not work well to address the "walking wounded" or other pedestrians. Both are not suitable for warnings, as many of those needing the information will not be listening or watching at any given time, particularly during work/school and sleep hours. This problem hasrecentlybeen illustrated by the London underground bombing on July 7, 2006, as described in a government report[ref].[July2005]. The UK authorities could only use broadcast media and could not, for example, easily announce to the "walking wounded" where to assemble.This1.2. Exigent Communications With the usage of the term 'Exigent Communications' this documentsummarizes key requirements for IP-based protocolsaims toenhancegeneralize the concept of conveying alerts to IP-based systems andcomplement existing authority-to-citizen warning systems. These protocols may either directly reachat thecitizen or may be usedsame time totrigger more traditional alerts, such as, among many others, displaysre-define the actors that participate insubway stations, electronic bill boards, or SMS. Public safety authorities need to reach, with an appropriate message, as many affected people as possible withinthearea impacted bymessaging communication. More precisely, exigent communications is defined as: Communication that requirs immediate action or remedy. Information about theemergency, including not just residents, but also workersreason for action andtravelers who may onlydetails about the steps that have to be taken are provided in thearea temporarily.alert message. An alert message (or warning message) is a cautionary advice about something imminent (especially imminent danger or other unpleasantness). Inaddition, people aroundtheimmediately affected area should be able to receive information and differentiated instructions,context of exigent communication suchas warningsan alert message refers toavoid travela future, ongoing orto clear roads. Emergency alertspast event as the signaling exchange itself may relate to different stages of the lifecycle of the event. The alert message itself, and not the signaling protocol, provides sufficient context about the specific state of the lifecycle the alert message refers to. For that purpose, the terminology utilized by the EMail architecture, see [I-D.crocker-email-arch], is applied to this context. Three types of communication models can beissued once for an emergency or authoritiesenvisioned: 1. Alerts mayrepeat or update information during an event. Some messages arebe addressed to all individuals within a certain geographic area.Other messages may target only specific individuals or groupsToday, this is often realized with the help ofindividuals, such as medical personnel or those particularly susceptiblededicated functionality provided by link layer technology (e.g., multicast, broadcast). 2. Alerts need toan incident. Machine-parseablebe delivered to dedicated end points via unicast messaging. Examples are displays in subway stations, or electronic bill boards. Some of these alerts may also be used to trigger automated behaviors, such as closing vents during a chemical spill or activating sirens or other warning systems in commercial buildings.At least initially, mobile and stationary devicesOther messages maynot have the appropriate capabilities to receivetarget only specific groups of individuals, suchwarnings. Thus, protocolsas medical personnel. These may include cases where legacy end points need to bedesigned to allow gatewaying to traditional systems, e.g., the PSTN. We assumeintegrated into the overall architecture and some form of protocol translation is necessary. The communication end point from anevent notification model, i.e., individuals subscribe to warnings that affect their current location. AsIP point of view is therefore a single gateway (or amobile device moves,small number of them). 3. The two models described above illustrate a push communication whereas the third model represents a subscriptionmay needmodel where an opt-in model is used tobe updated. Thus, locationprovide further informationneeds to be available duringabout thesubscription process. Userstype of alerts that the recipient is interested in. The information that maywant to subscribelead towarningsan alert message being distributed may depend on certain factors, including certain types of events happening in a specific geographic region irrespectively of whether the entity issuing the subscription is actually located in thatdo not affect their current location.geographic region. For example, parents may want to be alerted of emergencies affecting the school attended by their children and adult children may need to know about emergencies affecting elderly parents.Some technologies may also support network-level broadcast or multicast.This document focuses on all three types of communication models whereby a stronger emphasis is given to the subscription model since it is very powerful but less widely deployed on the Internet for exigent communication. Content-wise this document provides terminology, requirements and the architecture for IP-based protocols to enhance and complement existing authority-to-citizen warning systems. 2. Terminology The keywords "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in [RFC2119], with the important qualification that, unless otherwise stated, these terms apply to the design of a protocol conveyingemergency alerts and earlywarning messages, not its implementation or application. This document reuses the terminologyintroduced by [3GPP-TR-22.968]from [I-D.crocker-email-arch]. For editorial andmodifies it to fit to IETF terminology: Notification Population:consistency reasons parts of the text are repeated in this document and modified as appropriate. 3. Responsible Actor Roles Theterm notification population refers tocommunication system used for thesetdissemination of alert messages builds on top of existing communication infrastructure. These distributed services consist ofwarning notification consumers that receiveawarning notification. Public Warning System: A public warning system delivers warning notificationsvariety of actors playing different roles. These actors fall into three basic categories: o User o Message Handling Service (MHS) o ADministrative Management Domain (ADMD) 3.1. User Actors Users are the sources and sinks of alert messages. Users can be people, organizations, or processes. There are four types of Users: o Authors o Recipients o Return Handlers o Mediators From the user perspective, all alert message transfer activities are performed by a monolithic Message Handling Service (MHS), even though the actual service can be provided bywarning notification providersmany independent organizations. Whenever any MHS actor sends information toIP-capable end hosts within notification areas. Warning Notification: Warning notifications inform recipients ofback to an Author or Originator in theoccurrencesequence ofcurrent or pending public safety-related eventshandling a message, that actor is a User. 3.1.1. Author The Author is responsible for creating the alert message, its contents, andadditionallyits intended recipients, even though the exact list of recipients mayprovide users with instructions on whatbe unknown todothe Author at the time of writing the alert message. The MHS transfers the alert message from the Author andwheredelivers it toget help forthedurationRecipients. The MHS has an Originator role that correlates with the Author role. 3.1.2. Recipient The Recipient is a consumer of theemergency. Warning Notification Provider: A warning notification providerdelivered alert message. The MHS has a Receiver role that correlates with the Recipient role. 3.1.3. Return Handler The Return Handler is a special form of Recipient tasked with servicing notifications that the MHS generates, as it transfers or delivers the message. These notices can be about failures or completions (such as utilized by test messages) and are sent to anagencyaddress thatinjects warning notificationsis specified by the Originator. This Return Handling address (also known as a Return address) might have no visible characteristics in common with thecommunication system. Examples of such agencies are branchesaddress ofgovernments, public transport providersthe Author orweather organizations.Originator. 3.1.4. Mediator Aprivate institution, such asMediator receives, aggregates, reformulates, and redistributes alert messages among Authors and Recipients who are the principals in (potentially) protracted exchanges. When submitting auniversity, hospital or enterprise, may also provide such warnings to people located within their facilities. Warning Notification Consumer: A warning notification consumer isreformulated message, thefinal recipientMediator is an Author, albeit an author actually serving as an agent of one or more other authors. So, awarning notification from an IP communication pointMediator really is a full-fledged User. The aspect ofview. Examples are Web browsers and SIP clients on mobile phones and laptopsa Mediator thatprocess warning notification messages. Once received suchdistinguishes it from any other MUA creating awarningmessage isshown tothat a Mediator preserves theuser (a human) via an appropriately designed user interfaceintegrity and tone of the original message, including the essential aspects of its origination information. The Mediator might also add commentary. A Mediator attempts toensure thatpreserve the original Author's information in the message it reformulates but isproperly understood. Warning Notification Aggregator: A warning notification aggregator receives alert notifications from different providers, performs security functions (e.g., authentication, authorization) and may needpermitted to make meaningful changes totransformthe messageintocontent or envelope. The MHS sees adifferent format before forwarding them towards warning notification consumers. 3. Architecturesnew message, but users receive a message that they interpret as being from, or at least initiated by, the Author of the original message. Thefollowing sub-sections illustrate different architectural approaches. 3.1. Closed Warning Notification Providerrole of a Mediator is not limited to merely connecting other participants; the Mediator is responsible for the new message. A Mediator's role is complex andAggregator Groupscontingent, for example, modifying and adding content or regulating which users are allowed to participate and when. Thefirst architectural variant allows the distributioncommon example ofwarning notificationsthis role is an aggregator that accepts alert messages fromwarning notification providersa set of Originators and distributes them towarning notification aggregators. The communicationa potentially large set of Recipients. This functionality islargelysimilar to a multicast, or even a broadcast. Recipients might have also indicated their interest to receive certain type of alerts messages or they might implicitly get entitled to receive specific alerts purely by their presence in apoint- to-point fashionspecific geographical region. Hence, a Mediator might have additional information about the Recipients context and might therefore be able to make a decision whether thenumber of involved playersRecipient israther small,interested in receiving a particular alert message. A Gateway is a particularlyon the sideinteresting form ofthe warning notification providers. Furthermore,Mediator. It is anew warning notification aggregatorhybrid of User and Relay that connects to other communication systems. Its purpose isallowedtoreceiveemulate a Relay. 3.2. Message Handling Service (MHS) Actors The Message Handling Service (MHS) performs a single end-to-end transfer of warningnotifications only after certain verification proceduresmessages on behalf of the Author to reach the Recipient addresses. Exchanges that areconductedeither mediated or iterative andtherebyprotracted, such as those used for communicating information about theentire communication infrastructure re-essembleslifetime of an alert are handled by the User actors, not by the MHS actors. As aclosed group. To ensure thatpragmatic heuristic MHS actors actors generate, modify or look at only transfer data, rather than thecontent ofentire message. Figure 1 shows thewarning notifications is properly understoodrelationships among transfer participants. Although it shows theinvolved parties are very likely to agree onOriginator as distinct from thedetailed semanticsAuthor and Receiver as distinct from Recipient, each pair of roles usually has the same actor. Transfers typically entail one or more Relays. However, direct delivery from the Originator to Receiver is possible. Delivery of warning messagesprior to distributing any alert. Figure 1 shows the involved parties graphically. +----------------------------------------+ | .--------------. | | | Warning | Closed | | | Notification |\ Federation | | Aggregator A | \ | | `--------------' \\within a single administrative boundary usually only involve a single Relay. ++==========++ ++===========++ || Author || || Recipient || ++====++====++ +--------+ ++===========++ || | Return | /\ || +-+------+ || \/ . ^ || +----------+ . . +---++----+ | |\. . | |\\/-+----------+----------------------------+---------+---\ | |\| . . MHS |\\| |\| |Originator+<...........................+Receiver |.--------------. ..............| | |Warning|: Warning :^ | | |Notification |-----: Notification :| +---++-----+ . +---------+ |Aggregator B|: Provider :|| . /\ | |`--------------' `..............'|| ...............+.................. || | |/\/ . . . || | |//+-------+-+ +--+------+ +-+--++---+ | |//| Relay +======-=>| Relay +=======>| Relay |//| |.--------------. //+---------+ +----++---+ +---------+ | | || |Warning|//|| | | \/ |Notification|/+---------+ | |Aggregator C| Gateway +-->... | |`--------------'+---------+ |+----------------------------------------+\-------------------------------------------------------/ Legend: === and || lines indicate primary (possibly indirect) transfers or roles ... lines indicate supporting transfers or roles Figure 1:Closed Warning Notification Provider and Aggregator Groups An example of this system can be seen in national early warning systems where regulatory requirements forceRelationships Among MHS Actors 3.2.1. Originator The Originator ensures that a warningnotification providermessage is valid for transfer andaggregatorsthen submits it towork together. 3.2. Open Communication between Warning Notification Provider and Aggregator This modela Relay. A message issimilarvalid if it conforms to both communication and warning message encapsulation standards and local operational policies. The Originator can simply review theclosed group presented inmessage for conformance and reject it if it finds errors, or it can create some or all of theprevious sectionnecessary information. The Originator operates witha difference indual allegiance. It serves theway how warning notification aggregatorsAuthor and canretrieve warning notifications from warning notification providers. Whenbe theaggregator interacts withsame entity. But its role in assuring validity means that it also represents theprovider then no special client-side authentication procedure is assumed and no access restrictions are enforced. As such,local operator of theaggregator might be located anywhere onMHS, that is, theInternetlocal ADministrative Management Domain (ADMD). The Originator also performs any post-submission, Author-related administrative tasks associated with message transfer and delivery. Notably, these tasks pertain toretrieve the warning notifications. Warning notification aggregators might offer their subscriberssending error and delivery notices, enforcing local policies, and dealing with messages from theabilityAuthor that prove toreceive warnings of a certain type (e.g., weather alerts)be problematic fora specific region (e.g.,the Internet. The Originator is accountable fora specific country or an entire continent). Hence,theaggregator might findmessage content, even when it is not responsible for it. The Author creates therelevant warning notification providers and interactsmessage, but the Originator handles any transmission issues withthem to retrieve alerts. Finally,it. 3.2.2. Relay The Relay performs MHS-level transfer-service routing and store-and- forward, by transmitting or retransmitting theaggregator might use different protocol mechanismsmessage to its Recipients. The Relay may add history / trace information information (e.g.,SMS, Web pages) towards the warning notification customers, often depending onas available with SIP History Info [RFC4244]) or security related protection (e.g., as available with SIP Identity [RFC4474]) but does not modify theclient capabilities. In general,envelope information or thenumbermessage content semantics. A Message Handling System (MHS) network consists ofaggregatorsa set of Relays. This network is above any underlying packet-switching network that might be used and below any Gateways or other Mediators. 3.2.3. Gateway A Gateway isvery likely larger than inaclosed group but there are no significant challenges with respecthybrid of User and Relay that connects heterogeneous communication infrastructures. Its purpose is toscalability or congestionemulate a Relay and the closer it comes toexpect. Figure 2 showsthis, theinvolved parties graphically. o \|/ | .............. / \ : Warning : .--------------. : Notification : | Warning | : Provider X : | Notification |-- `..............' Consumer (1)| -- -- `--------------' --- --- / --- .--------------. --- / -- | Warning | --- / --| Notification |-- / Aggregatorbetter. A| \ / ...... `--------------' \\ / \ // X\ o / \ \|/ / \\ | / \ / \ .--------------. / .............. .--------------. | Warning |/ : Warning : | Warning | ------- | Notification |-----: Notification : | Notification |------ Aggregator B | : Provider Y : Consumer (n)| `--------------' `..............' `--------------' Figure 2: Open CommunicationGateway operates as a User when it needs the ability to modify message content. Differences betweenWarning Notification Provider and Aggregator 3.3. Open Communication towards Warning Notification Customers Inthefollowing architectural variant the customers directly interact with various warning notification providers thatdifferent communication systems can be as small as minor syntax variations, but they usually encompass significant, semantic distinctions. Hence, the Relay function in arelevant forGateway presents aspecific type of alert type. In order to learn aboutsignificant design challenge, if therelevant warning notification providers it may be necessaryresulting performance is toconsult some form of discovery service; this maybedone out-of-band via manual configuration or via a protocol mechanism. Scalability and congestion control concerns arise with this scenarioseen asthis model assumes an opt-in approach from the customer.nearly seamless. Thetotal number of warning notification customers are provider haschallenge is toserve may be considerable. There are a more security challenges since there are no pre-established trust relationshipsensure user-to-user functionality between thewarning notification customerscommunication services, despite differences in their syntax andthe providers. .-----------. | Discovery | | Service | `-----------' ^ / / .............. / : Warning : / / : Notification : / // : Provider X : / // `..............' / // o / // \|/ / / | / // / \ v // .--------------. // .............. | Warning | // : Warning : | Notification |-------------------- : Notification : Consumer (1)|-- : Provider Y : `--------------' -- `..............' --- -- --- -- --- -- : Warning : --: Notification : : Provider Y : `..............' Open Communication towards Warning Notification Customers 3.4. Notification Population What warning notification customers are put into the notification populationsemantics. The basic test of Gateway design is whether animportant architectural aspect that is largely orthongonalAuthor on one side of a Gateway can send a useful warning message to a Recipient on thearchitecture presentedother side, without requiring changes to any components inSection 3.1 and Section 3.2. In an opt-in modelthe Author's or Recipient's communication service other than adding the Gateway. To each of these otherwise independent services, the Gateway appears to be a native participant. 3.2.4. Receiver The Receiver performs final delivery or sends the warningnotification customer needmessage toprovide information about what typean alternate address. In case ofalertswarning messages it isinterested in and, in ordertypically responsible for ensuring that the appropriate user interface interactions are triggered. 3.3. Administrative Actors Administrative actors can be associated with different organizations, each with its own administrative authority. This operational independence, coupled with the need for interaction between groups, provides the motivation to distinguish among ADministrative Management Domains (ADMDs). Each ADMD can have vastly different operating policies and trust-based decision-making. One obvious example is the distinction between warningnotification aggregator ormessages that are exchanged within an closed group (such as alert messages received by parents affecting the school attended by their children) and warningnotification providermessages that exchanged between independent organizations (e.g., in case of large scale disasters). The rules for handling both types of traffic tend to beablequite different. That difference requires defining the boundaries of each, and this requires the ADMD construct. Operation of communication systems that are used todistribute warnings itconvey alert messages are typically carried out by different providers (or operators). Each can be an independent ADMD. The benefit of the ADMD construct isnecessary for themtoknowfacilitate discussion about designs, policies and operations that need to distinguish between internal issues and external ones. Most significant is that thecontext, such asentities communicating across ADMD boundaries typically have thecurrent location, preferred language or device capabilities. This information mayadded burden of enforcing organizational policies concerning external communications. At a more mundane level, routing mail between ADMDs can beprovided byan issue, such as needing to route alert messages between organizational partners over specially trusted paths. The interactions of ADMD components are subject to thecustomer itself or by other entities,policies of that domain, which cover concerns such as these: o Reliability o Access control o Accountability o Content evaluation, adaptation, and modification 4. Requirements Requirements that relate to theaccess provider. Alternatively,encoding and thetopological structurecontent ofnetworksalert messages isused to distribute warning notificationsoutside the scope of this document. This document focuses on protocols being utilized toall hosts thatconvey alert messages only. The requirements for the two main communication models arelocated within a specific IP-subsetwork or hostsdifferent and reflected in separate sub-sections, Section 4.2 and Section 4.3 . There are, however, aspecific link layer broadcast domain. This approach typically requires co-operation from the network provider. 4. Requirements The followingfew generic requirementsare relatedapplicable totheboth communicationprotocol and the context. Req-1:models described in Section 4.1. 4.1. Communication Model Independent Requirements Req-G1: The protocolmechanismssolution MUST allowtargeting notifications to specific individuals, groupsdelivery ofindividuals or specific geographic regions. Different regions or groups may receive different instructions for the same disaster. (For example, people very closemessages simultaneously to achemical spill may be asked to evacuate, while those further away may be asked to close windows.) Req-2:large audience. Req-G2: The protocol solution MUSTprovide real-time message delivery. Req-3:be independent of the underlying link layer technology. Req-G3: The protocol solution MUSTsupportoffer thedeliverytypical communication security mechanisms. Additional security mechanisms applied to the alert message itself are outside the scope ofwarning notifications that allow for predictable or likely events. Req-4the communication protocol and therefore outside the scope of this document. Req-G4: The protocolmechanismssolution MUST allowdelivery of messages simultaneouslytargeting notifications toa large audience. Req-5specific individuals and to groups of individuals. Req-G5: The protocolmechanismssolution MAY provide an option to return a receipt on reading message.However, the confirmation SHOULD NOT be required. Req-6:Req-G6: The protocolmechanismsolution MUSTbe independentensure that congestion handling is provided. 4.2. Requirements for a Subscription Model The requirements for subscription / opt-in model require information about the type of alerts that are being asked for to be made available by theunderlying access network technology. Req-7: Protocol mechanismspotential Recipient to the Originator or set of orginators. Req-S1: The protocol solution MUST allow to tailor the message to the language preferences of thereceiver and/or deliver multiple versions in different languages within the same message, so thatreceiver. Req-S2: The protocol solution MUST allow an indication about therecipient can choosegeographical area themost appropriate one. Req-8: A user SHOULD be able to indicatepotential Recipient is interested in. Req-S3: The protocol solution MUST allow an indication about thepreferred methodtype ofcommunication toalert thepublic warning service, such as notification by email, different instant messaging protocols or automated voice calls. Req-9:potential Recipient is interested in. Req-S4: The protocolconveying warning notifications SHOULD identify the warning notification provider in a secure manner. Req-10: Thesolution MUSTprovide a mechanism for transmitting warning notification test messages. Req-11: A solution MUST support deliveryallow an indication ofnotification messages (e.g., withthe media types that are understood or preferred by the potential Recipient. The support for different mediatypes)types depends to some extend on the content of the warning message but the communication protocol may be impacted as well. This functionality would, for example, be useful for those with special needs, such as hearing and visionimpaired.impaired persons. Req-S5: The protocol solution MUST allow a potential Recipient to discover the responsible Originator or set of Originators for a certain category of warning messages. 4.3. Requirements for a Push Communication Model The topological structure of networks is used to distribute warning notifications to all hosts that are located within a specific IP- subsetwork or multicast group. Req-P1: The protocol solution MUST allow network layer multicast and broadcast mechanisms to be utilized. 5. IANA Considerations This document does not require actions by IANA. 6. Security considerations This document outlines requirements and securitysecurityrequirements are a part of them. 7. Acknowledgments This documentreuses requirements captured outside the IETF, namely ETSI (with [ETSI-TS-102-182]), and the 3GPP (with [3GPP-TR-22.968]). We would like to thank the authors of these specifications for their work. Note, however, that onlyre-uses asmall subsetlot ofthe requirements have been reflected that do not relate to specific deployments, user interface aspects, detailed regulatory requirements, management and operational considerations, and non-IP specific technologies. Wetext from [I-D.crocker-email-arch]. The authors would like to thankLeopold MurhammerDave Crocker for hisreview in July 2007.work. 8. References 8.1. Normative References [I-D.crocker-email-arch] Crocker, D., "Internet Mail Architecture", draft-crocker-email-arch-14 (work in progress), June 2009. [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. 8.2. Informative References[3GPP-TR-22.968][July2005] , .,"3GPP TR 22.968, V1.0.0 (2007-04), 3rd Generation Partnership Project; Technical Specification Group Services and System Aspects; Study for requirements for a Public Warning System (PWS) Service (Release 8)", December"Report of the 7 July Review Committee, ISBN 1 85261 878 7", (PDF document), http://www.london.gov.uk/ assembly/reports/7july/report.pdf, June 2006.[ETSI-TS-102-182] , ., "ETSI TS 102 182, V1.2.1 (2006-12), Technical Specification, Emergency Communications (EMTEL); Requirements for communications from authorities/ organizations[RFC4244] Barnes, M., "An Extension toindividuals, groups orthegeneral public during emergencies", DecemberSession Initiation Protocol (SIP) for Request History Information", RFC 4244, November 2005. [RFC4474] Peterson, J. and C. Jennings, "Enhancements for Authenticated Identity Management in the Session Initiation Protocol (SIP)", RFC 4474, August 2006. Authors' Addresses Steve Norreys BT Group 1 London Road Brentwood, Essex CM14 4QP UK Phone: +44 1277 32 32 20 Email: steve.norreys@bt.com Hannes Tschofenig Nokia Siemens Networks Linnoitustie 6 Espoo 02600 Finland Phone: +358 (50) 4871445 Email: Hannes.Tschofenig@gmx.net URI: http://www.tschofenig.priv.at Henning Schulzrinne Columbia University Department of Computer Science 450 Computer Science Building New York, NY 10027 US Phone: +1 212 939 7004 Email: hgs+ecrit@cs.columbia.edu URI: http://www.cs.columbia.edu