| < draft-ietf-ecrit-trustworthy-location-01.txt | draft-ietf-ecrit-trustworthy-location-02.txt > | |||
|---|---|---|---|---|
| ECRIT Working Group H. Tschofenig | ECRIT Working Group H. Tschofenig | |||
| INTERNET-DRAFT Nokia Siemens Networks | INTERNET-DRAFT Nokia Siemens Networks | |||
| Category: Informational H. Schulzrinne | Category: Informational H. Schulzrinne | |||
| Expires: April 25, 2011 Columbia University | Expires: November 25, 2011 Columbia University | |||
| B. Aboba | B. Aboba (ed.) | |||
| Microsoft Corporation | Microsoft Corporation | |||
| 24 October 2010 | 24 May 2011 | |||
| Trustworthy Location Information | Trustworthy Location Information | |||
| draft-ietf-ecrit-trustworthy-location-01.txt | draft-ietf-ecrit-trustworthy-location-02.txt | |||
| Abstract | Abstract | |||
| For some location-based applications, such as emergency calling or | For some location-based applications, such as emergency calling or | |||
| roadside assistance, it is important to be able to determine whether | roadside assistance, it is important to be able to determine whether | |||
| location information is trustworthy. | location information is trustworthy. | |||
| This document outlines potential threats to trustworthy location and | This document outlines potential threats to trustworthy location and | |||
| analyzes the operational issues with potential solutions. | analyzes the operational issues with potential solutions. | |||
| skipping to change at page 1, line 38 ¶ | skipping to change at page 1, line 38 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on April 25, 2011. | This Internet-Draft will expire on November 25, 2011. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2010 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| carefully, as they describe your rights and restrictions with respect | carefully, as they describe your rights and restrictions with respect | |||
| to this document. Code Components extracted from this document must | to this document. Code Components extracted from this document must | |||
| include Simplified BSD License text as described in Section 4.e of | include Simplified BSD License text as described in Section 4.e of | |||
| the Trust Legal Provisions and are provided without warranty as | the Trust Legal Provisions and are provided without warranty as | |||
| skipping to change at page 3, line 52 ¶ | skipping to change at page 3, line 52 ¶ | |||
| calls can rise dramatically. For example, where emergency calls have | calls can rise dramatically. For example, where emergency calls have | |||
| been allowed from handsets lacking a SIM card, or where ownership of | been allowed from handsets lacking a SIM card, or where ownership of | |||
| the SIM card cannot be determined, the frequency of nuisance calls | the SIM card cannot be determined, the frequency of nuisance calls | |||
| has often been unacceptably high [TASMANIA][UK][SA]. | has often been unacceptably high [TASMANIA][UK][SA]. | |||
| In emergency services deployments utilizing voice over IP, many of | In emergency services deployments utilizing voice over IP, many of | |||
| the assumptions of the public switched telephone network (PSTN) and | the assumptions of the public switched telephone network (PSTN) and | |||
| public land mobile network (PLMN) no longer hold. While the local | public land mobile network (PLMN) no longer hold. While the local | |||
| telephone company provides both physical access and the phone | telephone company provides both physical access and the phone | |||
| service, with VoIP there is a split between the role of the Access | service, with VoIP there is a split between the role of the Access | |||
| Infrastructure Provider (AIP), the Application (Voice) Service | Infrastructure Provider (AIP), and the Application (Voice) Service | |||
| Provider (VSP), and possibly a Location Service Provider (LSP). The | Provider (VSP). The VSP may be located far away from the AIP and may | |||
| VSP may be located far away from the AIP and may either have no | either have no business relationship with the AIP or may be a | |||
| business relationship with the AIP or may be a competitor. It is | competitor. It is also likely that the VSP will have no relationship | |||
| also likely that the VSP will have no relationship with the PSAP. | with the PSAP. | |||
| The LSP may have no relationship with the AIP, the VSP, or the PSAP, | ||||
| Standardization organizations have developed mechanisms to make civic | In some situations it is possible for the end host to determine its | |||
| and geodetic location available to the end host, including LLDP-MED | own location using technology such as the Global Positioning System | |||
| [LLDP-MED], DHCP extensions [RFC4776][RFC3825], HELD [RFC5985], or | (GPS). Where the end host cannot determine location on its own, | |||
| mechanisms have been standardized to make civic and geodetic location | ||||
| available to the end host, including LLDP-MED [LLDP-MED], DHCP | ||||
| extensions [RFC4776][I-D.ietf-geopriv-rfc3825bis], HELD [RFC5985], or | ||||
| link-layer specifications such as [IEEE-802.11y]. The server | link-layer specifications such as [IEEE-802.11y]. The server | |||
| offering this information is usually called a Location Information | offering this information is known as a Location Information Server | |||
| Server (LIS). This LIS may be deployed by an AIP, or it may be run | (LIS). The LIS may be deployed by an AIP, or it may be run by a | |||
| by a third party LSP, which may have no relatinoship with the AIP, | Location Service Provider (LSP) which may have no relationship with | |||
| the VSP or the PSAP. More common with high-quality cellular devices | the AIP, the VSP or the PSAP. The location information is then | |||
| is the ability for the end host itself to determine its own location | provided, by reference or value, to the service-providing entities, | |||
| using GPS. The location information is then provided, by reference | i.e. location recipients, via application protocols, such as HTTP, | |||
| or value, to the service-providing entities, i.e. location | SIP or XMPP. | |||
| recipients, via application protocols, such as HTTP, SIP or XMPP. | ||||
| This document investigates security threats in Section 3, and | This document investigates security threats in Section 3, and | |||
| outlines potential solutions in Section 4. Operational | outlines potential solutions in Section 4. Operational | |||
| considerations are provided in Section 5 and conclusions are | considerations are provided in Section 5 and security considerations | |||
| discussed in Section 6. | are discussed in Section 6. | |||
| 2. Terminology | 2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| This document uses terms from [RFC5012] Section 3. | This document uses terms from [RFC5012] Section 3. | |||
| 3. Threats | 3. Threats | |||
| skipping to change at page 7, line 36 ¶ | skipping to change at page 7, line 36 ¶ | |||
| each other's location. | each other's location. | |||
| 3.2. Identity Spoofing | 3.2. Identity Spoofing | |||
| With calls originating on an IP network, at least two forms of | With calls originating on an IP network, at least two forms of | |||
| identity are relevant, with the distinction created by the split | identity are relevant, with the distinction created by the split | |||
| between the AIP and the VSP: | between the AIP and the VSP: | |||
| (a) network access identity such as might be determined via | (a) network access identity such as might be determined via | |||
| authentication (e.g., using the Extensible Authentication Protocol | authentication (e.g., using the Extensible Authentication Protocol | |||
| (EAP) [RFC3748]; | (EAP) [RFC3748]); | |||
| (b) caller identity, such as might be determined from authentication | (b) caller identity, such as might be determined from authentication | |||
| of the emergency caller at the VoIP application layer. | of the emergency caller at the VoIP application layer. | |||
| If the adversary did not authenticate itself to the VSP, then | If the adversary did not authenticate itself to the VSP, then | |||
| accountability may depend on verification of the network access | accountability may depend on verification of the network access | |||
| identity. However, this also may not have been authenticated, such | identity. However, this also may not have been authenticated, such | |||
| as in the case where an open IEEE 802.11 Access Point is used to | as in the case where an open IEEE 802.11 Access Point is used to | |||
| initiate a nuisance emergency call. Although endpoint information | initiate a nuisance emergency call. Although endpoint information | |||
| such as the IP or MAC address may have been logged, tying this back | such as the IP or MAC address may have been logged, tying this back | |||
| skipping to change at page 8, line 27 ¶ | skipping to change at page 8, line 27 ¶ | |||
| 4.1. Location Signing | 4.1. Location Signing | |||
| One way to avoid location spoofing is to let a trusted location | One way to avoid location spoofing is to let a trusted location | |||
| server sign the location information before it is sent to the end | server sign the location information before it is sent to the end | |||
| host, i.e., the entity subject to the location determination process. | host, i.e., the entity subject to the location determination process. | |||
| The signed location information is then verified by the location | The signed location information is then verified by the location | |||
| recipient and not by the target. Figure 1 shows the communication | recipient and not by the target. Figure 1 shows the communication | |||
| model with the target requesting signed location in step (a), the | model with the target requesting signed location in step (a), the | |||
| location server returns it in step (b) and it is then conveyed to the | location server returns it in step (b) and it is then conveyed to the | |||
| location recipient in step (c) who verifies it. For SIP, the | location recipient in step (c) who verifies it. For SIP, the | |||
| procedures described in [I-D.ietf-sip-location-conveyance] are | procedures described in [I-D.ietf-sipcore-location-conveyance] are | |||
| applicable for location conveyance. | applicable for location conveyance. | |||
| +-----------+ +-----------+ | +-----------+ +-----------+ | |||
| | | | Location | | | | | Location | | |||
| | LIS | | Recipient | | | LIS | | Recipient | | |||
| | | | | | | | | | | |||
| +-+-------+-+ +----+------+ | +-+-------+-+ +----+------+ | |||
| ^ | --^ | ^ | --^ | |||
| | | -- | | | -- | |||
| Geopriv |Req. | -- | Geopriv |Req. | -- | |||
| skipping to change at page 15, line 34 ¶ | skipping to change at page 15, line 34 ¶ | |||
| In particular, the question arises as to the requirements for LIS | In particular, the question arises as to the requirements for LIS | |||
| certificate issuance, and whether they are significantly different | certificate issuance, and whether they are significantly different | |||
| from say, requirements for issuance of an SSL/TLS web certificate. | from say, requirements for issuance of an SSL/TLS web certificate. | |||
| 5.1.3. Location by Reference | 5.1.3. Location by Reference | |||
| Where location by reference is provided, the recipient needs to | Where location by reference is provided, the recipient needs to | |||
| deference the LbyR in order to obtain location. With the | deference the LbyR in order to obtain location. With the | |||
| introduction of location by reference concept two authorization | introduction of location by reference concept two authorization | |||
| models were developed, see [I-D.winterbottom-geopriv-deref-protocol], | models were developed, see [I-D.ietf-geopriv-deref-protocol], namely | |||
| namely the "Authorization by Possession" and "Authorization via | the "Authorization by Possession" and "Authorization via Access | |||
| Access Control Lists" model. With the "Authorization by Possession" | Control Lists" model. With the "Authorization by Possession" model | |||
| model everyone in possession of the reference is able to obtain the | everyone in possession of the reference is able to obtain the | |||
| corresponding location information. This might, however, be | corresponding location information. This might, however, be | |||
| incompatible with other requirements typically imposed by AIPs, such | incompatible with other requirements typically imposed by AIPs, such | |||
| as location hiding (see [I-D.ietf-ecrit-location-hiding-req]). As | as location hiding (see [I-D.ietf-ecrit-location-hiding-req]). As | |||
| such, the "Authorization via Access Control Lists" model is likely to | such, the "Authorization via Access Control Lists" model is likely to | |||
| be the preferred model for many AIPs and subject for discussion in | be the preferred model for many AIPs and subject for discussion in | |||
| the subsequent paragraphs. | the subsequent paragraphs. | |||
| Just as with PIDF-LO signing, the operational considerations in | Just as with PIDF-LO signing, the operational considerations in | |||
| managing credentials for use in LbyR dereferencing can be | managing credentials for use in LbyR dereferencing can be | |||
| considerable without the introduction of some kind of hierarchy. It | considerable without the introduction of some kind of hierarchy. It | |||
| skipping to change at page 18, line 48 ¶ | skipping to change at page 18, line 48 ¶ | |||
| 9. References | 9. References | |||
| 9.1. Informative References | 9.1. Informative References | |||
| [GPSCounter] | [GPSCounter] | |||
| Warner, J. S. and R. G. Johnston, "GPS Spoofing | Warner, J. S. and R. G. Johnston, "GPS Spoofing | |||
| Countermeasures", Los Alamos research paper LAUR-03-6163, | Countermeasures", Los Alamos research paper LAUR-03-6163, | |||
| December 2003. | December 2003. | |||
| [I-D.ietf-geopriv-rfc3825bis] | ||||
| Polk, J., Linsner, M., Thomson, M. and B. Aboba, "Dynamic Host | ||||
| Configuration Protocol Options for Coordinate-based Location | ||||
| Configuration Information", draft-ietf-geopriv- | ||||
| rfc3825bis-17.txt (work in progress), February 2011. | ||||
| [I-D.ietf-ecrit-location-hiding-req] | [I-D.ietf-ecrit-location-hiding-req] | |||
| Schulzrinne, H., Liess, L., Tschofenig, H., Stark, B., and A. | Schulzrinne, H., Liess, L., Tschofenig, H., Stark, B., and A. | |||
| Kuett, "Location Hiding: Problem Statement and Requirements", | Kuett, "Location Hiding: Problem Statement and Requirements", | |||
| draft-ietf-ecrit-location-hiding-req-04 (work in progress), | draft-ietf-ecrit-location-hiding-req-04 (work in progress), | |||
| February 2010. | February 2010. | |||
| [I-D.ietf-sip-location-conveyance] | [I-D.ietf-sipcore-location-conveyance] | |||
| Polk, J. and B. Rosen, "Location Conveyance for the Session | Polk, J. and B. Rosen, "Location Conveyance for the Session | |||
| Initiation Protocol", draft-ietf-sip-location-conveyance-13 | Initiation Protocol", draft-ietf-sipcore-location- | |||
| (work in progress), March 2009. | conveyance-08.txt (work in progress), May 2011. | |||
| [I-D.thomson-geopriv-location-dependability] | [I-D.thomson-geopriv-location-dependability] | |||
| Thomson, M. and J. Winterbottom, "Digital Signature Methods | Thomson, M. and J. Winterbottom, "Digital Signature Methods | |||
| for Location Dependability", draft-thomson-geopriv-location- | for Location Dependability", draft-thomson-geopriv-location- | |||
| dependability-06 (work in progress), August 2010. | dependability-07 (work in progress), March 2011. | |||
| [I-D.winterbottom-geopriv-deref-protocol] | [I-D.ietf-geopriv-deref-protocol] | |||
| Winterbottom, J., Tschofenig, H., Schulzrinne, H., Thomson, | Winterbottom, J., Tschofenig, H., Schulzrinne, H., Thomson, | |||
| M., and M. Dawson, "A Location Dereferencing Protocol Using | M., and M. Dawson, "A Location Dereferencing Protocol Using | |||
| HELD", draft-winterbottom-geopriv-deref-protocol-05 (work in | HELD", draft-ietf-geopriv-deref-protocol-02 (work in | |||
| progress), January 2010. | progress), December 2010. | |||
| [IEEE-802.11y] | [IEEE-802.11y] | |||
| Information technology - Telecommunications and information | Information technology - Telecommunications and information | |||
| exchange between systems - Local and metropolitan area | exchange between systems - Local and metropolitan area | |||
| networks - Specific requirements - Part 11: Wireless LAN | networks - Specific requirements - Part 11: Wireless LAN | |||
| Medium Access Control (MAC) and Physical Layer (PHY) | Medium Access Control (MAC) and Physical Layer (PHY) | |||
| specifications Amendment 3: 3650-3700 MHz Operation in USA, | specifications Amendment 3: 3650-3700 MHz Operation in USA, | |||
| November 2008. | November 2008. | |||
| [LLDP-MED] | [LLDP-MED] | |||
| skipping to change at page 20, line 5 ¶ | skipping to change at page 20, line 12 ¶ | |||
| [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. | [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and J. | |||
| Polk, "Geopriv Requirements", RFC 3693, February 2004. | Polk, "Geopriv Requirements", RFC 3693, February 2004. | |||
| [RFC3694] Danley, M., Mulligan, D., Morris, J. and J. Peterson, "Threat | [RFC3694] Danley, M., Mulligan, D., Morris, J. and J. Peterson, "Threat | |||
| Analysis of the Geopriv Protocol", RFC 3694, February 2004. | Analysis of the Geopriv Protocol", RFC 3694, February 2004. | |||
| [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | [RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H. | |||
| Levkowetz, "Extensible Authentication Protocol (EAP)", RFC | Levkowetz, "Extensible Authentication Protocol (EAP)", RFC | |||
| 3748, June 2004. | 3748, June 2004. | |||
| [RFC3825] Polk, J., Schnizlein, J., and M. Linsner, "Dynamic Host | ||||
| Configuration Protocol Option for Coordinate-based Location | ||||
| Configuration Information", RFC 3825, July 2004. | ||||
| [RFC3927] Cheshire, S., Aboba, B., and E. Guttman, "Dynamic | [RFC3927] Cheshire, S., Aboba, B., and E. Guttman, "Dynamic | |||
| Configuration of IPv4 Link-Local Addresses", RFC 3927, May | Configuration of IPv4 Link-Local Addresses", RFC 3927, May | |||
| 2005. | 2005. | |||
| [RFC4188] Norseth, K. and E. Bell, "Definitions of Managed Objects for | [RFC4188] Norseth, K. and E. Bell, "Definitions of Managed Objects for | |||
| Bridges", RFC 4188, September 2005. | Bridges", RFC 4188, September 2005. | |||
| [RFC4293] Routhier, S., "Management Information Base for the Internet | [RFC4293] Routhier, S., "Management Information Base for the Internet | |||
| Protocol (IP)", RFC 4293, April 2006. | Protocol (IP)", RFC 4293, April 2006. | |||
| skipping to change at page 21, line 48 ¶ | skipping to change at page 21, line 51 ¶ | |||
| Phone: +1 212 939 7004 | Phone: +1 212 939 7004 | |||
| Email: hgs@cs.columbia.edu | Email: hgs@cs.columbia.edu | |||
| URI: http://www.cs.columbia.edu | URI: http://www.cs.columbia.edu | |||
| Bernard Aboba | Bernard Aboba | |||
| Microsoft Corporation | Microsoft Corporation | |||
| One Microsoft Way | One Microsoft Way | |||
| Redmond, WA 98052 | Redmond, WA 98052 | |||
| US | US | |||
| Email: bernarda@microsoft.com | Email: bernard_aboba@hotmail.com | |||
| End of changes. 20 change blocks. | ||||
| 42 lines changed or deleted | 45 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||