| < draft-ietf-ecrit-unauthenticated-access-02.txt | draft-ietf-ecrit-unauthenticated-access-03.txt > | |||
|---|---|---|---|---|
| ECRIT H. Schulzrinne | ECRIT H. Schulzrinne | |||
| Internet-Draft Columbia University | Internet-Draft Columbia University | |||
| Intended status: Standards Track S. McCann | Intended status: Standards Track S. McCann | |||
| Expires: September 30, 2011 Research in Motion UK Ltd | Expires: January 12, 2012 Research in Motion UK Ltd | |||
| G. Bajko | G. Bajko | |||
| Nokia | Nokia | |||
| H. Tschofenig | H. Tschofenig | |||
| Nokia Siemens Networks | Nokia Siemens Networks | |||
| D. Kroeselberg | D. Kroeselberg | |||
| Siemens | Siemens | |||
| March 29, 2011 | July 11, 2011 | |||
| Extensions to the Emergency Services Architecture for dealing with | Extensions to the Emergency Services Architecture for dealing with | |||
| Unauthenticated and Unauthorized Devices | Unauthenticated and Unauthorized Devices | |||
| draft-ietf-ecrit-unauthenticated-access-02.txt | draft-ietf-ecrit-unauthenticated-access-03.txt | |||
| Abstract | Abstract | |||
| The IETF emergency services architecture assumes that the calling | The IETF emergency services architecture assumes that the calling | |||
| device has acquired rights to use the access network or that no | device has acquired rights to use the access network or that no | |||
| authentication is required for the access network, such as for public | authentication is required for the access network, such as for public | |||
| wireless access points. Subsequent protocol interactions, such as | wireless access points. Subsequent protocol interactions, such as | |||
| obtaining location information, learning the address of the Public | obtaining location information, learning the address of the Public | |||
| Safety Answering Point (PSAP) and the emergency call itself are | Safety Answering Point (PSAP) and the emergency call itself are | |||
| largely decoupled from the underlying network access procedures. | largely decoupled from the underlying network access procedures. | |||
| skipping to change at page 2, line 7 ¶ | skipping to change at page 2, line 7 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on September 30, 2011. | This Internet-Draft will expire on January 12, 2012. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2011 IETF Trust and the persons identified as the | Copyright (c) 2011 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 10, line 7 ¶ | skipping to change at page 10, line 7 ¶ | |||
| `...../ `...../ | `...../ `...../ | |||
| Abbreviations: | Abbreviations: | |||
| LLA: Link Layer Attachment | LLA: Link Layer Attachment | |||
| ES: Emergency Services | ES: Emergency Services | |||
| Figure 1: Flow Diagram | Figure 1: Flow Diagram | |||
| 4. ZBP Considerations | 4. ZBP Considerations | |||
| Although subject to local regulatory mandates, it is expected that | ZBP includes all cases where a subscriber is known to an ASP, but | |||
| for most ASPs even with a lack of authorization for regular service | lacks the necessary authorization to access regular ASP services. | |||
| an otherwise authenticated and known subscriber must be granted | Example ZBP cases include empty prepaid accounts, barred accounts, | |||
| access to emergency services. Naturally, without an obligation to | roaming and mobility restrictions, or any other conditions set by ASP | |||
| support emergency services in ZBP cases an ASP can simply disallow | policy. | |||
| access by such customers. As a result, all such subscribers may fall | ||||
| back into a NASP situation as described above. | ||||
| If ASPs desire or are required by regulation to provide emergency | Local regulation might demand that emergency calls are always | |||
| services to subscribers with valid credentials that only fail | authorized. An ASP can identify emergency sessions by identifying | |||
| authorization, the emergency services nature of a call can easily be | the service URN [RFC5031] used in call setup. Emergency calls can | |||
| determined by inspecting the call setup procedure for the presence of | then be authorized accordingly. The ZBP case therefore only affects | |||
| the emergency service URNs. This example shows that in the context | the ASP. | |||
| of this document no specific considerations apply to the ZBP case due | ||||
| to the fact that the ASP will be able to relate the service request | ||||
| to an existing subscription or user and will be in control of | ||||
| adjusting any authorization decision based on its deployemnt specific | ||||
| policy. It is, however, noted that specific security considerations | ||||
| apply due to the fact that emergency service access will likely be | ||||
| granted with limited authorization only, see Section 7. | ||||
| ZBP cases in the context of this document cover all cases where an | Permitting a call with limited authorization could present an | |||
| otherwise valid subscription lacks authorization to access or regular | opportunity for abuse. The ASP MAY choose to validate session | |||
| ASP services, i.e., a lack of authorization that would block the | initiation messages for valid destinations, see Section 7. | |||
| subscriber from using the service for emergency purpose. Example ZBP | ||||
| cases include empty prepaid accounts, barred accounts, or certain | An ASP without a regulatory requirement to authorize emergency calls | |||
| roaming or mobility restrictions. The exact list of cases where | can deny emergency call setup. Where an ASP does not authorize an | |||
| emergency services need to be supported by the ASP is local to the | emergency call, the caller can fall back to NASP procedures. | |||
| ASP policy and deployment, and is therefore beyond the scope of this | ||||
| document. | ||||
| 5. NASP Considerations | 5. NASP Considerations | |||
| To start the description we consider the sequence of steps that are | To start the description we consider the sequence of steps that are | |||
| executed in an emergency call based on Figure 2. | executed in an emergency call based on Figure 2. | |||
| o As an initial step the devices attaches to the network as shown in | o As an initial step the devices attaches to the network as shown in | |||
| step (1). This step is outside the scope of this section. | step (1). This step is outside the scope of this section. | |||
| o When the link layer network attachment procedure is completed the | o When the link layer network attachment procedure is completed the | |||
| skipping to change at page 14, line 36 ¶ | skipping to change at page 14, line 36 ¶ | |||
| The ISP is responsible for location determination and exposes this | The ISP is responsible for location determination and exposes this | |||
| information to the end points via location configuration protocols. | information to the end points via location configuration protocols. | |||
| The considerations described in [I-D.ietf-ecrit-location-hiding-req] | The considerations described in [I-D.ietf-ecrit-location-hiding-req] | |||
| are applicable to this document. | are applicable to this document. | |||
| The ISP MUST support one of the LCPs described in Section 6.5 of | The ISP MUST support one of the LCPs described in Section 6.5 of | |||
| [I-D.ietf-ecrit-phonebcp]. The description in Section 6.5 and 6.6 of | [I-D.ietf-ecrit-phonebcp]. The description in Section 6.5 and 6.6 of | |||
| [I-D.ietf-ecrit-phonebcp] regarding the interaction between the end | [I-D.ietf-ecrit-phonebcp] regarding the interaction between the end | |||
| device and the LIS applies to this document. | device and the LIS applies to this document. | |||
| The interaction between the LIS at the ISP and the IAB is often | The interaction between the LIS at the ISP and the IAP is often | |||
| priorietary but the description in | priorietary but the description in | |||
| [I-D.winterbottom-geopriv-lis2lis-req] may be relevant to the reader. | [I-D.winterbottom-geopriv-lis2lis-req] may be relevant to the reader. | |||
| 5.3. ESRP Profile | 5.3. ESRP Profile | |||
| 5.3.1. Emergency Call Routing | 5.3.1. Emergency Call Routing | |||
| The ESRP continues to route the emergency call to the PSAP | The ESRP continues to route the emergency call to the PSAP | |||
| responsible for the physical location of the end host. This may | responsible for the physical location of the end host. This may | |||
| require further interactions with LoST servers but depends on the | require further interactions with LoST servers but depends on the | |||
| skipping to change at page 22, line 5 ¶ | skipping to change at page 21, line 15 ¶ | |||
| 8. Acknowledgments | 8. Acknowledgments | |||
| Parts of this document are derived from [I-D.ietf-ecrit-phonebcp]. | Parts of this document are derived from [I-D.ietf-ecrit-phonebcp]. | |||
| Participants of the 2nd and 3rd SDO Emergency Services Workshop | Participants of the 2nd and 3rd SDO Emergency Services Workshop | |||
| provided helpful input. | provided helpful input. | |||
| We would like to thank Richard Barnes, Brian Rosen, James Polk, Marc | We would like to thank Richard Barnes, Brian Rosen, James Polk, Marc | |||
| Linsner, and Martin Thomson for their feedback at the IETF#80 ECRIT | Linsner, and Martin Thomson for their feedback at the IETF#80 ECRIT | |||
| meeting. | meeting. | |||
| Furthermore, we would like to thank Martin Thomson and Bernard Aboba | ||||
| for their detailed document review in preparation of the 81st IETF | ||||
| meeting. | ||||
| 9. IANA Considerations | 9. IANA Considerations | |||
| This document does not require actions by IANA. | This document does not require actions by IANA. | |||
| 10. References | 10. References | |||
| 10.1. Normative References | 10.1. Normative References | |||
| [RFC5031] Schulzrinne, H., "A Uniform Resource Name (URN) for | [RFC5031] Schulzrinne, H., "A Uniform Resource Name (URN) for | |||
| Emergency and Other Well-Known Services", RFC 5031, | Emergency and Other Well-Known Services", RFC 5031, | |||
| End of changes. 9 change blocks. | ||||
| 33 lines changed or deleted | 26 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||