< draft-rosen-sipping-cap-02.txt   draft-rosen-sipping-cap-03.txt >
SIPPING B. Rosen SIPPING B. Rosen
Internet-Draft NeuStar, Inc. Internet-Draft NeuStar, Inc.
Intended status: Standards Track H. Schulzrinne Intended status: Standards Track H. Schulzrinne
Expires: January 13, 2009 Columbia U. Expires: September 8, 2009 Columbia U.
H. Tschofenig H. Tschofenig
Nokia Siemens Networks Nokia Siemens Networks
July 12, 2008 March 7, 2009
Session Initiation Protocol (SIP) Event Package for the Common Alerting Session Initiation Protocol (SIP) Event Package for the Common Alerting
Protocol (CAP) Protocol (CAP)
draft-rosen-sipping-cap-02.txt draft-rosen-sipping-cap-03.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any This Internet-Draft is submitted to IETF in full conformance with the
applicable patent or other IPR claims of which he or she is aware provisions of BCP 78 and BCP 79.
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet- other groups may also distribute working documents as Internet-
Drafts. Drafts.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 13, 2009. This Internet-Draft will expire on September 8, 2009.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Abstract Abstract
The Common Alerting Protocol (CAP) is an XML document format for The Common Alerting Protocol (CAP) is an XML document format for
exchanging emergency alerts and public warnings. This document exchanging emergency alerts and public warnings. This document
allows CAP documents to be distributed via the event notification allows CAP documents to be distributed via the event notification
mechanism available with the Session Initiation Protocol (SIP). mechanism available with the Session Initiation Protocol (SIP).
Table of Contents Table of Contents
skipping to change at page 2, line 29 skipping to change at page 2, line 36
3.10. Rate of Notifications . . . . . . . . . . . . . . . . . . 6 3.10. Rate of Notifications . . . . . . . . . . . . . . . . . . 6
3.11. State Agents . . . . . . . . . . . . . . . . . . . . . . . 6 3.11. State Agents . . . . . . . . . . . . . . . . . . . . . . . 6
3.12. Examples . . . . . . . . . . . . . . . . . . . . . . . . . 6 3.12. Examples . . . . . . . . . . . . . . . . . . . . . . . . . 6
3.13. Use of URIs to Retrieve State . . . . . . . . . . . . . . 6 3.13. Use of URIs to Retrieve State . . . . . . . . . . . . . . 6
3.14. PUBLISH Bodies . . . . . . . . . . . . . . . . . . . . . . 6 3.14. PUBLISH Bodies . . . . . . . . . . . . . . . . . . . . . . 6
3.15. PUBLISH Response Bodies . . . . . . . . . . . . . . . . . 7 3.15. PUBLISH Response Bodies . . . . . . . . . . . . . . . . . 7
3.16. Multiple Sources for Event State . . . . . . . . . . . . . 7 3.16. Multiple Sources for Event State . . . . . . . . . . . . . 7
3.17. Event State Segmentation . . . . . . . . . . . . . . . . . 7 3.17. Event State Segmentation . . . . . . . . . . . . . . . . . 7
3.18. Rate of Publication . . . . . . . . . . . . . . . . . . . 7 3.18. Rate of Publication . . . . . . . . . . . . . . . . . . . 7
4. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 4. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
5. Security Considerations . . . . . . . . . . . . . . . . . . . 9 5. Security Considerations . . . . . . . . . . . . . . . . . . . 8
6. Known Open Issues . . . . . . . . . . . . . . . . . . . . . . 9 5.1. Man-in-the-Middle Attacks . . . . . . . . . . . . . . . . 9
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 9 5.2. Forgery . . . . . . . . . . . . . . . . . . . . . . . . . 9
7.1. Registration of the 'common-alerting-protocol' Event 5.3. Replay Attack . . . . . . . . . . . . . . . . . . . . . . 9
Package . . . . . . . . . . . . . . . . . . . . . . . . . 9 5.4. Unauthorized Distribution . . . . . . . . . . . . . . . . 10
7.2. Registration of the 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 10
'application/common-alerting-protocol+xml' MIME type . . . 9 6.1. Registration of the 'common-alerting-protocol' Event
8. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 10 Package . . . . . . . . . . . . . . . . . . . . . . . . . 10
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 10 6.2. Registration of the
9.1. Normative References . . . . . . . . . . . . . . . . . . . 10 'application/common-alerting-protocol+xml' MIME type . . . 11
9.2. Informative References . . . . . . . . . . . . . . . . . . 11 7. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 11
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 11 8. Normative References . . . . . . . . . . . . . . . . . . . . . 12
Intellectual Property and Copyright Statements . . . . . . . . . . 12 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 12
1. Introduction 1. Introduction
The Common Alerting Protocol (CAP) [cap] is an XML document format The Common Alerting Protocol (CAP) [cap] is an XML document format
for exchanging emergency alerts and public warnings. This document for exchanging emergency alerts and public warnings. This document
allows CAP documents to be distributed via the event notification allows CAP documents to be distributed via the event notification
mechanism available with the Session Initiation Protocol (SIP). mechanism available with the Session Initiation Protocol (SIP).
Additionally, a MIME object is registered to allow CAP documents to
be exchanged in other SIP documents.
2. Terminology 2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119]. document are to be interpreted as described in RFC 2119 [RFC2119].
3. The 'common-alerting-protocol' Event Package 3. The 'common-alerting-protocol' Event Package
RFC 3265 [RFC3265] defines a SIP extension for subscribing to remote RFC 3265 [RFC3265] defines a SIP extension for subscribing to remote
nodes and receiving notifications of changes (events) in their nodes and receiving notifications of changes (events) in their
skipping to change at page 3, line 34 skipping to change at page 3, line 37
such an event package. This section fills in the information such an event package. This section fills in the information
required for all event packages by RFC 3265. required for all event packages by RFC 3265.
Additionally, RFC 3903 [RFC3903] defines an extension that allows SIP Additionally, RFC 3903 [RFC3903] defines an extension that allows SIP
User Agents to publish event state. According to RFC 3903, any event User Agents to publish event state. According to RFC 3903, any event
package intended to be used in conjunction with the SIP PUBLISH package intended to be used in conjunction with the SIP PUBLISH
method has to include a considerations section. This section also method has to include a considerations section. This section also
fills the information for all event packages to be used with PUBLISH fills the information for all event packages to be used with PUBLISH
requests. requests.
We define a new "common-alerting-protocol" event package. Event This document defines a new "common-alerting-protocol" event package.
Publication Agents (EPA) use PUBLISH requests to inform an Event Event Publication Agents (EPA) use PUBLISH requests to inform an
State Compositor (ESC) of changes in the common-alerting-protocol Event State Compositor (ESC) of changes in the common-alerting-
event package. Acting as a notifier, the ESC notifies subscribers protocol event package. Acting as a notifier, the ESC notifies
about emergency alerts and public warnings. subscribers about emergency alerts and public warnings.
3.1. Package Name 3.1. Package Name
The name of this package is "common-alerting-protocol". As specified The name of this package is "common-alerting-protocol". As specified
in RFC 3265 [RFC3265], this value appears in the Event header field in RFC 3265 [RFC3265], this value appears in the Event header field
present in SUBSCRIBE and NOTIFY requests. As specified in RFC 3903 present in SUBSCRIBE and NOTIFY requests. As specified in RFC 3903
[RFC3903], this value also appears in the Event header field present [RFC3903], this value also appears in the Event header field present
in PUBLISH requests. in PUBLISH requests.
3.2. Event Package Parameters 3.2. Event Package Parameters
RFC 3265 [RFC3265] allows event packages to define additional RFC 3265 [RFC3265] allows event packages to define additional
parameters carried in the Event header field. This event package, parameters carried in the Event header field. This event package,
"common-alerting-protocol", does not define additional parameters. "common-alerting-protocol", does not define additional parameters.
3.3. SUBSCRIBE Bodies 3.3. SUBSCRIBE Bodies
According to RFC 3265 [RFC3265], a SUBSCRIBE request can contain a RFC 3265 [RFC3265] allows a SUBSCRIBE request to contain a body.
body. The purpose of the body depends on its type. This document allows the body to contain civic and geodetic location
information to be carried. The 2D location shapes listed in
[Editor's Note: It is an open issue whether subscriptions to the [I-D.ietf-geopriv-pdif-lo-profile], e.g., <Point> <Polygon>,
"common-alerting-protocol" event package carry information in their <Circle>, <Ellipse>, <ArcBand>, and a <civicAddress> element, defined
body, such as a polygon defining an area for which notifications in [RFC5139], in the body of the message. The recipient of the
should be received. See Section 6.] SUBSCRIBE message SHOULD use this information to restrict the warning
messages that are being delivered. [Editor's note: Information about
the type of alerts that shall be received may need to be indicated as
well.]
3.4. Subscription Duration 3.4. Subscription Duration
The default expiration time for subscriptions within this package is The default expiration time for subscriptions within this package is
3600 seconds. As per RFC 3265 [RFC3265], the subscriber MAY specify 3600 seconds. As per RFC 3265 [RFC3265], the subscriber MAY specify
an alternate expiration in the Expires header field. an alternate expiration in the Expires header field.
3.5. NOTIFY Bodies 3.5. NOTIFY Bodies
As described in RFC 3265 [RFC3265], the NOTIFY message will contain As described in RFC 3265 [RFC3265], the NOTIFY message will contain
skipping to change at page 8, line 19 skipping to change at page 8, line 19
<sender>KSTO@NWS.NOAA.GOV</sender> <sender>KSTO@NWS.NOAA.GOV</sender>
<sent>2003-06-17T14:57:00-07:00</sent> <sent>2003-06-17T14:57:00-07:00</sent>
<status>Actual</status> <status>Actual</status>
<msgType>Alert</msgType> <msgType>Alert</msgType>
<scope>Public</scope> <scope>Public</scope>
<info> <info>
<category>Met</category> <category>Met</category>
<event>SEVERE THUNDERSTORM</event> <event>SEVERE THUNDERSTORM</event>
<urgency>Severe</urgency> <urgency>Severe</urgency>
<certainty>Likely</certainty> <certainty>Likely</certainty>
<eventCode>same=SVR</eventCode>
<senderName>NATIONAL WEATHER SERVICE SACRAMENTO</senderName> <senderName>NATIONAL WEATHER SERVICE SACRAMENTO</senderName>
<headline>SEVERE THUNDERSTORM WARNING</headline> <headline>SEVERE THUNDERSTORM WARNING</headline>
<description> AT 254 PM PDT... <description> AT 254 PM PDT...
NATIONAL WEATHER SERVICE NATIONAL WEATHER SERVICE
DOPPLER RADAR INDICATED A SEVERE DOPPLER RADAR INDICATED A SEVERE
THUNDERSTORM OVER SOUTH CENTRAL ALPINE COUNTY... THUNDERSTORM OVER SOUTH CENTRAL ALPINE COUNTY...
OR ABOUT 18 MILES SOUTHEAST OF OR ABOUT 18 MILES SOUTHEAST OF
KIRKWOOD... MOVING SOUTHWEST AT 5 MPH. HAIL... KIRKWOOD... MOVING SOUTHWEST AT 5 MPH. HAIL...
INTENSE RAIN AND STRONG DAMAGING WINDS INTENSE RAIN AND STRONG DAMAGING WINDS
ARE LIKELY WITH THIS STORM </description> ARE LIKELY WITH THIS STORM </description>
<instruction> TAKE COVER IN A SUBSTANTIAL SHELTER <instruction> TAKE COVER IN A SUBSTANTIAL SHELTER
UNTIL THE STORM PASSES </instruction> UNTIL THE STORM PASSES </instruction>
<contact>BARUFFALDI/JUSKIE</contact> <contact>BARUFFALDI/JUSKIE</contact>
<area> <area>
<areaDesc> EXTREME NORTH CENTRAL TUOLUMNE COUNTY <areaDesc> EXTREME NORTH CENTRAL TUOLUMNE COUNTY
IN CALIFORNIA, EXTREME NORTHEASTERN IN CALIFORNIA, EXTREME NORTHEASTERN
CALAVERAS COUNTY IN CALIFORNIA, SOUTHWESTERN CALAVERAS COUNTY IN CALIFORNIA, SOUTHWESTERN
ALPINE COUNTY IN CALIFORNIA </areaDesc> ALPINE COUNTY IN CALIFORNIA </areaDesc>
<polygon> 38.47,-120.14 38.34,-119.95 38.52,-119.74 <polygon> 38.47,-120.14 38.34,-119.95 38.52,-119.74
38.62,-119.89 38.47,-120.14 </polygon> 38.62,-119.89 38.47,-120.14 </polygon>
<geocode>fips6=006109</geocode>
<geocode>fips6=006109</geocode>
<geocode>fips6=006103</geocode>
</area> </area>
</info> </info>
</alert> </alert>
Example for a Severe Thunderstorm Warning Example for a Severe Thunderstorm Warning
5. Security Considerations 5. Security Considerations
[Editor's Note: A future version of this document will describe This section discusses security considerations when using SIP to
security considerations.] distribute warning messages using CAP.
6. Known Open Issues 5.1. Man-in-the-Middle Attacks
Frequently, alerting events are only of regional interest since they Threat:
only have regional impact. For example: The public in NYC does not
really need to be alerted about a wild fire at Lake Tahoe. One
possible solution is the ability to allow SUBSCRIBE bodies to have a
region description that describes the geographic region of interest,
as a polygon.
LoST may also play a role here, namely to get back a list of URLs The attacker could then conceivably attempt to impersonate the
where I can send the SUBSCRIBE requests to. There may be a need for subject (the putative caller) to some SIP-based target entity.
urn:service:alerts service URN registry.
7. IANA Considerations Countermeasures:
7.1. Registration of the 'common-alerting-protocol' Event Package Such an attack is implausible for several reasons. The subject's
assertion:
* should be signed, thus causing any alterations to break its
integrity and make such alterations detectable.
* the intended recipients may be listed in the optionally present
audience restriction, which is a cleartext field. As such, it
would not allow automatic processing but could give the
receiving user further hints.
* Issuer is represented in the CAP document (in the <sender>
element).
* validity period for the CAP document may be restricted.
5.2. Forgery
Threat:
A malicious user could forge or alter a CAP document in order to
convey messages to SIP entities that get immediate attention of
users.
Countermeasures:
To avoid this kind of attack, the entities must assure that proper
mechanisms for protecting the CAP documents are employed, e.g.,
signing the CAP document itself. Section 3.3.2.1 of [cap]
specifies the signing of CAP documents.
5.3. Replay Attack
Threat:
Theft of CAP documents described in this document and replay of it
at a later time.
Countermeasures:
A CAP document contains the mandatory <identifier>, <sender>,
<sent> elements and an optional <expire> element. These
attributes make the CAP document unique for a specific sender and
provide time restrictions. An entity that has received a CAP
message already within the indicated timeframe is able to detect a
replayed message and, if the content of that message is unchanged,
then no additional security vulnerability is created. Nodes that
enter the area of a disaster after the initial distribution of
warnings have not yet seen the CAP message and, as such, would not
be able to distinguish a replay from the initial message being
sent around. However, if the threat that lead to the distribution
of warning messages is still imminent then there is no reason not
to worry about that message. The source distributing the early
warning messages is, however, adviced to carefully select a value
for the <expires> element and it is RECOMMENDED to set this
element.
5.4. Unauthorized Distribution
Threat:
When an entity receives a CAP message it has to determine whether
the entity distributing the CAP messages is genuine to avoid
accepting messages that are injected by malicious users with the
potential desire to at least get the users immediate attention.
Countermeasures:
When receiving a CAP document a couple of verification steps must
be performed. First, it needs to be ensured that the message was
delivered via a trusted entitiy (such as a trusted SIP proxy) and
that the communication channel between the User Agent and it's SIP
proxy is properly secured to exclude various attacks at the SIP
level. Then, the message contains the <sender> that may contain
an entity that falls within the white list of the entity receiving
the message. Finally, the message is protected by a digital
signature and the entity signing the CAP message may again be
listed in a white list of the receiving entity and may therefore
be trusted. If none of these verification checks lead to a
positive indication of a known sender then the CAP document should
be treated as suspicious and configuration at the receiving entity
may dictate how to process and display CAP documents in such a
case.
6. IANA Considerations
6.1. Registration of the 'common-alerting-protocol' Event Package
This specification registers an event package, based on the This specification registers an event package, based on the
registration procedures defined in RFC 3265 [RFC3265]. The following registration procedures defined in RFC 3265 [RFC3265]. The following
is the information required for such a registration: is the information required for such a registration:
Package Name: common-alerting-protocol Package Name: common-alerting-protocol
Package or Template-Package: This is a package. Package or Template-Package: This is a package.
Published Document: RFC XXX [Replace by the RFC number of this Published Document: RFC XXX [Replace by the RFC number of this
specification]. specification].
Person to Contact: Hannes Tschofenig, Hannes.Tschofenig@nsn.com Person to Contact: Hannes Tschofenig, Hannes.Tschofenig@nsn.com
7.2. Registration of the 'application/common-alerting-protocol+xml' 6.2. Registration of the 'application/common-alerting-protocol+xml'
MIME type MIME type
To: ietf-types@iana.org To: ietf-types@iana.org
Subject: Registration of MIME media type application/ common- Subject: Registration of MIME media type application/ common-
alerting-protocol+xml alerting-protocol+xml
MIME media type name: application MIME media type name: application
MIME subtype name: common-alerting-protocol+xml MIME subtype name: common-alerting-protocol+xml
Required parameters: (none) Required parameters: (none)
Optional parameters: charset; Indicates the character encoding of Optional parameters: charset; Indicates the character encoding of
enclosed XML. Default is UTF-8 [RFC3629]. enclosed XML. Default is UTF-8 [RFC3629].
skipping to change at page 10, line 4 skipping to change at page 11, line 22
MIME type MIME type
To: ietf-types@iana.org To: ietf-types@iana.org
Subject: Registration of MIME media type application/ common- Subject: Registration of MIME media type application/ common-
alerting-protocol+xml alerting-protocol+xml
MIME media type name: application MIME media type name: application
MIME subtype name: common-alerting-protocol+xml MIME subtype name: common-alerting-protocol+xml
Required parameters: (none) Required parameters: (none)
Optional parameters: charset; Indicates the character encoding of Optional parameters: charset; Indicates the character encoding of
enclosed XML. Default is UTF-8 [RFC3629]. enclosed XML. Default is UTF-8 [RFC3629].
Encoding considerations: Uses XML, which can employ 8-bit Encoding considerations: Uses XML, which can employ 8-bit
characters, depending on the character encoding used. See RFC characters, depending on the character encoding used. See RFC
3023 [RFC3023], Section 3.2. 3023 [RFC3023], Section 3.2.
Security considerations: This content type is designed to carry Security considerations: This content type is designed to carry
payloads of the Common Alerting Protocol (CAP). payloads of the Common Alerting Protocol (CAP).
Interoperability considerations: This content type provides a way to Interoperability considerations: This content type provides a way to
convey CAP payloads. convey CAP payloads.
Published specification: RFC XXX [Replace by the RFC number of this Published specification: RFC XXX [Replace by the RFC number of this
specification]. specification].
Applications which use this media type: Applications that convey Applications which use this media type: Applications that convey
alerts and early warnings according to the CAP standard. alerts and early warnings according to the CAP standard.
Additional information: OASIS has published the Common Alerting Additional information: OASIS has published the Common Alerting
Protocol at http://www.oasis-open.org/committees/ Protocol at [cap].
documents.php&wg_abbrev=emergency
Person & email address to contact for further information: Hannes Person & email address to contact for further information: Hannes
Tschofenig, Hannes.Tschofenig@nsn.com Tschofenig, Hannes.Tschofenig@nsn.com
Intended usage: Limited use Intended usage: Limited use
Author/Change controller: IETF SIPPING working group Author/Change controller: IETF SIPPING working group
Other information: This media type is a specialization of Other information: This media type is a specialization of
application/xml RFC 3023 [RFC3023], and many of the considerations application/xml RFC 3023 [RFC3023], and many of the considerations
described there also apply to application/ described there also apply to application/
common-alerting-protocol+xml. common-alerting-protocol+xml.
8. Acknowledgments 7. Acknowledgments
The authors would like to thank Cullen Jennings for supporting this The authors would like to thank Cullen Jennings for supporting this
work. We would also like to thank the participants of the Early work. We would also like to thank the participants of the Early
Warning Adhoc meeting at IETF#69. Warning Adhoc meeting at IETF#69.
9. References 8. Normative References
9.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", March 1997. Requirement Levels", March 1997.
[cap] Jones, E. and A. Botterell, "Common Alerting Protocol v. [cap] Jones, E. and A. Botterell, "Common Alerting Protocol v.
1.1", October 2005. 1.1", October 2005.
[RFC3265] Roach, A., "Session Initiation Protocol (SIP)-Specific [RFC3265] Roach, A., "Session Initiation Protocol (SIP)-Specific
Event Notification", RFC 3265, June 2002. Event Notification", RFC 3265, June 2002.
[RFC3903] Niemi, A., "Session Initiation Protocol (SIP) Extension [RFC3903] Niemi, A., "Session Initiation Protocol (SIP) Extension
for Event State Publication", RFC 3903, October 2004. for Event State Publication", RFC 3903, October 2004.
[RFC3023] Murata, M., St. Laurent, S., and D. Kohn, "XML Media [RFC3023] Murata, M., St. Laurent, S., and D. Kohn, "XML Media
Types", RFC 3023, January 2001. Types", RFC 3023, January 2001.
[RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
10646", STD 63, RFC 3629, November 2003. 10646", STD 63, RFC 3629, November 2003.
9.2. Informative References [I-D.ietf-geopriv-pdif-lo-profile]
Winterbottom, J., Thomson, M., and H. Tschofenig, "GEOPRIV
PIDF-LO Usage Clarification, Considerations and
Recommendations", draft-ietf-geopriv-pdif-lo-profile-14
(work in progress), November 2008.
[RFC5139] Thomson, M. and J. Winterbottom, "Revised Civic Location
Format for Presence Information Data Format Location
Object (PIDF-LO)", RFC 5139, February 2008.
Authors' Addresses Authors' Addresses
Brian Rosen Brian Rosen
NeuStar, Inc. NeuStar, Inc.
470 Conrad Dr 470 Conrad Dr
Mars, PA 16046 Mars, PA 16046
US US
Phone: Phone:
skipping to change at page 11, line 21 skipping to change at page 13, line 4
Authors' Addresses Authors' Addresses
Brian Rosen Brian Rosen
NeuStar, Inc. NeuStar, Inc.
470 Conrad Dr 470 Conrad Dr
Mars, PA 16046 Mars, PA 16046
US US
Phone: Phone:
Email: br@brianrosen.net Email: br@brianrosen.net
Henning Schulzrinne Henning Schulzrinne
Columbia University Columbia University
Department of Computer Science Department of Computer Science
450 Computer Science Building 450 Computer Science Building
New York, NY 10027 New York, NY 10027
US US
Phone: +1 212 939 7004 Phone: +1 212 939 7004
Email: hgs+ecrit@cs.columbia.edu Email: hgs+ecrit@cs.columbia.edu
URI: http://www.cs.columbia.edu URI: http://www.cs.columbia.edu
Hannes Tschofenig Hannes Tschofenig
Nokia Siemens Networks Nokia Siemens Networks
Linnoitustie 6 Linnoitustie 6
Espoo 02600 Espoo 02600
Finland Finland
Phone: +358 (50) 4871445 Phone: +358 (50) 4871445
Email: Hannes.Tschofenig@gmx.net Email: Hannes.Tschofenig@gmx.net
URI: http://www.tschofenig.priv.at URI: http://www.tschofenig.priv.at
Full Copyright Statement
Copyright (C) The IETF Trust (2008).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
 End of changes. 25 change blocks. 
61 lines changed or deleted 151 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/