| < draft-winterbottom-ecrit-priv-loc-00.txt | draft-winterbottom-ecrit-priv-loc-01.txt > | |||
|---|---|---|---|---|
| ECRIT J. Winterbottom | ECRIT J. Winterbottom | |||
| Internet-Draft CommScope | Internet-Draft CommScope | |||
| Intended status: Standards Track H. Tschofenig | Intended status: Standards Track H. Tschofenig | |||
| Expires: January 8, 2013 Nokia Siemens Networks | Expires: January 17, 2013 Nokia Siemens Networks | |||
| July 7, 2012 | L. Liess | |||
| Deutsche Telekom | ||||
| July 16, 2012 | ||||
| Out of Jurisdiction Emergency Routing | Out of Jurisdiction Emergency Routing | |||
| draft-winterbottom-ecrit-priv-loc-00 | draft-winterbottom-ecrit-priv-loc-01.txt | |||
| Abstract | Abstract | |||
| Some countries and regions require location information be | Some countries and regions require location information be | |||
| constrained to emergency service applications and do not permit | constrained to emergency service applications and do not permit | |||
| location information to traverse the end-point at all. This document | location information to traverse the end-point at all. This document | |||
| describes the requirements of these countries and provides a solution | describes the requirements of these countries and provides a solution | |||
| based on an extension to the HELD location protocol. | based on an extension to the HELD location protocol. | |||
| Status of this Memo | Status of this Memo | |||
| skipping to change at page 1, line 35 ¶ | skipping to change at page 1, line 37 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on January 8, 2013. | This Internet-Draft will expire on January 17, 2013. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2012 IETF Trust and the persons identified as the | Copyright (c) 2012 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 3, line 16 ¶ | skipping to change at page 3, line 16 ¶ | |||
| The Internet emergency calling architecture specified in | The Internet emergency calling architecture specified in | |||
| [I-D.ietf-ecrit-phonebcp] describes two main models for emergency | [I-D.ietf-ecrit-phonebcp] describes two main models for emergency | |||
| call processing. The first is a device-centric model, where a device | call processing. The first is a device-centric model, where a device | |||
| obtains location information using a location configuration protocol, | obtains location information using a location configuration protocol, | |||
| such a HELD [RFC5985], and then proceeds to determine the address of | such a HELD [RFC5985], and then proceeds to determine the address of | |||
| the next hop closer to the local PSAP using LoST [RFC5222]. Figure 1 | the next hop closer to the local PSAP using LoST [RFC5222]. Figure 1 | |||
| shows this model in a simplified form. | shows this model in a simplified form. | |||
| +---Location Request---+ | +---Location Request---+ | |||
| | (1) | | | (1) | | |||
| +---+----+ +---V---+ | +---+----+ +---V---+ | |||
| | |<--Location--| LIS | | | |<--Location--| LIS | | |||
| | Caller | (2) +-------+ +--------+ | | Caller | (2) +-------+ +--------+ | |||
| | | | ESRP/ | | | | | ESRP/ | | |||
| | |----Find Service-------+ | PSAP | | | |----Find Service-------+ | PSAP | | |||
| +------^-+ (3) | +--------+ | +------^-+ (3) | +--------+ | |||
| | | +--------V----+ ^ | | | +--------V----+ ^ | |||
| | +-----Service----| LoST Server | | | | +-----Service----| LoST Server | | | |||
| | (4) +-------------+ +---+---+ | | (4) +-------------+ +---+---+ | |||
| +-------------Call Initiation------------>| VSP | | +-------------Call Initiation------------>| VSP | | |||
| skipping to change at page 9, line 16 ¶ | skipping to change at page 9, line 16 ¶ | |||
| responds with a location URI and the destination URI of the correct | responds with a location URI and the destination URI of the correct | |||
| emergency service authority. The Location URI will only yield | emergency service authority. The Location URI will only yield | |||
| location information to the authorized emergency authority. This | location information to the authorized emergency authority. This | |||
| solution addresses problem 1 problem 3, problem 4, problem 5. | solution addresses problem 1 problem 3, problem 4, problem 5. | |||
| Problem 2 is solved using a combination of | Problem 2 is solved using a combination of | |||
| [I-D.ietf-geopriv-res-gw-lis-discovery] and HELD with identity | [I-D.ietf-geopriv-res-gw-lis-discovery] and HELD with identity | |||
| extensions. | extensions. | |||
| 6.1. Call Flow | 6.1. Call Flow | |||
| 1. Device initiates an emergency call to home VSP | 1. Device initiates an emergency call to the user's VSP | |||
| 2. Home VSP detects emergency call and uses IP address to determine | 2. The VSP's proxy detects emergency call and uses IP address to | |||
| the correct LIS to query using | determine the correct LIS to query using | |||
| [I-D.ietf-geopriv-res-gw-lis-discovery]. | [I-D.ietf-geopriv-res-gw-lis-discovery]. | |||
| 3. Home VSP queries the LIS using HELD and the IP address of the | 3. The VSP queries the LIS using HELD and the IP address of the | |||
| calling device as an identity extension. | calling device as an identity extension. | |||
| 4. The LIS determines the location and uses it request routing | 4. The LIS determines the location and uses it request routing | |||
| information for the local LoST server. | information for the local LoST server. | |||
| 5. The LIS return a location URI and the local Emergency Service | 5. The LIS return a location URI and the local Emergency Service | |||
| Routing Proxy (ESRP) URI to the home VSP. | Routing Proxy (ESRP) URI to the VSP. | |||
| 6. The VSP follows the guidance from [I-D.ietf-ecrit-phonebcp] and | 6. The VSP follows the guidance from [I-D.ietf-ecrit-phonebcp] and | |||
| routes the call to the ESRP. | routes the call to the ESRP. | |||
| 7. The ESRP authenticates itself with the LIS when it dereferences | 7. The ESRP authenticates itself with the LIS when it dereferences | |||
| the location URI. | the location URI. | |||
| 8. The returns location information to the ESRP allowing it route | 8. The returns location information to the ESRP allowing it route | |||
| the call to the correct PSAP. | the call to the correct PSAP. | |||
| +------(2)Find LIS-----+ | +------(2)Find LIS-----+ | |||
| | | | | | | |||
| +---V---+ | | +---V---+ | | |||
| | DNS | | | | DNS | | | |||
| +----+--+ +----+---------+ | +----+--+ +----+---------+ | |||
| | | | | | | | | |||
| +----LIS URI---->| Home | | +----LIS URI---->| | | |||
| +--------+ | VSP | | +--------+ | VSP | | |||
| | Caller |------(1)-Call Initiation--------> | | | | Caller |------(1)-Call Initiation--------> | | | |||
| +--------+ +-+--^-------+-+ | +--------+ +-+--^-------+-+ | |||
| | | | | | | | | |||
| +-------------+ | | | | +-------------+ | | | | |||
| | |<------(3)-locationReq(IP)-------+ | | | | |<------(3)-locationReq(IP)-------+ | | | |||
| | LIS | | | | | LIS | | | | |||
| | |--(5)-locationResp(locURI,EcrfURI)--+ | | | |--(5)-locationResp(locURI,EcrfURI)--+ | | |||
| +-+--^---+--^-+ | | +-+--^---+--^-+ | | |||
| | | | | +-------------+ | | | | | | +-------------+ | | |||
| skipping to change at page 11, line 11 ¶ | skipping to change at page 11, line 11 ¶ | |||
| separates the entities into two clear groups, those that are inside | separates the entities into two clear groups, those that are inside | |||
| the regulatory emergency jurisdiction and those that are in the | the regulatory emergency jurisdiction and those that are in the | |||
| Internet. This is evident in Figure 5. | Internet. This is evident in Figure 5. | |||
| +------(2)Find LIS-----+ | +------(2)Find LIS-----+ | |||
| | | | | | | |||
| +---V---+ | | +---V---+ | | |||
| | DNS | | | | DNS | | | |||
| +----+--+ +----+---------------+ | +----+--+ +----+---------------+ | |||
| | | | | | | | | |||
| +----LIS URI---->| Home | | +----LIS URI---->| | | |||
| | VSP | | | VSP | | |||
| | | | | | | |||
| +-^---+----^-------+-+ | +-^---+----^-------+-+ | |||
| I N T E R N E T | | | | | I N T E R N E T | | | | | |||
| =========================================|===|====|=======|=== | =========================================|===|====|=======|=== | |||
| LOCAL JURISDICTION | | | | | LOCAL JURISDICTION | | | | | |||
| +--------+ | | | | | +--------+ | | | | | |||
| | Caller |------(1)-Call Initiation------+ | | | | | Caller |------(1)-Call Initiation------+ | | | | |||
| +--------+ | | | | +--------+ | | | | |||
| | | | | | | | | |||
| skipping to change at page 12, line 12 ¶ | skipping to change at page 12, line 12 ¶ | |||
| [[TBD.]] | [[TBD.]] | |||
| 9. IANA Considerations | 9. IANA Considerations | |||
| [[TBD.]] | [[TBD.]] | |||
| 10. Acknowledgements | 10. Acknowledgements | |||
| We would like to thank Wilfried Lange for sharing his views with us. | We would like to thank Wilfried Lange for sharing his views with us. | |||
| We would also like to thank Bruno Chatras for his review comments. | ||||
| 11. References | 11. References | |||
| 11.1. Normative References | 11.1. Normative References | |||
| [I-D.ietf-ecrit-phonebcp] | [I-D.ietf-ecrit-phonebcp] | |||
| Rosen, B. and J. Polk, "Best Current Practice for | Rosen, B. and J. Polk, "Best Current Practice for | |||
| Communications Services in support of Emergency Calling", | Communications Services in support of Emergency Calling", | |||
| draft-ietf-ecrit-phonebcp-20 (work in progress), | draft-ietf-ecrit-phonebcp-20 (work in progress), | |||
| September 2011. | September 2011. | |||
| [I-D.ietf-geopriv-deref-protocol] | [I-D.ietf-geopriv-deref-protocol] | |||
| Winterbottom, J., Tschofenig, H., Schulzrinne, H., and M. | Winterbottom, J., Tschofenig, H., Schulzrinne, H., and M. | |||
| Thomson, "A Location Dereferencing Protocol Using HELD", | Thomson, "A Location Dereferencing Protocol Using HELD", | |||
| draft-ietf-geopriv-deref-protocol-05 (work in progress), | draft-ietf-geopriv-deref-protocol-07 (work in progress), | |||
| May 2012. | July 2012. | |||
| [I-D.ietf-geopriv-res-gw-lis-discovery] | [I-D.ietf-geopriv-res-gw-lis-discovery] | |||
| Thomson, M. and R. Bellis, "Location Information Server | Thomson, M. and R. Bellis, "Location Information Server | |||
| (LIS) Discovery using IP address and Reverse DNS", | (LIS) Discovery using IP address and Reverse DNS", | |||
| draft-ietf-geopriv-res-gw-lis-discovery-03 (work in | draft-ietf-geopriv-res-gw-lis-discovery-03 (work in | |||
| progress), March 2012. | progress), March 2012. | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| skipping to change at line 575 ¶ | skipping to change at page 14, line 27 ¶ | |||
| Hannes Tschofenig | Hannes Tschofenig | |||
| Nokia Siemens Networks | Nokia Siemens Networks | |||
| Linnoitustie 6 | Linnoitustie 6 | |||
| Espoo 02600 | Espoo 02600 | |||
| Finland | Finland | |||
| Phone: +358 (50) 4871445 | Phone: +358 (50) 4871445 | |||
| Email: Hannes.Tschofenig@gmx.net | Email: Hannes.Tschofenig@gmx.net | |||
| URI: http://www.tschofenig.priv.at | URI: http://www.tschofenig.priv.at | |||
| Laura Liess | ||||
| Deutsche Telekom Networks | ||||
| Deutsche Telekom Allee 7 | ||||
| Darmstadt, Hessen 64295 | ||||
| Germany | ||||
| Phone: | ||||
| Email: L.Liess@telekom.de | ||||
| URI: http://www.telekom.de | ||||
| End of changes. 13 change blocks. | ||||
| 14 lines changed or deleted | 17 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||