< draft-winterbottom-geopriv-lis2lis-req-00.txt   draft-winterbottom-geopriv-lis2lis-req-01.txt >
Geopriv J. Winterbottom Geopriv J. Winterbottom
Internet-Draft Andrew Corporation Internet-Draft Andrew Corporation
Intended status: Standards Track S. Norreys Intended status: Standards Track S. Norreys
Expires: December 16, 2007 British Telecom Expires: May 22, 2008 British Telecom
June 14, 2007 November 19, 2007
LIS to LIS Protocol Requirements LIS to LIS Protocol Requirements
draft-winterbottom-geopriv-lis2lis-req-00.txt draft-winterbottom-geopriv-lis2lis-req-01.txt
Status of this Memo Status of this Memo
By submitting this Internet-Draft, each author represents that any By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79. aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that Task Force (IETF), its areas, and its working groups. Note that
skipping to change at page 1, line 35 skipping to change at page 1, line 35
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt. http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html. http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 16, 2007. This Internet-Draft will expire on May 22, 2008.
Copyright Notice Copyright Notice
Copyright (C) The IETF Trust (2007). Copyright (C) The IETF Trust (2007).
Abstract Abstract
This document describes requirements for a LIS to LIS protocol and This document describes requirements for a LIS to LIS protocol and
provides examples of where such a protocol is applicable. provides examples of where such a protocol is applicable.
skipping to change at page 4, line 12 skipping to change at page 4, line 12
However, when the connectivity information held by the two parties is However, when the connectivity information held by the two parties is
combined the location of the end-point can be determined. combined the location of the end-point can be determined.
2. Terminology 2. Terminology
The key conventions and terminology used in this document are defined The key conventions and terminology used in this document are defined
as follows: as follows:
This document reuses the terms Target, as defined in [RFC3693]. This document reuses the terms Target, as defined in [RFC3693].
This document uses the term Location Information Server, LIS, to This document uses the term Location Information Server (LIS) as
represent a combined Location Server and Location Generator (as defined in [I-D.ietf-geopriv-l7-lcp-ps].
defined in [RFC3693]) residing inside the local access domain.
Broadband Remote Access Server (BRAS). A node in a DSL network Broadband Remote Access Server (BRAS). A node in a DSL network
responsible for switching data streams between end-points and responsible for switching data streams between end-points and
Internet Service Providers. Internet Service Providers.
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119]. document are to be interpreted as described in [RFC2119].
3. Overview 3. Overview
The Geopriv L7 LCP requirements [I-D.ietf-geopriv-l7-lcp-ps] describe The Geopriv L7 LCP requirements [I-D.ietf-geopriv-l7-lcp-ps] describe
a range of network topologies in which a Target should be able to a range of network topologies in which a Target should be able to
acquire its location from a LIS using an application layer location acquire its location from a LIS using an application layer location
acquisition protocol. The scope of [I-D.ietf-geopriv-l7-lcp-ps] is acquisition protocol. The scope of [I-D.ietf-geopriv-l7-lcp-ps] is
such that it does not address specific network topologies that may such that it does not address specific network topologies that may
exist inside access network provider domain. This document provides exist inside the access network provider domain. This document
scope and requirements for LIS to LIS communications where the two provides scope and requirements for LIS to LIS communications where
servers are controlled by different operators each running a part of the two servers are controlled by different operators each running a
the access provider network. While the same principles may be part of the access network. While the same principles may be applied
applied to inter-LIS communication occurring between a LIS in the to inter-LIS communication occurring between a LIS in the customer
customer premise network and the access provider network, operation premise network and the access provider network, operation in this
in this configuration is not considered in scope for this document. configuration is not considered in scope for this document.
+~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~+ +~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~+
| | | | | | | |
| Regional | | INTERNET Service | | Regional | | INTERNET Service |
| Access Network Provider | | Provider | | Access Network Provider | | Provider |
| | | +------------------+ | | | | +------------------+ |
| +------------+ | | | Network Access | | | +------------+ | | | Network Access | |
| | Switching |-------------------------->| Server | | | | Switching |-------------------------->| Server | |
| +------------+ | | +------------------+ | | +------------+ | | +------------------+ |
| ^ | +-----+ | | +-----+ | | | ^ | +-----+ | | +-----+ | |
skipping to change at page 7, line 13 skipping to change at page 7, line 13
This document describes the requirements for this information flow. This document describes the requirements for this information flow.
4. Assumptions 4. Assumptions
This section details the high-level assumptions made in this This section details the high-level assumptions made in this
document. document.
1: A strong trust relationship exists between the regional access 1: A strong trust relationship exists between the regional access
provider and ISP. provider and ISP.
2: End-points only deal directly with the ISP LIS, and may be totally 2: Targets only deal directly with the ISP LIS, and may be totally
unaware of any regional access provider LIS. A regional access unaware of any regional access provider LIS. A regional access
LIS will only ever receive location requests from an ISP LIS. LIS will only ever receive location requests from an ISP LIS.
5. Requirements 5. Requirements
This section details the requirements that MUST be satisfied by any This section details the requirements that MUST be satisfied by any
LIS to LIS protocol LIS to LIS protocol
1: Connections (physical and logical) from the ISP LIS to the 1: Connections (physical and logical) from the ISP LIS to the
regional access LIS require both ends to authenticate as part of regional access LIS require both ends to authenticate as part of
connection establishment. The security of the data conveyed connection establishment. The security of the data conveyed
between the two servers MUST be ensured for both privacy and between the two servers MUST be ensured for both privacy and
integrity. integrity.
2: The data used to identify an end-point to the ISP MUST be able to 2: The data used to identify a Target to the ISP MUST be able to be
be passed to, and be recognizable by the regional access LIS using passed to, and be recognizable by the regional access LIS using
the LIS to LIS protocol. The data used to identify an end-point the LIS to LIS protocol. The data used to identify a Target to
to the ISP MUST be consistent with the traffic aggregation method the ISP MUST be consistent with the traffic aggregation method
supported by the Regional Access Network Provider. supported by the Regional Access Network Provider.
3: Location information returned over a LIS to LIS protocol MUST be 3: Location information returned over a LIS to LIS protocol MUST be
in PIDF-LO [RFC4119] format, and MUST comply with in PIDF-LO [RFC4119] format, and MUST comply with
[I-D.ietf-geopriv-pdif-lo-profile] . [I-D.ietf-geopriv-pdif-lo-profile] .
4: The type of location information requested by the end-point MUST 4: The type of location information requested by the end-point MUST
be relayed to the regional access LIS by the ISP LIS using the LIS be relayed to the regional access LIS by the ISP LIS using the LIS
to LIS protocol. to LIS protocol.
5: The method used by the regional access LIS to determine the 5: The method used by the regional access LIS to determine the
location of the end-point MUST be provided to the ISP LIS along location of the Target MUST be provided to the ISP LIS along with
with the determined location. the determined location.
6: Any usage-rule preferences provided by the end-point to the ISP 6: Any usage-rule preferences provided by the Target to the ISP LIS
LIS MUST be included in any location returned to the end-point. MUST be included in any location returned to the Target or
Location Recipient.
7: Where location signing is requested by the end-point, this request 7: Additional information provided by the Target to the ISP in a
location request that cannot be processed directly by the ISP LIS
MUST be forwarded to regional access LIS using the LIS to LIS MUST be forwarded to regional access LIS using the LIS to LIS
protocol protocol. The intention of this requirement is to support future
LCP functions that require additional information from the Target.
8: The presentity in the PIDF-LO returned by the regional access LIS 8: The presentity in the PIDF-LO returned by the regional access LIS
MUST have been provided by the ISP LIS. The ISP LIS may create MUST have been provided by the ISP LIS. The ISP LIS may create
the presentity, or it may have received a presentity from the end- the presentity, or it may have received a presentity from the
point. Target.
9: The protocol MUST provide support for returning and dealing with 9: The protocol MUST provide support for returning and dealing with
error conditions such as "no location found" or "timeout". error conditions such as "no location found" or "timeout".
6. Security Considerations 6. Security Considerations
LIS to LIS communications are necessary in some network architectures LIS to LIS communications are necessary in some network architectures
and care must be taken to ensure that they are secure both from a and care must be taken to ensure that they are secure both from a
privacy perspective and from an integrity perspective. This can be privacy perspective and from an integrity perspective. This can be
achieved in the most part with existing protocol suites, such as TLS, achieved in the most part with existing protocol suites, such as TLS,
skipping to change at page 12, line 8 skipping to change at page 12, line 8
Operators of regional access servers will need to ensure that this Operators of regional access servers will need to ensure that this
operational requirement is met. operational requirement is met.
7. IANA Considerations 7. IANA Considerations
There are no IANA considerations for this document. There are no IANA considerations for this document.
8. Acknowledgements 8. Acknowledgements
Thanks to Guy Caron and Barbara Stark for providing early reviews of Thanks to Guy Caron and Barbara Stark for providing early reviews of
this document. this document. Thanks to Martin Thomson and Cullen Jennings for
providing comments.
9. References 9. References
9.1. Normative references 9.1. Normative references
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997. Requirement Levels", BCP 14, RFC 2119, March 1997.
[I-D.ietf-geopriv-l7-lcp-ps] [I-D.ietf-geopriv-l7-lcp-ps]
Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7 Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7
Location Configuration Protocol; Problem Statement and Location Configuration Protocol; Problem Statement and
Requirements", draft-ietf-geopriv-l7-lcp-ps-02 (work in Requirements", draft-ietf-geopriv-l7-lcp-ps-05 (work in
progress), April 2007. progress), September 2007.
[RFC4119] Peterson, J., "A Presence-based GEOPRIV Location Object [RFC4119] Peterson, J., "A Presence-based GEOPRIV Location Object
Format", RFC 4119, December 2005. Format", RFC 4119, December 2005.
[I-D.ietf-geopriv-pdif-lo-profile] [I-D.ietf-geopriv-pdif-lo-profile]
Tschofenig, H., "GEOPRIV PIDF-LO Usage Clarification, Winterbottom, J., Thomson, M., and H. Tschofenig, "GEOPRIV
Considerations and Recommendations", PIDF-LO Usage Clarification, Considerations and
draft-ietf-geopriv-pdif-lo-profile-07 (work in progress), Recommendations", draft-ietf-geopriv-pdif-lo-profile-10
April 2007. (work in progress), October 2007.
9.2. Informative references 9.2. Informative references
[RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and
J. Polk, "Geopriv Requirements", RFC 3693, February 2004. J. Polk, "Geopriv Requirements", RFC 3693, February 2004.
Authors' Addresses Authors' Addresses
James Winterbottom James Winterbottom
Andrew Corporation Andrew Corporation
 End of changes. 15 change blocks. 
34 lines changed or deleted 37 lines changed or added

This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/