| < draft-ietf-ecrit-security-threats-04.txt | draft-ietf-ecrit-security-threats-05.txt > | |||
|---|---|---|---|---|
| ECRIT T. Taylor | ECRIT T. Taylor, Ed. | |||
| Internet-Draft (Editor) Nortel | Internet-Draft Nortel | |||
| Expires: October 18, 2007 H. Tschofenig | Expires: February 22, 2008 H. Tschofenig | |||
| Siemens | Nokia Siemens Networks | |||
| H. Schulzrinne | H. Schulzrinne | |||
| Columbia U. | Columbia University | |||
| M. Shanmugam | M. Shanmugam | |||
| Siemens | Detecon | |||
| April 16, 2007 | August 21, 2007 | |||
| Security Threats and Requirements for Emergency Call Marking and Mapping | Security Threats and Requirements for Emergency Call Marking and Mapping | |||
| draft-ietf-ecrit-security-threats-04.txt | draft-ietf-ecrit-security-threats-05.txt | |||
| Status of this Memo | Status of this Memo | |||
| By submitting this Internet-Draft, each author represents that any | By submitting this Internet-Draft, each author represents that any | |||
| applicable patent or other IPR claims of which he or she is aware | applicable patent or other IPR claims of which he or she is aware | |||
| have been or will be disclosed, and any of which he or she becomes | have been or will be disclosed, and any of which he or she becomes | |||
| aware will be disclosed, in accordance with Section 6 of BCP 79. | aware will be disclosed, in accordance with Section 6 of BCP 79. | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF), its areas, and its working groups. Note that | Task Force (IETF), its areas, and its working groups. Note that | |||
| skipping to change at page 1, line 39 ¶ | skipping to change at page 1, line 39 ¶ | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| The list of current Internet-Drafts can be accessed at | The list of current Internet-Drafts can be accessed at | |||
| http://www.ietf.org/ietf/1id-abstracts.txt. | http://www.ietf.org/ietf/1id-abstracts.txt. | |||
| The list of Internet-Draft Shadow Directories can be accessed at | The list of Internet-Draft Shadow Directories can be accessed at | |||
| http://www.ietf.org/shadow.html. | http://www.ietf.org/shadow.html. | |||
| This Internet-Draft will expire on October 18, 2007. | This Internet-Draft will expire on February 22, 2008. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (C) The IETF Trust (2007). | Copyright (C) The IETF Trust (2007). | |||
| Abstract | Abstract | |||
| This document reviews the security threats associated with: | This document reviews the security threats associated with the | |||
| marking of signalling messages to indicate that they are related to | ||||
| o the marking of signalling messages to indicate that they are | an emergency, and the process of mapping from locations to Universal | |||
| related to an emergency; and | Resource Identifiers (URIs) pointing to Public Safety Answering | |||
| Points (PSAPs). This mapping occurs as part of the process of | ||||
| o the process of mapping from locations to Universal Resource | routing emergency calls through the IP network. | |||
| Identifiers (URIs) pointing to Public Safety Answering Points | ||||
| (PSAPs). This mapping occurs as part of the process of routing | ||||
| emergency calls through the IP network. | ||||
| Based on the identified threats, this document establishes a set of | Based on the identified threats, this document establishes a set of | |||
| security requirements for the mapping protocol and for the handling | security requirements for the mapping protocol and for the handling | |||
| of emergency-marked calls. | of emergency-marked calls. | |||
| Table of Contents | Table of Contents | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 | |||
| 3. Marking, Mapping, and the Emergency Call Routing Process . . . 5 | 3. Marking, Mapping, and the Emergency Call Routing Process . . . 5 | |||
| skipping to change at page 3, line 28 ¶ | skipping to change at page 3, line 28 ¶ | |||
| client entity to submit a location and receive a URI pointing to the | client entity to submit a location and receive a URI pointing to the | |||
| applicable PSAP for that location. | applicable PSAP for that location. | |||
| Attacks against the PSTN have taken place for decades. The Internet | Attacks against the PSTN have taken place for decades. The Internet | |||
| is seen as an even more hostile environment. Thus it is important to | is seen as an even more hostile environment. Thus it is important to | |||
| understand the types of attacks that might be mounted against the | understand the types of attacks that might be mounted against the | |||
| infrastructure providing emergency services, and to develop security | infrastructure providing emergency services, and to develop security | |||
| mechanisms to counter those attacks. While this can be a broad | mechanisms to counter those attacks. While this can be a broad | |||
| topic, the present document restricts itself to attacks on the | topic, the present document restricts itself to attacks on the | |||
| mapping of locations to PSAP URIs and attacks based on emergency | mapping of locations to PSAP URIs and attacks based on emergency | |||
| marking. | marking. Verification of the truthfulness of a reported incident by | |||
| the PSAP operator and various other attacks against the PSAP | ||||
| infrastructure related to the usage of faked location information are | ||||
| outside the scope of the document. | ||||
| This document is organized as follows: Section 2 describes basic | This document is organized as follows: Section 2 describes basic | |||
| terminology. Section 3 briefly describes how emergency marking and | terminology. Section 3 briefly describes how emergency marking and | |||
| mapping fit within the process of routing emergency calls. Section 4 | mapping fit within the process of routing emergency calls. Section 4 | |||
| describes some motivations of attackers in the context of emergency | describes some motivations of attackers in the context of emergency | |||
| calling, Section 5 describes and illustrates the attacks that might | calling, Section 5 describes and illustrates the attacks that might | |||
| be used, and Section 6 lists the security-related requirements that | be used, and Section 6 lists the security-related requirements that | |||
| must be met if these attacks are to be mitigated. | must be met if these attacks are to be mitigated. | |||
| 2. Terminology | 2. Terminology | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119], with the | document are to be interpreted as described in [RFC2119], with the | |||
| qualification that unless otherwise stated they apply to the design | qualification that unless otherwise stated they apply to the design | |||
| of the mapping protocol, not its implementation or application. | of the mapping protocol, not its implementation or application. | |||
| The terms call taker, mapping service, emergency caller, emergency | The terms call taker, mapping service, emergency caller, emergency | |||
| identifier, mapping, mapping client, mapping server, mapping | identifier, mapping, mapping client, mapping server, mapping | |||
| protocol, and Public Safety Answering Point (PSAP) are taken from | protocol, and Public Safety Answering Point (PSAP) are taken from | |||
| [I-D.ecrit-requirements]. | [I-D.ietf-ecrit-requirements]. | |||
| The term "location information" is taken from RFC 3693 [RFC3693]. | The term "location information" is taken from RFC 3693 [RFC3693]. | |||
| The term "emergency caller's device" designates the IP host closest | The term "emergency caller's device" designates the IP host closest | |||
| to the emergency caller in the signalling path between the emergency | to the emergency caller in the signalling path between the emergency | |||
| caller and the PSAP. Examples include an IP phone running SIP, | caller and the PSAP. Examples include an IP phone running SIP, | |||
| H.323, or a proprietary signalling protocol, a PC running a soft | H.323, or a proprietary signalling protocol, a PC running a soft | |||
| client, or an analogue terminal adapter or a residential gateway | client, or an analogue terminal adapter or a residential gateway | |||
| controlled by a softswitch. | controlled by a softswitch. | |||
| skipping to change at page 5, line 24 ¶ | skipping to change at page 5, line 24 ¶ | |||
| an emergency call. Signalling containing the emergency identifier | an emergency call. Signalling containing the emergency identifier | |||
| may be given priority treatment, special processing, and/or special | may be given priority treatment, special processing, and/or special | |||
| routing. | routing. | |||
| 3.2. Mapping | 3.2. Mapping | |||
| An important goal of emergency call routing is to ensure that any | An important goal of emergency call routing is to ensure that any | |||
| emergency call is routed to a PSAP. Preferably the call is routed to | emergency call is routed to a PSAP. Preferably the call is routed to | |||
| the PSAP responsible for the caller's location, since misrouting | the PSAP responsible for the caller's location, since misrouting | |||
| consumes valuable time while the call taker locates and forwards the | consumes valuable time while the call taker locates and forwards the | |||
| call to the right PSAP. As described in [I-D.ecrit-requirements], | call to the right PSAP. As described in | |||
| mapping is part of the process of achieving this preferable outcome. | [I-D.ietf-ecrit-requirements], mapping is part of the process of | |||
| achieving this preferable outcome. | ||||
| In brief, mapping involves a mapping client, a mapping server, and | In brief, mapping involves a mapping client, a mapping server, and | |||
| the protocol that passes between them. The protocol allows the | the protocol that passes between them. The protocol allows the | |||
| client to pass location information to the mapping server and to | client to pass location information to the mapping server and to | |||
| receive back a URI which can be used to direct call signalling to a | receive back a URI which can be used to direct call signalling to a | |||
| PSAP. | PSAP. | |||
| Since mapping requires location information for input, when and where | Since mapping requires location information for input, when and where | |||
| the location information is acquired imposes constraints upon when | the location information is acquired imposes constraints upon when | |||
| mapping can be done and which devices can act as mapping clients. | mapping can be done and which devices can act as mapping clients. | |||
| skipping to change at page 6, line 22 ¶ | skipping to change at page 6, line 22 ¶ | |||
| motivation may range from thoughtless vandalism, to wide-scale | motivation may range from thoughtless vandalism, to wide-scale | |||
| criminality, to terrorism. One interesting variant on this | criminality, to terrorism. One interesting variant on this | |||
| motivation is the case where a victim of a large emergency hopes | motivation is the case where a victim of a large emergency hopes | |||
| to gain faster service by blocking others' competing calls for | to gain faster service by blocking others' competing calls for | |||
| help. | help. | |||
| o to gain fraudulent use of services, by using an emergency | o to gain fraudulent use of services, by using an emergency | |||
| identifier to bypass normal authentication, authorization, and | identifier to bypass normal authentication, authorization, and | |||
| accounting procedures; | accounting procedures; | |||
| o to divert emergency responders to non-emergency sites. This memo | o to divert emergency calls to non-emergency sites. This is a form | |||
| has not identified any attacks within its intended scope that | of denial of service attack similar to the first item but quite | |||
| achieve this objective, so it will not be mentioned further. | likely more confusing for the caller itself since it expects to | |||
| talk to a PSAP operator but instead gets connected to someone | ||||
| else. | ||||
| Attacks against an individual fall into two classes: | Attacks against an individual fall into two classes: | |||
| o attacks to prevent an individual from receiving aid; | o attacks to prevent an individual from receiving aid; | |||
| o attacks to gain information about an emergency that can be applied | o attacks to gain information about an emergency that can be applied | |||
| either against an individual involved in that emergency or to the | either against an individual involved in that emergency or to the | |||
| profit of the attacker. | profit of the attacker. | |||
| 5. Potential Attacks | 5. Potential Attacks | |||
| skipping to change at page 12, line 27 ¶ | skipping to change at page 12, line 27 ¶ | |||
| debugging of mis-directed calls. One example of a way to meet this | debugging of mis-directed calls. One example of a way to meet this | |||
| requirement would be by means of an opaque parameter in the returned | requirement would be by means of an opaque parameter in the returned | |||
| URI. | URI. | |||
| From Section 5.2.2: no new requirements. | From Section 5.2.2: no new requirements. | |||
| From Section 5.2.3: | From Section 5.2.3: | |||
| Attack A8: snooping of location and other information. | Attack A8: snooping of location and other information. | |||
| Requirement R9: the protocol or the system within which it is | Requirement R9: the protocol and the system within which it is | |||
| implemented MUST maintain confidentiality of the request and | implemented MUST maintain confidentiality of the request and | |||
| response. | response. | |||
| 7. Security Considerations | 7. Security Considerations | |||
| This document addresses security threats and security requirements. | This document addresses security threats and security requirements. | |||
| Therefore, security is considered throughout this document. | Therefore, security is considered throughout this document. | |||
| 8. IANA Considerations | 8. IANA Considerations | |||
| skipping to change at page 16, line 5 ¶ | skipping to change at page 15, line 20 ¶ | |||
| the scope of the ECRIT Working Group. Hannes Tschofenig performed | the scope of the ECRIT Working Group. Hannes Tschofenig performed | |||
| the initial security analysis for ECRIT, but it has been shaped since | the initial security analysis for ECRIT, but it has been shaped since | |||
| then by the comments and judgement of the ECRIT WG at large. At an | then by the comments and judgement of the ECRIT WG at large. At an | |||
| earlier stage in the evolution of this document, Stephen Kent of the | earlier stage in the evolution of this document, Stephen Kent of the | |||
| Security Directorate was asked to review it and provided extensive | Security Directorate was asked to review it and provided extensive | |||
| comments which led to a complete rewriting of it. Brian Rosen, Roger | comments which led to a complete rewriting of it. Brian Rosen, Roger | |||
| Marshall, Andrew Newton, and most recently, Spencer Dawkins, Kamran | Marshall, Andrew Newton, and most recently, Spencer Dawkins, Kamran | |||
| Aquil, and Ron Watro have also provided detailed reviews of this | Aquil, and Ron Watro have also provided detailed reviews of this | |||
| document at various stages. The authors thank them. | document at various stages. The authors thank them. | |||
| We would like to thank the Donald Eastlake for his review on behalf | ||||
| of the Security Area Directorate and Christian Vogt for his review as | ||||
| part of the General Area Review Team. | ||||
| Finally, we would like to think Jari Arkko, Jon Peterson, and Russ | ||||
| Housley for their IETF Last Call comments. | ||||
| 10. References | 10. References | |||
| 10.1. Normative References | 10.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| 10.2. Informative References | 10.2. Informative References | |||
| [I-D.ecrit-requirements] | [I-D.ietf-ecrit-requirements] | |||
| Schulzrinne, H. and R. Marshall, "Requirements for | Schulzrinne, H. and R. Marshall, "Requirements for | |||
| Emergency Context Resolution with Internet Technologies", | Emergency Context Resolution with Internet Technologies", | |||
| March 2006. | draft-ietf-ecrit-requirements-13 (work in progress), | |||
| March 2007. | ||||
| [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and | [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and | |||
| J. Polk, "Geopriv Requirements", RFC 3693, February 2004. | J. Polk, "Geopriv Requirements", RFC 3693, February 2004. | |||
| Authors' Addresses | Authors' Addresses | |||
| Tom Taylor | Tom Taylor (editor) | |||
| Nortel | Nortel | |||
| 1852 Lorraine Ave | 1852 Lorraine Ave | |||
| Ottawa, Ontario K1H 6Z8 | Ottawa, Ontario K1H 6Z8 | |||
| Canada | Canada | |||
| Email: taylor@nortel.com | Email: tom.taylor@rogers.com | |||
| Hannes Tschofenig | Hannes Tschofenig | |||
| Siemens | Nokia Siemens Networks | |||
| Otto-Hahn-Ring 6 | Otto-Hahn-Ring 6 | |||
| Munich, Bayern 81739 | Munich, Bavaria 81739 | |||
| Germany | Germany | |||
| Email: Hannes.Tschofenig@siemens.com | Email: Hannes.Tschofenig@nsn.com | |||
| URI: http://www.tschofenig.com | ||||
| Henning Schulzrinne | Henning Schulzrinne | |||
| Columbia University | Columbia University | |||
| Department of Computer Science | Department of Computer Science | |||
| 450 Computer Science Building | 450 Computer Science Building | |||
| New York, NY 10027 | New York, NY 10027 | |||
| USA | US | |||
| Phone: +1 212 939 7042 | Phone: +1 212 939 7004 | |||
| Email: schulzrinne@cs.columbia.edu | Email: hgs+ecrit@cs.columbia.edu | |||
| URI: http://www.cs.columbia.edu/~hgs | URI: http://www.cs.columbia.edu | |||
| Murugaraj Shanmugam | Murugaraj Shanmugam | |||
| Siemens | Detecon International GmbH | |||
| Otto-Hahn-Ring 6 | Oberkasseler str 2 | |||
| Munich, Bayern 81739 | Bonn, NRW 53227 | |||
| Germany | Germany | |||
| Email: murugaraj.shanmugam@siemens.com | Email: murugaraj.shanmugam@detecon.com | |||
| Full Copyright Statement | Full Copyright Statement | |||
| Copyright (C) The IETF Trust (2007). | Copyright (C) The IETF Trust (2007). | |||
| This document is subject to the rights, licenses and restrictions | This document is subject to the rights, licenses and restrictions | |||
| contained in BCP 78, and except as set forth therein, the authors | contained in BCP 78, and except as set forth therein, the authors | |||
| retain all their rights. | retain all their rights. | |||
| This document and the information contained herein are provided on an | This document and the information contained herein are provided on an | |||
| End of changes. 23 change blocks. | ||||
| 41 lines changed or deleted | 53 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||