idnits 2.17.1 draft-winterbottom-ecrit-priv-loc-04.txt: Checking boilerplate required by RFC 5378 and the IETF Trust (see https://trustee.ietf.org/license-info): ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt: ---------------------------------------------------------------------------- No issues found here. Checking nits according to https://www.ietf.org/id-info/checklist : ---------------------------------------------------------------------------- == The 'Updates: ' line in the draft header should list only the _numbers_ of the RFCs which will be updated by this document (if approved); it should not include the word 'RFC' in the list. Miscellaneous warnings: ---------------------------------------------------------------------------- == The copyright year in the IETF Trust and authors Copyright Line does not match the current year == The document doesn't use any RFC 2119 keywords, yet seems to have RFC 2119 boilerplate text. -- The document date (May 29, 2014) is 3613 days in the past. Is this intentional? Checking references for intended status: Proposed Standard ---------------------------------------------------------------------------- (See RFCs 3967 and 4897 for information about using normative references to lower-maturity documents in RFCs) ** Downref: Normative reference to an Informational RFC: RFC 5687 ** Downref: Normative reference to an Informational RFC: RFC 6443 Summary: 2 errors (**), 0 flaws (~~), 3 warnings (==), 1 comment (--). Run idnits with the --verbose option for more detailed information about the items above. -------------------------------------------------------------------------------- 2 ECRIT J. Winterbottom 3 Internet-Draft Winterb Consulting Services 4 Updates: RFC6881 (if approved) H. Tschofenig 5 Intended status: Standards Track 6 Expires: November 30, 2014 L. Liess 7 Deutsche Telekom 8 May 29, 2014 10 A Routing Request Extension for the HELD Protocol 11 draft-winterbottom-ecrit-priv-loc-04.txt 13 Abstract 15 In many circumstances public LoST servers or a distributed network of 16 forest guides linking public LoST servers is not available. In such 17 environments the general ECRIT calling models breakdown. However, 18 location servers operating in these areas are often privy to the 19 necessary information to reach emergency and other services. This 20 document describes a solution where by the routing information may be 21 obtained from a location server using a simple extension to the HELD 22 protocol. 24 Status of this Memo 26 This Internet-Draft is submitted in full conformance with the 27 provisions of BCP 78 and BCP 79. 29 Internet-Drafts are working documents of the Internet Engineering 30 Task Force (IETF). Note that other groups may also distribute 31 working documents as Internet-Drafts. The list of current Internet- 32 Drafts is at http://datatracker.ietf.org/drafts/current/. 34 Internet-Drafts are draft documents valid for a maximum of six months 35 and may be updated, replaced, or obsoleted by other documents at any 36 time. It is inappropriate to use Internet-Drafts as reference 37 material or to cite them other than as "work in progress." 39 This Internet-Draft will expire on November 30, 2014. 41 Copyright Notice 43 Copyright (c) 2014 IETF Trust and the persons identified as the 44 document authors. All rights reserved. 46 This document is subject to BCP 78 and the IETF Trust's Legal 47 Provisions Relating to IETF Documents 48 (http://trustee.ietf.org/license-info) in effect on the date of 49 publication of this document. Please review these documents 50 carefully, as they describe your rights and restrictions with respect 51 to this document. Code Components extracted from this document must 52 include Simplified BSD License text as described in Section 4.e of 53 the Trust Legal Provisions and are provided without warranty as 54 described in the Simplified BSD License. 56 Table of Contents 58 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 59 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 3 60 3. Motivation . . . . . . . . . . . . . . . . . . . . . . . . . . 4 61 4. Mechanism . . . . . . . . . . . . . . . . . . . . . . . . . . 6 62 5. HELD Schema Extension . . . . . . . . . . . . . . . . . . . . 8 63 6. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 9 64 7. Privacy Considerations . . . . . . . . . . . . . . . . . . . . 10 65 8. Security Considerations . . . . . . . . . . . . . . . . . . . 10 66 9. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 11 67 9.1. URN sub-namespace registration for 68 'urn:ietf:params:xml:ns:geopriv:held:ri' . . . . . . . . . 11 69 9.2. XML Schema Registration . . . . . . . . . . . . . . . . . 11 70 10. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 12 71 11. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12 72 11.1. Normative References . . . . . . . . . . . . . . . . . . . 12 73 11.2. Informative References . . . . . . . . . . . . . . . . . . 12 74 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13 76 1. Introduction 78 In many circumstances public LoST [RFC5222] servers or a distributed 79 network of forest guides linking public LoST servers is not 80 available. In such environments the general ECRIT calling models 81 breakdown. Location servers operating in these areas are often privy 82 to the necessary information to reach emergency and other services. 83 This document describes how adding an extension to the HELD protocol 84 [RFC5985] can used to extract this information for a location 85 information server in the absence of a LoST server or network of 86 forest guides. 88 2. Terminology 90 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", 91 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this 92 document are to be interpreted as described in [RFC2119]. 94 The terms LIS, ESRP, VSP and PSAP are used as defined in [RFC6443]. 96 The term "Access Network Provider" is used as defined in [RFC5687] 97 and incompasses both the Internet Access Provider (IAP) and Internet 98 Service Provider (ISP). 100 3. Motivation 102 The Internet emergency calling architecture specified in [RFC6881] 103 describes two main models for emergency call processing. The first 104 is a device-centric model, where a device obtains location 105 information using a location configuration protocol, such a HELD 106 [RFC5985], and then proceeds to determine the address of the next hop 107 closer to the local PSAP using LoST [RFC5222]. Figure 1 shows this 108 model in a simplified form. 110 +---Location Request---+ 111 | (1) | 112 +---+----+ +---V---+ 113 | |<--Location--| LIS | 114 | Caller | (2) +-------+ +--------+ 115 | | | ESRP/ | 116 | |----Find Service-------+ | PSAP | 117 +------^-+ (3) | +--------+ 118 | | +--------V----+ ^ 119 | +-----Service----| LoST Server | | 120 | (4) +-------------+ +---+---+ 121 +-------------Call Initiation------------>| VSP | 122 (5) +-------+ 124 Figure 1: Device-Centric Emergency Services Model 126 The second approach is a softswitch-centric model, where a device 127 initiates and emergency call and the serving softswitch detects that 128 the call is an emergency and initiates retrieving the caller's 129 location from a Location Information Server (LIS) using HELD 130 [RFC5985] with identity extensions [RFC6155] [RFC6915] and then 131 determining the route to the local PSAP using LoST [RFC5222]. 132 Figure 2 shows the high-level protocol interactions. 134 +---Location Request---+ 135 | (2) | 136 +---V---+ | 137 | LIS | | 138 +----+--+ +----+----+ 139 | | | 140 +----Location--->| Soft | 141 +--------+ (3) | Switch | 142 | Caller |------Call Initiation------------> | | 143 +--------+ (1) +-+-^---+-+ 144 +-------------+ | | | 145 | LoST Server |<-Find Service--+ | | 146 +------+------+ (4) | | 147 | | | 148 +----------Service--------+ | 149 (5) | 150 +-----------+ | 151 | ESRP/PSAP |<------Call----+ 152 +-----------+ (6) 154 Figure 2: Softswitch-Centric Calling Model 156 In the softswitch-centric model when a VSP receives an emergency call 157 it performs two tasks. The first task is to determine the correct 158 LIS to ask for location information, this is done using a combination 159 of reverse DNS lookup described in [RFC7216] to acquire the serving 160 domain name and then using [RFC5986] to determine the LIS URI. Once 161 the location is obtained from the LIS, the VSP determines the LoST 162 server associated with the domain serving the caller and queries it 163 for the correct PSAP address. 165 LoST server discovery is a domain based activity, similar to the LIS 166 discovery technique. However, unlike the LIS that is a domain bound 167 service, a LoST server is a geographically bound service. This means 168 that for a domain that spans multiple geographic regions the LoST 169 server determined may not be able to provide a route to the necessary 170 PSAP. When this occurs, the contacted LoST server invokes the help 171 of other LoST servers and this requires the deployment of forest 172 guides. 174 At the time of writing, several countries have expressed their 175 reluctance to deploy public LoST servers. In countries amenable to 176 use of LoST and forest guides no public forest guides have been 177 deployed. There appears little interest from the public sector in 178 establishing a global forest guide network. These issues pose 179 threats to both the device-centric and the softswitch-centric calling 180 approaches in terms of them operating everywhere. 182 The device-centric and softswitch-centric calling models both involve 183 the notion of a LIS bound to the serving access network. In many 184 cases the LIS already knows the destination PSAP address for any 185 given location. In [RFC6881] for example, the LIS validates all 186 civic locations using a location validation procedure. This 187 procedure is the same as a routing request and so the LIS has the 188 resulting the PSAP routing information. In other cases, the LIS 189 knows the correct PSAP for a given location at provisioning time, or 190 the access network might always route to the same emergency provider. 191 Irrespective of the way in which the LIS learns the PSAP address for 192 a location, the LIS will, in a great many cases, have this 193 information. 195 This document specifies an extension to the HELD protocol so that 196 emergency routing information can be requested from the LIS at the 197 same time that location information is requested. The document 198 updates [RFC6881] by requiring devices and softswitches that 199 understand this specification to always request routing information 200 to avoid the risk of query failure where no LoST server or forest 201 guide network is deployed. 203 4. Mechanism 205 The mechanism consists of adding an element to the HELD 206 locationRequest and an element to the locationResponse. The request 207 element indicates that the requestor wants the LIS to provide routing 208 information for the location where the device is. If the LIS 209 understands the routing request and has routing information 210 accessible it provides the information in a routingInformation 211 element included in the locationResponse. How the LIS obtains this 212 information is left to implementation, one possible option is that 213 the LIS acquires it from a LoST server, other possibilities are 214 described in Section 3. 216 A LIS that does not understand the routing request element ignores it 217 and returns location as normal. 219 A LIS that does understand the routing request element but can't 220 obtain routing information returns location as normal. 222 The routing information in the location response consists of one or 223 more service elements which is identified by a service name. The 224 service name is a URI and might contain a general emergency service 225 urn such as urn:service:sos or might contain a specific service urn. 226 For each service name a list of one or more service destinations is 227 provided. Each destination is expressed as a URI and each URI scheme 228 should only appear once in this list. The routing information is 229 intended to be used at the time it is received. To avoid any risks 230 of using stale routing information the value should not be cached by 231 the receiving entity. 233 Reusing the mapping element from the LoST findServiceResponse message 234 to provide the routing information was considered. However, this 235 would have meant that several of the mandatory components in the 236 mapping element would have had to contain ambiguous or misleading 237 values. Specifically, the "source" attribute is required to contain 238 a LoST application unique string for the authoritative server. 239 However, in the situations described in this specification there may 240 not be an authoritative LoST server, so any value put into this 241 attribute would be misleading. In addition to this, routing 242 information received in the manner described in this specification 243 should not be cached by the receiver, so detailing when the routing 244 information expires or was last updated is irrelevant. 246 5. HELD Schema Extension 248 This section describes the schema extension to HELD. 250 251 258 259 260 262 263 264 265 266 268 269 271 272 273 275 276 277 278 279 280 282 284 285 286 287 288 290 292 6. Examples 294 Figure 3 illustrates a example that contains IP 295 flow information in the request. 297 300 303 305 306
192.168.1.1
307 1024 308
309 310
10.0.0.1
311 80 312
313
314
316 Figure 3: Example Location Request. 318 Figure 4 illustrates the message containing two 319 location URIs: a HTTPS and a SIP URI. Additionally, the response 320 contains routing information. 322 323 324 325 https://ls.example.com:9768/357yc6s64ceyoiuy5ax3o 326 327 328 sip:9769+357yc6s64ceyoiuy5ax3o@ls.example.com 329 330 332 334 335 sip:nypd@example.com 336 sips:nypd@example.com 337 xmpp:nypd@example.com 338 340 341 sip:fd@ny.example.com 342 sips:fd@ny.example.com 343 xmpp:fd@ny.example.com 344 345 347 349 Figure 4: Example Location Response 351 7. Privacy Considerations 353 This document makes no changes that require privacy considerations 354 beyond those already described in [RFC5985] and [RFC6155]. 356 8. Security Considerations 358 This document imposes no additional security considerations beyond 359 those already described in [RFC5985] and [RFC6155]. 361 9. IANA Considerations 363 9.1. URN sub-namespace registration for 364 'urn:ietf:params:xml:ns:geopriv:held:ri' 366 This document calls for IANA to register a new XML namespace, as per 367 the guidelines in [RFC3688]. 369 URI: urn:ietf:params:xml:ns:geopriv:held:ri 371 Registrant Contact: IETF, ECRIT working group (ecrit@ietf.org), 372 James Winterbottom (a.james.winterbottom@gmail.com). 374 XML: 376 BEGIN 377 378 380 381 382 HELD Routing Information Extensions 383 384 385

Additional Element for HELD Routing Information

386

urn:ietf:params:xml:ns:geopriv:held:ri

387 [[NOTE TO IANA/RFC-EDITOR: Please update RFC URL and replace XXXX 388 with the RFC number for this specification.]] 389

See RFCXXXX.

390 391 392 END 394 9.2. XML Schema Registration 396 This section registers an XML schema as per the procedures in 397 [RFC3688]. 399 URI: urn:ietf:params:xml:schema:geopriv:held:ri 401 Registrant Contact: IETF, ECRIT working group, (ecrit@ietf.org), 402 James Winterbottom (a.james.winterbottom@gmail.com). 404 The XML for this schema can be found as the entirety of Section 5 405 of this document. 407 10. Acknowledgements 409 We would like to thank Wilfried Lange for sharing his views with us. 410 We would also like to thank Bruno Chatras for his early review 411 comments and Bernd Henschel for his support. 413 11. References 415 11.1. Normative References 417 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 418 Requirement Levels", BCP 14, RFC 2119, March 1997. 420 [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, 421 January 2004. 423 [RFC5222] Hardie, T., Newton, A., Schulzrinne, H., and H. 424 Tschofenig, "LoST: A Location-to-Service Translation 425 Protocol", RFC 5222, August 2008. 427 [RFC5687] Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7 428 Location Configuration Protocol: Problem Statement and 429 Requirements", RFC 5687, March 2010. 431 [RFC5985] Barnes, M., "HTTP-Enabled Location Delivery (HELD)", 432 RFC 5985, September 2010. 434 [RFC6443] Rosen, B., Schulzrinne, H., Polk, J., and A. Newton, 435 "Framework for Emergency Calling Using Internet 436 Multimedia", RFC 6443, December 2011. 438 [RFC6881] Rosen, B. and J. Polk, "Best Current Practice for 439 Communications Services in Support of Emergency Calling", 440 BCP 181, RFC 6881, March 2013. 442 11.2. Informative References 444 [RFC5986] Thomson, M. and J. Winterbottom, "Discovering the Local 445 Location Information Server (LIS)", RFC 5986, 446 September 2010. 448 [RFC6155] Winterbottom, J., Thomson, M., Tschofenig, H., and R. 449 Barnes, "Use of Device Identity in HTTP-Enabled Location 450 Delivery (HELD)", RFC 6155, March 2011. 452 [RFC6915] Bellis, R., "Flow Identity Extension for HTTP-Enabled 453 Location Delivery (HELD)", RFC 6915, April 2013. 455 [RFC7216] Thomson, M. and R. Bellis, "Location Information Server 456 (LIS) Discovery Using IP Addresses and Reverse DNS", 457 RFC 7216, April 2014. 459 Authors' Addresses 461 James Winterbottom 462 Winterb Consulting Services 463 Gwynneville, NSW 2500 464 AU 466 Phone: +61 448 266004 467 Email: a.james.winterbottom@gmail.com 469 Hannes Tschofenig 470 Halls in Tirol 6060 471 Austria 473 Phone: 474 Email: Hannes.Tschofenig@gmx.net 475 URI: http://www.tschofenig.priv.at 477 Laura Liess 478 Deutsche Telekom Networks 479 Deutsche Telekom Allee 7 480 Darmstadt, Hessen 64295 481 Germany 483 Phone: 484 Email: L.Liess@telekom.de 485 URI: http://www.telekom.de