idnits 2.17.1
draft-winterbottom-geopriv-held-identity-extensions-00.txt:
Checking boilerplate required by RFC 5378 and the IETF Trust (see
https://trustee.ietf.org/license-info):
----------------------------------------------------------------------------
** It looks like you're using RFC 3978 boilerplate. You should update this
to the boilerplate described in the IETF Trust License Policy document
(see https://trustee.ietf.org/license-info), which is required now.
-- Found old boilerplate from RFC 3978, Section 5.1 on line 15.
-- Found old boilerplate from RFC 3978, Section 5.5 on line 562.
-- Found old boilerplate from RFC 3979, Section 5, paragraph 1 on line 573.
-- Found old boilerplate from RFC 3979, Section 5, paragraph 2 on line 580.
-- Found old boilerplate from RFC 3979, Section 5, paragraph 3 on line 586.
** This document has an original RFC 3978 Section 5.4 Copyright Line,
instead of the newer IETF Trust Copyright according to RFC 4748.
** This document has an original RFC 3978 Section 5.5 Disclaimer, instead
of the newer disclaimer which includes the IETF Trust according to RFC
4748.
Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt:
----------------------------------------------------------------------------
** Too long document name: The document name (without revision number),
'draft-winterbottom-geopriv-held-identity-extensions', is 51 characters
long, but may be at most 50 characters
Checking nits according to https://www.ietf.org/id-info/checklist :
----------------------------------------------------------------------------
No issues found here.
Miscellaneous warnings:
----------------------------------------------------------------------------
== The copyright year in the RFC 3978 Section 5.4 Copyright Line does not
match the current year
== The document doesn't use any RFC 2119 keywords, yet seems to have RFC
2119 boilerplate text.
-- The document seems to lack a disclaimer for pre-RFC5378 work, but may
have content which was first submitted before 10 November 2008. If you
have contacted all the original authors and they are all willing to grant
the BCP78 rights to the IETF Trust, then this is fine, and you can ignore
this comment. If not, you may need to add the pre-RFC5378 disclaimer.
(See the Legal Provisions document at
https://trustee.ietf.org/license-info for more information.)
-- The document date (Oct 2006) is 6403 days in the past. Is this
intentional?
Checking references for intended status: Proposed Standard
----------------------------------------------------------------------------
(See RFCs 3967 and 4897 for information about using normative references
to lower-maturity documents in RFCs)
== Missing Reference: '0-5' is mentioned on line 308, but not defined
== Missing Reference: '0-4' is mentioned on line 308, but not defined
== Missing Reference: '0-9' is mentioned on line 308, but not defined
== Missing Reference: '0-1' is mentioned on line 308, but not defined
== Outdated reference: A later version (-05) exists of
draft-winterbottom-http-location-delivery-03
Summary: 4 errors (**), 0 flaws (~~), 7 warnings (==), 7 comments (--).
Run idnits with the --verbose option for more detailed information about
the items above.
--------------------------------------------------------------------------------
2 Geopriv J. Winterbottom
3 Internet-Draft M. Thomson
4 Intended status: Standards Track Andrew Corporation
5 Expires: April 4, 2007 Oct 2006
7 HELD End-Point identity Extensions
8 draft-winterbottom-geopriv-held-identity-extensions-00.txt
10 Status of this Memo
12 By submitting this Internet-Draft, each author represents that any
13 applicable patent or other IPR claims of which he or she is aware
14 have been or will be disclosed, and any of which he or she becomes
15 aware will be disclosed, in accordance with Section 6 of BCP 79.
17 Internet-Drafts are working documents of the Internet Engineering
18 Task Force (IETF), its areas, and its working groups. Note that
19 other groups may also distribute working documents as Internet-
20 Drafts.
22 Internet-Drafts are draft documents valid for a maximum of six months
23 and may be updated, replaced, or obsoleted by other documents at any
24 time. It is inappropriate to use Internet-Drafts as reference
25 material or to cite them other than as "work in progress."
27 The list of current Internet-Drafts can be accessed at
28 http://www.ietf.org/ietf/1id-abstracts.txt.
30 The list of Internet-Draft Shadow Directories can be accessed at
31 http://www.ietf.org/shadow.html.
33 This Internet-Draft will expire on April 4, 2007.
35 Copyright Notice
37 Copyright (C) The Internet Society (2006).
39 Abstract
41 This document describes a schema for extending HELD Target
42 identification beyond source IP Address. It describes real-world
43 situations where such a mechanism can be deployed, and provides
44 examples of HELD message syntax including identity extensions.
46 Table of Contents
48 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
49 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
50 3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
51 4. Example Network Deployments . . . . . . . . . . . . . . . . . 6
52 4.1. Digital Subscriber Line Networks . . . . . . . . . . . . . 6
53 4.2. LLDP Enabled Network . . . . . . . . . . . . . . . . . . . 7
54 5. XML Schema Definition . . . . . . . . . . . . . . . . . . . . 8
55 6. Security Considerations . . . . . . . . . . . . . . . . . . . 13
56 7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
57 7.1. URN Sub-Namespace Registration for
58 urn:ietf:params:xml:ns:geopriv:held:deviceIdentifiers . . 14
59 7.2. XML Schema Registration . . . . . . . . . . . . . . . . . 14
60 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 16
61 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 17
62 9.1. Normative references . . . . . . . . . . . . . . . . . . . 17
63 9.2. Informative references . . . . . . . . . . . . . . . . . . 17
64 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 18
65 Intellectual Property and Copyright Statements . . . . . . . . . . 19
67 1. Introduction
69 The HELD protocol [I-D.winterbottom-http-location-delivery] defines
70 the way in in which location information is acquired from a Location
71 Information Server (LIS). HELD uses the IP address of the location
72 request message as the primary source of identifier for the
73 requesting device, there are however circumstances and network
74 configurations where an IP address alone is insufficient to identify
75 a Target in a network. This specification defines an identity
76 extensions schema that can be used by requesting devices to assist
77 the LIS in determining their physical location.
79 2. Terminology
81 The key conventions and terminology used in this document are defined
82 as follows:
84 This document reuses the terms Target, as defined in [RFC3693].
86 This document uses the term Location Information Server, LIS, to
87 represent a combined Location Server and Location Generator (as
88 defined in [RFC3693]) residing inside the local access domain.
90 Broadband Regional Aggregation Server (BRAS). A node in a DSL
91 network responsible for switching data streams between end-points and
92 Internet Service Providers.
94 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
95 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
96 document are to be interpreted as described in [RFC2119].
98 3. Overview
100 A basic premise in HELD is that the source IP address of the location
101 request message can be used by the LIS to identify the requesting
102 Target, and that this identity can be used with other contextual
103 network information to provide a physical location for the Target.
104 In many network deployments this premise holds true, but in some
105 network deployments additional identifiers are required to identify
106 the Target at different points throughout the network, or they may
107 assist with speeding up location determination.
109 The base HELD schema was designed with extensibility in mind and the
110 assumption that IP address may not always be enought to identify a
111 Target. The HELD identity extensions schema is made up of a number
112 of discrete element blocks that can included into the HELD
113 locationRequest, createContext and updateContext messages. These
114 elements can then be used by the LIS to identify the Target closer to
115 the edge of the network, for example a MAC address or DHCP client-
116 identifier, or to identify an element that has a closer relationship
117 with the target, for example LLDP switch and port information. The
118 identity extension elements have been desgined to work across a range
119 of existing and emerging technologies. It is envisaged that while
120 this schema is not exhaustive, it will address many of the perceived
121 deployment solution. It is further envisaged that extensions to this
122 schema will be necessary as new identifiers are created or required.
124 4. Example Network Deployments
126 4.1. Digital Subscriber Line Networks
128 Digital Subscriber Line (DSL) networks represent the fastest growing
129 residentital broadband technology. DSL networks have evolved
130 consideraly since their first deployments, with core aggregation
131 architectures being covered in DSL forum documents [TR025] and
132 [TR101]. DSL depoloyments are frequently constructed through the
133 cooperation of two or more providers. These can be generalized into
134 two basic categories, infrastructure providers and Internet
135 providers. Infrastructure providers own the cables and provide layer
136 2 connectivity from a residence to the Internet provider. The
137 Internet provider assigns an IP address and provides routing and
138 access to broader network services. End users obtain their service
139 from and ISP, that in turn needs to negotiate access from an
140 Infrastructure provider. Request for location from the end user
141 therefore, are made to the Internet Service Provider (ISP) LIS. In
142 many cases the ISP LIS is unable to provide location as it is removed
143 from the physical access network, consequently it needs to request
144 location from the Infrastructure provider LIS. Depending on the
145 network configuration the ISP LIS may need to provide the
146 Infrastructure provider LIS with additional identifier information
147 that it can glean when the end-point connection is established with
148 the ISP Network Access Server (NAS).
150 Determining location in DSL environments is dependent on identifying
151 and following provisioned circuit chains. And circuit chains are
152 identified differently depending the DSL network deployment. Take
153 for example a deployment that uses a proxy-RADIUS service between the
154 BRAS, this mode of operation IP routing is used between the BRAS and
155 the ISP NAS. In this case, the Infrastructure provider LIS may
156 information about incoming port information to the BRAS that it can
157 link back to a DSLAM port, and hence a street address. Since the
158 BRAS must perform IP routing to the ISP NAS, the Infrastructure
159 provider LIS may more easily perform associations between IP address
160 and provisioned circuit chain information.
162 A large number of DSL deployments however use L2TP connections from
163 the BRAS to the ISP NAS. In this case, the Infrastructure provider
164 LIS can only link tunnel and session information to with the
165 provisioned circuit chain. Since the ISP LIS can obtain this same
166 tunnel and session information it can provide this in a HELD request
167 to the Infrastructre provider LIS, and obtain the location of the
168 end-point. A HELD location request using this meachnism may look
169 something similar to the figure below.
171
See RFCXXXX.
478 479 480 END 482 7.2. XML Schema Registration 484 This section registers an XML schema as per the guidelines in 485 [RFC3688]. 487 URI: urn:ietf:params:xml:schema:geopriv:held:deviceIdentifiers 488 Registrant Contact: IETF, GEOPRIV working group, (geopriv@ietf.org), 489 James Winterbottom (james.winterbottom@andrew.com). 491 Schema: The XML for this schema can be found as the entirety of 492 Section 5 of this document. 494 8. Acknowledgements 496 The authors wish to thank the NENA VoIP location working group for 497 their assistance in the definition of the schema used in this 498 document. 500 9. References 502 9.1. Normative references 504 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate 505 Requirement Levels", BCP 14, RFC 2119, March 1997. 507 [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, 508 January 2004. 510 [I-D.winterbottom-http-location-delivery] 511 Winterbottom, J., "HTTP Enabled Location Delivery (HELD)", 512 draft-winterbottom-http-location-delivery-03 (work in 513 progress), May 2006. 515 9.2. Informative references 517 [RFC3693] Cuellar, J., Morris, J., Mulligan, D., Peterson, J., and 518 J. Polk, "Geopriv Requirements", RFC 3693, February 2004. 520 [TR025] Wang, R., "Core Network Architecture Recommendations for 521 Access to Legacy Data Networks over ADSL", September 1999. 523 [TR101] Cohen, A. and E. Shrum, "Migration to Ethernet-Based DSl 524 Aggregation", April 2006. 526 [LLDP] IEEE, "802.1AB, IEEE Standard for Local and Metropolitan 527 area networks, Station and Media Access Control 528 Connectivity Discovery", June 2005. 530 Authors' Addresses 532 James Winterbottom 533 Andrew Corporation 534 PO Box U40 535 University of Wollongong, NSW 2500 536 AU 538 Email: james.winterbottom@andrew.com 540 Martin Thomson 541 Andrew Corporation 542 PO Box U40 543 University of Wollongong, NSW 2500 544 AU 546 Email: martin.thomson@andrew.com 548 Full Copyright Statement 550 Copyright (C) The Internet Society (2006). 552 This document is subject to the rights, licenses and restrictions 553 contained in BCP 78, and except as set forth therein, the authors 554 retain all their rights. 556 This document and the information contained herein are provided on an 557 "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS 558 OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET 559 ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, 560 INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE 561 INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED 562 WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 564 Intellectual Property 566 The IETF takes no position regarding the validity or scope of any 567 Intellectual Property Rights or other rights that might be claimed to 568 pertain to the implementation or use of the technology described in 569 this document or the extent to which any license under such rights 570 might or might not be available; nor does it represent that it has 571 made any independent effort to identify any such rights. Information 572 on the procedures with respect to rights in RFC documents can be 573 found in BCP 78 and BCP 79. 575 Copies of IPR disclosures made to the IETF Secretariat and any 576 assurances of licenses to be made available, or the result of an 577 attempt made to obtain a general license or permission for the use of 578 such proprietary rights by implementers or users of this 579 specification can be obtained from the IETF on-line IPR repository at 580 http://www.ietf.org/ipr. 582 The IETF invites any interested party to bring to its attention any 583 copyrights, patents or patent applications, or other proprietary 584 rights that may cover technology that may be required to implement 585 this standard. Please address the information to the IETF at 586 ietf-ipr@ietf.org. 588 Acknowledgment 590 Funding for the RFC Editor function is provided by the IETF 591 Administrative Support Activity (IASA).