idnits 2.17.00 (12 Aug 2021)
/tmp/idnits45636/draft-winterbottom-ecrit-priv-loc-02.txt:
Checking boilerplate required by RFC 5378 and the IETF Trust (see
https://trustee.ietf.org/license-info):
----------------------------------------------------------------------------
No issues found here.
Checking nits according to https://www.ietf.org/id-info/1id-guidelines.txt:
----------------------------------------------------------------------------
No issues found here.
Checking nits according to https://www.ietf.org/id-info/checklist :
----------------------------------------------------------------------------
No issues found here.
Miscellaneous warnings:
----------------------------------------------------------------------------
== The copyright year in the IETF Trust and authors Copyright Line does not
match the current year
-- The document date (October 16, 2012) is 3503 days in the past. Is this
intentional?
Checking references for intended status: Proposed Standard
----------------------------------------------------------------------------
(See RFCs 3967 and 4897 for information about using normative references
to lower-maturity documents in RFCs)
== Unused Reference: 'I-D.ietf-geopriv-deref-protocol' is defined on line
637, but no explicit reference was found in the text
== Unused Reference: 'RFC3629' is defined on line 697, but no explicit
reference was found in the text
== Unused Reference: 'RFC4079' is defined on line 700, but no explicit
reference was found in the text
== Unused Reference: 'RFC5012' is defined on line 708, but no explicit
reference was found in the text
== Unused Reference: 'RFC5774' is defined on line 712, but no explicit
reference was found in the text
== Outdated reference: draft-ietf-ecrit-phonebcp has been published as RFC
6881
== Outdated reference: draft-ietf-geopriv-deref-protocol has been published
as RFC 6753
== Outdated reference: draft-ietf-geopriv-flow-identity has been published
as RFC 6915
== Outdated reference: draft-ietf-geopriv-res-gw-lis-discovery has been
published as RFC 7216
** Downref: Normative reference to an Informational RFC: RFC 5687
** Downref: Normative reference to an Informational RFC: RFC 6443
== Outdated reference: draft-ietf-ecrit-trustworthy-location has been
published as RFC 7378
Summary: 2 errors (**), 0 flaws (~~), 11 warnings (==), 1 comment (--).
Run idnits with the --verbose option for more detailed information about
the items above.
--------------------------------------------------------------------------------
2 ECRIT J. Winterbottom
3 Internet-Draft CommScope
4 Intended status: Standards Track H. Tschofenig
5 Expires: April 19, 2013 Nokia Siemens Networks
6 L. Liess
7 Deutsche Telekom
8 October 16, 2012
10 Out of Jurisdiction Emergency Routing
11 draft-winterbottom-ecrit-priv-loc-02.txt
13 Abstract
15 Some countries and regions require location information be
16 constrained to emergency service applications and do not permit
17 location information to traverse the end-point at all. This document
18 describes the requirements of these countries and provides a solution
19 based on an extension to the HELD location protocol.
21 Status of this Memo
23 This Internet-Draft is submitted in full conformance with the
24 provisions of BCP 78 and BCP 79.
26 Internet-Drafts are working documents of the Internet Engineering
27 Task Force (IETF). Note that other groups may also distribute
28 working documents as Internet-Drafts. The list of current Internet-
29 Drafts is at http://datatracker.ietf.org/drafts/current/.
31 Internet-Drafts are draft documents valid for a maximum of six months
32 and may be updated, replaced, or obsoleted by other documents at any
33 time. It is inappropriate to use Internet-Drafts as reference
34 material or to cite them other than as "work in progress."
36 This Internet-Draft will expire on April 19, 2013.
38 Copyright Notice
40 Copyright (c) 2012 IETF Trust and the persons identified as the
41 document authors. All rights reserved.
43 This document is subject to BCP 78 and the IETF Trust's Legal
44 Provisions Relating to IETF Documents
45 (http://trustee.ietf.org/license-info) in effect on the date of
46 publication of this document. Please review these documents
47 carefully, as they describe your rights and restrictions with respect
48 to this document. Code Components extracted from this document must
49 include Simplified BSD License text as described in Section 4.e of
50 the Trust Legal Provisions and are provided without warranty as
51 described in the Simplified BSD License.
53 Table of Contents
55 1. Introduction and Motivation . . . . . . . . . . . . . . . . . 3
56 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
57 3. Problem Description . . . . . . . . . . . . . . . . . . . . . 5
58 4. Key Observations . . . . . . . . . . . . . . . . . . . . . . . 6
59 5. Available Building Blocks . . . . . . . . . . . . . . . . . . 7
60 6. The Missing Link . . . . . . . . . . . . . . . . . . . . . . . 8
61 6.1. Call Flow . . . . . . . . . . . . . . . . . . . . . . . . 9
62 6.2. Domain Breakdown . . . . . . . . . . . . . . . . . . . . . 10
63 7. HELD Extensions to Support Emergency Routing Information . . . 11
64 7.1. HELD Schema Extension . . . . . . . . . . . . . . . . . . 12
65 7.2. Examples . . . . . . . . . . . . . . . . . . . . . . . . . 13
66 8. Privacy Considerations . . . . . . . . . . . . . . . . . . . . 14
67 9. Security Considerations . . . . . . . . . . . . . . . . . . . 14
68 10. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
69 10.1. URN sub-namespace registration for
70 'urn:ietf:params:xml:ns:geopriv:held:eri' . . . . . . . . 14
71 10.2. XML Schema Registration . . . . . . . . . . . . . . . . . 15
72 11. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
73 12. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
74 12.1. Normative References . . . . . . . . . . . . . . . . . . . 16
75 12.2. Informative References . . . . . . . . . . . . . . . . . . 17
76 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 17
78 1. Introduction and Motivation
80 The Internet emergency calling architecture specified in
81 [I-D.ietf-ecrit-phonebcp] describes two main models for emergency
82 call processing. The first is a device-centric model, where a device
83 obtains location information using a location configuration protocol,
84 such a HELD [RFC5985], and then proceeds to determine the address of
85 the next hop closer to the local PSAP using LoST [RFC5222]. Figure 1
86 shows this model in a simplified form.
88 +---Location Request---+
89 | (1) |
90 +---+----+ +---V---+
91 | |<--Location--| LIS |
92 | Caller | (2) +-------+ +--------+
93 | | | ESRP/ |
94 | |----Find Service-------+ | PSAP |
95 +------^-+ (3) | +--------+
96 | | +--------V----+ ^
97 | +-----Service----| LoST Server | |
98 | (4) +-------------+ +---+---+
99 +-------------Call Initiation------------>| VSP |
100 (5) +-------+
102 Figure 1: Device-Centric Emergency Services Model
104 With the ever increasing deployment of smart phones and tablet
105 devices a variation of the device-centric model is the ability to use
106 location available to the device for routing and then consult a LIS
107 when location is needed for dispatch. Location can come in various
108 forms to the device, e.g., from GPS, third party location databases,
109 as well as IP-to-geolocation services.
111 The second approach is a softswitch-centric model, where a device
112 initiates and emergency call and the serving softswitch detects that
113 the call is an emergency and initiates retrieving the caller's
114 location from a Location Information Server (LIS) using HELD
115 [RFC5985] with identity extensions [RFC6155] and then determining the
116 route to the local PSAP using LoST [RFC5222]. Figure 2 shows the
117 high-level protocol interactions.
119 +---Location Request---+
120 | (2) |
121 +---V---+ |
122 | LIS | |
123 +----+--+ +----+----+
124 | | |
125 +----Location--->| Soft |
126 +--------+ (3) | Switch |
127 | Caller |------Call Initiation------------> | |
128 +--------+ (1) +-+-^---+-+
129 +-------------+ | | |
130 | LoST Server |<-Find Service--+ | |
131 +------+------+ (4) | |
132 | | |
133 +----------Service--------+ |
134 (5) |
135 +-----------+ |
136 | ESRP/PSAP |<------Call----+
137 +-----------+ (6)
139 Figure 2: Softswitch-Centric Calling Model
141 In the softswitch-centric model when a VSP receives an emergency call
142 it will encounter several difficulties. The first hurdle is for the
143 VSP to determine the correct LIS to ask for location information.
144 Having obtained the location, the VSP must then determine the correct
145 PSAP using a LoST server and this requires wide-spread deployment of
146 forest guides. This leads to a failure in the softswitch-centric
147 approach to deliver emergency calls correctly because the VSP is
148 unable to determine the correct PSAP to route the call to. The
149 softswitch-centric model should therefore seen only as a transition
150 architecture towards the end-device model where end devices have not
151 been upgraded. Software updates of end devices are, however, not a
152 problem anymore since software updates have to be provided to end
153 devices on a regular basis to patch security vulnerabilities. Any
154 service provider that does not have an ability to update devices will
155 not only put their own customers at risk but also other Internet
156 users as well since those can become the victims of attacks as well.
158 2. Terminology
160 The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
161 "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
162 document are to be interpreted as described in [RFC2119].
164 The terms LIS, ESRP, VSP and PSAP are used as defined in [RFC6443].
166 The term "Access Network Provider" is used as defined in [RFC5687]
167 and incompasses both the Internet Access Provider (IAP) and Internet
168 Service Provider (ISP).
170 3. Problem Description
172 There is a significant faction in the emergency services and the
173 regulatory community that do not want to rely on emergency calls
174 solutions with end-device provided location. This includes location
175 information that is determined by the network but subsequently
176 traverses the end-point prior to being delivered to the emergency
177 organization.
179 There are two concerns:
181 Security: One concern is about the possibility of the software of
182 the end device being able to tamper with location. This can lead
183 to denial of service attacks against the emergency services
184 infrastructure. [I-D.ietf-ecrit-trustworthy-location] describes
185 these concerns in detail.
187 Privacy: There is the desire to allow location information to be
188 provided to emergency organizations rather than any other party,
189 including the end device or a VSP. In the softswitch model the
190 VSP would have to ask the access provider for location
191 information. However, the number of VSPs asking for location
192 information could, at least in theory depending on the scope of
193 emergency services regulation be very large and is likely to
194 include VSPs that are located in a jurisdiction that is different
195 from the one of the access network provider. Allowing VSPs to ask
196 for location information of end devices at access network
197 providers in a third party fashion without the ability to present
198 the user's consent or the emergency service nature calls for
199 privacy problems. [RFC6155] discusses some of these privacy
200 challenges as part of the third party requests.
202 These arguments may, however, also jacked into place to hide another
203 reason, namely the desire to create an artifical relationship between
204 the VSP and the access network provider. [RFC6444] provides a
205 problem description and [I-D.ietf-ecrit-rough-loc] even offers a
206 solution based on rough location. This solutions, however, requires
207 the access network provider to compute these rough location shapes.
208 Countries that have a large number of PSAPs and neither an ESRP nor a
209 stage-1 PSAP architecture may encounter problems computing these
210 shapes.
212 The Internet calling model does not constrain the call to a single
213 jurisdictional boundary nor does it assume that the Voice Service
214 provider (VSP) role is provided by the access provider. This allows
215 the VSP to be located anywhere on the Internet without requiring any
216 association with Internet access providers.
218 +----------------+ +----------------+ +----------------+
219 | Jurisdiction 1 | | Jurisdiction 2 | | Jurisdiction 3 |
220 | | | | | |
221 | | | | | |
222 | +--------------+--+----------------+--+--------------+ |
223 | | EMERGENCY CALL CENTRES | |
224 | +--------------+--+----------------+--+--------------+ |
225 | ^ ^ ^ | | | | |
226 | | | | | | | | |
227 | +-----+ | | | | +-----+ | | +-----+ |
228 | | VSP | | +--------| VSP | | | | VSP | |
229 | +--^--+ | | | +---^-+ | | +-----+ |
230 | | | | | | | | |
231 | +--------+-----+--+-------+--------+--+--------------+ |
232 | | | | | INTERNET | |
233 | +--------+-----+--+-----+----------+--+--------------+ |
234 | | | | | | | | |
235 | +--------+-----+--+-------+--------+--+--------------+ |
236 | | | | ACCESS | NETWORKS | |
237 | +--------------+--+-------+--------+--+--------------+ |
238 | | | | | | | | |
239 | | | +-------------+ | | |
240 | | | | | | | | |
241 | +------------+ | | | | |
242 | | EMERGENCY | | | | | |
243 | | CALLS | | | | | |
244 | +------------+ | | | | |
245 | +--------+-----+--+-----+----------+--+--------------+ |
246 | | | | DEVICES | |
247 | +--------------+--+-----+----------+--+--------------+ |
248 | | | | | |
249 +----------------+ +----------------+ +----------------+
250 e.g US State e.g. Australia e.g. European
251 Country
253 Figure 3: Internet Calling Models
255 4. Key Observations
257 When these security and privacy requirements are taken into
258 consideration then the emergency calling architecture and associated
259 procedures described in [I-D.ietf-ecrit-phonebcp] and [RFC6443]
260 require some adaptation in some configurations to ensure universal
261 operation. The softswitch model fails to meet the privacy
262 requirements and the end-device model has to wrangle with security
263 challenges.
265 Several observations have been posed thus far:
267 Problem#1: Rough location information is required to route emergency
268 calls.
270 Problem#2: The VSP needs the ability to determine the correct LIS to
271 retrieve location information.
273 Problem#3: The VSP needs the ability to contact a LoST server to
274 acquire routing information from.
276 Problem#4: The end host does not acquire or convey location to the
277 emergency network.
279 Problem#5: Access network provider aim to provide location only to
280 emergency service authorities.
282 Problem#6: Precise location information is required to dispatch
283 first responders.
285 5. Available Building Blocks
287 To fulfill A number of building blocks are already available. There
288 is no need to start from a clean sheet.
290 Location: Location standards have existed for mobile cellular
291 networks since the mid to late 1990s, and location standards for
292 the Internet have existed since the mid to late 2000s. The exact
293 determination techniques for each access technology are different
294 but the ability to direct communications across a communications
295 network is inherenetly premised on being able to reach a specific
296 device and this requires some knowledge of where the device is
297 physically located. The term Location Information Server (LIS) is
298 used to identify the element in an access network responsible for
299 providing the location of a device in its administrative domain.
300 LIS service discovery techniques are described in [RFC5986] and
301 [I-D.ietf-geopriv-res-gw-lis-discovery].
303 Call Routing: The LoST protocol [RFC5222] specifies a means to map
304 location and service information into a destination URI. Next
305 generation emergency services architectures and procedures, such
306 as those defined in [RFC6443], NENA i3, and the EENA NG112
307 document, use LoST for providing routing to local emergency
308 service authorities. LoST servers are discovered using DNS
309 U-NAPTR [RFC4848] to obtain a service URI. The discovered LoST
310 server services the domain in which the device is resident, or is
311 able to provide the identity of a LoST server that can service the
312 request. A access network provider that operates in an area
313 capable of receiving next generation emergency calls is able to
314 include a U-NAPTR record in their DNS servers that identifies the
315 local serving LoST server able to resolve emergency routing
316 requests.
318 LIS Discovery: [I-D.ietf-geopriv-res-gw-lis-discovery] provides a
319 means for discovering a LIS based on the IP address of a device
320 and this could be used in conjunction with [RFC6155] to provide a
321 solution to problem 2. The domain name discovered for the LIS
322 could be reused to discover the correct LoST server to contact
323 thereby solving problem 3.
325 6. The Missing Link
327 Problem 5 does not allow the LIS to provide location information
328 except to emergency authorities, and while the HELD protocol
329 [RFC5985] does allow a location URI to be returned to the requesting
330 entitiy, the LoST protocol [RFC5222] requires a location value and
331 does not support a location reference.
333 One possible solution to problem 5 is to extend LoST to support a
334 location URI in the findService request method. In this case a VSP
335 would detect that a device was making an emergency call, determine
336 the correct LIS to contact using
337 [I-D.ietf-geopriv-res-gw-lis-discovery], contact the LIS using HELD
338 [RFC5985] using the IP address of the calling device as an identity
339 extension [RFC6155] and the LIS would respond with a location URI
340 that requires client-side authentication for dereferencing Using the
341 LIS domain identifier the VSP would then determine the correct LoST
342 server and request emergency services using the location URI as the
343 location reference. The LoST server must have permission to
344 dereference the location URI, if any form of recurision is
345 encountered then the URI must be dereferenced multiple times
346 increasing the likelihood of failure.
348 An alternative approach is to leave LoST unchanged, but extend the
349 HELD protocol and requirements of the local LIS. In this solution,
350 when the LIS receives the third-party request, it performs the
351 necessary LoST request using the location of the device. The LIS
352 responds with a location URI and the destination URI of the correct
353 emergency service authority. The Location URI will only yield
354 location information to the authorized emergency authority. This
355 solution addresses problem 1 problem 3, problem 4, problem 5.
356 Problem 2 is solved using a combination of
357 [I-D.ietf-geopriv-res-gw-lis-discovery] and HELD with identity
358 extensions.
360 6.1. Call Flow
362 1. Device initiates an emergency call to the user's VSP
364 2. The VSP's proxy detects emergency call and uses IP address to
365 determine the correct LIS to query using
366 [I-D.ietf-geopriv-res-gw-lis-discovery].
368 3. The VSP queries the LIS using HELD and the IP address of the
369 calling device as an identity extension.
371 4. The LIS determines the location and uses it request routing
372 information for the local LoST server.
374 5. The LIS return a location URI and the local Emergency Service
375 Routing Proxy (ESRP) URI to the VSP.
377 6. The VSP follows the guidance from [I-D.ietf-ecrit-phonebcp] and
378 routes the call to the ESRP.
380 7. The ESRP authenticates itself with the LIS when it dereferences
381 the location URI.
383 8. The returns location information to the ESRP allowing it route
384 the call to the correct PSAP.
386 +------(2)Find LIS-----+
387 | |
388 +---V---+ |
389 | DNS | |
390 +----+--+ +----+---------+
391 | | |
392 +----LIS URI---->| |
393 +--------+ | VSP |
394 | Caller |------(1)-Call Initiation--------> | |
395 +--------+ +-+--^-------+-+
396 | | |
397 +-------------+ | | |
398 | |<------(3)-locationReq(IP)-------+ | |
399 | LIS | | |
400 | |--(5)-locationResp(locURI,EcrfURI)--+ |
401 +-+--^---+--^-+ |
402 | | | | +-------------+ |
403 | | | +-----Service----+ | |
404 | | | | LoST Server | |
405 | | +-(4)-Find Service->| | |
406 | | +-------------+ |
407 | | |
408 | | +-----------+ |
409 | +--(7)-locReq(Auth)--+ | |
410 | | ESRP/PSAP |<--(6)-Call(locURI)-+
411 +---(8)-locResp(Loc)--->| |
412 +-----------+
414 Figure 4: Modified Softswitch-Centric Emergency Call Flow
416 6.2. Domain Breakdown
418 The key advantage of the call flow show in Section 6.1 is that it
419 separates the entities into two clear groups, those that are inside
420 the regulatory emergency jurisdiction and those that are in the
421 Internet. This is evident in Figure 5.
423 +------(2)Find LIS-----+
424 | |
425 +---V---+ |
426 | DNS | |
427 +----+--+ +----+---------------+
428 | | |
429 +----LIS URI---->| |
430 | VSP |
431 | |
432 +-^---+----^-------+-+
433 I N T E R N E T | | | |
434 =========================================|===|====|=======|===
435 LOCAL JURISDICTION | | | |
436 +--------+ | | | |
437 | Caller |------(1)-Call Initiation------+ | | |
438 +--------+ | | |
439 | | |
440 +-------------+ | | |
441 | |<------(3)-locationReq(IP)-----+ | |
442 | LIS | | |
443 | |--(5)-locationResp(locURI,EcrfURI)--+ |
444 +-+--^---+--^-+ |
445 | | | | +-------------+ |
446 | | | +-----Service----+ | |
447 | | | | LoST Server | |
448 | | +-(4)-Find Service->| | |
449 | | +-------------+ |
450 | | |
451 | | +-----------+ |
452 | +--(7)-locReq(Auth)--+ | |
453 | | ESRP/PSAP |<--(6)-Call(locURI)-+
454 +---(8)-locResp(Loc)--->| |
455 +-----------+
457 Figure 5: Emergency Call Domains
459 7. HELD Extensions to Support Emergency Routing Information
461 Figure 4 describes the enhancements needed to support the new calling
462 model. Since the VSP has no means of determining if the LIS in the
463 access network supports this modified calling model or not, there is
464 no need to modify the syntax of locationRequest message sent to the
465 LIS. The location request MUST include a responseTime of
466 emergencyRouting to ensure that the LIS provides a response to the
467 VSP as quickly as possible. When using IP related information
468 identify the UA to the LIS then the identify information MUST be
469 expressed using the IP flow representation specified in
470 [I-D.ietf-geopriv-flow-identity]. This approach ensures that any
471 issues caused by address translation entities in the path can be
472 mitigated as far as possible. It also supports the LIS returning a
473 location allowing invocation of the standard switch-centric calling
474 procedures. A new optional "emergencyRoutingInformation" element is
475 added to the locationResponse message containing the relevant
476 destination URLs.
478 The list of destination URLs provided in the
479 "emergencyRoutingInformation" element MUST conform to the same
480 contraints as the service URLs returned in the LoST [RFC5222] in the
481 findServiceResponse. For clarity these constraints are repreated
482 here:
484 1. The URLs MUST be absolute URLs
486 2. The ordering of the URLs has no particular significance
488 3. Each URL scheme MUST only appear at most once
490 4. It is permissible to include both secured and regular versions of
491 a protocol
493 7.1. HELD Schema Extension
495 This section describes the schema extension to HELD.
497
498
505
506
507
508
509
510
512
514
515
516
517
518
520
522 7.2. Examples
524 Figure 6 illustrates a example that contains IP
525 flow information in the request.
527
529
531
532 192.168.1.1
533 1024
534
535
536 10.0.0.1
537 80
538
539
540
542 Figure 6: Example Location Request.
544 Figure 7 illustrates the message containing two
545 location URIs: a HTTPS and a SIP URI. Additionally, the response
546 contains routing information.
548
549
550
551 https://ls.example.com:9768/357yc6s64ceyoiuy5ax3o
552
553
554 sip:9769+357yc6s64ceyoiuy5ax3o@ls.example.com
555
556
558
560 sip:nypd@example.com
561 sips:nypd@example.com
562 xmpp:nypd@example.com
563
565
567 Figure 7: Example Location Response
569 8. Privacy Considerations
571 [[TBD.]]
573 9. Security Considerations
575 [[TBD.]]
577 10. IANA Considerations
579 10.1. URN sub-namespace registration for
580 'urn:ietf:params:xml:ns:geopriv:held:eri'
582 This document calls for IANA to register a new XML namespace, as per
583 the guidelines in [RFC3688].
585 URI: urn:ietf:params:xml:ns:geopriv:held:eri
587 Registrant Contact: IETF, ECRIT working group (ecrit@ietf.org),
588 James Winterbottom (james.winterbottom@commscope.com).
590 XML:
592 BEGIN
593
594
596
597
598 HELD Emergency Routing Information Extensions
599
600
601 Additional Element for HELD Emergency Routing Information
602 urn:ietf:params:xml:ns:geopriv:held:eri
603 [[NOTE TO IANA/RFC-EDITOR: Please update RFC URL and replace XXXX
604 with the RFC number for this specification.]]
605 See RFCXXXX.
606
607
608 END
610 10.2. XML Schema Registration
612 This section registers an XML schema as per the procedures in
613 [RFC3688].
615 URI: urn:ietf:params:xml:schema:geopriv:held:eri
617 Registrant Contact: IETF, ECRIT working group, (ecrit@ietf.org),
618 James Winterbottom (james.Winterbottom@commscope.com).
620 The XML for this schema can be found as the entirety of
621 Section 7.1 of this document.
623 11. Acknowledgements
625 We would like to thank Wilfried Lange for sharing his views with us.
626 We would also like to thank Bruno Chatras for his review comments.
628 12. References
629 12.1. Normative References
631 [I-D.ietf-ecrit-phonebcp]
632 Rosen, B. and J. Polk, "Best Current Practice for
633 Communications Services in support of Emergency Calling",
634 draft-ietf-ecrit-phonebcp-20 (work in progress),
635 September 2011.
637 [I-D.ietf-geopriv-deref-protocol]
638 Winterbottom, J., Tschofenig, H., Schulzrinne, H., and M.
639 Thomson, "A Location Dereferencing Protocol Using HELD",
640 draft-ietf-geopriv-deref-protocol-07 (work in progress),
641 July 2012.
643 [I-D.ietf-geopriv-flow-identity]
644 Bellis, R., "Flow Identity Extension for HELD",
645 draft-ietf-geopriv-flow-identity-00 (work in progress),
646 September 2012.
648 [I-D.ietf-geopriv-res-gw-lis-discovery]
649 Thomson, M. and R. Bellis, "Location Information Server
650 (LIS) Discovery using IP address and Reverse DNS",
651 draft-ietf-geopriv-res-gw-lis-discovery-04 (work in
652 progress), September 2012.
654 [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
655 Requirement Levels", BCP 14, RFC 2119, March 1997.
657 [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688,
658 January 2004.
660 [RFC5222] Hardie, T., Newton, A., Schulzrinne, H., and H.
661 Tschofenig, "LoST: A Location-to-Service Translation
662 Protocol", RFC 5222, August 2008.
664 [RFC5687] Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7
665 Location Configuration Protocol: Problem Statement and
666 Requirements", RFC 5687, March 2010.
668 [RFC5985] Barnes, M., "HTTP-Enabled Location Delivery (HELD)",
669 RFC 5985, September 2010.
671 [RFC5986] Thomson, M. and J. Winterbottom, "Discovering the Local
672 Location Information Server (LIS)", RFC 5986,
673 September 2010.
675 [RFC6155] Winterbottom, J., Thomson, M., Tschofenig, H., and R.
676 Barnes, "Use of Device Identity in HTTP-Enabled Location
677 Delivery (HELD)", RFC 6155, March 2011.
679 [RFC6443] Rosen, B., Schulzrinne, H., Polk, J., and A. Newton,
680 "Framework for Emergency Calling Using Internet
681 Multimedia", RFC 6443, December 2011.
683 12.2. Informative References
685 [I-D.ietf-ecrit-rough-loc]
686 Barnes, R. and M. Lepinski, "Using Imprecise Location for
687 Emergency Context Resolution",
688 draft-ietf-ecrit-rough-loc-05 (work in progress),
689 July 2012.
691 [I-D.ietf-ecrit-trustworthy-location]
692 Tschofenig, H., Schulzrinne, H., and B. Aboba,
693 "Trustworthy Location Information",
694 draft-ietf-ecrit-trustworthy-location-03 (work in
695 progress), April 2012.
697 [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
698 10646", STD 63, RFC 3629, November 2003.
700 [RFC4079] Peterson, J., "A Presence Architecture for the
701 Distribution of GEOPRIV Location Objects", RFC 4079,
702 July 2005.
704 [RFC4848] Daigle, L., "Domain-Based Application Service Location
705 Using URIs and the Dynamic Delegation Discovery Service
706 (DDDS)", RFC 4848, April 2007.
708 [RFC5012] Schulzrinne, H. and R. Marshall, "Requirements for
709 Emergency Context Resolution with Internet Technologies",
710 RFC 5012, January 2008.
712 [RFC5774] Wolf, K. and A. Mayrhofer, "Considerations for Civic
713 Addresses in the Presence Information Data Format Location
714 Object (PIDF-LO): Guidelines and IANA Registry
715 Definition", BCP 154, RFC 5774, March 2010.
717 [RFC6444] Schulzrinne, H., Liess, L., Tschofenig, H., Stark, B., and
718 A. Kuett, "Location Hiding: Problem Statement and
719 Requirements", RFC 6444, January 2012.
721 Authors' Addresses
723 James Winterbottom
724 CommScope
725 Suit 1, Level 2
726 iC Enterprise 1, Innovation Campus
727 Squires Way
728 North Wollongong, NSW 2500
729 AU
731 Phone: +61 242 212938
732 Email: james.winterbottom@commscope.com
734 Hannes Tschofenig
735 Nokia Siemens Networks
736 Linnoitustie 6
737 Espoo 02600
738 Finland
740 Phone: +358 (50) 4871445
741 Email: Hannes.Tschofenig@gmx.net
742 URI: http://www.tschofenig.priv.at
744 Laura Liess
745 Deutsche Telekom Networks
746 Deutsche Telekom Allee 7
747 Darmstadt, Hessen 64295
748 Germany
750 Phone:
751 Email: L.Liess@telekom.de
752 URI: http://www.telekom.de