Geopriv J. Winterbottom
Internet-Draft M. Thomson
Intended status: Standards Track Andrew Corporation
Expires: August 29, 2009 H. Tschofenig
Nokia Siemens Networks
R. Barnes
BBN Technologies
February 25, 2009
Use of Target Identity in HTTP-Enabled Location Delivery (HELD)
draft-winterbottom-geopriv-held-identity-extensions-09
Status of This Memo
This Internet-Draft is submitted to IETF in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 29, 2009.
Copyright Notice
Copyright (c) 2009 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents in effect on the date of
publication of this document (http://trustee.ietf.org/license-info).
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document.
Winterbottom, et al. Expires August 29, 2009 [Page 1]
Internet-Draft HELD Identity February 2009
Abstract
When a Location Information Server receives a request for location
information (using the locationRequest message), described in the
base HTTP Enabled Location Delivery (HELD) specification, it uses the
source IP address of arriving message as a pointer to the location
determination process. This is sufficient in environments where a
Target's location can be determined based on its IP address.
Two additional use cases are addresses by this document. In the
first, location configuration requires additional or alternative
identifiers from the source IP address provided in the request. In
the second, an entity other than the Target requests the Target's
location.
This document extends the HELD protocol to allow the location request
message to carry Target identifiers. Privacy and security
considerations describe the conditions where requests containing
identifiers are permitted.
Winterbottom, et al. Expires August 29, 2009 [Page 2]
Internet-Draft HELD Identity February 2009
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1. Applications . . . . . . . . . . . . . . . . . . . . . . . 4
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 5
3. Target Identity . . . . . . . . . . . . . . . . . . . . . . . 5
3.1. Identifier Format and Protocol Details . . . . . . . . . . 6
3.2. Identifiers . . . . . . . . . . . . . . . . . . . . . . . 7
3.2.1. IP Address . . . . . . . . . . . . . . . . . . . . . . 7
3.2.2. MAC Address . . . . . . . . . . . . . . . . . . . . . 7
3.2.3. TCP or UDP Port Number . . . . . . . . . . . . . . . . 8
3.2.4. Network Access Identifier . . . . . . . . . . . . . . 8
3.2.5. URI . . . . . . . . . . . . . . . . . . . . . . . . . 8
3.2.6. Hostname . . . . . . . . . . . . . . . . . . . . . . . 9
3.2.7. Directory Number . . . . . . . . . . . . . . . . . . . 9
3.2.8. Cellular Telephony Identifiers . . . . . . . . . . . . 9
3.2.9. DHCP Unique Identifier . . . . . . . . . . . . . . . . 10
4. XML Schema . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5. Privacy Considerations . . . . . . . . . . . . . . . . . . . . 12
6. Security Considerations . . . . . . . . . . . . . . . . . . . 13
6.1. Location Configuration Protocol Requests . . . . . . . . . 14
6.2. Third Party Requests . . . . . . . . . . . . . . . . . . . 14
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 14
7.1. URN Sub-Namespace Registration for
urn:ietf:params:xml:ns:geopriv:held:id . . . . . . . . . . 14
7.2. XML Schema Registration . . . . . . . . . . . . . . . . . 15
7.3. Registration of HELD 'badIdentifier' Error Code . . . . . 15
8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 15
9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 16
9.1. Normative references . . . . . . . . . . . . . . . . . . . 16
9.2. Informative references . . . . . . . . . . . . . . . . . . 17
Winterbottom, et al. Expires August 29, 2009 [Page 3]
Internet-Draft HELD Identity February 2009
1. Introduction
Protocols for requesting and providing location information require a
way for the requestor to specify the location that should be
returned. In a location configuration protocol (LCP), the location
being requested is the requestor's location. This fact can make the
problem of identifying the Device simpler for LCPs, since IP
datagrams that carry the request already carry an identifier for the
Device, namely the source IP address of an incoming request.
Existing LCPs, such as HELD [I-D.ietf-geopriv-http-location-delivery]
and DHCP ([RFC3825], [RFC4776]) rely on the source IP address, and
possibly lower-layer identifiers to identify a Device.
Aside from the datagrams that form a request, a location information
server (LIS) does not necessarily have access to information that
could further identify the Target. In some circumstances, as shown
in [I-D.ietf-geopriv-l7-lcp-ps], additional identification
information can be included in a request to identify a Target.
This document extends the HELD protocol to support the inclusion of
additional identifiers for the Target in HELD location requests. An
XML schema is defined that provides a structure for including these
identifiers in HELD requests.
An important characteristic of this addition to the HELD protocol is
that is also expands the potential scope of HELD beyond that of an
LCP. The scope of an LCP is limited to the interaction between a
Device and a LIS. That is, an LCP is limited to the Device
retrieving information about their own location. With this addition,
third party location recipients (LRs) are able to make requests that
include identifiers to retrieve location information about a
particular Target.
The usage of HELD for purposes beyond the Device-LIS interaction
obviously introduces a new set of privacy concerns. In an LCP, the
requester is implicitly authorized to access the requested location
information, because it is their own location. In contrast, when a
third party LR requests a Target's location, the LR MUST be
explicitly authorized. Establishing appropriate authorization and
other related privacy concerns are discussed in Section 5.
1.1. Applications
The use of additional identifiers in HELD falls into two categories.
A Device can use these parameters to provide additional
identification information to a LIS. Identification such as the
hardware address of the Device can be used to reduce the time
required to determine the location of the Device. In other cases, a
Winterbottom, et al. Expires August 29, 2009 [Page 4]
Internet-Draft HELD Identity February 2009
LIS might require Device identification before any location
information can be generated.
A third party LR can be granted authorization to make requests for a
given Target. In particular, network services can be permitted to
retrieve location for a Device that is unable to acquire location
information for itself (see Section 6.3 of
[I-D.ietf-ecrit-phonebcp]). This allows use of location-dependent
applications--particularly essential services like emergency
calling--where Devices do not support a location configuration
protocol (LCP) or they are unable to successfully retrieve location
information.
2. Terminology
This document uses the term Location Information Server (LIS) and
location configuration protocol (LCP) as described in
[I-D.ietf-geopriv-l7-lcp-ps].
This document reuses the term Target to refer to the subject of any
request for location information. The term Device is used
specifically as the subject of an LCP, consistent with
[I-D.ietf-geopriv-http-location-delivery]. Both these terms are
defined in [RFC3693].
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
3. Target Identity
Identifiers are used as the starting point in location determination.
They should not be confused with measurement information
([I-D.thomson-geopriv-held-measurements]). Measurement information
is information about a Device and the time varying details of its
network attachment. Identifiers might be associated with a different
Target over time, but the their purpose is to identify the Target,
not to describe its environment or network attachment.
Use of any identifier MUST only be allowed if it uniquely identifies
a single Target. In some circumstances, certain of these identifiers
are either temporary or could potentially identify multiple devices.
Identifiers that are transient or ambiguous could be exploited by an
attacker to either gain information about another device or to obtain
misleading information.
The identifiers described in this section SHOULD only be used where
that identifier is used as the basis for location determination. It
Winterbottom, et al. Expires August 29, 2009 [Page 5]
Internet-Draft HELD Identity February 2009
is tempting for a LIS implementation to allow alternative identifiers
for convenience or some other perceived benefit. However, care needs
to be taken to ensure that the binding between the indicated
identifier and the identifier that is used for location determination
is unique and not subject to attacks.
3.1. Identifier Format and Protocol Details
XML elements are used to express the Target identity. The "target"
element is used as a general container for identity information.
This document defines a basic set of identifiers. An example HELD
request, shown in Figure 1, includes an IP version 4 address.
See RFCXXXX.
END 7.2. XML Schema Registration This section registers an XML schema as per the guidelines in [RFC3688]. URI: urn:ietf:params:xml:schema:geopriv:held:id Registrant Contact: IETF, GEOPRIV working group, (geopriv@ietf.org), James Winterbottom (james.winterbottom@andrew.com). Schema: The XML for this schema can be found as the entirety of Section 4 of this document. 7.3. Registration of HELD 'badIdentifier' Error Code This section registers the "badIdentifier" error code in the "Geopriv HELD Registries, Error codes for HELD" IANA registry. badIdentifier This error code indicates that the Target identifiers used in the HELD request were either: not supported by the LIS, badly formatted, or that the requester was not authorized to make a erquest for that identifier. 8. Acknowledgements The authors wish to thank the NENA VoIP location working group for their assistance in the definition of the schema used in this document. Special thanks go to Barbara Stark, Guy Caron, Nadine Winterbottom, et al. Expires August 29, 2009 [Page 15] Internet-Draft HELD Identity February 2009 Abbott, Jerome Grenier and Martin Dawson. Bob Sherry provided input on use of URIs. Thanks to Adam Muhlbauer and Eddy Corbett for providing further corrections. Bernard Aboba provided extensive feedback on use cases and the security model; Bernard, along with Alan DeKok, also helped resolve an issue with NAIs. Ray Bellis provided motivation for the protocol port parameters. 9. References 9.1. Normative references [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate Requirement Levels", BCP 14, RFC 2119, March 1997. [RFC3315] Droms, R., Bound, J., Volz, B., Lemon, T., Perkins, C., and M. Carney, "Dynamic Host Configuration Protocol for IPv6 (DHCPv6)", RFC 3315, July 2003. [RFC3688] Mealling, M., "The IETF XML Registry", BCP 81, RFC 3688, January 2004. [RFC4282] Aboba, B., Beadles, M., Arkko, J., and P. Eronen, "The Network Access Identifier", RFC 4282, December 2005. [RFC4361] Lemon, T. and B. Sommerfeld, "Node-specific Client Identifiers for Dynamic Host Configuration Protocol Version Four (DHCPv4)", RFC 4361, February 2006. [I-D.ietf-geopriv-http-location-delivery] Barnes, M., Winterbottom, J., Thomson, M., and B. Stark, "HTTP Enabled Location Delivery (HELD)", draft-ietf-geopriv-http- Winterbottom, et al. Expires August 29, 2009 [Page 16] Internet-Draft HELD Identity February 2009 location-delivery-12 (work in progress), January 2009. [I-D.ietf-geopriv-l7-lcp-ps] Tschofenig, H. and H. Schulzrinne, "GEOPRIV Layer 7 Location Configuration Protocol; Problem Statement and Requirements", draft-ietf- geopriv-l7-lcp-ps-09 (work in progress), February 2009. [W3C.REC-xml-names11-20060816] Tobin, R., Layman, A., Bray, T., and D. Hollander, "Namespaces in XML 1.1 (Second Edition)", World Wide Web Consortium Recommendation REC-xml- names11-20060816, August 2006,