From ecrit-bounces@ietf.org  Wed Apr 13 16:59:42 2005
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA06987;
	Wed, 13 Apr 2005 16:59:42 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DLp7U-0004Jl-DB; Wed, 13 Apr 2005 17:09:56 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DLow6-0003pt-EQ; Wed, 13 Apr 2005 16:58:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DLow5-0003e4-Rh
	for ecrit@megatron.ietf.org; Wed, 13 Apr 2005 16:58:09 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA06795
	for <ecrit@ietf.org>; Wed, 13 Apr 2005 16:57:36 -0400 (EDT)
Received: from goliath.siemens.de ([192.35.17.28])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DLp5Q-0004GB-9D
	for ecrit@ietf.org; Wed, 13 Apr 2005 17:07:49 -0400
Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11])
	by goliath.siemens.de (8.12.6/8.12.6) with ESMTP id j3DKvSYj026019
	for <ecrit@ietf.org>; Wed, 13 Apr 2005 22:57:28 +0200
Received: from mchp9daa.mch.sbs.de (mchp9daa.mch.sbs.de [139.25.137.99])
	by mail2.siemens.de (8.12.6/8.12.6) with ESMTP id j3DKvS3O011578
	for <ecrit@ietf.org>; Wed, 13 Apr 2005 22:57:28 +0200
Received: by mchp9daa.mch.sbs.de with Internet Mail Service (5.5.2657.72)
	id <2SQ5JXDX>; Wed, 13 Apr 2005 22:57:28 +0200
Message-ID: <D2E490BD3F24C24598C4605E40024D151890E2@mchp9gma.mch.sbs.de>
From: Tschofenig Hannes <hannes.tschofenig@siemens.com>
To: "'ecrit@ietf.org'" <ecrit@ietf.org>
Date: Wed, 13 Apr 2005 22:55:06 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ea4ac80f790299f943f0a53be7e1a21a
Subject: [Ecrit] Announcement of Joint GEOPRIV/ECRIT Interim Meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: bb8f917bb6b8da28fc948aeffb74aa17

The GEOPRIV and ECRIT working groups will be holding a joint interim 
meeting.

       What: Interim GEOPRIV/ECRIT meeting
       When: 2005 May 16 08:30-17:30
             2005 May 17 08:30-17:30
             2005 May 18 08:30-17:30
      Where: Columbia University
             Dept. of Computer Science
             450 Computer Science Bldg.
             1214 Amsterdam Avenue (close to 120th St.)
             New York, NY 10027
Directions: http://www.cs.columbia.edu/directions.html
       Also: WiFi provided.
             Teleconference to be provided.
      Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
             Early bookings recommended.

Proposed GEOPRIV Agenda:
   2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in 
HTTP/HTML for web browsing.
2) Properties of network elements in transferring LI from layer 2 
upward to PIDF-LO.
3) Proposed enhancements to PIDF-LO to support #2.

Proposed ECRIT Agenda:
   2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
1) Emergency Call Routing Requirements
2) Security and Threats Analysis

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit


From ecrit-bounces@ietf.org  Thu Apr 14 09:59:51 2005
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA13718;
	Thu, 14 Apr 2005 09:59:51 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DM52r-0000Ck-7S; Thu, 14 Apr 2005 10:10:13 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DM4q2-000508-KO; Thu, 14 Apr 2005 09:56:58 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DM4JV-0007gR-A4
	for ecrit@megatron.ietf.org; Thu, 14 Apr 2005 09:23:21 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA10449
	for <ecrit@ietf.org>; Thu, 14 Apr 2005 09:23:11 -0400 (EDT)
Received: from ihemail1.lucent.com ([192.11.222.161])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DM4TM-00072U-Oa
	for ecrit@ietf.org; Thu, 14 Apr 2005 09:33:33 -0400
Received: from nl0006exch001h.wins.lucent.com (h135-85-76-62.lucent.com
	[135.85.76.62])
	by ihemail1.lucent.com (8.12.11/8.12.11) with ESMTP id j3EDN1dq014756
	for <ecrit@ietf.org>; Thu, 14 Apr 2005 08:23:02 -0500 (CDT)
Received: by nl0006exch001h.nl.lucent.com with Internet Mail Service
	(5.5.2657.72) id <26JFMFG9>; Thu, 14 Apr 2005 15:23:00 +0200
Message-ID: <7D5D48D2CAA3D84C813F5B154F43B1550577DB48@nl0006exch001u.nl.lucent.com>
From: "Bemmel, Jeroen van (Jeroen)" <jbemmel@lucent.com>
To: "'ecrit@ietf.org'" <ecrit@ietf.org>
Date: Thu, 14 Apr 2005 15:23:00 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
X-Spam-Score: 0.6 (/)
X-Scan-Signature: 31b28e25e9d13a22020d8b7aedc9832c
X-Mailman-Approved-At: Thu, 14 Apr 2005 09:56:57 -0400
Subject: [Ecrit] Emergency location alternative: outbound proxy adding
	location in formation
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0212997346=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org
X-Spam-Score: 0.6 (/)
X-Scan-Signature: 7268a2980febc47a9fa732aba2b737ba

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0212997346==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C540F5.143F5B0E"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C540F5.143F5B0E
Content-Type: text/plain;
	charset="iso-8859-1"

Hello,
 
I have been reading the sipping-emergency architecture draft (  <http://www.ietf.org/internet-drafts/draft-schulzrinne-sipping-emergency-arch-02.txt> http://www.ietf.org/internet-drafts/draft-schulzrinne-sipping-emergency-arch-02.txt ) authored by this charter and I have a question / suggestion to share. This may have been discussed before, if so I apologize for the repitition
 
We are currently working on emergency services in the context of an enterprise WiFi environment. In such an environment, we figured it could help if a SIP proxy with some knowledge on the proximity of the user (e.g. within the same building, connected to the same LAN) would add information to outgoing emergency calls to assist with locating the user.
 
The proxy could add a header, e.g.: Emergency-Location: lat=1.2345; long=6.789; postal=xxxx; certainty=500m
It should probably also refer to the source of this information, e.g. the URI of the responsible administrator. This location information could be preconfigured in the proxy. 
 
A second issue is that the proxy could be provisioned with the address of the emergency center to contact for emergency calls. In that case the location information would not be needed for call routing
 
I noted that the current draft does not mention these alternatives, it talks mainly about things that can be done at the terminal side. 
 
I would argue that in case of emergency all information that can assist in locating the user can be helpful. So it would be wise to do "as much as possible", i.e. both have the terminal report its location if possible and have the proxy append information too.
 
>From a privacy perspective I understand there could be objections to this approach, i.e. the user's location is given out without the user's consent. I would say that in case the user is making an emergency call, he should know that it implies he will give out his location information. Furthermore, given the nature of emergency situations which by definition are "life and limb threatening" I would say that users generally would take the risk that their location information ends up in the wrong hands, rather than not share it and risk death.
 
Regards,
 
Jeroen van Bemmel, Lucent Technologies Bell Labs

------_=_NextPart_001_01C540F5.143F5B0E
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">


<META content=3D"MSHTML 6.00.2800.1499" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D423590713-14042005>Hello,</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D423590713-14042005></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><SPAN =

style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">I have been reading the=20
sipping-emergency architecture draft ( </SPAN><A=20
href=3D"http://www.ietf.org/internet-drafts/draft-schulzrinne-sipping-em=
ergency-arch-02.txt"><FONT=20
face=3DArial color=3D#0000ff size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">http://www.ietf.org/internet-drafts/draft-schulzrinne-sipping-eme=
rgency-arch-02.txt</SPAN></FONT></A><FONT=20
face=3DArial size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">&nbsp;)=20
authored by this charter and I have a question / suggestion to share. =
This may=20
have been discussed before, if so I apologize for the=20
repitition</SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">We are =
currently=20
working on emergency services in the context of an enterprise WiFi =
environment.=20
In such an environment, we figured it could help if a SIP proxy with =
some=20
knowledge on the proximity of the user (e.g. within the same building, =
connected=20
to the same LAN) would add information to outgoing emergency calls to =
assist=20
with locating the user.</SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial"></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">The proxy =
could add a=20
header, e.g.: </SPAN></FONT></SPAN></FONT><FONT face=3DArial =
size=3D2><SPAN=20
class=3D423590713-14042005><FONT face=3DArial size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT =
size=3D2>Emergency-Location:=20
lat=3D1.2345; long=3D6.789; postal=3Dxxxx;=20
certainty=3D500m</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial">It should =
probably also=20
refer to the source of this information, e.g. the URI of the =
responsible=20
administrator. </SPAN></FONT></SPAN></FONT><FONT face=3DArial =
size=3D2><SPAN=20
class=3D423590713-14042005><FONT face=3DArial size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT size=3D2>This =
location=20
information could be preconfigured in the proxy.=20
</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2></FONT></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Arial">A&nbsp;second issue is=20
that the proxy </SPAN></FONT></SPAN></FONT><FONT face=3DArial =
size=3D2><SPAN=20
class=3D423590713-14042005><FONT face=3DArial size=3D2><SPAN=20
style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT size=3D2>could be =
provisioned=20
with the address of the emergency center to contact for emergency =
calls. In that=20
case the location information would not be needed for call=20
routing</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2></FONT></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT =
size=3D2>I noted=20
that the current draft does not mention these alternatives, it talks =
mainly=20
about things that can be done at the terminal side.=20
</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2></FONT></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT =
size=3D2>I would=20
argue that in case of emergency all information that can assist in =
locating the=20
user can be helpful. So it would be wise to do "as much as possible", =
i.e. both=20
have the terminal report its location if possible and have the proxy =
append=20
information too.</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2></FONT></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT =
size=3D2>From a=20
privacy perspective I understand there could be objections to this =
approach,=20
i.e. the user's location is given out without the user's consent. I =
would say=20
that in case the user is making an emergency call, he should know that =
it=20
implies he will give out his location information. Furthermore, given =
the nature=20
of emergency situations which by definition are "life and limb =
threatening" I=20
would say that users generally would take the risk that their location=20
information ends up in the wrong hands, rather than not share it =
and&nbsp;risk=20
death.</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2></FONT></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2>Regards,</FONT></SPAN></FONT></SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT=20
size=3D2></FONT></SPAN></FONT></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D423590713-14042005><FONT =
face=3DArial=20
size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: Arial"><FONT =
size=3D2>Jeroen van=20
Bemmel, Lucent Technologies Bell=20
Labs</DIV></FONT></SPAN></FONT></SPAN></FONT></BODY></HTML>

------_=_NextPart_001_01C540F5.143F5B0E--


--===============0212997346==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
Content-Transfer-Encoding: 7bit

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0212997346==--



From ecrit-bounces@ietf.org  Thu Apr 14 11:47:11 2005
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA25907;
	Thu, 14 Apr 2005 11:47:11 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DM6ij-0005BI-RL; Thu, 14 Apr 2005 11:57:35 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DM6Sx-0000Qb-Vd; Thu, 14 Apr 2005 11:41:15 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DM6Sv-0000Q1-EB
	for ecrit@megatron.ietf.org; Thu, 14 Apr 2005 11:41:14 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA25420
	for <ecrit@ietf.org>; Thu, 14 Apr 2005 11:41:02 -0400 (EDT)
Received: from sj-iport-3-in.cisco.com ([171.71.176.72]
	helo=sj-iport-3.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DM6cm-0004rZ-Ci
	for ecrit@ietf.org; Thu, 14 Apr 2005 11:51:26 -0400
Received: from sj-core-5.cisco.com (171.71.177.238)
	by sj-iport-3.cisco.com with ESMTP; 14 Apr 2005 08:40:38 -0700
X-IronPort-AV: i="3.92,102,1112598000"; 
	d="scan'208"; a="249685006:sNHT1308945624"
Received: from wells.cisco.com (wells.cisco.com [171.71.177.223])
	by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id j3EFeSfk011785;
	Thu, 14 Apr 2005 08:40:29 -0700 (PDT)
Received: from jmpolk-w2k01.diablo.cisco.com (ssh-sjc-1.cisco.com
	[171.68.225.134]) by wells.cisco.com (8.8.6
	(PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id IAA13579;
	Thu, 14 Apr 2005 08:40:28 -0700 (PDT)
Message-Id: <4.3.2.7.2.20050414103237.03433bf0@localhost>
X-Sender: jmpolk@localhost
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Thu, 14 Apr 2005 10:40:31 -0500
To: "Bemmel, Jeroen van (Jeroen)" <jbemmel@lucent.com>,
        "'ecrit@ietf.org'" <ecrit@ietf.org>
From: "James M. Polk" <jmpolk@cisco.com>
Subject: Re: [Ecrit] Emergency location alternative: outbound proxy
	adding location in formation
In-Reply-To: <7D5D48D2CAA3D84C813F5B154F43B1550577DB48@nl0006exch001u.nl
	.lucent.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 1.1 (+)
X-Scan-Signature: 9ed51c9d1356100bce94f1ae4ec616a9
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org
X-Spam-Score: 1.1 (+)
X-Scan-Signature: 769a46790fb42fbb0b0cc700c82f7081

At 03:23 PM 4/14/2005 +0200, Bemmel, Jeroen van (Jeroen) wrote:

>
>The proxy could add a header, e.g.: Emergency-Location: lat=1.2345; 
>long=6.789; postal=xxxx; certainty=500m
>It should probably also refer to the source of this information, e.g. the 
>URI of the responsible administrator. This location information could be 
>preconfigured in the proxy.

Adding "location" as a header has been in SIPPING for a few years as a 
discussion point of the ID
http://www.ietf.org/internet-drafts/draft-ietf-sipping-location-requirements-02.txt

and has been dismissed by the WG and the Transport Area Director.

I am moving that ID over to SIP very shortly (because it is actually 
modifying the protocol slightly), and you're welcome to start another 
thread about this there. It should appear there within a week.

>
>A second issue is that the proxy could be provisioned with the address of 
>the emergency center to contact for emergency calls.

My proxy can always be in Dallas, though I might be traveling in Europe and 
call 911.  This is one of the points that's made when folks say "you can 
never rely on the location of the proxy relative to where the UAC/user is". 
There really is no bind between the two.

>
>Regards,
>
>Jeroen van Bemmel, Lucent Technologies Bell Labs
>_______________________________________________
>Ecrit mailing list
>Ecrit@ietf.org
>https://www1.ietf.org/mailman/listinfo/ecrit


cheers,
James

                                *******************
                 Truth is not to be argued... it is to be presented

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit


From ecrit-bounces@ietf.org  Fri Apr 15 14:06:19 2005
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA27545;
	Fri, 15 Apr 2005 14:06:19 -0400 (EDT)
Received: from megatron.ietf.org ([132.151.6.71])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DMVN8-0003xU-Cq; Fri, 15 Apr 2005 14:16:55 -0400
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DMV4j-0000X3-Js; Fri, 15 Apr 2005 13:57:53 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DMV4i-0000Wp-Er
	for ecrit@megatron.ietf.org; Fri, 15 Apr 2005 13:57:52 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27022
	for <ecrit@ietf.org>; Fri, 15 Apr 2005 13:57:51 -0400 (EDT)
Received: from cs.columbia.edu ([128.59.16.20])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DMVEw-0003Yn-MO
	for ecrit@ietf.org; Fri, 15 Apr 2005 14:08:27 -0400
Received: from razor.cs.columbia.edu
	(IDENT:U2FsdGVkX1+syh8EZWjnQDHVvZ/ReHBW4T1X2HkLIak@razor.cs.columbia.edu
	[128.59.16.8])
	by cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3FHvlqt019288
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Fri, 15 Apr 2005 13:57:47 -0400 (EDT)
Received: from [127.0.0.1]
	(IDENT:U2FsdGVkX18pr5qL4BHyxTjvsPkN3YItflOXI1NUmEQ@localhost
	[127.0.0.1])
	by razor.cs.columbia.edu (8.12.11/8.12.11) with ESMTP id j3FHvkZK004320;
	Fri, 15 Apr 2005 13:57:46 -0400
Message-ID: <426000A3.9050408@cs.columbia.edu>
Date: Fri, 15 Apr 2005 13:57:55 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "James M. Polk" <jmpolk@cisco.com>
Subject: Re: [Ecrit] Emergency location alternative: outbound proxy	adding
	location in formation
References: <4.3.2.7.2.20050414103237.03433bf0@localhost>
In-Reply-To: <4.3.2.7.2.20050414103237.03433bf0@localhost>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7bac9cb154eb5790ae3b2913587a40de
Content-Transfer-Encoding: 7bit
Cc: "Bemmel, Jeroen van \(Jeroen\)" <jbemmel@lucent.com>,
        "'ecrit@ietf.org'" <ecrit@ietf.org>
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 08170828343bcf1325e4a0fb4584481c
Content-Transfer-Encoding: 7bit

It may well be that, given intervening work on identity and other SIP 
components, that some of these issues are no longer relevant.

> Adding "location" as a header has been in SIPPING for a few years as a 
> discussion point of the ID
> http://www.ietf.org/internet-drafts/draft-ietf-sipping-location-requirements-02.txt 
> 
> 
> and has been dismissed by the WG and the Transport Area Director.
> 

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit


From ecrit-bounces@ietf.org Wed Apr 20 09:28:02 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFFK-0008Qx-8W; Wed, 20 Apr 2005 09:28:02 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFFI-0008Qk-JF; Wed, 20 Apr 2005 09:28:00 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA07604;
	Wed, 20 Apr 2005 09:27:59 -0400 (EDT)
From: peter_blatherwick@mitel.com
Received: from smtp.mitel.com ([216.191.234.102])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOFQV-0002a2-FS; Wed, 20 Apr 2005 09:39:37 -0400
Received: from localhost (smtp.mitel.com [127.0.0.1])
	by smtp.mitel.com (Postfix) with ESMTP
	id 29F9C2010D; Wed, 20 Apr 2005 09:27:49 -0400 (EDT)
Received: from smtp.mitel.com ([127.0.0.1])
	by localhost (smtp.mitel.com [127.0.0.1]) (amavisd-new,
	port 10124) with LMTP
	id 12203-04; Wed, 20 Apr 2005 09:27:48 -0400 (EDT)
Received: from kanmta01.mitel.com (kanmta01 [134.199.37.58])
	by smtp.mitel.com (Postfix) with ESMTP
	id 7424720055; Wed, 20 Apr 2005 09:27:48 -0400 (EDT)
To: Andrew Newton <andy@hxr.us>
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 5.0.12   February 13, 2003
Message-ID: <OF0410C923.F7873A11-ON85256FE3.004C79CC-85256FE9.0049F46E@mitel.com>
Date: Wed, 20 Apr 2005 09:29:56 -0400
X-MIMETrack: Serialize by Router on kanmta01/Mitel(Release 5.0.12 |February 13,
	2003) at 04/20/2005 09:27:47 AM,
	Serialize complete at 04/20/2005 09:27:47 AM
X-Virus-Scanned: by amavisd-new (virusonly) at mitel.com
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 0e9ebc0cbd700a87c0637ad0e2c91610
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
	Meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0302794264=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a multipart message in MIME format.
--===============0302794264==
Content-Type: multipart/alternative;
	boundary="=_alternative 0049F46A85256FE9_="

This is a multipart message in MIME format.
--=_alternative 0049F46A85256FE9_=
Content-Type: text/plain; charset="us-ascii"

Hi Andrew, lists, 

I'd like to better understand the meaning of the following agenda items: 
  "
  2) Properties of network elements in transferring LI from layer 2 
  upward to PIDF-LO.
  3) Proposed enhancements to PIDF-LO to support #2.
  "

Is there a summary of what these really mean, or examples of what the 
outcome could be in terms of protocol or layer interactions? 

Reason I'm asking is I am deeply involved in a layer 2 approach which 
would be able to deliver location information to endpoints from the L2 LAN 
infrastructure they are connected to.  The work is going on in TIA and is 
called Link Layer Discovery Protocol - Media Endpoint Discovery 
(LLDP-MED), which is an extension of IEEE 802.1AB, specific to VoIP 
systems.  In LLDP-MED, among several other things, we have specified ways 
to pass equivalent data to the DHCP coordinate-based LCI (RFC 3825) and 
civic location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call process 
I believe).  We see this method of delivery as a non-competing alternative 
to the DHCP-based approach, with the same end result to the overall ECS 
system (the endpoint receives the exact same data), which has some 
advantages particularly in enterprise deployment scenarios.  (The 
DHCP-based method has advantages in different scenarios.)   I am Editor of 
this document, and it is now in ballot process in TIA (more or less 
equivalent to Last Call in IETF). 

Sorry, I expect I am suffering lack of context here, since I only joined 
the list relatively recently. 

BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last Call 
and in the RFC Editor's queue?  It seemed to have been settled on the 
list, and waiting on AD action.

-- Peter Blatherwick






Andrew Newton <andy@hxr.us>
Sent by: geopriv-bounces@ietf.org
13.04.05 16:34

 
        To:     GEOPRIV WG <geopriv@ietf.org>
        cc: 
        Subject:        [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting



The GEOPRIV and ECRIT working groups will be holding a joint interim 
meeting.

       What: Interim GEOPRIV/ECRIT meeting
       When: 2005 May 16 08:30-17:30
             2005 May 17 08:30-17:30
             2005 May 18 08:30-17:30
      Where: Columbia University
             Dept. of Computer Science
             450 Computer Science Bldg.
             1214 Amsterdam Avenue (close to 120th St.)
             New York, NY 10027
Directions: http://www.cs.columbia.edu/directions.html
       Also: WiFi provided.
             Teleconference to be provided.
      Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
             Early bookings recommended.

Proposed GEOPRIV Agenda:
   2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in 
HTTP/HTML for web browsing.
2) Properties of network elements in transferring LI from layer 2 
upward to PIDF-LO.
3) Proposed enhancements to PIDF-LO to support #2.

Proposed ECRIT Agenda:
   2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
1) Emergency Call Routing Requirements
2) Security and Threats Analysis

_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv



--=_alternative 0049F46A85256FE9_=
Content-Type: text/html; charset="us-ascii"


<br><font size=2 face="sans-serif">Hi Andrew, lists, &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">I'd like to better understand the meaning of the following agenda items: </font>
<br><font size=2 face="Courier New">&nbsp; &quot;</font>
<br><font size=2 face="Courier New">&nbsp; 2) Properties of network elements in transferring LI from layer 2 <br>
 &nbsp;upward to PIDF-LO.<br>
 &nbsp;3) Proposed enhancements to PIDF-LO to support #2.<br>
 &nbsp;&quot;</font>
<br>
<br><font size=2 face="sans-serif">Is there a summary of what these really mean, or examples of what the outcome could be in terms of protocol or layer interactions? &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">Reason I'm asking is I am deeply involved in a layer 2 approach which would be able to deliver location information to endpoints from the L2 LAN infrastructure they are connected to. &nbsp;The work is going on in TIA and is called Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED), which is an extension of IEEE 802.1AB, specific to VoIP systems. &nbsp;In LLDP-MED, among several other things, we have specified ways to pass equivalent data to the DHCP coordinate-based LCI (RFC 3825) and civic location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call process I believe). &nbsp;We see this method of delivery as a non-competing alternative to the DHCP-based approach, with the same end result to the overall ECS system (the endpoint receives the exact same data), which has some advantages particularly in enterprise deployment scenarios. &nbsp;(The DHCP-based method has advantages in different scenarios.) &nbsp; I am Editor of thi
 s document, and it is now in ballot process in TIA (more or less equivalent to Last Call in IETF). &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">Sorry, I expect I am suffering lack of context here, since I only joined the list relatively recently. &nbsp;</font>
<br>
<br><font size=2 face="sans-serif">BTW, what is the state of geopriv-dhcp-civil? &nbsp;Is it now past Last Call and in the RFC Editor's queue? &nbsp;It seemed to have been settled on the list, and waiting on AD action.</font>
<br>
<br><font size=2 face="sans-serif">-- Peter Blatherwick</font>
<br>
<br>
<br>
<br>
<br>
<table width=100%>
<tr valign=top>
<td>
<td><font size=1 face="sans-serif"><b>Andrew Newton &lt;andy@hxr.us&gt;</b></font>
<br><font size=1 face="sans-serif">Sent by: geopriv-bounces@ietf.org</font>
<p><font size=1 face="sans-serif">13.04.05 16:34</font>
<br>
<td><font size=1 face="Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;GEOPRIV WG &lt;geopriv@ietf.org&gt;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; &nbsp; &nbsp; &nbsp;</font>
<br><font size=1 face="sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;[Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting</font></table>
<br>
<br>
<br><font size=2 face="Courier New"><br>
The GEOPRIV and ECRIT working groups will be holding a joint interim <br>
meeting.<br>
<br>
 &nbsp; &nbsp; &nbsp; What: Interim GEOPRIV/ECRIT meeting<br>
 &nbsp; &nbsp; &nbsp; When: 2005 May 16 08:30-17:30<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2005 May 17 08:30-17:30<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 2005 May 18 08:30-17:30<br>
 &nbsp; &nbsp; &nbsp;Where: Columbia University<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Dept. of Computer Science<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 450 Computer Science Bldg.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; 1214 Amsterdam Avenue (close to 120th St.)<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; New York, NY 10027<br>
Directions: http://www.cs.columbia.edu/directions.html<br>
 &nbsp; &nbsp; &nbsp; Also: WiFi provided.<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Teleconference to be provided.<br>
 &nbsp; &nbsp; &nbsp;Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html<br>
 &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Early bookings recommended.<br>
<br>
Proposed GEOPRIV Agenda:<br>
 &nbsp; 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30<br>
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in <br>
HTTP/HTML for web browsing.<br>
2) Properties of network elements in transferring LI from layer 2 <br>
upward to PIDF-LO.<br>
3) Proposed enhancements to PIDF-LO to support #2.<br>
<br>
Proposed ECRIT Agenda:<br>
 &nbsp; 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30<br>
1) Emergency Call Routing Requirements<br>
2) Security and Threats Analysis<br>
<br>
_______________________________________________<br>
Geopriv mailing list<br>
Geopriv@ietf.org<br>
https://www1.ietf.org/mailman/listinfo/geopriv<br>
</font>
<br>
<br>
--=_alternative 0049F46A85256FE9_=--


--===============0302794264==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0302794264==--




From ecrit-bounces@ietf.org Wed Apr 20 09:52:53 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFdN-00035R-1E; Wed, 20 Apr 2005 09:52:53 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFdL-00034u-Ip; Wed, 20 Apr 2005 09:52:51 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA09476;
	Wed, 20 Apr 2005 09:52:50 -0400 (EDT)
Received: from [64.151.105.12] (helo=zak.ecotroph.net)
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOFoY-0003GN-Q7; Wed, 20 Apr 2005 10:04:28 -0400
Received: from [10.0.1.3] ([::ffff:64.83.8.178])
	(AUTH: PLAIN anewton, SSL: TLSv1/SSLv3,128bits,RC4-SHA)
	by zak.ecotroph.net with esmtp; Wed, 20 Apr 2005 09:52:45 -0400
	id 000FF84E.42665EAD.00002E0D
In-Reply-To: <OF0410C923.F7873A11-ON85256FE3.004C79CC-85256FE9.0049F46E@mitel.com>
References: <OF0410C923.F7873A11-ON85256FE3.004C79CC-85256FE9.0049F46E@mitel.com>
Mime-Version: 1.0
Message-Id: <00b444334545222d572fc588237e6742@hxr.us>
From: Andrew Newton <andy@hxr.us>
Date: Wed, 20 Apr 2005 09:52:37 -0400
To: peter_blatherwick@mitel.com
X-Mailer: Apple Mail (2.619.2)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 68ba2b07ef271dba6ee42a93832cfa4c
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
	Meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0523782193=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a MIME-formatted message.  If you see this text it means that your
E-mail software does not support MIME-formatted messages.

--===============0523782193==
Content-Type: multipart/signed; micalg=sha1;
	protocol="application/pkcs7-signature";
	boundary="=_zak.ecotroph.net-11789-1114005166-0001-2"

This is a MIME-formatted message.  If you see this text it means that your
E-mail software does not support MIME-formatted messages.

--=_zak.ecotroph.net-11789-1114005166-0001-2
Content-Type: text/plain;
	charset=US-ASCII;
	format=flowed
Content-Transfer-Encoding: 7bit


On Apr 20, 2005, at 9:29 AM, peter_blatherwick@mitel.com wrote:

> Hi Andrew, lists,
>
> I'd like to better understand the meaning of the following agenda 
> items:
>   "
>   2) Properties of network elements in transferring LI from layer 2
>   upward to PIDF-LO.
>   3) Proposed enhancements to PIDF-LO to support #2.
>   "
>
> Is there a summary of what these really mean, or examples of what the
> outcome could be in terms of protocol or layer interactions?
>
> Reason I'm asking is I am deeply involved in a layer 2 approach which
> would be able to deliver location information to endpoints from the L2 
> LAN
> infrastructure they are connected to.  The work is going on in TIA and 
> is
> called Link Layer Discovery Protocol - Media Endpoint Discovery
> (LLDP-MED), which is an extension of IEEE 802.1AB, specific to VoIP
> systems.  In LLDP-MED, among several other things, we have specified 
> ways
> to pass equivalent data to the DHCP coordinate-based LCI (RFC 3825) and
> civic location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call 
> process
> I believe).  We see this method of delivery as a non-competing 
> alternative
> to the DHCP-based approach, with the same end result to the overall ECS
> system (the endpoint receives the exact same data), which has some
> advantages particularly in enterprise deployment scenarios.  (The
> DHCP-based method has advantages in different scenarios.)   I am 
> Editor of
> this document, and it is now in ballot process in TIA (more or less
> equivalent to Last Call in IETF).

This is a very good question.

At the last GEOPRIV meeting at IETF 62, concerns were raised about how 
devices get location information and send up the protocol stack.  Since 
the IETF does not standardize all components of the stack, it would be 
either foolish or arrogant of us to define "an architecture" of how 
this is done.  Instead, we want to simply identify the different types 
of components in the network and the properties they should/must have 
in order to reliably accomplish the task of gathering location 
information from the network, placing it in a PIDF-LO document, and 
sending that information on its way through the appropriate 
application.

Our hope is to provide a clearer picture to network operators and 
implementors regarding the types of gear needed even if there are 
multiple types of gear to accomplish the same task.

Input regarding LLDP-MED is very much welcome and would be very useful.

> Sorry, I expect I am suffering lack of context here, since I only 
> joined
> the list relatively recently.

Not a problem.  I hope I explained this in an understandable fashion.

> BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last Call
> and in the RFC Editor's queue?  It seemed to have been settled on the
> list, and waiting on AD action.

It was sent up to our AD right as he went on extended leave.  He's back 
now and clearing his queue, so this draft will be moving along shortly 
(as our AD is one of the best in the business).

-andy

--=_zak.ecotroph.net-11789-1114005166-0001-2
Content-Type: application/pkcs7-signature; name="smime.p7s"
Content-Disposition: attachment;
	filename=smime.p7s
Content-Transfer-Encoding: base64
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--=_zak.ecotroph.net-11789-1114005166-0001-2--


--===============0523782193==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0523782193==--




From ecrit-bounces@ietf.org Wed Apr 20 09:54:15 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFeh-0003FF-Pz; Wed, 20 Apr 2005 09:54:15 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFeg-0003F5-CT; Wed, 20 Apr 2005 09:54:14 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id JAA09649;
	Wed, 20 Apr 2005 09:54:12 -0400 (EDT)
Message-Id: <200504201354.JAA09649@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOFpu-0003JQ-Di; Wed, 20 Apr 2005 10:05:50 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOFeR-0004Ki-DO; Wed, 20 Apr 2005 08:53:59 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: <peter_blatherwick@mitel.com>
Date: Wed, 20 Apr 2005 09:53:43 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQ
In-Reply-To: <OF0410C923.F7873A11-ON85256FE3.004C79CC-85256FE9.0049F46E@mitel.com>
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 827a2a57ca7ab0837847220f447e8d56
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
	Meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

There turns out to be a large set of issues around this problem, which I
fear is leading to Balkanization.  There are two really important =
problems
we need to solve.

One fundamental problem is that every client needs to implement every
possible LI transfer mechanism that its environment could provide.

We have DHCP.  You guys are working on LLDP-MED.   The DSL guys reject =
both
of these and want a something else.  Every phone has to implement every
protocol.

There are some who have observed that the mechanisms at hand are L2
specific.  They claim as long as you have an L2 specific mechanism, you =
need
one or more for each L2.  To get out of that, they propose that we use =
an L7
mechanism (think some version of HTTP, although that might not fly).  =
They
would say, lets do that once, and every L2 can use it.  The problem is =
that
you then have to deal with the security issues of an L7 mechanism, and =
in
particular, you have to use IP address as the =93key=94 for what =
location to
return.  If you can spoof IP address, you can get someone else=92s =
location. =20

Those advocating L7 mechanisms claim that the mechanism would only be
implemented within a domain, and the domain would have to take =
anti-spoofing
steps.  They note that the mechanism would need at least a complete =
round
trip, and probably more than one, so spoofing requires the ability to
intercept packets not addressed to the attacker.   The returned data =
could
be precisely a PIDF-LO.

Then on top of that, we turn out to need some more security, especially =
for
emergency calls.  We need to prevent forged locations.  That means we =
need
to sign the PIDF-LO.  If you get location via DHCP, or LLDP-MED, and the
endpoint constructs a PIDF-LO from that, how do we construct a signature
from the entity that actually determined location?

Brian


________________________________________
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On =
Behalf
Of peter_blatherwick@mitel.com
Sent: Wednesday, April 20, 2005 9:30 AM
To: Andrew Newton
Cc: GEOPRIV WG; ecrit@ietf.org
Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim =
Meeting


Hi Andrew, lists, =A0=20

I'd like to better understand the meaning of the following agenda items: =

=A0 "=20
=A0 2) Properties of network elements in transferring LI from layer 2=20
=A0upward to PIDF-LO.
=A03) Proposed enhancements to PIDF-LO to support #2.
=A0"=20

Is there a summary of what these really mean, or examples of what the
outcome could be in terms of protocol or layer interactions? =A0=20

Reason I'm asking is I am deeply involved in a layer 2 approach which =
would
be able to deliver location information to endpoints from the L2 LAN
infrastructure they are connected to. =A0The work is going on in TIA and =
is
called Link Layer Discovery Protocol - Media Endpoint Discovery =
(LLDP-MED),
which is an extension of IEEE 802.1AB, specific to VoIP systems. =A0In
LLDP-MED, among several other things, we have specified ways to pass
equivalent data to the DHCP coordinate-based LCI (RFC 3825) and civic
location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
believe). =A0We see this method of delivery as a non-competing =
alternative to
the DHCP-based approach, with the same end result to the overall ECS =
system
(the endpoint receives the exact same data), which has some advantages
particularly in enterprise deployment scenarios. =A0(The DHCP-based =
method has
advantages in different scenarios.) =A0 I am Editor of thi s document, =
and it
is now in ballot process in TIA (more or less equivalent to Last Call in
IETF). =A0=20

Sorry, I expect I am suffering lack of context here, since I only joined =
the
list relatively recently. =A0=20

BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Last =
Call and
in the RFC Editor's queue? =A0It seemed to have been settled on the =
list, and
waiting on AD action.=20

-- Peter Blatherwick=20




Andrew Newton <andy@hxr.us>=20
Sent by: geopriv-bounces@ietf.org=20
13.04.05 16:34=20
=A0 =A0 =A0 =A0=20
=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>=20
=A0 =A0 =A0 =A0 cc: =A0 =A0 =A0 =A0=20
=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of Joint =
GEOPRIV/ECRIT
Interim Meeting




The GEOPRIV and ECRIT working groups will be holding a joint interim=20
meeting.

=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
=A0 =A0 =A0Where: Columbia University
=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
Directions: http://www.cs.columbia.edu/directions.html
=A0 =A0 =A0 Also: WiFi provided.
=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.

Proposed GEOPRIV Agenda:
=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in=20
HTTP/HTML for web browsing.
2) Properties of network elements in transferring LI from layer 2=20
upward to PIDF-LO.
3) Proposed enhancements to PIDF-LO to support #2.

Proposed ECRIT Agenda:
=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
1) Emergency Call Routing Requirements
2) Security and Threats Analysis

_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 10:15:37 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFzN-0006SA-K2; Wed, 20 Apr 2005 10:15:37 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOFzM-0006S2-G3; Wed, 20 Apr 2005 10:15:36 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA12447;
	Wed, 20 Apr 2005 10:15:34 -0400 (EDT)
Received: from rtp-iport-1.cisco.com ([64.102.122.148])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOGAa-000435-73; Wed, 20 Apr 2005 10:27:13 -0400
Received: from rtp-core-1.cisco.com (64.102.124.12)
	by rtp-iport-1.cisco.com with ESMTP; 20 Apr 2005 10:26:27 -0400
X-IronPort-AV: i="3.92,116,1112587200"; 
	d="scan'208"; a="45369303:sNHT31727328"
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id j3KEEbS4008871; 
	Wed, 20 Apr 2005 10:15:21 -0400 (EDT)
Received: from xmb-rtp-20b.amer.cisco.com ([64.102.31.53]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211);
	Wed, 20 Apr 2005 10:13:53 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 10:13:52 -0400
Message-ID: <072C5B76F7CEAB488172C6F64B30B5E3113AFC@xmb-rtp-20b.amer.cisco.com>
Thread-Topic: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWA=
From: "Michael Hammer \(mhammer\)" <mhammer@cisco.com>
To: "Brian Rosen" <br@brianrosen.net>, <peter_blatherwick@mitel.com>
X-OriginalArrivalTime: 20 Apr 2005 14:13:53.0751 (UTC)
	FILETIME=[2EDB3E70:01C545B3]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 31b28e25e9d13a22020d8b7aedc9832c
Content-Transfer-Encoding: quoted-printable
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Brian,

Could you clarify the domain statement.  Given nomadicity, it would seem =
that location delivery would need to be cross-domain.  The E911 PSAP =
will not always be the same domain as the roaming endpoint.

My impression is that Location discovery is a L2 issue, tied to the fact =
that L2 is supposed to be a single physical hop at most between the =
end-user terminal and an adjacent location-determining network node.  =
(Of course those trying to make L2 protocols a replacement for IP sort =
of screw this assumption up.)

The location delivery mechanism is an application-layer or L7 service.  =
The argument there is that since multiple applications will need to rely =
on location information, a general purpose delivery mechanism will =
provide consistency and generality that is so often sought in IETF work. =
 Security can be built-in to the chosen delivery mechanism.  Note, that =
delivery could be a choice of an existing transfer mechanism.  This does =
not preclude other L7 protocols from defining a place in their messages =
that could also carry location information.

So, I believe:
Location discovery is local, with associated security being local,
Location delivery is global, with associated security being global.

The real issues are making those happen.

Mike

>-----Original Message-----
>From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org]=20
>On Behalf Of Brian Rosen
>Sent: Wednesday, April 20, 2005 9:54 AM
>To: peter_blatherwick@mitel.com
>Cc: 'GEOPRIV WG'; ecrit@ietf.org
>Subject: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT InterimMeeting
>
>There turns out to be a large set of issues around this=20
>problem, which I fear is leading to Balkanization.  There are=20
>two really important problems we need to solve.
>
>One fundamental problem is that every client needs to=20
>implement every possible LI transfer mechanism that its=20
>environment could provide.
>
>We have DHCP.  You guys are working on LLDP-MED.   The DSL=20
>guys reject both
>of these and want a something else.  Every phone has to=20
>implement every protocol.
>
>There are some who have observed that the mechanisms at hand=20
>are L2 specific.  They claim as long as you have an L2=20
>specific mechanism, you need one or more for each L2.  To get=20
>out of that, they propose that we use an L7 mechanism (think=20
>some version of HTTP, although that might not fly).  They=20
>would say, lets do that once, and every L2 can use it.  The=20
>problem is that you then have to deal with the security issues=20
>of an L7 mechanism, and in particular, you have to use IP=20
>address as the "key" for what location to return.  If you can=20
>spoof IP address, you can get someone else's location. =20
>
>Those advocating L7 mechanisms claim that the mechanism would=20
>only be implemented within a domain, and the domain would have=20
>to take anti-spoofing steps.  They note that the mechanism=20
>would need at least a complete round trip, and probably more=20
>than one, so spoofing requires the ability to
>intercept packets not addressed to the attacker.   The=20
>returned data could
>be precisely a PIDF-LO.
>
>Then on top of that, we turn out to need some more security,=20
>especially for emergency calls.  We need to prevent forged=20
>locations.  That means we need to sign the PIDF-LO.  If you=20
>get location via DHCP, or LLDP-MED, and the endpoint=20
>constructs a PIDF-LO from that, how do we construct a=20
>signature from the entity that actually determined location?
>
>Brian
>
>
>________________________________________
>From: geopriv-bounces@ietf.org=20
>[mailto:geopriv-bounces@ietf.org] On Behalf Of=20
>peter_blatherwick@mitel.com
>Sent: Wednesday, April 20, 2005 9:30 AM
>To: Andrew Newton
>Cc: GEOPRIV WG; ecrit@ietf.org
>Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
>Interim Meeting
>
>
>Hi Andrew, lists, =A0=20
>
>I'd like to better understand the meaning of the following=20
>agenda items:=20
>=A0 "=20
>=A0 2) Properties of network elements in transferring LI from layer 2
>=A0upward to PIDF-LO.
>=A03) Proposed enhancements to PIDF-LO to support #2.
>=A0"=20
>
>Is there a summary of what these really mean, or examples of=20
>what the outcome could be in terms of protocol or layer=20
>interactions? =A0=20
>
>Reason I'm asking is I am deeply involved in a layer 2=20
>approach which would be able to deliver location information=20
>to endpoints from the L2 LAN infrastructure they are connected=20
>to. =A0The work is going on in TIA and is called Link Layer=20
>Discovery Protocol - Media Endpoint Discovery (LLDP-MED),=20
>which is an extension of IEEE 802.1AB, specific to VoIP=20
>systems. =A0In LLDP-MED, among several other things, we have=20
>specified ways to pass equivalent data to the DHCP=20
>coordinate-based LCI (RFC 3825) and civic location LCI=20
>(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I=20
>believe). =A0We see this method of delivery as a non-competing=20
>alternative to the DHCP-based approach, with the same end=20
>result to the overall ECS system (the endpoint receives the=20
>exact same data), which has some advantages particularly in=20
>enterprise deployment scenarios. =A0(The DHCP-based method has=20
>advantages in different scenarios.) =A0 I am Editor of thi s=20
>document, and it is now in ballot process in TIA (more or less=20
>equivalent to Last Call in IETF). =A0=20
>
>Sorry, I expect I am suffering lack of context here, since I=20
>only joined the list relatively recently. =A0=20
>
>BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past=20
>Last Call and in the RFC Editor's queue? =A0It seemed to have=20
>been settled on the list, and waiting on AD action.=20
>
>-- Peter Blatherwick=20
>
>
>
>
>Andrew Newton <andy@hxr.us>
>Sent by: geopriv-bounces@ietf.org
>13.04.05 16:34=20
>=A0 =A0 =A0 =A0=20
>=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
>=A0 =A0 =A0 =A0 cc:
>=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of Joint =

>GEOPRIV/ECRIT Interim Meeting
>
>
>
>
>The GEOPRIV and ECRIT working groups will be holding a joint=20
>interim meeting.
>
>=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
>=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
>=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
>=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
>=A0 =A0 =A0Where: Columbia University
>=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
>=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
>=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
>=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
>Directions: http://www.cs.columbia.edu/directions.html
>=A0 =A0 =A0 Also: WiFi provided.
>=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
>=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
>=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
>
>Proposed GEOPRIV Agenda:
>=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
>1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use=20
>of LI in HTTP/HTML for web browsing.
>2) Properties of network elements in transferring LI from=20
>layer 2 upward to PIDF-LO.
>3) Proposed enhancements to PIDF-LO to support #2.
>
>Proposed ECRIT Agenda:
>=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
>1) Emergency Call Routing Requirements
>2) Security and Threats Analysis
>
>_______________________________________________
>Geopriv mailing list
>Geopriv@ietf.org
>https://www1.ietf.org/mailman/listinfo/geopriv
>
>
>
>
>_______________________________________________
>Ecrit mailing list
>Ecrit@ietf.org
>https://www1.ietf.org/mailman/listinfo/ecrit
>

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 10:47:46 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOGUU-0001fH-SJ; Wed, 20 Apr 2005 10:47:46 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOGUT-0001f9-TS; Wed, 20 Apr 2005 10:47:45 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id KAA15953;
	Wed, 20 Apr 2005 10:47:44 -0400 (EDT)
Message-Id: <200504201447.KAA15953@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOGfi-0005A3-LS; Wed, 20 Apr 2005 10:59:23 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOGUH-0006pb-L0; Wed, 20 Apr 2005 09:47:34 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	<peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 10:47:21 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUA==
In-Reply-To: <072C5B76F7CEAB488172C6F64B30B5E3113AFC@xmb-rtp-20b.amer.cisco.com>
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6907f330301e69261fa73bed91449a20
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

The idea is that, say, you are in your home, served by a DSL provider.
The domain is then that of the DSL vendor.  Your phone asks for its =
location
from the server in the DSL domain.  It would be given the location
corresponding to the IP address of the request.  Note that this would be
pretty good for the requested case, even in the presence of a NATed =
local
area network in your home.  The phone would do this on boot, before any =
VPN
tunnels were established.

I get the idea that a single delivery mechanism is desirable.  I'm =
skeptical
we can do that because of the security issues.  When you make the =
delivery
mechanism L2 dependent, you can control the possible attacks to a finer
grain than the L7 local domain.

Please keep in mind that some of the folks wishing to use the L7 =
mechanism
don't really want to just return location to the endpoint; they want to
retain the location and give it out to authorized entities upon =
presentation
of the IP address of the endpoint.  That is a business decision.  They =
can
charge for such a service.  I think the privacy implications of that are
dicey, but the reality is that's the model that will probably be =
implemented
if we do this. =20

Brian





> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 10:14 AM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
>=20
> Brian,
>=20
> Could you clarify the domain statement.  Given nomadicity, it would =
seem
> that location delivery would need to be cross-domain.  The E911 PSAP =
will
> not always be the same domain as the roaming endpoint.
>=20
> My impression is that Location discovery is a L2 issue, tied to the =
fact
> that L2 is supposed to be a single physical hop at most between the =
end-
> user terminal and an adjacent location-determining network node.  (Of
> course those trying to make L2 protocols a replacement for IP sort of
> screw this assumption up.)
>=20
> The location delivery mechanism is an application-layer or L7 service.
> The argument there is that since multiple applications will need to =
rely
> on location information, a general purpose delivery mechanism will =
provide
> consistency and generality that is so often sought in IETF work.  =
Security
> can be built-in to the chosen delivery mechanism.  Note, that delivery
> could be a choice of an existing transfer mechanism.  This does not
> preclude other L7 protocols from defining a place in their messages =
that
> could also carry location information.
>=20
> So, I believe:
> Location discovery is local, with associated security being local,
> Location delivery is global, with associated security being global.
>=20
> The real issues are making those happen.
>=20
> Mike
>=20
> >-----Original Message-----
> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org]
> >On Behalf Of Brian Rosen
> >Sent: Wednesday, April 20, 2005 9:54 AM
> >To: peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >There turns out to be a large set of issues around this
> >problem, which I fear is leading to Balkanization.  There are
> >two really important problems we need to solve.
> >
> >One fundamental problem is that every client needs to
> >implement every possible LI transfer mechanism that its
> >environment could provide.
> >
> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >guys reject both
> >of these and want a something else.  Every phone has to
> >implement every protocol.
> >
> >There are some who have observed that the mechanisms at hand
> >are L2 specific.  They claim as long as you have an L2
> >specific mechanism, you need one or more for each L2.  To get
> >out of that, they propose that we use an L7 mechanism (think
> >some version of HTTP, although that might not fly).  They
> >would say, lets do that once, and every L2 can use it.  The
> >problem is that you then have to deal with the security issues
> >of an L7 mechanism, and in particular, you have to use IP
> >address as the "key" for what location to return.  If you can
> >spoof IP address, you can get someone else's location.
> >
> >Those advocating L7 mechanisms claim that the mechanism would
> >only be implemented within a domain, and the domain would have
> >to take anti-spoofing steps.  They note that the mechanism
> >would need at least a complete round trip, and probably more
> >than one, so spoofing requires the ability to
> >intercept packets not addressed to the attacker.   The
> >returned data could
> >be precisely a PIDF-LO.
> >
> >Then on top of that, we turn out to need some more security,
> >especially for emergency calls.  We need to prevent forged
> >locations.  That means we need to sign the PIDF-LO.  If you
> >get location via DHCP, or LLDP-MED, and the endpoint
> >constructs a PIDF-LO from that, how do we construct a
> >signature from the entity that actually determined location?
> >
> >Brian
> >
> >
> >________________________________________
> >From: geopriv-bounces@ietf.org
> >[mailto:geopriv-bounces@ietf.org] On Behalf Of
> >peter_blatherwick@mitel.com
> >Sent: Wednesday, April 20, 2005 9:30 AM
> >To: Andrew Newton
> >Cc: GEOPRIV WG; ecrit@ietf.org
> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >Interim Meeting
> >
> >
> >Hi Andrew, lists,
> >
> >I'd like to better understand the meaning of the following
> >agenda items:
> >=A0 "
> >=A0 2) Properties of network elements in transferring LI from layer 2
> >=A0upward to PIDF-LO.
> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >=A0"
> >
> >Is there a summary of what these really mean, or examples of
> >what the outcome could be in terms of protocol or layer
> >interactions?
> >
> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which would be able to deliver location information
> >to endpoints from the L2 LAN infrastructure they are connected
> >to. =A0The work is going on in TIA and is called Link Layer
> >Discovery Protocol - Media Endpoint Discovery (LLDP-MED),
> >which is an extension of IEEE 802.1AB, specific to VoIP
> >systems. =A0In LLDP-MED, among several other things, we have
> >specified ways to pass equivalent data to the DHCP
> >coordinate-based LCI (RFC 3825) and civic location LCI
> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe). =A0We see this method of delivery as a non-competing
> >alternative to the DHCP-based approach, with the same end
> >result to the overall ECS system (the endpoint receives the
> >exact same data), which has some advantages particularly in
> >enterprise deployment scenarios. =A0(The DHCP-based method has
> >advantages in different scenarios.) =A0 I am Editor of thi s
> >document, and it is now in ballot process in TIA (more or less
> >equivalent to Last Call in IETF).
> >
> >Sorry, I expect I am suffering lack of context here, since I
> >only joined the list relatively recently.
> >
> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past
> >Last Call and in the RFC Editor's queue? =A0It seemed to have
> >been settled on the list, and waiting on AD action.
> >
> >-- Peter Blatherwick
> >
> >
> >
> >
> >Andrew Newton <andy@hxr.us>
> >Sent by: geopriv-bounces@ietf.org
> >13.04.05 16:34
> >
> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >=A0 =A0 =A0 =A0 cc:
> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint
> >GEOPRIV/ECRIT Interim Meeting
> >
> >
> >
> >
> >The GEOPRIV and ECRIT working groups will be holding a joint
> >interim meeting.
> >
> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >=A0 =A0 =A0Where: Columbia University
> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >Directions: http://www.cs.columbia.edu/directions.html
> >=A0 =A0 =A0 Also: WiFi provided.
> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >
> >Proposed GEOPRIV Agenda:
> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use
> >of LI in HTTP/HTML for web browsing.
> >2) Properties of network elements in transferring LI from
> >layer 2 upward to PIDF-LO.
> >3) Proposed enhancements to PIDF-LO to support #2.
> >
> >Proposed ECRIT Agenda:
> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >1) Emergency Call Routing Requirements
> >2) Security and Threats Analysis
> >
> >_______________________________________________
> >Geopriv mailing list
> >Geopriv@ietf.org
> >https://www1.ietf.org/mailman/listinfo/geopriv
> >
> >
> >
> >
> >_______________________________________________
> >Ecrit mailing list
> >Ecrit@ietf.org
> >https://www1.ietf.org/mailman/listinfo/ecrit
> >
>=20




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 11:43:14 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHMA-0001VQ-5r; Wed, 20 Apr 2005 11:43:14 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHM9-0001VH-54; Wed, 20 Apr 2005 11:43:13 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA21038;
	Wed, 20 Apr 2005 11:43:11 -0400 (EDT)
Received: from sj-iport-3-in.cisco.com ([171.71.176.72]
	helo=sj-iport-3.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOHXM-0006wI-I3; Wed, 20 Apr 2005 11:54:50 -0400
Received: from sj-core-5.cisco.com (171.71.177.238)
	by sj-iport-3.cisco.com with ESMTP; 20 Apr 2005 08:43:01 -0700
X-IronPort-AV: i="3.92,117,1112598000"; 
	d="scan'208"; a="252257256:sNHT28828036"
Received: from malone.cisco.com (malone.cisco.com [171.70.157.157])
	by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id j3KFgwhu009260;
	Wed, 20 Apr 2005 08:42:59 -0700 (PDT)
Received: from MLINSNER (ssh-sjc-1.cisco.com [171.68.225.134]) by
	malone.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with
	ESMTP id IAA04827; Wed, 20 Apr 2005 08:42:56 -0700 (PDT)
Message-Id: <200504201542.IAA04827@malone.cisco.com>
From: "Marc Linsner" <mlinsner@cisco.com>
To: "'Brian Rosen'" <br@brianrosen.net>,
	"'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	<peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRITInterimMeeting
Date: Wed, 20 Apr 2005 11:42:52 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <200504201447.KAA15953@ietf.org>
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACHFwg
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Score: 1.1 (+)
X-Scan-Signature: 7d33c50f3756db14428398e2bdedd581
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

snip.........

> 
> The idea is that, say, you are in your home, served by a DSL provider.
> The domain is then that of the DSL vendor.  Your phone asks for its
> location
> from the server in the DSL domain.  It would be given the location
> corresponding to the IP address of the request.  Note that this would be
> pretty good for the requested case, even in the presence of a NATed local
> area network in your home.  The phone would do this on boot, before any
> VPN
> tunnels were established.

In the VPN case, the phone most likely is not the device that terminates the
tunnel; this is typically done via a separate box. If the phone were booted
after the tunnel was established, the phone would not have the capability of
contacting the domain with location knowledge.

-Marc-

snip............

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 11:58:31 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHax-0003MU-Lj; Wed, 20 Apr 2005 11:58:31 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHav-0003MK-K3; Wed, 20 Apr 2005 11:58:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA22118;
	Wed, 20 Apr 2005 11:58:27 -0400 (EDT)
Message-Id: <200504201558.LAA22118@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOHmB-0007NI-6R; Wed, 20 Apr 2005 12:10:07 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOHal-0002hg-LK; Wed, 20 Apr 2005 10:58:19 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Marc Linsner'" <mlinsner@cisco.com>,
	"'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	<peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRITInterimMeeting
Date: Wed, 20 Apr 2005 11:58:13 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <200504201542.IAA04827@malone.cisco.com>
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACHFwgAABTrYA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: fb6060cb60c0cea16e3f7219e40a0a81
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Yeah, it's one of the larger limitations of the idea.  The devices that need
location don't have any knowledge of shenanigans happening underneath them,
and they don't have any way to find out.

The typical case works, because in the really, really, really common cases
of teleworkers, hotspot users, and the like, VPN tunnels are established by
software on computers, and not by boxes.  Having said that, there are lots
of IPsec boxes out there, and routers that have those features, and, ....

The folks pushing these ideas, when faced with this kind of problem, tend to
say "if there is a box screwing up the location mechanism, it's up to it to
fix the problem it creates".  They think it's perfectly reasonable for all
tunnel creation things to be aware of location infrastructure, and do the
right thing, whatever that means.  I must admit I don't believe we can do
that.

I may not have stated my own opinions on this issue clearly.
I don't think we can make an L7 mechanism work.  I like the idea in the
theoretic sense, but don't see how to make it work.

I observe that real devices really get IP address from DHCP, and that
mechanism can really be made to work in our favor.  The typical case is a
DSL modem with a home router.  The PCs get IP addresses from DHCP in the
router.  It can use whatever L2 mechanism it wants to get location from the
upstream provider, and then provide location to downstream PCs, phones and
the like via DHCP.  The uncommon case of a single device directly connected
to the DSL modem can be made to work because custom software is always
provided for that case, and can be provided with any L2 specific mechanism
needed to get location.  Push back on that idea is that there are a heck of
a lot of home routers out there, and updating their firmware is really hard.

I recognize the value of LLDP-MED, but I don't like having every phone,
every softclient/PC, etc having to implement LLDP-MED.  We may be stuck with
it, but it's not good.  Better to use DHCP to learn location, and have
something between the switches and the DHCP server to determine location.

> -----Original Message-----
> From: Marc Linsner [mailto:mlinsner@cisco.com]
> Sent: Wednesday, April 20, 2005 11:43 AM
> To: 'Brian Rosen'; 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com
> Cc: 'GEOPRIV WG'; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> GEOPRIV/ECRITInterimMeeting
> 
> snip.........
> 
> >
> > The idea is that, say, you are in your home, served by a DSL provider.
> > The domain is then that of the DSL vendor.  Your phone asks for its
> > location
> > from the server in the DSL domain.  It would be given the location
> > corresponding to the IP address of the request.  Note that this would be
> > pretty good for the requested case, even in the presence of a NATed
> local
> > area network in your home.  The phone would do this on boot, before any
> > VPN
> > tunnels were established.
> 
> In the VPN case, the phone most likely is not the device that terminates
> the
> tunnel; this is typically done via a separate box. If the phone were
> booted
> after the tunnel was established, the phone would not have the capability
> of
> contacting the domain with location knowledge.
> 
> -Marc-
> 
> snip............
> 




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 12:00:48 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHdA-0003bc-9f; Wed, 20 Apr 2005 12:00:48 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHd8-0003bM-ES; Wed, 20 Apr 2005 12:00:46 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA22258;
	Wed, 20 Apr 2005 12:00:44 -0400 (EDT)
Received: from rtp-iport-2.cisco.com ([64.102.122.149])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOHoL-0007QF-DI; Wed, 20 Apr 2005 12:12:24 -0400
Received: from rtp-core-1.cisco.com (64.102.124.12)
	by rtp-iport-2.cisco.com with ESMTP; 20 Apr 2005 12:00:35 -0400
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id j3KG0SRU012190; 
	Wed, 20 Apr 2005 12:00:31 -0400 (EDT)
Received: from xmb-rtp-20b.amer.cisco.com ([64.102.31.53]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211);
	Wed, 20 Apr 2005 12:00:24 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 12:00:23 -0400
Message-ID: <072C5B76F7CEAB488172C6F64B30B5E3113B2A@xmb-rtp-20b.amer.cisco.com>
Thread-Topic: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACuDTw
From: "Michael Hammer \(mhammer\)" <mhammer@cisco.com>
To: "Brian Rosen" <br@brianrosen.net>, <peter_blatherwick@mitel.com>
X-OriginalArrivalTime: 20 Apr 2005 16:00:24.0745 (UTC)
	FILETIME=[102F8990:01C545C2]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8cb9b411340046bf4080a729180a0672
Content-Transfer-Encoding: quoted-printable
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

I still get the feeling that "delivery" is being used in two different =
contexts:

            (1)                     (2)
Local node---?---->endpoint-----/many hops/----->PSAP=20
          ---------------------/many hops/----->
                           (2)

How can "delivery" be L2 dependent, when it must reach a PSAP many hops =
away?
Color me confused.

Mike


>-----Original Message-----
>From: Brian Rosen [mailto:br@brianrosen.net]=20
>Sent: Wednesday, April 20, 2005 10:47 AM
>To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
>Cc: 'GEOPRIV WG'; ecrit@ietf.org
>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT InterimMeeting
>
>The idea is that, say, you are in your home, served by a DSL provider.
>The domain is then that of the DSL vendor.  Your phone asks=20
>for its location from the server in the DSL domain.  It would=20
>be given the location corresponding to the IP address of the=20
>request.  Note that this would be pretty good for the=20
>requested case, even in the presence of a NATed local area=20
>network in your home.  The phone would do this on boot, before=20
>any VPN tunnels were established.
>
>I get the idea that a single delivery mechanism is desirable. =20
>I'm skeptical we can do that because of the security issues. =20
>When you make the delivery mechanism L2 dependent, you can=20
>control the possible attacks to a finer grain than the L7 local domain.
>
>Please keep in mind that some of the folks wishing to use the=20
>L7 mechanism don't really want to just return location to the=20
>endpoint; they want to retain the location and give it out to=20
>authorized entities upon presentation of the IP address of the=20
>endpoint.  That is a business decision.  They can charge for=20
>such a service.  I think the privacy implications of that are=20
>dicey, but the reality is that's the model that will probably=20
>be implemented if we do this. =20
>
>Brian
>
>
>
>
>
>> -----Original Message-----
>> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
>> Sent: Wednesday, April 20, 2005 10:14 AM
>> To: Brian Rosen; peter_blatherwick@mitel.com
>> Cc: GEOPRIV WG; ecrit@ietf.org
>> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT=20
>> InterimMeeting
>>=20
>> Brian,
>>=20
>> Could you clarify the domain statement.  Given nomadicity, it would=20
>> seem that location delivery would need to be cross-domain.  The E911=20
>> PSAP will not always be the same domain as the roaming endpoint.
>>=20
>> My impression is that Location discovery is a L2 issue, tied to the=20
>> fact that L2 is supposed to be a single physical hop at most between=20
>> the end- user terminal and an adjacent location-determining network=20
>> node.  (Of course those trying to make L2 protocols a=20
>replacement for=20
>> IP sort of screw this assumption up.)
>>=20
>> The location delivery mechanism is an application-layer or=20
>L7 service.
>> The argument there is that since multiple applications will need to=20
>> rely on location information, a general purpose delivery mechanism=20
>> will provide consistency and generality that is so often sought in=20
>> IETF work.  Security can be built-in to the chosen delivery=20
>mechanism. =20
>> Note, that delivery could be a choice of an existing transfer=20
>> mechanism.  This does not preclude other L7 protocols from=20
>defining a=20
>> place in their messages that could also carry location information.
>>=20
>> So, I believe:
>> Location discovery is local, with associated security being local,=20
>> Location delivery is global, with associated security being global.
>>=20
>> The real issues are making those happen.
>>=20
>> Mike
>>=20
>> >-----Original Message-----
>> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On=20
>> >Behalf Of Brian Rosen
>> >Sent: Wednesday, April 20, 2005 9:54 AM
>> >To: peter_blatherwick@mitel.com
>> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
>> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
>> >InterimMeeting
>> >
>> >There turns out to be a large set of issues around this problem,=20
>> >which I fear is leading to Balkanization.  There are two really=20
>> >important problems we need to solve.
>> >
>> >One fundamental problem is that every client needs to=20
>implement every=20
>> >possible LI transfer mechanism that its environment could provide.
>> >
>> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
>> >guys reject both
>> >of these and want a something else.  Every phone has to implement=20
>> >every protocol.
>> >
>> >There are some who have observed that the mechanisms at hand are L2=20
>> >specific.  They claim as long as you have an L2 specific mechanism,=20
>> >you need one or more for each L2.  To get out of that, they propose=20
>> >that we use an L7 mechanism (think some version of HTTP, although=20
>> >that might not fly).  They would say, lets do that once,=20
>and every L2=20
>> >can use it.  The problem is that you then have to deal with the=20
>> >security issues of an L7 mechanism, and in particular, you have to=20
>> >use IP address as the "key" for what location to return. =20
>If you can=20
>> >spoof IP address, you can get someone else's location.
>> >
>> >Those advocating L7 mechanisms claim that the mechanism=20
>would only be=20
>> >implemented within a domain, and the domain would have to take=20
>> >anti-spoofing steps.  They note that the mechanism would need at=20
>> >least a complete round trip, and probably more than one, so=20
>spoofing=20
>> >requires the ability to
>> >intercept packets not addressed to the attacker.   The
>> >returned data could
>> >be precisely a PIDF-LO.
>> >
>> >Then on top of that, we turn out to need some more security,=20
>> >especially for emergency calls.  We need to prevent forged=20
>locations. =20
>> >That means we need to sign the PIDF-LO.  If you get location via=20
>> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from that,=20
>> >how do we construct a signature from the entity that actually=20
>> >determined location?
>> >
>> >Brian
>> >
>> >
>> >________________________________________
>> >From: geopriv-bounces@ietf.org
>> >[mailto:geopriv-bounces@ietf.org] On Behalf Of=20
>> >peter_blatherwick@mitel.com
>> >Sent: Wednesday, April 20, 2005 9:30 AM
>> >To: Andrew Newton
>> >Cc: GEOPRIV WG; ecrit@ietf.org
>> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim=20
>> >Meeting
>> >
>> >
>> >Hi Andrew, lists,
>> >
>> >I'd like to better understand the meaning of the following agenda=20
>> >items:
>> >=A0 "
>> >=A0 2) Properties of network elements in transferring LI from layer =
2
>> >=A0upward to PIDF-LO.
>> >=A03) Proposed enhancements to PIDF-LO to support #2.
>> >=A0"
>> >
>> >Is there a summary of what these really mean, or examples=20
>of what the=20
>> >outcome could be in terms of protocol or layer interactions?
>> >
>> >Reason I'm asking is I am deeply involved in a layer 2=20
>approach which=20
>> >would be able to deliver location information to endpoints from the=20
>> >L2 LAN infrastructure they are connected to. =A0The work is=20
>going on in=20
>> >TIA and is called Link Layer Discovery Protocol - Media Endpoint=20
>> >Discovery (LLDP-MED), which is an extension of IEEE=20
>802.1AB, specific=20
>> >to VoIP systems. =A0In LLDP-MED, among several other things, we have =

>> >specified ways to pass equivalent data to the DHCP coordinate-based=20
>> >LCI (RFC 3825) and civic location LCI=20
>> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I=20
>believe). =A0
>> >We see this method of delivery as a non-competing=20
>alternative to the=20
>> >DHCP-based approach, with the same end result to the overall ECS=20
>> >system (the endpoint receives the exact same data), which has some=20
>> >advantages particularly in enterprise deployment scenarios. =A0(The=20
>> >DHCP-based method has advantages in different scenarios.) =A0 I am=20
>> >Editor of thi s document, and it is now in ballot process in TIA=20
>> >(more or less equivalent to Last Call in IETF).
>> >
>> >Sorry, I expect I am suffering lack of context here, since I only=20
>> >joined the list relatively recently.
>> >
>> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Last =

>> >Call and in the RFC Editor's queue? =A0It seemed to have been =
settled=20
>> >on the list, and waiting on AD action.
>> >
>> >-- Peter Blatherwick
>> >
>> >
>> >
>> >
>> >Andrew Newton <andy@hxr.us>
>> >Sent by: geopriv-bounces@ietf.org
>> >13.04.05 16:34
>> >
>> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
>> >=A0 =A0 =A0 =A0 cc:
>> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint=20
>GEOPRIV/ECRIT=20
>> >Interim Meeting
>> >
>> >
>> >
>> >
>> >The GEOPRIV and ECRIT working groups will be holding a=20
>joint interim=20
>> >meeting.
>> >
>> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
>> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
>> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
>> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
>> >=A0 =A0 =A0Where: Columbia University
>> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
>> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
>> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
>> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
>> >Directions: http://www.cs.columbia.edu/directions.html
>> >=A0 =A0 =A0 Also: WiFi provided.
>> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
>> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
>> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
>> >
>> >Proposed GEOPRIV Agenda:
>> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
>> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the=20
>use of LI=20
>> >in HTTP/HTML for web browsing.
>> >2) Properties of network elements in transferring LI from layer 2=20
>> >upward to PIDF-LO.
>> >3) Proposed enhancements to PIDF-LO to support #2.
>> >
>> >Proposed ECRIT Agenda:
>> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
>> >1) Emergency Call Routing Requirements
>> >2) Security and Threats Analysis
>> >
>> >_______________________________________________
>> >Geopriv mailing list
>> >Geopriv@ietf.org
>> >https://www1.ietf.org/mailman/listinfo/geopriv
>> >
>> >
>> >
>> >
>> >_______________________________________________
>> >Ecrit mailing list
>> >Ecrit@ietf.org
>> >https://www1.ietf.org/mailman/listinfo/ecrit
>> >
>>=20
>
>

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 12:15:55 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHot-0004xf-BS; Wed, 20 Apr 2005 12:12:55 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOHop-0004xC-P9; Wed, 20 Apr 2005 12:12:53 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id MAA23519;
	Wed, 20 Apr 2005 12:12:49 -0400 (EDT)
Message-Id: <200504201612.MAA23519@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOI05-0007si-6I; Wed, 20 Apr 2005 12:24:29 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOHof-0003QN-Bo; Wed, 20 Apr 2005 11:12:41 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	<peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 12:12:35 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <072C5B76F7CEAB488172C6F64B30B5E3113B2A@xmb-rtp-20b.amer.cisco.com>
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACuDTwAABc4NA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 6b519fb0ef66258f34533f52ff46aedf
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

The basic picture is:

LIS ---> endpoint ---> routing element ---> psap

The LIS knows where the endpoint is.
The endpoint gets location from the LIS
The endpoint includes location on the emergency call
The routing element uses location to route the call to the right PSAP
The PSAP gets the call, and the location.

The discussion is, how does the endpoint get location from the LIS?
DHCP is one answer.  LLDP-MED is another.  A proposed L7 mechanism is
another.


To be sure, there are folks who want to make the picture:

LIS --> endpoint --> routing element ---> psap
 ^                        |                 |
 |                        |                 |
 +------------------------+                 |
 |                                          |
 +------------------------------------------+

The LIS gives the endpoint a "key"
The endpoint includes the key in the emergency call
The routing element gets the key and exchanges it for location at the =
LIS
The psap gets the key and exchanges it for location at the LIS

The key could be an IP address.

Brian


> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 12:00 PM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
>=20
> I still get the feeling that "delivery" is being used in two different
> contexts:
>=20
>             (1)                     (2)
> Local node---?---->endpoint-----/many hops/----->PSAP
>           ---------------------/many hops/----->
>                            (2)
>=20
> How can "delivery" be L2 dependent, when it must reach a PSAP many =
hops
> away?
> Color me confused.
>=20
> Mike
>=20
>=20
> >-----Original Message-----
> >From: Brian Rosen [mailto:br@brianrosen.net]
> >Sent: Wednesday, April 20, 2005 10:47 AM
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The idea is that, say, you are in your home, served by a DSL =
provider.
> >The domain is then that of the DSL vendor.  Your phone asks
> >for its location from the server in the DSL domain.  It would
> >be given the location corresponding to the IP address of the
> >request.  Note that this would be pretty good for the
> >requested case, even in the presence of a NATed local area
> >network in your home.  The phone would do this on boot, before
> >any VPN tunnels were established.
> >
> >I get the idea that a single delivery mechanism is desirable.
> >I'm skeptical we can do that because of the security issues.
> >When you make the delivery mechanism L2 dependent, you can
> >control the possible attacks to a finer grain than the L7 local =
domain.
> >
> >Please keep in mind that some of the folks wishing to use the
> >L7 mechanism don't really want to just return location to the
> >endpoint; they want to retain the location and give it out to
> >authorized entities upon presentation of the IP address of the
> >endpoint.  That is a business decision.  They can charge for
> >such a service.  I think the privacy implications of that are
> >dicey, but the reality is that's the model that will probably
> >be implemented if we do this.
> >
> >Brian
> >
> >
> >
> >
> >
> >> -----Original Message-----
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> Sent: Wednesday, April 20, 2005 10:14 AM
> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> InterimMeeting
> >>
> >> Brian,
> >>
> >> Could you clarify the domain statement.  Given nomadicity, it would
> >> seem that location delivery would need to be cross-domain.  The =
E911
> >> PSAP will not always be the same domain as the roaming endpoint.
> >>
> >> My impression is that Location discovery is a L2 issue, tied to the
> >> fact that L2 is supposed to be a single physical hop at most =
between
> >> the end- user terminal and an adjacent location-determining network
> >> node.  (Of course those trying to make L2 protocols a
> >replacement for
> >> IP sort of screw this assumption up.)
> >>
> >> The location delivery mechanism is an application-layer or
> >L7 service.
> >> The argument there is that since multiple applications will need to
> >> rely on location information, a general purpose delivery mechanism
> >> will provide consistency and generality that is so often sought in
> >> IETF work.  Security can be built-in to the chosen delivery
> >mechanism.
> >> Note, that delivery could be a choice of an existing transfer
> >> mechanism.  This does not preclude other L7 protocols from
> >defining a
> >> place in their messages that could also carry location information.
> >>
> >> So, I believe:
> >> Location discovery is local, with associated security being local,
> >> Location delivery is global, with associated security being global.
> >>
> >> The real issues are making those happen.
> >>
> >> Mike
> >>
> >> >-----Original Message-----
> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On
> >> >Behalf Of Brian Rosen
> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> >> >To: peter_blatherwick@mitel.com
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >> >InterimMeeting
> >> >
> >> >There turns out to be a large set of issues around this problem,
> >> >which I fear is leading to Balkanization.  There are two really
> >> >important problems we need to solve.
> >> >
> >> >One fundamental problem is that every client needs to
> >implement every
> >> >possible LI transfer mechanism that its environment could provide.
> >> >
> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >> >guys reject both
> >> >of these and want a something else.  Every phone has to implement
> >> >every protocol.
> >> >
> >> >There are some who have observed that the mechanisms at hand are =
L2
> >> >specific.  They claim as long as you have an L2 specific =
mechanism,
> >> >you need one or more for each L2.  To get out of that, they =
propose
> >> >that we use an L7 mechanism (think some version of HTTP, although
> >> >that might not fly).  They would say, lets do that once,
> >and every L2
> >> >can use it.  The problem is that you then have to deal with the
> >> >security issues of an L7 mechanism, and in particular, you have to
> >> >use IP address as the "key" for what location to return.
> >If you can
> >> >spoof IP address, you can get someone else's location.
> >> >
> >> >Those advocating L7 mechanisms claim that the mechanism
> >would only be
> >> >implemented within a domain, and the domain would have to take
> >> >anti-spoofing steps.  They note that the mechanism would need at
> >> >least a complete round trip, and probably more than one, so
> >spoofing
> >> >requires the ability to
> >> >intercept packets not addressed to the attacker.   The
> >> >returned data could
> >> >be precisely a PIDF-LO.
> >> >
> >> >Then on top of that, we turn out to need some more security,
> >> >especially for emergency calls.  We need to prevent forged
> >locations.
> >> >That means we need to sign the PIDF-LO.  If you get location via
> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from =
that,
> >> >how do we construct a signature from the entity that actually
> >> >determined location?
> >> >
> >> >Brian
> >> >
> >> >
> >> >________________________________________
> >> >From: geopriv-bounces@ietf.org
> >> >[mailto:geopriv-bounces@ietf.org] On Behalf Of
> >> >peter_blatherwick@mitel.com
> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> >> >To: Andrew Newton
> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> >> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
> >> >Meeting
> >> >
> >> >
> >> >Hi Andrew, lists,
> >> >
> >> >I'd like to better understand the meaning of the following agenda
> >> >items:
> >> >=A0 "
> >> >=A0 2) Properties of network elements in transferring LI from =
layer 2
> >> >=A0upward to PIDF-LO.
> >> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >> >=A0"
> >> >
> >> >Is there a summary of what these really mean, or examples
> >of what the
> >> >outcome could be in terms of protocol or layer interactions?
> >> >
> >> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which
> >> >would be able to deliver location information to endpoints from =
the
> >> >L2 LAN infrastructure they are connected to. =A0The work is
> >going on in
> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint
> >> >Discovery (LLDP-MED), which is an extension of IEEE
> >802.1AB, specific
> >> >to VoIP systems. =A0In LLDP-MED, among several other things, we =
have
> >> >specified ways to pass equivalent data to the DHCP =
coordinate-based
> >> >LCI (RFC 3825) and civic location LCI
> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe).
> >> >We see this method of delivery as a non-competing
> >alternative to the
> >> >DHCP-based approach, with the same end result to the overall ECS
> >> >system (the endpoint receives the exact same data), which has some
> >> >advantages particularly in enterprise deployment scenarios. =
=A0(The
> >> >DHCP-based method has advantages in different scenarios.) =A0 I am
> >> >Editor of thi s document, and it is now in ballot process in TIA
> >> >(more or less equivalent to Last Call in IETF).
> >> >
> >> >Sorry, I expect I am suffering lack of context here, since I only
> >> >joined the list relatively recently.
> >> >
> >> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past =
Last
> >> >Call and in the RFC Editor's queue? =A0It seemed to have been =
settled
> >> >on the list, and waiting on AD action.
> >> >
> >> >-- Peter Blatherwick
> >> >
> >> >
> >> >
> >> >
> >> >Andrew Newton <andy@hxr.us>
> >> >Sent by: geopriv-bounces@ietf.org
> >> >13.04.05 16:34
> >> >
> >> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >> >=A0 =A0 =A0 =A0 cc:
> >> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint
> >GEOPRIV/ECRIT
> >> >Interim Meeting
> >> >
> >> >
> >> >
> >> >
> >> >The GEOPRIV and ECRIT working groups will be holding a
> >joint interim
> >> >meeting.
> >> >
> >> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >> >=A0 =A0 =A0Where: Columbia University
> >> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >> >Directions: http://www.cs.columbia.edu/directions.html
> >> >=A0 =A0 =A0 Also: WiFi provided.
> >> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >> >
> >> >Proposed GEOPRIV Agenda:
> >> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> >use of LI
> >> >in HTTP/HTML for web browsing.
> >> >2) Properties of network elements in transferring LI from layer 2
> >> >upward to PIDF-LO.
> >> >3) Proposed enhancements to PIDF-LO to support #2.
> >> >
> >> >Proposed ECRIT Agenda:
> >> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >> >1) Emergency Call Routing Requirements
> >> >2) Security and Threats Analysis
> >> >
> >> >_______________________________________________
> >> >Geopriv mailing list
> >> >Geopriv@ietf.org
> >> >https://www1.ietf.org/mailman/listinfo/geopriv
> >> >
> >> >
> >> >
> >> >
> >> >_______________________________________________
> >> >Ecrit mailing list
> >> >Ecrit@ietf.org
> >> >https://www1.ietf.org/mailman/listinfo/ecrit
> >> >
> >>
> >
> >
>=20




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 13:02:32 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIau-0004lp-B3; Wed, 20 Apr 2005 13:02:32 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIas-0004lV-IQ; Wed, 20 Apr 2005 13:02:30 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27642;
	Wed, 20 Apr 2005 13:02:28 -0400 (EDT)
Received: from dnsmx2pya.telcordia.com ([128.96.20.32])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOIm8-00017M-Do; Wed, 20 Apr 2005 13:14:08 -0400
Received: from rrc-its-ieg02.cc.telcordia.com (rrc-its-ieg02.cc.telcordia.com
	[128.96.109.3])
	by dnsmx2pya.telcordia.com (8.11.7+Sun/8.9.3) with SMTP id j3KH2DO07901;
	Wed, 20 Apr 2005 13:02:13 -0400 (EDT)
Received: from rrc-its-exig01.mail.saic.com ([128.96.103.57])
	by rrc-its-ieg02.cc.telcordia.com (SMSSMTP 4.0.5.66) with SMTP id
	M2005042013021004280 ; Wed, 20 Apr 2005 13:02:10 -0400
Received: by rrc-its-exig01.mail.saic.com with Internet Mail Service
	(5.5.2657.72) id <HCCDPBJM>; Wed, 20 Apr 2005 13:02:10 -0400
Message-ID: <F0CB7F62D783BF40AD93882BB817F2450235862D@nvc-its-exs01.cc.telcordia.com>
From: "Abbott, Nadine B." <nabbott@telcordia.com>
To: "'Brian Rosen'" <br@brianrosen.net>, "'Michael Hammer (mhammer)'"
	<mhammer@cisco.com>, peter_blatherwick@mitel.com
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Int
	erimMeeting
Date: Wed, 20 Apr 2005 13:02:08 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by dnsmx2pya.telcordia.com
	id j3KH2DO07901
X-Spam-Score: 0.0 (/)
X-Scan-Signature: bfe538a859d88717fa3c8a6377d62f90
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

The "folks pushing this mechanism" are not using DHCP servers in their
networks to download configuration information. This constitutes a
significant portion of the access network providers in North America. Tha=
t
is why they see a need to investigate an additional mechanism, e.g., ACS.
And the beyond-transition methods being discussed support download of
location to the endpoint, just not necessarily via DHCP.

On a different point, determination of location will be paid for by someo=
ne
(or it won't happen).  It's a matter of who and how. Out of scope for IET=
F
surely?=20

Nadine

-----Original Message-----
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On Behal=
f
Of Brian Rosen
Sent: Wednesday, April 20, 2005 10:47 AM
To: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


The idea is that, say, you are in your home, served by a DSL provider. Th=
e
domain is then that of the DSL vendor.  Your phone asks for its location
from the server in the DSL domain.  It would be given the location
corresponding to the IP address of the request.  Note that this would be
pretty good for the requested case, even in the presence of a NATed local
area network in your home.  The phone would do this on boot, before any V=
PN
tunnels were established.

I get the idea that a single delivery mechanism is desirable.  I'm skepti=
cal
we can do that because of the security issues.  When you make the deliver=
y
mechanism L2 dependent, you can control the possible attacks to a finer
grain than the L7 local domain.

Please keep in mind that some of the folks wishing to use the L7 mechanis=
m
don't really want to just return location to the endpoint; they want to
retain the location and give it out to authorized entities upon presentat=
ion
of the IP address of the endpoint.  That is a business decision.  They ca=
n
charge for such a service.  I think the privacy implications of that are
dicey, but the reality is that's the model that will probably be implemen=
ted
if we do this. =20

Brian





> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 10:14 AM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
> InterimMeeting
>=20
> Brian,
>=20
> Could you clarify the domain statement.  Given nomadicity, it would=20
> seem that location delivery would need to be cross-domain.  The E911=20
> PSAP will not always be the same domain as the roaming endpoint.
>=20
> My impression is that Location discovery is a L2 issue, tied to the=20
> fact that L2 is supposed to be a single physical hop at most between=20
> the end- user terminal and an adjacent location-determining network=20
> node.  (Of course those trying to make L2 protocols a replacement for=20
> IP sort of screw this assumption up.)
>=20
> The location delivery mechanism is an application-layer or L7 service.=20
> The argument there is that since multiple applications will need to=20
> rely on location information, a general purpose delivery mechanism=20
> will provide consistency and generality that is so often sought in=20
> IETF work.  Security can be built-in to the chosen delivery mechanism. =
=20
> Note, that delivery could be a choice of an existing transfer=20
> mechanism.  This does not preclude other L7 protocols from defining a=20
> place in their messages that could also carry location information.
>=20
> So, I believe:
> Location discovery is local, with associated security being local,=20
> Location delivery is global, with associated security being global.
>=20
> The real issues are making those happen.
>=20
> Mike
>=20
> >-----Original Message-----
> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On=20
> >Behalf Of Brian Rosen
> >Sent: Wednesday, April 20, 2005 9:54 AM
> >To: peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
> >InterimMeeting
> >
> >There turns out to be a large set of issues around this problem,=20
> >which I fear is leading to Balkanization.  There are two really=20
> >important problems we need to solve.
> >
> >One fundamental problem is that every client needs to implement every=20
> >possible LI transfer mechanism that its environment could provide.
> >
> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >guys reject both
> >of these and want a something else.  Every phone has to implement=20
> >every protocol.
> >
> >There are some who have observed that the mechanisms at hand are L2=20
> >specific.  They claim as long as you have an L2 specific mechanism,=20
> >you need one or more for each L2.  To get out of that, they propose=20
> >that we use an L7 mechanism (think some version of HTTP, although=20
> >that might not fly).  They would say, lets do that once, and every L2=20
> >can use it.  The problem is that you then have to deal with the=20
> >security issues of an L7 mechanism, and in particular, you have to=20
> >use IP address as the "key" for what location to return.  If you can
> >spoof IP address, you can get someone else's location.
> >
> >Those advocating L7 mechanisms claim that the mechanism would only be=20
> >implemented within a domain, and the domain would have to take=20
> >anti-spoofing steps.  They note that the mechanism would need at=20
> >least a complete round trip, and probably more than one, so spoofing=20
> >requires the ability to
> >intercept packets not addressed to the attacker.   The
> >returned data could
> >be precisely a PIDF-LO.
> >
> >Then on top of that, we turn out to need some more security,=20
> >especially for emergency calls.  We need to prevent forged locations. =
=20
> >That means we need to sign the PIDF-LO.  If you get location via=20
> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from that,=20
> >how do we construct a signature from the entity that actually=20
> >determined location?
> >
> >Brian
> >
> >
> >________________________________________
> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On=20
> >Behalf Of peter_blatherwick@mitel.com
> >Sent: Wednesday, April 20, 2005 9:30 AM
> >To: Andrew Newton
> >Cc: GEOPRIV WG; ecrit@ietf.org
> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >Interim Meeting
> >
> >
> >Hi Andrew, lists,
> >
> >I'd like to better understand the meaning of the following agenda=20
> >items:
> >=A0 "
> >=A0 2) Properties of network elements in transferring LI from layer 2
> >=A0upward to PIDF-LO.
> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >=A0"
> >
> >Is there a summary of what these really mean, or examples of what the=20
> >outcome could be in terms of protocol or layer interactions?
> >
> >Reason I'm asking is I am deeply involved in a layer 2 approach which=20
> >would be able to deliver location information to endpoints from the=20
> >L2 LAN infrastructure they are connected to. =A0The work is going on i=
n=20
> >TIA and is called Link Layer Discovery Protocol - Media Endpoint=20
> >Discovery (LLDP-MED), which is an extension of IEEE 802.1AB, specific=20
> >to VoIP systems. =A0In LLDP-MED, among several other things, we have
> >specified ways to pass equivalent data to the DHCP
> >coordinate-based LCI (RFC 3825) and civic location LCI
> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe). =A0We see this method of delivery as a non-competing
> >alternative to the DHCP-based approach, with the same end
> >result to the overall ECS system (the endpoint receives the
> >exact same data), which has some advantages particularly in
> >enterprise deployment scenarios. =A0(The DHCP-based method has
> >advantages in different scenarios.) =A0 I am Editor of thi s
> >document, and it is now in ballot process in TIA (more or less
> >equivalent to Last Call in IETF).
> >
> >Sorry, I expect I am suffering lack of context here, since I only=20
> >joined the list relatively recently.
> >
> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Last=20
> >Call and in the RFC Editor's queue? =A0It seemed to have been settled=20
> >on the list, and waiting on AD action.
> >
> >-- Peter Blatherwick
> >
> >
> >
> >
> >Andrew Newton <andy@hxr.us>
> >Sent by: geopriv-bounces@ietf.org
> >13.04.05 16:34
> >
> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >=A0 =A0 =A0 =A0 cc:
> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of Join=
t GEOPRIV/ECRIT=20
> >Interim Meeting
> >
> >
> >
> >
> >The GEOPRIV and ECRIT working groups will be holding a joint interim=20
> >meeting.
> >
> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >=A0 =A0 =A0Where: Columbia University
> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >Directions: http://www.cs.columbia.edu/directions.html
> >=A0 =A0 =A0 Also: WiFi provided.
> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >
> >Proposed GEOPRIV Agenda:
> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI=20
> >in HTTP/HTML for web browsing.
> >2) Properties of network elements in transferring LI from layer 2=20
> >upward to PIDF-LO.
> >3) Proposed enhancements to PIDF-LO to support #2.
> >
> >Proposed ECRIT Agenda:
> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >1) Emergency Call Routing Requirements
> >2) Security and Threats Analysis
> >
> >_______________________________________________
> >Geopriv mailing list
> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
> >
> >
> >
> >
> >_______________________________________________
> >Ecrit mailing list
> >Ecrit@ietf.org
> >https://www1.ietf.org/mailman/listinfo/ecrit
> >
>=20




_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 13:04:40 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIcy-0004yF-4w; Wed, 20 Apr 2005 13:04:40 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIcw-0004xy-9G; Wed, 20 Apr 2005 13:04:38 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA27764;
	Wed, 20 Apr 2005 13:04:35 -0400 (EDT)
Received: from dnsmx2pya.telcordia.com ([128.96.20.32])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOIoC-0001AA-6l; Wed, 20 Apr 2005 13:16:16 -0400
Received: from rrc-its-ieg02.cc.telcordia.com (rrc-its-ieg02.cc.telcordia.com
	[128.96.109.3])
	by dnsmx2pya.telcordia.com (8.11.7+Sun/8.9.3) with SMTP id j3KH4AO08295;
	Wed, 20 Apr 2005 13:04:10 -0400 (EDT)
Received: from rrc-its-exig01.mail.saic.com ([128.96.103.57])
	by rrc-its-ieg02.cc.telcordia.com (SMSSMTP 4.0.5.66) with SMTP id
	M2005042013040704386 ; Wed, 20 Apr 2005 13:04:07 -0400
Received: by rrc-its-exig01.mail.saic.com with Internet Mail Service
	(5.5.2657.72) id <HCCDPBM4>; Wed, 20 Apr 2005 13:04:05 -0400
Message-ID: <F0CB7F62D783BF40AD93882BB817F2450235862E@nvc-its-exs01.cc.telcordia.com>
From: "Abbott, Nadine B." <nabbott@telcordia.com>
To: "'Michael Hammer (mhammer)'" <mhammer@cisco.com>, Brian Rosen
	<br@brianrosen.net>, peter_blatherwick@mitel.com
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Int
	erimMeeting
Date: Wed, 20 Apr 2005 13:03:57 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by dnsmx2pya.telcordia.com
	id j3KH4AO08295
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 343d06d914165ffd9d590a64755216ca
Content-Transfer-Encoding: quoted-printable
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Mike,
You are right--it is being used in two different contexts.
Delivery of location to the endpoint and delivery of location to the PSAP.
We need different terms or we need to qualify the term when we use it (as
above).
Nadine

-----Original Message-----
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
Michael Hammer (mhammer)
Sent: Wednesday, April 20, 2005 12:00 PM
To: Brian Rosen; peter_blatherwick@mitel.com
Cc: GEOPRIV WG; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


I still get the feeling that "delivery" is being used in two different
contexts:

            (1)                     (2)
Local node---?---->endpoint-----/many hops/----->PSAP=20
          ---------------------/many hops/----->
                           (2)

How can "delivery" be L2 dependent, when it must reach a PSAP many hops
away? Color me confused.

Mike


>-----Original Message-----
>From: Brian Rosen [mailto:br@brianrosen.net]
>Sent: Wednesday, April 20, 2005 10:47 AM
>To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
>Cc: 'GEOPRIV WG'; ecrit@ietf.org
>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT InterimMeeting
>
>The idea is that, say, you are in your home, served by a DSL provider.=20
>The domain is then that of the DSL vendor.  Your phone asks for its=20
>location from the server in the DSL domain.  It would be given the=20
>location corresponding to the IP address of the request.  Note that=20
>this would be pretty good for the requested case, even in the presence=20
>of a NATed local area network in your home.  The phone would do this on=20
>boot, before any VPN tunnels were established.
>
>I get the idea that a single delivery mechanism is desirable.
>I'm skeptical we can do that because of the security issues. =20
>When you make the delivery mechanism L2 dependent, you can=20
>control the possible attacks to a finer grain than the L7 local domain.
>
>Please keep in mind that some of the folks wishing to use the
>L7 mechanism don't really want to just return location to the=20
>endpoint; they want to retain the location and give it out to=20
>authorized entities upon presentation of the IP address of the=20
>endpoint.  That is a business decision.  They can charge for=20
>such a service.  I think the privacy implications of that are=20
>dicey, but the reality is that's the model that will probably=20
>be implemented if we do this. =20
>
>Brian
>
>
>
>
>
>> -----Original Message-----
>> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
>> Sent: Wednesday, April 20, 2005 10:14 AM
>> To: Brian Rosen; peter_blatherwick@mitel.com
>> Cc: GEOPRIV WG; ecrit@ietf.org
>> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
>GEOPRIV/ECRIT
>> InterimMeeting
>>=20
>> Brian,
>>=20
>> Could you clarify the domain statement.  Given nomadicity, it would
>> seem that location delivery would need to be cross-domain.  The E911=20
>> PSAP will not always be the same domain as the roaming endpoint.
>>=20
>> My impression is that Location discovery is a L2 issue, tied to the
>> fact that L2 is supposed to be a single physical hop at most between=20
>> the end- user terminal and an adjacent location-determining network=20
>> node.  (Of course those trying to make L2 protocols a=20
>replacement for
>> IP sort of screw this assumption up.)
>>=20
>> The location delivery mechanism is an application-layer or
>L7 service.
>> The argument there is that since multiple applications will need to
>> rely on location information, a general purpose delivery mechanism=20
>> will provide consistency and generality that is so often sought in=20
>> IETF work.  Security can be built-in to the chosen delivery=20
>mechanism.
>> Note, that delivery could be a choice of an existing transfer
>> mechanism.  This does not preclude other L7 protocols from=20
>defining a
>> place in their messages that could also carry location information.
>>=20
>> So, I believe:
>> Location discovery is local, with associated security being local,
>> Location delivery is global, with associated security being global.
>>=20
>> The real issues are making those happen.
>>=20
>> Mike
>>=20
>> >-----Original Message-----
>> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On
>> >Behalf Of Brian Rosen
>> >Sent: Wednesday, April 20, 2005 9:54 AM
>> >To: peter_blatherwick@mitel.com
>> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
>> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
>> >InterimMeeting
>> >
>> >There turns out to be a large set of issues around this problem,
>> >which I fear is leading to Balkanization.  There are two really=20
>> >important problems we need to solve.
>> >
>> >One fundamental problem is that every client needs to
>implement every
>> >possible LI transfer mechanism that its environment could provide.
>> >
>> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
>> >guys reject both
>> >of these and want a something else.  Every phone has to implement
>> >every protocol.
>> >
>> >There are some who have observed that the mechanisms at hand are L2
>> >specific.  They claim as long as you have an L2 specific mechanism,=20
>> >you need one or more for each L2.  To get out of that, they propose=20
>> >that we use an L7 mechanism (think some version of HTTP, although=20
>> >that might not fly).  They would say, lets do that once,=20
>and every L2
>> >can use it.  The problem is that you then have to deal with the
>> >security issues of an L7 mechanism, and in particular, you have to=20
>> >use IP address as the "key" for what location to return. =20
>If you can
>> >spoof IP address, you can get someone else's location.
>> >
>> >Those advocating L7 mechanisms claim that the mechanism
>would only be
>> >implemented within a domain, and the domain would have to take
>> >anti-spoofing steps.  They note that the mechanism would need at=20
>> >least a complete round trip, and probably more than one, so=20
>spoofing
>> >requires the ability to
>> >intercept packets not addressed to the attacker.   The
>> >returned data could
>> >be precisely a PIDF-LO.
>> >
>> >Then on top of that, we turn out to need some more security,
>> >especially for emergency calls.  We need to prevent forged=20
>locations.
>> >That means we need to sign the PIDF-LO.  If you get location via
>> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from that,=20
>> >how do we construct a signature from the entity that actually=20
>> >determined location?
>> >
>> >Brian
>> >
>> >
>> >________________________________________
>> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On=20
>> >Behalf Of peter_blatherwick@mitel.com
>> >Sent: Wednesday, April 20, 2005 9:30 AM
>> >To: Andrew Newton
>> >Cc: GEOPRIV WG; ecrit@ietf.org
>> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim=20
>> >Meeting
>> >
>> >
>> >Hi Andrew, lists,
>> >
>> >I'd like to better understand the meaning of the following agenda
>> >items:
>> >=A0 "
>> >=A0 2) Properties of network elements in transferring LI from layer 2
>> >=A0upward to PIDF-LO.
>> >=A03) Proposed enhancements to PIDF-LO to support #2.
>> >=A0"
>> >
>> >Is there a summary of what these really mean, or examples
>of what the
>> >outcome could be in terms of protocol or layer interactions?
>> >
>> >Reason I'm asking is I am deeply involved in a layer 2
>approach which
>> >would be able to deliver location information to endpoints from the
>> >L2 LAN infrastructure they are connected to. =A0The work is=20
>going on in
>> >TIA and is called Link Layer Discovery Protocol - Media Endpoint
>> >Discovery (LLDP-MED), which is an extension of IEEE=20
>802.1AB, specific
>> >to VoIP systems. =A0In LLDP-MED, among several other things, we have
>> >specified ways to pass equivalent data to the DHCP coordinate-based=20
>> >LCI (RFC 3825) and civic location LCI=20
>> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I=20
>believe).
>> >We see this method of delivery as a non-competing
>alternative to the
>> >DHCP-based approach, with the same end result to the overall ECS
>> >system (the endpoint receives the exact same data), which has some=20
>> >advantages particularly in enterprise deployment scenarios. =A0(The=20
>> >DHCP-based method has advantages in different scenarios.) =A0 I am=20
>> >Editor of thi s document, and it is now in ballot process in TIA=20
>> >(more or less equivalent to Last Call in IETF).
>> >
>> >Sorry, I expect I am suffering lack of context here, since I only
>> >joined the list relatively recently.
>> >
>> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Last
>> >Call and in the RFC Editor's queue? =A0It seemed to have been settled=
=20
>> >on the list, and waiting on AD action.
>> >
>> >-- Peter Blatherwick
>> >
>> >
>> >
>> >
>> >Andrew Newton <andy@hxr.us>
>> >Sent by: geopriv-bounces@ietf.org
>> >13.04.05 16:34
>> >
>> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
>> >=A0 =A0 =A0 =A0 cc:
>> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of Joi=
nt
>GEOPRIV/ECRIT
>> >Interim Meeting
>> >
>> >
>> >
>> >
>> >The GEOPRIV and ECRIT working groups will be holding a
>joint interim
>> >meeting.
>> >
>> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
>> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
>> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
>> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
>> >=A0 =A0 =A0Where: Columbia University
>> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
>> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
>> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
>> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
>> >Directions: http://www.cs.columbia.edu/directions.html
>> >=A0 =A0 =A0 Also: WiFi provided.
>> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
>> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
>> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
>> >
>> >Proposed GEOPRIV Agenda:
>> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
>> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
>use of LI
>> >in HTTP/HTML for web browsing.
>> >2) Properties of network elements in transferring LI from layer 2
>> >upward to PIDF-LO.
>> >3) Proposed enhancements to PIDF-LO to support #2.
>> >
>> >Proposed ECRIT Agenda:
>> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
>> >1) Emergency Call Routing Requirements
>> >2) Security and Threats Analysis
>> >
>> >_______________________________________________
>> >Geopriv mailing list
>> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
>> >
>> >
>> >
>> >
>> >_______________________________________________
>> >Ecrit mailing list
>> >Ecrit@ietf.org
>> >https://www1.ietf.org/mailman/listinfo/ecrit
>> >
>>=20
>
>

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 13:19:18 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIr8-0007hW-9j; Wed, 20 Apr 2005 13:19:18 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOIr6-0007hK-Sd; Wed, 20 Apr 2005 13:19:16 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA29206;
	Wed, 20 Apr 2005 13:19:14 -0400 (EDT)
From: peter_blatherwick@mitel.com
Received: from smtp.mitel.com ([216.191.234.102])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJ2J-0001n4-46; Wed, 20 Apr 2005 13:30:55 -0400
Received: from localhost (smtp.mitel.com [127.0.0.1])
	by smtp.mitel.com (Postfix) with ESMTP
	id 6055520096; Wed, 20 Apr 2005 13:18:59 -0400 (EDT)
Received: from smtp.mitel.com ([127.0.0.1])
	by localhost (smtp.mitel.com [127.0.0.1]) (amavisd-new,
	port 10124) with LMTP
	id 18973-01; Wed, 20 Apr 2005 13:18:59 -0400 (EDT)
Received: from kanmta01.mitel.com (kanmta01 [134.199.37.58])
	by smtp.mitel.com (Postfix) with ESMTP
	id E7B3720055; Wed, 20 Apr 2005 13:18:58 -0400 (EDT)
To: "Brian Rosen" <br@brianrosen.net>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
MIME-Version: 1.0
X-Mailer: Lotus Notes Release 5.0.12   February 13, 2003
Message-ID: <OF73D31E3A.49B5F420-ON85256FE9.005B58AE-85256FE9.005F21CA@mitel.com>
Date: Wed, 20 Apr 2005 13:21:15 -0400
X-MIMETrack: Serialize by Router on kanmta01/Mitel(Release 5.0.12 |February 13,
	2003) at 04/20/2005 01:18:57 PM,
	Serialize complete at 04/20/2005 01:18:57 PM
X-Virus-Scanned: by amavisd-new (virusonly) at mitel.com
X-Spam-Score: 0.3 (/)
X-Scan-Signature: 111b48b3edee1f6fe0a892c95423c18d
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0630967659=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a multipart message in MIME format.
--===============0630967659==
Content-Type: multipart/alternative;
	boundary="=_alternative 005F21C685256FE9_="

This is a multipart message in MIME format.
--=_alternative 005F21C685256FE9_=
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

Seems a simple-minded question has sparked a flurry of debate ;-)    Some=20
thoughts, just to stir the pot some more... not that it appears to need=20
it...

I do not at all see the purely L2 LLDP-MED approach and the call it L2.5=20
DHCP approach as being in conflict.  They are merely different ways suited =

to different scenarios.=20

I do not see implementing both LLDP-based and DHCP-based methods in a=20
phone as being a big deal, since in the end they both are simple, would=20
deliver the exact same data to the application above, and they start in a=20
strict order (LLDP always before DHCP).  The harder issue is really what=20
would the poor phone do if it received by both mechanisms, and the=20
received data were different -- it would need to pick one, or sort out the =

conflict itself (yech!).=20

Since LLDP (hence LLDP-MED) is strictly contained to a physical link, its=20
security is very contained.=20

IEEE 802.1X is applied to that same link before LLDP gets to run (or=20
before DHCP for that matter), so at least the endpoint can be well=20
authenticated before hand.  Also, it intuitively makes sense at least in=20
my fuzzy brain, that the X509 certs which could be part of the 802.1X=20
authentication exchange (if EAP-TLS is used) could also be useful in the=20
upward authentication process.  (If I have messed up the acronyms, please=20
do not jump down my throat .. hopefully close enough.)

It would indeed be unfortunate to add a third approach ... or a forth .... =

  I am not familiar with whatever the DSL approach would be, but do not=20
off-hand see why a DHCP relay approach would not work there.  Anything=20
written up to look at on it?=20

Peter









"Brian Rosen" <br@brianrosen.net>
20.04.05 10:47

=20
        To:     "'Michael Hammer (mhammer)'" <mhammer@cisco.com>,=20
<peter=5Fblatherwick@mitel.com>
        cc:     "'GEOPRIV WG'" <geopriv@ietf.org>, <ecrit@ietf.org>
        Subject:        RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEO=
PRIV/ECRIT=20
InterimMeeting


The idea is that, say, you are in your home, served by a DSL provider.
The domain is then that of the DSL vendor.  Your phone asks for its=20
location
from the server in the DSL domain.  It would be given the location
corresponding to the IP address of the request.  Note that this would be
pretty good for the requested case, even in the presence of a NATed local
area network in your home.  The phone would do this on boot, before any=20
VPN
tunnels were established.

I get the idea that a single delivery mechanism is desirable.  I'm=20
skeptical
we can do that because of the security issues.  When you make the delivery
mechanism L2 dependent, you can control the possible attacks to a finer
grain than the L7 local domain.

Please keep in mind that some of the folks wishing to use the L7 mechanism
don't really want to just return location to the endpoint; they want to
retain the location and give it out to authorized entities upon=20
presentation
of the IP address of the endpoint.  That is a business decision.  They can
charge for such a service.  I think the privacy implications of that are
dicey, but the reality is that's the model that will probably be=20
implemented
if we do this.=20

Brian





> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 10:14 AM
> To: Brian Rosen; peter=5Fblatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
>=20
> Brian,
>=20
> Could you clarify the domain statement.  Given nomadicity, it would seem
> that location delivery would need to be cross-domain.  The E911 PSAP=20
will
> not always be the same domain as the roaming endpoint.
>=20
> My impression is that Location discovery is a L2 issue, tied to the fact
> that L2 is supposed to be a single physical hop at most between the end-
> user terminal and an adjacent location-determining network node.  (Of
> course those trying to make L2 protocols a replacement for IP sort of
> screw this assumption up.)
>=20
> The location delivery mechanism is an application-layer or L7 service.
> The argument there is that since multiple applications will need to rely
> on location information, a general purpose delivery mechanism will=20
provide
> consistency and generality that is so often sought in IETF work.=20
Security
> can be built-in to the chosen delivery mechanism.  Note, that delivery
> could be a choice of an existing transfer mechanism.  This does not
> preclude other L7 protocols from defining a place in their messages that
> could also carry location information.
>=20
> So, I believe:
> Location discovery is local, with associated security being local,
> Location delivery is global, with associated security being global.
>=20
> The real issues are making those happen.
>=20
> Mike
>=20
> >-----Original Message-----
> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org]
> >On Behalf Of Brian Rosen
> >Sent: Wednesday, April 20, 2005 9:54 AM
> >To: peter=5Fblatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >There turns out to be a large set of issues around this
> >problem, which I fear is leading to Balkanization.  There are
> >two really important problems we need to solve.
> >
> >One fundamental problem is that every client needs to
> >implement every possible LI transfer mechanism that its
> >environment could provide.
> >
> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >guys reject both
> >of these and want a something else.  Every phone has to
> >implement every protocol.
> >
> >There are some who have observed that the mechanisms at hand
> >are L2 specific.  They claim as long as you have an L2
> >specific mechanism, you need one or more for each L2.  To get
> >out of that, they propose that we use an L7 mechanism (think
> >some version of HTTP, although that might not fly).  They
> >would say, lets do that once, and every L2 can use it.  The
> >problem is that you then have to deal with the security issues
> >of an L7 mechanism, and in particular, you have to use IP
> >address as the "key" for what location to return.  If you can
> >spoof IP address, you can get someone else's location.
> >
> >Those advocating L7 mechanisms claim that the mechanism would
> >only be implemented within a domain, and the domain would have
> >to take anti-spoofing steps.  They note that the mechanism
> >would need at least a complete round trip, and probably more
> >than one, so spoofing requires the ability to
> >intercept packets not addressed to the attacker.   The
> >returned data could
> >be precisely a PIDF-LO.
> >
> >Then on top of that, we turn out to need some more security,
> >especially for emergency calls.  We need to prevent forged
> >locations.  That means we need to sign the PIDF-LO.  If you
> >get location via DHCP, or LLDP-MED, and the endpoint
> >constructs a PIDF-LO from that, how do we construct a
> >signature from the entity that actually determined location?
> >
> >Brian
> >
> >
> >=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
> >From: geopriv-bounces@ietf.org
> >[mailto:geopriv-bounces@ietf.org] On Behalf Of
> >peter=5Fblatherwick@mitel.com
> >Sent: Wednesday, April 20, 2005 9:30 AM
> >To: Andrew Newton
> >Cc: GEOPRIV WG; ecrit@ietf.org
> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >Interim Meeting
> >
> >
> >Hi Andrew, lists,
> >
> >I'd like to better understand the meaning of the following
> >agenda items:
> >=A0 "
> >=A0 2) Properties of network elements in transferring LI from layer 2
> >=A0upward to PIDF-LO.
> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >=A0"
> >
> >Is there a summary of what these really mean, or examples of
> >what the outcome could be in terms of protocol or layer
> >interactions?
> >
> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which would be able to deliver location information
> >to endpoints from the L2 LAN infrastructure they are connected
> >to. =A0The work is going on in TIA and is called Link Layer
> >Discovery Protocol - Media Endpoint Discovery (LLDP-MED),
> >which is an extension of IEEE 802.1AB, specific to VoIP
> >systems. =A0In LLDP-MED, among several other things, we have
> >specified ways to pass equivalent data to the DHCP
> >coordinate-based LCI (RFC 3825) and civic location LCI
> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe). =A0We see this method of delivery as a non-competing
> >alternative to the DHCP-based approach, with the same end
> >result to the overall ECS system (the endpoint receives the
> >exact same data), which has some advantages particularly in
> >enterprise deployment scenarios. =A0(The DHCP-based method has
> >advantages in different scenarios.) =A0 I am Editor of thi s
> >document, and it is now in ballot process in TIA (more or less
> >equivalent to Last Call in IETF).
> >
> >Sorry, I expect I am suffering lack of context here, since I
> >only joined the list relatively recently.
> >
> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past
> >Last Call and in the RFC Editor's queue? =A0It seemed to have
> >been settled on the list, and waiting on AD action.
> >
> >-- Peter Blatherwick
> >
> >
> >
> >
> >Andrew Newton <andy@hxr.us>
> >Sent by: geopriv-bounces@ietf.org
> >13.04.05 16:34
> >
> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >=A0 =A0 =A0 =A0 cc:
> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT Interim Meeting
> >
> >
> >
> >
> >The GEOPRIV and ECRIT working groups will be holding a joint
> >interim meeting.
> >
> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >=A0 =A0 =A0Where: Columbia University
> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >Directions: http://www.cs.columbia.edu/directions.html
> >=A0 =A0 =A0 Also: WiFi provided.
> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >
> >Proposed GEOPRIV Agenda:
> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use
> >of LI in HTTP/HTML for web browsing.
> >2) Properties of network elements in transferring LI from
> >layer 2 upward to PIDF-LO.
> >3) Proposed enhancements to PIDF-LO to support #2.
> >
> >Proposed ECRIT Agenda:
> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >1) Emergency Call Routing Requirements
> >2) Security and Threats Analysis
> >
> >=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
> >Geopriv mailing list
> >Geopriv@ietf.org
> >https://www1.ietf.org/mailman/listinfo/geopriv
> >
> >
> >
> >
> >=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F
> >Ecrit mailing list
> >Ecrit@ietf.org
> >https://www1.ietf.org/mailman/listinfo/ecrit
> >
>=20






--=_alternative 005F21C685256FE9_=
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable


<br><font size=3D2 face=3D"sans-serif">Seems a simple-minded question has s=
parked a flurry of debate ;-) &nbsp; &nbsp;Some thoughts, just to stir the =
pot some more... not that it appears to need it...</font>
<br>
<br><font size=3D2 face=3D"sans-serif">I do not at all see the purely L2 LL=
DP-MED approach and the call it L2.5 DHCP approach as being in conflict. &n=
bsp;They are merely different ways suited to different scenarios. &nbsp;</f=
ont>
<br>
<br><font size=3D2 face=3D"sans-serif">I do not see implementing both LLDP-=
based and DHCP-based methods in a phone as being a big deal, since in the e=
nd they both are simple, would deliver the exact same data to the applicati=
on above, and they start in a strict order (LLDP always before DHCP). &nbsp=
;The harder issue is really what would the poor phone do if it received by =
both mechanisms, and the received data were different -- it would need to p=
ick one, or sort out the conflict itself (yech!). &nbsp;</font>
<br>
<br><font size=3D2 face=3D"sans-serif">Since LLDP (hence LLDP-MED) is stric=
tly contained to a physical link, its security is very contained. &nbsp;</f=
ont>
<br>
<br><font size=3D2 face=3D"sans-serif">IEEE 802.1X is applied to that same =
link before LLDP gets to run (or before DHCP for that matter), so at least =
the endpoint can be well authenticated before hand. &nbsp;Also, it intuitiv=
ely makes sense at least in my fuzzy brain, that the X509 certs which could=
 be part of the 802.1X authentication exchange (if EAP-TLS is used) could a=
lso be useful in the upward authentication process. &nbsp;(If I have messed=
 up the acronyms, please do not jump down my throat .. hopefully close enou=
gh.)</font>
<br>
<br><font size=3D2 face=3D"sans-serif">It would indeed be unfortunate to ad=
d a third approach ... or a forth .... &nbsp; I am not familiar with whatev=
er the DSL approach would be, but do not off-hand see why a DHCP relay appr=
oach would not work there. &nbsp;Anything written up to look at on it? </fo=
nt>
<br>
<br><font size=3D2 face=3D"sans-serif">Peter</font>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<br>
<table width=3D100%>
<tr valign=3Dtop>
<td>
<td><font size=3D1 face=3D"sans-serif"><b>&quot;Brian Rosen&quot; &lt;br@br=
ianrosen.net&gt;</b></font>
<p><font size=3D1 face=3D"sans-serif">20.04.05 10:47</font>
<br>
<td><font size=3D1 face=3D"Arial">&nbsp; &nbsp; &nbsp; &nbsp; </font>
<br><font size=3D1 face=3D"sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbs=
p; &nbsp; &nbsp; &nbsp;&quot;'Michael Hammer (mhammer)'&quot; &lt;mhammer@c=
isco.com&gt;, &lt;peter=5Fblatherwick@mitel.com&gt;</font>
<br><font size=3D1 face=3D"sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbs=
p; &nbsp; &nbsp; &nbsp;&quot;'GEOPRIV WG'&quot; &lt;geopriv@ietf.org&gt;, &=
lt;ecrit@ietf.org&gt;</font>
<br><font size=3D1 face=3D"sans-serif">&nbsp; &nbsp; &nbsp; &nbsp; Subject:=
 &nbsp; &nbsp; &nbsp; &nbsp;RE: [Ecrit] RE: [Geopriv] Announcement of Joint=
 GEOPRIV/ECRIT InterimMeeting</font></table>
<br>
<br>
<br><font size=3D2 face=3D"Courier New">The idea is that, say, you are in y=
our home, served by a DSL provider.<br>
The domain is then that of the DSL vendor. &nbsp;Your phone asks for its lo=
cation<br>
from the server in the DSL domain. &nbsp;It would be given the location<br>
corresponding to the IP address of the request. &nbsp;Note that this would =
be<br>
pretty good for the requested case, even in the presence of a NATed local<b=
r>
area network in your home. &nbsp;The phone would do this on boot, before an=
y VPN<br>
tunnels were established.<br>
<br>
I get the idea that a single delivery mechanism is desirable. &nbsp;I'm ske=
ptical<br>
we can do that because of the security issues. &nbsp;When you make the deli=
very<br>
mechanism L2 dependent, you can control the possible attacks to a finer<br>
grain than the L7 local domain.<br>
<br>
Please keep in mind that some of the folks wishing to use the L7 mechanism<=
br>
don't really want to just return location to the endpoint; they want to<br>
retain the location and give it out to authorized entities upon presentatio=
n<br>
of the IP address of the endpoint. &nbsp;That is a business decision. &nbsp=
;They can<br>
charge for such a service. &nbsp;I think the privacy implications of that a=
re<br>
dicey, but the reality is that's the model that will probably be implemente=
d<br>
if we do this. &nbsp;<br>
<br>
Brian<br>
<br>
<br>
<br>
<br>
<br>
&gt; -----Original Message-----<br>
&gt; From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]<br>
&gt; Sent: Wednesday, April 20, 2005 10:14 AM<br>
&gt; To: Brian Rosen; peter=5Fblatherwick@mitel.com<br>
&gt; Cc: GEOPRIV WG; ecrit@ietf.org<br>
&gt; Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=
<br>
&gt; InterimMeeting<br>
&gt; <br>
&gt; Brian,<br>
&gt; <br>
&gt; Could you clarify the domain statement. &nbsp;Given nomadicity, it wou=
ld seem<br>
&gt; that location delivery would need to be cross-domain. &nbsp;The E911 P=
SAP will<br>
&gt; not always be the same domain as the roaming endpoint.<br>
&gt; <br>
&gt; My impression is that Location discovery is a L2 issue, tied to the fa=
ct<br>
&gt; that L2 is supposed to be a single physical hop at most between the en=
d-<br>
&gt; user terminal and an adjacent location-determining network node. &nbsp=
;(Of<br>
&gt; course those trying to make L2 protocols a replacement for IP sort of<=
br>
&gt; screw this assumption up.)<br>
&gt; <br>
&gt; The location delivery mechanism is an application-layer or L7 service.=
<br>
&gt; The argument there is that since multiple applications will need to re=
ly<br>
&gt; on location information, a general purpose delivery mechanism will pro=
vide<br>
&gt; consistency and generality that is so often sought in IETF work. &nbsp=
;Security<br>
&gt; can be built-in to the chosen delivery mechanism. &nbsp;Note, that del=
ivery<br>
&gt; could be a choice of an existing transfer mechanism. &nbsp;This does n=
ot<br>
&gt; preclude other L7 protocols from defining a place in their messages th=
at<br>
&gt; could also carry location information.<br>
&gt; <br>
&gt; So, I believe:<br>
&gt; Location discovery is local, with associated security being local,<br>
&gt; Location delivery is global, with associated security being global.<br>
&gt; <br>
&gt; The real issues are making those happen.<br>
&gt; <br>
&gt; Mike<br>
&gt; <br>
&gt; &gt;-----Original Message-----<br>
&gt; &gt;From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org]<br>
&gt; &gt;On Behalf Of Brian Rosen<br>
&gt; &gt;Sent: Wednesday, April 20, 2005 9:54 AM<br>
&gt; &gt;To: peter=5Fblatherwick@mitel.com<br>
&gt; &gt;Cc: 'GEOPRIV WG'; ecrit@ietf.org<br>
&gt; &gt;Subject: [Ecrit] RE: [Geopriv] Announcement of Joint<br>
&gt; &gt;GEOPRIV/ECRIT InterimMeeting<br>
&gt; &gt;<br>
&gt; &gt;There turns out to be a large set of issues around this<br>
&gt; &gt;problem, which I fear is leading to Balkanization. &nbsp;There are=
<br>
&gt; &gt;two really important problems we need to solve.<br>
&gt; &gt;<br>
&gt; &gt;One fundamental problem is that every client needs to<br>
&gt; &gt;implement every possible LI transfer mechanism that its<br>
&gt; &gt;environment could provide.<br>
&gt; &gt;<br>
&gt; &gt;We have DHCP. &nbsp;You guys are working on LLDP-MED. &nbsp; The D=
SL<br>
&gt; &gt;guys reject both<br>
&gt; &gt;of these and want a something else. &nbsp;Every phone has to<br>
&gt; &gt;implement every protocol.</font>
<br><font size=3D2 face=3D"Courier New">&gt; &gt;<br>
&gt; &gt;There are some who have observed that the mechanisms at hand<br>
&gt; &gt;are L2 specific. &nbsp;They claim as long as you have an L2<br>
&gt; &gt;specific mechanism, you need one or more for each L2. &nbsp;To get=
<br>
&gt; &gt;out of that, they propose that we use an L7 mechanism (think<br>
&gt; &gt;some version of HTTP, although that might not fly). &nbsp;They<br>
&gt; &gt;would say, lets do that once, and every L2 can use it. &nbsp;The<b=
r>
&gt; &gt;problem is that you then have to deal with the security issues<br>
&gt; &gt;of an L7 mechanism, and in particular, you have to use IP<br>
&gt; &gt;address as the &quot;key&quot; for what location to return. &nbsp;=
If you can<br>
&gt; &gt;spoof IP address, you can get someone else's location.<br>
&gt; &gt;<br>
&gt; &gt;Those advocating L7 mechanisms claim that the mechanism would<br>
&gt; &gt;only be implemented within a domain, and the domain would have<br>
&gt; &gt;to take anti-spoofing steps. &nbsp;They note that the mechanism<br>
&gt; &gt;would need at least a complete round trip, and probably more<br>
&gt; &gt;than one, so spoofing requires the ability to<br>
&gt; &gt;intercept packets not addressed to the attacker. &nbsp; The<br>
&gt; &gt;returned data could<br>
&gt; &gt;be precisely a PIDF-LO.<br>
&gt; &gt;<br>
&gt; &gt;Then on top of that, we turn out to need some more security,<br>
&gt; &gt;especially for emergency calls. &nbsp;We need to prevent forged<br>
&gt; &gt;locations. &nbsp;That means we need to sign the PIDF-LO. &nbsp;If =
you<br>
&gt; &gt;get location via DHCP, or LLDP-MED, and the endpoint<br>
&gt; &gt;constructs a PIDF-LO from that, how do we construct a<br>
&gt; &gt;signature from the entity that actually determined location?<br>
&gt; &gt;<br>
&gt; &gt;Brian<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F<br>
&gt; &gt;From: geopriv-bounces@ietf.org<br>
&gt; &gt;[mailto:geopriv-bounces@ietf.org] On Behalf Of<br>
&gt; &gt;peter=5Fblatherwick@mitel.com<br>
&gt; &gt;Sent: Wednesday, April 20, 2005 9:30 AM<br>
&gt; &gt;To: Andrew Newton<br>
&gt; &gt;Cc: GEOPRIV WG; ecrit@ietf.org<br>
&gt; &gt;Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT<br>
&gt; &gt;Interim Meeting<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;Hi Andrew, lists,<br>
&gt; &gt;<br>
&gt; &gt;I'd like to better understand the meaning of the following<br>
&gt; &gt;agenda items:<br>
&gt; &gt;=A0 &quot;<br>
&gt; &gt;=A0 2) Properties of network elements in transferring LI from laye=
r 2<br>
&gt; &gt;=A0upward to PIDF-LO.<br>
&gt; &gt;=A03) Proposed enhancements to PIDF-LO to support #2.<br>
&gt; &gt;=A0&quot;<br>
&gt; &gt;<br>
&gt; &gt;Is there a summary of what these really mean, or examples of<br>
&gt; &gt;what the outcome could be in terms of protocol or layer<br>
&gt; &gt;interactions?<br>
&gt; &gt;<br>
&gt; &gt;Reason I'm asking is I am deeply involved in a layer 2<br>
&gt; &gt;approach which would be able to deliver location information<br>
&gt; &gt;to endpoints from the L2 LAN infrastructure they are connected<br>
&gt; &gt;to. =A0The work is going on in TIA and is called Link Layer<br>
&gt; &gt;Discovery Protocol - Media Endpoint Discovery (LLDP-MED),<br>
&gt; &gt;which is an extension of IEEE 802.1AB, specific to VoIP<br>
&gt; &gt;systems. =A0In LLDP-MED, among several other things, we have<br>
&gt; &gt;specified ways to pass equivalent data to the DHCP<br>
&gt; &gt;coordinate-based LCI (RFC 3825) and civic location LCI<br>
&gt; &gt;(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I<br>
&gt; &gt;believe). =A0We see this method of delivery as a non-competing<br>
&gt; &gt;alternative to the DHCP-based approach, with the same end<br>
&gt; &gt;result to the overall ECS system (the endpoint receives the<br>
&gt; &gt;exact same data), which has some advantages particularly in<br>
&gt; &gt;enterprise deployment scenarios. =A0(The DHCP-based method has<br>
&gt; &gt;advantages in different scenarios.) =A0 I am Editor of thi s<br>
&gt; &gt;document, and it is now in ballot process in TIA (more or less<br>
&gt; &gt;equivalent to Last Call in IETF).<br>
&gt; &gt;<br>
&gt; &gt;Sorry, I expect I am suffering lack of context here, since I<br>
&gt; &gt;only joined the list relatively recently.<br>
&gt; &gt;<br>
&gt; &gt;BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past<br>
&gt; &gt;Last Call and in the RFC Editor's queue? =A0It seemed to have<br>
&gt; &gt;been settled on the list, and waiting on AD action.<br>
&gt; &gt;<br>
&gt; &gt;-- Peter Blatherwick<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;Andrew Newton &lt;andy@hxr.us&gt;<br>
&gt; &gt;Sent by: geopriv-bounces@ietf.org<br>
&gt; &gt;13.04.05 16:34<br>
&gt; &gt;<br>
&gt; &gt;=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG &lt;geopriv@ietf.org=
&gt;<br>
&gt; &gt;=A0 =A0 =A0 =A0 cc:<br>
&gt; &gt;=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint<br>
&gt; &gt;GEOPRIV/ECRIT Interim Meeting<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;The GEOPRIV and ECRIT working groups will be holding a joint<br>
&gt; &gt;interim meeting.<br>
&gt; &gt;<br>
&gt; &gt;=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting<br>
&gt; &gt;=A0 =A0 =A0 When: 2005 May 16 08:30-17:30<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30<br>
&gt; &gt;=A0 =A0 =A0Where: Columbia University<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)=
<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027<br>
&gt; &gt;Directions: http://www.cs.columbia.edu/directions.html</font>
<br><font size=3D2 face=3D"Courier New">&gt; &gt;=A0 =A0 =A0 Also: WiFi pro=
vided.<br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.<br>
&gt; &gt;=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html<=
br>
&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.<br>
&gt; &gt;<br>
&gt; &gt;Proposed GEOPRIV Agenda:<br>
&gt; &gt;=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30<br>
&gt; &gt;1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use<br>
&gt; &gt;of LI in HTTP/HTML for web browsing.<br>
&gt; &gt;2) Properties of network elements in transferring LI from<br>
&gt; &gt;layer 2 upward to PIDF-LO.<br>
&gt; &gt;3) Proposed enhancements to PIDF-LO to support #2.<br>
&gt; &gt;<br>
&gt; &gt;Proposed ECRIT Agenda:<br>
&gt; &gt;=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30<br>
&gt; &gt;1) Emergency Call Routing Requirements<br>
&gt; &gt;2) Security and Threats Analysis<br>
&gt; &gt;<br>
&gt; &gt;=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
<br>
&gt; &gt;Geopriv mailing list<br>
&gt; &gt;Geopriv@ietf.org<br>
&gt; &gt;https://www1.ietf.org/mailman/listinfo/geopriv<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; &gt;=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=5F=
<br>
&gt; &gt;Ecrit mailing list<br>
&gt; &gt;Ecrit@ietf.org<br>
&gt; &gt;https://www1.ietf.org/mailman/listinfo/ecrit<br>
&gt; &gt;<br>
&gt; <br>
<br>
<br>
<br>
</font>
<br>
<br>
--=_alternative 005F21C685256FE9_=--


--===============0630967659==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0630967659==--




From ecrit-bounces@ietf.org Wed Apr 20 13:34:35 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJ5v-0001FU-OF; Wed, 20 Apr 2005 13:34:35 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJ5t-0001FJ-HJ; Wed, 20 Apr 2005 13:34:34 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA00510;
	Wed, 20 Apr 2005 13:34:30 -0400 (EDT)
Received: from rtp-iport-2.cisco.com ([64.102.122.149])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJH9-0002Gd-I0; Wed, 20 Apr 2005 13:46:12 -0400
Received: from rtp-core-1.cisco.com (64.102.124.12)
	by rtp-iport-2.cisco.com with ESMTP; 20 Apr 2005 13:34:24 -0400
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com
	[64.102.31.102])
	by rtp-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id j3KHYIRS008720; 
	Wed, 20 Apr 2005 13:34:21 -0400 (EDT)
Received: from xmb-rtp-20b.amer.cisco.com ([64.102.31.53]) by
	xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211);
	Wed, 20 Apr 2005 13:34:17 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 13:34:16 -0400
Message-ID: <072C5B76F7CEAB488172C6F64B30B5E3113B4B@xmb-rtp-20b.amer.cisco.com>
Thread-Topic: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACuDTwAABc4NAAAh/ZEA==
From: "Michael Hammer \(mhammer\)" <mhammer@cisco.com>
To: "Brian Rosen" <br@brianrosen.net>, <peter_blatherwick@mitel.com>
X-OriginalArrivalTime: 20 Apr 2005 17:34:17.0811 (UTC)
	FILETIME=[2DC13230:01C545CF]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: df1883a27a831c1ea5e8cfe5eb3ad38e
Content-Transfer-Encoding: quoted-printable
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Brian,

You describe the NENA phase i2 options, ESQK etc.  Your routing element, =
I assume is doing session routing.

The elements you detail are all (or would appear to be) =
application-layer entities and the signaling hops are likewise =
application-layer hops, not L2 hops (except for maybe the LIS-->EP).=20

So, where is the L2 "dependency" coming from?

I understand that a network node that is immediately adjacent to the =
endpoint is most likely to know where the other end of the link =
terminates, but does that force the delivery protocol aspects of this to =
be a L2 issue?

Each of the myriad link types carry IP packets, no?  And IP packets can =
carry an application packet, no?  So, wouldn't the application-layer =
solution be the more general one?  I thought that was in line with IETF =
principles.

You are probably just laying out the options, not promoting a particular =
one.  I would be interested in seeing what the champions of one approach =
or another have to say.  (I did a search on LLDP-MED and drew a blank.)

Mike

>-----Original Message-----
>From: Brian Rosen [mailto:br@brianrosen.net]=20
>Sent: Wednesday, April 20, 2005 12:13 PM
>To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
>Cc: 'GEOPRIV WG'; ecrit@ietf.org
>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT InterimMeeting
>
>The basic picture is:
>
>LIS ---> endpoint ---> routing element ---> psap
>
>The LIS knows where the endpoint is.
>The endpoint gets location from the LIS
>The endpoint includes location on the emergency call The=20
>routing element uses location to route the call to the right=20
>PSAP The PSAP gets the call, and the location.
>
>The discussion is, how does the endpoint get location from the LIS?
>DHCP is one answer.  LLDP-MED is another.  A proposed L7=20
>mechanism is another.
>
>
>To be sure, there are folks who want to make the picture:
>
>LIS --> endpoint --> routing element ---> psap
> ^                        |                 |
> |                        |                 |
> +------------------------+                 |
> |                                          |
> +------------------------------------------+
>
>The LIS gives the endpoint a "key"
>The endpoint includes the key in the emergency call The=20
>routing element gets the key and exchanges it for location at=20
>the LIS The psap gets the key and exchanges it for location at the LIS
>
>The key could be an IP address.
>
>Brian
>
>
>> -----Original Message-----
>> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
>> Sent: Wednesday, April 20, 2005 12:00 PM
>> To: Brian Rosen; peter_blatherwick@mitel.com
>> Cc: GEOPRIV WG; ecrit@ietf.org
>> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT=20
>> InterimMeeting
>>=20
>> I still get the feeling that "delivery" is being used in two=20
>different
>> contexts:
>>=20
>>             (1)                     (2)
>> Local node---?---->endpoint-----/many hops/----->PSAP
>>           ---------------------/many hops/----->
>>                            (2)
>>=20
>> How can "delivery" be L2 dependent, when it must reach a PSAP many=20
>> hops away?
>> Color me confused.
>>=20
>> Mike
>>=20
>>=20
>> >-----Original Message-----
>> >From: Brian Rosen [mailto:br@brianrosen.net]
>> >Sent: Wednesday, April 20, 2005 10:47 AM
>> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
>> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
>> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>> >GEOPRIV/ECRIT InterimMeeting
>> >
>> >The idea is that, say, you are in your home, served by a=20
>DSL provider.
>> >The domain is then that of the DSL vendor.  Your phone asks for its=20
>> >location from the server in the DSL domain.  It would be given the=20
>> >location corresponding to the IP address of the request.  Note that=20
>> >this would be pretty good for the requested case, even in the=20
>> >presence of a NATed local area network in your home.  The=20
>phone would=20
>> >do this on boot, before any VPN tunnels were established.
>> >
>> >I get the idea that a single delivery mechanism is desirable.
>> >I'm skeptical we can do that because of the security issues.
>> >When you make the delivery mechanism L2 dependent, you can control=20
>> >the possible attacks to a finer grain than the L7 local domain.
>> >
>> >Please keep in mind that some of the folks wishing to use the
>> >L7 mechanism don't really want to just return location to the=20
>> >endpoint; they want to retain the location and give it out to=20
>> >authorized entities upon presentation of the IP address of the=20
>> >endpoint.  That is a business decision.  They can charge for such a=20
>> >service.  I think the privacy implications of that are=20
>dicey, but the=20
>> >reality is that's the model that will probably be implemented if we=20
>> >do this.
>> >
>> >Brian
>> >
>> >
>> >
>> >
>> >
>> >> -----Original Message-----
>> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
>> >> Sent: Wednesday, April 20, 2005 10:14 AM
>> >> To: Brian Rosen; peter_blatherwick@mitel.com
>> >> Cc: GEOPRIV WG; ecrit@ietf.org
>> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
>> >GEOPRIV/ECRIT
>> >> InterimMeeting
>> >>
>> >> Brian,
>> >>
>> >> Could you clarify the domain statement.  Given=20
>nomadicity, it would=20
>> >> seem that location delivery would need to be cross-domain.  The=20
>> >> E911 PSAP will not always be the same domain as the=20
>roaming endpoint.
>> >>
>> >> My impression is that Location discovery is a L2 issue,=20
>tied to the=20
>> >> fact that L2 is supposed to be a single physical hop at most=20
>> >> between the end- user terminal and an adjacent=20
>location-determining=20
>> >> network node.  (Of course those trying to make L2 protocols a
>> >replacement for
>> >> IP sort of screw this assumption up.)
>> >>
>> >> The location delivery mechanism is an application-layer or
>> >L7 service.
>> >> The argument there is that since multiple applications=20
>will need to=20
>> >> rely on location information, a general purpose delivery=20
>mechanism=20
>> >> will provide consistency and generality that is so often=20
>sought in=20
>> >> IETF work.  Security can be built-in to the chosen delivery
>> >mechanism.
>> >> Note, that delivery could be a choice of an existing transfer=20
>> >> mechanism.  This does not preclude other L7 protocols from
>> >defining a
>> >> place in their messages that could also carry location=20
>information.
>> >>
>> >> So, I believe:
>> >> Location discovery is local, with associated security=20
>being local,=20
>> >> Location delivery is global, with associated security=20
>being global.
>> >>
>> >> The real issues are making those happen.
>> >>
>> >> Mike
>> >>
>> >> >-----Original Message-----
>> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On=20
>> >> >Behalf Of Brian Rosen
>> >> >Sent: Wednesday, April 20, 2005 9:54 AM
>> >> >To: peter_blatherwick@mitel.com
>> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
>> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT=20
>> >> >InterimMeeting
>> >> >
>> >> >There turns out to be a large set of issues around this problem,=20
>> >> >which I fear is leading to Balkanization.  There are two really=20
>> >> >important problems we need to solve.
>> >> >
>> >> >One fundamental problem is that every client needs to
>> >implement every
>> >> >possible LI transfer mechanism that its environment=20
>could provide.
>> >> >
>> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
>> >> >guys reject both
>> >> >of these and want a something else.  Every phone has to=20
>implement=20
>> >> >every protocol.
>> >> >
>> >> >There are some who have observed that the mechanisms at hand are=20
>> >> >L2 specific.  They claim as long as you have an L2 specific=20
>> >> >mechanism, you need one or more for each L2.  To get out=20
>of that,=20
>> >> >they propose that we use an L7 mechanism (think some version of=20
>> >> >HTTP, although that might not fly).  They would say,=20
>lets do that=20
>> >> >once,
>> >and every L2
>> >> >can use it.  The problem is that you then have to deal with the=20
>> >> >security issues of an L7 mechanism, and in particular,=20
>you have to=20
>> >> >use IP address as the "key" for what location to return.
>> >If you can
>> >> >spoof IP address, you can get someone else's location.
>> >> >
>> >> >Those advocating L7 mechanisms claim that the mechanism
>> >would only be
>> >> >implemented within a domain, and the domain would have to take=20
>> >> >anti-spoofing steps.  They note that the mechanism would need at=20
>> >> >least a complete round trip, and probably more than one, so
>> >spoofing
>> >> >requires the ability to
>> >> >intercept packets not addressed to the attacker.   The
>> >> >returned data could
>> >> >be precisely a PIDF-LO.
>> >> >
>> >> >Then on top of that, we turn out to need some more security,=20
>> >> >especially for emergency calls.  We need to prevent forged
>> >locations.
>> >> >That means we need to sign the PIDF-LO.  If you get location via=20
>> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from=20
>> >> >that, how do we construct a signature from the entity that=20
>> >> >actually determined location?
>> >> >
>> >> >Brian
>> >> >
>> >> >
>> >> >________________________________________
>> >> >From: geopriv-bounces@ietf.org
>> >> >[mailto:geopriv-bounces@ietf.org] On Behalf Of=20
>> >> >peter_blatherwick@mitel.com
>> >> >Sent: Wednesday, April 20, 2005 9:30 AM
>> >> >To: Andrew Newton
>> >> >Cc: GEOPRIV WG; ecrit@ietf.org
>> >> >Subject: Re: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT Interim=20
>> >> >Meeting
>> >> >
>> >> >
>> >> >Hi Andrew, lists,
>> >> >
>> >> >I'd like to better understand the meaning of the following agenda
>> >> >items:
>> >> >=A0 "
>> >> >=A0 2) Properties of network elements in transferring LI=20
>from layer=20
>> >> >2
>> >> >=A0upward to PIDF-LO.
>> >> >=A03) Proposed enhancements to PIDF-LO to support #2.
>> >> >=A0"
>> >> >
>> >> >Is there a summary of what these really mean, or examples
>> >of what the
>> >> >outcome could be in terms of protocol or layer interactions?
>> >> >
>> >> >Reason I'm asking is I am deeply involved in a layer 2
>> >approach which
>> >> >would be able to deliver location information to endpoints from=20
>> >> >the
>> >> >L2 LAN infrastructure they are connected to. =A0The work is
>> >going on in
>> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint=20
>> >> >Discovery (LLDP-MED), which is an extension of IEEE
>> >802.1AB, specific
>> >> >to VoIP systems. =A0In LLDP-MED, among several other=20
>things, we have=20
>> >> >specified ways to pass equivalent data to the DHCP=20
>> >> >coordinate-based LCI (RFC 3825) and civic location LCI=20
>> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
>> >believe).
>> >> >We see this method of delivery as a non-competing
>> >alternative to the
>> >> >DHCP-based approach, with the same end result to the overall ECS=20
>> >> >system (the endpoint receives the exact same data),=20
>which has some=20
>> >> >advantages particularly in enterprise deployment=20
>scenarios. =A0(The=20
>> >> >DHCP-based method has advantages in different scenarios.) =A0 I =
am=20
>> >> >Editor of thi s document, and it is now in ballot process in TIA=20
>> >> >(more or less equivalent to Last Call in IETF).
>> >> >
>> >> >Sorry, I expect I am suffering lack of context here,=20
>since I only=20
>> >> >joined the list relatively recently.
>> >> >
>> >> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now=20
>past Last=20
>> >> >Call and in the RFC Editor's queue? =A0It seemed to have been=20
>> >> >settled on the list, and waiting on AD action.
>> >> >
>> >> >-- Peter Blatherwick
>> >> >
>> >> >
>> >> >
>> >> >
>> >> >Andrew Newton <andy@hxr.us>
>> >> >Sent by: geopriv-bounces@ietf.org
>> >> >13.04.05 16:34
>> >> >
>> >> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
>> >> >=A0 =A0 =A0 =A0 cc:
>> >> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint
>> >GEOPRIV/ECRIT
>> >> >Interim Meeting
>> >> >
>> >> >
>> >> >
>> >> >
>> >> >The GEOPRIV and ECRIT working groups will be holding a
>> >joint interim
>> >> >meeting.
>> >> >
>> >> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
>> >> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
>> >> >=A0 =A0 =A0Where: Columbia University
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th =
St.)
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
>> >> >Directions: http://www.cs.columbia.edu/directions.html
>> >> >=A0 =A0 =A0 Also: WiFi provided.
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
>> >> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
>> >> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
>> >> >
>> >> >Proposed GEOPRIV Agenda:
>> >> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
>> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
>> >use of LI
>> >> >in HTTP/HTML for web browsing.
>> >> >2) Properties of network elements in transferring LI=20
>from layer 2=20
>> >> >upward to PIDF-LO.
>> >> >3) Proposed enhancements to PIDF-LO to support #2.
>> >> >
>> >> >Proposed ECRIT Agenda:
>> >> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
>> >> >1) Emergency Call Routing Requirements
>> >> >2) Security and Threats Analysis
>> >> >
>> >> >_______________________________________________
>> >> >Geopriv mailing list
>> >> >Geopriv@ietf.org
>> >> >https://www1.ietf.org/mailman/listinfo/geopriv
>> >> >
>> >> >
>> >> >
>> >> >
>> >> >_______________________________________________
>> >> >Ecrit mailing list
>> >> >Ecrit@ietf.org
>> >> >https://www1.ietf.org/mailman/listinfo/ecrit
>> >> >
>> >>
>> >
>> >
>>=20
>
>

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 13:39:20 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJAW-0001rV-37; Wed, 20 Apr 2005 13:39:20 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJAU-0001rL-Fg; Wed, 20 Apr 2005 13:39:18 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA00961;
	Wed, 20 Apr 2005 13:39:15 -0400 (EDT)
Received: from sj-iport-3-in.cisco.com ([171.71.176.72]
	helo=sj-iport-3.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJLj-0002Ov-Sa; Wed, 20 Apr 2005 13:50:57 -0400
Received: from sj-core-2.cisco.com (171.71.177.254)
	by sj-iport-3.cisco.com with ESMTP; 20 Apr 2005 10:38:54 -0700
X-IronPort-AV: i="3.92,117,1112598000"; 
	d="scan'208,217"; a="252330175:sNHT1847132934"
Received: from malone.cisco.com (malone.cisco.com [171.70.157.157])
	by sj-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j3KHcmKx025229;
	Wed, 20 Apr 2005 10:38:49 -0700 (PDT)
Received: from MLINSNER (ssh-sjc-1.cisco.com [171.68.225.134]) by
	malone.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with
	ESMTP id KAA00138; Wed, 20 Apr 2005 10:38:50 -0700 (PDT)
Message-Id: <200504201738.KAA00138@malone.cisco.com>
From: "Marc Linsner" <mlinsner@cisco.com>
To: <peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRITInterimMeeting
Date: Wed, 20 Apr 2005 13:38:46 -0400
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <OF73D31E3A.49B5F420-ON85256FE9.005B58AE-85256FE9.005F21CA@mitel.com>
Thread-Index: AcVFzZWTd8vaxlzBS/e0NHcBRBpmGwAAbnZw
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Score: 1.3 (+)
X-Scan-Signature: 2ed806e2f53ff1a061ad4f97e00345ac
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0549447944=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a multi-part message in MIME format.

--===============0549447944==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0DC9_01C545AE.47BA39A0"

This is a multi-part message in MIME format.

------=_NextPart_000_0DC9_01C545AE.47BA39A0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit

snip...

 


It would indeed be unfortunate to add a third approach ... or a forth ....
I am not familiar with whatever the DSL approach would be, but do not
off-hand see why a DHCP relay approach would not work there.  Anything
written up to look at on it? 

Peter 

[[ml]] Peter, take a look at:

http://www.dslforum.org/aboutdsl/Technical_Reports/TR-069.pdf

-Marc-

 


------=_NextPart_000_0DC9_01C545AE.47BA39A0
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:sans-serif;
	panose-1:0 0 0 0 0 0 0 0 0 0;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:purple;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dpurple>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>snip&#8230;..<o:p></o:p></span></fon=
t></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in =
0in 4.0pt'>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
</span></font><font size=3D2 face=3Dsans-serif><span =
style=3D'font-size:10.0pt;
font-family:sans-serif'>It would indeed be unfortunate to add a third =
approach
... or a forth .... &nbsp; I am not familiar with whatever the DSL =
approach
would be, but do not off-hand see why a DHCP relay approach would not =
work
there. &nbsp;Anything written up to look at on it? </span></font><br>
<br>
<font size=3D2 face=3Dsans-serif><span =
style=3D'font-size:10.0pt;font-family:sans-serif'>Peter</span></font>
<br>
<br>
<b><i><font color=3Dnavy><span =
style=3D'color:navy;font-weight:bold;font-style:
italic'>[[ml]] </span></font></i></b><font color=3Dnavy><span =
style=3D'color:navy'>Peter,
take a look at:<o:p></o:p></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3 =
color=3Dnavy
face=3D"Times New Roman"><span style=3D'font-size:12.0pt;color:navy'><a
href=3D"http://www.dslforum.org/aboutdsl/Technical_Reports/TR-069.pdf">ht=
tp://www.dslforum.org/aboutdsl/Technical_Reports/TR-069.pdf</a><o:p></o:p=
></span></font></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3 =
color=3Dnavy
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;color:navy'>-Marc-<o:p></o:p></span></font></p>=


<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3 =
color=3Dnavy
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt;color:navy'><o:p>&nbsp;</o:p></span></font></p>=


</div>

</div>

</body>

</html>

------=_NextPart_000_0DC9_01C545AE.47BA39A0--


--===============0549447944==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0549447944==--




From ecrit-bounces@ietf.org Wed Apr 20 13:48:09 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJJ3-0003CP-Nk; Wed, 20 Apr 2005 13:48:09 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJJ2-0003Br-5M; Wed, 20 Apr 2005 13:48:08 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA01759;
	Wed, 20 Apr 2005 13:48:05 -0400 (EDT)
Received: from numenor.qualcomm.com ([129.46.51.58])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJUG-0002j4-LQ; Wed, 20 Apr 2005 13:59:47 -0400
Received: from sabrina.qualcomm.com (sabrina.qualcomm.com [129.46.61.150])
	by numenor.qualcomm.com (8.12.10/8.12.5/1.0) with ESMTP id
	j3KHlrIP004600
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=FAIL);
	Wed, 20 Apr 2005 10:47:53 -0700 (PDT)
Received: from [129.46.227.161] (carbuncle.qualcomm.com [129.46.227.161])
	by sabrina.qualcomm.com (8.12.10/8.12.5/1.0) with ESMTP id
	j3KHlnLU008191; Wed, 20 Apr 2005 10:47:50 -0700 (PDT)
Mime-Version: 1.0
Message-Id: <p06210204be8c44f8a5fc@[129.46.227.161]>
In-Reply-To: <00b444334545222d572fc588237e6742@hxr.us>
References: <OF0410C923.F7873A11-ON85256FE3.004C79CC-85256FE9.0049F46E@mitel.com>
	<00b444334545222d572fc588237e6742@hxr.us>
Date: Wed, 20 Apr 2005 10:47:47 -0700
To: Andrew Newton <andy@hxr.us>, peter_blatherwick@mitel.com
From: Ted Hardie <hardie@qualcomm.com>
Content-Type: text/plain; charset="us-ascii" ; format="flowed"
X-PMX-Version: 4.7.0.111621
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
	Meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

At 9:52 AM -0400 4/20/05, Andrew Newton wrote:

>BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last Call
>and in the RFC Editor's queue?  It seemed to have been settled on the
>list, and waiting on AD action.

I'm awaiting a revision of this, as there was a last call comment by
Ralph Droms asking for clarification of whether the option could
be sent from server-to-host and host-to-server.  Here's an
excerpt of his comment:

>
>So, I think the draft needs to be extended with a section on whether the
>option can be sent from the server to the host, from the host to the server.
>Might also be good to be specific about whether the client can request the
>option and whether the server can send it unsolicited.

Here's Henning's reply:

>Ralph,
>
>thanks for your comments. I think your observation applies to both 
>this draft and RFC 3825 (on geo long/lat coordinates). I agree that 
>both directions are useful, although the direction from host to 
>server might necessitate the inclusion of the core privacy elements 
>into the object (distribution, retention).
>
>The draft assumes, probably without the appropriately clear wording, 
>beyond the introductory "End systems that obtain location 
>information via the mechanism" sentence, that this is server-to-host.

Because the draft is in a fairly late state, I had to approve an update
to make this clarification; I did so last Friday.
			regards,
				Ted Hardie





_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 13:58:16 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJSp-0004la-Vx; Wed, 20 Apr 2005 13:58:16 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJSn-0004lN-My; Wed, 20 Apr 2005 13:58:14 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id NAA02407;
	Wed, 20 Apr 2005 13:58:12 -0400 (EDT)
Message-Id: <200504201758.NAA02407@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJe3-00030C-Ly; Wed, 20 Apr 2005 14:09:52 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOJSc-0002Yl-Ko; Wed, 20 Apr 2005 12:58:03 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: <peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 13:57:56 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <OF73D31E3A.49B5F420-ON85256FE9.005B58AE-85256FE9.005F21CA@mitel.com>
Thread-Index: AcVFzQtKCi3rAWwaRkiwoVEz3TatVgAAaAkQ
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 4ec3642ae9025e273a4a263d640f3300
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Peter

For some time, I have accepted the fact that we aren=92t going to be =
able to
have one mechanism.  I don=92t like it, but it seems inevitable.  You =
have to
admit that once you say =93more than one=94 and your reasoning is =
=93different
scenarios=94 you open the door to the next guy who gets to make the same
argument.  What are the phone vendors going to do?  You really, really =
don=92t
want a phone making one assumption and the network L2 vendors another.  =
The
scenarios where LLDP-MED works COULD, reasonably, use DHCP.  You might =
like
LLDP-MED for any number of reasons, but it=92s not the case that DHCP =
wouldn=92t
work.  The reverse is not true; there are many networks where there is =
no
switch that could reasonably implement LLDP-MED.  CableModem is an =
obvious
one.  At the moment, I=92m rationalizing =93home=3DDHCP, =
enterprise=3DLLDP-MED=94, but
I don=92t want a phone vendor assuming he is only serving one of those
markets.  You guys have made our life difficult, and I don=92t really =
think it
had to be, but its reality.

The appeal of the L7 mechanism was that we could have one.  Alas, I =
don=92t
see how to make it work.  Ethernet connected devices will probably need
LLDP-MED and DHCP.  That=92s my current message to phone vendors.

At the moment, all the DSL folks I talk to insist that they won=92t =
deploy a
DHCP mechanism or an LLDP-MED mechanism.  They want something else.  =
That=92s
the immediate impetuous for the L7 discussion.  If L7 mechanisms don=92t =
work,
and I don=92t think they do, then we either need a DSL L2 mechanism, or =
we
need them to buy my =93home router uses DHCP to clients, and anything =
the want
to the DSL side=94 argument.  The DSL guys have some allies; basically =
boxes
in the middle of L2 that don=92t have a relationship with the DHCP box.  =
The
example is the WiFi management boxes.  They know which AP you are =
connected
to; some may even triangulate.  But those boxes don=92t run DHCP, and =
they
don=92t have an interface to them.  L7 works for them too; especially =
because
they can limit the domain to the subnet(s) their management boxes =
handle.
Maybe that=92s the angle to attack; define an interface to the DHCP =
server
that lets it get location so it can hand it out to the endpoints.  =
I=92ve
tried to argue that they could implement LLDP-MED.  I got push back from =
one
of them, but the reasons don=92t make sense to me yet.

I=92ve been working on this for some time.  The inclination of EVERY L2 =
player
is =93we need a mechanism just for us=94.  That, clearly, won=92t work.  =
What I
tell them is =93if you can control the specification of every end device =
that
directly or indirectly connects to your L2, then use anything you like, =
as
long as EVERY device that is connected to your L2 can get location.  If =
you
can=92t control endpoints like that, use DHCP (or LLDP-MED)=94.  3G is =
an
example of an L2 where they can control all the endpoints.  They have a =
way
to get location, and that=92s good enough for me. =20

Brian



________________________________________
From: peter_blatherwick@mitel.com [mailto:peter_blatherwick@mitel.com]=20
Sent: Wednesday, April 20, 2005 1:21 PM
To: Brian Rosen
Cc: ecrit@ietf.org; 'GEOPRIV WG'; 'Michael Hammer (mhammer)'
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


Seems a simple-minded question has sparked a flurry of debate ;-) =A0 =
=A0Some
thoughts, just to stir the pot some more... not that it appears to need
it...=20

I do not at all see the purely L2 LLDP-MED approach and the call it L2.5
DHCP approach as being in conflict. =A0They are merely different ways =
suited
to different scenarios. =A0=20

I do not see implementing both LLDP-based and DHCP-based methods in a =
phone
as being a big deal, since in the end they both are simple, would =
deliver
the exact same data to the application above, and they start in a strict
order (LLDP always before DHCP). =A0The harder issue is really what =
would the
poor phone do if it received by both mechanisms, and the received data =
were
different -- it would need to pick one, or sort out the conflict itself
(yech!). =A0=20

Since LLDP (hence LLDP-MED) is strictly contained to a physical link, =
its
security is very contained. =A0=20

IEEE 802.1X is applied to that same link before LLDP gets to run (or =
before
DHCP for that matter), so at least the endpoint can be well =
authenticated
before hand. =A0Also, it intuitively makes sense at least in my fuzzy =
brain,
that the X509 certs which could be part of the 802.1X authentication
exchange (if EAP-TLS is used) could also be useful in the upward
authentication process. =A0(If I have messed up the acronyms, please do =
not
jump down my throat .. hopefully close enough.)=20

It would indeed be unfortunate to add a third approach ... or a forth =
.... =A0
I am not familiar with whatever the DSL approach would be, but do not
off-hand see why a DHCP relay approach would not work there. =A0Anything
written up to look at on it?=20

Peter=20







"Brian Rosen" <br@brianrosen.net>=20
20.04.05 10:47=20
=A0 =A0 =A0 =A0=20
=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0"'Michael Hammer (mhammer)'" =
<mhammer@cisco.com>,
<peter_blatherwick@mitel.com>=20
=A0 =A0 =A0 =A0 cc: =A0 =A0 =A0 =A0"'GEOPRIV WG'" <geopriv@ietf.org>, =
<ecrit@ietf.org>=20
=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0RE: [Ecrit] RE: [Geopriv] =
Announcement of Joint
GEOPRIV/ECRIT InterimMeeting



The idea is that, say, you are in your home, served by a DSL provider.
The domain is then that of the DSL vendor. =A0Your phone asks for its =
location
from the server in the DSL domain. =A0It would be given the location
corresponding to the IP address of the request. =A0Note that this would =
be
pretty good for the requested case, even in the presence of a NATed =
local
area network in your home. =A0The phone would do this on boot, before =
any VPN
tunnels were established.

I get the idea that a single delivery mechanism is desirable. =A0I'm =
skeptical
we can do that because of the security issues. =A0When you make the =
delivery
mechanism L2 dependent, you can control the possible attacks to a finer
grain than the L7 local domain.

Please keep in mind that some of the folks wishing to use the L7 =
mechanism
don't really want to just return location to the endpoint; they want to
retain the location and give it out to authorized entities upon =
presentation
of the IP address of the endpoint. =A0That is a business decision. =
=A0They can
charge for such a service. =A0I think the privacy implications of that =
are
dicey, but the reality is that's the model that will probably be =
implemented
if we do this. =A0

Brian





> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 10:14 AM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
>=20
> Brian,
>=20
> Could you clarify the domain statement. =A0Given nomadicity, it would =
seem
> that location delivery would need to be cross-domain. =A0The E911 PSAP =
will
> not always be the same domain as the roaming endpoint.
>=20
> My impression is that Location discovery is a L2 issue, tied to the =
fact
> that L2 is supposed to be a single physical hop at most between the =
end-
> user terminal and an adjacent location-determining network node. =
=A0(Of
> course those trying to make L2 protocols a replacement for IP sort of
> screw this assumption up.)
>=20
> The location delivery mechanism is an application-layer or L7 service.
> The argument there is that since multiple applications will need to =
rely
> on location information, a general purpose delivery mechanism will =
provide
> consistency and generality that is so often sought in IETF work. =
=A0Security
> can be built-in to the chosen delivery mechanism. =A0Note, that =
delivery
> could be a choice of an existing transfer mechanism. =A0This does not
> preclude other L7 protocols from defining a place in their messages =
that
> could also carry location information.
>=20
> So, I believe:
> Location discovery is local, with associated security being local,
> Location delivery is global, with associated security being global.
>=20
> The real issues are making those happen.
>=20
> Mike
>=20
> >-----Original Message-----
> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org]
> >On Behalf Of Brian Rosen
> >Sent: Wednesday, April 20, 2005 9:54 AM
> >To: peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >There turns out to be a large set of issues around this
> >problem, which I fear is leading to Balkanization. =A0There are
> >two really important problems we need to solve.
> >
> >One fundamental problem is that every client needs to
> >implement every possible LI transfer mechanism that its
> >environment could provide.
> >
> >We have DHCP. =A0You guys are working on LLDP-MED. =A0 The DSL
> >guys reject both
> >of these and want a something else. =A0Every phone has to
> >implement every protocol.=20
> >
> >There are some who have observed that the mechanisms at hand
> >are L2 specific. =A0They claim as long as you have an L2
> >specific mechanism, you need one or more for each L2. =A0To get
> >out of that, they propose that we use an L7 mechanism (think
> >some version of HTTP, although that might not fly). =A0They
> >would say, lets do that once, and every L2 can use it. =A0The
> >problem is that you then have to deal with the security issues
> >of an L7 mechanism, and in particular, you have to use IP
> >address as the "key" for what location to return. =A0If you can
> >spoof IP address, you can get someone else's location.
> >
> >Those advocating L7 mechanisms claim that the mechanism would
> >only be implemented within a domain, and the domain would have
> >to take anti-spoofing steps. =A0They note that the mechanism
> >would need at least a complete round trip, and probably more
> >than one, so spoofing requires the ability to
> >intercept packets not addressed to the attacker. =A0 The
> >returned data could
> >be precisely a PIDF-LO.
> >
> >Then on top of that, we turn out to need some more security,
> >especially for emergency calls. =A0We need to prevent forged
> >locations. =A0That means we need to sign the PIDF-LO. =A0If you
> >get location via DHCP, or LLDP-MED, and the endpoint
> >constructs a PIDF-LO from that, how do we construct a
> >signature from the entity that actually determined location?
> >
> >Brian
> >
> >
> >________________________________________
> >From: geopriv-bounces@ietf.org
> >[mailto:geopriv-bounces@ietf.org] On Behalf Of
> >peter_blatherwick@mitel.com
> >Sent: Wednesday, April 20, 2005 9:30 AM
> >To: Andrew Newton
> >Cc: GEOPRIV WG; ecrit@ietf.org
> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >Interim Meeting
> >
> >
> >Hi Andrew, lists,
> >
> >I'd like to better understand the meaning of the following
> >agenda items:
> >=A0 "
> >=A0 2) Properties of network elements in transferring LI from layer 2
> >=A0upward to PIDF-LO.
> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >=A0"
> >
> >Is there a summary of what these really mean, or examples of
> >what the outcome could be in terms of protocol or layer
> >interactions?
> >
> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which would be able to deliver location information
> >to endpoints from the L2 LAN infrastructure they are connected
> >to. =A0The work is going on in TIA and is called Link Layer
> >Discovery Protocol - Media Endpoint Discovery (LLDP-MED),
> >which is an extension of IEEE 802.1AB, specific to VoIP
> >systems. =A0In LLDP-MED, among several other things, we have
> >specified ways to pass equivalent data to the DHCP
> >coordinate-based LCI (RFC 3825) and civic location LCI
> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe). =A0We see this method of delivery as a non-competing
> >alternative to the DHCP-based approach, with the same end
> >result to the overall ECS system (the endpoint receives the
> >exact same data), which has some advantages particularly in
> >enterprise deployment scenarios. =A0(The DHCP-based method has
> >advantages in different scenarios.) =A0 I am Editor of thi s
> >document, and it is now in ballot process in TIA (more or less
> >equivalent to Last Call in IETF).
> >
> >Sorry, I expect I am suffering lack of context here, since I
> >only joined the list relatively recently.
> >
> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past
> >Last Call and in the RFC Editor's queue? =A0It seemed to have
> >been settled on the list, and waiting on AD action.
> >
> >-- Peter Blatherwick
> >
> >
> >
> >
> >Andrew Newton <andy@hxr.us>
> >Sent by: geopriv-bounces@ietf.org
> >13.04.05 16:34
> >
> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >=A0 =A0 =A0 =A0 cc:
> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint
> >GEOPRIV/ECRIT Interim Meeting
> >
> >
> >
> >
> >The GEOPRIV and ECRIT working groups will be holding a joint
> >interim meeting.
> >
> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >=A0 =A0 =A0Where: Columbia University
> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >Directions: http://www.cs.columbia.edu/directions.html=20
> >=A0 =A0 =A0 Also: WiFi provided.
> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >
> >Proposed GEOPRIV Agenda:
> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use
> >of LI in HTTP/HTML for web browsing.
> >2) Properties of network elements in transferring LI from
> >layer 2 upward to PIDF-LO.
> >3) Proposed enhancements to PIDF-LO to support #2.
> >
> >Proposed ECRIT Agenda:
> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >1) Emergency Call Routing Requirements
> >2) Security and Threats Analysis
> >
> >_______________________________________________
> >Geopriv mailing list
> >Geopriv@ietf.org
> >https://www1.ietf.org/mailman/listinfo/geopriv
> >
> >
> >
> >
> >_______________________________________________
> >Ecrit mailing list
> >Ecrit@ietf.org
> >https://www1.ietf.org/mailman/listinfo/ecrit
> >
>=20







_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 14:08:03 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJcJ-0006sd-2D; Wed, 20 Apr 2005 14:08:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJcG-0006rx-J8; Wed, 20 Apr 2005 14:08:02 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA03774;
	Wed, 20 Apr 2005 14:07:59 -0400 (EDT)
Message-Id: <200504201807.OAA03774@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJnW-0003X5-TW; Wed, 20 Apr 2005 14:19:39 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOJc6-0003Od-2n; Wed, 20 Apr 2005 13:07:50 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	<peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
	InterimMeeting
Date: Wed, 20 Apr 2005 14:07:44 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <072C5B76F7CEAB488172C6F64B30B5E3113B4B@xmb-rtp-20b.amer.cisco.com>
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACuDTwAABc4NAAAh/ZEAAB1+tQ
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ff67cea9f7df2d77f61a364cea0926e8
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

"Routing" in this context is session (SIP) routing, as you suspected.

The first hop (LIS to endpoint) is what we are discussing.
DHCP is not an L3+ protocol.  Neither is LLDP-MED.

The thread has discussed a number of problems with an L7 mechanism, but
laying them out:

1. You are subject to IP address spoofing (albeit you need to be able to =
get
the packets sent from the LIS to the IP address you are spoofing)

2. VPN or other tunnels may have been created before you run this =
protocol.
That will cause a failure; you need the location corresponding to the
original "outermost" IP address.

3. It is difficult to control the security (beyond IP spoofing) because =
you
don't have a generally good authentication mechanism.  This is a bare =
phone,
or equivalent, during its boot phase.=20

There are probably others as well.  2) is the real problem.

Brian

> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 1:34 PM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
>=20
> Brian,
>=20
> You describe the NENA phase i2 options, ESQK etc.  Your routing =
element, I
> assume is doing session routing.
>=20
> The elements you detail are all (or would appear to be) =
application-layer
> entities and the signaling hops are likewise application-layer hops, =
not
> L2 hops (except for maybe the LIS-->EP).
>=20
> So, where is the L2 "dependency" coming from?
>=20
> I understand that a network node that is immediately adjacent to the
> endpoint is most likely to know where the other end of the link
> terminates, but does that force the delivery protocol aspects of this =
to
> be a L2 issue?
>=20
> Each of the myriad link types carry IP packets, no?  And IP packets =
can
> carry an application packet, no?  So, wouldn't the application-layer
> solution be the more general one?  I thought that was in line with =
IETF
> principles.
>=20
> You are probably just laying out the options, not promoting a =
particular
> one.  I would be interested in seeing what the champions of one =
approach
> or another have to say.  (I did a search on LLDP-MED and drew a =
blank.)
>=20
> Mike
>=20
> >-----Original Message-----
> >From: Brian Rosen [mailto:br@brianrosen.net]
> >Sent: Wednesday, April 20, 2005 12:13 PM
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The basic picture is:
> >
> >LIS ---> endpoint ---> routing element ---> psap
> >
> >The LIS knows where the endpoint is.
> >The endpoint gets location from the LIS
> >The endpoint includes location on the emergency call The
> >routing element uses location to route the call to the right
> >PSAP The PSAP gets the call, and the location.
> >
> >The discussion is, how does the endpoint get location from the LIS?
> >DHCP is one answer.  LLDP-MED is another.  A proposed L7
> >mechanism is another.
> >
> >
> >To be sure, there are folks who want to make the picture:
> >
> >LIS --> endpoint --> routing element ---> psap
> > ^                        |                 |
> > |                        |                 |
> > +------------------------+                 |
> > |                                          |
> > +------------------------------------------+
> >
> >The LIS gives the endpoint a "key"
> >The endpoint includes the key in the emergency call The
> >routing element gets the key and exchanges it for location at
> >the LIS The psap gets the key and exchanges it for location at the =
LIS
> >
> >The key could be an IP address.
> >
> >Brian
> >
> >
> >> -----Original Message-----
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> Sent: Wednesday, April 20, 2005 12:00 PM
> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> InterimMeeting
> >>
> >> I still get the feeling that "delivery" is being used in two
> >different
> >> contexts:
> >>
> >>             (1)                     (2)
> >> Local node---?---->endpoint-----/many hops/----->PSAP
> >>           ---------------------/many hops/----->
> >>                            (2)
> >>
> >> How can "delivery" be L2 dependent, when it must reach a PSAP many
> >> hops away?
> >> Color me confused.
> >>
> >> Mike
> >>
> >>
> >> >-----Original Message-----
> >> >From: Brian Rosen [mailto:br@brianrosen.net]
> >> >Sent: Wednesday, April 20, 2005 10:47 AM
> >> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >> >GEOPRIV/ECRIT InterimMeeting
> >> >
> >> >The idea is that, say, you are in your home, served by a
> >DSL provider.
> >> >The domain is then that of the DSL vendor.  Your phone asks for =
its
> >> >location from the server in the DSL domain.  It would be given the
> >> >location corresponding to the IP address of the request.  Note =
that
> >> >this would be pretty good for the requested case, even in the
> >> >presence of a NATed local area network in your home.  The
> >phone would
> >> >do this on boot, before any VPN tunnels were established.
> >> >
> >> >I get the idea that a single delivery mechanism is desirable.
> >> >I'm skeptical we can do that because of the security issues.
> >> >When you make the delivery mechanism L2 dependent, you can control
> >> >the possible attacks to a finer grain than the L7 local domain.
> >> >
> >> >Please keep in mind that some of the folks wishing to use the
> >> >L7 mechanism don't really want to just return location to the
> >> >endpoint; they want to retain the location and give it out to
> >> >authorized entities upon presentation of the IP address of the
> >> >endpoint.  That is a business decision.  They can charge for such =
a
> >> >service.  I think the privacy implications of that are
> >dicey, but the
> >> >reality is that's the model that will probably be implemented if =
we
> >> >do this.
> >> >
> >> >Brian
> >> >
> >> >
> >> >
> >> >
> >> >
> >> >> -----Original Message-----
> >> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> >> Sent: Wednesday, April 20, 2005 10:14 AM
> >> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >> >GEOPRIV/ECRIT
> >> >> InterimMeeting
> >> >>
> >> >> Brian,
> >> >>
> >> >> Could you clarify the domain statement.  Given
> >nomadicity, it would
> >> >> seem that location delivery would need to be cross-domain.  The
> >> >> E911 PSAP will not always be the same domain as the
> >roaming endpoint.
> >> >>
> >> >> My impression is that Location discovery is a L2 issue,
> >tied to the
> >> >> fact that L2 is supposed to be a single physical hop at most
> >> >> between the end- user terminal and an adjacent
> >location-determining
> >> >> network node.  (Of course those trying to make L2 protocols a
> >> >replacement for
> >> >> IP sort of screw this assumption up.)
> >> >>
> >> >> The location delivery mechanism is an application-layer or
> >> >L7 service.
> >> >> The argument there is that since multiple applications
> >will need to
> >> >> rely on location information, a general purpose delivery
> >mechanism
> >> >> will provide consistency and generality that is so often
> >sought in
> >> >> IETF work.  Security can be built-in to the chosen delivery
> >> >mechanism.
> >> >> Note, that delivery could be a choice of an existing transfer
> >> >> mechanism.  This does not preclude other L7 protocols from
> >> >defining a
> >> >> place in their messages that could also carry location
> >information.
> >> >>
> >> >> So, I believe:
> >> >> Location discovery is local, with associated security
> >being local,
> >> >> Location delivery is global, with associated security
> >being global.
> >> >>
> >> >> The real issues are making those happen.
> >> >>
> >> >> Mike
> >> >>
> >> >> >-----Original Message-----
> >> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On
> >> >> >Behalf Of Brian Rosen
> >> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> >> >> >To: peter_blatherwick@mitel.com
> >> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> >> >InterimMeeting
> >> >> >
> >> >> >There turns out to be a large set of issues around this =
problem,
> >> >> >which I fear is leading to Balkanization.  There are two really
> >> >> >important problems we need to solve.
> >> >> >
> >> >> >One fundamental problem is that every client needs to
> >> >implement every
> >> >> >possible LI transfer mechanism that its environment
> >could provide.
> >> >> >
> >> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >> >> >guys reject both
> >> >> >of these and want a something else.  Every phone has to
> >implement
> >> >> >every protocol.
> >> >> >
> >> >> >There are some who have observed that the mechanisms at hand =
are
> >> >> >L2 specific.  They claim as long as you have an L2 specific
> >> >> >mechanism, you need one or more for each L2.  To get out
> >of that,
> >> >> >they propose that we use an L7 mechanism (think some version of
> >> >> >HTTP, although that might not fly).  They would say,
> >lets do that
> >> >> >once,
> >> >and every L2
> >> >> >can use it.  The problem is that you then have to deal with the
> >> >> >security issues of an L7 mechanism, and in particular,
> >you have to
> >> >> >use IP address as the "key" for what location to return.
> >> >If you can
> >> >> >spoof IP address, you can get someone else's location.
> >> >> >
> >> >> >Those advocating L7 mechanisms claim that the mechanism
> >> >would only be
> >> >> >implemented within a domain, and the domain would have to take
> >> >> >anti-spoofing steps.  They note that the mechanism would need =
at
> >> >> >least a complete round trip, and probably more than one, so
> >> >spoofing
> >> >> >requires the ability to
> >> >> >intercept packets not addressed to the attacker.   The
> >> >> >returned data could
> >> >> >be precisely a PIDF-LO.
> >> >> >
> >> >> >Then on top of that, we turn out to need some more security,
> >> >> >especially for emergency calls.  We need to prevent forged
> >> >locations.
> >> >> >That means we need to sign the PIDF-LO.  If you get location =
via
> >> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from
> >> >> >that, how do we construct a signature from the entity that
> >> >> >actually determined location?
> >> >> >
> >> >> >Brian
> >> >> >
> >> >> >
> >> >> >________________________________________
> >> >> >From: geopriv-bounces@ietf.org
> >> >> >[mailto:geopriv-bounces@ietf.org] On Behalf Of
> >> >> >peter_blatherwick@mitel.com
> >> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> >> >> >To: Andrew Newton
> >> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> >> >> >Subject: Re: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT Interim
> >> >> >Meeting
> >> >> >
> >> >> >
> >> >> >Hi Andrew, lists,
> >> >> >
> >> >> >I'd like to better understand the meaning of the following =
agenda
> >> >> >items:
> >> >> >=A0 "
> >> >> >=A0 2) Properties of network elements in transferring LI
> >from layer
> >> >> >2
> >> >> >=A0upward to PIDF-LO.
> >> >> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >> >> >=A0"
> >> >> >
> >> >> >Is there a summary of what these really mean, or examples
> >> >of what the
> >> >> >outcome could be in terms of protocol or layer interactions?
> >> >> >
> >> >> >Reason I'm asking is I am deeply involved in a layer 2
> >> >approach which
> >> >> >would be able to deliver location information to endpoints from
> >> >> >the
> >> >> >L2 LAN infrastructure they are connected to. =A0The work is
> >> >going on in
> >> >> >TIA and is called Link Layer Discovery Protocol - Media =
Endpoint
> >> >> >Discovery (LLDP-MED), which is an extension of IEEE
> >> >802.1AB, specific
> >> >> >to VoIP systems. =A0In LLDP-MED, among several other
> >things, we have
> >> >> >specified ways to pass equivalent data to the DHCP
> >> >> >coordinate-based LCI (RFC 3825) and civic location LCI
> >> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >> >believe).
> >> >> >We see this method of delivery as a non-competing
> >> >alternative to the
> >> >> >DHCP-based approach, with the same end result to the overall =
ECS
> >> >> >system (the endpoint receives the exact same data),
> >which has some
> >> >> >advantages particularly in enterprise deployment
> >scenarios. =A0(The
> >> >> >DHCP-based method has advantages in different scenarios.) =A0 I =
am
> >> >> >Editor of thi s document, and it is now in ballot process in =
TIA
> >> >> >(more or less equivalent to Last Call in IETF).
> >> >> >
> >> >> >Sorry, I expect I am suffering lack of context here,
> >since I only
> >> >> >joined the list relatively recently.
> >> >> >
> >> >> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now
> >past Last
> >> >> >Call and in the RFC Editor's queue? =A0It seemed to have been
> >> >> >settled on the list, and waiting on AD action.
> >> >> >
> >> >> >-- Peter Blatherwick
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >Andrew Newton <andy@hxr.us>
> >> >> >Sent by: geopriv-bounces@ietf.org
> >> >> >13.04.05 16:34
> >> >> >
> >> >> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG =
<geopriv@ietf.org>
> >> >> >=A0 =A0 =A0 =A0 cc:
> >> >> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement =
of Joint
> >> >GEOPRIV/ECRIT
> >> >> >Interim Meeting
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >The GEOPRIV and ECRIT working groups will be holding a
> >> >joint interim
> >> >> >meeting.
> >> >> >
> >> >> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >> >> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >> >> >=A0 =A0 =A0Where: Columbia University
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th =
St.)
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >> >> >Directions: http://www.cs.columbia.edu/directions.html
> >> >> >=A0 =A0 =A0 Also: WiFi provided.
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >> >> >=A0 =A0 =A0Hotel: =
http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >> >> >
> >> >> >Proposed GEOPRIV Agenda:
> >> >> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> >> >use of LI
> >> >> >in HTTP/HTML for web browsing.
> >> >> >2) Properties of network elements in transferring LI
> >from layer 2
> >> >> >upward to PIDF-LO.
> >> >> >3) Proposed enhancements to PIDF-LO to support #2.
> >> >> >
> >> >> >Proposed ECRIT Agenda:
> >> >> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >> >> >1) Emergency Call Routing Requirements
> >> >> >2) Security and Threats Analysis
> >> >> >
> >> >> >_______________________________________________
> >> >> >Geopriv mailing list
> >> >> >Geopriv@ietf.org
> >> >> >https://www1.ietf.org/mailman/listinfo/geopriv
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >_______________________________________________
> >> >> >Ecrit mailing list
> >> >> >Ecrit@ietf.org
> >> >> >https://www1.ietf.org/mailman/listinfo/ecrit
> >> >> >
> >> >>
> >> >
> >> >
> >>
> >
> >
>=20




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 14:15:57 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJjx-00086o-Eg; Wed, 20 Apr 2005 14:15:57 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOJjw-00086g-2h; Wed, 20 Apr 2005 14:15:56 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id OAA04451;
	Wed, 20 Apr 2005 14:15:55 -0400 (EDT)
Message-Id: <200504201815.OAA04451@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOJvC-0003nP-Cu; Wed, 20 Apr 2005 14:27:35 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOJjl-00043W-15; Wed, 20 Apr 2005 13:15:45 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Brian Rosen'" <br@brianrosen.net>,
	"'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	<peter_blatherwick@mitel.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRITInterimMeeting
Date: Wed, 20 Apr 2005 14:15:38 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <200504201807.OAA03774@ietf.org>
Thread-Index: AcVFrYhmxTho0nmmTYm23JF4ZdqckAAAFPnQAAEDlWAAASJSUAACuDTwAABc4NAAAh/ZEAAB1+tQAABzcIA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 439b8e44c906b144bce6744ebb966e60
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

One more little tidbit about 2)
The failure is really, really bad.  You can get a location which is =
wrong,
and there is no way to figure out that it happened.  You ask for =
location
inside the tunnel, and the local domain replies with what it thinks the
location is (typically that of the site where the tunnel terminates).  =
In
some environments, the location mechanism can figure out that you are =
coming
in on an IP address that is not known to be local, and at least fail =
better
than giving out the wrong location.  Wrong location is much worse that =
not
getting a location, or getting one, but knowing there was a problem.

Brian

> -----Original Message-----
> From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On =
Behalf
> Of Brian Rosen
> Sent: Wednesday, April 20, 2005 2:08 PM
> To: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com
> Cc: 'GEOPRIV WG'; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> GEOPRIV/ECRITInterimMeeting
>=20
> "Routing" in this context is session (SIP) routing, as you suspected.
>=20
> The first hop (LIS to endpoint) is what we are discussing.
> DHCP is not an L3+ protocol.  Neither is LLDP-MED.
>=20
> The thread has discussed a number of problems with an L7 mechanism, =
but
> laying them out:
>=20
> 1. You are subject to IP address spoofing (albeit you need to be able =
to
> get
> the packets sent from the LIS to the IP address you are spoofing)
>=20
> 2. VPN or other tunnels may have been created before you run this
> protocol.
> That will cause a failure; you need the location corresponding to the
> original "outermost" IP address.
>=20
> 3. It is difficult to control the security (beyond IP spoofing) =
because
> you
> don't have a generally good authentication mechanism.  This is a bare
> phone,
> or equivalent, during its boot phase.
>=20
> There are probably others as well.  2) is the real problem.
>=20
> Brian
>=20
> > -----Original Message-----
> > From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> > Sent: Wednesday, April 20, 2005 1:34 PM
> > To: Brian Rosen; peter_blatherwick@mitel.com
> > Cc: GEOPRIV WG; ecrit@ietf.org
> > Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint =
GEOPRIV/ECRIT
> > InterimMeeting
> >
> > Brian,
> >
> > You describe the NENA phase i2 options, ESQK etc.  Your routing =
element,
> I
> > assume is doing session routing.
> >
> > The elements you detail are all (or would appear to be) application-
> layer
> > entities and the signaling hops are likewise application-layer hops, =
not
> > L2 hops (except for maybe the LIS-->EP).
> >
> > So, where is the L2 "dependency" coming from?
> >
> > I understand that a network node that is immediately adjacent to the
> > endpoint is most likely to know where the other end of the link
> > terminates, but does that force the delivery protocol aspects of =
this to
> > be a L2 issue?
> >
> > Each of the myriad link types carry IP packets, no?  And IP packets =
can
> > carry an application packet, no?  So, wouldn't the application-layer
> > solution be the more general one?  I thought that was in line with =
IETF
> > principles.
> >
> > You are probably just laying out the options, not promoting a =
particular
> > one.  I would be interested in seeing what the champions of one =
approach
> > or another have to say.  (I did a search on LLDP-MED and drew a =
blank.)
> >
> > Mike
> >
> > >-----Original Message-----
> > >From: Brian Rosen [mailto:br@brianrosen.net]
> > >Sent: Wednesday, April 20, 2005 12:13 PM
> > >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> > >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> > >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> > >GEOPRIV/ECRIT InterimMeeting
> > >
> > >The basic picture is:
> > >
> > >LIS ---> endpoint ---> routing element ---> psap
> > >
> > >The LIS knows where the endpoint is.
> > >The endpoint gets location from the LIS
> > >The endpoint includes location on the emergency call The
> > >routing element uses location to route the call to the right
> > >PSAP The PSAP gets the call, and the location.
> > >
> > >The discussion is, how does the endpoint get location from the LIS?
> > >DHCP is one answer.  LLDP-MED is another.  A proposed L7
> > >mechanism is another.
> > >
> > >
> > >To be sure, there are folks who want to make the picture:
> > >
> > >LIS --> endpoint --> routing element ---> psap
> > > ^                        |                 |
> > > |                        |                 |
> > > +------------------------+                 |
> > > |                                          |
> > > +------------------------------------------+
> > >
> > >The LIS gives the endpoint a "key"
> > >The endpoint includes the key in the emergency call The
> > >routing element gets the key and exchanges it for location at
> > >the LIS The psap gets the key and exchanges it for location at the =
LIS
> > >
> > >The key could be an IP address.
> > >
> > >Brian
> > >
> > >
> > >> -----Original Message-----
> > >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> > >> Sent: Wednesday, April 20, 2005 12:00 PM
> > >> To: Brian Rosen; peter_blatherwick@mitel.com
> > >> Cc: GEOPRIV WG; ecrit@ietf.org
> > >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> > >GEOPRIV/ECRIT
> > >> InterimMeeting
> > >>
> > >> I still get the feeling that "delivery" is being used in two
> > >different
> > >> contexts:
> > >>
> > >>             (1)                     (2)
> > >> Local node---?---->endpoint-----/many hops/----->PSAP
> > >>           ---------------------/many hops/----->
> > >>                            (2)
> > >>
> > >> How can "delivery" be L2 dependent, when it must reach a PSAP =
many
> > >> hops away?
> > >> Color me confused.
> > >>
> > >> Mike
> > >>
> > >>
> > >> >-----Original Message-----
> > >> >From: Brian Rosen [mailto:br@brianrosen.net]
> > >> >Sent: Wednesday, April 20, 2005 10:47 AM
> > >> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> > >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> > >> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> > >> >GEOPRIV/ECRIT InterimMeeting
> > >> >
> > >> >The idea is that, say, you are in your home, served by a
> > >DSL provider.
> > >> >The domain is then that of the DSL vendor.  Your phone asks for =
its
> > >> >location from the server in the DSL domain.  It would be given =
the
> > >> >location corresponding to the IP address of the request.  Note =
that
> > >> >this would be pretty good for the requested case, even in the
> > >> >presence of a NATed local area network in your home.  The
> > >phone would
> > >> >do this on boot, before any VPN tunnels were established.
> > >> >
> > >> >I get the idea that a single delivery mechanism is desirable.
> > >> >I'm skeptical we can do that because of the security issues.
> > >> >When you make the delivery mechanism L2 dependent, you can =
control
> > >> >the possible attacks to a finer grain than the L7 local domain.
> > >> >
> > >> >Please keep in mind that some of the folks wishing to use the
> > >> >L7 mechanism don't really want to just return location to the
> > >> >endpoint; they want to retain the location and give it out to
> > >> >authorized entities upon presentation of the IP address of the
> > >> >endpoint.  That is a business decision.  They can charge for =
such a
> > >> >service.  I think the privacy implications of that are
> > >dicey, but the
> > >> >reality is that's the model that will probably be implemented if =
we
> > >> >do this.
> > >> >
> > >> >Brian
> > >> >
> > >> >
> > >> >
> > >> >
> > >> >
> > >> >> -----Original Message-----
> > >> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> > >> >> Sent: Wednesday, April 20, 2005 10:14 AM
> > >> >> To: Brian Rosen; peter_blatherwick@mitel.com
> > >> >> Cc: GEOPRIV WG; ecrit@ietf.org
> > >> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> > >> >GEOPRIV/ECRIT
> > >> >> InterimMeeting
> > >> >>
> > >> >> Brian,
> > >> >>
> > >> >> Could you clarify the domain statement.  Given
> > >nomadicity, it would
> > >> >> seem that location delivery would need to be cross-domain.  =
The
> > >> >> E911 PSAP will not always be the same domain as the
> > >roaming endpoint.
> > >> >>
> > >> >> My impression is that Location discovery is a L2 issue,
> > >tied to the
> > >> >> fact that L2 is supposed to be a single physical hop at most
> > >> >> between the end- user terminal and an adjacent
> > >location-determining
> > >> >> network node.  (Of course those trying to make L2 protocols a
> > >> >replacement for
> > >> >> IP sort of screw this assumption up.)
> > >> >>
> > >> >> The location delivery mechanism is an application-layer or
> > >> >L7 service.
> > >> >> The argument there is that since multiple applications
> > >will need to
> > >> >> rely on location information, a general purpose delivery
> > >mechanism
> > >> >> will provide consistency and generality that is so often
> > >sought in
> > >> >> IETF work.  Security can be built-in to the chosen delivery
> > >> >mechanism.
> > >> >> Note, that delivery could be a choice of an existing transfer
> > >> >> mechanism.  This does not preclude other L7 protocols from
> > >> >defining a
> > >> >> place in their messages that could also carry location
> > >information.
> > >> >>
> > >> >> So, I believe:
> > >> >> Location discovery is local, with associated security
> > >being local,
> > >> >> Location delivery is global, with associated security
> > >being global.
> > >> >>
> > >> >> The real issues are making those happen.
> > >> >>
> > >> >> Mike
> > >> >>
> > >> >> >-----Original Message-----
> > >> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] =
On
> > >> >> >Behalf Of Brian Rosen
> > >> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> > >> >> >To: peter_blatherwick@mitel.com
> > >> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> > >> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint
> > >GEOPRIV/ECRIT
> > >> >> >InterimMeeting
> > >> >> >
> > >> >> >There turns out to be a large set of issues around this =
problem,
> > >> >> >which I fear is leading to Balkanization.  There are two =
really
> > >> >> >important problems we need to solve.
> > >> >> >
> > >> >> >One fundamental problem is that every client needs to
> > >> >implement every
> > >> >> >possible LI transfer mechanism that its environment
> > >could provide.
> > >> >> >
> > >> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> > >> >> >guys reject both
> > >> >> >of these and want a something else.  Every phone has to
> > >implement
> > >> >> >every protocol.
> > >> >> >
> > >> >> >There are some who have observed that the mechanisms at hand =
are
> > >> >> >L2 specific.  They claim as long as you have an L2 specific
> > >> >> >mechanism, you need one or more for each L2.  To get out
> > >of that,
> > >> >> >they propose that we use an L7 mechanism (think some version =
of
> > >> >> >HTTP, although that might not fly).  They would say,
> > >lets do that
> > >> >> >once,
> > >> >and every L2
> > >> >> >can use it.  The problem is that you then have to deal with =
the
> > >> >> >security issues of an L7 mechanism, and in particular,
> > >you have to
> > >> >> >use IP address as the "key" for what location to return.
> > >> >If you can
> > >> >> >spoof IP address, you can get someone else's location.
> > >> >> >
> > >> >> >Those advocating L7 mechanisms claim that the mechanism
> > >> >would only be
> > >> >> >implemented within a domain, and the domain would have to =
take
> > >> >> >anti-spoofing steps.  They note that the mechanism would need =
at
> > >> >> >least a complete round trip, and probably more than one, so
> > >> >spoofing
> > >> >> >requires the ability to
> > >> >> >intercept packets not addressed to the attacker.   The
> > >> >> >returned data could
> > >> >> >be precisely a PIDF-LO.
> > >> >> >
> > >> >> >Then on top of that, we turn out to need some more security,
> > >> >> >especially for emergency calls.  We need to prevent forged
> > >> >locations.
> > >> >> >That means we need to sign the PIDF-LO.  If you get location =
via
> > >> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from
> > >> >> >that, how do we construct a signature from the entity that
> > >> >> >actually determined location?
> > >> >> >
> > >> >> >Brian
> > >> >> >
> > >> >> >
> > >> >> >________________________________________
> > >> >> >From: geopriv-bounces@ietf.org
> > >> >> >[mailto:geopriv-bounces@ietf.org] On Behalf Of
> > >> >> >peter_blatherwick@mitel.com
> > >> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> > >> >> >To: Andrew Newton
> > >> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> > >> >> >Subject: Re: [Geopriv] Announcement of Joint
> > >GEOPRIV/ECRIT Interim
> > >> >> >Meeting
> > >> >> >
> > >> >> >
> > >> >> >Hi Andrew, lists,
> > >> >> >
> > >> >> >I'd like to better understand the meaning of the following =
agenda
> > >> >> >items:
> > >> >> >=A0 "
> > >> >> >=A0 2) Properties of network elements in transferring LI
> > >from layer
> > >> >> >2
> > >> >> >=A0upward to PIDF-LO.
> > >> >> >=A03) Proposed enhancements to PIDF-LO to support #2.
> > >> >> >=A0"
> > >> >> >
> > >> >> >Is there a summary of what these really mean, or examples
> > >> >of what the
> > >> >> >outcome could be in terms of protocol or layer interactions?
> > >> >> >
> > >> >> >Reason I'm asking is I am deeply involved in a layer 2
> > >> >approach which
> > >> >> >would be able to deliver location information to endpoints =
from
> > >> >> >the
> > >> >> >L2 LAN infrastructure they are connected to. =A0The work is
> > >> >going on in
> > >> >> >TIA and is called Link Layer Discovery Protocol - Media =
Endpoint
> > >> >> >Discovery (LLDP-MED), which is an extension of IEEE
> > >> >802.1AB, specific
> > >> >> >to VoIP systems. =A0In LLDP-MED, among several other
> > >things, we have
> > >> >> >specified ways to pass equivalent data to the DHCP
> > >> >> >coordinate-based LCI (RFC 3825) and civic location LCI
> > >> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> > >> >believe).
> > >> >> >We see this method of delivery as a non-competing
> > >> >alternative to the
> > >> >> >DHCP-based approach, with the same end result to the overall =
ECS
> > >> >> >system (the endpoint receives the exact same data),
> > >which has some
> > >> >> >advantages particularly in enterprise deployment
> > >scenarios. =A0(The
> > >> >> >DHCP-based method has advantages in different scenarios.) =A0 =
I am
> > >> >> >Editor of thi s document, and it is now in ballot process in =
TIA
> > >> >> >(more or less equivalent to Last Call in IETF).
> > >> >> >
> > >> >> >Sorry, I expect I am suffering lack of context here,
> > >since I only
> > >> >> >joined the list relatively recently.
> > >> >> >
> > >> >> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now
> > >past Last
> > >> >> >Call and in the RFC Editor's queue? =A0It seemed to have been
> > >> >> >settled on the list, and waiting on AD action.
> > >> >> >
> > >> >> >-- Peter Blatherwick
> > >> >> >
> > >> >> >
> > >> >> >
> > >> >> >
> > >> >> >Andrew Newton <andy@hxr.us>
> > >> >> >Sent by: geopriv-bounces@ietf.org
> > >> >> >13.04.05 16:34
> > >> >> >
> > >> >> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG =
<geopriv@ietf.org>
> > >> >> >=A0 =A0 =A0 =A0 cc:
> > >> >> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] =
Announcement of Joint
> > >> >GEOPRIV/ECRIT
> > >> >> >Interim Meeting
> > >> >> >
> > >> >> >
> > >> >> >
> > >> >> >
> > >> >> >The GEOPRIV and ECRIT working groups will be holding a
> > >> >joint interim
> > >> >> >meeting.
> > >> >> >
> > >> >> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> > >> >> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> > >> >> >=A0 =A0 =A0Where: Columbia University
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th =
St.)
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> > >> >> >Directions: http://www.cs.columbia.edu/directions.html
> > >> >> >=A0 =A0 =A0 Also: WiFi provided.
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> > >> >> >=A0 =A0 =A0Hotel: =
http://www.cs.columbia.edu/~hgs/etc/hotels.html
> > >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> > >> >> >
> > >> >> >Proposed GEOPRIV Agenda:
> > >> >> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> > >> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> > >> >use of LI
> > >> >> >in HTTP/HTML for web browsing.
> > >> >> >2) Properties of network elements in transferring LI
> > >from layer 2
> > >> >> >upward to PIDF-LO.
> > >> >> >3) Proposed enhancements to PIDF-LO to support #2.
> > >> >> >
> > >> >> >Proposed ECRIT Agenda:
> > >> >> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> > >> >> >1) Emergency Call Routing Requirements
> > >> >> >2) Security and Threats Analysis
> > >> >> >
> > >> >> >_______________________________________________
> > >> >> >Geopriv mailing list
> > >> >> >Geopriv@ietf.org
> > >> >> >https://www1.ietf.org/mailman/listinfo/geopriv
> > >> >> >
> > >> >> >
> > >> >> >
> > >> >> >
> > >> >> >_______________________________________________
> > >> >> >Ecrit mailing list
> > >> >> >Ecrit@ietf.org
> > >> >> >https://www1.ietf.org/mailman/listinfo/ecrit
> > >> >> >
> > >> >>
> > >> >
> > >> >
> > >>
> > >
> > >
> >
>=20
>=20
>=20
>=20
> _______________________________________________
> Geopriv mailing list
> Geopriv@ietf.org
> https://www1.ietf.org/mailman/listinfo/geopriv
>=20




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 15:09:56 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOKaC-0006B5-JE; Wed, 20 Apr 2005 15:09:56 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOKaA-0006Ax-Nn; Wed, 20 Apr 2005 15:09:55 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA09266;
	Wed, 20 Apr 2005 15:09:53 -0400 (EDT)
Received: from dnsmx1rrc.telcordia.com ([128.96.20.41])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOKlQ-0005SV-NJ; Wed, 20 Apr 2005 15:21:33 -0400
Received: from rrc-its-ieg02.cc.telcordia.com (rrc-its-ieg02.cc.telcordia.com
	[128.96.109.3])
	by dnsmx1rrc.telcordia.com (8.11.7+Sun/8.9.3) with SMTP id j3KJ9KF05876;
	Wed, 20 Apr 2005 15:09:20 -0400 (EDT)
Received: from rrc-its-exbh01.mail.saic.com ([128.96.109.61])
	by rrc-its-ieg02.cc.telcordia.com (SMSSMTP 4.0.5.66) with SMTP id
	M2005042015091812919 ; Wed, 20 Apr 2005 15:09:18 -0400
Received: by rrc-its-exbh01.mail.saic.com with Internet Mail Service
	(5.5.2657.72) id <HCCM3VZK>; Wed, 20 Apr 2005 15:09:18 -0400
Message-ID: <F0CB7F62D783BF40AD93882BB817F24502358633@nvc-its-exs01.cc.telcordia.com>
From: "Abbott, Nadine B." <nabbott@telcordia.com>
To: "'Brian Rosen'" <br@brianrosen.net>, peter_blatherwick@mitel.com
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Int
	erimMeeting
Date: Wed, 20 Apr 2005 15:09:18 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-Spam-Score: 0.0 (/)
X-Scan-Signature: da36eda0a3266ed30a56c496b15b76c7
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Really need to change the name of this thread...

-----Original Message-----
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On =
Behalf
Of Brian Rosen
Sent: Wednesday, April 20, 2005 1:58 PM
To: peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org; 'Michael Hammer (mhammer)'
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


Peter

For some time, I have accepted the fact that we aren't going to be able =
to
have one mechanism.  I don't like it, but it seems inevitable.  You =
have to
admit that once you say "more than one" and your reasoning is =
"different
scenarios" you open the door to the next guy who gets to make the same
argument.  What are the phone vendors going to do?  You really, really =
don't
want a phone making one assumption and the network L2 vendors another.  =
The
scenarios where LLDP-MED works COULD, reasonably, use DHCP.  You might =
like
LLDP-MED for any number of reasons, but it's not the case that DHCP =
wouldn't
work.  The reverse is not true; there are many networks where there is =
no
switch that could reasonably implement LLDP-MED.  CableModem is an =
obvious
one.  At the moment, I'm rationalizing "home=3DDHCP, =
enterprise=3DLLDP-MED", but
I don't want a phone vendor assuming he is only serving one of those
markets.  You guys have made our life difficult, and I don't really =
think it
had to be, but its reality.

The appeal of the L7 mechanism was that we could have one.  Alas, I =
don't
see how to make it work.  Ethernet connected devices will probably need
LLDP-MED and DHCP.  That's my current message to phone vendors.

At the moment, all the DSL folks I talk to insist that they won't =
deploy a
DHCP mechanism or an LLDP-MED mechanism.  They want something else.  =
That's
the immediate impetuous for the L7 discussion.  If L7 mechanisms don't =
work,
and I don't think they do, then we either need a DSL L2 mechanism, or =
we
need them to buy my "home router uses DHCP to clients, and anything the =
want
to the DSL side" argument.  The DSL guys have some allies; basically =
boxes
in the middle of L2 that don't have a relationship with the DHCP box.  =
The
example is the WiFi management boxes.  They know which AP you are =
connected
to; some may even triangulate.  But those boxes don't run DHCP, and =
they
don't have an interface to them.  L7 works for them too; especially =
because
they can limit the domain to the subnet(s) their management boxes =
handle.
Maybe that's the angle to attack; define an interface to the DHCP =
server
that lets it get location so it can hand it out to the endpoints.  I've
tried to argue that they could implement LLDP-MED.  I got push back =
from one
of them, but the reasons don't make sense to me yet.

I've been working on this for some time.  The inclination of EVERY L2 =
player
is "we need a mechanism just for us".  That, clearly, won't work.  What =
I
tell them is "if you can control the specification of every end device =
that
directly or indirectly connects to your L2, then use anything you like, =
as
long as EVERY device that is connected to your L2 can get location.  If =
you
can't control endpoints like that, use DHCP (or LLDP-MED)".  3G is an
example of an L2 where they can control all the endpoints.  They have a =
way
to get location, and that's good enough for me. =20

Brian



________________________________________
From: peter_blatherwick@mitel.com [mailto:peter_blatherwick@mitel.com]=20
Sent: Wednesday, April 20, 2005 1:21 PM
To: Brian Rosen
Cc: ecrit@ietf.org; 'GEOPRIV WG'; 'Michael Hammer (mhammer)'
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


Seems a simple-minded question has sparked a flurry of debate ;-) =A0 =
=A0Some
thoughts, just to stir the pot some more... not that it appears to need
it...=20

I do not at all see the purely L2 LLDP-MED approach and the call it =
L2.5
DHCP approach as being in conflict. =A0They are merely different ways =
suited
to different scenarios. =A0=20

I do not see implementing both LLDP-based and DHCP-based methods in a =
phone
as being a big deal, since in the end they both are simple, would =
deliver
the exact same data to the application above, and they start in a =
strict
order (LLDP always before DHCP). =A0The harder issue is really what =
would the
poor phone do if it received by both mechanisms, and the received data =
were
different -- it would need to pick one, or sort out the conflict itself
(yech!). =A0=20

Since LLDP (hence LLDP-MED) is strictly contained to a physical link, =
its
security is very contained. =A0=20

IEEE 802.1X is applied to that same link before LLDP gets to run (or =
before
DHCP for that matter), so at least the endpoint can be well =
authenticated
before hand. =A0Also, it intuitively makes sense at least in my fuzzy =
brain,
that the X509 certs which could be part of the 802.1X authentication
exchange (if EAP-TLS is used) could also be useful in the upward
authentication process. =A0(If I have messed up the acronyms, please do =
not
jump down my throat .. hopefully close enough.)=20

It would indeed be unfortunate to add a third approach ... or a forth =
.... =A0
I am not familiar with whatever the DSL approach would be, but do not
off-hand see why a DHCP relay approach would not work there. =
=A0Anything
written up to look at on it?=20

Peter=20







"Brian Rosen" <br@brianrosen.net>=20
20.04.05 10:47=20
=A0 =A0 =A0 =A0=20
=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0"'Michael Hammer (mhammer)'" =
<mhammer@cisco.com>,
<peter_blatherwick@mitel.com>=20
=A0 =A0 =A0 =A0 cc: =A0 =A0 =A0 =A0"'GEOPRIV WG'" <geopriv@ietf.org>, =
<ecrit@ietf.org>=20
=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0RE: [Ecrit] RE: [Geopriv] =
Announcement of Joint
GEOPRIV/ECRIT InterimMeeting



The idea is that, say, you are in your home, served by a DSL provider. =
The
domain is then that of the DSL vendor. =A0Your phone asks for its =
location
from the server in the DSL domain. =A0It would be given the location
corresponding to the IP address of the request. =A0Note that this would =
be
pretty good for the requested case, even in the presence of a NATed =
local
area network in your home. =A0The phone would do this on boot, before =
any VPN
tunnels were established.

I get the idea that a single delivery mechanism is desirable. =A0I'm =
skeptical
we can do that because of the security issues. =A0When you make the =
delivery
mechanism L2 dependent, you can control the possible attacks to a finer
grain than the L7 local domain.

Please keep in mind that some of the folks wishing to use the L7 =
mechanism
don't really want to just return location to the endpoint; they want to
retain the location and give it out to authorized entities upon =
presentation
of the IP address of the endpoint. =A0That is a business decision. =
=A0They can
charge for such a service. =A0I think the privacy implications of that =
are
dicey, but the reality is that's the model that will probably be =
implemented
if we do this. =A0

Brian





> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 10:14 AM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint =
GEOPRIV/ECRIT=20
> InterimMeeting
>=20
> Brian,
>=20
> Could you clarify the domain statement. =A0Given nomadicity, it would =

> seem that location delivery would need to be cross-domain. =A0The =
E911=20
> PSAP will not always be the same domain as the roaming endpoint.
>=20
> My impression is that Location discovery is a L2 issue, tied to the=20
> fact that L2 is supposed to be a single physical hop at most between=20
> the end- user terminal and an adjacent location-determining network=20
> node. =A0(Of course those trying to make L2 protocols a replacement =
for=20
> IP sort of screw this assumption up.)
>=20
> The location delivery mechanism is an application-layer or L7 =
service.=20
> The argument there is that since multiple applications will need to 
> rely on location information, a general purpose delivery mechanism=20
> will provide consistency and generality that is so often sought in=20
> IETF work. =A0Security can be built-in to the chosen delivery =
mechanism. =A0
> Note, that delivery could be a choice of an existing transfer=20
> mechanism. =A0This does not preclude other L7 protocols from defining =
a=20
> place in their messages that could also carry location information.
>=20
> So, I believe:
> Location discovery is local, with associated security being local,=20
> Location delivery is global, with associated security being global.
>=20
> The real issues are making those happen.
>=20
> Mike
>=20
> >-----Original Message-----
> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On=20
> >Behalf Of Brian Rosen
> >Sent: Wednesday, April 20, 2005 9:54 AM
> >To: peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
> >InterimMeeting
> >
> >There turns out to be a large set of issues around this problem,=20
> >which I fear is leading to Balkanization. =A0There are two really=20
> >important problems we need to solve.
> >
> >One fundamental problem is that every client needs to implement =
every=20
> >possible LI transfer mechanism that its environment could provide.
> >
> >We have DHCP. =A0You guys are working on LLDP-MED. =A0 The DSL guys=20
> >reject both of these and want a something else. =A0Every phone has =
to
> >implement every protocol.=20
> >
> >There are some who have observed that the mechanisms at hand are L2=20
> >specific. =A0They claim as long as you have an L2 specific =
mechanism,=20
> >you need one or more for each L2. =A0To get out of that, they =
propose=20
> >that we use an L7 mechanism (think some version of HTTP, although=20
> >that might not fly). =A0They would say, lets do that once, and every =
L2=20
> >can use it. =A0The problem is that you then have to deal with the=20
> >security issues of an L7 mechanism, and in particular, you have to=20
> >use IP address as the "key" for what location to return. =A0If you =
can
> >spoof IP address, you can get someone else's location.
> >
> >Those advocating L7 mechanisms claim that the mechanism would only =
be=20
> >implemented within a domain, and the domain would have to take=20
> >anti-spoofing steps. =A0They note that the mechanism would need at=20
> >least a complete round trip, and probably more than one, so spoofing =

> >requires the ability to intercept packets not addressed to the=20
> >attacker. =A0 The returned data could
> >be precisely a PIDF-LO.
> >
> >Then on top of that, we turn out to need some more security,=20
> >especially for emergency calls. =A0We need to prevent forged =
locations. =A0
> >That means we need to sign the PIDF-LO. =A0If you get location via=20
> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from that,=20
> >how do we construct a signature from the entity that actually=20
> >determined location?
> >
> >Brian
> >
> >
> >________________________________________
> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On=20
> >Behalf Of peter_blatherwick@mitel.com
> >Sent: Wednesday, April 20, 2005 9:30 AM
> >To: Andrew Newton
> >Cc: GEOPRIV WG; ecrit@ietf.org
> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >Interim Meeting
> >
> >
> >Hi Andrew, lists,
> >
> >I'd like to better understand the meaning of the following agenda=20
> >items:
> >=A0 "
> >=A0 2) Properties of network elements in transferring LI from layer =
2
> >=A0upward to PIDF-LO.
> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >=A0"
> >
> >Is there a summary of what these really mean, or examples of what =
the=20
> >outcome could be in terms of protocol or layer interactions?
> >
> >Reason I'm asking is I am deeply involved in a layer 2 approach =
which=20
> >would be able to deliver location information to endpoints from the=20
> >L2 LAN infrastructure they are connected to. =A0The work is going on =
in=20
> >TIA and is called Link Layer Discovery Protocol - Media Endpoint=20
> >Discovery (LLDP-MED), which is an extension of IEEE 802.1AB, =
specific=20
> >to VoIP systems. =A0In LLDP-MED, among several other things, we have
> >specified ways to pass equivalent data to the DHCP
> >coordinate-based LCI (RFC 3825) and civic location LCI
> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe). =A0We see this method of delivery as a non-competing
> >alternative to the DHCP-based approach, with the same end
> >result to the overall ECS system (the endpoint receives the
> >exact same data), which has some advantages particularly in
> >enterprise deployment scenarios. =A0(The DHCP-based method has
> >advantages in different scenarios.) =A0 I am Editor of thi s
> >document, and it is now in ballot process in TIA (more or less
> >equivalent to Last Call in IETF).
> >
> >Sorry, I expect I am suffering lack of context here, since I only=20
> >joined the list relatively recently.
> >
> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Last =

> >Call and in the RFC Editor's queue? =A0It seemed to have been =
settled=20
> >on the list, and waiting on AD action.
> >
> >-- Peter Blatherwick
> >
> >
> >
> >
> >Andrew Newton <andy@hxr.us>
> >Sent by: geopriv-bounces@ietf.org
> >13.04.05 16:34
> >
> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >=A0 =A0 =A0 =A0 cc:
> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of =
Joint GEOPRIV/ECRIT=20
> >Interim Meeting
> >
> >
> >
> >
> >The GEOPRIV and ECRIT working groups will be holding a joint interim =

> >meeting.
> >
> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >=A0 =A0 =A0Where: Columbia University
> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >Directions: http://www.cs.columbia.edu/directions.html
> >=A0 =A0 =A0 Also: WiFi provided.
> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >
> >Proposed GEOPRIV Agenda:
> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI =

> >in HTTP/HTML for web browsing.
> >2) Properties of network elements in transferring LI from layer 2=20
> >upward to PIDF-LO.
> >3) Proposed enhancements to PIDF-LO to support #2.
> >
> >Proposed ECRIT Agenda:
> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >1) Emergency Call Routing Requirements
> >2) Security and Threats Analysis
> >
> >_______________________________________________
> >Geopriv mailing list
> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
> >
> >
> >
> >
> >_______________________________________________
> >Ecrit mailing list
> >Ecrit@ietf.org
> >https://www1.ietf.org/mailman/listinfo/ecrit
> >
>=20







_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 15:23:12 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOKn2-0007fT-Ah; Wed, 20 Apr 2005 15:23:12 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOKmz-0007fL-JD; Wed, 20 Apr 2005 15:23:11 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA10716;
	Wed, 20 Apr 2005 15:23:08 -0400 (EDT)
Received: from dnsmx1rrc.telcordia.com ([128.96.20.41])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOKyF-0005kU-Lx; Wed, 20 Apr 2005 15:34:49 -0400
Received: from rrc-its-ieg02.cc.telcordia.com (rrc-its-ieg02.cc.telcordia.com
	[128.96.109.3])
	by dnsmx1rrc.telcordia.com (8.11.7+Sun/8.9.3) with SMTP id j3KJMvF08303;
	Wed, 20 Apr 2005 15:22:57 -0400 (EDT)
Received: from rrc-its-exbh01.mail.saic.com ([128.96.109.61])
	by rrc-its-ieg02.cc.telcordia.com (SMSSMTP 4.0.5.66) with SMTP id
	M2005042015225514666 ; Wed, 20 Apr 2005 15:22:55 -0400
Received: by rrc-its-exbh01.mail.saic.com with Internet Mail Service
	(5.5.2657.72) id <HCCM3WBB>; Wed, 20 Apr 2005 15:22:55 -0400
Message-ID: <F0CB7F62D783BF40AD93882BB817F24502358634@nvc-its-exs01.cc.telcordia.com>
From: "Abbott, Nadine B." <nabbott@telcordia.com>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Int
	erimMeeting
Date: Wed, 20 Apr 2005 15:22:55 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
X-MIME-Autoconverted: from 8bit to quoted-printable by dnsmx1rrc.telcordia.com
	id j3KJMvF08303
X-Spam-Score: 0.0 (/)
X-Scan-Signature: c853ec6e79db43c8dbe6774215da1042
Content-Transfer-Encoding: quoted-printable
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Brian,

Not clear to me why #2 is any more of a problem for an application query
method, than the DHCP method.

You have to have internet access before you can create the VPN (at least =
on
my software)--since we are talking about VPNs, I assume that we are talki=
ng
about softphones.
If you have internet access, an application can perform a query to an LIS
and get its location as soon as it gets its configuration information (by
whatever mechanism).
This can happen BEFORE you create the VPN (certainly what is assumed by t=
he
DHCP download mechanism).
Then the endpoint has its location information and can provide it when it
starts its VoIP application.=20

Nadine =20

-----Original Message-----
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
Brian Rosen
Sent: Wednesday, April 20, 2005 2:08 PM
To: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


"Routing" in this context is session (SIP) routing, as you suspected.

The first hop (LIS to endpoint) is what we are discussing.
DHCP is not an L3+ protocol.  Neither is LLDP-MED.

The thread has discussed a number of problems with an L7 mechanism, but
laying them out:

1. You are subject to IP address spoofing (albeit you need to be able to =
get
the packets sent from the LIS to the IP address you are spoofing)

2. VPN or other tunnels may have been created before you run this protoco=
l.
That will cause a failure; you need the location corresponding to the
original "outermost" IP address.

3. It is difficult to control the security (beyond IP spoofing) because y=
ou
don't have a generally good authentication mechanism.  This is a bare pho=
ne,
or equivalent, during its boot phase.=20

There are probably others as well.  2) is the real problem.

Brian

> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 1:34 PM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
> InterimMeeting
>=20
> Brian,
>=20
> You describe the NENA phase i2 options, ESQK etc.  Your routing=20
> element, I assume is doing session routing.
>=20
> The elements you detail are all (or would appear to be)=20
> application-layer entities and the signaling hops are likewise=20
> application-layer hops, not L2 hops (except for maybe the LIS-->EP).
>=20
> So, where is the L2 "dependency" coming from?
>=20
> I understand that a network node that is immediately adjacent to the=20
> endpoint is most likely to know where the other end of the link=20
> terminates, but does that force the delivery protocol aspects of this=20
> to be a L2 issue?
>=20
> Each of the myriad link types carry IP packets, no?  And IP packets=20
> can carry an application packet, no?  So, wouldn't the=20
> application-layer solution be the more general one?  I thought that=20
> was in line with IETF principles.
>=20
> You are probably just laying out the options, not promoting a=20
> particular one.  I would be interested in seeing what the champions of=20
> one approach or another have to say.  (I did a search on LLDP-MED and=20
> drew a blank.)
>=20
> Mike
>=20
> >-----Original Message-----
> >From: Brian Rosen [mailto:br@brianrosen.net]
> >Sent: Wednesday, April 20, 2005 12:13 PM
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The basic picture is:
> >
> >LIS ---> endpoint ---> routing element ---> psap
> >
> >The LIS knows where the endpoint is.
> >The endpoint gets location from the LIS
> >The endpoint includes location on the emergency call The routing=20
> >element uses location to route the call to the right PSAP The PSAP=20
> >gets the call, and the location.
> >
> >The discussion is, how does the endpoint get location from the LIS?=20
> >DHCP is one answer.  LLDP-MED is another.  A proposed L7 mechanism is=20
> >another.
> >
> >
> >To be sure, there are folks who want to make the picture:
> >
> >LIS --> endpoint --> routing element ---> psap
> > ^                        |                 |
> > |                        |                 |
> > +------------------------+                 |
> > |                                          |
> > +------------------------------------------+
> >
> >The LIS gives the endpoint a "key"
> >The endpoint includes the key in the emergency call The routing=20
> >element gets the key and exchanges it for location at the LIS The=20
> >psap gets the key and exchanges it for location at the LIS
> >
> >The key could be an IP address.
> >
> >Brian
> >
> >
> >> -----Original Message-----
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> Sent: Wednesday, April 20, 2005 12:00 PM
> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> InterimMeeting
> >>
> >> I still get the feeling that "delivery" is being used in two
> >different
> >> contexts:
> >>
> >>             (1)                     (2)
> >> Local node---?---->endpoint-----/many hops/----->PSAP
> >>           ---------------------/many hops/----->
> >>                            (2)
> >>
> >> How can "delivery" be L2 dependent, when it must reach a PSAP many=20
> >> hops away? Color me confused.
> >>
> >> Mike
> >>
> >>
> >> >-----Original Message-----
> >> >From: Brian Rosen [mailto:br@brianrosen.net]
> >> >Sent: Wednesday, April 20, 2005 10:47 AM
> >> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
> >> >GEOPRIV/ECRIT InterimMeeting
> >> >
> >> >The idea is that, say, you are in your home, served by a
> >DSL provider.
> >> >The domain is then that of the DSL vendor.  Your phone asks for=20
> >> >its location from the server in the DSL domain.  It would be given=20
> >> >the location corresponding to the IP address of the request.  Note=20
> >> >that this would be pretty good for the requested case, even in the=20
> >> >presence of a NATed local area network in your home.  The
> >phone would
> >> >do this on boot, before any VPN tunnels were established.
> >> >
> >> >I get the idea that a single delivery mechanism is desirable. I'm=20
> >> >skeptical we can do that because of the security issues. When you=20
> >> >make the delivery mechanism L2 dependent, you can control the=20
> >> >possible attacks to a finer grain than the L7 local domain.
> >> >
> >> >Please keep in mind that some of the folks wishing to use the L7=20
> >> >mechanism don't really want to just return location to the=20
> >> >endpoint; they want to retain the location and give it out to=20
> >> >authorized entities upon presentation of the IP address of the=20
> >> >endpoint.  That is a business decision.  They can charge for such=20
> >> >a service.  I think the privacy implications of that are
> >dicey, but the
> >> >reality is that's the model that will probably be implemented if=20
> >> >we do this.
> >> >
> >> >Brian
> >> >
> >> >
> >> >
> >> >
> >> >
> >> >> -----Original Message-----
> >> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> >> Sent: Wednesday, April 20, 2005 10:14 AM
> >> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >> >GEOPRIV/ECRIT
> >> >> InterimMeeting
> >> >>
> >> >> Brian,
> >> >>
> >> >> Could you clarify the domain statement.  Given
> >nomadicity, it would
> >> >> seem that location delivery would need to be cross-domain.  The=20
> >> >> E911 PSAP will not always be the same domain as the
> >roaming endpoint.
> >> >>
> >> >> My impression is that Location discovery is a L2 issue,
> >tied to the
> >> >> fact that L2 is supposed to be a single physical hop at most=20
> >> >> between the end- user terminal and an adjacent
> >location-determining
> >> >> network node.  (Of course those trying to make L2 protocols a
> >> >replacement for
> >> >> IP sort of screw this assumption up.)
> >> >>
> >> >> The location delivery mechanism is an application-layer or
> >> >L7 service.
> >> >> The argument there is that since multiple applications
> >will need to
> >> >> rely on location information, a general purpose delivery
> >mechanism
> >> >> will provide consistency and generality that is so often
> >sought in
> >> >> IETF work.  Security can be built-in to the chosen delivery
> >> >mechanism.
> >> >> Note, that delivery could be a choice of an existing transfer=20
> >> >> mechanism.  This does not preclude other L7 protocols from
> >> >defining a
> >> >> place in their messages that could also carry location
> >information.
> >> >>
> >> >> So, I believe:
> >> >> Location discovery is local, with associated security
> >being local,
> >> >> Location delivery is global, with associated security
> >being global.
> >> >>
> >> >> The real issues are making those happen.
> >> >>
> >> >> Mike
> >> >>
> >> >> >-----Original Message-----
> >> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On=20
> >> >> >Behalf Of Brian Rosen
> >> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> >> >> >To: peter_blatherwick@mitel.com
> >> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> >> >InterimMeeting
> >> >> >
> >> >> >There turns out to be a large set of issues around this=20
> >> >> >problem, which I fear is leading to Balkanization.  There are=20
> >> >> >two really important problems we need to solve.
> >> >> >
> >> >> >One fundamental problem is that every client needs to
> >> >implement every
> >> >> >possible LI transfer mechanism that its environment
> >could provide.
> >> >> >
> >> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >> >> >guys reject both
> >> >> >of these and want a something else.  Every phone has to
> >implement
> >> >> >every protocol.
> >> >> >
> >> >> >There are some who have observed that the mechanisms at hand=20
> >> >> >are L2 specific.  They claim as long as you have an L2 specific=20
> >> >> >mechanism, you need one or more for each L2.  To get out
> >of that,
> >> >> >they propose that we use an L7 mechanism (think some version of=20
> >> >> >HTTP, although that might not fly).  They would say,
> >lets do that
> >> >> >once,
> >> >and every L2
> >> >> >can use it.  The problem is that you then have to deal with the=20
> >> >> >security issues of an L7 mechanism, and in particular,
> >you have to
> >> >> >use IP address as the "key" for what location to return.
> >> >If you can
> >> >> >spoof IP address, you can get someone else's location.
> >> >> >
> >> >> >Those advocating L7 mechanisms claim that the mechanism
> >> >would only be
> >> >> >implemented within a domain, and the domain would have to take=20
> >> >> >anti-spoofing steps.  They note that the mechanism would need=20
> >> >> >at least a complete round trip, and probably more than one, so
> >> >spoofing
> >> >> >requires the ability to
> >> >> >intercept packets not addressed to the attacker.   The
> >> >> >returned data could
> >> >> >be precisely a PIDF-LO.
> >> >> >
> >> >> >Then on top of that, we turn out to need some more security,=20
> >> >> >especially for emergency calls.  We need to prevent forged
> >> >locations.
> >> >> >That means we need to sign the PIDF-LO.  If you get location=20
> >> >> >via DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO=20
> >> >> >from that, how do we construct a signature from the entity that=20
> >> >> >actually determined location?
> >> >> >
> >> >> >Brian
> >> >> >
> >> >> >
> >> >> >________________________________________
> >> >> >From: geopriv-bounces@ietf.org=20
> >> >> >[mailto:geopriv-bounces@ietf.org] On Behalf Of=20
> >> >> >peter_blatherwick@mitel.com
> >> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> >> >> >To: Andrew Newton
> >> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> >> >> >Subject: Re: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT Interim
> >> >> >Meeting
> >> >> >
> >> >> >
> >> >> >Hi Andrew, lists,
> >> >> >
> >> >> >I'd like to better understand the meaning of the following=20
> >> >> >agenda
> >> >> >items:
> >> >> >=A0 "
> >> >> >=A0 2) Properties of network elements in transferring LI
> >from layer
> >> >> >2
> >> >> >=A0upward to PIDF-LO.
> >> >> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >> >> >=A0"
> >> >> >
> >> >> >Is there a summary of what these really mean, or examples
> >> >of what the
> >> >> >outcome could be in terms of protocol or layer interactions?
> >> >> >
> >> >> >Reason I'm asking is I am deeply involved in a layer 2
> >> >approach which
> >> >> >would be able to deliver location information to endpoints from=20
> >> >> >the L2 LAN infrastructure they are connected to. =A0The work is
> >> >going on in
> >> >> >TIA and is called Link Layer Discovery Protocol - Media=20
> >> >> >Endpoint Discovery (LLDP-MED), which is an extension of IEEE
> >> >802.1AB, specific
> >> >> >to VoIP systems. =A0In LLDP-MED, among several other
> >things, we have
> >> >> >specified ways to pass equivalent data to the DHCP=20
> >> >> >coordinate-based LCI (RFC 3825) and civic location LCI=20
> >> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >> >believe).
> >> >> >We see this method of delivery as a non-competing
> >> >alternative to the
> >> >> >DHCP-based approach, with the same end result to the overall=20
> >> >> >ECS system (the endpoint receives the exact same data),
> >which has some
> >> >> >advantages particularly in enterprise deployment
> >scenarios. =A0(The
> >> >> >DHCP-based method has advantages in different scenarios.) =A0 I=20
> >> >> >am Editor of thi s document, and it is now in ballot process in=20
> >> >> >TIA (more or less equivalent to Last Call in IETF).
> >> >> >
> >> >> >Sorry, I expect I am suffering lack of context here,
> >since I only
> >> >> >joined the list relatively recently.
> >> >> >
> >> >> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now
> >past Last
> >> >> >Call and in the RFC Editor's queue? =A0It seemed to have been=20
> >> >> >settled on the list, and waiting on AD action.
> >> >> >
> >> >> >-- Peter Blatherwick
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >Andrew Newton <andy@hxr.us>
> >> >> >Sent by: geopriv-bounces@ietf.org
> >> >> >13.04.05 16:34
> >> >> >
> >> >> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >> >> >=A0 =A0 =A0 =A0 cc:
> >> >> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement o=
f Joint
> >> >GEOPRIV/ECRIT
> >> >> >Interim Meeting
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >The GEOPRIV and ECRIT working groups will be holding a
> >> >joint interim
> >> >> >meeting.
> >> >> >
> >> >> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >> >> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >> >> >=A0 =A0 =A0Where: Columbia University
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St=
.)
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >> >> >Directions: http://www.cs.columbia.edu/directions.html
> >> >> >=A0 =A0 =A0 Also: WiFi provided.
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >> >> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.htm=
l
> >> >> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >> >> >
> >> >> >Proposed GEOPRIV Agenda:
> >> >> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> >> >use of LI
> >> >> >in HTTP/HTML for web browsing.
> >> >> >2) Properties of network elements in transferring LI
> >from layer 2
> >> >> >upward to PIDF-LO.
> >> >> >3) Proposed enhancements to PIDF-LO to support #2.
> >> >> >
> >> >> >Proposed ECRIT Agenda:
> >> >> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >> >> >1) Emergency Call Routing Requirements
> >> >> >2) Security and Threats Analysis
> >> >> >
> >> >> >_______________________________________________
> >> >> >Geopriv mailing list
> >> >> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
> >> >> >
> >> >> >
> >> >> >
> >> >> >
> >> >> >_______________________________________________
> >> >> >Ecrit mailing list
> >> >> >Ecrit@ietf.org https://www1.ietf.org/mailman/listinfo/ecrit
> >> >> >
> >> >>
> >> >
> >> >
> >>
> >
> >
>=20




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 15:47:54 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOLAw-0001rc-JF; Wed, 20 Apr 2005 15:47:54 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOLAv-0001rB-Ew; Wed, 20 Apr 2005 15:47:53 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id PAA12353;
	Wed, 20 Apr 2005 15:47:52 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOLMC-0006HB-3H; Wed, 20 Apr 2005 15:59:33 -0400
Received: from [128.59.16.206] (chairpc.win.cs.columbia.edu [128.59.16.206])
	(authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3KJleh3011474
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 15:47:46 -0400 (EDT)
Message-ID: <4266B1D7.2010506@cs.columbia.edu>
Date: Wed, 20 Apr 2005 15:47:35 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
References: <200504201807.OAA03774@ietf.org>
In-Reply-To: <200504201807.OAA03774@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8b30eb7682a596edff707698f4a80f7d
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

There are at least two separate sets of issues that depend on the 
architecture, and it seems dangerous to conflate the two:

(First-person) I get my own location from a server. This makes address 
spoofing more difficult, with return routability. Drawback: If I'm 
behind a NAT, and the location server isn't, this works only if the IP 
address in the IP packet is used, not something in the query. VPNs 
should not be a big deal here.

(Third-person) I ask for an address for an IP address. Address spoofing 
and VPN issues matter, possibly NAT issues (since the IP address I get 
may be a NAT address, given the typical circles of NAT hell in various 
networks.)

I think first-person is much more palatable than third-person.

Brian Rosen wrote:
> "Routing" in this context is session (SIP) routing, as you suspected.
> 
> The first hop (LIS to endpoint) is what we are discussing.
> DHCP is not an L3+ protocol.  Neither is LLDP-MED.
> 
> The thread has discussed a number of problems with an L7 mechanism, but
> laying them out:
> 
> 1. You are subject to IP address spoofing (albeit you need to be able to get
> the packets sent from the LIS to the IP address you are spoofing)
> 
> 2. VPN or other tunnels may have been created before you run this protocol.
> That will cause a failure; you need the location corresponding to the
> original "outermost" IP address.
> 
> 3. It is difficult to control the security (beyond IP spoofing) because you
> don't have a generally good authentication mechanism.  This is a bare phone,
> or equivalent, during its boot phase. 
> 
> There are probably others as well.  2) is the real problem.
> 
> Brian

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 16:00:14 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOLMs-0003HC-Iv; Wed, 20 Apr 2005 16:00:14 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOLMr-0003H1-UC; Wed, 20 Apr 2005 16:00:14 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA13411;
	Wed, 20 Apr 2005 16:00:12 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOLY9-0006fl-JV; Wed, 20 Apr 2005 16:11:53 -0400
Received: from [128.59.16.206] (chairpc.win.cs.columbia.edu [128.59.16.206])
	(authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3KJwwh3011936
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 15:58:59 -0400 (EDT)
Message-ID: <4266B47D.9090006@cs.columbia.edu>
Date: Wed, 20 Apr 2005 15:58:53 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: "Michael Hammer (mhammer)" <mhammer@cisco.com>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
References: <072C5B76F7CEAB488172C6F64B30B5E3113B4B@xmb-rtp-20b.amer.cisco.com>
In-Reply-To: <072C5B76F7CEAB488172C6F64B30B5E3113B4B@xmb-rtp-20b.amer.cisco.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 52e1467c2184c31006318542db5614d5
Content-Transfer-Encoding: 7bit
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

The basic problem for the end system is

"Get the physically closest box that knows to tell me where I am"

The core requirement is zero client configuration.

L2 and DHCP mechanisms have the advantage that they usually are as close 
as you're going to get. You can make this indirect, i.e., have DHCP, PPP 
or L2 tell the client where to get its address.

L2 (LLDP-MED) has the advantage that the physical structure ensures that 
I get the correct answer, without doing mappings. Mappings are always 
subject to being out-of-date or ambiguous or not have the right 
lookup-key information (e.g., real MAC address, lost on its way through 
a router or MAC-spoofing bridge). (This is even true for DHCP, where the 
DHCP server may have to derive from switch port tracing where a device 
is, which is subject to a variety of failure modes.)


Michael Hammer (mhammer) wrote:
> Brian,
> 
> You describe the NENA phase i2 options, ESQK etc.  Your routing element, I assume is doing session routing.
> 
> The elements you detail are all (or would appear to be) application-layer entities and the signaling hops are likewise application-layer hops, not L2 hops (except for maybe the LIS-->EP). 
> 
> So, where is the L2 "dependency" coming from?
> 
> I understand that a network node that is immediately adjacent to the endpoint is most likely to know where the other end of the link terminates, but does that force the delivery protocol aspects of this to be a L2 issue?
> 
> Each of the myriad link types carry IP packets, no?  And IP packets can carry an application packet, no?  So, wouldn't the application-layer solution be the more general one?  I thought that was in line with IETF principles.
> 
> You are probably just laying out the options, not promoting a particular one.  I would be interested in seeing what the champions of one approach or another have to say.  (I did a search on LLDP-MED and drew a blank.)
> 
> Mike
> 

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 16:19:14 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOLfG-0005I6-6S; Wed, 20 Apr 2005 16:19:14 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOLfE-0005Hu-Gh; Wed, 20 Apr 2005 16:19:12 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA14920;
	Wed, 20 Apr 2005 16:19:10 -0400 (EDT)
Message-Id: <200504202019.QAA14920@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOLqV-000775-Tg; Wed, 20 Apr 2005 16:30:52 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOLf4-0005cq-1s; Wed, 20 Apr 2005 15:19:02 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Henning Schulzrinne'" <hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Date: Wed, 20 Apr 2005 16:18:55 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <4266B1D7.2010506@cs.columbia.edu>
Thread-Index: AcVF4dTLswGyAEJoQTa3WbwpXLxpmAAAX3Gw
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 34d35111647d654d033d58d318c0d21a
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

I'm having some off line discussions that lead me to the following:

If you have a box that opens a VPN tunnel on the raw Internet connection
that feeds a LAN that has endpoints, and passes ALL LAN traffic through the
tunnel, you are hosed.  The box has to be location aware in some way.  This
is because there is no way, L2 or L7, that you can get a packet to anything
that knows about the location; the box is forcing everything through the
tunnel.  The box is physically between the uplink and the LAN, and you can't
go around it.  The box has to do something that lets you get at the right
LIS.

If the box supplies IP addresses (it's the DHCP server), then it only has to
relay the location option.

If the box doesn't supply addresses, it would have to run something that
either the client could access, or something the DHCP server would access.
We have no solutions.

L7 doesn't help; the box has to do something that would allow you to get to
the local LIS, with the boxe's public IP address.

Softclients are much easier, because the system can get location before the
tunnel is established.  Tunnels downstream of the local infrastructure are
problematic for L7, but not for L2.

This is bad news.  All the boxes have to change.  If we have to change all
the softclients for L7, is that a big enough reason to not use L7?

Hmmm.  I don't know enough about how the boxes work.  To make DHCP work with
the DHCP server in the corporate network, not in the box, the box has to
pass the DHCP packets; they aren't IP packets.  Does that mean it's always a
DHCP relay?  That would help.  The boxes have to change, but if they are
already doing DHCP relay, adding the location option would be the least
amount of work.

I keep hoping I've missed something here.

Brian

> -----Original Message-----
> From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu]
> Sent: Wednesday, April 20, 2005 3:48 PM
> To: Brian Rosen
> Cc: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV WG';
> ecrit@ietf.org
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
> 
> There are at least two separate sets of issues that depend on the
> architecture, and it seems dangerous to conflate the two:
> 
> (First-person) I get my own location from a server. This makes address
> spoofing more difficult, with return routability. Drawback: If I'm
> behind a NAT, and the location server isn't, this works only if the IP
> address in the IP packet is used, not something in the query. VPNs
> should not be a big deal here.
> 
> (Third-person) I ask for an address for an IP address. Address spoofing
> and VPN issues matter, possibly NAT issues (since the IP address I get
> may be a NAT address, given the typical circles of NAT hell in various
> networks.)
> 
> I think first-person is much more palatable than third-person.
> 
> Brian Rosen wrote:
> > "Routing" in this context is session (SIP) routing, as you suspected.
> >
> > The first hop (LIS to endpoint) is what we are discussing.
> > DHCP is not an L3+ protocol.  Neither is LLDP-MED.
> >
> > The thread has discussed a number of problems with an L7 mechanism, but
> > laying them out:
> >
> > 1. You are subject to IP address spoofing (albeit you need to be able to
> get
> > the packets sent from the LIS to the IP address you are spoofing)
> >
> > 2. VPN or other tunnels may have been created before you run this
> protocol.
> > That will cause a failure; you need the location corresponding to the
> > original "outermost" IP address.
> >
> > 3. It is difficult to control the security (beyond IP spoofing) because
> you
> > don't have a generally good authentication mechanism.  This is a bare
> phone,
> > or equivalent, during its boot phase.
> >
> > There are probably others as well.  2) is the real problem.
> >
> > Brian
> 




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 16:42:48 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOM21-0000Zs-J5; Wed, 20 Apr 2005 16:42:45 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOM1z-0000Zj-TU; Wed, 20 Apr 2005 16:42:43 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA17948;
	Wed, 20 Apr 2005 16:42:42 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOMDH-0007ul-1a; Wed, 20 Apr 2005 16:54:24 -0400
Received: from [128.59.16.206] (chairpc.win.cs.columbia.edu [128.59.16.206])
	(authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3KKgYh3014262
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 16:42:35 -0400 (EDT)
Message-ID: <4266BEB5.8090009@cs.columbia.edu>
Date: Wed, 20 Apr 2005 16:42:29 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
References: <200504202019.j3KKJ8qt003546@cs.columbia.edu>
In-Reply-To: <200504202019.j3KKJ8qt003546@cs.columbia.edu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7aefe408d50e9c7c47615841cb314bed
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

> Hmmm.  I don't know enough about how the boxes work.  To make DHCP work with
> the DHCP server in the corporate network, not in the box, the box has to
> pass the DHCP packets; they aren't IP packets.  Does that mean it's always a
                          ^^^^^^^^^^^^^^^^^^^^^^^

They are normal IP packets, see RFC 951 (BOOTP description), running on 
port 67/68.

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 16:57:22 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOMGA-0002Kd-Bw; Wed, 20 Apr 2005 16:57:22 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOMG6-0002Iq-5Z; Wed, 20 Apr 2005 16:57:18 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id QAA19622;
	Wed, 20 Apr 2005 16:57:16 -0400 (EDT)
Received: from sj-iport-2-in.cisco.com ([171.71.176.71]
	helo=sj-iport-2.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOMRN-0008Jx-A6; Wed, 20 Apr 2005 17:08:58 -0400
Received: from sj-core-5.cisco.com (171.71.177.238)
	by sj-iport-2.cisco.com with ESMTP; 20 Apr 2005 13:57:08 -0700
Received: from malone.cisco.com (malone.cisco.com [171.70.157.157])
	by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id j3KKv5hu022390;
	Wed, 20 Apr 2005 13:57:05 -0700 (PDT)
Received: from MLINSNER (ssh-sjc-1.cisco.com [171.68.225.134]) by
	malone.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with
	ESMTP id NAA03330; Wed, 20 Apr 2005 13:57:03 -0700 (PDT)
Message-Id: <200504202057.NAA03330@malone.cisco.com>
From: "Marc Linsner" <mlinsner@cisco.com>
To: "'Henning Schulzrinne'" <hgs@cs.columbia.edu>
Date: Wed, 20 Apr 2005 16:56:58 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <4266B47D.9090006@cs.columbia.edu>
Thread-Index: AcVF4+TkkfpP1ft1RnGp8YBuSqvj8wABU5uA
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Score: 1.1 (+)
X-Scan-Signature: a7d6aff76b15f3f56fcb94490e1052e4
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] L2 vs. L7 Location Discover
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

----note the subject change to reflect the topic------

In-line....

> -----Original Message-----
> From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
> Henning Schulzrinne
> Sent: Wednesday, April 20, 2005 3:59 PM
> To: Michael Hammer (mhammer)
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of JointGEOPRIV/ECRIT
> InterimMeeting
> 
> The basic problem for the end system is
> 
> "Get the physically closest box that knows to tell me where I am"
> 
> The core requirement is zero client configuration.
> 
> L2 and DHCP mechanisms have the advantage that they usually are as close
> as you're going to get. You can make this indirect, i.e., have DHCP, PPP
> or L2 tell the client where to get its address.
> 
> L2 (LLDP-MED) has the advantage that the physical structure ensures that
> I get the correct answer, without doing mappings. Mappings are always
> subject to being out-of-date or ambiguous or not have the right
> lookup-key information (e.g., real MAC address, lost on its way through
> a router or MAC-spoofing bridge). (This is even true for DHCP, where the
> DHCP server may have to derive from switch port tracing where a device
> is, which is subject to a variety of failure modes.)
 
I'm not sure what you mean here.  Neither LLDP-MED nor RFC3825 depend on MAC
address to associate a location.  RFC3825 depends on the switch implementing
the RAIO, which should be pretty safe from ambiguous.  Certainly the wire
map database could be corrupted due to patch cable changes, etc., but this
would equally cause pain in either mechanism.

I think I'm missing something.

-Marc-

snip......

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 17:46:10 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DON1O-0008Je-FX; Wed, 20 Apr 2005 17:46:10 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DON1N-0008J0-Dv; Wed, 20 Apr 2005 17:46:09 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA24865;
	Wed, 20 Apr 2005 17:46:06 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DONCe-0001Lr-NC; Wed, 20 Apr 2005 17:57:49 -0400
Received: from [128.59.16.206] (chairpc.win.cs.columbia.edu [128.59.16.206])
	(authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3KLjrh3017190
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 17:45:54 -0400 (EDT)
Message-ID: <4266CD8C.5040806@cs.columbia.edu>
Date: Wed, 20 Apr 2005 17:45:48 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
User-Agent: Mozilla Thunderbird 1.0.2 (Windows/20050317)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Marc Linsner <mlinsner@cisco.com>
References: <200504202057.NAA03330@malone.cisco.com>
In-Reply-To: <200504202057.NAA03330@malone.cisco.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 9ed51c9d1356100bce94f1ae4ec616a9
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] Re: L2 vs. L7 Location Discover
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

> I'm not sure what you mean here.  Neither LLDP-MED nor RFC3825 depend on MAC
> address to associate a location.  RFC3825 depends on the switch implementing
> the RAIO, which should be pretty safe from ambiguous.  Certainly the wire
> map database could be corrupted due to patch cable changes, etc., but this
> would equally cause pain in either mechanism.
> 
> I think I'm missing something.

Trying to be brief caused confusion. Let me try to be a bit more clear: 
   I see four levels of indirection, in increasing order:

(Direct) The wire or ether tells the client device where it is -> 
LLDP-MED, 802.11 beacons, BlueTooth beacons, etc. Little room for 
confusion. No need for addresses of any sort. Fewer privacy issues since 
the client never identifies itself in any traceable way.

(L2-interface/circuit) Server maps some circuit identifier to a 
location, based on a mapping (RAIO). No MAC address needed, but probably 
mainly applicable to broadband home networks rather than typical 
corporate networks.

(L2-MAC) The server obtains a MAC address from the client, and then uses 
various bridge-MIB tracing techniques to find out which port the client 
is connected to, by checking where the MAC address has been seen. This 
is subject to some failure scenarios and the problem I mentioned 
obliquely earlier.

(L3) The server gets an IP address and somehow knows the client location.

Note that I said "server" above - this could be a DHCP server, but 
doesn't have to be. Obviously, a DHCP server has the advantage that the 
client knows how to find it.

Also, I don't see the problem with DSL-specific mechanisms, as long as 
only DSL modems need to know this protocol and all of them implement it. 
They'd re-export this information via DHCP, for example, to their 
locally attached devices. Phones and PCs would not even know this 
mechanism existed.

> 
> -Marc-
> 
> snip......

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 17:57:09 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DONC1-00020u-4H; Wed, 20 Apr 2005 17:57:09 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DONBz-00020m-D9; Wed, 20 Apr 2005 17:57:07 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA26285;
	Wed, 20 Apr 2005 17:57:05 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DONNH-0001kM-J0; Wed, 20 Apr 2005 18:08:48 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3KLum211521; Wed, 20 Apr 2005 16:56:48 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ2437K4>; Thu, 21 Apr 2005 07:55:28 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102B98C2@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Brian Rosen <br@brianrosen.net>, peter_blatherwick@mitel.com
Date: Thu, 21 Apr 2005 07:55:28 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ba9cd4f9acda58dbe142afff7265daff
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
	Meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1957218158=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1957218158==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C545F3.A9EA0886"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C545F3.A9EA0886
Content-Type: text/plain;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

I think that there is one other argument that also lends itself to the
returning of the PIDF-LO rather than a layer 2 alternative, and that is =
that
the contents of PIDF-LO are very likely to change, largely with things =
being
added to them. To support these changes in PIDF-LO is relatively easy,
because XML is by its very nature extensible. It would be difficult, =
and I
would argue completely undesirable to have to change myriad of layer 2
protocols to support a new attribute that has been added to PIDF-LO. =
Case in
point is the provided-by parameter that is already there, another =
example
would be complex shape definitions, and also the signatures that Brian
describes below.

The problems that I see with the current layer 2 implementation are =
also
that they are essentially clones of one another with regards to what
information is conveyed, so if it is insufficient in one, or plain =
simply
wrong (and I am not saying that it is wrong), then the task to fix it =
is
large.

-----Original Message-----
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On =
Behalf
Of Brian Rosen
Sent: Wednesday, 20 April 2005 11:54 PM
To: peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org; 'Andrew Newton'
Subject: RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim =
Meeting


There turns out to be a large set of issues around this problem, which =
I
fear is leading to Balkanization.  There are two really important =
problems
we need to solve.

One fundamental problem is that every client needs to implement every
possible LI transfer mechanism that its environment could provide.

We have DHCP.  You guys are working on LLDP-MED.   The DSL guys reject =
both
of these and want a something else.  Every phone has to implement every
protocol.

There are some who have observed that the mechanisms at hand are L2
specific.  They claim as long as you have an L2 specific mechanism, you =
need
one or more for each L2.  To get out of that, they propose that we use =
an L7
mechanism (think some version of HTTP, although that might not fly).  =
They
would say, lets do that once, and every L2 can use it.  The problem is =
that
you then have to deal with the security issues of an L7 mechanism, and =
in
particular, you have to use IP address as the "key" for what location =
to
return.  If you can spoof IP address, you can get someone else's =
location. =20

Those advocating L7 mechanisms claim that the mechanism would only be
implemented within a domain, and the domain would have to take =
anti-spoofing
steps.  They note that the mechanism would need at least a complete =
round
trip, and probably more than one, so spoofing requires the ability to
intercept packets not addressed to the attacker.   The returned data =
could
be precisely a PIDF-LO.

Then on top of that, we turn out to need some more security, especially =
for
emergency calls.  We need to prevent forged locations.  That means we =
need
to sign the PIDF-LO.  If you get location via DHCP, or LLDP-MED, and =
the
endpoint constructs a PIDF-LO from that, how do we construct a =
signature
from the entity that actually determined location?

Brian


________________________________________
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On =
Behalf
Of peter_blatherwick@mitel.com
Sent: Wednesday, April 20, 2005 9:30 AM
To: Andrew Newton
Cc: GEOPRIV WG; ecrit@ietf.org
Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim =
Meeting


Hi Andrew, lists, =A0=20

I'd like to better understand the meaning of the following agenda =
items:=20
=A0 "=20
=A0 2) Properties of network elements in transferring LI from layer 2=20
=A0upward to PIDF-LO.
=A03) Proposed enhancements to PIDF-LO to support #2.
=A0"=20

Is there a summary of what these really mean, or examples of what the
outcome could be in terms of protocol or layer interactions? =A0=20

Reason I'm asking is I am deeply involved in a layer 2 approach which =
would
be able to deliver location information to endpoints from the L2 LAN
infrastructure they are connected to. =A0The work is going on in TIA =
and is
called Link Layer Discovery Protocol - Media Endpoint Discovery =
(LLDP-MED),
which is an extension of IEEE 802.1AB, specific to VoIP systems. =A0In
LLDP-MED, among several other things, we have specified ways to pass
equivalent data to the DHCP coordinate-based LCI (RFC 3825) and civic
location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
believe). =A0We see this method of delivery as a non-competing =
alternative to
the DHCP-based approach, with the same end result to the overall ECS =
system
(the endpoint receives the exact same data), which has some advantages
particularly in enterprise deployment scenarios. =A0(The DHCP-based =
method has
advantages in different scenarios.) =A0 I am Editor of thi s document, =
and it
is now in ballot process in TIA (more or less equivalent to Last Call =
in
IETF). =A0=20

Sorry, I expect I am suffering lack of context here, since I only =
joined the
list relatively recently. =A0=20

BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Last =
Call and
in the RFC Editor's queue? =A0It seemed to have been settled on the =
list, and
waiting on AD action.=20

-- Peter Blatherwick=20




Andrew Newton <andy@hxr.us>=20
Sent by: geopriv-bounces@ietf.org=20
13.04.05 16:34=20
=A0 =A0 =A0 =A0=20
=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>=20
=A0 =A0 =A0 =A0 cc: =A0 =A0 =A0 =A0=20
=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of Joint =
GEOPRIV/ECRIT
Interim Meeting




The GEOPRIV and ECRIT working groups will be holding a joint interim=20
meeting.

=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
=A0 =A0 =A0Where: Columbia University
=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
Directions: http://www.cs.columbia.edu/directions.html
=A0 =A0 =A0 Also: WiFi provided.
=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.

Proposed GEOPRIV Agenda:
=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in =

HTTP/HTML for web browsing.
2) Properties of network elements in transferring LI from layer 2=20
upward to PIDF-LO.
3) Proposed enhancements to PIDF-LO to support #2.

Proposed ECRIT Agenda:
=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
1) Emergency Call Routing Requirements
2) Security and Threats Analysis

_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv




_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv

------_=_NextPart_001_01C545F3.A9EA0886
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2658.2">
<TITLE>RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim =
Meeting</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I think that there is one other argument that also =
lends itself to the returning of the PIDF-LO rather than a layer 2 =
alternative, and that is that the contents of PIDF-LO are very likely =
to change, largely with things being added to them. To support these =
changes in PIDF-LO is relatively easy, because XML is by its very =
nature extensible. It would be difficult, and I would argue completely =
undesirable to have to change myriad of layer 2 protocols to support a =
new attribute that has been added to PIDF-LO. Case in point is the =
provided-by parameter that is already there, another example would be =
complex shape definitions, and also the signatures that Brian describes =
below.</FONT></P>

<P><FONT SIZE=3D2>The problems that I see with the current layer 2 =
implementation are also that they are essentially clones of one another =
with regards to what information is conveyed, so if it is insufficient =
in one, or plain simply wrong (and I am not saying that it is wrong), =
then the task to fix it is large.</FONT></P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: geopriv-bounces@ietf.org [<A =
HREF=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org=
</A>] On Behalf Of Brian Rosen</FONT>
<BR><FONT SIZE=3D2>Sent: Wednesday, 20 April 2005 11:54 PM</FONT>
<BR><FONT SIZE=3D2>To: peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>Cc: 'GEOPRIV WG'; ecrit@ietf.org; 'Andrew =
Newton'</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [Geopriv] Announcement of Joint =
GEOPRIV/ECRIT Interim Meeting</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>There turns out to be a large set of issues around =
this problem, which I fear is leading to Balkanization.&nbsp; There are =
two really important problems we need to solve.</FONT></P>

<P><FONT SIZE=3D2>One fundamental problem is that every client needs to =
implement every possible LI transfer mechanism that its environment =
could provide.</FONT></P>

<P><FONT SIZE=3D2>We have DHCP.&nbsp; You guys are working on =
LLDP-MED.&nbsp;&nbsp; The DSL guys reject both</FONT>
<BR><FONT SIZE=3D2>of these and want a something else.&nbsp; Every =
phone has to implement every protocol.</FONT>
</P>

<P><FONT SIZE=3D2>There are some who have observed that the mechanisms =
at hand are L2 specific.&nbsp; They claim as long as you have an L2 =
specific mechanism, you need one or more for each L2.&nbsp; To get out =
of that, they propose that we use an L7 mechanism (think some version =
of HTTP, although that might not fly).&nbsp; They would say, lets do =
that once, and every L2 can use it.&nbsp; The problem is that you then =
have to deal with the security issues of an L7 mechanism, and in =
particular, you have to use IP address as the "key" for what location =
to return.&nbsp; If you can spoof IP address, you can get someone =
else's location.&nbsp; </FONT></P>

<P><FONT SIZE=3D2>Those advocating L7 mechanisms claim that the =
mechanism would only be implemented within a domain, and the domain =
would have to take anti-spoofing steps.&nbsp; They note that the =
mechanism would need at least a complete round trip, and probably more =
than one, so spoofing requires the ability to</FONT></P>

<P><FONT SIZE=3D2>intercept packets not addressed to the =
attacker.&nbsp;&nbsp; The returned data could</FONT>
<BR><FONT SIZE=3D2>be precisely a PIDF-LO.</FONT>
</P>

<P><FONT SIZE=3D2>Then on top of that, we turn out to need some more =
security, especially for emergency calls.&nbsp; We need to prevent =
forged locations.&nbsp; That means we need to sign the PIDF-LO.&nbsp; =
If you get location via DHCP, or LLDP-MED, and the endpoint constructs =
a PIDF-LO from that, how do we construct a signature from the entity =
that actually determined location?</FONT></P>

<P><FONT SIZE=3D2>Brian</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>________________________________________</FONT>
<BR><FONT SIZE=3D2>From: geopriv-bounces@ietf.org [<A =
HREF=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org=
</A>] On Behalf Of peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>Sent: Wednesday, April 20, 2005 9:30 AM</FONT>
<BR><FONT SIZE=3D2>To: Andrew Newton</FONT>
<BR><FONT SIZE=3D2>Cc: GEOPRIV WG; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: Re: [Geopriv] Announcement of Joint =
GEOPRIV/ECRIT Interim Meeting</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>Hi Andrew, lists, =A0 </FONT>
</P>

<P><FONT SIZE=3D2>I'd like to better understand the meaning of the =
following agenda items: </FONT>
<BR><FONT SIZE=3D2>=A0 &quot; </FONT>
<BR><FONT SIZE=3D2>=A0 2) Properties of network elements in =
transferring LI from layer 2 </FONT>
<BR><FONT SIZE=3D2>=A0upward to PIDF-LO.</FONT>
<BR><FONT SIZE=3D2>=A03) Proposed enhancements to PIDF-LO to support =
#2.</FONT>
<BR><FONT SIZE=3D2>=A0&quot; </FONT>
</P>

<P><FONT SIZE=3D2>Is there a summary of what these really mean, or =
examples of what the outcome could be in terms of protocol or layer =
interactions? =A0 </FONT></P>

<P><FONT SIZE=3D2>Reason I'm asking is I am deeply involved in a layer =
2 approach which would be able to deliver location information to =
endpoints from the L2 LAN infrastructure they are connected to. =A0The =
work is going on in TIA and is called Link Layer Discovery Protocol - =
Media Endpoint Discovery (LLDP-MED), which is an extension of IEEE =
802.1AB, specific to VoIP systems. =A0In LLDP-MED, among several other =
things, we have specified ways to pass equivalent data to the DHCP =
coordinate-based LCI (RFC 3825) and civic location LCI =
(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I believe). =
=A0We see this method of delivery as a non-competing alternative to the =
DHCP-based approach, with the same end result to the overall ECS system =
(the endpoint receives the exact same data), which has some advantages =
particularly in enterprise deployment scenarios. =A0(The DHCP-based =
method has advantages in different scenarios.) =A0 I am Editor of thi s =
document, and it is now in ballot process in TIA (more or less =
equivalent to Last Call in IETF). =A0 </FONT></P>

<P><FONT SIZE=3D2>Sorry, I expect I am suffering lack of context here, =
since I only joined the list relatively recently. =A0 </FONT>
</P>

<P><FONT SIZE=3D2>BTW, what is the state of geopriv-dhcp-civil? =A0Is =
it now past Last Call and in the RFC Editor's queue? =A0It seemed to =
have been settled on the list, and waiting on AD action. </FONT></P>

<P><FONT SIZE=3D2>-- Peter Blatherwick </FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT SIZE=3D2>Andrew Newton &lt;andy@hxr.us&gt; </FONT>
<BR><FONT SIZE=3D2>Sent by: geopriv-bounces@ietf.org </FONT>
<BR><FONT SIZE=3D2>13.04.05 16:34 </FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 </FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG =
&lt;geopriv@ietf.org&gt; </FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 cc: =A0 =A0 =A0 =A0 </FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] =
Announcement of Joint GEOPRIV/ECRIT Interim Meeting</FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT SIZE=3D2>The GEOPRIV and ECRIT working groups will be holding =
a joint interim </FONT>
<BR><FONT SIZE=3D2>meeting.</FONT>
</P>

<P><FONT SIZE=3D2>=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT =
meeting</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 When: 2005 May 16 08:30-17:30</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 =
08:30-17:30</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 =
08:30-17:30</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0Where: Columbia University</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer =
Science</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science =
Bldg.</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close =
to 120th St.)</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027</FONT>
<BR><FONT SIZE=3D2>Directions: <A =
HREF=3D"http://www.cs.columbia.edu/directions.html" =
TARGET=3D"_blank">http://www.cs.columbia.edu/directions.html</A></FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 Also: WiFi provided.</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be =
provided.</FONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0Hotel: <A =
HREF=3D"http://www.cs.columbia.edu/~hgs/etc/hotels.html" =
TARGET=3D"_blank">http://www.cs.columbia.edu/~hgs/etc/hotels.html</A></F=
ONT>
<BR><FONT SIZE=3D2>=A0 =A0 =A0 =A0 =A0 =A0 Early bookings =
recommended.</FONT>
</P>

<P><FONT SIZE=3D2>Proposed GEOPRIV Agenda:</FONT>
<BR><FONT SIZE=3D2>=A0 2005 May 16 08:30-17:30, 2005 May 17 =
08:30-12:30</FONT>
<BR><FONT SIZE=3D2>1) Role of HTTP as a transfer protocol for PIDF-LO =
vs. the use of LI in </FONT>
<BR><FONT SIZE=3D2>HTTP/HTML for web browsing.</FONT>
<BR><FONT SIZE=3D2>2) Properties of network elements in transferring LI =
from layer 2 </FONT>
<BR><FONT SIZE=3D2>upward to PIDF-LO.</FONT>
<BR><FONT SIZE=3D2>3) Proposed enhancements to PIDF-LO to support =
#2.</FONT>
</P>

<P><FONT SIZE=3D2>Proposed ECRIT Agenda:</FONT>
<BR><FONT SIZE=3D2>=A0 2005 May 17 13:30-17:30, 2005 May 18 =
08:30-17:30</FONT>
<BR><FONT SIZE=3D2>1) Emergency Call Routing Requirements</FONT>
<BR><FONT SIZE=3D2>2) Security and Threats Analysis</FONT>
</P>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>Geopriv mailing list</FONT>
<BR><FONT SIZE=3D2>Geopriv@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"https://www1.ietf.org/mailman/listinfo/geopriv" =
TARGET=3D"_blank">https://www1.ietf.org/mailman/listinfo/geopriv</A></FO=
NT>
</P>
<BR>
<BR>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>Geopriv mailing list</FONT>
<BR><FONT SIZE=3D2>Geopriv@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"https://www1.ietf.org/mailman/listinfo/geopriv" =
TARGET=3D"_blank">https://www1.ietf.org/mailman/listinfo/geopriv</A></FO=
NT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C545F3.A9EA0886--


--===============1957218158==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============1957218158==--




From ecrit-bounces@ietf.org Wed Apr 20 18:15:15 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DONQM-0003SX-6T; Wed, 20 Apr 2005 18:11:58 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DONQJ-0003RW-JJ; Wed, 20 Apr 2005 18:11:55 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id SAA27979;
	Wed, 20 Apr 2005 18:11:53 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DONbb-00024a-Bl; Wed, 20 Apr 2005 18:23:36 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3KM6UN13451; Wed, 20 Apr 2005 17:06:30 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ2437LM>; Thu, 21 Apr 2005 08:05:40 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102B98E4@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Brian Rosen <br@brianrosen.net>, "'Michael Hammer (mhammer)'"
	<mhammer@cisco.com>, peter_blatherwick@mitel.com
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Int
	erimMeeting
Date: Thu, 21 Apr 2005 08:05:39 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.8 (/)
X-Scan-Signature: 97901e96c4dacf0263335ebc3a004b57
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0309320674=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0309320674==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C545F5.16A12210"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C545F5.16A12210
Content-Type: text/plain;
	charset="iso-8859-1"
X-MIME-Autoconverted: from 8bit to quoted-printable by
	zrc2s0jx.nortelnetworks.com id j3KM6UN13451
Content-Transfer-Encoding: quoted-printable

Hmmmm!!!

I am not sure that I agree your statement that the key passed to external
would be the IP address of the client. It could be, but I would most
certainly not advocate that.=20

-----Original Message-----
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
Brian Rosen
Sent: Thursday, 21 April 2005 2:13 AM
To: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


The basic picture is:

LIS ---> endpoint ---> routing element ---> psap

The LIS knows where the endpoint is.
The endpoint gets location from the LIS
The endpoint includes location on the emergency call
The routing element uses location to route the call to the right PSAP The
PSAP gets the call, and the location.

The discussion is, how does the endpoint get location from the LIS? DHCP =
is
one answer.  LLDP-MED is another.  A proposed L7 mechanism is another.


To be sure, there are folks who want to make the picture:

LIS --> endpoint --> routing element ---> psap
 ^                        |                 |
 |                        |                 |
 +------------------------+                 |
 |                                          |
 +------------------------------------------+

The LIS gives the endpoint a "key"
The endpoint includes the key in the emergency call
The routing element gets the key and exchanges it for location at the LIS
The psap gets the key and exchanges it for location at the LIS

The key could be an IP address.

Brian


> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 12:00 PM
> To: Brian Rosen; peter_blatherwick@mitel.com
> Cc: GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
> InterimMeeting
>=20
> I still get the feeling that "delivery" is being used in two different
> contexts:
>=20
>             (1)                     (2)
> Local node---?---->endpoint-----/many hops/----->PSAP
>           ---------------------/many hops/----->
>                            (2)
>=20
> How can "delivery" be L2 dependent, when it must reach a PSAP many=20
> hops away? Color me confused.
>=20
> Mike
>=20
>=20
> >-----Original Message-----
> >From: Brian Rosen [mailto:br@brianrosen.net]
> >Sent: Wednesday, April 20, 2005 10:47 AM
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint=20
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The idea is that, say, you are in your home, served by a DSL=20
> >provider. The domain is then that of the DSL vendor.  Your phone asks=20
> >for its location from the server in the DSL domain.  It would be=20
> >given the location corresponding to the IP address of the request. =20
> >Note that this would be pretty good for the requested case, even in=20
> >the presence of a NATed local area network in your home.  The phone=20
> >would do this on boot, before any VPN tunnels were established.
> >
> >I get the idea that a single delivery mechanism is desirable. I'm=20
> >skeptical we can do that because of the security issues. When you=20
> >make the delivery mechanism L2 dependent, you can control the=20
> >possible attacks to a finer grain than the L7 local domain.
> >
> >Please keep in mind that some of the folks wishing to use the L7=20
> >mechanism don't really want to just return location to the endpoint;=20
> >they want to retain the location and give it out to authorized=20
> >entities upon presentation of the IP address of the endpoint.  That=20
> >is a business decision.  They can charge for such a service.  I think=20
> >the privacy implications of that are dicey, but the reality is that's=20
> >the model that will probably be implemented if we do this.
> >
> >Brian
> >
> >
> >
> >
> >
> >> -----Original Message-----
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> Sent: Wednesday, April 20, 2005 10:14 AM
> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> InterimMeeting
> >>
> >> Brian,
> >>
> >> Could you clarify the domain statement.  Given nomadicity, it would=20
> >> seem that location delivery would need to be cross-domain.  The=20
> >> E911 PSAP will not always be the same domain as the roaming=20
> >> endpoint.
> >>
> >> My impression is that Location discovery is a L2 issue, tied to the=20
> >> fact that L2 is supposed to be a single physical hop at most=20
> >> between the end- user terminal and an adjacent location-determining=20
> >> network node.  (Of course those trying to make L2 protocols a
> >replacement for
> >> IP sort of screw this assumption up.)
> >>
> >> The location delivery mechanism is an application-layer or
> >L7 service.
> >> The argument there is that since multiple applications will need to=20
> >> rely on location information, a general purpose delivery mechanism=20
> >> will provide consistency and generality that is so often sought in=20
> >> IETF work.  Security can be built-in to the chosen delivery
> >mechanism.
> >> Note, that delivery could be a choice of an existing transfer=20
> >> mechanism.  This does not preclude other L7 protocols from
> >defining a
> >> place in their messages that could also carry location information.
> >>
> >> So, I believe:
> >> Location discovery is local, with associated security being local,=20
> >> Location delivery is global, with associated security being global.
> >>
> >> The real issues are making those happen.
> >>
> >> Mike
> >>
> >> >-----Original Message-----
> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On=20
> >> >Behalf Of Brian Rosen
> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> >> >To: peter_blatherwick@mitel.com
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
> >> >InterimMeeting
> >> >
> >> >There turns out to be a large set of issues around this problem,=20
> >> >which I fear is leading to Balkanization.  There are two really=20
> >> >important problems we need to solve.
> >> >
> >> >One fundamental problem is that every client needs to
> >implement every
> >> >possible LI transfer mechanism that its environment could provide.
> >> >
> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >> >guys reject both
> >> >of these and want a something else.  Every phone has to implement=20
> >> >every protocol.
> >> >
> >> >There are some who have observed that the mechanisms at hand are=20
> >> >L2 specific.  They claim as long as you have an L2 specific=20
> >> >mechanism, you need one or more for each L2.  To get out of that,=20
> >> >they propose that we use an L7 mechanism (think some version of=20
> >> >HTTP, although that might not fly).  They would say, lets do that=20
> >> >once,
> >and every L2
> >> >can use it.  The problem is that you then have to deal with the=20
> >> >security issues of an L7 mechanism, and in particular, you have to=20
> >> >use IP address as the "key" for what location to return.
> >If you can
> >> >spoof IP address, you can get someone else's location.
> >> >
> >> >Those advocating L7 mechanisms claim that the mechanism
> >would only be
> >> >implemented within a domain, and the domain would have to take=20
> >> >anti-spoofing steps.  They note that the mechanism would need at=20
> >> >least a complete round trip, and probably more than one, so
> >spoofing
> >> >requires the ability to
> >> >intercept packets not addressed to the attacker.   The
> >> >returned data could
> >> >be precisely a PIDF-LO.
> >> >
> >> >Then on top of that, we turn out to need some more security,=20
> >> >especially for emergency calls.  We need to prevent forged
> >locations.
> >> >That means we need to sign the PIDF-LO.  If you get location via=20
> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from=20
> >> >that, how do we construct a signature from the entity that=20
> >> >actually determined location?
> >> >
> >> >Brian
> >> >
> >> >
> >> >________________________________________
> >> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org]=20
> >> >On Behalf Of peter_blatherwick@mitel.com
> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> >> >To: Andrew Newton
> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> >> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
> >> >Meeting
> >> >
> >> >
> >> >Hi Andrew, lists,
> >> >
> >> >I'd like to better understand the meaning of the following agenda
> >> >items:
> >> >=A0 "
> >> >=A0 2) Properties of network elements in transferring LI from layer=
=20
> >> >2
> >> >=A0upward to PIDF-LO.
> >> >=A03) Proposed enhancements to PIDF-LO to support #2.
> >> >=A0"
> >> >
> >> >Is there a summary of what these really mean, or examples
> >of what the
> >> >outcome could be in terms of protocol or layer interactions?
> >> >
> >> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which
> >> >would be able to deliver location information to endpoints from=20
> >> >the L2 LAN infrastructure they are connected to. =A0The work is
> >going on in
> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint=20
> >> >Discovery (LLDP-MED), which is an extension of IEEE
> >802.1AB, specific
> >> >to VoIP systems. =A0In LLDP-MED, among several other things, we hav=
e=20
> >> >specified ways to pass equivalent data to the DHCP=20
> >> >coordinate-based LCI (RFC 3825) and civic location LCI=20
> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe).
> >> >We see this method of delivery as a non-competing
> >alternative to the
> >> >DHCP-based approach, with the same end result to the overall ECS=20
> >> >system (the endpoint receives the exact same data), which has some=20
> >> >advantages particularly in enterprise deployment scenarios. =A0(The=
=20
> >> >DHCP-based method has advantages in different scenarios.) =A0 I am=20
> >> >Editor of thi s document, and it is now in ballot process in TIA=20
> >> >(more or less equivalent to Last Call in IETF).
> >> >
> >> >Sorry, I expect I am suffering lack of context here, since I only=20
> >> >joined the list relatively recently.
> >> >
> >> >BTW, what is the state of geopriv-dhcp-civil? =A0Is it now past Las=
t=20
> >> >Call and in the RFC Editor's queue? =A0It seemed to have been=20
> >> >settled on the list, and waiting on AD action.
> >> >
> >> >-- Peter Blatherwick
> >> >
> >> >
> >> >
> >> >
> >> >Andrew Newton <andy@hxr.us>
> >> >Sent by: geopriv-bounces@ietf.org
> >> >13.04.05 16:34
> >> >
> >> >=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =A0GEOPRIV WG <geopriv@ietf.org>
> >> >=A0 =A0 =A0 =A0 cc:
> >> >=A0 =A0 =A0 =A0 Subject: =A0 =A0 =A0 =A0[Geopriv] Announcement of J=
oint
> >GEOPRIV/ECRIT
> >> >Interim Meeting
> >> >
> >> >
> >> >
> >> >
> >> >The GEOPRIV and ECRIT working groups will be holding a
> >joint interim
> >> >meeting.
> >> >
> >> >=A0 =A0 =A0 What: Interim GEOPRIV/ECRIT meeting
> >> >=A0 =A0 =A0 When: 2005 May 16 08:30-17:30
> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 17 08:30-17:30
> >> >=A0 =A0 =A0 =A0 =A0 =A0 2005 May 18 08:30-17:30
> >> >=A0 =A0 =A0Where: Columbia University
> >> >=A0 =A0 =A0 =A0 =A0 =A0 Dept. of Computer Science
> >> >=A0 =A0 =A0 =A0 =A0 =A0 450 Computer Science Bldg.
> >> >=A0 =A0 =A0 =A0 =A0 =A0 1214 Amsterdam Avenue (close to 120th St.)
> >> >=A0 =A0 =A0 =A0 =A0 =A0 New York, NY 10027
> >> >Directions: http://www.cs.columbia.edu/directions.html
> >> >=A0 =A0 =A0 Also: WiFi provided.
> >> >=A0 =A0 =A0 =A0 =A0 =A0 Teleconference to be provided.
> >> >=A0 =A0 =A0Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >> >=A0 =A0 =A0 =A0 =A0 =A0 Early bookings recommended.
> >> >
> >> >Proposed GEOPRIV Agenda:
> >> >=A0 2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> >use of LI
> >> >in HTTP/HTML for web browsing.
> >> >2) Properties of network elements in transferring LI from layer 2=20
> >> >upward to PIDF-LO.
> >> >3) Proposed enhancements to PIDF-LO to support #2.
> >> >
> >> >Proposed ECRIT Agenda:
> >> >=A0 2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >> >1) Emergency Call Routing Requirements
> >> >2) Security and Threats Analysis
> >> >
> >> >_______________________________________________
> >> >Geopriv mailing list
> >> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
> >> >
> >> >
> >> >
> >> >
> >> >_______________________________________________
> >> >Ecrit mailing list
> >> >Ecrit@ietf.org https://www1.ietf.org/mailman/listinfo/ecrit
> >> >
> >>
> >
> >
>=20




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

------_=_NextPart_001_01C545F5.16A12210
Content-Type: text/html;
	charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Diso-8859-1">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2658.2">
<TITLE>RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT =
InterimMeeting</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>Hmmmm!!!</FONT>
</P>

<P><FONT SIZE=3D2>I am not sure that I agree your statement that the =
key passed to external would be the IP address of the client. It could =
be, but I would most certainly not advocate that. </FONT></P>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: ecrit-bounces@ietf.org [<A =
HREF=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</A>=
] On Behalf Of Brian Rosen</FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, 21 April 2005 2:13 AM</FONT>
<BR><FONT SIZE=3D2>To: 'Michael Hammer (mhammer)'; =
peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>Cc: 'GEOPRIV WG'; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of =
Joint GEOPRIV/ECRIT InterimMeeting</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>The basic picture is:</FONT>
</P>

<P><FONT SIZE=3D2>LIS ---&gt; endpoint ---&gt; routing element ---&gt; =
psap</FONT>
</P>

<P><FONT SIZE=3D2>The LIS knows where the endpoint is.</FONT>
<BR><FONT SIZE=3D2>The endpoint gets location from the LIS</FONT>
<BR><FONT SIZE=3D2>The endpoint includes location on the emergency =
call</FONT>
<BR><FONT SIZE=3D2>The routing element uses location to route the call =
to the right PSAP The PSAP gets the call, and the location.</FONT>
</P>

<P><FONT SIZE=3D2>The discussion is, how does the endpoint get location =
from the LIS? DHCP is one answer.&nbsp; LLDP-MED is another.&nbsp; A =
proposed L7 mechanism is another.</FONT></P>
<BR>

<P><FONT SIZE=3D2>To be sure, there are folks who want to make the =
picture:</FONT>
</P>

<P><FONT SIZE=3D2>LIS --&gt; endpoint --&gt; routing element ---&gt; =
psap</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; |</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp; =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp; |</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;+------------------------+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; =
|</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; |</FONT>
<BR><FONT =
SIZE=3D2>&nbsp;+------------------------------------------+</FONT>
</P>

<P><FONT SIZE=3D2>The LIS gives the endpoint a &quot;key&quot;</FONT>
<BR><FONT SIZE=3D2>The endpoint includes the key in the emergency =
call</FONT>
<BR><FONT SIZE=3D2>The routing element gets the key and exchanges it =
for location at the LIS The psap gets the key and exchanges it for =
location at the LIS</FONT></P>

<P><FONT SIZE=3D2>The key could be an IP address.</FONT>
</P>

<P><FONT SIZE=3D2>Brian</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Michael Hammer (mhammer) [<A =
HREF=3D"mailto:mhammer@cisco.com">mailto:mhammer@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; Sent: Wednesday, April 20, 2005 12:00 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Brian Rosen; =
peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: GEOPRIV WG; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: RE: [Ecrit] RE: [Geopriv] Announcement =
of Joint GEOPRIV/ECRIT </FONT>
<BR><FONT SIZE=3D2>&gt; InterimMeeting</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I still get the feeling that =
&quot;delivery&quot; is being used in two different</FONT>
<BR><FONT SIZE=3D2>&gt; contexts:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp; =
(1)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (2)</FONT>
<BR><FONT SIZE=3D2>&gt; Local node---?----&gt;endpoint-----/many =
hops/-----&gt;PSAP</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
; ---------------------/many hops/-----&gt;</FONT>
<BR><FONT =
SIZE=3D2>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; (2)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; How can &quot;delivery&quot; be L2 dependent, =
when it must reach a PSAP many </FONT>
<BR><FONT SIZE=3D2>&gt; hops away? Color me confused.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Mike</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;From: Brian Rosen [<A =
HREF=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Sent: Wednesday, April 20, 2005 10:47 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;To: Michael Hammer (mhammer); =
peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Cc: 'GEOPRIV WG'; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Subject: RE: [Ecrit] RE: [Geopriv] =
Announcement of Joint </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;GEOPRIV/ECRIT InterimMeeting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;The idea is that, say, you are in your =
home, served by a DSL </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;provider. The domain is then that of the =
DSL vendor.&nbsp; Your phone asks </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;for its location from the server in the DSL =
domain.&nbsp; It would be </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;given the location corresponding to the IP =
address of the request.&nbsp; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Note that this would be pretty good for the =
requested case, even in </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;the presence of a NATed local area network =
in your home.&nbsp; The phone </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;would do this on boot, before any VPN =
tunnels were established.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;I get the idea that a single delivery =
mechanism is desirable. I'm </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;skeptical we can do that because of the =
security issues. When you </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;make the delivery mechanism L2 dependent, =
you can control the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;possible attacks to a finer grain than the =
L7 local domain.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Please keep in mind that some of the folks =
wishing to use the L7 </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;mechanism don't really want to just return =
location to the endpoint; </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;they want to retain the location and give =
it out to authorized </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;entities upon presentation of the IP =
address of the endpoint.&nbsp; That </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;is a business decision.&nbsp; They can =
charge for such a service.&nbsp; I think </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;the privacy implications of that are dicey, =
but the reality is that's </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;the model that will probably be implemented =
if we do this.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;Brian</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; From: Michael Hammer (mhammer) [<A =
HREF=3D"mailto:mhammer@cisco.com">mailto:mhammer@cisco.com</A>]</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Sent: Wednesday, April 20, 2005 10:14 =
AM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; To: Brian Rosen; =
peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Cc: GEOPRIV WG; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Subject: RE: [Ecrit] RE: [Geopriv] =
Announcement of Joint</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;GEOPRIV/ECRIT</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; InterimMeeting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Brian,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Could you clarify the domain =
statement.&nbsp; Given nomadicity, it would </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; seem that location delivery would need =
to be cross-domain.&nbsp; The </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; E911 PSAP will not always be the same =
domain as the roaming </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; endpoint.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; My impression is that Location =
discovery is a L2 issue, tied to the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; fact that L2 is supposed to be a =
single physical hop at most </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; between the end- user terminal and an =
adjacent location-determining </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; network node.&nbsp; (Of course those =
trying to make L2 protocols a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;replacement for</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; IP sort of screw this assumption =
up.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; The location delivery mechanism is an =
application-layer or</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;L7 service.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; The argument there is that since =
multiple applications will need to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; rely on location information, a =
general purpose delivery mechanism </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; will provide consistency and =
generality that is so often sought in </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; IETF work.&nbsp; Security can be =
built-in to the chosen delivery</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;mechanism.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Note, that delivery could be a choice =
of an existing transfer </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; mechanism.&nbsp; This does not =
preclude other L7 protocols from</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;defining a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; place in their messages that could =
also carry location information.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; So, I believe:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Location discovery is local, with =
associated security being local, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Location delivery is global, with =
associated security being global.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; The real issues are making those =
happen.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; Mike</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;From: ecrit-bounces@ietf.org [<A =
HREF=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</A>=
] On </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Behalf Of Brian Rosen</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Sent: Wednesday, April 20, 2005 =
9:54 AM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;To: =
peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Cc: 'GEOPRIV WG'; =
ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Subject: [Ecrit] RE: [Geopriv] =
Announcement of Joint GEOPRIV/ECRIT </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;InterimMeeting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;There turns out to be a large set =
of issues around this problem, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;which I fear is leading to =
Balkanization.&nbsp; There are two really </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;important problems we need to =
solve.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;One fundamental problem is that =
every client needs to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;implement every</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;possible LI transfer mechanism =
that its environment could provide.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;We have DHCP.&nbsp; You guys are =
working on LLDP-MED.&nbsp;&nbsp; The DSL</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;guys reject both</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;of these and want a something =
else.&nbsp; Every phone has to implement </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;every protocol.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;There are some who have observed =
that the mechanisms at hand are </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;L2 specific.&nbsp; They claim as =
long as you have an L2 specific </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;mechanism, you need one or more =
for each L2.&nbsp; To get out of that, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;they propose that we use an L7 =
mechanism (think some version of </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;HTTP, although that might not =
fly).&nbsp; They would say, lets do that </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;once,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;and every L2</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;can use it.&nbsp; The problem is =
that you then have to deal with the </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;security issues of an L7 =
mechanism, and in particular, you have to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;use IP address as the =
&quot;key&quot; for what location to return.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;If you can</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;spoof IP address, you can get =
someone else's location.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Those advocating L7 mechanisms =
claim that the mechanism</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;would only be</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;implemented within a domain, and =
the domain would have to take </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;anti-spoofing steps.&nbsp; They =
note that the mechanism would need at </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;least a complete round trip, and =
probably more than one, so</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;spoofing</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;requires the ability to</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;intercept packets not addressed to =
the attacker.&nbsp;&nbsp; The</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;returned data could</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;be precisely a PIDF-LO.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Then on top of that, we turn out =
to need some more security, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;especially for emergency =
calls.&nbsp; We need to prevent forged</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;locations.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;That means we need to sign the =
PIDF-LO.&nbsp; If you get location via </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;DHCP, or LLDP-MED, and the =
endpoint constructs a PIDF-LO from </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;that, how do we construct a =
signature from the entity that </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;actually determined =
location?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Brian</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; =
&gt;________________________________________</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;From: geopriv-bounces@ietf.org [<A =
HREF=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org=
</A>] </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;On Behalf Of =
peter_blatherwick@mitel.com</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Sent: Wednesday, April 20, 2005 =
9:30 AM</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;To: Andrew Newton</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Cc: GEOPRIV WG; =
ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Subject: Re: [Geopriv] =
Announcement of Joint GEOPRIV/ECRIT Interim</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Meeting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Hi Andrew, lists,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;I'd like to better understand the =
meaning of the following agenda</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;items:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 &quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 2) Properties of network =
elements in transferring LI from layer </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;2</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0upward to PIDF-LO.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A03) Proposed enhancements to =
PIDF-LO to support #2.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0&quot;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Is there a summary of what these =
really mean, or examples</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;of what the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;outcome could be in terms of =
protocol or layer interactions?</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Reason I'm asking is I am deeply =
involved in a layer 2</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;approach which</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;would be able to deliver location =
information to endpoints from </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;the L2 LAN infrastructure they are =
connected to. =A0The work is</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;going on in</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;TIA and is called Link Layer =
Discovery Protocol - Media Endpoint </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Discovery (LLDP-MED), which is an =
extension of IEEE</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;802.1AB, specific</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;to VoIP systems. =A0In LLDP-MED, =
among several other things, we have </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;specified ways to pass equivalent =
data to the DHCP </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;coordinate-based LCI (RFC 3825) =
and civic location LCI </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;(draft-ietf-geopriv-dhcp-civil-05, =
in Last Call process I</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;believe).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;We see this method of delivery as =
a non-competing</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;alternative to the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;DHCP-based approach, with the same =
end result to the overall ECS </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;system (the endpoint receives the =
exact same data), which has some </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;advantages particularly in =
enterprise deployment scenarios. =A0(The </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;DHCP-based method has advantages =
in different scenarios.) =A0 I am </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Editor of thi s document, and it =
is now in ballot process in TIA </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;(more or less equivalent to Last =
Call in IETF).</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Sorry, I expect I am suffering =
lack of context here, since I only </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;joined the list relatively =
recently.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;BTW, what is the state of =
geopriv-dhcp-civil? =A0Is it now past Last </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Call and in the RFC Editor's =
queue? =A0It seemed to have been </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;settled on the list, and waiting =
on AD action.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;-- Peter Blatherwick</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Andrew Newton =
&lt;andy@hxr.us&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Sent by: =
geopriv-bounces@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;13.04.05 16:34</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 To: =A0 =A0 =A0 =
=A0GEOPRIV WG &lt;geopriv@ietf.org&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 cc:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 Subject: =A0 =A0 =
=A0 =A0[Geopriv] Announcement of Joint</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;GEOPRIV/ECRIT</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Interim Meeting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;The GEOPRIV and ECRIT working =
groups will be holding a</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;joint interim</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;meeting.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 What: Interim =
GEOPRIV/ECRIT meeting</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 When: 2005 May 16 =
08:30-17:30</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 2005 May =
17 08:30-17:30</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 2005 May =
18 08:30-17:30</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0Where: Columbia =
University</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 Dept. of =
Computer Science</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 450 =
Computer Science Bldg.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 1214 =
Amsterdam Avenue (close to 120th St.)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 New York, =
NY 10027</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Directions: <A =
HREF=3D"http://www.cs.columbia.edu/directions.html" =
TARGET=3D"_blank">http://www.cs.columbia.edu/directions.html</A></FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 Also: WiFi =
provided.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 =
Teleconference to be provided.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0Hotel: <A =
HREF=3D"http://www.cs.columbia.edu/~hgs/etc/hotels.html" =
TARGET=3D"_blank">http://www.cs.columbia.edu/~hgs/etc/hotels.html</A></F=
ONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 =A0 =A0 =A0 =A0 =A0 Early =
bookings recommended.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Proposed GEOPRIV Agenda:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 2005 May 16 08:30-17:30, 2005 =
May 17 08:30-12:30</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;1) Role of HTTP as a transfer =
protocol for PIDF-LO vs. the</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;use of LI</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;in HTTP/HTML for web =
browsing.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;2) Properties of network elements =
in transferring LI from layer 2 </FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;upward to PIDF-LO.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;3) Proposed enhancements to =
PIDF-LO to support #2.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Proposed ECRIT Agenda:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;=A0 2005 May 17 13:30-17:30, 2005 =
May 18 08:30-17:30</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;1) Emergency Call Routing =
Requirements</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;2) Security and Threats =
Analysis</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; =
&gt;_______________________________________________</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Geopriv mailing list</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Geopriv@ietf.org <A =
HREF=3D"https://www1.ietf.org/mailman/listinfo/geopriv" =
TARGET=3D"_blank">https://www1.ietf.org/mailman/listinfo/geopriv</A></FO=
NT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; =
&gt;_______________________________________________</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Ecrit mailing list</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;Ecrit@ietf.org <A =
HREF=3D"https://www1.ietf.org/mailman/listinfo/ecrit" =
TARGET=3D"_blank">https://www1.ietf.org/mailman/listinfo/ecrit</A></FONT=
>
<BR><FONT SIZE=3D2>&gt; &gt;&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;&gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>Ecrit mailing list</FONT>
<BR><FONT SIZE=3D2>Ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"https://www1.ietf.org/mailman/listinfo/ecrit" =
TARGET=3D"_blank">https://www1.ietf.org/mailman/listinfo/ecrit</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C545F5.16A12210--


--===============0309320674==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0309320674==--




From ecrit-bounces@ietf.org Wed Apr 20 19:13:17 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOONh-0002Zo-JE; Wed, 20 Apr 2005 19:13:17 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOONg-0002Zg-HT; Wed, 20 Apr 2005 19:13:16 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA04203;
	Wed, 20 Apr 2005 19:13:13 -0400 (EDT)
Received: from rtp-iport-1.cisco.com ([64.102.122.148])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOOYx-0003hw-Ti; Wed, 20 Apr 2005 19:24:58 -0400
Received: from rtp-core-2.cisco.com (64.102.124.13)
	by rtp-iport-1.cisco.com with ESMTP; 20 Apr 2005 19:24:12 -0400
X-IronPort-AV: i="3.92,118,1112587200"; 
	d="scan'208"; a="45461474:sNHT29840648"
Received: from xbh-rtp-201.amer.cisco.com (xbh-rtp-201.cisco.com
	[64.102.31.12])
	by rtp-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id j3KND2dr009581; 
	Wed, 20 Apr 2005 19:13:02 -0400 (EDT)
Received: from xmb-rtp-20b.amer.cisco.com ([64.102.31.53]) by
	xbh-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.211);
	Wed, 20 Apr 2005 19:13:01 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5.7226.0
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain;
	charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Date: Wed, 20 Apr 2005 19:13:00 -0400
Message-ID: <072C5B76F7CEAB488172C6F64B30B5E3113BD0@xmb-rtp-20b.amer.cisco.com>
Thread-Topic: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Thread-Index: AcVF47FTZ5vdqlAKRYOS7WA4dGCh1QAGErGA
From: "Michael Hammer \(mhammer\)" <mhammer@cisco.com>
To: "Henning Schulzrinne" <hgs@cs.columbia.edu>
X-OriginalArrivalTime: 20 Apr 2005 23:13:01.0888 (UTC)
	FILETIME=[7FD93C00:01C545FE]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 73734d43604d52d23b3eba644a169745
Content-Transfer-Encoding: quoted-printable
Cc: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Henning,

Thanks.  This is the sort of detail that I was hoping to stir up. =20

So, the first hop network needs to be the source of location
information.  In my house that is my home network/router, which would
seem to imply that it needs to acquire location into it somehow.  The
router in turn pretends to be a PC and talks through the cable/DSL modem
to an upstream server to get IP addresses and such.  Will my home router
store and relay location information in the access SP?  This assumes
that the location is provisioned into the cable/DSL system.

If I also remember some security mechanisms correctly, DHCP-spoofing is
prevented by not allowing such traffic to go very far.  I wouldn't think
that DHCP gets put into VPN tunnels, but I could be wrong.

Seems like there are several interfaces X protocol choices to work out
here.

Thanks,
Mike

>-----Original Message-----
>From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu]=20
>Sent: Wednesday, April 20, 2005 3:59 PM
>To: Michael Hammer (mhammer)
>Cc: Brian Rosen; peter_blatherwick@mitel.com; GEOPRIV WG;=20
>ecrit@ietf.org
>Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint=20
>GEOPRIV/ECRIT InterimMeeting
>
>The basic problem for the end system is
>
>"Get the physically closest box that knows to tell me where I am"
>
>The core requirement is zero client configuration.
>
>L2 and DHCP mechanisms have the advantage that they usually=20
>are as close as you're going to get. You can make this=20
>indirect, i.e., have DHCP, PPP or L2 tell the client where to=20
>get its address.

Or where to go to get location information via a L7 protocol?

>
>L2 (LLDP-MED) has the advantage that the physical structure=20
>ensures that I get the correct answer, without doing mappings.=20
>Mappings are always subject to being out-of-date or ambiguous=20
>or not have the right lookup-key information (e.g., real MAC=20
>address, lost on its way through a router or MAC-spoofing=20
>bridge). (This is even true for DHCP, where the DHCP server=20
>may have to derive from switch port tracing where a device is,=20
>which is subject to a variety of failure modes.)
>
>
>Michael Hammer (mhammer) wrote:
>> Brian,
>>=20
>> You describe the NENA phase i2 options, ESQK etc.  Your=20
>routing element, I assume is doing session routing.
>>=20
>> The elements you detail are all (or would appear to be)=20
>application-layer entities and the signaling hops are likewise=20
>application-layer hops, not L2 hops (except for maybe the LIS-->EP).=20
>>=20
>> So, where is the L2 "dependency" coming from?
>>=20
>> I understand that a network node that is immediately=20
>adjacent to the endpoint is most likely to know where the=20
>other end of the link terminates, but does that force the=20
>delivery protocol aspects of this to be a L2 issue?
>>=20
>> Each of the myriad link types carry IP packets, no?  And IP=20
>packets can carry an application packet, no?  So, wouldn't the=20
>application-layer solution be the more general one?  I thought=20
>that was in line with IETF principles.
>>=20
>> You are probably just laying out the options, not promoting a=20
>> particular one.  I would be interested in seeing what the=20
>champions of=20
>> one approach or another have to say.  (I did a search on=20
>LLDP-MED and=20
>> drew a blank.)
>>=20
>> Mike
>>=20
>

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 19:17:03 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOORL-0003Gk-8G; Wed, 20 Apr 2005 19:17:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOORJ-0003GR-DN; Wed, 20 Apr 2005 19:17:01 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA04681;
	Wed, 20 Apr 2005 19:16:58 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOOcb-0003sO-UI; Wed, 20 Apr 2005 19:28:43 -0400
Received: from [127.0.0.1]
	(IDENT:U2FsdGVkX1/nLZJtMPeDA6+NyX3gBoTMrvOmtvPBUtI@razor.cs.columbia.edu
	[128.59.16.8]) (authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3KNGsh3021738
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 19:16:55 -0400 (EDT)
Message-ID: <4266E2F5.90103@cs.columbia.edu>
Date: Wed, 20 Apr 2005 19:17:09 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
Organization: Columbia University
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: James Winterbottom <winterb@nortel.com>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
	Meeting
References: <C0FA66CBDDF5D411B82E00508BE3A722102B98C2@zctwc059.asiapac.nortel.com>
In-Reply-To: <C0FA66CBDDF5D411B82E00508BE3A722102B98C2@zctwc059.asiapac.nortel.com>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

James Winterbottom wrote:
> I think that there is one other argument that also lends itself to the 
> returning of the PIDF-LO rather than a layer 2 alternative, and that is 
> that the contents of PIDF-LO are very likely to change, largely with 
> things being added to them. To support these changes in PIDF-LO is 
> relatively easy, because XML is by its very nature extensible. It would 
> be difficult, and I would argue completely undesirable to have to change 
> myriad of layer 2 protocols to support a new attribute that has been 

This is bogus. We have essentially two layer-2 mechanisms that inherit 
the same name space. Registering and defining a new XML tag is no easier 
(or no more difficult) than registering a new DHCP numeric tag. Just 
because it's XML doesn't mean that magically all applications understand it.

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 19:31:07 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOOex-0000Ii-0B; Wed, 20 Apr 2005 19:31:07 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOOet-0000Ia-TP; Wed, 20 Apr 2005 19:31:05 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA08021;
	Wed, 20 Apr 2005 19:31:01 -0400 (EDT)
Received: from sj-iport-2-in.cisco.com ([171.71.176.71]
	helo=sj-iport-2.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOOqC-0004ns-JI; Wed, 20 Apr 2005 19:42:45 -0400
Received: from sj-core-1.cisco.com (171.71.177.237)
	by sj-iport-2.cisco.com with ESMTP; 20 Apr 2005 16:30:53 -0700
Received: from malone.cisco.com (malone.cisco.com [171.70.157.157])
	by sj-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id j3KNUe2w026285;
	Wed, 20 Apr 2005 16:30:40 -0700 (PDT)
Received: from MLINSNER (ssh-sjc-1.cisco.com [171.68.225.134]) by
	malone.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with
	ESMTP id QAA15780; Wed, 20 Apr 2005 16:30:38 -0700 (PDT)
Message-Id: <200504202330.QAA15780@malone.cisco.com>
From: "Marc Linsner" <mlinsner@cisco.com>
To: "'James Winterbottom'" <winterb@nortel.com>
Date: Wed, 20 Apr 2005 19:30:29 -0400
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <C0FA66CBDDF5D411B82E00508BE3A722102B98C2@zctwc059.asiapac.nortel.com>
Thread-Index: AcVF9F1ToH70Gp49QgyiGqson2KwngABX+Ew
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Score: 1.7 (+)
X-Scan-Signature: d1330b60dd48fa5cb1958a0aa669d18b
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] L2 vs. L7 Location Discover
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1549996348=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1549996348==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0E7C_01C545DF.6C222DD0"

This is a multi-part message in MIME format.

------=_NextPart_000_0E7C_01C545DF.6C222DD0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit

------note the subject change - it's an attempt to more accurately reflect
the topic------

 

James,

 

1) Are not complex shape definitions associated with TOA technology which is
associated with wireless?  I don't remember anyone advocating the use of
RFC3825 nor LLDP-MED for a complete wireless solution.  If fact, I know that
RFC3825 recommends using a yet-to-be-determined more exotic method for
passing location information to a wireless client.

 

2) In the case of signing the pidf-lo, who is going to sign it when the data
is user derived (either user keyed or on-board gps)?

 

3) There seems to be consensus that L1/L2 will, in all but user derived
mechanisms, be involved in location determination at some level.  Is it the
case that you are advocating that the L1/L2 infrastructure build and sign a
pidf-lo and forward to either the client or a L7 service somewhere in the
network?

 

Just attempting to understand...

 

-Marc-

 

 

  _____  

From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
James Winterbottom
Sent: Wednesday, April 20, 2005 5:55 PM
To: Brian Rosen; peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting

 

I think that there is one other argument that also lends itself to the
returning of the PIDF-LO rather than a layer 2 alternative, and that is that
the contents of PIDF-LO are very likely to change, largely with things being
added to them. To support these changes in PIDF-LO is relatively easy,
because XML is by its very nature extensible. It would be difficult, and I
would argue completely undesirable to have to change myriad of layer 2
protocols to support a new attribute that has been added to PIDF-LO. Case in
point is the provided-by parameter that is already there, another example
would be complex shape definitions, and also the signatures that Brian
describes below.

The problems that I see with the current layer 2 implementation are also
that they are essentially clones of one another with regards to what
information is conveyed, so if it is insufficient in one, or plain simply
wrong (and I am not saying that it is wrong), then the task to fix it is
large.

-----Original Message----- 
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On Behalf
Of Brian Rosen 
Sent: Wednesday, 20 April 2005 11:54 PM 
To: peter_blatherwick@mitel.com 
Cc: 'GEOPRIV WG'; ecrit@ietf.org; 'Andrew Newton' 
Subject: RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting 

 

There turns out to be a large set of issues around this problem, which I
fear is leading to Balkanization.  There are two really important problems
we need to solve.

One fundamental problem is that every client needs to implement every
possible LI transfer mechanism that its environment could provide.

We have DHCP.  You guys are working on LLDP-MED.   The DSL guys reject both 
of these and want a something else.  Every phone has to implement every
protocol. 

There are some who have observed that the mechanisms at hand are L2
specific.  They claim as long as you have an L2 specific mechanism, you need
one or more for each L2.  To get out of that, they propose that we use an L7
mechanism (think some version of HTTP, although that might not fly).  They
would say, lets do that once, and every L2 can use it.  The problem is that
you then have to deal with the security issues of an L7 mechanism, and in
particular, you have to use IP address as the "key" for what location to
return.  If you can spoof IP address, you can get someone else's location.  

Those advocating L7 mechanisms claim that the mechanism would only be
implemented within a domain, and the domain would have to take anti-spoofing
steps.  They note that the mechanism would need at least a complete round
trip, and probably more than one, so spoofing requires the ability to

intercept packets not addressed to the attacker.   The returned data could 
be precisely a PIDF-LO. 

Then on top of that, we turn out to need some more security, especially for
emergency calls.  We need to prevent forged locations.  That means we need
to sign the PIDF-LO.  If you get location via DHCP, or LLDP-MED, and the
endpoint constructs a PIDF-LO from that, how do we construct a signature
from the entity that actually determined location?

Brian 

 

________________________________________ 
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On Behalf
Of peter_blatherwick@mitel.com 
Sent: Wednesday, April 20, 2005 9:30 AM 
To: Andrew Newton 
Cc: GEOPRIV WG; ecrit@ietf.org 
Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting 

 

Hi Andrew, lists,   

I'd like to better understand the meaning of the following agenda items: 
  " 
  2) Properties of network elements in transferring LI from layer 2 
 upward to PIDF-LO. 
 3) Proposed enhancements to PIDF-LO to support #2. 
 " 

Is there a summary of what these really mean, or examples of what the
outcome could be in terms of protocol or layer interactions?   

Reason I'm asking is I am deeply involved in a layer 2 approach which would
be able to deliver location information to endpoints from the L2 LAN
infrastructure they are connected to.  The work is going on in TIA and is
called Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED),
which is an extension of IEEE 802.1AB, specific to VoIP systems.  In
LLDP-MED, among several other things, we have specified ways to pass
equivalent data to the DHCP coordinate-based LCI (RFC 3825) and civic
location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
believe).  We see this method of delivery as a non-competing alternative to
the DHCP-based approach, with the same end result to the overall ECS system
(the endpoint receives the exact same data), which has some advantages
particularly in enterprise deployment scenarios.  (The DHCP-based method has
advantages in different scenarios.)   I am Editor of thi s document, and it
is now in ballot process in TIA (more or less equivalent to Last Call in
IETF).   

Sorry, I expect I am suffering lack of context here, since I only joined the
list relatively recently.   

BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last Call and
in the RFC Editor's queue?  It seemed to have been settled on the list, and
waiting on AD action. 

-- Peter Blatherwick 

 

Andrew Newton <andy@hxr.us> 
Sent by: geopriv-bounces@ietf.org 
13.04.05 16:34 
        
        To:        GEOPRIV WG <geopriv@ietf.org> 
        cc:         
        Subject:        [Geopriv] Announcement of Joint GEOPRIV/ECRIT
Interim Meeting 

 

The GEOPRIV and ECRIT working groups will be holding a joint interim 
meeting. 

      What: Interim GEOPRIV/ECRIT meeting 
      When: 2005 May 16 08:30-17:30 
            2005 May 17 08:30-17:30 
            2005 May 18 08:30-17:30 
     Where: Columbia University 
            Dept. of Computer Science 
            450 Computer Science Bldg. 
            1214 Amsterdam Avenue (close to 120th St.) 
            New York, NY 10027 
Directions: http://www.cs.columbia.edu/directions.html 
      Also: WiFi provided. 
            Teleconference to be provided. 
     Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html 
            Early bookings recommended. 

Proposed GEOPRIV Agenda: 
  2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30 
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in 
HTTP/HTML for web browsing. 
2) Properties of network elements in transferring LI from layer 2 
upward to PIDF-LO. 
3) Proposed enhancements to PIDF-LO to support #2. 

Proposed ECRIT Agenda: 
  2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30 
1) Emergency Call Routing Requirements 
2) Security and Threats Analysis 

_______________________________________________ 
Geopriv mailing list 
Geopriv@ietf.org 
https://www1.ietf.org/mailman/listinfo/geopriv 

 

_______________________________________________ 
Geopriv mailing list 
Geopriv@ietf.org 
https://www1.ietf.org/mailman/listinfo/geopriv 


------=_NextPart_000_0E7C_01C545DF.6C222DD0
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim =
Meeting</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PostalCode"
 downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"Street"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"address" =
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City" =
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>------note the subject change =
&#8211;
it&#8217;s an attempt to more accurately reflect the =
topic------<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>James,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>1) Are not complex shape =
definitions
associated with TOA technology which is associated with wireless? =
&nbsp;I
don&#8217;t remember anyone advocating the use of RFC3825 nor LLDP-MED =
for a
complete wireless solution.&nbsp; If fact, I know that RFC3825 =
recommends using
a yet-to-be-determined more exotic method for passing location =
information to a
wireless client.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>2) In the case of signing the =
pidf-lo, who
is going to sign it when the data is user derived (either user keyed or
on-board gps)?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>3) There seems to be consensus that =
L1/L2
will, in all but user derived mechanisms, be involved in location =
determination
at some level. &nbsp;Is it the case that you are advocating that the =
L1/L2
infrastructure build and sign a pidf-lo and forward to either the client =
or a
L7 service somewhere in the network?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Just attempting to
understand&#8230;&#8230;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>-Marc-<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in =
0in 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'>
ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] <b><span
style=3D'font-weight:bold'>On Behalf Of </span></b>James =
Winterbottom<br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, April =
20, 2005
5:55 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Brian Rosen; =
peter_blatherwick@mitel.com<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> 'GEOPRIV WG'; =
ecrit@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> [Ecrit] RE: =
[Geopriv]
Announcement of Joint GEOPRIV/ECRIT =
InterimMeeting</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>I think
that there is one other argument that also lends itself to the returning =
of the
PIDF-LO rather than a layer 2 alternative, and that is that the contents =
of
PIDF-LO are very likely to change, largely with things being added to =
them. To
support these changes in PIDF-LO is relatively easy, because XML is by =
its very
nature extensible. It would be difficult, and I would argue completely
undesirable to have to change myriad of layer 2 protocols to support a =
new
attribute that has been added to PIDF-LO. Case in point is the =
provided-by
parameter that is already there, another example would be complex shape =
definitions,
and also the signatures that Brian describes =
below.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The
problems that I see with the current layer 2 implementation are also =
that they
are essentially clones of one another with regards to what information =
is
conveyed, so if it is insufficient in one, or plain simply wrong (and I =
am not
saying that it is wrong), then the task to fix it is =
large.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>-----Original
Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>From: =
geopriv-bounces@ietf.org [<a
href=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org<=
/a>] On
Behalf Of Brian Rosen</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Sent: Wednesday, 20 =
April 2005
11:54 PM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>To: =
peter_blatherwick@mitel.com</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Cc: 'GEOPRIV WG'; =
ecrit@ietf.org;
'Andrew Newton'</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Subject: RE: [Geopriv] =
Announcement
of Joint GEOPRIV/ECRIT Interim Meeting</span></font> <o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>There
turns out to be a large set of issues around this problem, which I fear =
is
leading to Balkanization.&nbsp; There are two really important problems =
we need
to solve.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>One
fundamental problem is that every client needs to implement every =
possible LI
transfer mechanism that its environment could =
provide.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>We have
DHCP.&nbsp; You guys are working on LLDP-MED.&nbsp;&nbsp; The DSL guys =
reject
both</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>of these and want a =
something
else.&nbsp; Every phone has to implement every protocol.</span></font> =
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>There are
some who have observed that the mechanisms at hand are L2 =
specific.&nbsp; They claim
as long as you have an L2 specific mechanism, you need one or more for =
each
L2.&nbsp; To get out of that, they propose that we use an L7 mechanism =
(think
some version of HTTP, although that might not fly).&nbsp; They would =
say, lets
do that once, and every L2 can use it.&nbsp; The problem is that you =
then have
to deal with the security issues of an L7 mechanism, and in particular, =
you
have to use IP address as the &quot;key&quot; for what location to
return.&nbsp; If you can spoof IP address, you can get someone else's
location.&nbsp; </span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Those
advocating L7 mechanisms claim that the mechanism would only be =
implemented
within a domain, and the domain would have to take anti-spoofing =
steps.&nbsp;
They note that the mechanism would need at least a complete round trip, =
and
probably more than one, so spoofing requires the ability =
to</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>intercept
packets not addressed to the attacker.&nbsp;&nbsp; The returned data =
could</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>be precisely a =
PIDF-LO.</span></font>
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Then on
top of that, we turn out to need some more security, especially for =
emergency
calls.&nbsp; We need to prevent forged locations.&nbsp; That means we =
need to
sign the PIDF-LO.&nbsp; If you get location via DHCP, or LLDP-MED, and =
the
endpoint constructs a PIDF-LO from that, how do we construct a signature =
from
the entity that actually determined =
location?</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Brian</span></font>
<o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>________________________________________</span=
></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>From: =
geopriv-bounces@ietf.org [<a
href=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org<=
/a>] On
Behalf Of peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Sent: Wednesday, April =
20, 2005
9:30 AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>To: Andrew =
Newton</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Cc: GEOPRIV WG; =
ecrit@ietf.org</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Subject: Re: [Geopriv] =
Announcement
of Joint GEOPRIV/ECRIT Interim Meeting</span></font> <o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Hi
Andrew, lists, &nbsp; </span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>I'd like
to better understand the meaning of the following agenda items: =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &quot; =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; 2) Properties of =
network
elements in transferring LI from layer 2 </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp;upward to =
PIDF-LO.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp;3) Proposed =
enhancements to
PIDF-LO to support #2.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp;&quot; =
</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Is there
a summary of what these really mean, or examples of what the outcome =
could be
in terms of protocol or layer interactions? &nbsp; =
</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Reason I'm
asking is I am deeply involved in a layer 2 approach which would be able =
to
deliver location information to endpoints from the L2 LAN infrastructure =
they
are connected to. &nbsp;The work is going on in TIA and is called Link =
Layer
Discovery Protocol - Media Endpoint Discovery (LLDP-MED), which is an =
extension
of IEEE 802.1AB, specific to VoIP systems. &nbsp;In LLDP-MED, among =
several
other things, we have specified ways to pass equivalent data to the DHCP
coordinate-based LCI (RFC 3825) and civic location LCI =
(draft-ietf-geopriv-dhcp-civil-05,
in Last Call process I believe). &nbsp;We see this method of delivery as =
a
non-competing alternative to the DHCP-based approach, with the same end =
result
to the overall ECS system (the endpoint receives the exact same data), =
which
has some advantages particularly in enterprise deployment scenarios. =
&nbsp;(The
DHCP-based method has advantages in different scenarios.) &nbsp; I am =
Editor of
thi s document, and it is now in ballot process in TIA (more or less =
equivalent
to Last Call in IETF). &nbsp; </span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Sorry, I
expect I am suffering lack of context here, since I only joined the list
relatively recently. &nbsp; </span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>BTW, what
is the state of geopriv-dhcp-civil? &nbsp;Is it now past Last Call and =
in the
RFC Editor's queue? &nbsp;It seemed to have been settled on the list, =
and
waiting on AD action. </span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>-- Peter
Blatherwick </span></font><o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Andrew
Newton &lt;andy@hxr.us&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>Sent by: =
geopriv-bounces@ietf.org </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>13.04.05 16:34 =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; To:
&nbsp; &nbsp; &nbsp; &nbsp;GEOPRIV WG &lt;geopriv@ietf.org&gt; =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; cc:
&nbsp; &nbsp; &nbsp; &nbsp; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp;
Subject: &nbsp; &nbsp; &nbsp; &nbsp;[Geopriv] Announcement of Joint
GEOPRIV/ECRIT Interim Meeting</span></font> <o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The
GEOPRIV and ECRIT working groups will be holding a joint interim =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>meeting.</span></font> =
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>&nbsp;
&nbsp; &nbsp; What: Interim GEOPRIV/ECRIT meeting</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
When: 2005 May
16 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; 2005 May 17 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; 2005 May 18 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; =
&nbsp;Where: Columbia
University</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; Dept. of Computer Science</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; 450 Computer Science Bldg.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; <st1:Street w:st=3D"on"><st1:address w:st=3D"on">1214 Amsterdam =
Avenue</st1:address></st1:Street>
(close to <st1:Street w:st=3D"on"><st1:address w:st=3D"on">120th =
St.</st1:address></st1:Street>)</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; <st1:place w:st=3D"on"><st1:City w:st=3D"on">New York</st1:City>, =
<st1:State
 w:st=3D"on">NY</st1:State> <st1:PostalCode =
w:st=3D"on">10027</st1:PostalCode></st1:place></span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Directions: <a
href=3D"http://www.cs.columbia.edu/directions.html" =
target=3D"_blank">http://www.cs.columbia.edu/directions.html</a></span></=
font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
Also: WiFi
provided.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; Teleconference to be provided.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; =
&nbsp;Hotel: <a
href=3D"http://www.cs.columbia.edu/~hgs/etc/hotels.html" =
target=3D"_blank">http://www.cs.columbia.edu/~hgs/etc/hotels.html</a></sp=
an></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;
&nbsp; Early bookings recommended.</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Proposed
GEOPRIV Agenda:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; 2005 May 16 =
08:30-17:30,
2005 May 17 08:30-12:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>1) Role of HTTP as a =
transfer
protocol for PIDF-LO vs. the use of LI in </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>HTTP/HTML for web =
browsing.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>2) Properties of network =
elements
in transferring LI from layer 2 </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>upward to =
PIDF-LO.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>3) Proposed enhancements =
to PIDF-LO
to support #2.</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Proposed
ECRIT Agenda:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&nbsp; 2005 May 17 =
13:30-17:30,
2005 May 18 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>1) Emergency Call =
Routing Requirements</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>2) Security and Threats =
Analysis</span></font>
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Geopriv mailing =
list</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>Geopriv@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'><a
href=3D"https://www1.ietf.org/mailman/listinfo/geopriv" =
target=3D"_blank">https://www1.ietf.org/mailman/listinfo/geopriv</a></spa=
n></font>
<o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Geopriv mailing =
list</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>Geopriv@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'><a
href=3D"https://www1.ietf.org/mailman/listinfo/geopriv" =
target=3D"_blank">https://www1.ietf.org/mailman/listinfo/geopriv</a></spa=
n></font>
<o:p></o:p></p>

</div>

</div>

</body>

</html>

------=_NextPart_000_0E7C_01C545DF.6C222DD0--


--===============1549996348==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============1549996348==--




From ecrit-bounces@ietf.org Wed Apr 20 20:38:13 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOPht-00012J-Dw; Wed, 20 Apr 2005 20:38:13 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOOei-0000Ag-KH; Wed, 20 Apr 2005 19:30:53 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id TAA07960;
	Wed, 20 Apr 2005 19:30:49 -0400 (EDT)
Received: from sj-iport-1-in.cisco.com ([171.71.176.70]
	helo=sj-iport-1.cisco.com) by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOOpz-0004nD-SJ; Wed, 20 Apr 2005 19:42:34 -0400
Received: from sj-core-5.cisco.com (171.71.177.238)
	by sj-iport-1.cisco.com with ESMTP; 20 Apr 2005 16:30:40 -0700
X-IronPort-AV: i="3.92,118,1112598000"; 
	d="scan'208,217"; a="630905947:sNHT93828472"
Received: from malone.cisco.com (malone.cisco.com [171.70.157.157])
	by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id j3KNUchu009894;
	Wed, 20 Apr 2005 16:30:38 -0700 (PDT)
Received: from MLINSNER (ssh-sjc-1.cisco.com [171.68.225.134]) by
	malone.cisco.com (8.8.6 (PHNE_14041)/CISCO.SERVER.1.2) with
	ESMTP id QAA15712; Wed, 20 Apr 2005 16:30:34 -0700 (PDT)
Message-Id: <200504202330.QAA15712@malone.cisco.com>
From: "Marc Linsner" <mlinsner@cisco.com>
To: "'James Winterbottom'" <winterb@nortel.com>
Date: Wed, 20 Apr 2005 19:30:29 -0400
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <C0FA66CBDDF5D411B82E00508BE3A722102B98E4@zctwc059.asiapac.nortel.com>
Thread-Index: AcVF9nIwWeHRWf5VR7y1tdsZHo+PsgACOBXg
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2600.0000
X-Spam-Score: 1.4 (+)
X-Scan-Signature: 2c51cf2036fd789291a33c1e40f6afea
X-Mailman-Approved-At: Wed, 20 Apr 2005 20:38:11 -0400
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] L2 vs. L7 Location Discover
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1864781054=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1864781054==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0E75_01C545DF.6A7F7A50"

This is a multi-part message in MIME format.

------=_NextPart_000_0E75_01C545DF.6A7F7A50
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit

...subject changed to more accurately reflect topic...

 

James,

 

Since an argument for L7 location discovery architecture is no changes
needed to the myriad of L2 mechanisms, what are you proposing to use for a
key?

 

-Marc-

 

 

 

 

Hmmmm!!! 

I am not sure that I agree your statement that the key passed to external
would be the IP address of the client. It could be, but I would most
certainly not advocate that. 

 

 

-----Original Message----- 
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
Brian Rosen 
Sent: Thursday, 21 April 2005 2:13 AM 
To: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com 
Cc: 'GEOPRIV WG'; ecrit@ietf.org 
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting 

 

The basic picture is: 

LIS ---> endpoint ---> routing element ---> psap 

The LIS knows where the endpoint is. 
The endpoint gets location from the LIS 
The endpoint includes location on the emergency call 
The routing element uses location to route the call to the right PSAP The
PSAP gets the call, and the location. 

The discussion is, how does the endpoint get location from the LIS? DHCP is
one answer.  LLDP-MED is another.  A proposed L7 mechanism is another.

 

To be sure, there are folks who want to make the picture: 

LIS --> endpoint --> routing element ---> psap 
 ^                        |                 | 
 |                        |                 | 
 +------------------------+                 | 
 |                                          | 
 +------------------------------------------+ 

The LIS gives the endpoint a "key" 
The endpoint includes the key in the emergency call 
The routing element gets the key and exchanges it for location at the LIS
The psap gets the key and exchanges it for location at the LIS

The key could be an IP address. 

Brian 

 

> -----Original Message----- 
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com] 
> Sent: Wednesday, April 20, 2005 12:00 PM 
> To: Brian Rosen; peter_blatherwick@mitel.com 
> Cc: GEOPRIV WG; ecrit@ietf.org 
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> InterimMeeting 
> 
> I still get the feeling that "delivery" is being used in two different 
> contexts: 
> 
>             (1)                     (2) 
> Local node---?---->endpoint-----/many hops/----->PSAP 
>           ---------------------/many hops/-----> 
>                            (2) 
> 
> How can "delivery" be L2 dependent, when it must reach a PSAP many 
> hops away? Color me confused. 
> 
> Mike 
> 
> 
> >-----Original Message----- 
> >From: Brian Rosen [mailto:br@brianrosen.net] 
> >Sent: Wednesday, April 20, 2005 10:47 AM 
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com 
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org 
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT InterimMeeting 
> > 
> >The idea is that, say, you are in your home, served by a DSL 
> >provider. The domain is then that of the DSL vendor.  Your phone asks 
> >for its location from the server in the DSL domain.  It would be 
> >given the location corresponding to the IP address of the request.  
> >Note that this would be pretty good for the requested case, even in 
> >the presence of a NATed local area network in your home.  The phone 
> >would do this on boot, before any VPN tunnels were established. 
> > 
> >I get the idea that a single delivery mechanism is desirable. I'm 
> >skeptical we can do that because of the security issues. When you 
> >make the delivery mechanism L2 dependent, you can control the 
> >possible attacks to a finer grain than the L7 local domain. 
> > 
> >Please keep in mind that some of the folks wishing to use the L7 
> >mechanism don't really want to just return location to the endpoint; 
> >they want to retain the location and give it out to authorized 
> >entities upon presentation of the IP address of the endpoint.  That 
> >is a business decision.  They can charge for such a service.  I think 
> >the privacy implications of that are dicey, but the reality is that's 
> >the model that will probably be implemented if we do this. 
> > 
> >Brian 
> > 
> > 
> > 
> > 
> > 
> >> -----Original Message----- 
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com] 
> >> Sent: Wednesday, April 20, 2005 10:14 AM 
> >> To: Brian Rosen; peter_blatherwick@mitel.com 
> >> Cc: GEOPRIV WG; ecrit@ietf.org 
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT 
> >> InterimMeeting 
> >> 
> >> Brian, 
> >> 
> >> Could you clarify the domain statement.  Given nomadicity, it would 
> >> seem that location delivery would need to be cross-domain.  The 
> >> E911 PSAP will not always be the same domain as the roaming 
> >> endpoint. 
> >> 
> >> My impression is that Location discovery is a L2 issue, tied to the 
> >> fact that L2 is supposed to be a single physical hop at most 
> >> between the end- user terminal and an adjacent location-determining 
> >> network node.  (Of course those trying to make L2 protocols a 
> >replacement for 
> >> IP sort of screw this assumption up.) 
> >> 
> >> The location delivery mechanism is an application-layer or 
> >L7 service. 
> >> The argument there is that since multiple applications will need to 
> >> rely on location information, a general purpose delivery mechanism 
> >> will provide consistency and generality that is so often sought in 
> >> IETF work.  Security can be built-in to the chosen delivery 
> >mechanism. 
> >> Note, that delivery could be a choice of an existing transfer 
> >> mechanism.  This does not preclude other L7 protocols from 
> >defining a 
> >> place in their messages that could also carry location information. 
> >> 
> >> So, I believe: 
> >> Location discovery is local, with associated security being local, 
> >> Location delivery is global, with associated security being global. 
> >> 
> >> The real issues are making those happen. 
> >> 
> >> Mike 
> >> 
> >> >-----Original Message----- 
> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On 
> >> >Behalf Of Brian Rosen 
> >> >Sent: Wednesday, April 20, 2005 9:54 AM 
> >> >To: peter_blatherwick@mitel.com 
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org 
> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> >> >InterimMeeting 
> >> > 
> >> >There turns out to be a large set of issues around this problem, 
> >> >which I fear is leading to Balkanization.  There are two really 
> >> >important problems we need to solve. 
> >> > 
> >> >One fundamental problem is that every client needs to 
> >implement every 
> >> >possible LI transfer mechanism that its environment could provide. 
> >> > 
> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL 
> >> >guys reject both 
> >> >of these and want a something else.  Every phone has to implement 
> >> >every protocol. 
> >> > 
> >> >There are some who have observed that the mechanisms at hand are 
> >> >L2 specific.  They claim as long as you have an L2 specific 
> >> >mechanism, you need one or more for each L2.  To get out of that, 
> >> >they propose that we use an L7 mechanism (think some version of 
> >> >HTTP, although that might not fly).  They would say, lets do that 
> >> >once, 
> >and every L2 
> >> >can use it.  The problem is that you then have to deal with the 
> >> >security issues of an L7 mechanism, and in particular, you have to 
> >> >use IP address as the "key" for what location to return. 
> >If you can 
> >> >spoof IP address, you can get someone else's location. 
> >> > 
> >> >Those advocating L7 mechanisms claim that the mechanism 
> >would only be 
> >> >implemented within a domain, and the domain would have to take 
> >> >anti-spoofing steps.  They note that the mechanism would need at 
> >> >least a complete round trip, and probably more than one, so 
> >spoofing 
> >> >requires the ability to 
> >> >intercept packets not addressed to the attacker.   The 
> >> >returned data could 
> >> >be precisely a PIDF-LO. 
> >> > 
> >> >Then on top of that, we turn out to need some more security, 
> >> >especially for emergency calls.  We need to prevent forged 
> >locations. 
> >> >That means we need to sign the PIDF-LO.  If you get location via 
> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from 
> >> >that, how do we construct a signature from the entity that 
> >> >actually determined location? 
> >> > 
> >> >Brian 
> >> > 
> >> > 
> >> >________________________________________ 
> >> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] 
> >> >On Behalf Of peter_blatherwick@mitel.com 
> >> >Sent: Wednesday, April 20, 2005 9:30 AM 
> >> >To: Andrew Newton 
> >> >Cc: GEOPRIV WG; ecrit@ietf.org 
> >> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim 
> >> >Meeting 
> >> > 
> >> > 
> >> >Hi Andrew, lists, 
> >> > 
> >> >I'd like to better understand the meaning of the following agenda 
> >> >items: 
> >> >  " 
> >> >  2) Properties of network elements in transferring LI from layer 
> >> >2 
> >> > upward to PIDF-LO. 
> >> > 3) Proposed enhancements to PIDF-LO to support #2. 
> >> > " 
> >> > 
> >> >Is there a summary of what these really mean, or examples 
> >of what the 
> >> >outcome could be in terms of protocol or layer interactions? 
> >> > 
> >> >Reason I'm asking is I am deeply involved in a layer 2 
> >approach which 
> >> >would be able to deliver location information to endpoints from 
> >> >the L2 LAN infrastructure they are connected to.  The work is 
> >going on in 
> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint 
> >> >Discovery (LLDP-MED), which is an extension of IEEE 
> >802.1AB, specific 
> >> >to VoIP systems.  In LLDP-MED, among several other things, we have 
> >> >specified ways to pass equivalent data to the DHCP 
> >> >coordinate-based LCI (RFC 3825) and civic location LCI 
> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I 
> >believe). 
> >> >We see this method of delivery as a non-competing 
> >alternative to the 
> >> >DHCP-based approach, with the same end result to the overall ECS 
> >> >system (the endpoint receives the exact same data), which has some 
> >> >advantages particularly in enterprise deployment scenarios.  (The 
> >> >DHCP-based method has advantages in different scenarios.)   I am 
> >> >Editor of thi s document, and it is now in ballot process in TIA 
> >> >(more or less equivalent to Last Call in IETF). 
> >> > 
> >> >Sorry, I expect I am suffering lack of context here, since I only 
> >> >joined the list relatively recently. 
> >> > 
> >> >BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last 
> >> >Call and in the RFC Editor's queue?  It seemed to have been 
> >> >settled on the list, and waiting on AD action. 
> >> > 
> >> >-- Peter Blatherwick 
> >> > 
> >> > 
> >> > 
> >> > 
> >> >Andrew Newton <andy@hxr.us> 
> >> >Sent by: geopriv-bounces@ietf.org 
> >> >13.04.05 16:34 
> >> > 
> >> >        To:        GEOPRIV WG <geopriv@ietf.org> 
> >> >        cc: 
> >> >        Subject:        [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT 
> >> >Interim Meeting 
> >> > 
> >> > 
> >> > 
> >> > 
> >> >The GEOPRIV and ECRIT working groups will be holding a 
> >joint interim 
> >> >meeting. 
> >> > 
> >> >      What: Interim GEOPRIV/ECRIT meeting 
> >> >      When: 2005 May 16 08:30-17:30 
> >> >            2005 May 17 08:30-17:30 
> >> >            2005 May 18 08:30-17:30 
> >> >     Where: Columbia University 
> >> >            Dept. of Computer Science 
> >> >            450 Computer Science Bldg. 
> >> >            1214 Amsterdam Avenue (close to 120th St.) 
> >> >            New York, NY 10027 
> >> >Directions: http://www.cs.columbia.edu/directions.html 
> >> >      Also: WiFi provided. 
> >> >            Teleconference to be provided. 
> >> >     Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html 
> >> >            Early bookings recommended. 
> >> > 
> >> >Proposed GEOPRIV Agenda: 
> >> >  2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30 
> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the 
> >use of LI 
> >> >in HTTP/HTML for web browsing. 
> >> >2) Properties of network elements in transferring LI from layer 2 
> >> >upward to PIDF-LO. 
> >> >3) Proposed enhancements to PIDF-LO to support #2. 
> >> > 
> >> >Proposed ECRIT Agenda: 
> >> >  2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30 
> >> >1) Emergency Call Routing Requirements 
> >> >2) Security and Threats Analysis 
> >> > 
> >> >_______________________________________________ 
> >> >Geopriv mailing list 
> >> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv 
> >> > 
> >> > 
> >> > 
> >> > 
> >> >_______________________________________________ 
> >> >Ecrit mailing list 
> >> >Ecrit@ietf.org https://www1.ietf.org/mailman/listinfo/ecrit 
> >> > 
> >> 
> > 
> > 
> 

 

_______________________________________________ 
Ecrit mailing list 
Ecrit@ietf.org 
https://www1.ietf.org/mailman/listinfo/ecrit 


------=_NextPart_000_0E75_01C545DF.6A7F7A50
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<title>RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PostalCode"
 downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"Street"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"State"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PlaceType"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PlaceName"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"address" =
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"City" =
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags"/>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"place" downloadurl=3D"http://www.5iantlavalamp.com/"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>

</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>&#8230;..subject changed to more
accurately reflect topic&#8230;&#8230;.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>James,<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Since an argument for L7 location
discovery architecture is no changes needed to the myriad of L2 =
mechanisms,
what are you proposing to use for a key?<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>-Marc-<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in =
0in 4.0pt'>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Hmmmm!!!</span></font>
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>I am not
sure that I agree your statement that the key passed to external would =
be the
IP address of the client. It could be, but I would most certainly not =
advocate
that. </span></font><font color=3Dnavy><span =
style=3D'color:navy'><o:p></o:p></span></font></p>

<p><b><i><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:navy;font-weight:bold;font-style:italic'><o:p>&nb=
sp;</o:p></span></font></i></b></p>

<p><b><i><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:10.0pt;
font-family:Arial;color:navy;font-weight:bold;font-style:italic'><o:p>&nb=
sp;</o:p></span></font></i></b></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>-----Original
Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>From: =
ecrit-bounces@ietf.org [<a
href=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</a>]=
 On
Behalf Of Brian Rosen</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Sent: Thursday, 21 April =
2005 2:13
AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>To: 'Michael Hammer =
(mhammer)';
peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Cc: 'GEOPRIV WG'; =
ecrit@ietf.org</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Subject: RE: [Ecrit] RE: =
[Geopriv]
Announcement of Joint GEOPRIV/ECRIT InterimMeeting</span></font> =
<o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The basic
picture is:</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>LIS
---&gt; endpoint ---&gt; routing element ---&gt; psap</span></font> =
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The LIS knows
where the endpoint is.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>The endpoint gets =
location from the
LIS</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>The endpoint includes =
location on
the emergency call</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>The routing element uses =
location
to route the call to the right PSAP The PSAP gets the call, and the =
location.</span></font>
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The
discussion is, how does the endpoint get location from the LIS? DHCP is =
one
answer.&nbsp; LLDP-MED is another.&nbsp; A proposed L7 mechanism is =
another.</span></font><o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>To be
sure, there are folks who want to make the picture:</span></font> =
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>LIS
--&gt; endpoint --&gt; routing element ---&gt; psap</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&nbsp;^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;
|</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&nbsp;|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;
|</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&nbsp;+------------------------+&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;
|</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&nbsp;|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
|</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&nbsp;+---------------------------------------=
---+</span></font>
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The LIS
gives the endpoint a &quot;key&quot;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>The endpoint includes =
the key in
the emergency call</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>The routing element gets =
the key
and exchanges it for location at the LIS The psap gets the key and =
exchanges it
for location at the LIS</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>The key
could be an IP address.</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Brian</span></font>
<o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>&gt;
-----Original Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; From: Michael =
Hammer (mhammer)
[<a =
href=3D"mailto:mhammer@cisco.com">mailto:mhammer@cisco.com</a>]</span></f=
ont>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Sent: Wednesday, =
April 20,
2005 12:00 PM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; To: Brian Rosen;
peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Cc: GEOPRIV WG; =
ecrit@ietf.org</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Subject: RE: =
[Ecrit] RE: [Geopriv]
Announcement of Joint GEOPRIV/ECRIT </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
InterimMeeting</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; I still get the =
feeling that
&quot;delivery&quot; is being used in two different</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
contexts:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
(1)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
(2)</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Local
node---?----&gt;endpoint-----/many hops/-----&gt;PSAP</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;
---------------------/many hops/-----&gt;</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=
&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&=
nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;
(2)</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; How can =
&quot;delivery&quot;
be L2 dependent, when it must reach a PSAP many </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; hops away? Color me =
confused.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Mike</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;-----Original =
Message-----</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;From: Brian =
Rosen [<a
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</a>]</span></f=
ont> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;Sent: =
Wednesday, April 20,
2005 10:47 AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;To: Michael =
Hammer
(mhammer); peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;Cc: 'GEOPRIV =
WG';
ecrit@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;Subject: RE: =
[Ecrit] RE: [Geopriv]
Announcement of Joint </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;GEOPRIV/ECRIT
InterimMeeting</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;The idea is =
that, say, you
are in your home, served by a DSL </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;provider. The =
domain is
then that of the DSL vendor.&nbsp; Your phone asks </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;for its =
location from the
server in the DSL domain.&nbsp; It would be </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;given the =
location
corresponding to the IP address of the request.&nbsp; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;Note that this =
would be
pretty good for the requested case, even in </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;the presence of =
a NATed
local area network in your home.&nbsp; The phone </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;would do this =
on boot,
before any VPN tunnels were established.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;I get the idea =
that a
single delivery mechanism is desirable. I'm </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;skeptical we =
can do that
because of the security issues. When you </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;make the =
delivery
mechanism L2 dependent, you can control the </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;possible =
attacks to a
finer grain than the L7 local domain.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;Please keep in =
mind that
some of the folks wishing to use the L7 </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;mechanism don't =
really
want to just return location to the endpoint; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;they want to =
retain the
location and give it out to authorized </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;entities upon =
presentation
of the IP address of the endpoint.&nbsp; That </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;is a business
decision.&nbsp; They can charge for such a service.&nbsp; I think =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;the privacy =
implications
of that are dicey, but the reality is that's </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;the model that =
will
probably be implemented if we do this.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;Brian</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
-----Original
Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; From: =
Michael Hammer
(mhammer) [<a =
href=3D"mailto:mhammer@cisco.com">mailto:mhammer@cisco.com</a>]</span></f=
ont>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Sent: =
Wednesday, April
20, 2005 10:14 AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; To: Brian =
Rosen;
peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Cc: =
GEOPRIV WG;
ecrit@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Subject: =
RE: [Ecrit]
RE: [Geopriv] Announcement of Joint</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;GEOPRIV/ECRIT</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
InterimMeeting</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
Brian,</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Could you =
clarify the
domain statement.&nbsp; Given nomadicity, it would </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; seem that =
location
delivery would need to be cross-domain.&nbsp; The </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; E911 PSAP =
will not
always be the same domain as the roaming </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
endpoint.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; My =
impression is that
Location discovery is a L2 issue, tied to the </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; fact that =
L2 is
supposed to be a single physical hop at most </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; between =
the end- user
terminal and an adjacent location-determining </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; network =
node.&nbsp;
(Of course those trying to make L2 protocols a</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;replacement =
for</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; IP sort of =
screw this
assumption up.)</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; The =
location delivery
mechanism is an application-layer or</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;L7 =
service.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; The =
argument there is
that since multiple applications will need to </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; rely on =
location
information, a general purpose delivery mechanism </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; will =
provide
consistency and generality that is so often sought in </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; IETF =
work.&nbsp;
Security can be built-in to the chosen delivery</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;mechanism.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Note, that =
delivery
could be a choice of an existing transfer </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
mechanism.&nbsp; This
does not preclude other L7 protocols from</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;defining =
a</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; place in =
their
messages that could also carry location information.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; So, I =
believe:</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Location =
discovery is
local, with associated security being local, </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; Location =
delivery is
global, with associated security being global.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; The real =
issues are
making those happen.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
Mike</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;-----Original
Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;From:
ecrit-bounces@ietf.org [<a =
href=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</a>]=

On </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Behalf =
Of Brian
Rosen</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Sent: =
Wednesday,
April 20, 2005 9:54 AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;To:
peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Cc: =
'GEOPRIV WG';
ecrit@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Subject: [Ecrit]
RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;InterimMeeting</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;There =
turns out
to be a large set of issues around this problem, </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;which =
I fear is
leading to Balkanization.&nbsp; There are two really </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;important
problems we need to solve.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;One =
fundamental
problem is that every client needs to</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;implement =
every</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;possible LI
transfer mechanism that its environment could provide.</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;We =
have
DHCP.&nbsp; You guys are working on LLDP-MED.&nbsp;&nbsp; The =
DSL</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;guys =
reject both</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;of =
these and want
a something else.&nbsp; Every phone has to implement </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;every =
protocol.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;There =
are some
who have observed that the mechanisms at hand are </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;L2
specific.&nbsp; They claim as long as you have an L2 specific =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;mechanism, you need
one or more for each L2.&nbsp; To get out of that, </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;they =
propose that
we use an L7 mechanism (think some version of </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;HTTP, =
although
that might not fly).&nbsp; They would say, lets do that =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;once,</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;and every =
L2</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;can =
use it.&nbsp;
The problem is that you then have to deal with the </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;security issues
of an L7 mechanism, and in particular, you have to </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;use IP =
address as
the &quot;key&quot; for what location to return.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;If you =
can</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;spoof =
IP address,
you can get someone else's location.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Those =
advocating
L7 mechanisms claim that the mechanism</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;would only =
be</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;implemented
within a domain, and the domain would have to take </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;anti-spoofing
steps.&nbsp; They note that the mechanism would need at =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;least =
a complete
round trip, and probably more than one, so</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;spoofing</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;requires the
ability to</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;intercept packets
not addressed to the attacker.&nbsp;&nbsp; The</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;returned data
could</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;be =
precisely a
PIDF-LO.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Then =
on top of
that, we turn out to need some more security, </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;especially for
emergency calls.&nbsp; We need to prevent forged</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;locations.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;That =
means we
need to sign the PIDF-LO.&nbsp; If you get location via =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;DHCP, =
or
LLDP-MED, and the endpoint constructs a PIDF-LO from </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;that, =
how do we
construct a signature from the entity that </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;actually
determined location?</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Brian</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt;
&gt;________________________________________</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;From:
geopriv-bounces@ietf.org [<a =
href=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org<=
/a>]
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;On =
Behalf Of
peter_blatherwick@mitel.com</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Sent: =
Wednesday,
April 20, 2005 9:30 AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;To: =
Andrew Newton</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Cc: =
GEOPRIV WG;
ecrit@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Subject: Re: [Geopriv]
Announcement of Joint GEOPRIV/ECRIT Interim</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Meeting</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Hi =
Andrew, lists,</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;I'd =
like to
better understand the meaning of the following agenda</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;items:</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&quot;</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
2)
Properties of network elements in transferring LI from layer =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;2</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;&nbsp;upward to
PIDF-LO.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;&nbsp;3) Proposed
enhancements to PIDF-LO to support #2.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;&nbsp;&quot;</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Is =
there a
summary of what these really mean, or examples</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;of what =
the</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;outcome could be
in terms of protocol or layer interactions?</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Reason =
I'm asking
is I am deeply involved in a layer 2</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;approach =
which</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;would =
be able to
deliver location information to endpoints from </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;the L2 =
LAN
infrastructure they are connected to. &nbsp;The work is</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;going on =
in</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;TIA =
and is called
Link Layer Discovery Protocol - Media Endpoint </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Discovery
(LLDP-MED), which is an extension of IEEE</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;802.1AB, =
specific</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;to =
VoIP systems.
&nbsp;In LLDP-MED, among several other things, we have =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;specified ways to
pass equivalent data to the DHCP </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;coordinate-based
LCI (RFC 3825) and civic location LCI </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt;
&gt;(draft-ietf-geopriv-dhcp-civil-05, in Last Call process =
I</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;believe).</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;We see =
this
method of delivery as a non-competing</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;alternative to =
the</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;DHCP-based
approach, with the same end result to the overall ECS </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;system =
(the
endpoint receives the exact same data), which has some =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;advantages
particularly in enterprise deployment scenarios. &nbsp;(The =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;DHCP-based method
has advantages in different scenarios.) &nbsp; I am </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Editor =
of thi s
document, and it is now in ballot process in TIA </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;(more =
or less
equivalent to Last Call in IETF).</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Sorry, =
I expect I
am suffering lack of context here, since I only </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;joined =
the list
relatively recently.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;BTW, =
what is the
state of geopriv-dhcp-civil? &nbsp;Is it now past Last =
</span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Call =
and in the
RFC Editor's queue? &nbsp;It seemed to have been </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;settled on the
list, and waiting on AD action.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;-- =
Peter
Blatherwick</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Andrew =
Newton
&lt;andy@hxr.us&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Sent =
by:
geopriv-bounces@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;13.04.05 16:34</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp; &nbsp;GEOPRIV WG
&lt;geopriv@ietf.org&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; cc:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;[Geopriv] Announcement =
of
Joint</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;GEOPRIV/ECRIT</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Interim Meeting</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;The =
GEOPRIV and
ECRIT working groups will be holding a</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;joint =
interim</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;meeting.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; What: Interim GEOPRIV/ECRIT meeting</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; When: 2005 May 16 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; 2005 May 17 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; 2005 May 18 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp;Where: <st1:place w:st=3D"on"><st1:PlaceName =
w:st=3D"on">Columbia</st1:PlaceName>
 <st1:PlaceType =
w:st=3D"on">University</st1:PlaceType></st1:place></span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; Dept. of Computer Science</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; 450 Computer Science Bldg.</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; 1214 <st1:City =
w:st=3D"on">Amsterdam</st1:City>
Avenue (close to <st1:Street w:st=3D"on"><st1:address w:st=3D"on">120th =
St.</st1:address></st1:Street>)</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; <st1:place w:st=3D"on"><st1:City =
w:st=3D"on">New York</st1:City>,
 <st1:State w:st=3D"on">NY</st1:State> <st1:PostalCode =
w:st=3D"on">10027</st1:PostalCode></st1:place></span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Directions: <a
href=3D"http://www.cs.columbia.edu/directions.html" =
target=3D"_blank">http://www.cs.columbia.edu/directions.html</a></span></=
font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; Also: WiFi provided.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; Teleconference to be provided.</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp;Hotel: <a href=3D"http://www.cs.columbia.edu/~hgs/etc/hotels.html"
target=3D"_blank">http://www.cs.columbia.edu/~hgs/etc/hotels.html</a></sp=
an></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
&nbsp;
&nbsp; &nbsp; &nbsp; &nbsp; Early bookings recommended.</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Proposed GEOPRIV
Agenda:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
2005 May
16 08:30-17:30, 2005 May 17 08:30-12:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;1) =
Role of HTTP
as a transfer protocol for PIDF-LO vs. the</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;use of =
LI</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;in =
HTTP/HTML for
web browsing.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;2) =
Properties of
network elements in transferring LI from layer 2 </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;upward =
to
PIDF-LO.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;3) =
Proposed
enhancements to PIDF-LO to support #2.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Proposed ECRIT
Agenda:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;&nbsp; =
2005 May
17 13:30-17:30, 2005 May 18 08:30-17:30</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;1) =
Emergency Call
Routing Requirements</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;2) =
Security and
Threats Analysis</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt;
&gt;_______________________________________________</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Geopriv mailing
list</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Geopriv@ietf.org <a
href=3D"https://www1.ietf.org/mailman/listinfo/geopriv" =
target=3D"_blank">https://www1.ietf.org/mailman/listinfo/geopriv</a></spa=
n></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt;
&gt;_______________________________________________</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; &gt;Ecrit =
mailing
list</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;Ecrit@ietf.org <a
href=3D"https://www1.ietf.org/mailman/listinfo/ecrit" =
target=3D"_blank">https://www1.ietf.org/mailman/listinfo/ecrit</a></span>=
</font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;&gt; =
&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
&gt;&gt;</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
</span></font><o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Ecrit mailing =
list</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>Ecrit@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'><a
href=3D"https://www1.ietf.org/mailman/listinfo/ecrit" =
target=3D"_blank">https://www1.ietf.org/mailman/listinfo/ecrit</a></span>=
</font>
<o:p></o:p></p>

</div>

</div>

</body>

</html>

------=_NextPart_000_0E75_01C545DF.6A7F7A50--


--===============1864781054==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============1864781054==--




From ecrit-bounces@ietf.org Wed Apr 20 21:13:32 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQG4-0005et-0z; Wed, 20 Apr 2005 21:13:32 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQG2-0005ei-Cv; Wed, 20 Apr 2005 21:13:30 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA16666;
	Wed, 20 Apr 2005 21:13:28 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQRM-0007Cu-3T; Wed, 20 Apr 2005 21:25:12 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3L1Cte01152; Wed, 20 Apr 2005 20:12:56 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ243810>; Thu, 21 Apr 2005 11:11:05 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102F7478@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Henning Schulzrinne <hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Int
	erim Meeting
Date: Thu, 21 Apr 2005 11:11:06 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.5 (/)
X-Scan-Signature: cd26b070c2577ac175cd3a6d878c6248
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============2128908433=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============2128908433==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C5460E.FE55D894"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C5460E.FE55D894
Content-Type: text/plain

But Henning, not all applications do need to understand it, and it can be
included easily in XML.
This is simply not the case with DHCP.


-----Original Message-----
From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu] 
Sent: Thursday, 21 April 2005 9:17 AM
To: Winterbottom, James [WOLL:5500:EXCH]
Cc: Brian Rosen; peter_blatherwick@mitel.com; 'GEOPRIV WG'; ecrit@ietf.org
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
Interim Meeting


James Winterbottom wrote:
> I think that there is one other argument that also lends itself to the
> returning of the PIDF-LO rather than a layer 2 alternative, and that is 
> that the contents of PIDF-LO are very likely to change, largely with 
> things being added to them. To support these changes in PIDF-LO is 
> relatively easy, because XML is by its very nature extensible. It would 
> be difficult, and I would argue completely undesirable to have to change 
> myriad of layer 2 protocols to support a new attribute that has been 

This is bogus. We have essentially two layer-2 mechanisms that inherit 
the same name space. Registering and defining a new XML tag is no easier 
(or no more difficult) than registering a new DHCP numeric tag. Just 
because it's XML doesn't mean that magically all applications understand it.

------_=_NextPart_001_01C5460E.FE55D894
Content-Type: text/html

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=us-ascii">
<META NAME="Generator" CONTENT="MS Exchange Server version 5.5.2658.2">
<TITLE>RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=2>But Henning, not all applications do need to understand it, and it can be included easily in XML.</FONT>
<BR><FONT SIZE=2>This is simply not the case with DHCP.</FONT>
</P>
<BR>

<P><FONT SIZE=2>-----Original Message-----</FONT>
<BR><FONT SIZE=2>From: Henning Schulzrinne [<A HREF="mailto:hgs@cs.columbia.edu">mailto:hgs@cs.columbia.edu</A>] </FONT>
<BR><FONT SIZE=2>Sent: Thursday, 21 April 2005 9:17 AM</FONT>
<BR><FONT SIZE=2>To: Winterbottom, James [WOLL:5500:EXCH]</FONT>
<BR><FONT SIZE=2>Cc: Brian Rosen; peter_blatherwick@mitel.com; 'GEOPRIV WG'; ecrit@ietf.org</FONT>
<BR><FONT SIZE=2>Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting</FONT>
</P>
<BR>

<P><FONT SIZE=2>James Winterbottom wrote:</FONT>
<BR><FONT SIZE=2>&gt; I think that there is one other argument that also lends itself to the</FONT>
<BR><FONT SIZE=2>&gt; returning of the PIDF-LO rather than a layer 2 alternative, and that is </FONT>
<BR><FONT SIZE=2>&gt; that the contents of PIDF-LO are very likely to change, largely with </FONT>
<BR><FONT SIZE=2>&gt; things being added to them. To support these changes in PIDF-LO is </FONT>
<BR><FONT SIZE=2>&gt; relatively easy, because XML is by its very nature extensible. It would </FONT>
<BR><FONT SIZE=2>&gt; be difficult, and I would argue completely undesirable to have to change </FONT>
<BR><FONT SIZE=2>&gt; myriad of layer 2 protocols to support a new attribute that has been </FONT>
</P>

<P><FONT SIZE=2>This is bogus. We have essentially two layer-2 mechanisms that inherit </FONT>
<BR><FONT SIZE=2>the same name space. Registering and defining a new XML tag is no easier </FONT>
<BR><FONT SIZE=2>(or no more difficult) than registering a new DHCP numeric tag. Just </FONT>
<BR><FONT SIZE=2>because it's XML doesn't mean that magically all applications understand it.</FONT>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C5460E.FE55D894--


--===============2128908433==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============2128908433==--




From ecrit-bounces@ietf.org Wed Apr 20 21:14:28 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQGy-0005jB-Ll; Wed, 20 Apr 2005 21:14:28 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQGx-0005j2-HB; Wed, 20 Apr 2005 21:14:27 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA16723;
	Wed, 20 Apr 2005 21:14:26 -0400 (EDT)
Message-Id: <200504210114.VAA16723@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQSG-0007Dr-Mw; Wed, 20 Apr 2005 21:26:10 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOQGk-0004n7-OY; Wed, 20 Apr 2005 20:14:15 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Michael Hammer \(mhammer\)'" <mhammer@cisco.com>,
	"'Henning Schulzrinne'" <hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Date: Wed, 20 Apr 2005 21:14:07 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <072C5B76F7CEAB488172C6F64B30B5E3113BD0@xmb-rtp-20b.amer.cisco.com>
Thread-Index: AcVF47FTZ5vdqlAKRYOS7WA4dGCh1QAGErGAAASGbsA=
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: ff03b0075c3fc728d7d60a15b4ee1ad2
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Yeah, you have the basic picture.

The issues are somewhat different for cable and DSL, but it's true that the
home router supplies DHCP, and would have to determine location from the
upstream network and relay it to downstream clients like a VoIP phone.

With cable, they really use DHCP, so the router, when it gets it's IP
address from the cablemodem can get location at the same time.
With cable, it's likely to map the cablemodem MAC address to the service
location.  The cable modem and home router would have to be updated to relay
location.

DSL doesn't use DHCP between the router/DSL modem and the DSL network to get
IP address, and they don't want to use DHCP for location.  They could use
any mechanism they would like to between the DSL modem/router and the DSL
network, if they would then use DHCP (which is how the clients get IP
address from the router) for location.  This requires an update to installed
DSL modem/routers.  They have a small, and decreasing number of cases where
the DSL modem is directly tied (via Ethernet) to PC.  In that case, they
have to supply special code for the PC to get an IP address.  They would
have to update this code with location reporting code.

Brian

> -----Original Message-----
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> Sent: Wednesday, April 20, 2005 7:13 PM
> To: Henning Schulzrinne
> Cc: Brian Rosen; peter_blatherwick@mitel.com; GEOPRIV WG; ecrit@ietf.org
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
> 
> Henning,
> 
> Thanks.  This is the sort of detail that I was hoping to stir up.
> 
> So, the first hop network needs to be the source of location
> information.  In my house that is my home network/router, which would
> seem to imply that it needs to acquire location into it somehow.  The
> router in turn pretends to be a PC and talks through the cable/DSL modem
> to an upstream server to get IP addresses and such.  Will my home router
> store and relay location information in the access SP?  This assumes
> that the location is provisioned into the cable/DSL system.
> 
> If I also remember some security mechanisms correctly, DHCP-spoofing is
> prevented by not allowing such traffic to go very far.  I wouldn't think
> that DHCP gets put into VPN tunnels, but I could be wrong.
> 
> Seems like there are several interfaces X protocol choices to work out
> here.
> 
> Thanks,
> Mike
> 
> >-----Original Message-----
> >From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu]
> >Sent: Wednesday, April 20, 2005 3:59 PM
> >To: Michael Hammer (mhammer)
> >Cc: Brian Rosen; peter_blatherwick@mitel.com; GEOPRIV WG;
> >ecrit@ietf.org
> >Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The basic problem for the end system is
> >
> >"Get the physically closest box that knows to tell me where I am"
> >
> >The core requirement is zero client configuration.
> >
> >L2 and DHCP mechanisms have the advantage that they usually
> >are as close as you're going to get. You can make this
> >indirect, i.e., have DHCP, PPP or L2 tell the client where to
> >get its address.
> 
> Or where to go to get location information via a L7 protocol?
> 
> >
> >L2 (LLDP-MED) has the advantage that the physical structure
> >ensures that I get the correct answer, without doing mappings.
> >Mappings are always subject to being out-of-date or ambiguous
> >or not have the right lookup-key information (e.g., real MAC
> >address, lost on its way through a router or MAC-spoofing
> >bridge). (This is even true for DHCP, where the DHCP server
> >may have to derive from switch port tracing where a device is,
> >which is subject to a variety of failure modes.)
> >
> >
> >Michael Hammer (mhammer) wrote:
> >> Brian,
> >>
> >> You describe the NENA phase i2 options, ESQK etc.  Your
> >routing element, I assume is doing session routing.
> >>
> >> The elements you detail are all (or would appear to be)
> >application-layer entities and the signaling hops are likewise
> >application-layer hops, not L2 hops (except for maybe the LIS-->EP).
> >>
> >> So, where is the L2 "dependency" coming from?
> >>
> >> I understand that a network node that is immediately
> >adjacent to the endpoint is most likely to know where the
> >other end of the link terminates, but does that force the
> >delivery protocol aspects of this to be a L2 issue?
> >>
> >> Each of the myriad link types carry IP packets, no?  And IP
> >packets can carry an application packet, no?  So, wouldn't the
> >application-layer solution be the more general one?  I thought
> >that was in line with IETF principles.
> >>
> >> You are probably just laying out the options, not promoting a
> >> particular one.  I would be interested in seeing what the
> >champions of
> >> one approach or another have to say.  (I did a search on
> >LLDP-MED and
> >> drew a blank.)
> >>
> >> Mike
> >>
> >
> 




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 21:22:34 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQOn-0006mS-SO; Wed, 20 Apr 2005 21:22:33 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQOl-0006mH-72; Wed, 20 Apr 2005 21:22:31 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA17568;
	Wed, 20 Apr 2005 21:22:29 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQa4-0007R5-Vd; Wed, 20 Apr 2005 21:34:14 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3L1MHe02028; Wed, 20 Apr 2005 20:22:18 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ2438GV>; Thu, 21 Apr 2005 11:22:01 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102F74C3@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Marc Linsner <mlinsner@cisco.com>
Date: Thu, 21 Apr 2005 11:22:02 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.7 (/)
X-Scan-Signature: ecc3a678f36d06d556925e6a5174d2ac
Cc: geopriv@ietf.org, ecrit@ietf.org
Subject: [Ecrit] RE: L2 vs. L7 Location Discover
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1283124613=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1283124613==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C54610.8565CEB0"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C54610.8565CEB0
Content-Type: text/plain

Hi Marc,
 
Please see comments in line.

-----Original Message-----
From: Marc Linsner [mailto:mlinsner@cisco.com] 
Sent: Thursday, 21 April 2005 9:30 AM
To: Winterbottom, James [WOLL:5500:EXCH]
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: L2 vs. L7 Location Discover



------note the subject change - it's an attempt to more accurately reflect
the topic------

 

James,

 

1) Are not complex shape definitions associated with TOA technology which is
associated with wireless?  I don't remember anyone advocating the use of
RFC3825 nor LLDP-MED for a complete wireless solution.  If fact, I know that
RFC3825 recommends using a yet-to-be-determined more exotic method for
passing location information to a wireless client. 

[ajw] Would you not agree that a single approach to location delivery is
more desirable than one per access technology? 

 

2) In the case of signing the pidf-lo, who is going to sign it when the data
is user derived (either user keyed or on-board gps)? 

[ajw] Please read the HELD draft, it goes into a great deal of explanation
on how this is possible. While there maybe other problems in HELD, this one
is quite well addressed I believe.

 

3) There seems to be consensus that L1/L2 will, in all but user derived
mechanisms, be involved in location determination at some level.  Is it the
case that you are advocating that the L1/L2 infrastructure build and sign a
pidf-lo and forward to either the client or a L7 service somewhere in the
network? 

[ajw] ABSOLUTELY, this has always been my advocation. Location determination
is clearly layer 1 and layer 2, location delivery is not. I believe that it
is better to provide to the client the object that it plans to use, not
something that it needs to munge in order to be able to use. 

 

Just attempting to understand.......

 

-Marc-

 

 


  _____  


From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
James Winterbottom
Sent: Wednesday, April 20, 2005 5:55 PM
To: Brian Rosen; peter_blatherwick@mitel.com
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting

 

I think that there is one other argument that also lends itself to the
returning of the PIDF-LO rather than a layer 2 alternative, and that is that
the contents of PIDF-LO are very likely to change, largely with things being
added to them. To support these changes in PIDF-LO is relatively easy,
because XML is by its very nature extensible. It would be difficult, and I
would argue completely undesirable to have to change myriad of layer 2
protocols to support a new attribute that has been added to PIDF-LO. Case in
point is the provided-by parameter that is already there, another example
would be complex shape definitions, and also the signatures that Brian
describes below.

The problems that I see with the current layer 2 implementation are also
that they are essentially clones of one another with regards to what
information is conveyed, so if it is insufficient in one, or plain simply
wrong (and I am not saying that it is wrong), then the task to fix it is
large.

-----Original Message----- 
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org
<mailto:geopriv-bounces@ietf.org> ] On Behalf Of Brian Rosen 
Sent: Wednesday, 20 April 2005 11:54 PM 
To: peter_blatherwick@mitel.com 
Cc: 'GEOPRIV WG'; ecrit@ietf.org; 'Andrew Newton' 
Subject: RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting 

 

There turns out to be a large set of issues around this problem, which I
fear is leading to Balkanization.  There are two really important problems
we need to solve.

One fundamental problem is that every client needs to implement every
possible LI transfer mechanism that its environment could provide.

We have DHCP.  You guys are working on LLDP-MED.   The DSL guys reject both 
of these and want a something else.  Every phone has to implement every
protocol. 

There are some who have observed that the mechanisms at hand are L2
specific.  They claim as long as you have an L2 specific mechanism, you need
one or more for each L2.  To get out of that, they propose that we use an L7
mechanism (think some version of HTTP, although that might not fly).  They
would say, lets do that once, and every L2 can use it.  The problem is that
you then have to deal with the security issues of an L7 mechanism, and in
particular, you have to use IP address as the "key" for what location to
return.  If you can spoof IP address, you can get someone else's location.  

Those advocating L7 mechanisms claim that the mechanism would only be
implemented within a domain, and the domain would have to take anti-spoofing
steps.  They note that the mechanism would need at least a complete round
trip, and probably more than one, so spoofing requires the ability to

intercept packets not addressed to the attacker.   The returned data could 
be precisely a PIDF-LO. 

Then on top of that, we turn out to need some more security, especially for
emergency calls.  We need to prevent forged locations.  That means we need
to sign the PIDF-LO.  If you get location via DHCP, or LLDP-MED, and the
endpoint constructs a PIDF-LO from that, how do we construct a signature
from the entity that actually determined location?

Brian 

 

________________________________________ 
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org
<mailto:geopriv-bounces@ietf.org> ] On Behalf Of peter_blatherwick@mitel.com

Sent: Wednesday, April 20, 2005 9:30 AM 
To: Andrew Newton 
Cc: GEOPRIV WG; ecrit@ietf.org 
Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim Meeting 

 

Hi Andrew, lists,   

I'd like to better understand the meaning of the following agenda items: 
  " 
  2) Properties of network elements in transferring LI from layer 2 
 upward to PIDF-LO. 
 3) Proposed enhancements to PIDF-LO to support #2. 
 " 

Is there a summary of what these really mean, or examples of what the
outcome could be in terms of protocol or layer interactions?   

Reason I'm asking is I am deeply involved in a layer 2 approach which would
be able to deliver location information to endpoints from the L2 LAN
infrastructure they are connected to.  The work is going on in TIA and is
called Link Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED),
which is an extension of IEEE 802.1AB, specific to VoIP systems.  In
LLDP-MED, among several other things, we have specified ways to pass
equivalent data to the DHCP coordinate-based LCI (RFC 3825) and civic
location LCI (draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
believe).  We see this method of delivery as a non-competing alternative to
the DHCP-based approach, with the same end result to the overall ECS system
(the endpoint receives the exact same data), which has some advantages
particularly in enterprise deployment scenarios.  (The DHCP-based method has
advantages in different scenarios.)   I am Editor of thi s document, and it
is now in ballot process in TIA (more or less equivalent to Last Call in
IETF).   

Sorry, I expect I am suffering lack of context here, since I only joined the
list relatively recently.   

BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last Call and
in the RFC Editor's queue?  It seemed to have been settled on the list, and
waiting on AD action. 

-- Peter Blatherwick 

 

Andrew Newton <andy@hxr.us> 
Sent by: geopriv-bounces@ietf.org 
13.04.05 16:34 
        
        To:        GEOPRIV WG <geopriv@ietf.org> 
        cc:         
        Subject:        [Geopriv] Announcement of Joint GEOPRIV/ECRIT
Interim Meeting 

 

The GEOPRIV and ECRIT working groups will be holding a joint interim 
meeting. 

      What: Interim GEOPRIV/ECRIT meeting 
      When: 2005 May 16 08:30-17:30 
            2005 May 17 08:30-17:30 
            2005 May 18 08:30-17:30 
     Where: Columbia University 
            Dept. of Computer Science 
            450 Computer Science Bldg. 
            1214 Amsterdam Avenue (close to 120th St.) 
            New York, NY 10027 
Directions: http://www.cs.columbia.edu/directions.html
<http://www.cs.columbia.edu/directions.html>  
      Also: WiFi provided. 
            Teleconference to be provided. 
     Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
<http://www.cs.columbia.edu/~hgs/etc/hotels.html>  
            Early bookings recommended. 

Proposed GEOPRIV Agenda: 
  2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30 
1) Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in 
HTTP/HTML for web browsing. 
2) Properties of network elements in transferring LI from layer 2 
upward to PIDF-LO. 
3) Proposed enhancements to PIDF-LO to support #2. 

Proposed ECRIT Agenda: 
  2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30 
1) Emergency Call Routing Requirements 
2) Security and Threats Analysis 

_______________________________________________ 
Geopriv mailing list 
Geopriv@ietf.org 
https://www1.ietf.org/mailman/listinfo/geopriv
<https://www1.ietf.org/mailman/listinfo/geopriv>  

 

_______________________________________________ 
Geopriv mailing list 
Geopriv@ietf.org 
https://www1.ietf.org/mailman/listinfo/geopriv
<https://www1.ietf.org/mailman/listinfo/geopriv>  


------_=_NextPart_001_01C54610.8565CEB0
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<TITLE>Message</TITLE>

<META content=3D"MSHTML 6.00.2800.1498" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType=20
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags" =
name=3D"PostalCode"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
name=3D"Street"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
name=3D"State"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags" =
name=3D"address"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags" =
name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
downloadurl=3D"http://www.5iantlavalamp.com/" name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; =
}
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: blue; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: =
"Times New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: =
auto
}
SPAN.EmailStyle18 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
</STYLE>
</HEAD>
<BODY lang=3DEN-US vLink=3Dblue link=3Dblue>
<DIV><SPAN class=3D013361701-21042005><FONT face=3DArial =
color=3D#0000ff size=3D2>Hi=20
Marc,</FONT></SPAN></DIV>
<DIV><SPAN class=3D013361701-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D013361701-21042005><FONT face=3DArial =
color=3D#0000ff size=3D2>Please=20
see comments in line.</FONT></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
  <DIV></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr =
align=3Dleft><FONT=20
  face=3DTahoma size=3D2>-----Original Message-----<BR><B>From:</B> =
Marc Linsner=20
  [mailto:mlinsner@cisco.com] <BR><B>Sent:</B> Thursday, 21 April 2005 =
9:30=20
  AM<BR><B>To:</B> Winterbottom, James [WOLL:5500:EXCH]<BR><B>Cc:</B> =
'GEOPRIV=20
  WG'; ecrit@ietf.org<BR><B>Subject:</B> L2 vs. L7 Location=20
  Discover<BR><BR></FONT></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">------note =
the=20
  subject change - it's an attempt to more accurately reflect the=20
  topic------<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><o:p>&nbsp;=
</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">James,<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">1) Are not =
complex=20
  shape definitions associated with TOA technology which is associated =
with=20
  wireless? &nbsp;I don't remember anyone advocating the use of RFC3825 =
nor=20
  LLDP-MED for a complete wireless solution.&nbsp; If fact, I know that =
RFC3825=20
  recommends using a yet-to-be-determined more exotic method for =
passing=20
  location information to a wireless client.<FONT color=3D#0000ff><SPAN =

  class=3D013361701-21042005>&nbsp;</SPAN></FONT></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><FONT=20
  color=3D#0000ff><SPAN class=3D013361701-21042005>[ajw] Would you not =
agree that a=20
  single approach to location delivery is more desirable than one per =
access=20
  technology?&nbsp;</SPAN><o:p></o:p></FONT></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">2) In the =
case of=20
  signing the pidf-lo, who is going to sign it when the data is user =
derived=20
  (either user keyed or on-board gps)?<FONT color=3D#0000ff><SPAN=20
  class=3D013361701-21042005>&nbsp;</SPAN></FONT></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><FONT=20
  color=3D#0000ff><SPAN class=3D013361701-21042005>[ajw] Please read =
the HELD draft,=20
  it&nbsp;goes into a great deal of explanation on how this is=20
  possible.&nbsp;While there maybe other problems in HELD, this one is =
quite=20
  well addressed I believe.</SPAN></FONT></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">3) There =
seems to be=20
  consensus that L1/L2 will, in all but user derived mechanisms, be =
involved in=20
  location determination at some level. &nbsp;Is it the case that you =
are=20
  advocating that the L1/L2 infrastructure build and sign a pidf-lo and =
forward=20
  to either the client or a L7 service somewhere in the network?<FONT=20
  color=3D#0000ff><SPAN=20
  class=3D013361701-21042005>&nbsp;</SPAN></FONT></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT color=3Dnavy><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial"><FONT=20
  color=3D#0000ff><SPAN =
class=3D013361701-21042005>[ajw]&nbsp;ABSOLUTELY, this has=20
  always been my advocation. Location determination is clearly layer 1 =
and layer=20
  2, location delivery is not. I believe that it is better to provide =
to the=20
  client the object that it plans to use, not something that =
it&nbsp;needs to=20
  munge in order to be able to=20
  use.&nbsp;</SPAN><o:p></o:p></FONT></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Just =
attempting to=20
  understand.......<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">-Marc-<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: =
medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue =
1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
  <DIV>
  <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" =
align=3Dcenter><FONT=20
  face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
  <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
  </SPAN></FONT></DIV>
  <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">From:</SPAN></FONT></B><FONT=20
  face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">=20
  ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] <B><SPAN=20
  style=3D"FONT-WEIGHT: bold">On Behalf Of </SPAN></B>James=20
  Winterbottom<BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> =
Wednesday,=20
  April 20, 2005 5:55 PM<BR><B><SPAN style=3D"FONT-WEIGHT: =
bold">To:</SPAN></B>=20
  Brian Rosen; peter_blatherwick@mitel.com<BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Cc:</SPAN></B> 'GEOPRIV WG';=20
  ecrit@ietf.org<BR><B><SPAN style=3D"FONT-WEIGHT: =
bold">Subject:</SPAN></B>=20
  [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
  InterimMeeting</SPAN></FONT><o:p></o:p></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">I think=20
  that there is one other argument that also lends itself to the =
returning of=20
  the PIDF-LO rather than a layer 2 alternative, and that is that the =
contents=20
  of PIDF-LO are very likely to change, largely with things being added =
to them.=20
  To support these changes in PIDF-LO is relatively easy, because XML =
is by its=20
  very nature extensible. It would be difficult, and I would argue =
completely=20
  undesirable to have to change myriad of layer 2 protocols to support =
a new=20
  attribute that has been added to PIDF-LO. Case in point is the =
provided-by=20
  parameter that is already there, another example would be complex =
shape=20
  definitions, and also the signatures that Brian describes=20
  below.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The=20
  problems that I see with the current layer 2 implementation are also =
that they=20
  are essentially clones of one another with regards to what =
information is=20
  conveyed, so if it is insufficient in one, or plain simply wrong (and =
I am not=20
  saying that it is wrong), then the task to fix it is=20
  large.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">-----Original Message-----</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">From: =
geopriv-bounces@ietf.org [<A=20
  =
href=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org=
</A>] On=20
  Behalf Of Brian Rosen</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Sent: Wednesday, 20 April 2005 11:54 =
PM</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">To:=20
  peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Cc: 'GEOPRIV WG'; ecrit@ietf.org; 'Andrew=20
  Newton'</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Subject:=20
  RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim=20
  Meeting</SPAN></FONT> <o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">There=20
  turns out to be a large set of issues around this problem, which I =
fear is=20
  leading to Balkanization.&nbsp; There are two really important =
problems we=20
  need to solve.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">One=20
  fundamental problem is that every client needs to implement every =
possible LI=20
  transfer mechanism that its environment could=20
  provide.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">We have=20
  DHCP.&nbsp; You guys are working on LLDP-MED.&nbsp;&nbsp; The DSL =
guys reject=20
  both</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">of these and=20
  want a something else.&nbsp; Every phone has to implement every=20
  protocol.</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">There are=20
  some who have observed that the mechanisms at hand are L2 =
specific.&nbsp; They=20
  claim as long as you have an L2 specific mechanism, you need one or =
more for=20
  each L2.&nbsp; To get out of that, they propose that we use an L7 =
mechanism=20
  (think some version of HTTP, although that might not fly).&nbsp; They =
would=20
  say, lets do that once, and every L2 can use it.&nbsp; The problem is =
that you=20
  then have to deal with the security issues of an L7 mechanism, and in =

  particular, you have to use IP address as the "key" for what location =
to=20
  return.&nbsp; If you can spoof IP address, you can get someone else's =

  location.&nbsp; </SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Those=20
  advocating L7 mechanisms claim that the mechanism would only be =
implemented=20
  within a domain, and the domain would have to take anti-spoofing =
steps.&nbsp;=20
  They note that the mechanism would need at least a complete round =
trip, and=20
  probably more than one, so spoofing requires the ability=20
  to</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">intercept=20
  packets not addressed to the attacker.&nbsp;&nbsp; The returned data=20
  could</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">be=20
  precisely a PIDF-LO.</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Then on=20
  top of that, we turn out to need some more security, especially for =
emergency=20
  calls.&nbsp; We need to prevent forged locations.&nbsp; That means we =
need to=20
  sign the PIDF-LO.&nbsp; If you get location via DHCP, or LLDP-MED, =
and the=20
  endpoint constructs a PIDF-LO from that, how do we construct a =
signature from=20
  the entity that actually determined =
location?</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Brian</SPAN></FONT> <o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">________________________________________</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">From: =
geopriv-bounces@ietf.org=20
  [<A=20
  =
href=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org=
</A>] On=20
  Behalf Of peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Sent: Wednesday, April 20, 2005 9:30 =
AM</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">To: Andrew =
Newton</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Cc: GEOPRIV WG;=20
  ecrit@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Subject: Re: [Geopriv] Announcement of =
Joint=20
  GEOPRIV/ECRIT Interim Meeting</SPAN></FONT> <o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Hi=20
  Andrew, lists, &nbsp; </SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">I'd like=20
  to better understand the meaning of the following agenda items:=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp; "=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp; 2)=20
  Properties of network elements in transferring LI from layer 2=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;upward to=20
  PIDF-LO.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;3)=20
  Proposed enhancements to PIDF-LO to support #2.</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp;" =
</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Is there=20
  a summary of what these really mean, or examples of what the outcome =
could be=20
  in terms of protocol or layer interactions? &nbsp;=20
  </SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Reason=20
  I'm asking is I am deeply involved in a layer 2 approach which would =
be able=20
  to deliver location information to endpoints from the L2 LAN =
infrastructure=20
  they are connected to. &nbsp;The work is going on in TIA and is =
called Link=20
  Layer Discovery Protocol - Media Endpoint Discovery (LLDP-MED), which =
is an=20
  extension of IEEE 802.1AB, specific to VoIP systems. &nbsp;In =
LLDP-MED, among=20
  several other things, we have specified ways to pass equivalent data =
to the=20
  DHCP coordinate-based LCI (RFC 3825) and civic location LCI=20
  (draft-ietf-geopriv-dhcp-civil-05, in Last Call process I believe). =
&nbsp;We=20
  see this method of delivery as a non-competing alternative to the =
DHCP-based=20
  approach, with the same end result to the overall ECS system (the =
endpoint=20
  receives the exact same data), which has some advantages particularly =
in=20
  enterprise deployment scenarios. &nbsp;(The DHCP-based method has =
advantages=20
  in different scenarios.) &nbsp; I am Editor of thi s document, and it =
is now=20
  in ballot process in TIA (more or less equivalent to Last Call in =
IETF).=20
  &nbsp; </SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Sorry, I=20
  expect I am suffering lack of context here, since I only joined the =
list=20
  relatively recently. &nbsp; </SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">BTW, what=20
  is the state of geopriv-dhcp-civil? &nbsp;Is it now past Last Call =
and in the=20
  RFC Editor's queue? &nbsp;It seemed to have been settled on the list, =
and=20
  waiting on AD action. </SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">-- Peter=20
  Blatherwick </SPAN></FONT><o:p></o:p></P>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Times New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: =
12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Andrew=20
  Newton &lt;andy@hxr.us&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Sent by: geopriv-bounces@ietf.org=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">13.04.05 16:34=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp; &nbsp;=20
  &nbsp; &nbsp; </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; =
&nbsp; &nbsp;=20
  &nbsp;GEOPRIV WG &lt;geopriv@ietf.org&gt; </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; &nbsp; cc: &nbsp; =
&nbsp; &nbsp;=20
  &nbsp; </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;=20
  &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; &nbsp;[Geopriv]=20
  Announcement of Joint GEOPRIV/ECRIT Interim Meeting</SPAN></FONT>=20
  <o:p></o:p></P>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Times New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: =
12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The=20
  GEOPRIV and ECRIT working groups will be holding a joint interim=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">meeting.</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;=20
  &nbsp; &nbsp; What: Interim GEOPRIV/ECRIT meeting</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; When: =
2005 May 16=20
  08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
2005 May 17=20
  08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
2005 May 18=20
  08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp;Where: Columbia=20
  University</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;=20
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Dept. of Computer =
Science</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; =
&nbsp; &nbsp;=20
  &nbsp; &nbsp; 450 Computer Science Bldg.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
<st1:Street=20
  w:st=3D"on"><st1:address=20
  style=3D"BACKGROUND-POSITION: left bottom; BACKGROUND-IMAGE: =
url(res://ietag.dll/#34/#1001); BACKGROUND-REPEAT: repeat-x"=20
  w:st=3D"on">1214 Amsterdam Avenue</st1:address></st1:Street> (close =
to=20
  <st1:Street w:st=3D"on"><st1:address=20
  style=3D"BACKGROUND-POSITION: left bottom; BACKGROUND-IMAGE: =
url(res://ietag.dll/#34/#1001); BACKGROUND-REPEAT: repeat-x"=20
  w:st=3D"on">120th St.</st1:address></st1:Street>)</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;=20
  <st1:place w:st=3D"on"><st1:City w:st=3D"on">New York</st1:City>, =
<st1:State=20
  w:st=3D"on">NY</st1:State> <st1:PostalCode=20
  w:st=3D"on">10027</st1:PostalCode></st1:place></SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Directions: <A=20
  href=3D"http://www.cs.columbia.edu/directions.html"=20
  =
target=3D_blank>http://www.cs.columbia.edu/directions.html</A></SPAN></F=
ONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; =
&nbsp; Also: WiFi=20
  provided.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;=20
  &nbsp; &nbsp; &nbsp; &nbsp; &nbsp; Teleconference to be=20
  provided.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&nbsp;=20
  &nbsp; &nbsp;Hotel: <A =
href=3D"http://www.cs.columbia.edu/~hgs/etc/hotels.html"=20
  =
target=3D_blank>http://www.cs.columbia.edu/~hgs/etc/hotels.html</A></SPA=
N></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&nbsp; &nbsp; =
&nbsp; &nbsp;=20
  &nbsp; &nbsp; Early bookings recommended.</SPAN></FONT> =
<o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Proposed=20
  GEOPRIV Agenda:</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; 2005 May 16 08:30-17:30, 2005 May 17 =

  08:30-12:30</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">1)=20
  Role of HTTP as a transfer protocol for PIDF-LO vs. the use of LI in=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">HTTP/HTML for web=20
  browsing.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">2)=20
  Properties of network elements in transferring LI from layer 2=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">upward to=20
  PIDF-LO.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">3)=20
  Proposed enhancements to PIDF-LO to support #2.</SPAN></FONT> =
<o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">Proposed=20
  ECRIT Agenda:</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&nbsp; 2005 May 17 13:30-17:30, 2005 May 18 =

  08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">1)=20
  Emergency Call Routing Requirements</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">2) Security and Threats =
Analysis</SPAN></FONT>=20
  <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">_______________________________________________</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Geopriv mailing=20
  list</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Geopriv@ietf.org</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt"><A=20
  href=3D"https://www1.ietf.org/mailman/listinfo/geopriv"=20
  =
target=3D_blank>https://www1.ietf.org/mailman/listinfo/geopriv</A></SPAN=
></FONT>=20
  <o:p></o:p></P>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Times New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: =
12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">_______________________________________________</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Geopriv mailing=20
  list</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Geopriv@ietf.org</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt"><A=20
  href=3D"https://www1.ietf.org/mailman/listinfo/geopriv"=20
  =
target=3D_blank>https://www1.ietf.org/mailman/listinfo/geopriv</A></SPAN=
></FONT>=20
  <o:p></o:p></P></DIV></DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C54610.8565CEB0--


--===============1283124613==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============1283124613==--




From ecrit-bounces@ietf.org Wed Apr 20 21:27:49 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQTt-0007Ov-0J; Wed, 20 Apr 2005 21:27:49 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQTq-0007On-UP; Wed, 20 Apr 2005 21:27:46 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA17859;
	Wed, 20 Apr 2005 21:27:45 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQfA-0007Wt-Ko; Wed, 20 Apr 2005 21:39:29 -0400
Received: from [127.0.0.1]
	(IDENT:U2FsdGVkX1+kQEI+YceqPXLggeCPh1q/Zgzq33fKcuw@razor.cs.columbia.edu
	[128.59.16.8]) (authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3L1Rch3028242
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 21:27:40 -0400 (EDT)
Message-ID: <4267017B.2090809@cs.columbia.edu>
Date: Wed, 20 Apr 2005 21:27:23 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
Organization: Columbia University
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
References: <200504210114.j3L1ELqt004067@cs.columbia.edu>
In-Reply-To: <200504210114.j3L1ELqt004067@cs.columbia.edu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d17f825e43c9aed4fd65b7edddddec89
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Brian Rosen wrote:
>
> DSL doesn't use DHCP between the router/DSL modem and the DSL network to get
> IP address, and they don't want to use DHCP for location.  They could use

Since they use PPPoE and assign addresses using PPP, couldn't they just 
add a location option to PPP, in the same format as for DHCP?

It already conveys other information, such as the DNS server.

(http://www.networksorcery.com/enp/protocol/IPCP.htm)

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 21:35:25 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQbF-0008Dg-ET; Wed, 20 Apr 2005 21:35:25 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQbE-0008DY-2b; Wed, 20 Apr 2005 21:35:24 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA18405;
	Wed, 20 Apr 2005 21:35:20 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQmV-0007hU-Vr; Wed, 20 Apr 2005 21:47:04 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3L1YZe03110; Wed, 20 Apr 2005 20:34:36 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ24382D>; Thu, 21 Apr 2005 11:33:45 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102F7504@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Brian Rosen <br@brianrosen.net>, "'Henning Schulzrinne'"
	<hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT	Int
	erimMeeting
Date: Thu, 21 Apr 2005 11:33:45 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.5 (/)
X-Scan-Signature: 142a000676f5977e1797396caab8b611
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0034785235=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0034785235==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C54612.28B76370"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C54612.28B76370
Content-Type: text/plain

I think that you are missing something here.
You are making the assumption that L7 is only used to retrieve location
after the VPN tunnel has been established, I fail to see why this has to be
the case. It could just as easily be retrieved from the local network prior
to the tunnel being established and so this presents no more difficulty for
VPNs and softclients than a layer 2 delivered solution.



-----Original Message-----
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
Brian Rosen
Sent: Thursday, 21 April 2005 6:19 AM
To: 'Henning Schulzrinne'
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting


I'm having some off line discussions that lead me to the following:

If you have a box that opens a VPN tunnel on the raw Internet connection
that feeds a LAN that has endpoints, and passes ALL LAN traffic through the
tunnel, you are hosed.  The box has to be location aware in some way.  This
is because there is no way, L2 or L7, that you can get a packet to anything
that knows about the location; the box is forcing everything through the
tunnel.  The box is physically between the uplink and the LAN, and you can't
go around it.  The box has to do something that lets you get at the right
LIS.

If the box supplies IP addresses (it's the DHCP server), then it only has to
relay the location option.

If the box doesn't supply addresses, it would have to run something that
either the client could access, or something the DHCP server would access.
We have no solutions.

L7 doesn't help; the box has to do something that would allow you to get to
the local LIS, with the boxe's public IP address.

Softclients are much easier, because the system can get location before the
tunnel is established.  Tunnels downstream of the local infrastructure are
problematic for L7, but not for L2.

This is bad news.  All the boxes have to change.  If we have to change all
the softclients for L7, is that a big enough reason to not use L7?

Hmmm.  I don't know enough about how the boxes work.  To make DHCP work with
the DHCP server in the corporate network, not in the box, the box has to
pass the DHCP packets; they aren't IP packets.  Does that mean it's always a
DHCP relay?  That would help.  The boxes have to change, but if they are
already doing DHCP relay, adding the location option would be the least
amount of work.

I keep hoping I've missed something here.

Brian

> -----Original Message-----
> From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu]
> Sent: Wednesday, April 20, 2005 3:48 PM
> To: Brian Rosen
> Cc: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV 
> WG'; ecrit@ietf.org
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> InterimMeeting
> 
> There are at least two separate sets of issues that depend on the 
> architecture, and it seems dangerous to conflate the two:
> 
> (First-person) I get my own location from a server. This makes address 
> spoofing more difficult, with return routability. Drawback: If I'm 
> behind a NAT, and the location server isn't, this works only if the IP 
> address in the IP packet is used, not something in the query. VPNs 
> should not be a big deal here.
> 
> (Third-person) I ask for an address for an IP address. Address 
> spoofing and VPN issues matter, possibly NAT issues (since the IP 
> address I get may be a NAT address, given the typical circles of NAT 
> hell in various
> networks.)
> 
> I think first-person is much more palatable than third-person.
> 
> Brian Rosen wrote:
> > "Routing" in this context is session (SIP) routing, as you 
> > suspected.
> >
> > The first hop (LIS to endpoint) is what we are discussing. DHCP is 
> > not an L3+ protocol.  Neither is LLDP-MED.
> >
> > The thread has discussed a number of problems with an L7 mechanism, 
> > but laying them out:
> >
> > 1. You are subject to IP address spoofing (albeit you need to be 
> > able to
> get
> > the packets sent from the LIS to the IP address you are spoofing)
> >
> > 2. VPN or other tunnels may have been created before you run this
> protocol.
> > That will cause a failure; you need the location corresponding to 
> > the original "outermost" IP address.
> >
> > 3. It is difficult to control the security (beyond IP spoofing) 
> > because
> you
> > don't have a generally good authentication mechanism.  This is a 
> > bare
> phone,
> > or equivalent, during its boot phase.
> >
> > There are probably others as well.  2) is the real problem.
> >
> > Brian
> 




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

------_=_NextPart_001_01C54612.28B76370
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2//EN">
<HTML>
<HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<META NAME=3D"Generator" CONTENT=3D"MS Exchange Server version =
5.5.2658.2">
<TITLE>RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT	=
InterimMeeting</TITLE>
</HEAD>
<BODY>

<P><FONT SIZE=3D2>I think that you are missing something here.</FONT>
<BR><FONT SIZE=3D2>You are making the assumption that L7 is only used =
to retrieve location after the VPN tunnel has been established, I fail =
to see why this has to be the case. It could just as easily be =
retrieved from the local network prior to the tunnel being established =
and so this presents no more difficulty for VPNs and softclients than a =
layer 2 delivered solution.</FONT></P>
<BR>
<BR>

<P><FONT SIZE=3D2>-----Original Message-----</FONT>
<BR><FONT SIZE=3D2>From: ecrit-bounces@ietf.org [<A =
HREF=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</A>=
] On Behalf Of Brian Rosen</FONT>
<BR><FONT SIZE=3D2>Sent: Thursday, 21 April 2005 6:19 AM</FONT>
<BR><FONT SIZE=3D2>To: 'Henning Schulzrinne'</FONT>
<BR><FONT SIZE=3D2>Cc: 'GEOPRIV WG'; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of =
Joint GEOPRIV/ECRIT InterimMeeting</FONT>
</P>
<BR>

<P><FONT SIZE=3D2>I'm having some off line discussions that lead me to =
the following:</FONT>
</P>

<P><FONT SIZE=3D2>If you have a box that opens a VPN tunnel on the raw =
Internet connection that feeds a LAN that has endpoints, and passes ALL =
LAN traffic through the tunnel, you are hosed.&nbsp; The box has to be =
location aware in some way.&nbsp; This is because there is no way, L2 =
or L7, that you can get a packet to anything that knows about the =
location; the box is forcing everything through the tunnel.&nbsp; The =
box is physically between the uplink and the LAN, and you can't go =
around it.&nbsp; The box has to do something that lets you get at the =
right LIS.</FONT></P>

<P><FONT SIZE=3D2>If the box supplies IP addresses (it's the DHCP =
server), then it only has to relay the location option.</FONT>
</P>

<P><FONT SIZE=3D2>If the box doesn't supply addresses, it would have to =
run something that either the client could access, or something the =
DHCP server would access. We have no solutions.</FONT></P>

<P><FONT SIZE=3D2>L7 doesn't help; the box has to do something that =
would allow you to get to the local LIS, with the boxe's public IP =
address.</FONT></P>

<P><FONT SIZE=3D2>Softclients are much easier, because the system can =
get location before the tunnel is established.&nbsp; Tunnels downstream =
of the local infrastructure are problematic for L7, but not for =
L2.</FONT></P>

<P><FONT SIZE=3D2>This is bad news.&nbsp; All the boxes have to =
change.&nbsp; If we have to change all the softclients for L7, is that =
a big enough reason to not use L7?</FONT></P>

<P><FONT SIZE=3D2>Hmmm.&nbsp; I don't know enough about how the boxes =
work.&nbsp; To make DHCP work with the DHCP server in the corporate =
network, not in the box, the box has to pass the DHCP packets; they =
aren't IP packets.&nbsp; Does that mean it's always a DHCP relay?&nbsp; =
That would help.&nbsp; The boxes have to change, but if they are =
already doing DHCP relay, adding the location option would be the least =
amount of work.</FONT></P>

<P><FONT SIZE=3D2>I keep hoping I've missed something here.</FONT>
</P>

<P><FONT SIZE=3D2>Brian</FONT>
</P>

<P><FONT SIZE=3D2>&gt; -----Original Message-----</FONT>
<BR><FONT SIZE=3D2>&gt; From: Henning Schulzrinne [<A =
HREF=3D"mailto:hgs@cs.columbia.edu">mailto:hgs@cs.columbia.edu</A>]</FON=
T>
<BR><FONT SIZE=3D2>&gt; Sent: Wednesday, April 20, 2005 3:48 PM</FONT>
<BR><FONT SIZE=3D2>&gt; To: Brian Rosen</FONT>
<BR><FONT SIZE=3D2>&gt; Cc: 'Michael Hammer (mhammer)'; =
peter_blatherwick@mitel.com; 'GEOPRIV </FONT>
<BR><FONT SIZE=3D2>&gt; WG'; ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2>&gt; Subject: Re: [Ecrit] RE: [Geopriv] Announcement =
of Joint GEOPRIV/ECRIT </FONT>
<BR><FONT SIZE=3D2>&gt; InterimMeeting</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; There are at least two separate sets of issues =
that depend on the </FONT>
<BR><FONT SIZE=3D2>&gt; architecture, and it seems dangerous to =
conflate the two:</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; (First-person) I get my own location from a =
server. This makes address </FONT>
<BR><FONT SIZE=3D2>&gt; spoofing more difficult, with return =
routability. Drawback: If I'm </FONT>
<BR><FONT SIZE=3D2>&gt; behind a NAT, and the location server isn't, =
this works only if the IP </FONT>
<BR><FONT SIZE=3D2>&gt; address in the IP packet is used, not something =
in the query. VPNs </FONT>
<BR><FONT SIZE=3D2>&gt; should not be a big deal here.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; (Third-person) I ask for an address for an IP =
address. Address </FONT>
<BR><FONT SIZE=3D2>&gt; spoofing and VPN issues matter, possibly NAT =
issues (since the IP </FONT>
<BR><FONT SIZE=3D2>&gt; address I get may be a NAT address, given the =
typical circles of NAT </FONT>
<BR><FONT SIZE=3D2>&gt; hell in various</FONT>
<BR><FONT SIZE=3D2>&gt; networks.)</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; I think first-person is much more palatable =
than third-person.</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
<BR><FONT SIZE=3D2>&gt; Brian Rosen wrote:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; &quot;Routing&quot; in this context is =
session (SIP) routing, as you </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; suspected.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; The first hop (LIS to endpoint) is what we =
are discussing. DHCP is </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; not an L3+ protocol.&nbsp; Neither is =
LLDP-MED.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; The thread has discussed a number of =
problems with an L7 mechanism, </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; but laying them out:</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; 1. You are subject to IP address spoofing =
(albeit you need to be </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; able to</FONT>
<BR><FONT SIZE=3D2>&gt; get</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the packets sent from the LIS to the IP =
address you are spoofing)</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; 2. VPN or other tunnels may have been =
created before you run this</FONT>
<BR><FONT SIZE=3D2>&gt; protocol.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; That will cause a failure; you need the =
location corresponding to </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; the original &quot;outermost&quot; IP =
address.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; 3. It is difficult to control the security =
(beyond IP spoofing) </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; because</FONT>
<BR><FONT SIZE=3D2>&gt; you</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; don't have a generally good authentication =
mechanism.&nbsp; This is a </FONT>
<BR><FONT SIZE=3D2>&gt; &gt; bare</FONT>
<BR><FONT SIZE=3D2>&gt; phone,</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; or equivalent, during its boot =
phase.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; There are probably others as well.&nbsp; =
2) is the real problem.</FONT>
<BR><FONT SIZE=3D2>&gt; &gt;</FONT>
<BR><FONT SIZE=3D2>&gt; &gt; Brian</FONT>
<BR><FONT SIZE=3D2>&gt; </FONT>
</P>
<BR>
<BR>
<BR>

<P><FONT =
SIZE=3D2>_______________________________________________</FONT>
<BR><FONT SIZE=3D2>Ecrit mailing list</FONT>
<BR><FONT SIZE=3D2>Ecrit@ietf.org</FONT>
<BR><FONT SIZE=3D2><A =
HREF=3D"https://www1.ietf.org/mailman/listinfo/ecrit" =
TARGET=3D"_blank">https://www1.ietf.org/mailman/listinfo/ecrit</A></FONT=
>
</P>

</BODY>
</HTML>
------_=_NextPart_001_01C54612.28B76370--


--===============0034785235==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0034785235==--




From ecrit-bounces@ietf.org Wed Apr 20 21:35:39 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQbT-0008Ef-Ta; Wed, 20 Apr 2005 21:35:39 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQbT-0008EX-BL; Wed, 20 Apr 2005 21:35:39 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA18423;
	Wed, 20 Apr 2005 21:35:37 -0400 (EDT)
Message-Id: <200504210135.VAA18423@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQmo-0007ho-4U; Wed, 20 Apr 2005 21:47:22 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOQbJ-0006Ww-45; Wed, 20 Apr 2005 20:35:29 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Henning Schulzrinne'" <hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Date: Wed, 20 Apr 2005 21:35:22 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <4267017B.2090809@cs.columbia.edu>
Thread-Index: AcVGEVCRkaxKRVdEQcyMmL9zHu3W4AAAJF2A
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: e5ba305d0e64821bf3d8bc5d3bb07228
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Actually, there are quite a few ways that DSL systems work, and they don't
always use PPP.  It would work for many deployments, but not all.

Brian

> -----Original Message-----
> From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu]
> Sent: Wednesday, April 20, 2005 9:27 PM
> To: Brian Rosen
> Cc: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV WG';
> ecrit@ietf.org
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
> 
> Brian Rosen wrote:
> >
> > DSL doesn't use DHCP between the router/DSL modem and the DSL network to
> get
> > IP address, and they don't want to use DHCP for location.  They could
> use
> 
> Since they use PPPoE and assign addresses using PPP, couldn't they just
> add a location option to PPP, in the same format as for DHCP?
> 
> It already conveys other information, such as the DNS server.
> 
> (http://www.networksorcery.com/enp/protocol/IPCP.htm)
> 




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 21:40:03 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQfj-00009z-7K; Wed, 20 Apr 2005 21:40:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQfh-00009l-Fu; Wed, 20 Apr 2005 21:40:01 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA18791;
	Wed, 20 Apr 2005 21:39:59 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQr2-0007oa-9t; Wed, 20 Apr 2005 21:51:44 -0400
Received: from [127.0.0.1]
	(IDENT:U2FsdGVkX186UNhdsUwkcsgYz0bQqqSHu3jBlFRT5/A@razor.cs.columbia.edu
	[128.59.16.8]) (authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3L1dth3028775
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Wed, 20 Apr 2005 21:39:56 -0400 (EDT)
Message-ID: <42670459.9010905@cs.columbia.edu>
Date: Wed, 20 Apr 2005 21:39:37 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
Organization: Columbia University
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
References: <200504210135.j3L1ZZqt007209@cs.columbia.edu>
In-Reply-To: <200504210135.j3L1ZZqt007209@cs.columbia.edu>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8ac499381112328dd60aea5b1ff596ea
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Brian Rosen wrote:
> Actually, there are quite a few ways that DSL systems work, and they don't
> always use PPP.  It would work for many deployments, but not all.

I've only seen DHCP or PPP (for PPPoE) systems for IP address assignment 
in DSL. What else is there?

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Wed Apr 20 21:46:07 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQlb-0001F2-GR; Wed, 20 Apr 2005 21:46:07 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQlZ-0001Eu-SQ; Wed, 20 Apr 2005 21:46:06 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA19282;
	Wed, 20 Apr 2005 21:46:04 -0400 (EDT)
Message-Id: <200504210146.VAA19282@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQwu-0007yf-51; Wed, 20 Apr 2005 21:57:48 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOQlM-0007Va-BK; Wed, 20 Apr 2005 20:45:53 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'James Winterbottom'" <winterb@nortel.com>,
	"'Henning Schulzrinne'" <hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Date: Wed, 20 Apr 2005 21:45:45 -0400
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <C0FA66CBDDF5D411B82E00508BE3A722102F7504@zctwc059.asiapac.nortel.com>
Thread-Index: AcVGEkkeKe7oHjr7Sh2wfEgfYBwkYgAAHsMw
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.6 (/)
X-Scan-Signature: 1fb4c76a9d88e8fb8b791f63f8d1b07f
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1053526964=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This is a multi-part message in MIME format.

--===============1053526964==
Content-Type: multipart/alternative;
	boundary="----=_NextPart_000_0116_01C545F2.4F74BD20"

This is a multi-part message in MIME format.

------=_NextPart_000_0116_01C545F2.4F74BD20
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit

The box can run the protocol, be it layer 2 or 7 any time; it has access to
the uplink.

A downstream endpoint can't do that.  It can't get location before the
tunnel is created because the box doesn't pass traffic until the tunnel is
created.

The problem we're discussing is something like an IPsec appliance; a box
physically between the uplink and the local LAN that creates the tunnel when
it initializes and doesn't allow any traffic other than that which goes
through the tunnel.  There are variations on such boxes; you can configure
some of them to allow access outside the tunnel for some things.  Most of
them, I'm told, are DHCP relays at least.

 

Brian

 

  _____  

From: James Winterbottom [mailto:winterb@nortel.com] 
Sent: Wednesday, April 20, 2005 9:34 PM
To: Brian Rosen; 'Henning Schulzrinne'
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting

 

I think that you are missing something here. 
You are making the assumption that L7 is only used to retrieve location
after the VPN tunnel has been established, I fail to see why this has to be
the case. It could just as easily be retrieved from the local network prior
to the tunnel being established and so this presents no more difficulty for
VPNs and softclients than a layer 2 delivered solution.

 

-----Original Message----- 
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
Brian Rosen 
Sent: Thursday, 21 April 2005 6:19 AM 
To: 'Henning Schulzrinne' 
Cc: 'GEOPRIV WG'; ecrit@ietf.org 
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting 

 

I'm having some off line discussions that lead me to the following: 

If you have a box that opens a VPN tunnel on the raw Internet connection
that feeds a LAN that has endpoints, and passes ALL LAN traffic through the
tunnel, you are hosed.  The box has to be location aware in some way.  This
is because there is no way, L2 or L7, that you can get a packet to anything
that knows about the location; the box is forcing everything through the
tunnel.  The box is physically between the uplink and the LAN, and you can't
go around it.  The box has to do something that lets you get at the right
LIS.

If the box supplies IP addresses (it's the DHCP server), then it only has to
relay the location option. 

If the box doesn't supply addresses, it would have to run something that
either the client could access, or something the DHCP server would access.
We have no solutions.

L7 doesn't help; the box has to do something that would allow you to get to
the local LIS, with the boxe's public IP address.

Softclients are much easier, because the system can get location before the
tunnel is established.  Tunnels downstream of the local infrastructure are
problematic for L7, but not for L2.

This is bad news.  All the boxes have to change.  If we have to change all
the softclients for L7, is that a big enough reason to not use L7?

Hmmm.  I don't know enough about how the boxes work.  To make DHCP work with
the DHCP server in the corporate network, not in the box, the box has to
pass the DHCP packets; they aren't IP packets.  Does that mean it's always a
DHCP relay?  That would help.  The boxes have to change, but if they are
already doing DHCP relay, adding the location option would be the least
amount of work.

I keep hoping I've missed something here. 

Brian 

> -----Original Message----- 
> From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu] 
> Sent: Wednesday, April 20, 2005 3:48 PM 
> To: Brian Rosen 
> Cc: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV 
> WG'; ecrit@ietf.org 
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> InterimMeeting 
> 
> There are at least two separate sets of issues that depend on the 
> architecture, and it seems dangerous to conflate the two: 
> 
> (First-person) I get my own location from a server. This makes address 
> spoofing more difficult, with return routability. Drawback: If I'm 
> behind a NAT, and the location server isn't, this works only if the IP 
> address in the IP packet is used, not something in the query. VPNs 
> should not be a big deal here. 
> 
> (Third-person) I ask for an address for an IP address. Address 
> spoofing and VPN issues matter, possibly NAT issues (since the IP 
> address I get may be a NAT address, given the typical circles of NAT 
> hell in various 
> networks.) 
> 
> I think first-person is much more palatable than third-person. 
> 
> Brian Rosen wrote: 
> > "Routing" in this context is session (SIP) routing, as you 
> > suspected. 
> > 
> > The first hop (LIS to endpoint) is what we are discussing. DHCP is 
> > not an L3+ protocol.  Neither is LLDP-MED. 
> > 
> > The thread has discussed a number of problems with an L7 mechanism, 
> > but laying them out: 
> > 
> > 1. You are subject to IP address spoofing (albeit you need to be 
> > able to 
> get 
> > the packets sent from the LIS to the IP address you are spoofing) 
> > 
> > 2. VPN or other tunnels may have been created before you run this 
> protocol. 
> > That will cause a failure; you need the location corresponding to 
> > the original "outermost" IP address. 
> > 
> > 3. It is difficult to control the security (beyond IP spoofing) 
> > because 
> you 
> > don't have a generally good authentication mechanism.  This is a 
> > bare 
> phone, 
> > or equivalent, during its boot phase. 
> > 
> > There are probably others as well.  2) is the real problem. 
> > 
> > Brian 
> 





_______________________________________________ 
Ecrit mailing list 
Ecrit@ietf.org 
https://www1.ietf.org/mailman/listinfo/ecrit 


------=_NextPart_000_0116_01C545F2.4F74BD20
Content-Type: text/html;
	charset="US-ASCII"
Content-Transfer-Encoding: quoted-printable

<html xmlns:v=3D"urn:schemas-microsoft-com:vml" =
xmlns:o=3D"urn:schemas-microsoft-com:office:office" =
xmlns:w=3D"urn:schemas-microsoft-com:office:word" =
xmlns:st1=3D"urn:schemas-microsoft-com:office:smarttags" =
xmlns=3D"http://www.w3.org/TR/REC-html40">

<head>
<meta http-equiv=3DContent-Type content=3D"text/html; =
charset=3Dus-ascii">
<meta name=3DGenerator content=3D"Microsoft Word 11 (filtered medium)">
<!--[if !mso]>
<style>
v\:* {behavior:url(#default#VML);}
o\:* {behavior:url(#default#VML);}
w\:* {behavior:url(#default#VML);}
.shape {behavior:url(#default#VML);}
</style>
<![endif]-->
<title>RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting</title>
<o:SmartTagType =
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"
 name=3D"PersonName" downloadurl=3D"http://www.microsoft.com"/>
<!--[if !mso]>
<style>
st1\:*{behavior:url(#default#ieooui) }
</style>
<![endif]-->
<style>
<!--
 /* Font Definitions */
 @font-face
	{font-family:Tahoma;
	panose-1:2 11 6 4 3 5 4 4 2 4;}
 /* Style Definitions */
 p.MsoNormal, li.MsoNormal, div.MsoNormal
	{margin:0in;
	margin-bottom:.0001pt;
	font-size:12.0pt;
	font-family:"Times New Roman";}
a:link, span.MsoHyperlink
	{color:blue;
	text-decoration:underline;}
a:visited, span.MsoHyperlinkFollowed
	{color:blue;
	text-decoration:underline;}
p
	{mso-margin-top-alt:auto;
	margin-right:0in;
	mso-margin-bottom-alt:auto;
	margin-left:0in;
	font-size:12.0pt;
	font-family:"Times New Roman";}
span.EmailStyle18
	{mso-style-type:personal-reply;
	font-family:Arial;
	color:navy;}
@page Section1
	{size:8.5in 11.0in;
	margin:1.0in 1.25in 1.0in 1.25in;}
div.Section1
	{page:Section1;}
-->
</style>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]-->
</head>

<body lang=3DEN-US link=3Dblue vlink=3Dblue>

<div class=3DSection1>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>The box can run the protocol, be it =
layer
2 or 7 any time; it has access to the =
uplink.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>A downstream endpoint can&#8217;t =
do
that.&nbsp; It can&#8217;t get location before the tunnel is created =
because
the box doesn&#8217;t pass traffic until the tunnel is =
created.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>The problem we&#8217;re discussing =
is
something like an IPsec appliance; a box physically between the uplink =
and the
local LAN that creates the tunnel when it initializes and doesn&#8217;t =
allow
any traffic other than that which goes through the tunnel.&nbsp; There =
are
variations on such boxes; you can configure some of them to allow access
outside the tunnel for some things.&nbsp; Most of them, I&#8217;m told, =
are
DHCP relays at least.<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'>Brian<o:p></o:p></span></font></p>

<p class=3DMsoNormal><font size=3D2 color=3Dnavy face=3DArial><span =
style=3D'font-size:
10.0pt;font-family:Arial;color:navy'><o:p>&nbsp;</o:p></span></font></p>

<div style=3D'border:none;border-left:solid blue 1.5pt;padding:0in 0in =
0in 4.0pt'>

<div>

<div class=3DMsoNormal align=3Dcenter style=3D'text-align:center'><font =
size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'>

<hr size=3D2 width=3D"100%" align=3Dcenter tabindex=3D-1>

</span></font></div>

<p class=3DMsoNormal><b><font size=3D2 face=3DTahoma><span =
style=3D'font-size:10.0pt;
font-family:Tahoma;font-weight:bold'>From:</span></font></b><font =
size=3D2
face=3DTahoma><span style=3D'font-size:10.0pt;font-family:Tahoma'> =
<st1:PersonName
w:st=3D"on">James Winterbottom</st1:PersonName> =
[mailto:winterb@nortel.com] <br>
<b><span style=3D'font-weight:bold'>Sent:</span></b> Wednesday, April =
20, 2005
9:34 PM<br>
<b><span style=3D'font-weight:bold'>To:</span></b> Brian Rosen; 'Henning
Schulzrinne'<br>
<b><span style=3D'font-weight:bold'>Cc:</span></b> 'GEOPRIV WG'; =
ecrit@ietf.org<br>
<b><span style=3D'font-weight:bold'>Subject:</span></b> RE: [Ecrit] RE: =
[Geopriv]
Announcement of Joint GEOPRIV/ECRIT =
InterimMeeting</span></font><o:p></o:p></p>

</div>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>I think
that you are missing something here.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>You are making the =
assumption that
L7 is only used to retrieve location after the VPN tunnel has been =
established,
I fail to see why this has to be the case. It could just as easily be =
retrieved
from the local network prior to the tunnel being established and so this
presents no more difficulty for VPNs and softclients than a layer 2 =
delivered
solution.</span></font><o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span =
style=3D'font-size:12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>-----Original
Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>From: =
ecrit-bounces@ietf.org [<a
href=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</a>]=
 On
Behalf Of Brian Rosen</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>Sent: Thursday, 21 April =
2005 6:19
AM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>To: 'Henning =
Schulzrinne'</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Cc: 'GEOPRIV WG'; =
ecrit@ietf.org</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Subject: RE: [Ecrit] RE: =
[Geopriv]
Announcement of Joint GEOPRIV/ECRIT InterimMeeting</span></font> =
<o:p></o:p></p>

<p class=3DMsoNormal><font size=3D3 face=3D"Times New Roman"><span =
style=3D'font-size:
12.0pt'><o:p>&nbsp;</o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>I'm
having some off line discussions that lead me to the =
following:</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>If you
have a box that opens a VPN tunnel on the raw Internet connection that =
feeds a
LAN that has endpoints, and passes ALL LAN traffic through the tunnel, =
you are
hosed.&nbsp; The box has to be location aware in some way.&nbsp; This is
because there is no way, L2 or L7, that you can get a packet to anything =
that
knows about the location; the box is forcing everything through the =
tunnel.&nbsp;
The box is physically between the uplink and the LAN, and you can't go =
around
it.&nbsp; The box has to do something that lets you get at the right =
LIS.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>If the
box supplies IP addresses (it's the DHCP server), then it only has to =
relay the
location option.</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>If the
box doesn't supply addresses, it would have to run something that either =
the
client could access, or something the DHCP server would access. We have =
no
solutions.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>L7
doesn't help; the box has to do something that would allow you to get to =
the
local LIS, with the boxe's public IP =
address.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Softclients
are much easier, because the system can get location before the tunnel =
is
established.&nbsp; Tunnels downstream of the local infrastructure are
problematic for L7, but not for L2.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>This is
bad news.&nbsp; All the boxes have to change.&nbsp; If we have to change =
all
the softclients for L7, is that a big enough reason to not use =
L7?</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Hmmm.&nbsp;
I don't know enough about how the boxes work.&nbsp; To make DHCP work =
with the
DHCP server in the corporate network, not in the box, the box has to =
pass the
DHCP packets; they aren't IP packets.&nbsp; Does that mean it's always a =
DHCP
relay?&nbsp; That would help.&nbsp; The boxes have to change, but if =
they are
already doing DHCP relay, adding the location option would be the least =
amount
of work.</span></font><o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>I keep
hoping I've missed something here.</span></font> <o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>Brian</span></font>
<o:p></o:p></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>&gt;
-----Original Message-----</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; From: Henning =
Schulzrinne [<a
href=3D"mailto:hgs@cs.columbia.edu">mailto:hgs@cs.columbia.edu</a>]</span=
></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Sent: Wednesday, =
April 20,
2005 3:48 PM</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; To: Brian =
Rosen</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Cc: 'Michael Hammer
(mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; WG'; =
ecrit@ietf.org</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Subject: Re: =
[Ecrit] RE:
[Geopriv] Announcement of Joint GEOPRIV/ECRIT </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
InterimMeeting</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; There are at least =
two
separate sets of issues that depend on the </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; architecture, and =
it seems
dangerous to conflate the two:</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; (First-person) I =
get my own
location from a server. This makes address </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; spoofing more =
difficult, with
return routability. Drawback: If I'm </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; behind a NAT, and =
the location
server isn't, this works only if the IP </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; address in the IP =
packet is
used, not something in the query. VPNs </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; should not be a big =
deal here.</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; (Third-person) I =
ask for an
address for an IP address. Address </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; spoofing and VPN =
issues
matter, possibly NAT issues (since the IP </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; address I get may =
be a NAT
address, given the typical circles of NAT </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; hell in =
various</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
networks.)</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; I think =
first-person is much
more palatable than third-person.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; Brian Rosen =
wrote:</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; =
&quot;Routing&quot; in
this context is session (SIP) routing, as you </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; =
suspected.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; The first hop =
(LIS to
endpoint) is what we are discussing. DHCP is </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; not an L3+
protocol.&nbsp; Neither is LLDP-MED.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; The thread has =
discussed
a number of problems with an L7 mechanism, </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; but laying =
them out:</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; 1. You are =
subject to IP
address spoofing (albeit you need to be </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; able =
to</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; get</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; the packets =
sent from the
LIS to the IP address you are spoofing)</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; 2. VPN or =
other tunnels
may have been created before you run this</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
protocol.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; That will =
cause a
failure; you need the location corresponding to </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; the original
&quot;outermost&quot; IP address.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; 3. It is =
difficult to
control the security (beyond IP spoofing) </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; =
because</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; you</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; don't have a =
generally
good authentication mechanism.&nbsp; This is a </span></font><br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; =
bare</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
phone,</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; or equivalent, =
during its
boot phase.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; There are =
probably others
as well.&nbsp; 2) is the real problem.</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt;</span></font> =
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; &gt; =
Brian</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'>&gt; =
</span></font><o:p></o:p></p>

<p class=3DMsoNormal style=3D'margin-bottom:12.0pt'><font size=3D3
face=3D"Times New Roman"><span style=3D'font-size:12.0pt'><br>
<br>
<o:p></o:p></span></font></p>

<p><font size=3D2 face=3D"Times New Roman"><span =
style=3D'font-size:10.0pt'>______________________________________________=
_</span></font>
<br>
<font size=3D2><span style=3D'font-size:10.0pt'>Ecrit mailing =
list</span></font> <br>
<font size=3D2><span =
style=3D'font-size:10.0pt'>Ecrit@ietf.org</span></font> <br>
<font size=3D2><span style=3D'font-size:10.0pt'><a
href=3D"https://www1.ietf.org/mailman/listinfo/ecrit" =
target=3D"_blank">https://www1.ietf.org/mailman/listinfo/ecrit</a></span>=
</font>
<o:p></o:p></p>

</div>

</div>

</body>

</html>

------=_NextPart_000_0116_01C545F2.4F74BD20--




--===============1053526964==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============1053526964==--






From ecrit-bounces@ietf.org Wed Apr 20 21:50:03 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQpO-0001eS-W7; Wed, 20 Apr 2005 21:50:03 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQpN-0001eG-Ia; Wed, 20 Apr 2005 21:50:01 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA19505;
	Wed, 20 Apr 2005 21:49:59 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOR0h-00082u-Lw; Wed, 20 Apr 2005 22:01:44 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3L1nLe04506; Wed, 20 Apr 2005 20:49:22 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ2438K3>; Thu, 21 Apr 2005 11:48:31 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102F757C@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Brian Rosen <br@brianrosen.net>, "'Henning Schulzrinne'"
	<hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT	Int
	erimMeeting
Date: Thu, 21 Apr 2005 11:48:31 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.7 (/)
X-Scan-Signature: 5f85cf2baaf973610992c2604e7b6057
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1827227150=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============1827227150==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C54614.38AA1CD0"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C54614.38AA1CD0
Content-Type: text/plain

Thanks for the clarification, allow me to stew on this one a bit.
 
Cheers
James

-----Original Message-----
From: Brian Rosen [mailto:br@brianrosen.net] 
Sent: Thursday, 21 April 2005 11:46 AM
To: Winterbottom, James [WOLL:5500:EXCH]; 'Henning Schulzrinne'
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting



The box can run the protocol, be it layer 2 or 7 any time; it has access to
the uplink.

A downstream endpoint can't do that.  It can't get location before the
tunnel is created because the box doesn't pass traffic until the tunnel is
created.

The problem we're discussing is something like an IPsec appliance; a box
physically between the uplink and the local LAN that creates the tunnel when
it initializes and doesn't allow any traffic other than that which goes
through the tunnel.  There are variations on such boxes; you can configure
some of them to allow access outside the tunnel for some things.  Most of
them, I'm told, are DHCP relays at least.

 

Brian

 


  _____  


From: James Winterbottom [mailto:winterb@nortel.com] 
Sent: Wednesday, April 20, 2005 9:34 PM
To: Brian Rosen; 'Henning Schulzrinne'
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting

 

I think that you are missing something here. 
You are making the assumption that L7 is only used to retrieve location
after the VPN tunnel has been established, I fail to see why this has to be
the case. It could just as easily be retrieved from the local network prior
to the tunnel being established and so this presents no more difficulty for
VPNs and softclients than a layer 2 delivered solution.

 

-----Original Message----- 
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org
<mailto:ecrit-bounces@ietf.org> ] On Behalf Of Brian Rosen 
Sent: Thursday, 21 April 2005 6:19 AM 
To: 'Henning Schulzrinne' 
Cc: 'GEOPRIV WG'; ecrit@ietf.org 
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting 

 

I'm having some off line discussions that lead me to the following: 

If you have a box that opens a VPN tunnel on the raw Internet connection
that feeds a LAN that has endpoints, and passes ALL LAN traffic through the
tunnel, you are hosed.  The box has to be location aware in some way.  This
is because there is no way, L2 or L7, that you can get a packet to anything
that knows about the location; the box is forcing everything through the
tunnel.  The box is physically between the uplink and the LAN, and you can't
go around it.  The box has to do something that lets you get at the right
LIS.

If the box supplies IP addresses (it's the DHCP server), then it only has to
relay the location option. 

If the box doesn't supply addresses, it would have to run something that
either the client could access, or something the DHCP server would access.
We have no solutions.

L7 doesn't help; the box has to do something that would allow you to get to
the local LIS, with the boxe's public IP address.

Softclients are much easier, because the system can get location before the
tunnel is established.  Tunnels downstream of the local infrastructure are
problematic for L7, but not for L2.

This is bad news.  All the boxes have to change.  If we have to change all
the softclients for L7, is that a big enough reason to not use L7?

Hmmm.  I don't know enough about how the boxes work.  To make DHCP work with
the DHCP server in the corporate network, not in the box, the box has to
pass the DHCP packets; they aren't IP packets.  Does that mean it's always a
DHCP relay?  That would help.  The boxes have to change, but if they are
already doing DHCP relay, adding the location option would be the least
amount of work.

I keep hoping I've missed something here. 

Brian 

> -----Original Message----- 
> From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu
<mailto:hgs@cs.columbia.edu> ] 
> Sent: Wednesday, April 20, 2005 3:48 PM 
> To: Brian Rosen 
> Cc: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV 
> WG'; ecrit@ietf.org 
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> InterimMeeting 
> 
> There are at least two separate sets of issues that depend on the 
> architecture, and it seems dangerous to conflate the two: 
> 
> (First-person) I get my own location from a server. This makes address 
> spoofing more difficult, with return routability. Drawback: If I'm 
> behind a NAT, and the location server isn't, this works only if the IP 
> address in the IP packet is used, not something in the query. VPNs 
> should not be a big deal here. 
> 
> (Third-person) I ask for an address for an IP address. Address 
> spoofing and VPN issues matter, possibly NAT issues (since the IP 
> address I get may be a NAT address, given the typical circles of NAT 
> hell in various 
> networks.) 
> 
> I think first-person is much more palatable than third-person. 
> 
> Brian Rosen wrote: 
> > "Routing" in this context is session (SIP) routing, as you 
> > suspected. 
> > 
> > The first hop (LIS to endpoint) is what we are discussing. DHCP is 
> > not an L3+ protocol.  Neither is LLDP-MED. 
> > 
> > The thread has discussed a number of problems with an L7 mechanism, 
> > but laying them out: 
> > 
> > 1. You are subject to IP address spoofing (albeit you need to be 
> > able to 
> get 
> > the packets sent from the LIS to the IP address you are spoofing) 
> > 
> > 2. VPN or other tunnels may have been created before you run this 
> protocol. 
> > That will cause a failure; you need the location corresponding to 
> > the original "outermost" IP address. 
> > 
> > 3. It is difficult to control the security (beyond IP spoofing) 
> > because 
> you 
> > don't have a generally good authentication mechanism.  This is a 
> > bare 
> phone, 
> > or equivalent, during its boot phase. 
> > 
> > There are probably others as well.  2) is the real problem. 
> > 
> > Brian 
> 





_______________________________________________ 
Ecrit mailing list 
Ecrit@ietf.org 
https://www1.ietf.org/mailman/listinfo/ecrit
<https://www1.ietf.org/mailman/listinfo/ecrit>  


------_=_NextPart_001_01C54614.38AA1CD0
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:v =3D=20
"urn:schemas-microsoft-com:vml" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<TITLE>Message</TITLE>

<META content=3D"MSHTML 6.00.2800.1498" name=3DGENERATOR><!--[if !mso]>
<STYLE>v\:* {
	BEHAVIOR: url(#default#VML)
}
o\:* {
	BEHAVIOR: url(#default#VML)
}
w\:* {
	BEHAVIOR: url(#default#VML)
}
.shape {
	BEHAVIOR: url(#default#VML)
}
</STYLE>
<![endif]--><o:SmartTagType downloadurl=3D"http://www.microsoft.com"=20
name=3D"PersonName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@font-face {
	font-family: Tahoma;
}
@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in 1.25in; =
}
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: blue; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: =
"Times New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: =
auto
}
SPAN.EmailStyle18 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
</STYLE>
<!--[if gte mso 9]><xml>
 <o:shapedefaults v:ext=3D"edit" spidmax=3D"1026" />
</xml><![endif]--><!--[if gte mso 9]><xml>
 <o:shapelayout v:ext=3D"edit">
  <o:idmap v:ext=3D"edit" data=3D"1" />
 </o:shapelayout></xml><![endif]--></HEAD>
<BODY lang=3DEN-US vLink=3Dblue link=3Dblue>
<DIV><SPAN class=3D527144801-21042005><FONT face=3DArial =
color=3D#0000ff size=3D2>Thanks=20
for the clarification, allow me to stew on this one a =
bit.</FONT></SPAN></DIV>
<DIV><SPAN class=3D527144801-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D527144801-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2>Cheers</FONT></SPAN></DIV>
<DIV><SPAN class=3D527144801-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2>James</FONT></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
  <DIV></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr =
align=3Dleft><FONT=20
  face=3DTahoma size=3D2>-----Original Message-----<BR><B>From:</B> =
Brian Rosen=20
  [mailto:br@brianrosen.net] <BR><B>Sent:</B> Thursday, 21 April 2005 =
11:46=20
  AM<BR><B>To:</B> Winterbottom, James [WOLL:5500:EXCH]; 'Henning=20
  Schulzrinne'<BR><B>Cc:</B> 'GEOPRIV WG'; =
ecrit@ietf.org<BR><B>Subject:</B> RE:=20
  [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT=20
  InterimMeeting<BR><BR></FONT></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">The box =
can run the=20
  protocol, be it layer 2 or 7 any time; it has access to the=20
  uplink.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">A =
downstream endpoint=20
  can't do that.&nbsp; It can't get location before the tunnel is =
created=20
  because the box doesn't pass traffic until the tunnel is=20
  created.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">The =
problem we're=20
  discussing is something like an IPsec appliance; a box physically =
between the=20
  uplink and the local LAN that creates the tunnel when it initializes =
and=20
  doesn't allow any traffic other than that which goes through the =
tunnel.&nbsp;=20
  There are variations on such boxes; you can configure some of them to =
allow=20
  access outside the tunnel for some things.&nbsp; Most of them, I'm =
told, are=20
  DHCP relays at least.<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">Brian<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: =
medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue =
1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
  <DIV>
  <DIV class=3DMsoNormal style=3D"TEXT-ALIGN: center" =
align=3Dcenter><FONT=20
  face=3D"Times New Roman" size=3D3><SPAN style=3D"FONT-SIZE: 12pt">
  <HR tabIndex=3D-1 align=3Dcenter width=3D"100%" SIZE=3D2>
  </SPAN></FONT></DIV>
  <P class=3DMsoNormal><B><FONT face=3DTahoma size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">From:</SPAN></FONT></B><FONT=20
  face=3DTahoma size=3D2><SPAN style=3D"FONT-SIZE: 10pt; FONT-FAMILY: =
Tahoma">=20
  <st1:PersonName=20
  style=3D"BACKGROUND-POSITION: left bottom; BACKGROUND-IMAGE: =
url(res://ietag.dll/#34/#1001); BACKGROUND-REPEAT: repeat-x"=20
  w:st=3D"on">James Winterbottom</st1:PersonName> =
[mailto:winterb@nortel.com]=20
  <BR><B><SPAN style=3D"FONT-WEIGHT: bold">Sent:</SPAN></B> Wednesday, =
April 20,=20
  2005 9:34 PM<BR><B><SPAN style=3D"FONT-WEIGHT: bold">To:</SPAN></B> =
Brian Rosen;=20
  'Henning Schulzrinne'<BR><B><SPAN style=3D"FONT-WEIGHT: =
bold">Cc:</SPAN></B>=20
  'GEOPRIV WG'; ecrit@ietf.org<BR><B><SPAN=20
  style=3D"FONT-WEIGHT: bold">Subject:</SPAN></B> RE: [Ecrit] RE: =
[Geopriv]=20
  Announcement of Joint GEOPRIV/ECRIT=20
  InterimMeeting</SPAN></FONT><o:p></o:p></P></DIV>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">I think=20
  that you are missing something here.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">You are making the assumption that L7 is =
only used to=20
  retrieve location after the VPN tunnel has been established, I fail =
to see why=20
  this has to be the case. It could just as easily be retrieved from =
the local=20
  network prior to the tunnel being established and so this presents no =
more=20
  difficulty for VPNs and softclients than a layer 2 delivered=20
  solution.</SPAN></FONT><o:p></o:p></P>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Times New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: =
12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">-----Original Message-----</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">From: ecrit-bounces@ietf.org =
[<A=20
  =
href=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</A>=
] On=20
  Behalf Of Brian Rosen</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Sent: Thursday, 21 April 2005 6:19 =
AM</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">To: 'Henning=20
  Schulzrinne'</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">Cc:=20
  'GEOPRIV WG'; ecrit@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Subject: RE: [Ecrit] RE: [Geopriv] =
Announcement of=20
  Joint GEOPRIV/ECRIT InterimMeeting</SPAN></FONT> <o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">I'm=20
  having some off line discussions that lead me to the =
following:</SPAN></FONT>=20
  <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">If you=20
  have a box that opens a VPN tunnel on the raw Internet connection =
that feeds a=20
  LAN that has endpoints, and passes ALL LAN traffic through the =
tunnel, you are=20
  hosed.&nbsp; The box has to be location aware in some way.&nbsp; This =
is=20
  because there is no way, L2 or L7, that you can get a packet to =
anything that=20
  knows about the location; the box is forcing everything through the=20
  tunnel.&nbsp; The box is physically between the uplink and the LAN, =
and you=20
  can't go around it.&nbsp; The box has to do something that lets you =
get at the=20
  right LIS.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">If the=20
  box supplies IP addresses (it's the DHCP server), then it only has to =
relay=20
  the location option.</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">If the=20
  box doesn't supply addresses, it would have to run something that =
either the=20
  client could access, or something the DHCP server would access. We =
have no=20
  solutions.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">L7=20
  doesn't help; the box has to do something that would allow you to get =
to the=20
  local LIS, with the boxe's public IP =
address.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Softclients are much easier, because the =
system can=20
  get location before the tunnel is established.&nbsp; Tunnels =
downstream of the=20
  local infrastructure are problematic for L7, but not for=20
  L2.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">This is=20
  bad news.&nbsp; All the boxes have to change.&nbsp; If we have to =
change all=20
  the softclients for L7, is that a big enough reason to not use=20
  L7?</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Hmmm.&nbsp; I don't know enough about how =
the boxes=20
  work.&nbsp; To make DHCP work with the DHCP server in the corporate =
network,=20
  not in the box, the box has to pass the DHCP packets; they aren't IP=20
  packets.&nbsp; Does that mean it's always a DHCP relay?&nbsp; That =
would=20
  help.&nbsp; The boxes have to change, but if they are already doing =
DHCP=20
  relay, adding the location option would be the least amount of=20
  work.</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">I keep=20
  hoping I've missed something here.</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Brian</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  -----Original Message-----</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; From: Henning Schulzrinne [<A=20
  =
href=3D"mailto:hgs@cs.columbia.edu">mailto:hgs@cs.columbia.edu</A>]</SPA=
N></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; Sent: =
Wednesday, April 20,=20
  2005 3:48 PM</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">&gt;=20
  To: Brian Rosen</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; Cc: 'Michael Hammer (mhammer)';=20
  peter_blatherwick@mitel.com; 'GEOPRIV </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; WG'; ecrit@ietf.org</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; Subject: Re: [Ecrit] =
RE: [Geopriv]=20
  Announcement of Joint GEOPRIV/ECRIT </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; InterimMeeting</SPAN></FONT> <BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; There are at least two separate sets =
of issues=20
  that depend on the </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; architecture, and it seems dangerous =
to conflate=20
  the two:</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =

  (First-person) I get my own location from a server. This makes =
address=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
spoofing=20
  more difficult, with return routability. Drawback: If I'm=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
behind a=20
  NAT, and the location server isn't, this works only if the IP=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
address in=20
  the IP packet is used, not something in the query. VPNs=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
should not=20
  be a big deal here.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; (Third-person) I ask for an address =
for an IP=20
  address. Address </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; spoofing and VPN issues matter, =
possibly NAT=20
  issues (since the IP </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; address I get may be a NAT address, =
given the=20
  typical circles of NAT </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; hell in various</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
networks.)</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; I think first-person is much more =
palatable than=20
  third-person.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; Brian Rosen wrote:</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt; "Routing" in this =
context is=20
  session (SIP) routing, as you </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; suspected.</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt; The first hop (LIS =
to endpoint)=20
  is what we are discussing. DHCP is </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; not an L3+ protocol.&nbsp; =
Neither is=20
  LLDP-MED.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;=20
  The thread has discussed a number of problems with an L7 mechanism,=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt; but=20
  laying them out:</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; 1. You are subject to IP address =
spoofing=20
  (albeit you need to be </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; able to</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; get</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; the packets sent from the LIS to =
the IP=20
  address you are spoofing)</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; 2. VPN or other tunnels may have =
been=20
  created before you run this</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; protocol.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; That will cause a failure; you =
need the=20
  location corresponding to </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; the original "outermost" IP=20
  address.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt; 3.=20
  It is difficult to control the security (beyond IP spoofing)=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;=20
  because</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  you</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;=20
  don't have a generally good authentication mechanism.&nbsp; This is a =

  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;=20
  bare</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  phone,</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;=20
  or equivalent, during its boot phase.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; There are probably others as =
well.&nbsp; 2)=20
  is the real problem.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt; Brian</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><o:p></o:p></P>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Times New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: =
12pt"><BR><BR><o:p></o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">_______________________________________________</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Ecrit mailing=20
  list</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Ecrit@ietf.org</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt"><A =
href=3D"https://www1.ietf.org/mailman/listinfo/ecrit"=20
  =
target=3D_blank>https://www1.ietf.org/mailman/listinfo/ecrit</A></SPAN><=
/FONT>=20
  <o:p></o:p></P></DIV></DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C54614.38AA1CD0--


--===============1827227150==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============1827227150==--




From ecrit-bounces@ietf.org Wed Apr 20 23:44:19 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOSbz-00044b-4k; Wed, 20 Apr 2005 23:44:19 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOSbx-00044H-9T; Wed, 20 Apr 2005 23:44:17 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id XAA26827;
	Wed, 20 Apr 2005 23:44:14 -0400 (EDT)
Received: from ind-iport-1.cisco.com ([64.104.129.195])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOSnH-0001oc-Qu; Wed, 20 Apr 2005 23:56:01 -0400
Received: from india-core-1.cisco.com (64.104.129.221)
	by ind-iport-1.cisco.com with ESMTP; 21 Apr 2005 09:22:53 +0530
X-BrightmailFiltered: true
X-Brightmail-Tracker: AAAAAA==
X-IronPort-AV: i="3.92,118,1112553000"; 
	d="scan'208"; a="30639291:sNHT25057180"
Received: from wells.cisco.com (wells.cisco.com [171.71.177.223])
	by india-core-1.cisco.com (8.12.10/8.12.6) with ESMTP id j3L9Cqlx019249;
	Thu, 21 Apr 2005 09:12:53 GMT
Received: from jmpolk-w2k01.diablo.cisco.com (ssh-sjc-1.cisco.com
	[171.68.225.134]) by wells.cisco.com (8.8.6
	(PHNE_14041)/CISCO.SERVER.1.2) with ESMTP id UAA23738;
	Wed, 20 Apr 2005 20:43:57 -0700 (PDT)
Message-Id: <4.3.2.7.2.20050420223753.02997d48@localhost>
X-Sender: jmpolk@localhost
X-Mailer: QUALCOMM Windows Eudora Version 4.3.2
Date: Wed, 20 Apr 2005 22:44:00 -0500
To: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
From: "James M. Polk" <jmpolk@cisco.com>
In-Reply-To: <F0CB7F62D783BF40AD93882BB817F2450235862E@nvc-its-exs01.cc.
	telcordia.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; format=flowed
X-Spam-Score: 1.1 (+)
X-Scan-Signature: 4bb0e9e1ca9d18125bc841b2d8d77e24
Cc: 
Subject: [Ecrit] Terms on this thread
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Suggesting term changes:

"Location Delivery" is to the endpoint (the first time or a refresh)
"Location Conveyance" is from the endpoint (to the LIS, the Proxy or to the 
PSAP)

"Location Conveyance" is already the term/phrase used in SIP(PING) for a UA 
to convey its location to another UA or Proxy, per:
http://www.ietf.org/internet-drafts/draft-ietf-sipping-location-requirements-02.txt
so the term/phrase seems to be appropriate here

Delivery IN
Conveyance OUT

both from the endpoint's point of view

agreed?

we can worry about non-proxy server to server lateral movement when that 
issue comes up

At 01:03 PM 4/20/2005 -0400, Abbott, Nadine B. wrote:
>Mike,
>You are right--it is being used in two different contexts.
>Delivery of location to the endpoint and delivery of location to the PSAP.
>We need different terms or we need to qualify the term when we use it (as
>above).
>Nadine
>
>-----Original Message-----
>From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf Of
>Michael Hammer (mhammer)
>Sent: Wednesday, April 20, 2005 12:00 PM
>To: Brian Rosen; peter_blatherwick@mitel.com
>Cc: GEOPRIV WG; ecrit@ietf.org
>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
>InterimMeeting
>
>
>I still get the feeling that "delivery" is being used in two different
>contexts:
>
>             (1)                     (2)
>Local node---?---->endpoint-----/many hops/----->PSAP
>           ---------------------/many hops/----->
>                            (2)
>
>How can "delivery" be L2 dependent, when it must reach a PSAP many hops
>away? Color me confused.
>
>Mike
>
>
> >-----Original Message-----
> >From: Brian Rosen [mailto:br@brianrosen.net]
> >Sent: Wednesday, April 20, 2005 10:47 AM
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The idea is that, say, you are in your home, served by a DSL provider.
> >The domain is then that of the DSL vendor.  Your phone asks for its
> >location from the server in the DSL domain.  It would be given the
> >location corresponding to the IP address of the request.  Note that
> >this would be pretty good for the requested case, even in the presence
> >of a NATed local area network in your home.  The phone would do this on
> >boot, before any VPN tunnels were established.
> >
> >I get the idea that a single delivery mechanism is desirable.
> >I'm skeptical we can do that because of the security issues.
> >When you make the delivery mechanism L2 dependent, you can
> >control the possible attacks to a finer grain than the L7 local domain.
> >
> >Please keep in mind that some of the folks wishing to use the
> >L7 mechanism don't really want to just return location to the
> >endpoint; they want to retain the location and give it out to
> >authorized entities upon presentation of the IP address of the
> >endpoint.  That is a business decision.  They can charge for
> >such a service.  I think the privacy implications of that are
> >dicey, but the reality is that's the model that will probably
> >be implemented if we do this.
> >
> >Brian
> >
> >
> >
> >
> >
> >> -----Original Message-----
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> Sent: Wednesday, April 20, 2005 10:14 AM
> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> InterimMeeting
> >>
> >> Brian,
> >>
> >> Could you clarify the domain statement.  Given nomadicity, it would
> >> seem that location delivery would need to be cross-domain.  The E911
> >> PSAP will not always be the same domain as the roaming endpoint.
> >>
> >> My impression is that Location discovery is a L2 issue, tied to the
> >> fact that L2 is supposed to be a single physical hop at most between
> >> the end- user terminal and an adjacent location-determining network
> >> node.  (Of course those trying to make L2 protocols a
> >replacement for
> >> IP sort of screw this assumption up.)
> >>
> >> The location delivery mechanism is an application-layer or
> >L7 service.
> >> The argument there is that since multiple applications will need to
> >> rely on location information, a general purpose delivery mechanism
> >> will provide consistency and generality that is so often sought in
> >> IETF work.  Security can be built-in to the chosen delivery
> >mechanism.
> >> Note, that delivery could be a choice of an existing transfer
> >> mechanism.  This does not preclude other L7 protocols from
> >defining a
> >> place in their messages that could also carry location information.
> >>
> >> So, I believe:
> >> Location discovery is local, with associated security being local,
> >> Location delivery is global, with associated security being global.
> >>
> >> The real issues are making those happen.
> >>
> >> Mike
> >>
> >> >-----Original Message-----
> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On
> >> >Behalf Of Brian Rosen
> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> >> >To: peter_blatherwick@mitel.com
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> >> >InterimMeeting
> >> >
> >> >There turns out to be a large set of issues around this problem,
> >> >which I fear is leading to Balkanization.  There are two really
> >> >important problems we need to solve.
> >> >
> >> >One fundamental problem is that every client needs to
> >implement every
> >> >possible LI transfer mechanism that its environment could provide.
> >> >
> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >> >guys reject both
> >> >of these and want a something else.  Every phone has to implement
> >> >every protocol.
> >> >
> >> >There are some who have observed that the mechanisms at hand are L2
> >> >specific.  They claim as long as you have an L2 specific mechanism,
> >> >you need one or more for each L2.  To get out of that, they propose
> >> >that we use an L7 mechanism (think some version of HTTP, although
> >> >that might not fly).  They would say, lets do that once,
> >and every L2
> >> >can use it.  The problem is that you then have to deal with the
> >> >security issues of an L7 mechanism, and in particular, you have to
> >> >use IP address as the "key" for what location to return.
> >If you can
> >> >spoof IP address, you can get someone else's location.
> >> >
> >> >Those advocating L7 mechanisms claim that the mechanism
> >would only be
> >> >implemented within a domain, and the domain would have to take
> >> >anti-spoofing steps.  They note that the mechanism would need at
> >> >least a complete round trip, and probably more than one, so
> >spoofing
> >> >requires the ability to
> >> >intercept packets not addressed to the attacker.   The
> >> >returned data could
> >> >be precisely a PIDF-LO.
> >> >
> >> >Then on top of that, we turn out to need some more security,
> >> >especially for emergency calls.  We need to prevent forged
> >locations.
> >> >That means we need to sign the PIDF-LO.  If you get location via
> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from that,
> >> >how do we construct a signature from the entity that actually
> >> >determined location?
> >> >
> >> >Brian
> >> >
> >> >
> >> >________________________________________
> >> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On
> >> >Behalf Of peter_blatherwick@mitel.com
> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> >> >To: Andrew Newton
> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> >> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim
> >> >Meeting
> >> >
> >> >
> >> >Hi Andrew, lists,
> >> >
> >> >I'd like to better understand the meaning of the following agenda
> >> >items:
> >> >  "
> >> >  2) Properties of network elements in transferring LI from layer 2
> >> > upward to PIDF-LO.
> >> > 3) Proposed enhancements to PIDF-LO to support #2.
> >> > "
> >> >
> >> >Is there a summary of what these really mean, or examples
> >of what the
> >> >outcome could be in terms of protocol or layer interactions?
> >> >
> >> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which
> >> >would be able to deliver location information to endpoints from the
> >> >L2 LAN infrastructure they are connected to.  The work is
> >going on in
> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint
> >> >Discovery (LLDP-MED), which is an extension of IEEE
> >802.1AB, specific
> >> >to VoIP systems.  In LLDP-MED, among several other things, we have
> >> >specified ways to pass equivalent data to the DHCP coordinate-based
> >> >LCI (RFC 3825) and civic location LCI
> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe).
> >> >We see this method of delivery as a non-competing
> >alternative to the
> >> >DHCP-based approach, with the same end result to the overall ECS
> >> >system (the endpoint receives the exact same data), which has some
> >> >advantages particularly in enterprise deployment scenarios.  (The
> >> >DHCP-based method has advantages in different scenarios.)   I am
> >> >Editor of thi s document, and it is now in ballot process in TIA
> >> >(more or less equivalent to Last Call in IETF).
> >> >
> >> >Sorry, I expect I am suffering lack of context here, since I only
> >> >joined the list relatively recently.
> >> >
> >> >BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last
> >> >Call and in the RFC Editor's queue?  It seemed to have been settled
> >> >on the list, and waiting on AD action.
> >> >
> >> >-- Peter Blatherwick
> >> >
> >> >
> >> >
> >> >
> >> >Andrew Newton <andy@hxr.us>
> >> >Sent by: geopriv-bounces@ietf.org
> >> >13.04.05 16:34
> >> >
> >> >        To:        GEOPRIV WG <geopriv@ietf.org>
> >> >        cc:
> >> >        Subject:        [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> >Interim Meeting
> >> >
> >> >
> >> >
> >> >
> >> >The GEOPRIV and ECRIT working groups will be holding a
> >joint interim
> >> >meeting.
> >> >
> >> >      What: Interim GEOPRIV/ECRIT meeting
> >> >      When: 2005 May 16 08:30-17:30
> >> >            2005 May 17 08:30-17:30
> >> >            2005 May 18 08:30-17:30
> >> >     Where: Columbia University
> >> >            Dept. of Computer Science
> >> >            450 Computer Science Bldg.
> >> >            1214 Amsterdam Avenue (close to 120th St.)
> >> >            New York, NY 10027
> >> >Directions: http://www.cs.columbia.edu/directions.html
> >> >      Also: WiFi provided.
> >> >            Teleconference to be provided.
> >> >     Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >> >            Early bookings recommended.
> >> >
> >> >Proposed GEOPRIV Agenda:
> >> >  2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> >use of LI
> >> >in HTTP/HTML for web browsing.
> >> >2) Properties of network elements in transferring LI from layer 2
> >> >upward to PIDF-LO.
> >> >3) Proposed enhancements to PIDF-LO to support #2.
> >> >
> >> >Proposed ECRIT Agenda:
> >> >  2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >> >1) Emergency Call Routing Requirements
> >> >2) Security and Threats Analysis
> >> >
> >> >_______________________________________________
> >> >Geopriv mailing list
> >> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
> >> >
> >> >
> >> >
> >> >
> >> >_______________________________________________
> >> >Ecrit mailing list
> >> >Ecrit@ietf.org
> >> >https://www1.ietf.org/mailman/listinfo/ecrit
> >> >
> >>
> >
> >
>
>_______________________________________________
>Ecrit mailing list
>Ecrit@ietf.org
>https://www1.ietf.org/mailman/listinfo/ecrit
>
>_______________________________________________
>Geopriv mailing list
>Geopriv@ietf.org
>https://www1.ietf.org/mailman/listinfo/geopriv


cheers,
James

                                *******************
                 Truth is not to be argued... it is to be presented

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Thu Apr 21 07:46:01 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOa88-0003BJ-UT; Thu, 21 Apr 2005 07:46:00 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOQKX-0006M0-GA; Wed, 20 Apr 2005 21:18:09 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id VAA17302;
	Wed, 20 Apr 2005 21:18:07 -0400 (EDT)
Received: from zrc2s0jx.nortelnetworks.com ([47.103.122.112])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOQVq-0007Lf-KP; Wed, 20 Apr 2005 21:29:52 -0400
Received: from zctwc060.asiapac.nortel.com (zctwc060.asiapac.nortel.com
	[47.153.200.67])
	by zrc2s0jx.nortelnetworks.com (Switch-2.2.6/Switch-2.2.0) with ESMTP
	id j3L1Hse01604; Wed, 20 Apr 2005 20:17:55 -0500 (CDT)
Received: by zctwc060.asiapac.nortel.com with Internet Mail Service
	(5.5.2653.19) id <GJ2438FZ>; Thu, 21 Apr 2005 11:16:49 +1000
Message-ID: <C0FA66CBDDF5D411B82E00508BE3A722102F74A3@zctwc059.asiapac.nortel.com>
From: "James Winterbottom" <winterb@nortel.com>
To: Marc Linsner <mlinsner@cisco.com>
Date: Thu, 21 Apr 2005 11:16:49 +1000
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2653.19)
X-Spam-Score: 0.4 (/)
X-Scan-Signature: e2a224a4445e6ba88c508264e796c05d
X-Mailman-Approved-At: Thu, 21 Apr 2005 07:45:58 -0400
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
Subject: [Ecrit] RE: L2 vs. L7 Location Discover
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============0819552242=="
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

--===============0819552242==
Content-Type: multipart/alternative;
	boundary="----_=_NextPart_001_01C5460F.C816767A"

This message is in MIME format. Since your mail reader does not understand
this format, some or all of this message may not be legible.

------_=_NextPart_001_01C5460F.C816767A
Content-Type: text/plain

Hi Marc,
 
I am recommending, I think, that we introduce one mechanism now, that tells
us how to get a location.
I can think of several things and ways to do this, include one time URLs. If
this is done right, that is it is a pointer to a location object, then the
location can change and evolve, without us needing to change the underlying
layer 2 mechanism to transport it. I am not saying that changes to L2
protocols are not required to make the initial support possible, what I am
saying is that an evolution of those changes to support new location types
will not be required.
 
Cheers
James

-----Original Message-----
From: Marc Linsner [mailto:mlinsner@cisco.com] 
Sent: Thursday, 21 April 2005 9:30 AM
To: Winterbottom, James [WOLL:5500:EXCH]
Cc: 'GEOPRIV WG'; ecrit@ietf.org
Subject: L2 vs. L7 Location Discover



.....subject changed to more accurately reflect topic.......

 

James,

 

Since an argument for L7 location discovery architecture is no changes
needed to the myriad of L2 mechanisms, what are you proposing to use for a
key?

 

-Marc-

 

 

 

 

Hmmmm!!! 

I am not sure that I agree your statement that the key passed to external
would be the IP address of the client. It could be, but I would most
certainly not advocate that. 

 

 

-----Original Message----- 
From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org
<mailto:ecrit-bounces@ietf.org> ] On Behalf Of Brian Rosen 
Sent: Thursday, 21 April 2005 2:13 AM 
To: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com 
Cc: 'GEOPRIV WG'; ecrit@ietf.org 
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
InterimMeeting 

 

The basic picture is: 

LIS ---> endpoint ---> routing element ---> psap 

The LIS knows where the endpoint is. 
The endpoint gets location from the LIS 
The endpoint includes location on the emergency call 
The routing element uses location to route the call to the right PSAP The
PSAP gets the call, and the location. 

The discussion is, how does the endpoint get location from the LIS? DHCP is
one answer.  LLDP-MED is another.  A proposed L7 mechanism is another.

 

To be sure, there are folks who want to make the picture: 

LIS --> endpoint --> routing element ---> psap 
 ^                        |                 | 
 |                        |                 | 
 +------------------------+                 | 
 |                                          | 
 +------------------------------------------+ 

The LIS gives the endpoint a "key" 
The endpoint includes the key in the emergency call 
The routing element gets the key and exchanges it for location at the LIS
The psap gets the key and exchanges it for location at the LIS

The key could be an IP address. 

Brian 

 

> -----Original Message----- 
> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com
<mailto:mhammer@cisco.com> ] 
> Sent: Wednesday, April 20, 2005 12:00 PM 
> To: Brian Rosen; peter_blatherwick@mitel.com 
> Cc: GEOPRIV WG; ecrit@ietf.org 
> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> InterimMeeting 
> 
> I still get the feeling that "delivery" is being used in two different 
> contexts: 
> 
>             (1)                     (2) 
> Local node---?---->endpoint-----/many hops/----->PSAP 
>           ---------------------/many hops/-----> 
>                            (2) 
> 
> How can "delivery" be L2 dependent, when it must reach a PSAP many 
> hops away? Color me confused. 
> 
> Mike 
> 
> 
> >-----Original Message----- 
> >From: Brian Rosen [mailto:br@brianrosen.net <mailto:br@brianrosen.net> ] 
> >Sent: Wednesday, April 20, 2005 10:47 AM 
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com 
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org 
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT InterimMeeting 
> > 
> >The idea is that, say, you are in your home, served by a DSL 
> >provider. The domain is then that of the DSL vendor.  Your phone asks 
> >for its location from the server in the DSL domain.  It would be 
> >given the location corresponding to the IP address of the request.  
> >Note that this would be pretty good for the requested case, even in 
> >the presence of a NATed local area network in your home.  The phone 
> >would do this on boot, before any VPN tunnels were established. 
> > 
> >I get the idea that a single delivery mechanism is desirable. I'm 
> >skeptical we can do that because of the security issues. When you 
> >make the delivery mechanism L2 dependent, you can control the 
> >possible attacks to a finer grain than the L7 local domain. 
> > 
> >Please keep in mind that some of the folks wishing to use the L7 
> >mechanism don't really want to just return location to the endpoint; 
> >they want to retain the location and give it out to authorized 
> >entities upon presentation of the IP address of the endpoint.  That 
> >is a business decision.  They can charge for such a service.  I think 
> >the privacy implications of that are dicey, but the reality is that's 
> >the model that will probably be implemented if we do this. 
> > 
> >Brian 
> > 
> > 
> > 
> > 
> > 
> >> -----Original Message----- 
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com
<mailto:mhammer@cisco.com> ] 
> >> Sent: Wednesday, April 20, 2005 10:14 AM 
> >> To: Brian Rosen; peter_blatherwick@mitel.com 
> >> Cc: GEOPRIV WG; ecrit@ietf.org 
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT 
> >> InterimMeeting 
> >> 
> >> Brian, 
> >> 
> >> Could you clarify the domain statement.  Given nomadicity, it would 
> >> seem that location delivery would need to be cross-domain.  The 
> >> E911 PSAP will not always be the same domain as the roaming 
> >> endpoint. 
> >> 
> >> My impression is that Location discovery is a L2 issue, tied to the 
> >> fact that L2 is supposed to be a single physical hop at most 
> >> between the end- user terminal and an adjacent location-determining 
> >> network node.  (Of course those trying to make L2 protocols a 
> >replacement for 
> >> IP sort of screw this assumption up.) 
> >> 
> >> The location delivery mechanism is an application-layer or 
> >L7 service. 
> >> The argument there is that since multiple applications will need to 
> >> rely on location information, a general purpose delivery mechanism 
> >> will provide consistency and generality that is so often sought in 
> >> IETF work.  Security can be built-in to the chosen delivery 
> >mechanism. 
> >> Note, that delivery could be a choice of an existing transfer 
> >> mechanism.  This does not preclude other L7 protocols from 
> >defining a 
> >> place in their messages that could also carry location information. 
> >> 
> >> So, I believe: 
> >> Location discovery is local, with associated security being local, 
> >> Location delivery is global, with associated security being global. 
> >> 
> >> The real issues are making those happen. 
> >> 
> >> Mike 
> >> 
> >> >-----Original Message----- 
> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org
<mailto:ecrit-bounces@ietf.org> ] On 
> >> >Behalf Of Brian Rosen 
> >> >Sent: Wednesday, April 20, 2005 9:54 AM 
> >> >To: peter_blatherwick@mitel.com 
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org 
> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> >> >InterimMeeting 
> >> > 
> >> >There turns out to be a large set of issues around this problem, 
> >> >which I fear is leading to Balkanization.  There are two really 
> >> >important problems we need to solve. 
> >> > 
> >> >One fundamental problem is that every client needs to 
> >implement every 
> >> >possible LI transfer mechanism that its environment could provide. 
> >> > 
> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL 
> >> >guys reject both 
> >> >of these and want a something else.  Every phone has to implement 
> >> >every protocol. 
> >> > 
> >> >There are some who have observed that the mechanisms at hand are 
> >> >L2 specific.  They claim as long as you have an L2 specific 
> >> >mechanism, you need one or more for each L2.  To get out of that, 
> >> >they propose that we use an L7 mechanism (think some version of 
> >> >HTTP, although that might not fly).  They would say, lets do that 
> >> >once, 
> >and every L2 
> >> >can use it.  The problem is that you then have to deal with the 
> >> >security issues of an L7 mechanism, and in particular, you have to 
> >> >use IP address as the "key" for what location to return. 
> >If you can 
> >> >spoof IP address, you can get someone else's location. 
> >> > 
> >> >Those advocating L7 mechanisms claim that the mechanism 
> >would only be 
> >> >implemented within a domain, and the domain would have to take 
> >> >anti-spoofing steps.  They note that the mechanism would need at 
> >> >least a complete round trip, and probably more than one, so 
> >spoofing 
> >> >requires the ability to 
> >> >intercept packets not addressed to the attacker.   The 
> >> >returned data could 
> >> >be precisely a PIDF-LO. 
> >> > 
> >> >Then on top of that, we turn out to need some more security, 
> >> >especially for emergency calls.  We need to prevent forged 
> >locations. 
> >> >That means we need to sign the PIDF-LO.  If you get location via 
> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from 
> >> >that, how do we construct a signature from the entity that 
> >> >actually determined location? 
> >> > 
> >> >Brian 
> >> > 
> >> > 
> >> >________________________________________ 
> >> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org
<mailto:geopriv-bounces@ietf.org> ] 
> >> >On Behalf Of peter_blatherwick@mitel.com 
> >> >Sent: Wednesday, April 20, 2005 9:30 AM 
> >> >To: Andrew Newton 
> >> >Cc: GEOPRIV WG; ecrit@ietf.org 
> >> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim 
> >> >Meeting 
> >> > 
> >> > 
> >> >Hi Andrew, lists, 
> >> > 
> >> >I'd like to better understand the meaning of the following agenda 
> >> >items: 
> >> >  " 
> >> >  2) Properties of network elements in transferring LI from layer 
> >> >2 
> >> > upward to PIDF-LO. 
> >> > 3) Proposed enhancements to PIDF-LO to support #2. 
> >> > " 
> >> > 
> >> >Is there a summary of what these really mean, or examples 
> >of what the 
> >> >outcome could be in terms of protocol or layer interactions? 
> >> > 
> >> >Reason I'm asking is I am deeply involved in a layer 2 
> >approach which 
> >> >would be able to deliver location information to endpoints from 
> >> >the L2 LAN infrastructure they are connected to.  The work is 
> >going on in 
> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint 
> >> >Discovery (LLDP-MED), which is an extension of IEEE 
> >802.1AB, specific 
> >> >to VoIP systems.  In LLDP-MED, among several other things, we have 
> >> >specified ways to pass equivalent data to the DHCP 
> >> >coordinate-based LCI (RFC 3825) and civic location LCI 
> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I 
> >believe). 
> >> >We see this method of delivery as a non-competing 
> >alternative to the 
> >> >DHCP-based approach, with the same end result to the overall ECS 
> >> >system (the endpoint receives the exact same data), which has some 
> >> >advantages particularly in enterprise deployment scenarios.  (The 
> >> >DHCP-based method has advantages in different scenarios.)   I am 
> >> >Editor of thi s document, and it is now in ballot process in TIA 
> >> >(more or less equivalent to Last Call in IETF). 
> >> > 
> >> >Sorry, I expect I am suffering lack of context here, since I only 
> >> >joined the list relatively recently. 
> >> > 
> >> >BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last 
> >> >Call and in the RFC Editor's queue?  It seemed to have been 
> >> >settled on the list, and waiting on AD action. 
> >> > 
> >> >-- Peter Blatherwick 
> >> > 
> >> > 
> >> > 
> >> > 
> >> >Andrew Newton <andy@hxr.us> 
> >> >Sent by: geopriv-bounces@ietf.org 
> >> >13.04.05 16:34 
> >> > 
> >> >        To:        GEOPRIV WG <geopriv@ietf.org> 
> >> >        cc: 
> >> >        Subject:        [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT 
> >> >Interim Meeting 
> >> > 
> >> > 
> >> > 
> >> > 
> >> >The GEOPRIV and ECRIT working groups will be holding a 
> >joint interim 
> >> >meeting. 
> >> > 
> >> >      What: Interim GEOPRIV/ECRIT meeting 
> >> >      When: 2005 May 16 08:30-17:30 
> >> >            2005 May 17 08:30-17:30 
> >> >            2005 May 18 08:30-17:30 
> >> >     Where: Columbia University 
> >> >            Dept. of Computer Science 
> >> >            450 Computer Science Bldg. 
> >> >            1214 Amsterdam Avenue (close to 120th St.) 
> >> >            New York, NY 10027 
> >> >Directions: http://www.cs.columbia.edu/directions.html
<http://www.cs.columbia.edu/directions.html>  
> >> >      Also: WiFi provided. 
> >> >            Teleconference to be provided. 
> >> >     Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
<http://www.cs.columbia.edu/~hgs/etc/hotels.html>  
> >> >            Early bookings recommended. 
> >> > 
> >> >Proposed GEOPRIV Agenda: 
> >> >  2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30 
> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the 
> >use of LI 
> >> >in HTTP/HTML for web browsing. 
> >> >2) Properties of network elements in transferring LI from layer 2 
> >> >upward to PIDF-LO. 
> >> >3) Proposed enhancements to PIDF-LO to support #2. 
> >> > 
> >> >Proposed ECRIT Agenda: 
> >> >  2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30 
> >> >1) Emergency Call Routing Requirements 
> >> >2) Security and Threats Analysis 
> >> > 
> >> >_______________________________________________ 
> >> >Geopriv mailing list 
> >> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
<https://www1.ietf.org/mailman/listinfo/geopriv>  
> >> > 
> >> > 
> >> > 
> >> > 
> >> >_______________________________________________ 
> >> >Ecrit mailing list 
> >> >Ecrit@ietf.org https://www1.ietf.org/mailman/listinfo/ecrit
<https://www1.ietf.org/mailman/listinfo/ecrit>  
> >> > 
> >> 
> > 
> > 
> 

 

_______________________________________________ 
Ecrit mailing list 
Ecrit@ietf.org 
https://www1.ietf.org/mailman/listinfo/ecrit
<https://www1.ietf.org/mailman/listinfo/ecrit>  


------_=_NextPart_001_01C5460F.C816767A
Content-Type: text/html
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML xmlns=3D"http://www.w3.org/TR/REC-html40" xmlns:o =3D=20
"urn:schemas-microsoft-com:office:office" xmlns:w =3D=20
"urn:schemas-microsoft-com:office:word" xmlns:st1 =3D=20
"urn:schemas-microsoft-com:office:smarttags"><HEAD>
<META HTTP-EQUIV=3D"Content-Type" CONTENT=3D"text/html; =
charset=3Dus-ascii">
<TITLE>Message</TITLE>

<META content=3D"MSHTML 6.00.2800.1498" =
name=3DGENERATOR><o:SmartTagType=20
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags" =
name=3D"PostalCode"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
name=3D"Street"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
name=3D"State"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
name=3D"PlaceType"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
name=3D"PlaceName"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags" =
name=3D"address"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
downloadurl=3D"http://www.5iamas-microsoft-com:office:smarttags" =
name=3D"City"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><o:SmartTagType=20
downloadurl=3D"http://www.5iantlavalamp.com/" name=3D"place"=20
namespaceuri=3D"urn:schemas-microsoft-com:office:smarttags"></o:SmartTag=
Type><!--[if !mso]>
<STYLE>st1\:* {
	BEHAVIOR: url(#default#ieooui)
}
</STYLE>
<![endif]-->
<STYLE>@page Section1 {size: 8.5in 11.0in; margin: 1.0in 1.25in 1.0in =
1.25in; }
P.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
LI.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
DIV.MsoNormal {
	FONT-SIZE: 12pt; MARGIN: 0in 0in 0pt; FONT-FAMILY: "Times New Roman"
}
A:link {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlink {
	COLOR: blue; TEXT-DECORATION: underline
}
A:visited {
	COLOR: blue; TEXT-DECORATION: underline
}
SPAN.MsoHyperlinkFollowed {
	COLOR: blue; TEXT-DECORATION: underline
}
P {
	FONT-SIZE: 12pt; MARGIN-LEFT: 0in; MARGIN-RIGHT: 0in; FONT-FAMILY: =
"Times New Roman"; mso-margin-top-alt: auto; mso-margin-bottom-alt: =
auto
}
SPAN.EmailStyle18 {
	COLOR: navy; FONT-FAMILY: Arial; mso-style-type: personal-reply
}
DIV.Section1 {
	page: Section1
}
</STYLE>
</HEAD>
<BODY lang=3DEN-US vLink=3Dblue link=3Dblue>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff size=3D2>Hi=20
Marc,</FONT></SPAN></DIV>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff size=3D2>I am=20
recommending, I think, that we introduce one mechanism now, that tells =
us how to=20
get a location.</FONT></SPAN></DIV>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff size=3D2>I can=20
think of several things and ways to do this, include one time URLs. If =
this is=20
done right, that is it is a pointer to a location object, then the =
location can=20
change and evolve, without us needing to change the underlying layer 2 =
mechanism=20
to transport it. I am not saying that changes to L2 protocols are not =
required=20
to make the initial support possible, what I am saying is that an =
evolution of=20
those changes to support new location types will not be=20
required.</FONT></SPAN></DIV>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2></FONT></SPAN>&nbsp;</DIV>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2>Cheers</FONT></SPAN></DIV>
<DIV><SPAN class=3D296531201-21042005><FONT face=3DArial =
color=3D#0000ff=20
size=3D2>James</FONT></SPAN></DIV>
<BLOCKQUOTE dir=3Dltr style=3D"MARGIN-RIGHT: 0px">
  <DIV></DIV>
  <DIV class=3DOutlookMessageHeader lang=3Den-us dir=3Dltr =
align=3Dleft><FONT=20
  face=3DTahoma size=3D2>-----Original Message-----<BR><B>From:</B> =
Marc Linsner=20
  [mailto:mlinsner@cisco.com] <BR><B>Sent:</B> Thursday, 21 April 2005 =
9:30=20
  AM<BR><B>To:</B> Winterbottom, James [WOLL:5500:EXCH]<BR><B>Cc:</B> =
'GEOPRIV=20
  WG'; ecrit@ietf.org<BR><B>Subject:</B> L2 vs. L7 Location=20
  Discover<BR><BR></FONT></DIV>
  <DIV class=3DSection1>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">.....subject changed to=20
  more accurately reflect topic.......<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">James,<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: Arial">Since an =
argument for=20
  L7 location discovery architecture is no changes needed to the myriad =
of L2=20
  mechanisms, what are you proposing to use for a=20
  key?<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial">-Marc-<o:p></o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P class=3DMsoNormal><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt; COLOR: navy; FONT-FAMILY: =
Arial"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <DIV=20
  style=3D"BORDER-RIGHT: medium none; PADDING-RIGHT: 0in; BORDER-TOP: =
medium none; PADDING-LEFT: 4pt; PADDING-BOTTOM: 0in; BORDER-LEFT: blue =
1.5pt solid; PADDING-TOP: 0in; BORDER-BOTTOM: medium none">
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Hmmmm!!!</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">I am not=20
  sure that I agree your statement that the key passed to external =
would be the=20
  IP address of the client. It could be, but I would most certainly not =
advocate=20
  that. </SPAN></FONT><FONT color=3Dnavy><SPAN=20
  style=3D"COLOR: navy"><o:p></o:p></SPAN></FONT></P>
  <P><B><I><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; COLOR: navy; FONT-STYLE: =
italic; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></SPAN></FONT></I></B></P>
  <P><B><I><FONT face=3DArial color=3Dnavy size=3D2><SPAN=20
  style=3D"FONT-WEIGHT: bold; FONT-SIZE: 10pt; COLOR: navy; FONT-STYLE: =
italic; FONT-FAMILY: Arial"><o:p>&nbsp;</o:p></SPAN></FONT></I></B></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">-----Original Message-----</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">From: ecrit-bounces@ietf.org =
[<A=20
  =
href=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</A>=
] On=20
  Behalf Of Brian Rosen</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Sent: Thursday, 21 April 2005 2:13 =
AM</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">To: 'Michael =
Hammer (mhammer)';=20
  peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Cc: 'GEOPRIV WG'; =
ecrit@ietf.org</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Subject: RE: =
[Ecrit] RE:=20
  [Geopriv] Announcement of Joint GEOPRIV/ECRIT =
InterimMeeting</SPAN></FONT>=20
  <o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The basic=20
  picture is:</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">LIS=20
  ---&gt; endpoint ---&gt; routing element ---&gt; psap</SPAN></FONT>=20
  <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The LIS=20
  knows where the endpoint is.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">The endpoint gets location from the =
LIS</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">The endpoint =
includes location=20
  on the emergency call</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">The routing element uses location to route =
the call to=20
  the right PSAP The PSAP gets the call, and the =
location.</SPAN></FONT>=20
  <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The=20
  discussion is, how does the endpoint get location from the LIS? DHCP =
is one=20
  answer.&nbsp; LLDP-MED is another.&nbsp; A proposed L7 mechanism is=20
  another.</SPAN></FONT><o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">To be=20
  sure, there are folks who want to make the picture:</SPAN></FONT>=20
  <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">LIS=20
  --&gt; endpoint --&gt; routing element ---&gt; psap</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&nbsp;^&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;=20
  =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;=20
  |</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&nbsp;|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;=20
  =
|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;=20
  |</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&nbsp;+------------------------+&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbs=
p;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
  |</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&nbsp;|&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp=
;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
  |</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&nbsp;+------------------------------------------+</SPAN></FONT>=20
  <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The LIS=20
  gives the endpoint a "key"</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">The endpoint includes the key in the =
emergency=20
  call</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The routing=20
  element gets the key and exchanges it for location at the LIS The =
psap gets=20
  the key and exchanges it for location at the =
LIS</SPAN></FONT><o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">The key=20
  could be an IP address.</SPAN></FONT> <o:p></o:p></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Brian</SPAN></FONT> <o:p></o:p></P>
  <P class=3DMsoNormal><FONT face=3D"Times New Roman" size=3D3><SPAN=20
  style=3D"FONT-SIZE: 12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  -----Original Message-----</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; From: Michael Hammer (mhammer) [<A=20
  =
href=3D"mailto:mhammer@cisco.com">mailto:mhammer@cisco.com</A>]</SPAN></=
FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; Sent: =
Wednesday, April 20,=20
  2005 12:00 PM</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; To: Brian Rosen;=20
  peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; Cc: GEOPRIV WG; =
ecrit@ietf.org</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; Subject: RE: =
[Ecrit] RE:=20
  [Geopriv] Announcement of Joint GEOPRIV/ECRIT </SPAN></FONT><BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
InterimMeeting</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; I still get the feeling =
that=20
  "delivery" is being used in two different</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; contexts:</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: =
10pt">&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;=20
  =
(1)&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nb=
sp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
  (2)</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; Local=20
  node---?----&gt;endpoint-----/many hops/-----&gt;PSAP</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
  ---------------------/many hops/-----&gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">&gt;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&n=
bsp;&nbsp;&nbsp;&nbsp;&nbsp;=20
  (2)</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
How can=20
  "delivery" be L2 dependent, when it must reach a PSAP many=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
hops away?=20
  Color me confused.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; Mike</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;-----Original =
Message-----</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;From: =
Brian Rosen [<A=20
  =
href=3D"mailto:br@brianrosen.net">mailto:br@brianrosen.net</A>]</SPAN></=
FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;Sent: =
Wednesday, April=20
  20, 2005 10:47 AM</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;To: Michael Hammer (mhammer);=20
  peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;Cc: 'GEOPRIV WG';=20
  ecrit@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;Subject: RE: [Ecrit] RE: [Geopriv] =

  Announcement of Joint </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;GEOPRIV/ECRIT =
InterimMeeting</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;The idea =
is that, say,=20
  you are in your home, served by a DSL </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;provider. The domain is then that =
of the DSL=20
  vendor.&nbsp; Your phone asks </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;for its location from the server =
in the DSL=20
  domain.&nbsp; It would be </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;given the location corresponding =
to the IP=20
  address of the request.&nbsp; </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;Note that this would be pretty =
good for the=20
  requested case, even in </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;the presence of a NATed local area =
network in=20
  your home.&nbsp; The phone </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;would do this on boot, before any =
VPN tunnels=20
  were established.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;I get the idea that a single =
delivery=20
  mechanism is desirable. I'm </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;skeptical we can do that because =
of the=20
  security issues. When you </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;make the delivery mechanism L2 =
dependent, you=20
  can control the </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;possible attacks to a finer grain =
than the L7=20
  local domain.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;Please keep in mind that some of =
the folks=20
  wishing to use the L7 </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;mechanism don't really want to =
just return=20
  location to the endpoint; </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;they want to retain the location =
and give it=20
  out to authorized </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;entities upon presentation of the =
IP address=20
  of the endpoint.&nbsp; That </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;is a business decision.&nbsp; They =
can charge=20
  for such a service.&nbsp; I think </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;the privacy implications of that =
are dicey,=20
  but the reality is that's </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;the model that will probably be =
implemented=20
  if we do this.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;Brian</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; -----Original =
Message-----</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
From: Michael=20
  Hammer (mhammer) [<A=20
  =
href=3D"mailto:mhammer@cisco.com">mailto:mhammer@cisco.com</A>]</SPAN></=
FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
Sent: Wednesday,=20
  April 20, 2005 10:14 AM</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; To: Brian Rosen;=20
  peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; Cc: GEOPRIV WG;=20
  ecrit@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; Subject: RE: [Ecrit] RE: =
[Geopriv]=20
  Announcement of Joint</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;GEOPRIV/ECRIT</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  InterimMeeting</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; Brian,</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; Could you =
clarify the=20
  domain statement.&nbsp; Given nomadicity, it would =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; seem that =
location delivery=20
  would need to be cross-domain.&nbsp; The </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; E911 PSAP will not always be =
the same=20
  domain as the roaming </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; endpoint.</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; My impression =
is that=20
  Location discovery is a L2 issue, tied to the </SPAN></FONT><BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; fact that L2 =
is supposed to=20
  be a single physical hop at most </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; between the end- user =
terminal and an=20
  adjacent location-determining </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; network node.&nbsp; (Of =
course those=20
  trying to make L2 protocols a</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;replacement for</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; IP sort of =
screw this=20
  assumption up.)</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; The location delivery =
mechanism is an=20
  application-layer or</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;L7 service.</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; The argument =
there is that=20
  since multiple applications will need to </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; rely on location information, =
a general=20
  purpose delivery mechanism </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; will provide consistency and =
generality=20
  that is so often sought in </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; IETF work.&nbsp; Security can =
be=20
  built-in to the chosen delivery</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;mechanism.</SPAN></FONT> <BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; Note, that =
delivery could=20
  be a choice of an existing transfer </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; mechanism.&nbsp; This does =
not preclude=20
  other L7 protocols from</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;defining a</SPAN></FONT> <BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; place in their =
messages=20
  that could also carry location information.</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; So, I=20
  believe:</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; Location discovery is local, with associated security being =
local,=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  Location delivery is global, with associated security being=20
  global.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; The real issues are making those happen.</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
Mike</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;-----Original=20
  Message-----</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">&gt;=20
  &gt;&gt; &gt;From: ecrit-bounces@ietf.org [<A=20
  =
href=3D"mailto:ecrit-bounces@ietf.org">mailto:ecrit-bounces@ietf.org</A>=
] On=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;Behalf Of Brian Rosen</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Sent: Wednesday, April =
20, 2005 9:54=20
  AM</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;To: peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Cc: 'GEOPRIV WG';=20
  ecrit@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Subject: [Ecrit] RE: =
[Geopriv]=20
  Announcement of Joint GEOPRIV/ECRIT </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;InterimMeeting</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;There turns out to be a large set of issues around this =
problem,=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;which I fear is leading to Balkanization.&nbsp; There are two =
really=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;important problems we need to solve.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;One =
fundamental problem=20
  is that every client needs to</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;implement every</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;possible =
LI transfer=20
  mechanism that its environment could provide.</SPAN></FONT> <BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;We have=20
  DHCP.&nbsp; You guys are working on LLDP-MED.&nbsp;&nbsp; The=20
  DSL</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;guys reject both</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;of these and want a =
something=20
  else.&nbsp; Every phone has to implement </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;every =
protocol.</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;There are some who have observed that the mechanisms at =
hand are=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;L2 specific.&nbsp; They claim as long as you have an L2 specific=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;mechanism, you need one or more for each L2.&nbsp; To get out of =
that,=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;they propose that we use an L7 mechanism (think some version of=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;HTTP, although that might not fly).&nbsp; They would say, lets do =
that=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;once,</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;and every L2</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;can use it.&nbsp; The =
problem is=20
  that you then have to deal with the </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;security issues of an L7 =
mechanism,=20
  and in particular, you have to </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;use IP address as the =
"key" for what=20
  location to return.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;If you can</SPAN></FONT> <BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;spoof IP =
address, you=20
  can get someone else's location.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Those =
advocating L7=20
  mechanisms claim that the mechanism</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;would only be</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;implemented within a=20
  domain, and the domain would have to take </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;anti-spoofing =
steps.&nbsp; They note=20
  that the mechanism would need at </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;least a complete round =
trip, and=20
  probably more than one, so</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;spoofing</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;requires the ability=20
  to</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;intercept packets not addressed to the attacker.&nbsp;&nbsp;=20
  The</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;returned data could</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;be precisely a=20
  PIDF-LO.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Then on top of that, we =
turn out to=20
  need some more security, </SPAN></FONT><BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;especially for emergency=20
  calls.&nbsp; We need to prevent forged</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;locations.</SPAN></FONT> <BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;That means =
we need to=20
  sign the PIDF-LO.&nbsp; If you get location via =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;DHCP, or =
LLDP-MED, and=20
  the endpoint constructs a PIDF-LO from </SPAN></FONT><BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;that, how do we construct =
a=20
  signature from the entity that </SPAN></FONT><BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;actually determined=20
  location?</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Brian</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;________________________________________</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;From:=20
  geopriv-bounces@ietf.org [<A=20
  =
href=3D"mailto:geopriv-bounces@ietf.org">mailto:geopriv-bounces@ietf.org=
</A>]=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;On Behalf Of peter_blatherwick@mitel.com</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Sent: =
Wednesday, April=20
  20, 2005 9:30 AM</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;To: Andrew =
Newton</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;Cc: GEOPRIV=20
  WG; ecrit@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Subject: Re: [Geopriv] =
Announcement=20
  of Joint GEOPRIV/ECRIT Interim</SPAN></FONT> <BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Meeting</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FO=
NT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;Hi Andrew, lists,</SPAN></FONT> <BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;I'd like =
to better=20
  understand the meaning of the following agenda</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;items:</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;&nbsp;=20
  "</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;&nbsp; 2) Properties of network elements in transferring LI from =
layer=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;2</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;&nbsp;upward to PIDF-LO.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp;3) Proposed =
enhancements to=20
  PIDF-LO to support #2.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp;"</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;Is there a=20
  summary of what these really mean, or examples</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;of what =
the</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;outcome could=20
  be in terms of protocol or layer interactions?</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;Reason I'm=20
  asking is I am deeply involved in a layer 2</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;approach =
which</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;would be able=20
  to deliver location information to endpoints from =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;the L2 LAN =

  infrastructure they are connected to. &nbsp;The work is</SPAN></FONT> =

  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;going on=20
  in</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;TIA and is called Link Layer Discovery Protocol - Media Endpoint=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;Discovery (LLDP-MED), which is an extension of IEEE</SPAN></FONT> =

  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;802.1AB,=20
  specific</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;to VoIP systems. &nbsp;In LLDP-MED, among several other =
things,=20
  we have </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;specified ways to pass equivalent data to the DHCP=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;coordinate-based LCI (RFC 3825) and civic location LCI=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;(draft-ietf-geopriv-dhcp-civil-05, in Last Call process =
I</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt;=20
  &gt;believe).</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;We see this method of =
delivery as a=20
  non-competing</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;alternative to the</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;DHCP-based =
approach,=20
  with the same end result to the overall ECS </SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;system =
(the endpoint=20
  receives the exact same data), which has some </SPAN></FONT><BR><FONT =

  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;advantages =
particularly=20
  in enterprise deployment scenarios. &nbsp;(The =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;DHCP-based =
method has=20
  advantages in different scenarios.) &nbsp; I am =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Editor of =
thi s=20
  document, and it is now in ballot process in TIA =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;(more or =
less=20
  equivalent to Last Call in IETF).</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Sorry, I =
expect I am=20
  suffering lack of context here, since I only </SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;joined the =
list=20
  relatively recently.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;BTW, what =
is the state=20
  of geopriv-dhcp-civil? &nbsp;Is it now past Last =
</SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Call and =
in the RFC=20
  Editor's queue? &nbsp;It seemed to have been </SPAN></FONT><BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;settled on =
the list,=20
  and waiting on AD action.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;-- Peter=20
  Blatherwick</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">&gt;=20
  &gt;&gt; &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;Andrew Newton &lt;andy@hxr.us&gt;</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Sent by:=20
  geopriv-bounces@ietf.org</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;13.04.05 =
16:34</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;&nbsp; &nbsp; &nbsp; &nbsp; To: &nbsp; &nbsp; &nbsp;=20
  &nbsp;GEOPRIV WG &lt;geopriv@ietf.org&gt;</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; &nbsp; =
&nbsp;=20
  cc:</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;&gt;=20
  &gt;&nbsp; &nbsp; &nbsp; &nbsp; Subject: &nbsp; &nbsp; &nbsp; =
&nbsp;[Geopriv]=20
  Announcement of Joint</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;GEOPRIV/ECRIT</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Interim=20
  Meeting</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;The GEOPRIV and ECRIT working groups will be holding=20
  a</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt; &gt;joint=20
  interim</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;meeting.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; =
&nbsp; &nbsp;=20
  What: Interim GEOPRIV/ECRIT meeting</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; &nbsp; =
When: 2005 May=20
  16 08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;=20
  &nbsp; 2005 May 17 08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;=20
  &nbsp; 2005 May 18 08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN =

  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; =
&nbsp;Where:=20
  <st1:place w:st=3D"on"><st1:PlaceName =
w:st=3D"on">Columbia</st1:PlaceName>=20
  <st1:PlaceType =
w:st=3D"on">University</st1:PlaceType></st1:place></SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;&nbsp; &nbsp;=20
  &nbsp; &nbsp; &nbsp; &nbsp; Dept. of Computer Science</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; =
&nbsp; &nbsp;=20
  &nbsp; &nbsp; &nbsp; 450 Computer Science Bldg.</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; =
&nbsp; &nbsp;=20
  &nbsp; &nbsp; &nbsp; 1214 <st1:City w:st=3D"on">Amsterdam</st1:City> =
Avenue=20
  (close to <st1:Street w:st=3D"on"><st1:address=20
  style=3D"BACKGROUND-POSITION: left bottom; BACKGROUND-IMAGE: =
url(res://ietag.dll/#34/#1001); BACKGROUND-REPEAT: repeat-x"=20
  w:st=3D"on">120th St.</st1:address></st1:Street>)</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; =
&nbsp; &nbsp;=20
  &nbsp; &nbsp; &nbsp; <st1:place w:st=3D"on"><st1:City w:st=3D"on">New =

  York</st1:City>, <st1:State w:st=3D"on">NY</st1:State> =
<st1:PostalCode=20
  w:st=3D"on">10027</st1:PostalCode></st1:place></SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;Directions: <A=20
  href=3D"http://www.cs.columbia.edu/directions.html"=20
  =
target=3D_blank>http://www.cs.columbia.edu/directions.html</A></SPAN></F=
ONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;&nbsp; &nbsp;=20
  &nbsp; Also: WiFi provided.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; &nbsp; =
&nbsp; &nbsp;=20
  &nbsp; Teleconference to be provided.</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; &nbsp; =
&nbsp;Hotel: <A=20
  href=3D"http://www.cs.columbia.edu/~hgs/etc/hotels.html"=20
  =
target=3D_blank>http://www.cs.columbia.edu/~hgs/etc/hotels.html</A></SPA=
N></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;&nbsp; &nbsp;=20
  &nbsp; &nbsp; &nbsp; &nbsp; Early bookings recommended.</SPAN></FONT> =

  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;Proposed GEOPRIV Agenda:</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;&nbsp; 2005 May 16 =
08:30-17:30, 2005=20
  May 17 08:30-12:30</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;1) Role of HTTP as a =
transfer=20
  protocol for PIDF-LO vs. the</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;use of LI</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;in =
HTTP/HTML for web=20
  browsing.</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;2) Properties of network elements in transferring LI =
from layer 2=20
  </SPAN></FONT><BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; =
&gt;&gt;=20
  &gt;upward to PIDF-LO.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;3) Proposed enhancements =
to PIDF-LO=20
  to support #2.</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Proposed =
ECRIT=20
  Agenda:</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;&nbsp; 2005 May 17 13:30-17:30, 2005 May 18=20
  08:30-17:30</SPAN></FONT> <BR><FONT size=3D2><SPAN =
style=3D"FONT-SIZE: 10pt">&gt;=20
  &gt;&gt; &gt;1) Emergency Call Routing Requirements</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;2) =
Security and Threats=20
  Analysis</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;_______________________________________________</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Geopriv =
mailing=20
  list</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;Geopriv@ietf.org <A=20
  href=3D"https://www1.ietf.org/mailman/listinfo/geopriv"=20
  =
target=3D_blank>https://www1.ietf.org/mailman/listinfo/geopriv</A></SPAN=
></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;</SPAN></FONT> <BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; =
&gt;</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;_______________________________________________</SPAN></FONT> =
<BR><FONT=20
  size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt; &gt;Ecrit =
mailing=20
  list</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt; &gt;Ecrit@ietf.org <A=20
  href=3D"https://www1.ietf.org/mailman/listinfo/ecrit"=20
  =
target=3D_blank>https://www1.ietf.org/mailman/listinfo/ecrit</A></SPAN><=
/FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">&gt; &gt;&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;&gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  &gt;</SPAN></FONT> <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: =
10pt">&gt;=20
  </SPAN></FONT><o:p></o:p></P>
  <P class=3DMsoNormal style=3D"MARGIN-BOTTOM: 12pt"><FONT =
face=3D"Times New Roman"=20
  size=3D3><SPAN style=3D"FONT-SIZE: =
12pt"><o:p>&nbsp;</o:p></SPAN></FONT></P>
  <P><FONT face=3D"Times New Roman" size=3D2><SPAN=20
  style=3D"FONT-SIZE: =
10pt">_______________________________________________</SPAN></FONT>=20
  <BR><FONT size=3D2><SPAN style=3D"FONT-SIZE: 10pt">Ecrit mailing=20
  list</SPAN></FONT> <BR><FONT size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt">Ecrit@ietf.org</SPAN></FONT> <BR><FONT =
size=3D2><SPAN=20
  style=3D"FONT-SIZE: 10pt"><A =
href=3D"https://www1.ietf.org/mailman/listinfo/ecrit"=20
  =
target=3D_blank>https://www1.ietf.org/mailman/listinfo/ecrit</A></SPAN><=
/FONT>=20
  <o:p></o:p></P></DIV></DIV></BLOCKQUOTE></BODY></HTML>

------_=_NextPart_001_01C5460F.C816767A--


--===============0819552242==
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit

--===============0819552242==--




From ecrit-bounces@ietf.org Thu Apr 21 08:21:26 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOagQ-0007Fa-Oy; Thu, 21 Apr 2005 08:21:26 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOagP-0007FR-5f; Thu, 21 Apr 2005 08:21:25 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA20225;
	Thu, 21 Apr 2005 08:21:24 -0400 (EDT)
Received: from dnsmx1rrc.telcordia.com ([128.96.20.41])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DOarp-0004p1-4z; Thu, 21 Apr 2005 08:33:13 -0400
Received: from rrc-its-ieg02.cc.telcordia.com (rrc-its-ieg02.cc.telcordia.com
	[128.96.109.3])
	by dnsmx1rrc.telcordia.com (8.11.7+Sun/8.9.3) with SMTP id j3LCL7F20895;
	Thu, 21 Apr 2005 08:21:07 -0400 (EDT)
Received: from rrc-its-exig01.mail.saic.com ([128.96.103.57])
	by rrc-its-ieg02.cc.telcordia.com (SMSSMTP 4.0.5.66) with SMTP id
	M2005042108210509945 ; Thu, 21 Apr 2005 08:21:05 -0400
Received: by rrc-its-exig01.mail.saic.com with Internet Mail Service
	(5.5.2657.72) id <HCCDQA86>; Thu, 21 Apr 2005 08:21:05 -0400
Message-ID: <F0CB7F62D783BF40AD93882BB817F24502358644@nvc-its-exs01.cc.telcordia.com>
From: "Abbott, Nadine B." <nabbott@telcordia.com>
To: GEOPRIV WG <geopriv@ietf.org>, ecrit@ietf.org
Date: Thu, 21 Apr 2005 08:21:04 -0400
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain
X-Spam-Score: 0.0 (/)
X-Scan-Signature: bc102ac530ba955ef81f1f75b8bebe44
Cc: 
Subject: [Ecrit] RE: [Geopriv] Terms on this thread
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Thanks for the reminder, James, I think that will help.

-----Original Message-----
From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] On Behalf
Of James M. Polk
Sent: Wednesday, April 20, 2005 11:44 PM
To: GEOPRIV WG; ecrit@ietf.org
Subject: [Geopriv] Terms on this thread


Suggesting term changes:

"Location Delivery" is to the endpoint (the first time or a refresh)
"Location Conveyance" is from the endpoint (to the LIS, the Proxy or to the 
PSAP)

"Location Conveyance" is already the term/phrase used in SIP(PING) for a UA 
to convey its location to another UA or Proxy, per:
http://www.ietf.org/internet-drafts/draft-ietf-sipping-location-requirements
-02.txt
so the term/phrase seems to be appropriate here

Delivery IN
Conveyance OUT

both from the endpoint's point of view

agreed?

we can worry about non-proxy server to server lateral movement when that 
issue comes up

At 01:03 PM 4/20/2005 -0400, Abbott, Nadine B. wrote:
>Mike,
>You are right--it is being used in two different contexts. Delivery of 
>location to the endpoint and delivery of location to the PSAP. We need 
>different terms or we need to qualify the term when we use it (as 
>above). Nadine
>
>-----Original Message-----
>From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On Behalf 
>Of Michael Hammer (mhammer)
>Sent: Wednesday, April 20, 2005 12:00 PM
>To: Brian Rosen; peter_blatherwick@mitel.com
>Cc: GEOPRIV WG; ecrit@ietf.org
>Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
>InterimMeeting
>
>
>I still get the feeling that "delivery" is being used in two different
>contexts:
>
>             (1)                     (2)
>Local node---?---->endpoint-----/many hops/----->PSAP
>           ---------------------/many hops/----->
>                            (2)
>
>How can "delivery" be L2 dependent, when it must reach a PSAP many hops 
>away? Color me confused.
>
>Mike
>
>
> >-----Original Message-----
> >From: Brian Rosen [mailto:br@brianrosen.net]
> >Sent: Wednesday, April 20, 2005 10:47 AM
> >To: Michael Hammer (mhammer); peter_blatherwick@mitel.com
> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint 
> >GEOPRIV/ECRIT InterimMeeting
> >
> >The idea is that, say, you are in your home, served by a DSL 
> >provider. The domain is then that of the DSL vendor.  Your phone asks 
> >for its location from the server in the DSL domain.  It would be 
> >given the location corresponding to the IP address of the request.  
> >Note that this would be pretty good for the requested case, even in 
> >the presence of a NATed local area network in your home.  The phone 
> >would do this on boot, before any VPN tunnels were established.
> >
> >I get the idea that a single delivery mechanism is desirable. I'm 
> >skeptical we can do that because of the security issues. When you 
> >make the delivery mechanism L2 dependent, you can control the 
> >possible attacks to a finer grain than the L7 local domain.
> >
> >Please keep in mind that some of the folks wishing to use the L7 
> >mechanism don't really want to just return location to the endpoint; 
> >they want to retain the location and give it out to authorized 
> >entities upon presentation of the IP address of the endpoint.  That 
> >is a business decision.  They can charge for such a service.  I think 
> >the privacy implications of that are dicey, but the reality is that's 
> >the model that will probably be implemented if we do this.
> >
> >Brian
> >
> >
> >
> >
> >
> >> -----Original Message-----
> >> From: Michael Hammer (mhammer) [mailto:mhammer@cisco.com]
> >> Sent: Wednesday, April 20, 2005 10:14 AM
> >> To: Brian Rosen; peter_blatherwick@mitel.com
> >> Cc: GEOPRIV WG; ecrit@ietf.org
> >> Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> InterimMeeting
> >>
> >> Brian,
> >>
> >> Could you clarify the domain statement.  Given nomadicity, it would 
> >> seem that location delivery would need to be cross-domain.  The 
> >> E911 PSAP will not always be the same domain as the roaming 
> >> endpoint.
> >>
> >> My impression is that Location discovery is a L2 issue, tied to the 
> >> fact that L2 is supposed to be a single physical hop at most 
> >> between the end- user terminal and an adjacent location-determining 
> >> network node.  (Of course those trying to make L2 protocols a
> >replacement for
> >> IP sort of screw this assumption up.)
> >>
> >> The location delivery mechanism is an application-layer or
> >L7 service.
> >> The argument there is that since multiple applications will need to 
> >> rely on location information, a general purpose delivery mechanism 
> >> will provide consistency and generality that is so often sought in 
> >> IETF work.  Security can be built-in to the chosen delivery
> >mechanism.
> >> Note, that delivery could be a choice of an existing transfer 
> >> mechanism.  This does not preclude other L7 protocols from
> >defining a
> >> place in their messages that could also carry location information.
> >>
> >> So, I believe:
> >> Location discovery is local, with associated security being local, 
> >> Location delivery is global, with associated security being global.
> >>
> >> The real issues are making those happen.
> >>
> >> Mike
> >>
> >> >-----Original Message-----
> >> >From: ecrit-bounces@ietf.org [mailto:ecrit-bounces@ietf.org] On 
> >> >Behalf Of Brian Rosen
> >> >Sent: Wednesday, April 20, 2005 9:54 AM
> >> >To: peter_blatherwick@mitel.com
> >> >Cc: 'GEOPRIV WG'; ecrit@ietf.org
> >> >Subject: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT 
> >> >InterimMeeting
> >> >
> >> >There turns out to be a large set of issues around this problem, 
> >> >which I fear is leading to Balkanization.  There are two really 
> >> >important problems we need to solve.
> >> >
> >> >One fundamental problem is that every client needs to
> >implement every
> >> >possible LI transfer mechanism that its environment could provide.
> >> >
> >> >We have DHCP.  You guys are working on LLDP-MED.   The DSL
> >> >guys reject both
> >> >of these and want a something else.  Every phone has to implement 
> >> >every protocol.
> >> >
> >> >There are some who have observed that the mechanisms at hand are 
> >> >L2 specific.  They claim as long as you have an L2 specific 
> >> >mechanism, you need one or more for each L2.  To get out of that, 
> >> >they propose that we use an L7 mechanism (think some version of 
> >> >HTTP, although that might not fly).  They would say, lets do that 
> >> >once,
> >and every L2
> >> >can use it.  The problem is that you then have to deal with the 
> >> >security issues of an L7 mechanism, and in particular, you have to 
> >> >use IP address as the "key" for what location to return.
> >If you can
> >> >spoof IP address, you can get someone else's location.
> >> >
> >> >Those advocating L7 mechanisms claim that the mechanism
> >would only be
> >> >implemented within a domain, and the domain would have to take 
> >> >anti-spoofing steps.  They note that the mechanism would need at 
> >> >least a complete round trip, and probably more than one, so
> >spoofing
> >> >requires the ability to
> >> >intercept packets not addressed to the attacker.   The
> >> >returned data could
> >> >be precisely a PIDF-LO.
> >> >
> >> >Then on top of that, we turn out to need some more security, 
> >> >especially for emergency calls.  We need to prevent forged
> >locations.
> >> >That means we need to sign the PIDF-LO.  If you get location via 
> >> >DHCP, or LLDP-MED, and the endpoint constructs a PIDF-LO from 
> >> >that, how do we construct a signature from the entity that 
> >> >actually determined location?
> >> >
> >> >Brian
> >> >
> >> >
> >> >________________________________________
> >> >From: geopriv-bounces@ietf.org [mailto:geopriv-bounces@ietf.org] 
> >> >On Behalf Of peter_blatherwick@mitel.com
> >> >Sent: Wednesday, April 20, 2005 9:30 AM
> >> >To: Andrew Newton
> >> >Cc: GEOPRIV WG; ecrit@ietf.org
> >> >Subject: Re: [Geopriv] Announcement of Joint GEOPRIV/ECRIT Interim 
> >> >Meeting
> >> >
> >> >
> >> >Hi Andrew, lists,
> >> >
> >> >I'd like to better understand the meaning of the following agenda
> >> >items:
> >> >  "
> >> >  2) Properties of network elements in transferring LI from layer 
> >> >2  upward to PIDF-LO.
> >> > 3) Proposed enhancements to PIDF-LO to support #2.
> >> > "
> >> >
> >> >Is there a summary of what these really mean, or examples
> >of what the
> >> >outcome could be in terms of protocol or layer interactions?
> >> >
> >> >Reason I'm asking is I am deeply involved in a layer 2
> >approach which
> >> >would be able to deliver location information to endpoints from 
> >> >the L2 LAN infrastructure they are connected to.  The work is
> >going on in
> >> >TIA and is called Link Layer Discovery Protocol - Media Endpoint 
> >> >Discovery (LLDP-MED), which is an extension of IEEE
> >802.1AB, specific
> >> >to VoIP systems.  In LLDP-MED, among several other things, we have 
> >> >specified ways to pass equivalent data to the DHCP 
> >> >coordinate-based LCI (RFC 3825) and civic location LCI 
> >> >(draft-ietf-geopriv-dhcp-civil-05, in Last Call process I
> >believe).
> >> >We see this method of delivery as a non-competing
> >alternative to the
> >> >DHCP-based approach, with the same end result to the overall ECS 
> >> >system (the endpoint receives the exact same data), which has some 
> >> >advantages particularly in enterprise deployment scenarios.  (The
> >> >DHCP-based method has advantages in different scenarios.)   I am
> >> >Editor of thi s document, and it is now in ballot process in TIA 
> >> >(more or less equivalent to Last Call in IETF).
> >> >
> >> >Sorry, I expect I am suffering lack of context here, since I only 
> >> >joined the list relatively recently.
> >> >
> >> >BTW, what is the state of geopriv-dhcp-civil?  Is it now past Last 
> >> >Call and in the RFC Editor's queue?  It seemed to have been 
> >> >settled on the list, and waiting on AD action.
> >> >
> >> >-- Peter Blatherwick
> >> >
> >> >
> >> >
> >> >
> >> >Andrew Newton <andy@hxr.us>
> >> >Sent by: geopriv-bounces@ietf.org
> >> >13.04.05 16:34
> >> >
> >> >        To:        GEOPRIV WG <geopriv@ietf.org>
> >> >        cc:
> >> >        Subject:        [Geopriv] Announcement of Joint
> >GEOPRIV/ECRIT
> >> >Interim Meeting
> >> >
> >> >
> >> >
> >> >
> >> >The GEOPRIV and ECRIT working groups will be holding a
> >joint interim
> >> >meeting.
> >> >
> >> >      What: Interim GEOPRIV/ECRIT meeting
> >> >      When: 2005 May 16 08:30-17:30
> >> >            2005 May 17 08:30-17:30
> >> >            2005 May 18 08:30-17:30
> >> >     Where: Columbia University
> >> >            Dept. of Computer Science
> >> >            450 Computer Science Bldg.
> >> >            1214 Amsterdam Avenue (close to 120th St.)
> >> >            New York, NY 10027
> >> >Directions: http://www.cs.columbia.edu/directions.html
> >> >      Also: WiFi provided.
> >> >            Teleconference to be provided.
> >> >     Hotel: http://www.cs.columbia.edu/~hgs/etc/hotels.html
> >> >            Early bookings recommended.
> >> >
> >> >Proposed GEOPRIV Agenda:
> >> >  2005 May 16 08:30-17:30, 2005 May 17 08:30-12:30
> >> >1) Role of HTTP as a transfer protocol for PIDF-LO vs. the
> >use of LI
> >> >in HTTP/HTML for web browsing.
> >> >2) Properties of network elements in transferring LI from layer 2 
> >> >upward to PIDF-LO.
> >> >3) Proposed enhancements to PIDF-LO to support #2.
> >> >
> >> >Proposed ECRIT Agenda:
> >> >  2005 May 17 13:30-17:30, 2005 May 18 08:30-17:30
> >> >1) Emergency Call Routing Requirements
> >> >2) Security and Threats Analysis
> >> >
> >> >_______________________________________________
> >> >Geopriv mailing list
> >> >Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv
> >> >
> >> >
> >> >
> >> >
> >> >_______________________________________________
> >> >Ecrit mailing list
> >> >Ecrit@ietf.org https://www1.ietf.org/mailman/listinfo/ecrit
> >> >
> >>
> >
> >
>
>_______________________________________________
>Ecrit mailing list
>Ecrit@ietf.org
>https://www1.ietf.org/mailman/listinfo/ecrit
>
>_______________________________________________
>Geopriv mailing list
>Geopriv@ietf.org https://www1.ietf.org/mailman/listinfo/geopriv


cheers,
James

                                *******************
                 Truth is not to be argued... it is to be presented

_______________________________________________
Geopriv mailing list
Geopriv@ietf.org
https://www1.ietf.org/mailman/listinfo/geopriv

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Thu Apr 21 08:48:33 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOb6d-0001MZ-Qe; Thu, 21 Apr 2005 08:48:32 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOb6Z-0001MR-CL; Thu, 21 Apr 2005 08:48:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA21924;
	Thu, 21 Apr 2005 08:48:26 -0400 (EDT)
Message-Id: <200504211248.IAA21924@ietf.org>
Received: from dx28.winwebhosting.com ([70.85.77.84])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DObHy-0005LW-NC; Thu, 21 Apr 2005 09:00:15 -0400
Received: from acs-24-154-127-163.zoominternet.net ([24.154.127.163]
	helo=BROSENLT) by dx28.winwebhosting.com with esmtpa (Exim 4.44)
	id 1DOb6N-0002tO-BU; Thu, 21 Apr 2005 07:48:15 -0500
From: "Brian Rosen" <br@brianrosen.net>
To: "'Henning Schulzrinne'" <hgs@cs.columbia.edu>
Subject: RE: [Ecrit] RE: [Geopriv] Announcement of Joint
	GEOPRIV/ECRIT	InterimMeeting
Date: Thu, 21 Apr 2005 08:48:09 -0400
MIME-Version: 1.0
Content-Type: text/plain;
	charset="US-ASCII"
Content-Transfer-Encoding: 7bit
X-Mailer: Microsoft Office Outlook, Build 11.0.6353
In-Reply-To: <42670459.9010905@cs.columbia.edu>
Thread-Index: AcVGEwdBRrgOAoBlRK6/+BDGi/Ib2wAAaLVg
X-MimeOLE: Produced By Microsoft MimeOLE V6.00.2900.2180
X-AntiAbuse: This header was added to track abuse,
	please include it with any abuse report
X-AntiAbuse: Primary Hostname - dx28.winwebhosting.com
X-AntiAbuse: Original Domain - ietf.org
X-AntiAbuse: Originator/Caller UID/GID - [0 0] / [47 12]
X-AntiAbuse: Sender Address Domain - brianrosen.net
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 2409bba43e9c8d580670fda8b695204a
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

L2TP and static assignments I am told.

Having said that, does L2TP assign IP addresses within the tunnel with PPP?
Always?

Brian

> -----Original Message-----
> From: Henning Schulzrinne [mailto:hgs@cs.columbia.edu]
> Sent: Wednesday, April 20, 2005 9:40 PM
> To: Brian Rosen
> Cc: 'Michael Hammer (mhammer)'; peter_blatherwick@mitel.com; 'GEOPRIV WG';
> ecrit@ietf.org
> Subject: Re: [Ecrit] RE: [Geopriv] Announcement of Joint GEOPRIV/ECRIT
> InterimMeeting
> 
> Brian Rosen wrote:
> > Actually, there are quite a few ways that DSL systems work, and they
> don't
> > always use PPP.  It would work for many deployments, but not all.
> 
> I've only seen DHCP or PPP (for PPPoE) systems for IP address assignment
> in DSL. What else is there?
> 




_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Thu Apr 21 08:57:30 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DObFK-0002A1-0y; Thu, 21 Apr 2005 08:57:30 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DObFE-00029t-8Q; Thu, 21 Apr 2005 08:57:24 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id IAA22737;
	Thu, 21 Apr 2005 08:57:23 -0400 (EDT)
Received: from opus.cs.columbia.edu ([128.59.20.100])
	by ietf-mx.ietf.org with esmtp (Exim 4.33)
	id 1DObQe-0005Zw-0n; Thu, 21 Apr 2005 09:09:13 -0400
Received: from [127.0.0.1]
	(IDENT:U2FsdGVkX18qtjFWOfpZbnSRLDW83fxsLQyniAk5suk@razor.cs.columbia.edu
	[128.59.16.8]) (authenticated bits=0)
	by opus.cs.columbia.edu (8.12.10/8.12.10) with ESMTP id j3LCvBh3006762
	(version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NOT);
	Thu, 21 Apr 2005 08:57:13 -0400 (EDT)
Message-ID: <4267A323.4090602@cs.columbia.edu>
Date: Thu, 21 Apr 2005 08:57:07 -0400
From: Henning Schulzrinne <hgs@cs.columbia.edu>
Organization: Columbia University
User-Agent: Mozilla Thunderbird 1.0 (Windows/20041206)
X-Accept-Language: en-us, en
MIME-Version: 1.0
To: Brian Rosen <br@brianrosen.net>
Subject: Re: [Ecrit] RE: [Geopriv] Announcement of
	Joint	GEOPRIV/ECRIT	InterimMeeting
References: <200504211248.IAA21924@ietf.org>
In-Reply-To: <200504211248.IAA21924@ietf.org>
Content-Type: text/plain; charset=ISO-8859-1; format=flowed
Content-Transfer-Encoding: 7bit
X-PerlMx-Spam: Gauge=IIIIIII, Probability=7%, Report='__CT 0, __CTE 0,
	__CT_TEXT_PLAIN 0, __HAS_MSGID 0, __MIME_VERSION 0,
	__SANE_MSGID 0'
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 7a6398bf8aaeabc7a7bb696b6b0a2aad
Content-Transfer-Encoding: 7bit
Cc: 'GEOPRIV WG' <geopriv@ietf.org>, ecrit@ietf.org
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Brian Rosen wrote:
> L2TP and static assignments I am told.
> 
> Having said that, does L2TP assign IP addresses within the tunnel with PPP?

As far as I know, L2TP itself has no address assignment capabilities, at 
least according to RFC 2661. Given that it is a 'layer-2 tunneling 
protocol', that also makes sense - layer 2 being something like PPP.

As long as PPP is used, static assignment would not seem to rule out use 
of PPP for conveying location references or values.

> Always?

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Thu Apr 21 11:38:33 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DOdlB-0001zH-5S; Thu, 21 Apr 2005 11:38:33 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DOdl9-0001z0-KP
	for ecrit@megatron.ietf.org; Thu, 21 Apr 2005 11:38:31 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id LAA09969
	for <ecrit@ietf.org>; Thu, 21 Apr 2005 11:38:21 -0400 (EDT)
Received: from thoth.sbs.de ([192.35.17.2])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DOdwS-0002Xm-2G
	for ecrit@ietf.org; Thu, 21 Apr 2005 11:50:13 -0400
Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11])
	by thoth.sbs.de (8.12.6/8.12.6) with ESMTP id j3LFcE4n017199
	for <ecrit@ietf.org>; Thu, 21 Apr 2005 17:38:14 +0200
Received: from mchp9daa.mch.sbs.de (mchp9daa.mch.sbs.de [139.25.137.99])
	by mail2.siemens.de (8.12.6/8.12.6) with ESMTP id j3LFcEtT014169
	for <ecrit@ietf.org>; Thu, 21 Apr 2005 17:38:14 +0200
Received: by mchp9daa.mch.sbs.de with Internet Mail Service (5.5.2657.72)
	id <2SQ53AGJ>; Thu, 21 Apr 2005 17:38:13 +0200
Message-ID: <D2E490BD3F24C24598C4605E40024D153DB3D3@mchp9gma.mch.sbs.de>
From: Tschofenig Hannes <hannes.tschofenig@siemens.com>
To: "'ecrit@ietf.org'" <ecrit@ietf.org>
Date: Thu, 21 Apr 2005 17:35:42 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain
X-Spam-Score: 0.0 (/)
X-Scan-Signature: de4f315c9369b71d7dd5909b42224370
Subject: [Ecrit] Reminder to draft authors and editors: new boilerplate
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

Dear WG,

Just as a reminder, there's new boilerplate available for the
updated BCP 78 and 79 about IETF rights in contributions and
IPR considerations

Please make sure that you're familiar with the new versions,
and start to use the new boilerplate.

The new format will be mandatory next month sometime, so please
start preparing for the changes now, as you get ready to submit
new drafts of documents.

If you're using xml2rfc, there's a new version of the tool which
provides this now (1.29).

http://xml.resource.org/

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



From ecrit-bounces@ietf.org Sun Apr 24 17:45:31 2005
Received: from localhost.localdomain ([127.0.0.1] helo=megatron.ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32)
	id 1DPoux-0007oW-SD; Sun, 24 Apr 2005 17:45:31 -0400
Received: from odin.ietf.org ([132.151.1.176] helo=ietf.org)
	by megatron.ietf.org with esmtp (Exim 4.32) id 1DPouv-0007oR-Rb
	for ecrit@megatron.ietf.org; Sun, 24 Apr 2005 17:45:29 -0400
Received: from ietf-mx.ietf.org (ietf-mx.ietf.org [132.151.6.1])
	by ietf.org (8.9.1a/8.9.1a) with ESMTP id RAA25374
	for <ecrit@ietf.org>; Sun, 24 Apr 2005 17:45:26 -0400 (EDT)
Received: from david.siemens.de ([192.35.17.14])
	by ietf-mx.ietf.org with esmtp (Exim 4.33) id 1DPp71-0000h5-5b
	for ecrit@ietf.org; Sun, 24 Apr 2005 17:58:00 -0400
Received: from mail2.siemens.de (mail2.siemens.de [139.25.208.11])
	by david.siemens.de (8.12.6/8.12.6) with ESMTP id j3OLjN8I002219
	for <ecrit@ietf.org>; Sun, 24 Apr 2005 23:45:24 +0200
Received: from mchp9daa.mch.sbs.de (mchp9daa.mch.sbs.de [139.25.137.99])
	by mail2.siemens.de (8.12.6/8.12.6) with ESMTP id j3OLjN40022652
	for <ecrit@ietf.org>; Sun, 24 Apr 2005 23:45:23 +0200
Received: by mchp9daa.mch.sbs.de with Internet Mail Service (5.5.2657.72)
	id <2SQ537W5>; Sun, 24 Apr 2005 23:45:23 +0200
Message-ID: <D2E490BD3F24C24598C4605E40024D153DB40B@mchp9gma.mch.sbs.de>
From: Tschofenig Hannes <hannes.tschofenig@siemens.com>
To: ecrit@ietf.org
Date: Sun, 24 Apr 2005 23:42:47 +0200
MIME-Version: 1.0
X-Mailer: Internet Mail Service (5.5.2657.72)
Content-Type: text/plain
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 08e48e05374109708c00c6208b534009
Subject: [Ecrit] Note on Interim meeting
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: ecrit.ietf.org
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/ecrit>,
	<mailto:ecrit-request@ietf.org?subject=subscribe>
Sender: ecrit-bounces@ietf.org
Errors-To: ecrit-bounces@ietf.org

hi all, 

just a note to document authors: all drafts must be announced
at least 1 week in advance of the interim meeting date, so folks
have time to read the drafts. please consider this aspect and plan
accordingly.

hannes/marc

_______________________________________________
Ecrit mailing list
Ecrit@ietf.org
https://www1.ietf.org/mailman/listinfo/ecrit



