James,

I do believe that the intent of Ted (as well as others in the GEOPRIV working group, including myself) is that if a UAC specifies "recipient=endpoint" then a compliant proxy will not 'read' the location body. In particular, "recipient=endpoint" indicates that a SIP proxy in the signaling path does not have permission to store the location (or any derived information) for longer than is necessary to forward the SIP message and does not have permission to send the location to any third party (for any reason including location-based routing) other than the next-hop SIP proxy. That is, the intent of "recipient=endpoint" that if a call requires location-based routing in order to succeed, then the call should fail.

Personally, I believe (and I think this is a point Ted was trying to make) that a UAC must have a way to indicate that a location is to be read by the endpoint and no one else. This goes back to RFC 3693 which dictates that a target must have a way of articulating privacy rules and that using protocols must enforce those rules. In particular, see requirements 7, 10 and 11 in RFC 3693. (Note that RFC 3693 explicitly makes an exception for the emergency case, and so this discussion is in the context of non-emergency conveyance of location information ... e.g. Pizza Hut.)

(Also note: there is always the issue that a malicious proxy might not obey the wishes expressed by the UAC, but SIP is an architecture in which there is implicit trust by the UAC that the proxy acting on his behave properly and comply with all relevant specifications. Implications of the SIP trust model are a topic for another thread ... See for example: http://www1.ietf.org/mail-archive/web/sip/current/msg20319.html)

Clearly, there are many mechanisms that satisfy the desideratum that a target be able to indicate that its location is to be read only by the SIP endpoint. For example, this desire could be encoded as a privacy rule within the PIDF-LO and each SIP proxy could parse the privacy rules in a PIDF-LO to determine the target's intent. Alternatively, a location-by-value could be encrypted end-to-end; or location could be conveyed by-reference using an LIS with certificate-based access controls. The GEOPRIV working group discussed various mechanisms last May (See the thread beginning with: http://www1.ietf.org/mail-archive/web/geopriv/current/msg03521.html) and I believe there was rough consensus that the "recipient=endpoint" mechanism described in the current conveyance draft was the best mechanism for achieving the above desideratum.

This seems to leave us with three options going forward:

1) Deny the UAC the opertunity to indicate that location is to be read only by the SIP endpoint. (That is, declare that SIP is not a GEOPRIV using protocol in sense of RFC 3693).

2) Revisit the mechanism discussion and attempt to reach consensus on a better mechanism for indicating that location is to be read only by the SIP endpoint.

3) Craft text explaining that when the "recipient=endpoint" parameter is used that a compliant SIP proxy is not to 'read' the location information. (Note that this text should also indicate that when "recipient=endpoint" is used that calls requiring location-based routing will fail, and thus should only be used when call failure is preferred over disclosure of location information to a routing entity.)

- Matt Lepinski


James M. Polk wrote:

This also gets back to one of my original points, does SIP expect a UAC to understand the topology of a message's path to the ultimate destination?

Is Ted's intent of the "recipient=endpoint" parameter to prevent proxies from reading location in a message *and* a "recipient=server" parameter to prevent endpoints from reading location in a message?

Does the UAC always know that there are only proxies between it and the destination UAS?

Does the UAC always understand a particular message does or does not need to be routed based on the location within the request?

Emergency services is an example of, always allow proxy routing when the UAC knows this is an emergency request. But will this be true for all applications of location conveyance in the (relatively near-term) future? I'm not so sure.

The UAC has a mechanism for making location not readable by proxies if it doesn't want them to, use encryption e2e. But this has interesting properties in at least one case, the a user calls the nearest Pizza Hut.

A UAC can encrypt its location in the first INVITE, but if Pizza Hut has a national or regional number, that routes on the location of the caller, the message will probably return a 493 (undecipherable).

Does the UAC then send location to PizzaHut.com unencrypted, knowing this is required to get the INVITE to the right store?

There are other usages of this, other than Pizza Hut.

Does anyone have a suggestion for informative text that can address each of these two (or more) situations?

At the moment, all text around "recipient=" is suggestive, and not definitive, because of what Dean says below.

That said, I could put something in like "unless a future standards track RFC says otherwise, the use of "recipient=" parameter within any locationValue is informative in nature", thus leaving the door open for ECRIT's phoneBCP doc to refine usage in the emergency context, as well as any other service defining document to do the same type of refinement.

James

At 08:28 AM 11/26/2007, DRAGE, Keith \(Keith\) wrote:

This just seems to me to be an inappropriate change of RFC 2119 language.

If we really mean either of these, then we should be specifying that the message is encrypted in the first place.

What we probably mean is something informative (because we cannot make a normative statement on what applications do with the data), stating that usage of the message so tagged is inappropriate because the sender did not intend it to be used for this purpose.

Regards

Keith

> -----Original Message-----
> From: daniel grotti [mailto:[EMAIL PROTECTED]
> Sent: Saturday, November 24, 2007 11:38 AM
> To: Dean Willis
> Cc: IETF SIP List; James M. Polk
> Subject: R: R: R: [Sip] a question about IETF draft location
> conveyance 09
>
> I know.
> May be SHOULD NOT instead MUST NOT could be better.
>
> daniel
>
>
> ----------------------------------
>        Daniel  Grotti
> D.E.I.S. - University of Bologna
> ----------------------------------
>        Via Venezia, 52
>   47023 Cesena (FC) - ITALY
> ----------------------------------
> e-mail: [EMAIL PROTECTED]
> ----------------------------------
>
>
>
> -----Messaggio originale-----
> Da: Dean Willis [mailto:[EMAIL PROTECTED]
> Inviato: sab 24/11/2007 2.32
> A: daniel grotti
> Cc: Hannes Tschofenig; IETF SIP List; James M. Polk
> Oggetto: Re: R: R: [Sip] a question about IETF draft location
> conveyance 09
>
>
> On Nov 22, 2007, at 12:08 PM, daniel grotti wrote:
>
> > Hi all,
> > so why don't emphasize this point in the next draft, saying :
> > "Proxy server MUST not read messages with "recipient=endpoint"
> > paramenter setted".
> > This is my point of you.
> >
> >
>
>
> because from a security standpoint, this prohibition is meaningless.
> Intermediate nodes can and will read anything that's in
> plaintext, and SOMEBODY will come up with a rationale, in
> some context or another, for doing so.
>
> And has been pointed out, doing so does not appear to create
> a compatibility problem. It doesn't break the protocol. It
> might defeat security-through-obscurity. It might be rude, or
> otherwise socially unacceptable. But those don't qualify for
> a MUST level protocol prohibition.
>
> --
> Dean
>
>
>
>
> _______________________________________________
> Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
> This list is for NEW development of the core SIP Protocol Use
> [EMAIL PROTECTED] for questions on current sip
> Use [EMAIL PROTECTED] for new developments on the application of sip
>



_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip





_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to