[dns-dir] FW: WG Review: Authority to Citizen Alert (ATOCA)

"Romascanu, Dan (Dan)" <dromasca@avaya.com> Wed, 21 July 2010 12:33 UTC

Return-Path: <dromasca@avaya.com>
X-Original-To: dns-dir@core3.amsl.com
Delivered-To: dns-dir@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id F2F9E3A69A4; Wed, 21 Jul 2010 05:33:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.42
X-Spam-Level:
X-Spam-Status: No, score=-2.42 tagged_above=-999 required=5 tests=[AWL=0.179, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Hau7+7l2KQN9; Wed, 21 Jul 2010 05:33:12 -0700 (PDT)
Received: from p-us1-iereast-outbound-tmp.us1.avaya.com (nj300815-nj-outbound.net.avaya.com [135.11.29.16]) by core3.amsl.com (Postfix) with ESMTP id 1CF6A3A6B63; Wed, 21 Jul 2010 05:32:59 -0700 (PDT)
X-IronPort-AV: E=Sophos;i="4.55,238,1278302400"; d="scan'208";a="26105990"
Received: from unknown (HELO p-us1-erheast.us1.avaya.com) ([135.11.50.53]) by p-us1-iereast-outbound-tmp.us1.avaya.com with ESMTP; 21 Jul 2010 08:33:11 -0400
X-IronPort-AV: E=Sophos;i="4.55,238,1278302400"; d="scan'208";a="484244794"
Received: from unknown (HELO 307622ANEX5.global.avaya.com) ([135.64.140.12]) by p-us1-erheast-out.us1.avaya.com with ESMTP; 21 Jul 2010 08:32:40 -0400
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Wed, 21 Jul 2010 14:32:18 +0200
Message-ID: <EDC652A26FB23C4EB6384A4584434A04023D0EDE@307622ANEX5.global.avaya.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: WG Review: Authority to Citizen Alert (ATOCA)
Thread-Index: AcsoLRQTmPeHLMjLRWeGRKvStZIitQAo53oQ
From: "Romascanu, Dan (Dan)" <dromasca@avaya.com>
To: ops-dir@ietf.org, dns-dir@ietf.org, "MIB Doctors (E-mail)" <mib-doctors@ietf.org>, aaa-doctors@ietf.org
Subject: [dns-dir] FW: WG Review: Authority to Citizen Alert (ATOCA)
X-BeenThere: dns-dir@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF DNS directorate discussion list <dns-dir.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/dns-dir>, <mailto:dns-dir-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dns-dir>
List-Post: <mailto:dns-dir@ietf.org>
List-Help: <mailto:dns-dir-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dns-dir>, <mailto:dns-dir-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 21 Jul 2010 12:33:14 -0000

 

-----Original Message-----
From: iesg-bounces@ietf.org [mailto:iesg-bounces@ietf.org] On Behalf Of
IESG Secretary
Sent: Tuesday, July 20, 2010 8:00 PM
To: new-work@ietf.org
Subject: WG Review: Authority to Citizen Alert (ATOCA) 

A new IETF working group has been proposed in the Real-time Applications
and Infrastructure Area.  The IESG has not made any determination as
yet.
The following draft charter was submitted, and is provided for
informational purposes only. Please send your comments to the IESG
mailing
list (iesg@ietf.org) by Tuesday, July 27, 2010.

                

Authority to Citizen Alert (ATOCA)
----------------------------------
Current Status: Proposed Working Group

Last Modified: 2010-07-15

Chairs(s)
TBD

Real-time Applications and Infrastructure Area Directors:
   Gonzalo Camarillo <gonzalo.camarillo@ericsson.com>
   Robert Sparks <rjsparks@nostrum.com>

Real-time Applications and Infrastructure Area Advisor:
   Robert Sparks <rjsparks@nostrum.com>

Mailing Lists:
  General Discussion: earlywarning@ietf.org
  To Subscribe: <https://www.ietf.org/mailman/listinfo/earlywarning>
  Archive: <http://www.ietf.org/mail-archive/web/earlywarning>

Real-time Applications and Infrastructure Area Advisor:
   Robert Sparks <rjsparks@nostrum.com>

Description of Working Group:

There are a variety of mechanisms that authorities have available to
notify citizens and visitors during emergency events. Traditionally,
they have done so with broadcast networks (radio and television). For
commercial mobile devices, broadcasting services such as the Public
Warning System (PWS), the Earthquake and Tsunami Warning System (ETWS),
and the Commercial Mobile Alert System (CMAS) are standardized and are
in various stages of deployment.  The Internet provides another way for
authority-to-citizen alerts to be sent, but it also presents new
challenges. While there are some existing layer 2 mechanisms for
delivering alerts, the work in this group focuses on delivering alerts
to IP endpoints only.

The general message pattern that this group is intended to address is
the sending of alerts from a set of pre-authorized agents (e.g.,
governmental agencies) to a large population without impacting layer 2
networks (e.g. causing congestion or denial of service).

The goal of this group is not to specify how originators of alerts
obtain authorization, but rather how an ATOCA system can verify
authorization and deliver messages to the intended recipients. A
critical element of the work are the mechanisms that assure that only
those pre-authorized agents can send alerts via ATOCA, through an
interface to authorized alert distribution networks (e.g., iPAWS/DM-Open
in the U.S.).

The ATOCA effort is differentiated from and is not intended to replace
other alerting mechanisms (e.g., PWS, CMAS, ETWS), as the recipients of
ATOCA alerts are the wide range of devices connected to the Internet and
various private IP networks, which humans may have "at hand" to get such
events, as well as automatons who may take action based on the alerts.
This implies that the content of the alert contains some information,
which is intended to be consumed by humans, and some which is intended
to be consumed by automatons.  

Ideally, the alerts would contain, or refer to media other than text
media (e.g., audio and/or video). The initial work in the group is
focused on small messages, which may be mechanically rendered by the
device in other forms (text to speech for example). Future work in the
group may investigate rich media.

In situations of a major emergency there could be scenarios where there
are multiple alerts generated that may require that a priority mechanism
(defined by alert originator policy) has to be used. The work on a
resource priority mechanism is out of scope of the initial charter, but
may be revisited at a later date.

Which devices should get alerts is primarily driven by location.  
The first set of recipients that must be catered for are those within
the area identified by the alert originator to be affected by the
emergency event.  In many jurisdictions, there are regulations that
define whether recipients/devices within the affected area have opt-in
or opt-out capability, but the protocols ATOCA will define will include
both opt-in and opt-out mechanisms. The group will explore how to
support both opt-in and opt-out at the level of communication protocols
and/or device behavior.

Another class of recipients that are in scope of the work are explicit
opt-in subscriptions which ask for alerts for a specified location, not
necessarily the physical location of the device itself.
An example of such a subscription would be 'send me alerts for location
x' (previously determined as the location of interest).
This work may build on existing IETF GEOPRIV location work.

There are efforts in other fora on early warning, which will be
considered in this effort.  For example, we expect to make use of the
OASIS Common Alerting Protocol (CAP) for the encoding of alerts. OGC,
ATIS, TIA, ITU-T, ETSI and 3GPP also have alert efforts underway, and
consultation with these efforts will be undertaken to avoid unnecessary
duplication of effort and also to avoid unintentional negative impacts
on the networks. Of course, existing protocols for delivering messages
(e.g., SIP, XMPP, or SMTP) will be the basis for the message delivery
system of this working group.
Any service discovery mechanisms defined by the group are expected to
reuse existing discovery frameworks.

The security implications of mechanisms that can send alerts to billions
of devices are profound, but the utility of the mechanism encourages us
to face the problems and solve them. In addition, the potential
performance and congestion impacts to networks resulting from sending
alert information to billions of devices must be considered and solved
if such a service is implementable. To avoid manual configuration of
servers distributing alerts a discovery mechanism will be specified.

NOTE FOR CHARTER REVIEW (this section to be removed before charter
approval): Some early drafts related to this proposed work are
* draft-norreys-ecrit-authority2individuals-requirements
* draft-rosen-ecrit-lost-early-warning
* draft-rosen-atoca-server-discovery
* draft-rosen-atoca-cap
* draft-schulzrinne-atoca-requirements

Goals and Milestones
		  
Jan 2011  Submit "Terminology and Framework" to the IESG for 
         publication as Informational 
		  
Apr 2011  Submit "Addressing security, performance and
         congestion issues for alert distribution" to the 
         IESG for publication as Informational 

Apr 2011 Submit conveying point-to-point Authority to Citizen Alerts
        to the IESG for publication as Proposed Standard

May 2011  Submit "Discovering alerting servers" to the IESG for 
         publication as Proposed Standard
		  
Jun 2011 Submit conveying point-to-multipoint Authority to Citizen 
        Alerts to the IESG for publication as Proposed Standard
		  
Aug 2011 Submit "Considerations for interworking with currently 
        deployed alert distribution systems" to the IESG for 
        publication as Informational