Re: [Ecrit] [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

"Sri Gundavelli (sgundave)" <sgundave@cisco.com> Tue, 25 April 2023 14:31 UTC

Return-Path: <sgundave@cisco.com>
X-Original-To: ecrit@ietfa.amsl.com
Delivered-To: ecrit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 663E3C1519B5 for <ecrit@ietfa.amsl.com>; Tue, 25 Apr 2023 07:31:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.598
X-Spam-Level:
X-Spam-Status: No, score=-14.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, RCVD_IN_MSPIKE_H2=-0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="CgNNy5Ex"; dkim=pass (1024-bit key) header.d=cisco.com header.b="VKyLiS66"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Y_mcd2t02Wsa for <ecrit@ietfa.amsl.com>; Tue, 25 Apr 2023 07:31:40 -0700 (PDT)
Received: from alln-iport-7.cisco.com (alln-iport-7.cisco.com [173.37.142.94]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D13E5C1519B2 for <ecrit@ietf.org>; Tue, 25 Apr 2023 07:31:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=151559; q=dns/txt; s=iport; t=1682433099; x=1683642699; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=ds2yWtMSivnXV8mczBVA2pxxjZlSv2/dIlPI5cuyRaE=; b=CgNNy5Exvx/oQxN7WWeQGbvRqLILtZCRRHpFVh8msza62ElIjtG+8NtM QlP7IRQI3pgfLllIydOj3ykTURkExbHAor0qr2to/3oM3pHOwuUO+XtKY 4xzdA5FNuNIGMkkmmpLoPbtnM5EsFaQnnQT2r8xhMMm7Ig8lXwk+0gCV4 k=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:47Hwzh9fv7DvkP9uWO3oyV9kXcBvk7zwOghQ7YIolPcXNK+i5J/le kfY4KYlgFzIWNDD4ulfw6rNsq/mUHAd+5vJrn0YcZJNWhNEwcUblgAtGoiEXGXwLeXhaGoxG 8ERHER98SSDOFNOUN37e0WUp3Sz6TAIHRCqLgVoIOj8BIP6hMWs3Of08JrWME1EgTOnauZqJ Q6t5UXJ49ALiJFrLLowzBaBrnpTLuJRw24pbV7GlBfn7cD295lmmxk=
IronPort-Data: A9a23:lnCtxqrrCVgUMY6kiMUs6zDrgSdeBmIcZRIvgKrLsJaIsI4StFCzt garIBnTOazcZjOgLo1wbY2+90sH7JbTytI2TwdpqCwwHiwQ8OPIVI+TRqvS04x+DSFioGZPt Zh2hgzodZhsJpPkjk7xdOCn9xGQ7InQLlbGILas1htZGEk1GU/NtTo5w7Ri2tIy3IDja++wk YqaT/P3aQfNNwFcagr424rbwP+4lK2v0N+wlgVWicFj5DcypVFMZH4sDf3Zw0/Df2VhNrXSq 9AvY12O1jixEx8FUrtJm1tgG6EAaua60QOm0hK6V0U+6/RPjnRa70o1CBYTQXdcqjqIsNko8 9RmsYDhdyobFIiTwPtIBnG0EwkmVUFH0LbDJX76usuJwgifKz3nwu5lCwc9OohwFuRfWD4Vs 6dGbmlWKEnY3Ypaw5rjIgVort8sMc/nNZ0Sknph1jreS/0hRPgvRo2btIEIjG5r3aiiG96ZV 5s2SxBIbi7mPS1iamUNLbgks/+30yyXnzpw8QLJ+vVfD3Lo5AF6yrnxGNvYZtLMQt9a9nt0v UrP+2D/RxodLtHakGLD+XO3jeiJliT+MG4PKFGm3s5hoVKS6WVKMxw9UUfqn9SLoGvhA80Kf iT45REShaQ18UWqSPz0UBu5vGOIs3Ygtzx4T7xSBOall/O83uqJOoQXZmUbOIF66KfaURRvh wHUzoKxbdB6mOfNIU9x4It4ut9b1cI9AmYYYSYCQWPpCPG8/dlv1XojojufeZNZY/X8HTX2h juNtiV73u1Vhs8Q3KL99lfC695NmnQrZlNrjuk0djv6hu+cWGJDT9fxgbQ8xa0dRLt1tnHb4 BA5dzG2tYji962lmi2XW/kqF7q0/fuDOzC0qQcxT8N6qW31pyb5LNA4DNRCyKFBb5tsldjBP RC7hO+tzMM70IaCNPUuONvhV6zGM4C6SYm+PhwrUja+SsEhKFDYlM2fTUWRxGvq2FM9ir0yP IzzTCpfJShyNEiT9xLvH711+eZynkgWnDqPLbillE7P+eTFOxaopUItbQHmghYRtv3U+W04M r93aqO39vmoeLejM3WIodNIfQpiwLpSLcmelvG7v9Wre2JOMGogEPTWh7gmfuRYc259z48kI lnVtpdk9WfC
IronPort-HdrOrdr: A9a23:wMUh4qGSx5kcAXz7pLqFX5HXdLJyesId70hD6qkvc3Jom52j+P xGws526fatskdsZJhBo7q90KnpewK5yXcH2/hvAV7CZniqhILMFuBfBOTZskXd8kHFh4xgPO JbAtVD4b7LfBRHZKTBkXKF+r8bqbHtkNHKuQ6d9QYWcegAUdAG0+4NMHfjLqQAfnghOXNWLu v42iNAnVedUEVSSv7+KmgOXuDFqdGOvonhewQ6Cxku7xTLpS+06ZbheiLokCs2Yndq+/MP4G LFmwv26uGIqPeg0CLR0GfV8tB/hMbh8N1eH8aB4/JlawkEyzzYJLiJaYfy/gzdk9vfrWrCV+ O85yvICv4DqE85uFvF5icFlTOQlgrGoEWSt2NwyUGT0PARAghKRPaoQeliA0PkA41KhqAk7E oAtVjpx6Z/HFfOmj/w6MPPUAwvnk2ooWA6mepWlHBHV5ACAYUh5bD30XklZqvoJhiKobwPAa 1rFoXR9fxWeVSVYzTQuXRu2sWlWjA2Eg2dSkYPt8SJ23wO9UoJhXcw1YgahDMN5Zg9Q55L66 DNNblpjqhHSosTYbhmDOkMTMOrAijGQA7KMmiVPVP7fZt3cE7lutry+vE49euqcJsHwN87n4 nASkpRsSood0fnGaS1rep2G9D2MRGAtBjWu7RjDsJCy87BrZLQQF++dGw=
X-Talos-CUID: 9a23:8KaWcm/rFHkAoXB15M+Vv34fO88kXXSE93b7J1PpN0tbYpjKEUDFrQ==
X-Talos-MUID: 9a23:KZf5cQ8k0y5DJBwmw1HWFhuQf4BYsouMImcPq7NYi+TUBzZVES2ylCviFw==
X-IronPort-Anti-Spam-Filtered: true
Received: from alln-core-10.cisco.com ([173.36.13.132]) by alln-iport-7.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 25 Apr 2023 14:31:37 +0000
Received: from alln-opgw-1.cisco.com (alln-opgw-1.cisco.com [173.37.147.229]) by alln-core-10.cisco.com (8.15.2/8.15.2) with ESMTPS id 33PEVaFE005080 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <ecrit@ietf.org>; Tue, 25 Apr 2023 14:31:37 GMT
Authentication-Results: alln-opgw-1.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=sgundave@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="5.99,225,1677542400"; d="scan'";a="633641"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=SW02Hni7YedrncvSEWn8nXvbwpLIRDN9CQr3p/1qASVD8J7QFKk/VrohkBC+2UDB07pKAjwODJEjRChxqkYT8U+KskmEfl6odBSj61RpfxXlG1Ul++OJP5DlQQAg63pzrDs5tMAPAD6/P2U91TnG24FptK7ivViKsDop7Vaygi9rD+Sqd2eNjj1J8/gKwLSBAzK8rB7Xb3WvPrrHLdQ/uyPPABNLHqCM6TnsQBAAHLE4cB9Sm4ZXTVlWZoIUBsyienFV53397WBX3Tcqo3IpfTvY6wgfc0v3BwgWeoYMJg8w4Nrk3iQrI1GwUcGu3BcPrwjPHnlBsaexpK5w1DSM+A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ds2yWtMSivnXV8mczBVA2pxxjZlSv2/dIlPI5cuyRaE=; b=fxDN7AKTPHb22dtiypgPtjzq274c3bjo+sS2q5+Z7YZCwfuxQ9M84G1UQjEa6Lf0/sDRhs3rFXIIv6BvPjtE/hyrprWGz9yMrgPDuzRpaAfXJh70LRHr+QWhVaxnQvZaHaezAgFYFLjYRSXNJ4eKkfgLOy0ckPA2aAvVqi0/40b3eYY7+hVqHqq2xbSjcilN0xqb98Fl/nrnQGe/4fk6zescXYntwOpqO602ryIqQ+Trh+PQb4QiriqK4sUvvlZIClb1oxlhMw47mxXMU+/eppcC2nnS/TvBB5UeDMUdehPJNASXrmjQh+KbyDtXWEt+UtOen9RCnw17Eqk8W0wYuQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ds2yWtMSivnXV8mczBVA2pxxjZlSv2/dIlPI5cuyRaE=; b=VKyLiS664eYZFrwX1TGv8SiFZ3RiUou6XZkiFD+1jrnkiB8Lk49mxsB+la7TfmzhB/YMRmxljqMavzwMfkzLvLMpNoLMIe54yJ9Yd10LahycKgzu5gvY0ZQmPl+5UllylqsYl+iBACp4O1IJe24fOQ+ytpTPD1GnOESJ/kdMk9U=
Received: from SJ0PR11MB5072.namprd11.prod.outlook.com (2603:10b6:a03:2db::18) by CO6PR11MB5601.namprd11.prod.outlook.com (2603:10b6:303:13d::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6319.34; Tue, 25 Apr 2023 14:31:33 +0000
Received: from SJ0PR11MB5072.namprd11.prod.outlook.com ([fe80::dbd6:ef09:8cd4:8842]) by SJ0PR11MB5072.namprd11.prod.outlook.com ([fe80::dbd6:ef09:8cd4:8842%7]) with mapi id 15.20.6319.034; Tue, 25 Apr 2023 14:31:33 +0000
From: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
To: Brian Rosen <br@brianrosen.net>
CC: "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Thread-Topic: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt
Thread-Index: AQHZVgcUG19IfgTCTUmFa4Y3i+x/wq8NNHkAgAd+agD//9yIgIAAuyuAgAANfQCABCeDYP//1+WAgAGJU+CAADZngIANa8CAgACUAACAAJL9gP//vG0AAPoQOoD//7vrgIAAusyAgADhdoCAALW6AIAA4yqAgAbbRwCAAOCiAA==
Date: Tue, 25 Apr 2023 14:31:33 +0000
Message-ID: <070697D7-B167-4255-9A0A-B2C755A8DAE7@cisco.com>
References: <167875162972.58518.19006032661356449@ietfa.amsl.com> <385DA58A-5118-44EF-9E8A-B8FA5F28F4EA@cisco.com> <3E83FA22-CF07-4C38-B73C-41AC1AEEB688@brianrosen.net> <39CED79A-41C3-4EDD-AC5D-E12EC3961DB4@cisco.com> <79EE2266-C2D9-4022-98D9-23549987EC6A@brianrosen.net> <C863C7D9-AC88-4A13-94C6-82456DD88D7E@cisco.com> <HE1PR07MB4441359E8633CA7FC004C74A93929@HE1PR07MB4441.eurprd07.prod.outlook.com> <11AD2ACE-5AE1-4FA3-B5E7-3F4A364FDAC6@cisco.com> <FR3P281MB150306DC0BA41BBB0E0F5CD5F9939@FR3P281MB1503.DEUP281.PROD.OUTLOOK.COM> <4A6640AB-A55C-41A3-88A7-E5170000B609@cisco.com> <8E78998E-4987-411E-82A2-6BF7ADAAA0F9@brianrosen.net> <1183A4BD-58D3-4D6F-9FD5-A62E2F732969@cisco.com> <0047223D-225C-47E0-8050-EBA509369B96@brianrosen.net> <75FC02E0-19C1-42D2-9443-4E00ED6902A8@cisco.com> <1F5090C1-F98A-438C-BA80-46585428D68D@brianrosen.net> <551EFA9A-9BD1-47DB-A611-D6988AA8CF22@cisco.com> <EFF229A6-0481-4E83-9427-12170C37D409@brianrosen.net> <CD7AB19E-4B65-4C76-9AB9-66A77E516EB8@cisco.com> <5E87E0DD-7E1B-46DD-8E31-320930440E42@brianrosen.net> <967D6D82-1433-4C2C-BB55-1AA640AAA27D@cisco.com> <6EDEEF64-F0BA-4869-B4DC-60C0EF9A6A40@brianrosen.net>
In-Reply-To: <6EDEEF64-F0BA-4869-B4DC-60C0EF9A6A40@brianrosen.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.72.23041401
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB5072:EE_|CO6PR11MB5601:EE_
x-ms-office365-filtering-correlation-id: aa177f86-0f38-4bfe-7e75-08db4599c4ab
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5072.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(136003)(366004)(376002)(396003)(39860400002)(346002)(451199021)(316002)(66899021)(15650500001)(66446008)(64756008)(166002)(6916009)(4326008)(38100700002)(41300700001)(122000001)(5660300002)(9326002)(8936002)(8676002)(33656002)(36756003)(86362001)(38070700005)(2906002)(30864003)(66476007)(66556008)(966005)(6486002)(71200400001)(53546011)(6512007)(6506007)(26005)(478600001)(2616005)(83380400001)(66574015)(186003)(54906003)(76116006)(66946007)(45980500001)(579004)(559001); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_070697D7B16742559A0AB2C755A8DAE7ciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5072.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: aa177f86-0f38-4bfe-7e75-08db4599c4ab
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 Apr 2023 14:31:33.4650 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: bPAgSOFzDQ9ZiM1+bVqcB1S/bJiTP7l/spTsyQvJT1+Ir/fUK5xGs3qj8wGofyQoixqO6ng71n+J1Qk7ePBkWA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO6PR11MB5601
X-Outbound-SMTP-Client: 173.37.147.229, alln-opgw-1.cisco.com
X-Outbound-Node: alln-core-10.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ecrit/NsFL6Twoj8YiQE2IIxPqFZtv2v4>
Subject: Re: [Ecrit] [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Emergency Context Resolution with Internet Technologies <ecrit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ecrit>, <mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ecrit/>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ecrit>, <mailto:ecrit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 25 Apr 2023 14:31:44 -0000

Hi Brian,

Sure. Makes sense to me. Will add considerations around location types and validation considerations, also on CLF entry population. Will add some text.

Regards
Sri


From: Brian Rosen <br@brianrosen.net>
Date: Monday, April 24, 2023 at 11:08 AM
To: Sri Gundavelli <sgundave@cisco.com>
Cc: "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

It is common to actually populate a location that fails the validation test into the database, because generally, incorrect location is better than no location, but the wording in the doc should state that only validated information shall be placed in the CLF.  Validation only applies to civic addresses, not geo.

The system revalidates location when it is received, so the call taker will know that the location was invalid.  That causes more questions to be asked and slows response, but as above, incomplete, or somewhat erroneous location is better than none, as long as we know that’s what it is.

Brian


On Apr 20, 2023, at 12:25 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:

Hi Brian,

Thanks for the larger context around emergency architecture evolution.

I fully agree any new technical proposal that we publish should be forwarding looking, and not be limited to legacy architectures.

Let’s review the technical issue on location issue, around “location validation”.  In the proposal we have when an emergency caller, using the emergency profiles attaches to the Wi-Fi hotspot, the location of the caller is reported by the access point to the IDP, which makes it into the CLF (Connectivity Location Function).

The location of the caller is populated dynamically. But here in the proposal we did not talk about the validity of the location. May be as you suggested we can certainly add steps where the IDP will perform a LVF check. Meaning, before we insert the location into the CLF (Secure Location Tag / Access Point Identifier: Civic Address or Geo-spatial coordinates), we can do a LVF check of the AP reported location.  If the check fails, the location entry can be tagged with a marking that it failed the check. When there is subsequent CLF check during the emergency call, the system will be aware that the address did not pass the LVF check. Thoughts on this?
Regards
Sri



From: Brian Rosen <br@brianrosen.net>
Date: Wednesday, April 19, 2023 at 12:52 PM
To: Sri Gundavelli <sgundave@cisco.com>
Cc: "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

I appreciate that there are improvements in location accuracy in WiFi.  I was under the impression that much of the improvement was in software in or behind the device (that is, the OS) but if it’s actually in the WiFi network, that’s great.

The emergency calling system is in the midst of a major change.  In North America, the new system is known as NG9-1-1, in the EU, its NG112.  Many existing systems still use legacy mechanisms, and we’re roughly half way in the transition, or maybe less, depending on how you count, in the US.

NG911/NG112 is based on the IETF design described in RFC6881.   I don’t think it makes any sense to create a new IETF document that only works on the older systems.  You could describe backwards compatibility if you want, but the design should be geared towards the newer systems.

Even in older systems, where a user is entering a location into a website, that location is validated against a database maintained by the emergency call authorities before it is accepted into the database.  In the US and Canada, that older database was “MSAG”, Master Street Address Guide.   In the new one, it’s called “Location Validation Function” (LVF), which uses the LoST protocol to do the validation.  You are not allowed to send an unvalidated location either in older or newer systems.  The documentation you are looking at is the user level, and doesn’t show the back end validation that is occurring.  It’s literally been 40 years since validation was required.  The location configured in the AP, if it is to be sent in an emergency call, MUST be validated before use.

Brian






On Apr 19, 2023, at 12:01 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:

Hi Brian,

Thanks. We should have added reference to RFC 6881.

On the aspects around location configuration and reporting, the proposal does conform to the location requirements stated in section 6.2, RFC 6881.  We do require the WLAN network supporting emergency service to be able to provide the Civic and/or Geo-spatial coordinates of the access point / caller. We do understand it is not just translating RFC-4776 / RFC-6225 obtained from an egress router into RFC-5880 attributes, but the indicated location has to meet the local regulatory requirement.

The reported location is not any “nearest hotspot”, but it is either the location of the access point serving the device, or the location of the device (when the network is capable of supporting localization services).

There has been good amount of progress over the years in the Wi-Fi world around location tracking.  The ability for the access point to be able to track the location of the connected devices is a basic capability. Many indoor applications rely on indoor localization of the device.  The granularity of the reported location and confidence levels should meet most/any local regulatory requirement around location. Also, an AP operating 6 GHz Standard Power mode must be able to provide precise location before getting an AFC grant for spectrum resource, and this does include Z coordinates that you have talked about. With the elements reported from the AP to the IDP, the AP identifier, a secure location tag, and Civic/Geo-spatial coordinates, we should be able to meet these requirements.

I looked at the documentation of Carrier Wi-Fi calling in many operator websites, and in end points, that all require the user to enter the civic address before making the call. That is the deployed art. What we have is a network provided location; a trusted network node configured to support emergency services providing the location of the caller.

W.r.t the LoST reference, I would think the LoST work is still relevant in this context. The PSAP lookup for the reported location is something the backend system can leverage. This should not have any bearing on how the AP reports its location to the IDP, or how its configured.

Regards
Sri






From: Brian Rosen <br@brianrosen.net>
Date: Tuesday, April 18, 2023 at 12:35 PM
To: Sri Gundavelli <sgundave@cisco.com>
Cc: "R.Jesske@telekom.de" <R.Jesske@telekom.de>, Christer Holmberg <christer.holmberg@ericsson.com>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Generally speaking, supporting emergency calls is not trivial.  There is a bunch of code to do that, even assuming that the device is already some kind of phone.  Please look at RFC6881.  What is deployed doesn’t exactly follow 68881, but it’s close.

The location MUST be validated before use.  It’s not enough to just use the RFC4776 civic address elements: it has to be a location the 9-1-1 system recognizes as valid.  There is a protocol (LoST, RFC5222) and a profile of PIDF-LO (nation specific) that has to be used to construct and validate the address.  These days, you also need Z (floor).  Generally, nearest hotspot isn’t adequate, especially if it’s on the wrong floor.  I wouldn’t say it’s totally wrong to use the location of the nearest hotspot, but that would be a fallback when whatever you use to reasonably accurately estimate location fails.

We don’t use pANIs any more.  Also, that was US (or really US and Canada) specific.  There never was a “P-ANI” header.  We do use the SIP Geolocation header to carry the location.  The emergency system doesn’t “look up” a location any more.  The location is included in the signaling with the call.

Brian




On Apr 18, 2023, at 11:26 AM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:

Hi Brian,

The use-case is about the device in the vicinity of a Wi-Fi hotspot which support emergency passpoint profiles. The device with the emergency passpoint profile, but with no specific access credentials to that hotspot, should be able to discover the network, perform an attach and complete access authentication to the IDP associated with the emergency realm. This will enable to the device to have internet connectivity with limited access for making emergency calls.

Passpoint profiles are widely supported by the device eco-system and so the definition of a new profile should not require any new code/development on the device. The aspects around network discovery, selection and association will still be based on the elements in the profile. The emergency profile can be installed at the time of manufacturing (requires rule making from the local regulator), or installed by the enterprise IT.

Location of the emergency caller is an important element in the system. The access point configured to support emergency calling will have to be configured with the location of the access point. When a device is permitted to attach to the network using the emergency passpoint profile, the access point will report RFC-5580 location elements, AP identifier and/or the secure location tag in the RADIUS signaling to the IDP.

The IDP will update these location elements and associate them to the access point (AP identifier and/or the Secure Location Tag).  The device making the emergency call will include these elements in the SIP P-ANI header. The emergency calling system will be able to look up the location from the IDP by using the elements in the P-ANI header. This allows the network to validate the device reported location with a trusted access point reported location. The reporting element, which is the access point, is a trusted network element with the OpenRoaming federation issued certificates and this provides an additional layer of validation of the caller reported location. This approach eliminates rogue calls with incorrect location in the SIP signaling.


Regards
Sri








From: Brian Rosen <br@brianrosen.net>
Date: Tuesday, April 18, 2023 at 5:30 AM
To: Sri Gundavelli <sgundave@cisco.com>
Cc: "R.Jesske@telekom.de" <R.Jesske@telekom.de>, Christer Holmberg <christer.holmberg@ericsson.com>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

I’m tempted to say “call me when the FCC does this”, but we’ll put that aside for now :)

This is the IETF, so when you say “FCC” you really need to say “the local regulator”.  You need to discuss how that actually works, especially when you are near borders.  you may have a hotspot connection in another country from the one that would provide emergency services,

Are you assuming Internet connectivity everywhere here, so that the device can contact the voice service provider?  You should probably say that.

This is a fair amount of code on a device that would only be used in this very specific circumstance.  Lots of testing/certification.  Any ideas of how that would be done?  What is the incentive/imperative for a device mfg to make this work?

Are you aware of the “dispatchable location” issues?  Your location has to be dispatchable.  How are you getting that?


Brian





On Apr 13, 2023, at 4:09 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:

Hi Brian,

On the second part of your question, few thoughts:

We are mainly targeting Wi-Fi hotspots supporting passpoint profiles. For example, taking the WBA’s OpenRoaming federation, there are identity providers, and access network providers, all part of the same roaming federation and with a legal framework between them. A user with a  given passpoint profile identifying a given RCOI (Roaming Consortium Id) will be able to latch on to any of the access network and complete access authentication.  IDP/RCOI policies are enforced on the session.

With the proposal, there will be IDP specific to the emergency realm and FCC will be the legal entity. FCC can authorize an MNO with the IMS network, or choose a voice service provider for supporting the emergency realm. When the user with emergency passpoint profile attaches to the hotspot support emergency profile, the authentication signaling from the Wi-Fi AP/hotspot will be terminated in the authentication server in the IDP, and the policies and configurations (including SIP service configuration)  associated with the emergency profile will be delivered to the device (IDP -> AN -> Device).  The device will complete SIP registration with the Proxy (obtained from the IDP).  So, to you question who is providing the SIP path, it is the entity designated by FCC and not the access network providing the voice services. The below diagram should provide some context of the environment.

The legal framework between ANP and IDP is an important aspect, as there will by now means to provide immunity to the ANP (with FCC as the IDP) against any call failures. We are thinking such legal provisions will improve the adoption of emergency calling by any access providers. This approach brings FCC into the equation; it helps promote the adoption.

You also talked about enterprise environment.  The above framework should technically work for enterprise use-case, including tele-worker use-cases. But as you point out we need to layout some considerations on the interconnect with the enterprise PBX and the emergency system. Some more thinking is needed here.



<image001.png>


Regards
Sri


From: Brian Rosen <br@brianrosen.net>
Date: Thursday, April 13, 2023 at 10:12 AM
To: Sri Gundavelli <sgundave@cisco.com>
Cc: "R.Jesske@telekom.de" <R.Jesske@telekom.de>, Christer Holmberg <christer.holmberg@ericsson.com>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

The emergency services are firmly against so-called “unitialiized devices”.  They are stuck with the regulatory requirement that has been put on the providers of such devices to support emergency calls, but they would be strongly against expanding the scope of such devices: there are roughly no cases of real emergency calls using such devices, and many, many cases of false emergency calls that cannot be traced to the caller.  I would strongly suggest you don’t pursue such an expansion of that requirement.  It’s a bad idea, and it doesn’t do what proponent’s hoped it would do.  We have substantial real world experience.

You need a reliable identity that can be traced to a real person.  It’s never ironclad (pre-paid cellular for example), but it has to work most of the time.

I’m still confused who the entity that is providing the SIP path is supposed to be.  Are you expecting the WiFi access point owner to do that or some mobile network operator?  If it’s the WiFi AP owner, then they don’t have an interconnect in most cases: they might have a PBX on that network with a PSTN interconnect (like a SIP Trunk) that supports emergency calling, but that’s fairly far removed from the WiFi network and assuming they will allow a random WiFi user to connect to their AP, and then provide a SIP path to emergency services seems very far fetched to me.

But if it was some kind of mobile network operator, what relationship do they have with the enterprise that has the AP?

Callbacks require identity: see above

Brian







On Apr 13, 2023, at 11:25 AM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:

Hi Brian,

Thanks for the follow-up. These are very good comments. In the revised version, we will capture all these points.

On the requirement around interconnect to emergency network, we are thinking the FCC designated entity providing identity and voice services for the realm, “sos.fcc-authorized.org<http://sos.fcc-authorized.org/>” will be able to meet the requirements, and the interconnect will be similar to how any MNO’s IMS interconnect is realized today. We will analyze this and add some text.

On traceability comment, the current cellular systems allow emergency call from a device with an expired SIM subscription, or no SIM card. At least in some countries this is allowed. Most GSM phones allow calling of emergency numbers without a SIM card, 112, 911, 118, 000, 110, 08, and 999. Calling these numbers will force the device to use any available network. I need to check the call flow if there is exchange of IMEI, but AFAIK there is no traceability there. In the proposal we have we require the use of emergency passpoint profile, it is possible to signal device specific identifiers in the signaling, and that is one way to realize device traceability. We already have mechanisms for location traceability. But, this allows traceability to a device, not to a person. Mark may have some additional thoughts here.

On the call backs, once the device is able to perform SIP registration with the emergency SIP proxy, it will be possible to support the callbacks. Will analyze this in detail.

Regards
Sri







From: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Date: Wednesday, April 12, 2023 at 4:36 PM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
Cc: "R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>" <R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>>, Christer Holmberg <christer.holmberg@ericsson.com<mailto:christer.holmberg@ericsson.com>>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>, ECRIT <ecrit@ietf.org<mailto:ecrit@ietf.org>>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

<moving to ecrit>
Some entity has to connect to the emergency network (in North America and EU Next Gen systems, this is the “Emergency Services IP Network” or ESInet.  Although the standards say that calls must be accepted over the Internet, in practice all current implementations have direct interconnect between the originating service provider and the ESInet.  If it’s an IMS network operator, they have such connections, and would use their E-CSCF.  I think it’s pretty unlikely that they would support a non-IMS call path.  But there has to be some OSP.  It could be an enterprise, as long as the enterprise permitted access, had a reasonable authentication system tied to some kind of identity and a SIP proxy server.

The emergency authorities don’t like unauthenticated calling sources.  That is how we get swatting.  So your proposal has to describe what identity is, and how that’s traceable to a real person.  You also have to describe how we do call-backs to the caller.

Brian







On Apr 4, 2023, at 1:38 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com<mailto:sgundave@cisco.com>> wrote:

HI Roland,

Thank you for your comment.

I agree,  if IMS is unavailable P-CSCF/E-CSCF will all be unavailable.  The key point is non-availability of the cellular network, for PDU creation and/or accessing emergency voice functions. This goes back to Christer’s comment suggesting to use non-IMS terminology.  We will work on that.

On your other comment, access to IMS for wired/wireline devices with IMS-only subscription is a possibility. But we still need to allow the device to connect to the available hotspot with no access-network credentials and be able to obtain the IMS configuration. The IMS network in question can be based of a generic IETF defined voice function, which can do call routing to the PSAP. If a MNO is willing to let their IMS network be available for wired and non-cellular devices, that is an option.

Once the device gets connectivity to the access network based on the special emergency passpoint profile, the access network can deliver the associated IMS/voice-service configuration options to the device. The realm that we are proposing sos.fcc-authorized.org<http://sos.fcc-authorized.org/> and associated IDP can be configured with the IMS/voice-service configuration. These IMS/voice-service functions can be from an MNO, or some other service provider that FCC will authorize.

These configuration options will be signaled from the IDP to the access network, and in turn will be delivered it to the device over DHCP/ND/802.11. The device can perform registration with those voice functions and can initiate the emergency call.

Regards
Sri




From: "R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>" <R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>>
Date: Tuesday, April 4, 2023 at 12:44 AM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>, "christer.holmberg@ericsson.com<mailto:christer.holmberg@ericsson.com>" <christer.holmberg@ericsson.com<mailto:christer.holmberg@ericsson.com>>, "br@brianrosen.net<mailto:br@brianrosen.net>" <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: "dispatch@ietf.org<mailto:dispatch@ietf.org>" <dispatch@ietf.org<mailto:dispatch@ietf.org>>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Subject: AW: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi,
What does this mean that IMS is unavailable?
When IMS is unavailable also the Emergency service (E-CSCF) is unavailable.

Did you also discover the IMS Access possibilities with Digest, where you have an IMS Subscription w/o any RAN connectivity and only via wireline/WIFI?

Best Regards

Roland

Von: dispatch <dispatch-bounces@ietf.org<mailto:dispatch-bounces@ietf.org>> Im Auftrag von Sri Gundavelli (sgundave)
Gesendet: Montag, 3. April 2023 16:56
An: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org<mailto:christer.holmberg=40ericsson.com@dmarc.ietf.org>>; Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: dispatch@ietf.org<mailto:dispatch@ietf.org>; Mark Grayson (mgrayson) <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Betreff: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi Christer,

Yes, 3GPP does define the interworking architecture with Wi-Fi, where the UE can use Wi-Fi to reach 3GPP core network for PDU establishment. The scenario that we have and what FCC CSRIC 8 looked into is where H-PLMN/V-PLMN and IMS is unavailable. Also, the interworking procedures assume there is Wi-Fi access connectivity. The access network in question may not have any relation to the operator for the UE to perform SIM based authentication to the access network.

The UE may not even have a cellular modem or SIM/eSIM credentials. What are trying to enable is allow the device to use a special emergency passpoint profile for connecting to any of the available hotspots that support emergency calling services. The device may be Wi-Fi only or a dual-radio capable device. Furthermore, if I see the carrier documentation for Wi-Fi calling, it requires the user to configure a civic address prior making any emergency call, and which a caller in distress may never configure. We are addressing this issue, by allowing a trusted access network with the federation issued certificates to signal the location over RADIUS to the IDP/CLF, which the network can cross correlate with the reported location in the SIP signaling.

<image001.png>

Regards
Sri


From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org<mailto:christer.holmberg=40ericsson.com@dmarc.ietf.org>>
Date: Monday, April 3, 2023 at 3:21 AM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>, Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: "dispatch@ietf.org<mailto:dispatch@ietf.org>" <dispatch@ietf.org<mailto:dispatch@ietf.org>>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Subject: RE: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi,

Note that 3GPP has defined emergency calls over WiFi, so please indicate how your draft relates to that work.

Regards,

Christer

From: dispatch <dispatch-bounces@ietf.org<mailto:dispatch-bounces@ietf.org>> On Behalf Of Sri Gundavelli (sgundave)
Sent: Saturday, 1 April 2023 4.53
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: dispatch@ietf.org<mailto:dispatch@ietf.org>; Mark Grayson (mgrayson) <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi Brian,

Sure. Will move the discussion to ECRIT.

Thanks for the pointers to the LoST and PIDF-LO work. Will add some considerations on how devices capable of LoST can obtain location-specific service configuration.


  *   LoST also provides the mechanism to validate location (which you do at configuration time) to make sure the location you send is known by the emergency services.

Ok. We will analyze this. If the mechanisms around Location-validity also covers the cases around detecting rogue/compromised clients, beyond making sure the claimed civic address exists, it will be very useful know. Will add the considerations.


  *   The text has to say how the device uses the location it discovers to make a call (‘perform”), which is what RFC6881 describes.  There are some practical differences in how NG9-1-1 and NG1-1-2 actually work that has to be taken into consideration when looking at 6881.

Ok. Thanks for the pointers. Will add these considerations.


Regards
Sri

From: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Date: Friday, March 31, 2023 at 11:05 AM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
Cc: "dispatch@ietf.org<mailto:dispatch@ietf.org>" <dispatch@ietf.org<mailto:dispatch@ietf.org>>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

I do think discussion on this draft should move to ecrit.

Obtaining the regulatory specific calling service configuration (including the numbers) is defined in LoST (RFC5222).
The location must be provided in PIDF-LO form (RFC4119 and its updates).  That is the form (at least the actual location information part) that you use to query the LoST server to get the configuration data and the form of the data you  send to the emergency services.
LoST also provides the mechanism to validate location (which you do at configuration time) to make sure the location you send is known by the emergency services.
The text has to say how the device uses the location it discovers to make a call (‘perform”), which is what RFC6881 describes.  There are some practical differences in how NG9-1-1 and NG1-1-2 actually work that has to be taken into consideration when looking at 6881.

Brian


On Mar 31, 2023, at 4:55 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com<mailto:sgundave@cisco.com>> wrote:

Hi Brian,

Thanks a lot for reviewing the document. I agree, the document should provide the larger emergency calling context. The current art, the elements in the system, interfaces with the PSAPs and other touch points. We are familiar with the prior efforts in IETF and also standards bodies including 3GPP and around ATIS reports. Perhaps a discussion on how NG911/NG211 emergency service network are deployed will be useful. The document requires more work, and this is just a starting point.

The key technical objective for this work is around enabling a Wi-Fi capable device to be able to discover hotspots that support emergency calling, ability to perform a network attach, be able to obtain the regulatory-domain specific calling voice service configuration (including emergency calling numbers) and be able to perform the emergency call. The focus is also on how the network can obtain the location of the emergency caller and the mechanisms for detecting rogue device signaling incorrect location.  Finally, some considerations on the emergency passpoint profiles that are required to be present on the device. This work complements the prior IETF efforts on emergency support for greatly improving the access to emergency services. There are tens of thousands of Wi-Fi hotspots supporting Wi-Fi roaming based on passpoint standards. This approach allows the devices to be able to use any of those hotspots for making that emergency call.

On the choice of the draft title, we do understand the emergency calling numbers are specific to the regulatory domain in question and the proposed approach is not specific to any one regulatory domain. In that sense, we should have been bit more sensitive about this. We will modify the draft title to be generic and not specific to one regulatory domain.

Thanks a lot for the feedback.

Regards
Sri



On 3/31/23, 2:02 AM, "Brian Rosen" <br@brianrosen.net<mailto:br@brianrosen.net> <mailto:br@brianrosen.net>> wrote:


I have read this draft.


It is totally lacking context of current and evolving standards in emergency calling, including:
1. Basic IETF emergency calling standards (/RFC4119/RFC5222/RFC5985/RFC6881)
2. NG911 and NG112 standards that are being deployed, which are based on the IETF standards
3. ETSI and ATIS standards that support the above


While I don’t know enough about WiFi or some of the 3GPP standards to comment on the technical approach in the doc, I am intimately familiar with what is deployed, and about to be deployed in emergency calling and this doc can’t begin to get considered until it deals with the issues associated with the IETF/NENA/EENA/ETSI/ATIS work.


As a really simple start, authors might consider that 9-1-1 is North America only, while the IETF is world-wide.


Brian









On Mar 27, 2023, at 12:35 AM, Sri Gundavelli (sgundave) <sgundave=40cisco.com@dmarc.ietf.org<mailto:sgundave=40cisco.com@dmarc.ietf.org> <mailto:40cisco.com@dmarc.ietf.org>> wrote:

Dear All:

Attached is the link to the document on Supporting emergency 911 services over Wi-Fi. The attached document proposes an approach based on WBA's Wi-Fi OpenRoaming and uses many other elements which are already in standards.

We are looking for some technical feedback. We believe there is value in IETF identifying new methods for improving e911 service access.

Appreciate any feedback.

Regards
Sri



Name: draft-gundavelli-dispatch-e911-wifi
Revision: 00
Title: Emergency 911 Services over Wi-Fi
Document date: 2023-03-13
Group: Individual Submission
Pages: 15
URL: https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt <https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt> <https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt> <https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt&gt;>
Status: https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/ <https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/> <https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/> <https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/&gt;>
Htmlized: https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi <https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi> <https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi> <https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi&gt;>




Abstract:
Proposed is an approach for supporting emergency 911 services over
IEEE 802.11 based Wi-Fi access networks. This approach leverages the
legal framework and the building blocks of the OpenRoaming federation
for extending emergency 911 calling support to already deployed tens
of thousands of OpenRoaming Wi-Fi hotspots. The proposal addresses
the key issues in emergency calling, around discovery and
authentication to access network supporting emergency services,
emergency access credentials, location determination of the emergency
caller, and delivering emergency voice service configuration to the
device and call routing.








The IETF Secretariat







_______________________________________________
dispatch mailing list
dispatch@ietf.org<mailto:dispatch@ietf.org> <mailto:dispatch@ietf.org>
https://www.ietf.org/mailman/listinfo/dispatch <https://www.ietf.org/mailman/listinfo/dispatch>