Re: [Ecrit] Ben Campbell's Yes on draft-ietf-ecrit-additional-data-34: (with COMMENT)

Paul Kyzivat <pkyzivat@alum.mit.edu> Sat, 03 October 2015 18:51 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: ecrit@ietfa.amsl.com
Delivered-To: ecrit@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 50F631A1B40 for <ecrit@ietfa.amsl.com>; Sat, 3 Oct 2015 11:51:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.235
X-Spam-Level:
X-Spam-Status: No, score=-1.235 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, SPF_SOFTFAIL=0.665] autolearn=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vJwjwppW032a for <ecrit@ietfa.amsl.com>; Sat, 3 Oct 2015 11:51:49 -0700 (PDT)
Received: from resqmta-ch2-09v.sys.comcast.net (resqmta-ch2-09v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:41]) (using TLSv1.2 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4ACD61A1B34 for <ecrit@ietf.org>; Sat, 3 Oct 2015 11:51:49 -0700 (PDT)
Received: from resomta-ch2-19v.sys.comcast.net ([69.252.207.115]) by resqmta-ch2-09v.sys.comcast.net with comcast id Qir01r0032VvR6D01iro9U; Sat, 03 Oct 2015 18:51:48 +0000
Received: from Paul-Kyzivats-MacBook-Pro.local ([50.138.229.151]) by resomta-ch2-19v.sys.comcast.net with comcast id Qirn1r00Z3Ge9ey01iropb; Sat, 03 Oct 2015 18:51:48 +0000
To: ecrit@ietf.org
References: <20150901144212.18261.13357.idtracker@ietfa.amsl.com> <p06240600d21b6a32baa3@[99.111.97.136]> <13A6EAEC-97BE-43B3-B0D8-2056385A8EB6@nostrum.com> <560FC5AF.3090302@omnitor.se>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <561023C2.3080507@alum.mit.edu>
Date: Sat, 03 Oct 2015 14:51:46 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:38.0) Gecko/20100101 Thunderbird/38.3.0
MIME-Version: 1.0
In-Reply-To: <560FC5AF.3090302@omnitor.se>
Content-Type: text/plain; charset="windows-1252"; format="flowed"
Content-Transfer-Encoding: 8bit
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1443898308; bh=CfiAlBDfGP9Nl9UZVCXdUcX7pabOJJl7TBxwGMrwCCk=; h=Received:Received:Subject:To:From:Message-ID:Date:MIME-Version: Content-Type; b=PpCpNIqRHx66fo30EEHxeD/66zrhM335Ffd6yBwnV13SPNfzJKAUjPRFcu9KQK4hG FDur+ztXx9rO7g35tszO4TFTqHy4cN9rhW/5YdBlRyg9FF774m+67uQy6tbqGiMrab i6vVv23+Xlu2aNUWbgBI2kJVXM/S5edbh9K9henCFK6+pnudZeKUSVgIlhsJD8Inh4 i84FIEgJq9Ze/axZnLo19lB+3Q268hBeXIK81q+ZC/lT+4ZlN0aNqBymbuiGJIQOT2 uu0dYgSMsqb+9PGFZb2THLiHMmTflwZQuUKeIoISB3+Po95jqOobRkpvANHPVNMN+4 HB6WE7mF0vo9Q==
Archived-At: <http://mailarchive.ietf.org/arch/msg/ecrit/dpslz_JtFe8PUhIYV-xJAc1ngE4>
Subject: Re: [Ecrit] Ben Campbell's Yes on draft-ietf-ecrit-additional-data-34: (with COMMENT)
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: <ecrit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ecrit>, <mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ecrit/>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ecrit>, <mailto:ecrit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 03 Oct 2015 18:51:51 -0000

On 10/3/15 8:10 AM, Gunnar Hellström wrote:
> A comment on the 24/7 discussion on section 4.1.5:
> Relay services are supposed to be data providers.
> Sadly, the deployment of relay services is very slow in some regions,
> and if they exist, they often operate limited hours.
> This is of course a problem when making emergency calls, but the wording
> in 4.1.5 should not discourage relay services from registering and
> providing data because they currently have limited opening hours.
> ----------------
> Another issue around relay services: It would be good to get a URI that
> can be used for bridging in the relay service together with a call-back.
> This is because the relay service might have been invoked in a way so
> that the call-back address to the original caller does not automatically
> invoke the relay service. None of the provided data seem to specify that
> kind of URI.
> ----------------

If the relay service was included in such a way that callbacks don't 
bring it back in, then having the URL of the relay service won't 
necessarily mean that the entity doing the callback will be authorized 
to obtain relay services on the callback call.

I don't see a good way to solve that except for the relay service to be 
authorized based on whichever end of the call desires/needs the relay 
service.

	Thanks,
	Paul

> /Gunnar Hellstrom
>
> Den 2015-10-02 kl. 23:38, skrev Ben Campbell:
>> Oops, I just ran across this going back over old messages. I don't
>> think I responded; apologies for that. Comments inline. I deleted
>> sections that don't seem to need further discussion.
>>
>> Thanks!
>>
>> Ben.
>>
>> On 13 Sep 2015, at 18:51, Randall Gellens wrote:
>>
>> [...]
>>
>>>>>
>>>> [Edit: I asked a question below about what happens if you dereference a
>>>> block, and find the URL points to something other than what you
>>>> expected.
>>>> On reflection, I should expand that  to ask how dereferencing errors
>>>> should be handled in general.]
>>>
>>> In general, since this is an emergency call, we want the call to go
>>> through even if there are errors.  It's better that the call go
>>> through with some data blocks missing or unusable than for the call
>>> to fail.
>>
>> That makes sense--is there any text that says that? If not, it might
>> be worth adding.
>>
>> [...]
>>
>>>>> This draft implicitly assumes that the emergency calls are signaled
>>>>> with
>>>> SIP. I don't dispute that assumption, but I think it should it's
>>>> worth a
>>>> paragraph stating it explicitly.
>>>
>>> The Introduction says:
>>>
>>> This document extends the basic set of data communicated with an IP-
>>> based emergency call, as described in [RFC6443] and [RFC6881]
>>>
>>> Both those RFCs are explicitly SIP-based.  However, I'd be happy to
>>> change the text from "IP-based" to "SIP-based" if people feel it
>>> would add clarity.  E.g., to:
>>>
>>> This document extends the basic set of data communicated with a SIP-
>>> based emergency call, as described in [RFC6443] and [RFC6881]
>>>
>>> Or perhaps to:
>>>
>>> This document extends the basic set of data communicated with a
>>> Session Initiation Protocol (SIP) based emergency call, as
>>> described in [RFC6443] and [RFC6881]
>>>
>>> Let me know if you feel this change would be helpful.
>>
>> I think the second version would be helpful.
>>
>>
>> [...]
>>
>>>
>>>> -- 3:
>>>> Is there a critical need for the bit about "certain private-use
>>>> situations"? That seems like license for abuse, without more
>>>> elaboration
>>>> about "prexisting relationship" and "privacy issues addressed".
>>>
>>> The reason for that text is to permit re-use of the mechanisms within
>>> private telematics calls between a vehicle and a telematics service
>>> center (which in turn simplifies the use of the mechanisms when such
>>> calls are emergency calls from the telematics service center to a
>>> PSAP).  The text appears as an exception to a ban on using the
>>> mechanisms outside of an emergency call, so without it, such use
>>> would be violating the RFC.  I thought the text was pretty
>>> restrictive, since it says:
>>>
>>> certain private-use situations where the endpoints
>>> have a preexisting relationship and privacy issues are addressed
>>> within the relationship or do not apply because of it
>>>
>>> If you still feel this text is a "license for abuse" I'd be open to
>>> tightening it, but it seems pretty limited to me.
>>
>> Thanks for the explanation. I can live with what's there.
>>
>> [...]
>>
>>>
>>>> -- 4.1.5:
>>>> Do you intend 24x7 support to be a prerequisite to be a data
>>>> provider?
>>>
>>> It's not within scope of the IETF to make this requirement, but the
>>> expectation is that calls will be processed by mainstream providers
>>> who have 24/7 support for PSAPs.
>>
>>
>> The descriptions says "...information MUST be a URI to a 24/7 support
>> organization..." That sounds like the IETF is making the requirement.
>>
>> I'd be happy to have a non-normative statement that this is expected
>> by the community to be a 24/7 support organization, but the MUST
>> doesn't seem to fit.
>>
>>>> Also, it seems like there are vcard fields that are not useful to this
>>>> purpose and might still have privacy implications. Do we really need
>>>> people
>>>> to send everything?
>>>
>>> The text does not mandate which fields to send.  It encourages
>>> sending all fields because there are some unusual circumstances where
>>> a seemingly irrelevant field might be useful to a call-taker (e.g.,
>>> anniversary might conceivably be useful with a suicidal caller) and
>>> suggests a minimum set.
>>
>> I think there needs to be a balance between "conceivably useful" and
>> "likely to be privacy-sensitive". But IIRC, this discussion is
>> happening separately, isn't it?
>>
>> [...]
>>
>>>> -- 5, list item 1: "The "purpose" parameter also indicates the kind of
>>>> data
>>>> (by its MIME subtype) that is available at the URI"
>>>> What happens if the URL points to something other than the indicated
>>>> thing?
>>>
>>> Then the PSAP doesn't get what it expects, and likely will ignore the
>>> retrieved data, and the call will be processed as if the block wasn't
>>> provided at all.  The PSAP will likely file a discrepancy report with
>>> the provider, which is done out of band.  If the information in the
>>> block is potentially urgent for handling the call, the call-taker or
>>> a supervisor might contact the provider's PSAP support line.
>>
>> That's probably fine, although I wonder if there might be room for
>> guidance that the PSAP shouldn't just load arbitrary data if it gets
>> something unexpected.
>>
>> [...]
>>>> -- 8:
>>>> It might be worth discussing the potential harm done by a malicious
>>>> proxy
>>>> modifying a data element, or a compromised data source return incorrect
>>>> information when dereferencing a URL.
>>>
>>> If an element in the call path is compromised and under the control
>>> of an attacker, it can wreak havoc, but this is generally true for
>>> any system that isn't using end-to-end protection, and even then is
>>> true if an endpoint is compromised.  I'm not sure what would be
>>> helpful to say about this in the Security Considerations section.
>>
>> I'm not going to push the point--but keep in mind the "compromised
>> data source" case involves something _not_ in the call path.
>>
>> [...]
>>
>> _______________________________________________
>> Ecrit mailing list
>> Ecrit@ietf.org
>> https://www.ietf.org/mailman/listinfo/ecrit
>
> _______________________________________________
> Ecrit mailing list
> Ecrit@ietf.org
> https://www.ietf.org/mailman/listinfo/ecrit
>