Re: [Ecrit] WGLC - draft-ietf-ecrit-data-only-ea-01

Brian Rosen <br@brianrosen.net> Mon, 11 July 2011 22:36 UTC

Return-Path: <br@brianrosen.net>
X-Original-To: ecrit@ietfa.amsl.com
Delivered-To: ecrit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 9B66B11E834C for <ecrit@ietfa.amsl.com>; Mon, 11 Jul 2011 15:36:03 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -102.691
X-Spam-Level:
X-Spam-Status: No, score=-102.691 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, DATE_IN_PAST_03_06=0.044, HELO_MISMATCH_COM=0.553, HOST_MISMATCH_NET=0.311, RCVD_IN_DNSWL_LOW=-1, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KnwiIfE6yVYJ for <ecrit@ietfa.amsl.com>; Mon, 11 Jul 2011 15:36:02 -0700 (PDT)
Received: from barracuda.canadianwebhosting.com (barmail2.idig.net [64.34.111.252]) by ietfa.amsl.com (Postfix) with ESMTP id 77CA911E834B for <ecrit@ietf.org>; Mon, 11 Jul 2011 15:36:02 -0700 (PDT)
X-ASG-Debug-ID: 1310423760-04412114c7141580001-uVEBo8
Received: from wwh1.winweblinux.com (wwh1.winweblinux.com [76.74.186.184]) by barracuda.canadianwebhosting.com with ESMTP id O9BP2kZvXxVoVjGy; Mon, 11 Jul 2011 15:36:00 -0700 (PDT)
X-Barracuda-Envelope-From: br@brianrosen.net
X-Barracuda-Apparent-Source-IP: 76.74.186.184
Received: from [24.154.127.233] (helo=[192.168.1.110]) by wwh1.winweblinux.com with esmtpsa (TLSv1:AES128-SHA:128) (Exim 4.69) (envelope-from <br@brianrosen.net>) id 1QgP56-0005Tf-72; Mon, 11 Jul 2011 15:36:00 -0700
Mime-Version: 1.0 (Apple Message framework v1084)
X-ASG-Orig-Subj: Re: [Ecrit] WGLC - draft-ietf-ecrit-data-only-ea-01
Content-Type: text/plain; charset="us-ascii"
From: Brian Rosen <br@brianrosen.net>
In-Reply-To: <218A5B2C-7978-4FA5-83C1-46C16370B8FB@gmx.net>
Date: Mon, 11 Jul 2011 12:40:17 -0400
Content-Transfer-Encoding: quoted-printable
Message-Id: <ED62FBAD-3C80-4C5E-A784-299F7B5D07B7@brianrosen.net>
References: <BLU152-w387C06DB5A50D4DBB7AEC593410@phx.gbl> <CB9FAC8C-655E-4E46-AF02-111C8320DE7F@gmx.net> <218A5B2C-7978-4FA5-83C1-46C16370B8FB@gmx.net>
To: Hannes Tschofenig <hannes.tschofenig@gmx.net>
X-Mailer: Apple Mail (2.1084)
X-Barracuda-Connect: wwh1.winweblinux.com[76.74.186.184]
X-Barracuda-Start-Time: 1310423760
X-Barracuda-URL: http://64.34.111.252:8000/cgi-mod/mark.cgi
X-Virus-Scanned: by bsmtpd at canadianwebhosting.com
X-Barracuda-Spam-Score: 1.09
X-Barracuda-Spam-Status: No, SCORE=1.09 using global scores of TAG_LEVEL=1000.0 QUARANTINE_LEVEL=1000.0 KILL_LEVEL=9.0 tests=DATE_IN_PAST_03_06, DATE_IN_PAST_03_06_2
X-Barracuda-Spam-Report: Code version 3.2, rules version 3.2.2.68650 Rule breakdown below pts rule name description ---- ---------------------- -------------------------------------------------- 0.01 DATE_IN_PAST_03_06 Date: is 3 to 6 hours before Received: date 1.08 DATE_IN_PAST_03_06_2 DATE_IN_PAST_03_06_2
Cc: ecrit@ietf.org
Subject: Re: [Ecrit] WGLC - draft-ietf-ecrit-data-only-ea-01
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: <ecrit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ecrit>, <mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ecrit>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ecrit>, <mailto:ecrit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 11 Jul 2011 22:36:03 -0000

I am sorry I was not able to participate in this discussion. I think it is heading in the wrong direction.

CAP is a wrapper for data related to an alert.  It's a very common wrapper, but it's just a wrapper.  With respect to a citizen to authority alert, it doesn't provide enough information by itself, and it doesn't provide the kind of location based routing mechanisms we need for these kinds of alerts.

The payload of the alert, that provides the information we need, should be the "Additional Call Data" structure we are working on in ecrit.

We need a SIP mechanism to allow the -phonebcp routing we need for a DATA ONLY alert.  An alert of this kind has an important characteristic uncommon with media sessions - there is no media session.  MESSAGE has the appropriate semantics when used in the "pager" mode.  It's a one time, no session, SIP transaction with the interesting part in the body of the message.

If you have a media session, and what you want to do is send sensor data in the INVITE, the Additional Call Data mechanism does that.  This mechanism is used only when you have no media, all you have is data.

What this really means is that we could, if we wanted to, just put a Call Info header on a MESSAGE transaction and treat it like a call, but most of the sources we have talked to believed that CAP really should be used for a one way alert.  So, we put the CAP message in a SIP MESSAGE transaction.

Brian

On Jul 8, 2011, at 7:15 AM, Hannes Tschofenig wrote:

> I have updated the draft to reflect our discussion. Please find the most recent version here:
> http://www.tschofenig.priv.at/svn/draft-rosen-ecrit-data-only-ea/draft-ietf-ecrit-data-only-ea-02.txt
> 
> I now changed Section 4.1 that talks about the CAP transport: 
> 
> -----
> 
> 4.1.  CAP Transport
> 
>   Since alerts structured via CAP require a "push" medium.  The
>   following SIP requests MAY carry the CAP payload defined in this
>   document: INVITE [RFC3261], UPDATE [RFC3311], MESSAGE [RFC3428], INFO
>   [RFC6086], NOTIFY [RFC3265], and PUBLISH [RFC3903].  The MIME type is
>   set to 'application/cap+xml'.
> 
>   If the server does not support the functionality required to fulfill
>   the request then a 501 Not Implemented MUST be returned by RFC 3261
>   [RFC3261].  This is the appropriate response when a UAS does not
>   recognize the request method and is not capable of supporting it for
>   any user.
> 
>   The 415 Unsupported Media Type error MUST be returned by RFC 3261
>   [RFC3261] if the server is refusing to service the request because
>   the message body of the request is in a format not supported by the
>   server for the requested method.  The server MUST return a list of
>   acceptable formats using the Accept, Accept-Encoding, or Accept-
>   Language header field, depending on the specific problem with the
>   content.
> 
> -----
> 
> Ciao
> Hannes
> 
> On Jul 8, 2011, at 10:50 AM, Hannes Tschofenig wrote:
> 
>> Hi Bernard, 
>> 
>> On Jul 8, 2011, at 2:49 AM, Bernard Aboba wrote:
>> 
>>> Hannes said:
>>> 
>>> The question is also whether we need to restrict the way a CAP payload is sent to a recipient. 
>>> One could argue that it does not really matter whether it is an INVITE, a MESSAGE, or a PUBLISH. 
>>> Which one is best depends on a specific environment. 
>>> 
>>> But you seem to be arguing that we should rather stick with the INVITE instead of using MESSAGE. 
>>> This would at least allow us to get the message understood by every SIP device. 
>> 
>>> [BA] I have no problem with including CAP in MESSAGE.  My major concern was how to ensure interoperability and potential
>>> problems that could delay emergency calls. 
>> 
>> Your suggestion to use INVITE seemed to be interesting but after further thinking about it I am not sure whether the perceived level of interoperability is worth sticking only with an INVITE. If the recipient does not understand the CAP payload (and only the INVITE itself) then there is still no interoperability. 
>> 
>> As such, I believe I have to put text in there regarding error messages and the core SIP spec already provides them, namely 
>> * 501 Not Implemented, and 
>> * 415 Unsupported Media Type
>> 
>> I am still thinking whether we should allow the CAP payload to be used in an  INVITE, a MESSAGE, an a PUBLISH.
>> 
>>> 
>>> This is just an example. Using TCP indeed makes sense for XML-based payloads. 
>>> I don't think we want to mandate that TCP is mandatory-to-use. 
>>> 
>>> [BA] I agree that we don't want to mandate use.  But we are talking about emergency calls, so making a recommendation on how to avoid problems is probably a good idea. 
>>> 
>>> I assume that the device that issues the alert is actually an IP-based device. 
>>> For me the story begins with the first IP device. 
>> 
>>> 
>>> [BA] My problem with signatures is in emergency contexts is the cost and value of validating them.    In ATOCA there may
>>> be a model for this (e.g. government signs the CAP), but in a device scenario, it's not easy to figure out how a PSAP would
>>> validate the signature or what value it would have. 
>> 
>> I agree with you that most deployments will in their judgements about the security threats conclude that they do not need to additionally sign the CAP message and instead rely on the SIP security mechanisms. That's my assumption. Still, the security consideration section lays out the options. 
>> 
>> 
>>> 
>>> With SIP Identity the identity header is either added by the end point (unlikely) or by the outbound proxy. 
>>> If it is added by the outbound proxy then there has to be TLS between the end point and the outbound proxy. 
>>> This would provide proper protection of the message exchange and would fulfill our purpose here. Wouldn't you say so? 
>>> 
>>> [BA] TLS is fine with me -- but it solves a different problem than RFC 4474.
>> 
>> In the typical use case of SIP Identity (at least as envisioned in the specification) the identity assertion is added by the Authentication service (e.g. the outbound proxy) and there still has to be security provided from the end host to that Authentication Service. This may likely come in form of TLS since otherwise the identity assurance is of little value if the adversary is sitting somewhere along that path. 
>> 
>>> 
>>> True. There is the SIP identity of the sender, the field in the CAP message (sender field), and then there is cryptographic material in case of a signature that will have some identity information associated with it. 
>>> Currently, the draft says that we should set the sender field of the CAP message to the value of the sender of the SIP message. Useful to set to two equal?
>>> 
>>> [BA] That is useful if the CAP sender and SIP sender are actually the same.  If not, then the CAP sender field should reflect who composed the CAP. 
>>> 
>> 
>> I put text into the draft already about the case where the two are different. 
>> 
>>> I am OK with not focusing on security threats as the document currently does, but instead focus on the solutions. 
>>> Using the terminology from the ATOCA requirements document maybe it is better to talk about 
>>> 
>>> 1) Verification of the alert originator (this is the SIP stuff) 
>>> 2) Verification of the alert author (this is the alert stuff)
>>> 3) Integrity of alerts in transit (the TLS)
>>> 
>>> OK for you? 
>>> 
>>> 
>>> [BA] Yes, that is a better approach.
>>> 
>> 
>> I proposed text already that follows this type of structure - although not with sub-section headings. 
>> 
>> Ciao
>> Hannes
>> 
>>> _______________________________________________
>>> Ecrit mailing list
>>> Ecrit@ietf.org
>>> https://www.ietf.org/mailman/listinfo/ecrit
>> 
> 
> _______________________________________________
> Ecrit mailing list
> Ecrit@ietf.org
> https://www.ietf.org/mailman/listinfo/ecrit