Re: [Ecrit] [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

"Sri Gundavelli (sgundave)" <sgundave@cisco.com> Thu, 13 April 2023 18:59 UTC

Return-Path: <sgundave@cisco.com>
X-Original-To: ecrit@ietfa.amsl.com
Delivered-To: ecrit@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F183BC1522AD for <ecrit@ietfa.amsl.com>; Thu, 13 Apr 2023 11:59:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.597
X-Spam-Level:
X-Spam-Status: No, score=-9.597 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_HIGH=-0.001, DKIMWL_WL_MED=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, RCVD_IN_ZEN_BLOCKED_OPENDNS=0.001, SPF_NONE=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b="gCp92ON+"; dkim=pass (1024-bit key) header.d=cisco.com header.b="Y6bBm6VF"
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Ym71nTA566Jd for <ecrit@ietfa.amsl.com>; Thu, 13 Apr 2023 11:59:01 -0700 (PDT)
Received: from aer-iport-2.cisco.com (aer-iport-2.cisco.com [173.38.203.52]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81C57C1522AA for <ecrit@ietf.org>; Thu, 13 Apr 2023 11:59:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=93835; q=dns/txt; s=iport; t=1681412340; x=1682621940; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=6Xrs2iTzWgHSp8ahrKaxHZ3Y/kXWUem9BJeuUkoY/8w=; b=gCp92ON+XrXpZSXBE32tCgL4es/7C0s/RwjobArwIgc2NH7XJ2/ru3mW K8l2clr1NR+d8yTMys9r+r4Zv873XTq16WHRjU2RNEGagwJm/Co51RR78 KTWXKoxMplakeBHjA1rd88Q1IxTs2bFPQTM0UiW1eAgGbJ8ahDcagKNY9 o=;
X-IPAS-Result: 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
IronPort-PHdr: A9a23:cR55zxGBZAoqTUvjaxPxyp1Gfu0Y04WdBeZdwpMqkfdJaqu8usmkN 03E7vIrh1jMDs3X6PNB3vLfqLuoGXcB7pCIrG0YfdRSWgUEh8Qbk01oAMOMBUDhav+/Ryc7B 89FElRi+iLzKlBbTf73fEaauXiu9XgXExT7OxByI7HuFZPUg82p2si5+obYZENDgz/uKb93J Q+9+B3YrdJewZM3M7s40BLPvnpOdqxaxHg9I1WVkle06pK7/YVo9GJbvPdJyg==
IronPort-Data: A9a23:2HGooam5i2UBOWFCWvbscG7o5gz2JkRdPkR7XQ2eYbSJt1+Wr1Gzt xIfDG2PPPaLNjCketp/bIu1oUlTvpOAm9ZiSlBsry88FVtH+JHPbTi7wugcHM8zwunrFh8PA xA2M4GYRCwMZiaA4E/raNANlFEkvU2ybuKU5NXsZ2YgFGeIdA970Ug4w7Jg2dYz6TSEK1rlV e3a8pW31GCNg1aYAkpMg05UgEoy1BhakGpwUm0WPZinjneH/5UmJM53yZWKEpfNatI88thW6 Ar05OrREmvxp3/BAz4++1rxWhVirrX6ZWBihpfKMkSvqkAqm8A87ko0HMUDdxtu23bRpu0r1 9VP77vzVhcTJrKZzYzxUzEAe81/FaRL4vrMJmKy9JHVxEzdeHyqyPJrZK00FdRHoaAsUScUr adecmplghOr34paxJqgRfRqis09IeHgPZgUvTdryjSx4fMOH8GSH/+Tube02h8hh5t/P8viW /AZM2VEQTH5eBdRPH4YXcdWcOCA3ymjLGIwREiujac8+WnP5A18zLarN8DaEuFmXu1ck1zdp 3rB5Xi8BBgGctee0jGCtHmrg4cjgB8XRqotC6Pkz64p2GSunHMTCkcxFkSrm+Gm3xvWt81kF 2QY/S8nrK4X/UOtT8XgUxDQnJJilkNDMza3O7BigDxh2pY48C7EXjBZHmIphMgO7Z5nHmBwv rOct4qxXWQHjVGDdZ6K3o+wxd9YEQsPJGwFekfopiNeupy7+NFbYv7natt4C6OvxuXyHTj2z 1i3QMkCa1c70JdjO0aTpA6vb9eQSn7hElZdCuL/BDjN0++BTNT5D7FEEHCChRq6EK6XT0Oao F8PkNWE4eYFAPmlzXLdGb5XQOvyvKfVblUwZGKD+bF8plxBHFb+IuhtDM1Wfy+Fz+5dI2ayO R+P0e+vzM4PYRNGkpObk6roW5h1ksAM5PzuV+vfaZJVc4NteQqclByClmbOt10BZHMEyPllU b/CKJ7EJS9DWcxPkmHsL89DiuBD+8zL7T6JLXwN5075geP2ib/8YeptDWZimchos/Pb+1qFq I032gnj40w3bdASqxL/qOY7BVsLNnM8Q5vxrqRqmiSre2KKxElJ5yft/I4c
IronPort-HdrOrdr: A9a23:/ZMOHaAfdG7AY1blHegDsceALOsnbusQ8zAXPh9KOH5om52j5q OTdaogtSMc0AxhKE3I+ervBEGBKUmsjaKdkrNhTotKPTOW+VdASbsSiLcKrAeQZxEWmtQts5 uINpIOeeEYbmIKzfoSgjPIbOrIqePvmMvD6IuwvhMdKj2CKZsQkTuRYTzraXGeMTM2eKbRY6 DsnPavyQDQAEj/aP7bOlA1G8z44/HbnpPvZhALQzQ97hOVsD+u4LnmVzCFwxY3SVp0sPUf2F mAtza8yrSosvm9xBOZ/XTU9Y5qlNzozcYGLNCQi/ISNi7nhm+TFcFcsvy5zXQISdOUmRAXee r30k4d1gNImivsl1SO0FzQMs/boW0TAjHZuAWlaDDY0L7ErXoBer98bMRiA1jkA45KhqAh7E qNtFjp6qa+R3n77VDAzsmNWBdwmkWup30+1eYVknxESIMbLKRctIoF4SpuYds99Q/Bmcoa+d NVfYzhzecTdUnfY2HSv2FpztDpVnMvHg2eSkxHvsCOyTBZkH1w0kNdnaUk7zk93YN4T4MB6/ XPM6xumr0LRsgKbbhlDONERcesEGTCTR/FLWrXK1X6E6MMPW7LtvfMkfoIzfDvfIZNwIo5mZ zHXl8dvWkue1j2AcnLx5FP+gClehT3Yd0s8LAX23FUgMy0eFOwC1z1dLkHqbrXn8ki
X-Talos-CUID: 9a23:Qp4aDWyH7hueoVLgsY6YBgUrBd55Sy2elE7teVC4CzxOC6KFc0ePrfY=
X-Talos-MUID: 9a23:RatqIgwwN3gpF2vMGQkIrV00MdeaqLWvU3EvrKk6gcneagddHg6Ghiqxa4Byfw==
X-IronPort-Anti-Spam-Filtered: true
Received: from aer-iport-nat.cisco.com (HELO aer-core-5.cisco.com) ([173.38.203.22]) by aer-iport-2.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 13 Apr 2023 18:58:57 +0000
Received: from aer-opgw-5.cisco.com (aer-opgw-5.cisco.com [173.38.212.137]) by aer-core-5.cisco.com (8.15.2/8.15.2) with ESMTPS id 33DIwuPv014185 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK) for <ecrit@ietf.org>; Thu, 13 Apr 2023 18:58:57 GMT
Received: from mail-dm6nam10lp2106.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.106]) by aer-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 18:58:56 +0000
Received: from mail-dm6nam10lp2106.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.106]) by aer-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 18:58:56 +0000
Received: from mail-dm6nam10lp2106.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.106]) by aer-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 18:58:56 +0000
Received: from mail-dm6nam10lp2106.outbound.protection.outlook.com (HELO NAM10-DM6-obe.outbound.protection.outlook.com) ([104.47.58.106]) by aer-opgw-5.cisco.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Apr 2023 18:58:56 +0000
Authentication-Results: aer-opgw-5.cisco.com; dkim=pass (signature verified) header.i=@cisco.com; spf=Pass smtp.mailfrom=sgundave@cisco.com; dmarc=pass (p=quarantine dis=none) d=cisco.com
X-IronPort-AV: E=Sophos;i="5.99,194,1677542400"; d="scan'";a="120114"
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=VyIDQlkUYK3o/WFtLhhKI/qtPnL92LcD/ggbmRCTiDjxhRgRHzZBnvl1wj9tJxmVAAG/AlieI02WDo1xfMrcubV2hDd4A6nscEtZCod5hw8zHSrFI2D0fEe1WQZCK9kWJ5gh0kwYazuKuNDRRzfFyYaiwagIVumHwVlvS/sZ6LAElxKvmepev3eXA+GWwYBJ3hVz0cprFkMZSEJCcAoX1MY66seE4/1rA3aTWyOYC/2soDmYc/C/yzfEcK7PmijZCxPtFs701PrSJvVSZ+xcMk+q46HTzhFnTmwDin1SLRemcsTwrPQfwR0UQgHyjvfm0HAzX4Ty1U58tp77Qf+e3A==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=6Xrs2iTzWgHSp8ahrKaxHZ3Y/kXWUem9BJeuUkoY/8w=; b=Tp1PfLVlJLMSnhBvljJyZD/To+wnFH2JNSFMjfva15vtRc2E7RfaqzpGBH/I8xyxE9HDo03Uf1ukuG1jb9sxadjRS2knhhinYxIUqrakAKR47YIHE7lDy1Nbr+zM5v8e2cT0bcCw5+PQlFInR86NfRrG2nppfk5TEUfT3GmS5Asn7adYE4iiUO+kuGp9o0vlir2NncmuXTfbVykhnS8XLpwDuVYoAvyC6y4Rqdcibsg0C2bqgoNQVPPxbYaoDsMbjlcqoTt3cbNv1m2IjZwHLVnrypfIsGQ2meUqa68RHMslR3BV7xli6ePSQjE2+OfoM3NlCM2fNCfWZ8VLxtp9Fg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=6Xrs2iTzWgHSp8ahrKaxHZ3Y/kXWUem9BJeuUkoY/8w=; b=Y6bBm6VF7FkMiC9h+JXtSjpbw810HrR/KyY4s6DGAcoIl2unFJQcFbBLP/5JbS2qC5iec0IO5jvepH6cLqXsvO0S2RbfCuuAVTLi+W8iCjsj8nnuhACz4PzHQBxoXTegitFv5mKkZG08w+N7f8kjZFvjOPP4swRFJM1MPdtxU7g=
Received: from SJ0PR11MB5072.namprd11.prod.outlook.com (2603:10b6:a03:2db::18) by CH3PR11MB7722.namprd11.prod.outlook.com (2603:10b6:610:122::15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.6298.30; Thu, 13 Apr 2023 18:58:52 +0000
Received: from SJ0PR11MB5072.namprd11.prod.outlook.com ([fe80::dbd6:ef09:8cd4:8842]) by SJ0PR11MB5072.namprd11.prod.outlook.com ([fe80::dbd6:ef09:8cd4:8842%7]) with mapi id 15.20.6298.030; Thu, 13 Apr 2023 18:58:52 +0000
From: "Sri Gundavelli (sgundave)" <sgundave@cisco.com>
To: Brian Rosen <br@brianrosen.net>
CC: "R.Jesske@telekom.de" <R.Jesske@telekom.de>, Christer Holmberg <christer.holmberg@ericsson.com>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Thread-Topic: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt
Thread-Index: AQHZVgcUG19IfgTCTUmFa4Y3i+x/wq8NNHkAgAd+agD//9yIgIAAuyuAgAANfQCABCeDYP//1+WAgAGJU+CAADZngIANa8CAgACUAACAAJL9gP//qJ+A
Date: Thu, 13 Apr 2023 18:58:52 +0000
Message-ID: <0C6AC3C6-6467-4424-9F87-C61E65E0389D@cisco.com>
References: <167875162972.58518.19006032661356449@ietfa.amsl.com> <385DA58A-5118-44EF-9E8A-B8FA5F28F4EA@cisco.com> <3E83FA22-CF07-4C38-B73C-41AC1AEEB688@brianrosen.net> <39CED79A-41C3-4EDD-AC5D-E12EC3961DB4@cisco.com> <79EE2266-C2D9-4022-98D9-23549987EC6A@brianrosen.net> <C863C7D9-AC88-4A13-94C6-82456DD88D7E@cisco.com> <HE1PR07MB4441359E8633CA7FC004C74A93929@HE1PR07MB4441.eurprd07.prod.outlook.com> <11AD2ACE-5AE1-4FA3-B5E7-3F4A364FDAC6@cisco.com> <FR3P281MB150306DC0BA41BBB0E0F5CD5F9939@FR3P281MB1503.DEUP281.PROD.OUTLOOK.COM> <4A6640AB-A55C-41A3-88A7-E5170000B609@cisco.com> <8E78998E-4987-411E-82A2-6BF7ADAAA0F9@brianrosen.net> <1183A4BD-58D3-4D6F-9FD5-A62E2F732969@cisco.com> <0047223D-225C-47E0-8050-EBA509369B96@brianrosen.net>
In-Reply-To: <0047223D-225C-47E0-8050-EBA509369B96@brianrosen.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.72.23040900
x-ms-publictraffictype: Email
x-ms-traffictypediagnostic: SJ0PR11MB5072:EE_|CH3PR11MB7722:EE_
x-ms-office365-filtering-correlation-id: 10f5f0c5-c1b6-4397-0062-08db3c511f7c
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR11MB5072.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230028)(376002)(396003)(346002)(39860400002)(136003)(366004)(451199021)(66899021)(38070700005)(6512007)(186003)(6506007)(53546011)(54906003)(33656002)(478600001)(122000001)(2906002)(8676002)(8936002)(9326002)(15650500001)(30864003)(83380400001)(41300700001)(5660300002)(66574015)(2616005)(166002)(4326008)(6916009)(38100700002)(316002)(66946007)(66556008)(76116006)(66476007)(64756008)(66446008)(86362001)(966005)(6486002)(71200400001)(36756003)(45980500001)(579004); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/alternative; boundary="_000_0C6AC3C6646744249F87C61E65E0389Dciscocom_"
MIME-Version: 1.0
X-OriginatorOrg: cisco.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: SJ0PR11MB5072.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 10f5f0c5-c1b6-4397-0062-08db3c511f7c
X-MS-Exchange-CrossTenant-originalarrivaltime: 13 Apr 2023 18:58:52.0791 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: /wli0oeEaF60WKom5p0PPTR1SCf0QiQho9oZPtPWh9Oi7jHaWc6R8l+GqpRTIljcJ2z3eNK+SfCALKg7XEnn+w==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: CH3PR11MB7722
X-Outbound-SMTP-Client: 173.38.212.137, aer-opgw-5.cisco.com
X-Outbound-Node: aer-core-5.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/ecrit/nsQm8ie38nADP6D7GvoLMSpfJ8s>
Subject: Re: [Ecrit] [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt
X-BeenThere: ecrit@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: Emergency Context Resolution with Internet Technologies <ecrit.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ecrit>, <mailto:ecrit-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ecrit/>
List-Post: <mailto:ecrit@ietf.org>
List-Help: <mailto:ecrit-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ecrit>, <mailto:ecrit-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 13 Apr 2023 18:59:06 -0000

Hi Brian,

Thanks. I am breaking the discussion into two parts, responding to the comment on traceability.

There are two aspects here: a.) Traceability of the call to a device, b.) Traceability to a user. In many cases, relation between a user a device can be established.

The emergency passpoint profile in question, includes the elements required for the device to make the network selection, use a set of credentials for completing authentication with the identified IDP for the realm.  Based on the chosen approach, these credentials in the passpoint profile can be per-user or common credentials.  If the requirement is user-traceability the device needs to have a user-specific credentials / profile, otherwise common credentials/profile would do it. The specification does not limit this to only one approach, meaning, the either the use of unique or common credentials can be supported.

This in conjunction with the signaling of the device identifier in EAP will allow traceability of the device where the call originated from. For example, there is the EAP Attribute: AT_MN_SERIAL_ID, which can include device identifiers such as IMEI). We can perhaps extend this to include certificate id or other non-cellular device identifiers.

This should meet the requirement that you have captured below. At the same time, looking at the current 3GPP system emergency calling, it appears there is no user-traceability requirement as access emergency without a SIM is permitted. They seem to be supporting different modes, I guess this is for meeting different regular domain requirements. However, IMEI (which is the device identifier is being signalled. That makes me wonder how user-traceability is possible in all cases if there is no SIM auth? Mere inclusion of IMEI will not allow user traceability.


>
Four different behaviours of emergency bearer support have been identified as follows:
a. Valid UEs only. No limited service state UEs are supported in the network. Only UEs that have a valid subscription, are authenticated and authorized for PS service in the attached location are allowed. UEs should be attached to the network and then perform a PDN Connection Request when an IMS emergency session is detected by the UE.
b. Only UEs that are authenticated are allowed. These UEs must have a valid IMSI. These UEs are authenticated and may be in limited service state due to being in a location that they are restricted from service. A UE that can not be authenticated will be rejected.
c. IMSI required, authentication optional. These UEs must have an IMSI. If authentication fails, the UE is granted access and the unauthenticated IMSI retained in the network for recording purposes. The IMEI is used in the network as the UE identifier. IMEI only UEs will be rejected (e.g., UICCless UEs).
d. All UEs are allowed. Along with authenticated UEs, this includes UEs with an IMSI that can not be authenticated and UEs with only an IMEI. If an unauthenticated IMSI is provided by the UE, the unauthenticated IMSI is retained in the network for recording purposes. The IMEI is used in the network to identify the UE.
>

On the SIP callback, if we support user-specific credentials, I guess it should be sufficient.


Regards
Sri



From: Brian Rosen <br@brianrosen.net>
Date: Thursday, April 13, 2023 at 10:12 AM
To: Sri Gundavelli <sgundave@cisco.com>
Cc: "R.Jesske@telekom.de" <R.Jesske@telekom.de>, Christer Holmberg <christer.holmberg@ericsson.com>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com>, ECRIT <ecrit@ietf.org>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

The emergency services are firmly against so-called “unitialiized devices”.  They are stuck with the regulatory requirement that has been put on the providers of such devices to support emergency calls, but they would be strongly against expanding the scope of such devices: there are roughly no cases of real emergency calls using such devices, and many, many cases of false emergency calls that cannot be traced to the caller.  I would strongly suggest you don’t pursue such an expansion of that requirement.  It’s a bad idea, and it doesn’t do what proponent’s hoped it would do.  We have substantial real world experience.

You need a reliable identity that can be traced to a real person.  It’s never ironclad (pre-paid cellular for example), but it has to work most of the time.

I’m still confused who the entity that is providing the SIP path is supposed to be.  Are you expecting the WiFi access point owner to do that or some mobile network operator?  If it’s the WiFi AP owner, then they don’t have an interconnect in most cases: they might have a PBX on that network with a PSTN interconnect (like a SIP Trunk) that supports emergency calling, but that’s fairly far removed from the WiFi network and assuming they will allow a random WiFi user to connect to their AP, and then provide a SIP path to emergency services seems very far fetched to me.

But if it was some kind of mobile network operator, what relationship do they have with the enterprise that has the AP?

Callbacks require identity: see above

Brian



On Apr 13, 2023, at 11:25 AM, Sri Gundavelli (sgundave) <sgundave@cisco.com> wrote:

Hi Brian,

Thanks for the follow-up. These are very good comments. In the revised version, we will capture all these points.

On the requirement around interconnect to emergency network, we are thinking the FCC designated entity providing identity and voice services for the realm, “sos.fcc-authorized.org<http://sos.fcc-authorized.org/>” will be able to meet the requirements, and the interconnect will be similar to how any MNO’s IMS interconnect is realized today. We will analyze this and add some text.

On traceability comment, the current cellular systems allow emergency call from a device with an expired SIM subscription, or no SIM card. At least in some countries this is allowed. Most GSM phones allow calling of emergency numbers without a SIM card, 112, 911, 118, 000, 110, 08, and 999. Calling these numbers will force the device to use any available network. I need to check the call flow if there is exchange of IMEI, but AFAIK there is no traceability there. In the proposal we have we require the use of emergency passpoint profile, it is possible to signal device specific identifiers in the signaling, and that is one way to realize device traceability. We already have mechanisms for location traceability. But, this allows traceability to a device, not to a person. Mark may have some additional thoughts here.

On the call backs, once the device is able to perform SIP registration with the emergency SIP proxy, it will be possible to support the callbacks. Will analyze this in detail.

Regards
Sri







From: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Date: Wednesday, April 12, 2023 at 4:36 PM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
Cc: "R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>" <R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>>, Christer Holmberg <christer.holmberg@ericsson.com<mailto:christer.holmberg@ericsson.com>>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>, ECRIT <ecrit@ietf.org<mailto:ecrit@ietf.org>>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

<moving to ecrit>
Some entity has to connect to the emergency network (in North America and EU Next Gen systems, this is the “Emergency Services IP Network” or ESInet.  Although the standards say that calls must be accepted over the Internet, in practice all current implementations have direct interconnect between the originating service provider and the ESInet.  If it’s an IMS network operator, they have such connections, and would use their E-CSCF.  I think it’s pretty unlikely that they would support a non-IMS call path.  But there has to be some OSP.  It could be an enterprise, as long as the enterprise permitted access, had a reasonable authentication system tied to some kind of identity and a SIP proxy server.

The emergency authorities don’t like unauthenticated calling sources.  That is how we get swatting.  So your proposal has to describe what identity is, and how that’s traceable to a real person.  You also have to describe how we do call-backs to the caller.

Brian



On Apr 4, 2023, at 1:38 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com<mailto:sgundave@cisco.com>> wrote:

HI Roland,

Thank you for your comment.

I agree,  if IMS is unavailable P-CSCF/E-CSCF will all be unavailable.  The key point is non-availability of the cellular network, for PDU creation and/or accessing emergency voice functions. This goes back to Christer’s comment suggesting to use non-IMS terminology.  We will work on that.

On your other comment, access to IMS for wired/wireline devices with IMS-only subscription is a possibility. But we still need to allow the device to connect to the available hotspot with no access-network credentials and be able to obtain the IMS configuration. The IMS network in question can be based of a generic IETF defined voice function, which can do call routing to the PSAP. If a MNO is willing to let their IMS network be available for wired and non-cellular devices, that is an option.

Once the device gets connectivity to the access network based on the special emergency passpoint profile, the access network can deliver the associated IMS/voice-service configuration options to the device. The realm that we are proposing sos.fcc-authorized.org<http://sos.fcc-authorized.org/> and associated IDP can be configured with the IMS/voice-service configuration. These IMS/voice-service functions can be from an MNO, or some other service provider that FCC will authorize.

These configuration options will be signaled from the IDP to the access network, and in turn will be delivered it to the device over DHCP/ND/802.11. The device can perform registration with those voice functions and can initiate the emergency call.

Regards
Sri




From: "R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>" <R.Jesske@telekom.de<mailto:R.Jesske@telekom.de>>
Date: Tuesday, April 4, 2023 at 12:44 AM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>, "christer.holmberg@ericsson.com<mailto:christer.holmberg@ericsson.com>" <christer.holmberg@ericsson.com<mailto:christer.holmberg@ericsson.com>>, "br@brianrosen.net<mailto:br@brianrosen.net>" <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: "dispatch@ietf.org<mailto:dispatch@ietf.org>" <dispatch@ietf.org<mailto:dispatch@ietf.org>>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Subject: AW: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi,
What does this mean that IMS is unavailable?
When IMS is unavailable also the Emergency service (E-CSCF) is unavailable.

Did you also discover the IMS Access possibilities with Digest, where you have an IMS Subscription w/o any RAN connectivity and only via wireline/WIFI?

Best Regards

Roland

Von: dispatch <dispatch-bounces@ietf.org<mailto:dispatch-bounces@ietf.org>> Im Auftrag von Sri Gundavelli (sgundave)
Gesendet: Montag, 3. April 2023 16:56
An: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org<mailto:christer.holmberg=40ericsson.com@dmarc.ietf.org>>; Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: dispatch@ietf.org<mailto:dispatch@ietf.org>; Mark Grayson (mgrayson) <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Betreff: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi Christer,

Yes, 3GPP does define the interworking architecture with Wi-Fi, where the UE can use Wi-Fi to reach 3GPP core network for PDU establishment. The scenario that we have and what FCC CSRIC 8 looked into is where H-PLMN/V-PLMN and IMS is unavailable. Also, the interworking procedures assume there is Wi-Fi access connectivity. The access network in question may not have any relation to the operator for the UE to perform SIM based authentication to the access network.

The UE may not even have a cellular modem or SIM/eSIM credentials. What are trying to enable is allow the device to use a special emergency passpoint profile for connecting to any of the available hotspots that support emergency calling services. The device may be Wi-Fi only or a dual-radio capable device. Furthermore, if I see the carrier documentation for Wi-Fi calling, it requires the user to configure a civic address prior making any emergency call, and which a caller in distress may never configure. We are addressing this issue, by allowing a trusted access network with the federation issued certificates to signal the location over RADIUS to the IDP/CLF, which the network can cross correlate with the reported location in the SIP signaling.

<image001.png>

Regards
Sri


From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org<mailto:christer.holmberg=40ericsson.com@dmarc.ietf.org>>
Date: Monday, April 3, 2023 at 3:21 AM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>, Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: "dispatch@ietf.org<mailto:dispatch@ietf.org>" <dispatch@ietf.org<mailto:dispatch@ietf.org>>, "Mark Grayson (mgrayson)" <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Subject: RE: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi,

Note that 3GPP has defined emergency calls over WiFi, so please indicate how your draft relates to that work.

Regards,

Christer

From: dispatch <dispatch-bounces@ietf.org<mailto:dispatch-bounces@ietf.org>> On Behalf Of Sri Gundavelli (sgundave)
Sent: Saturday, 1 April 2023 4.53
To: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Cc: dispatch@ietf.org<mailto:dispatch@ietf.org>; Mark Grayson (mgrayson) <mgrayson@cisco.com<mailto:mgrayson@cisco.com>>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

Hi Brian,

Sure. Will move the discussion to ECRIT.

Thanks for the pointers to the LoST and PIDF-LO work. Will add some considerations on how devices capable of LoST can obtain location-specific service configuration.


  *   LoST also provides the mechanism to validate location (which you do at configuration time) to make sure the location you send is known by the emergency services.

Ok. We will analyze this. If the mechanisms around Location-validity also covers the cases around detecting rogue/compromised clients, beyond making sure the claimed civic address exists, it will be very useful know. Will add the considerations.


  *   The text has to say how the device uses the location it discovers to make a call (‘perform”), which is what RFC6881 describes.  There are some practical differences in how NG9-1-1 and NG1-1-2 actually work that has to be taken into consideration when looking at 6881.

Ok. Thanks for the pointers. Will add these considerations.


Regards
Sri

From: Brian Rosen <br@brianrosen.net<mailto:br@brianrosen.net>>
Date: Friday, March 31, 2023 at 11:05 AM
To: Sri Gundavelli <sgundave@cisco.com<mailto:sgundave@cisco.com>>
Cc: "dispatch@ietf.org<mailto:dispatch@ietf.org>" <dispatch@ietf.org<mailto:dispatch@ietf.org>>
Subject: Re: [dispatch] New Version Notification for draft-gundavelli-dispatch-e911-wifi-00.txt

I do think discussion on this draft should move to ecrit.

Obtaining the regulatory specific calling service configuration (including the numbers) is defined in LoST (RFC5222).
The location must be provided in PIDF-LO form (RFC4119 and its updates).  That is the form (at least the actual location information part) that you use to query the LoST server to get the configuration data and the form of the data you send to the emergency services.
LoST also provides the mechanism to validate location (which you do at configuration time) to make sure the location you send is known by the emergency services.
The text has to say how the device uses the location it discovers to make a call (‘perform”), which is what RFC6881 describes.  There are some practical differences in how NG9-1-1 and NG1-1-2 actually work that has to be taken into consideration when looking at 6881.

Brian


On Mar 31, 2023, at 4:55 PM, Sri Gundavelli (sgundave) <sgundave@cisco.com<mailto:sgundave@cisco.com>> wrote:

Hi Brian,

Thanks a lot for reviewing the document. I agree, the document should provide the larger emergency calling context. The current art, the elements in the system, interfaces with the PSAPs and other touch points. We are familiar with the prior efforts in IETF and also standards bodies including 3GPP and around ATIS reports. Perhaps a discussion on how NG911/NG211 emergency service network are deployed will be useful. The document requires more work, and this is just a starting point.

The key technical objective for this work is around enabling a Wi-Fi capable device to be able to discover hotspots that support emergency calling, ability to perform a network attach, be able to obtain the regulatory-domain specific calling voice service configuration (including emergency calling numbers) and be able to perform the emergency call. The focus is also on how the network can obtain the location of the emergency caller and the mechanisms for detecting rogue device signaling incorrect location.  Finally, some considerations on the emergency passpoint profiles that are required to be present on the device. This work complements the prior IETF efforts on emergency support for greatly improving the access to emergency services. There are tens of thousands of Wi-Fi hotspots supporting Wi-Fi roaming based on passpoint standards. This approach allows the devices to be able to use any of those hotspots for making that emergency call.

On the choice of the draft title, we do understand the emergency calling numbers are specific to the regulatory domain in question and the proposed approach is not specific to any one regulatory domain. In that sense, we should have been bit more sensitive about this. We will modify the draft title to be generic and not specific to one regulatory domain.

Thanks a lot for the feedback.

Regards
Sri



On 3/31/23, 2:02 AM, "Brian Rosen" <br@brianrosen.net<mailto:br@brianrosen.net> <mailto:br@brianrosen.net>> wrote:


I have read this draft.


It is totally lacking context of current and evolving standards in emergency calling, including:
1. Basic IETF emergency calling standards (/RFC4119/RFC5222/RFC5985/RFC6881)
2. NG911 and NG112 standards that are being deployed, which are based on the IETF standards
3. ETSI and ATIS standards that support the above


While I don’t know enough about WiFi or some of the 3GPP standards to comment on the technical approach in the doc, I am intimately familiar with what is deployed, and about to be deployed in emergency calling and this doc can’t begin to get considered until it deals with the issues associated with the IETF/NENA/EENA/ETSI/ATIS work.


As a really simple start, authors might consider that 9-1-1 is North America only, while the IETF is world-wide.


Brian





On Mar 27, 2023, at 12:35 AM, Sri Gundavelli (sgundave) <sgundave=40cisco.com@dmarc.ietf.org<mailto:sgundave=40cisco.com@dmarc.ietf.org> <mailto:40cisco.com@dmarc.ietf.org>> wrote:

Dear All:

Attached is the link to the document on Supporting emergency 911 services over Wi-Fi. The attached document proposes an approach based on WBA's Wi-Fi OpenRoaming and uses many other elements which are already in standards.

We are looking for some technical feedback. We believe there is value in IETF identifying new methods for improving e911 service access.

Appreciate any feedback.

Regards
Sri



Name: draft-gundavelli-dispatch-e911-wifi
Revision: 00
Title: Emergency 911 Services over Wi-Fi
Document date: 2023-03-13
Group: Individual Submission
Pages: 15
URL: https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt <https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt> <https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt> <https://www.ietf.org/archive/id/draft-gundavelli-dispatch-e911-wifi-00.txt&gt;>
Status: https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/ <https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/> <https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/> <https://datatracker.ietf.org/doc/draft-gundavelli-dispatch-e911-wifi/&gt;>
Htmlized: https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi <https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi> <https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi> <https://datatracker.ietf.org/doc/html/draft-gundavelli-dispatch-e911-wifi&gt;>




Abstract:
Proposed is an approach for supporting emergency 911 services over
IEEE 802.11 based Wi-Fi access networks. This approach leverages the
legal framework and the building blocks of the OpenRoaming federation
for extending emergency 911 calling support to already deployed tens
of thousands of OpenRoaming Wi-Fi hotspots. The proposal addresses
the key issues in emergency calling, around discovery and
authentication to access network supporting emergency services,
emergency access credentials, location determination of the emergency
caller, and delivering emergency voice service configuration to the
device and call routing.








The IETF Secretariat







_______________________________________________
dispatch mailing list
dispatch@ietf.org<mailto:dispatch@ietf.org> <mailto:dispatch@ietf.org>
https://www.ietf.org/mailman/listinfo/dispatch <https://www.ietf.org/mailman/listinfo/dispatch>