RE: [Geopriv] Review of draft-ietf-geopriv-http-location-delivery-07

"Tschofenig, Hannes (NSN - FI/Espoo)" <> Tue, 27 May 2008 16:31 UTC

Return-Path: <>
Received: from [] (localhost []) by (Postfix) with ESMTP id 4FD803A6937; Tue, 27 May 2008 09:31:43 -0700 (PDT)
Received: from localhost (localhost []) by (Postfix) with ESMTP id 46C1E3A68CB; Mon, 26 May 2008 00:17:31 -0700 (PDT)
X-Virus-Scanned: amavisd-new at
X-Spam-Flag: NO
X-Spam-Score: -6.599
X-Spam-Status: No, score=-6.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4]
Received: from ([]) by localhost ( []) (amavisd-new, port 10024) with ESMTP id hQkRKWlx98q7; Mon, 26 May 2008 00:17:30 -0700 (PDT)
Received: from ( []) by (Postfix) with ESMTP id 0A5083A6A37; Mon, 26 May 2008 00:17:29 -0700 (PDT)
Received: from ([]) by ( with ESMTP id m4Q7HT37029002 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Mon, 26 May 2008 09:17:29 +0200
Received: from ( []) by ( with ESMTP id m4Q7HA2J010864; Mon, 26 May 2008 09:17:27 +0200
Received: from ([]) by with Microsoft SMTPSVC(6.0.3790.3959); Mon, 26 May 2008 09:17:21 +0200
Received: from ([]) by with Microsoft SMTPSVC(6.0.3790.3959); Mon, 26 May 2008 09:17:20 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Subject: RE: [Geopriv] Review of draft-ietf-geopriv-http-location-delivery-07
Date: Mon, 26 May 2008 10:17:19 +0300
Message-ID: <>
In-Reply-To: <>
Thread-Topic: [Geopriv] Review of draft-ietf-geopriv-http-location-delivery-07
Thread-Index: Aci+umLAX5fo8GawTCShJHRP4lJqCAARLgNQ
References: <><><><> <>
From: "Tschofenig, Hannes (NSN - FI/Espoo)" <>
To: "ext Eric Rescorla" <>, "Hannes Tschofenig" <>
X-OriginalArrivalTime: 26 May 2008 07:17:20.0941 (UTC) FILETIME=[899815D0:01C8BF00]
X-TM-AS-Product-Ver: SMEX-
X-TM-AS-Result: No--12.166600-8.000000-31
X-Mailman-Approved-At: Tue, 27 May 2008 09:11:01 -0700
Cc: GEOPRIV <>,,,,
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: IETF Discussion <>
List-Unsubscribe: <>, <>
List-Archive: <>
List-Post: <>
List-Help: <>
List-Subscribe: <>, <>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit

Hi Ekr, 


>> >   
>> When you operate a network and you want this stuff to work then you 
>> have to consider this aspect.
>> In the past a few folks have suggested to write a BCP about how 
>> different deployments may deal with this aspect but I believe it is 
>> far too early todo so for a BCP.
>The problem is that I'm not sure that this is an issue that 
>can be solved by the network operator. In the example I 
>described, it sounds to me like new protocol work may be required.

So far, there was nobody who believed that new protocol work would be

>> >> The reference points to the device. What the Target uses 
>this reference 
>> >> either for itself (if it wants to learn it's own 
>location) or (more 
>> >> likely) it forwards that URI to someone else, for example 
>to a PSAP.
>> >>     
>> >
>> > OK, but then what protocol is spoken over that URI? (see my 
>> > comments on S 8 below).
>> >
>> >
>> >   
>> The answer is:
>What's the status of that document?

At the last meeting the group agreed that this document should become a
WG item. 
I believe my co-author has submitted the document but it got stuck

Thanks for reminding me to ping my co-authors again. 

>> > Well, lots of protocols would benefit from not having IP address
>> > spoofing, but again, you're making a levy on network operations
>> > on a global scale, no?
>> >
>> >   
>> If you want to deal with certain attacks then you may want todo 
>> something about it.
>Sorry, I don't think I get what you're saying here.

Let me give you an example from the emergency services space where this
work could be  helpful. 

If the network operator wants to make location information available to
the end host then they have various protocol choices. However, there is
more beyond just using protocols we develop in the IETF, the IEEE or
some other SDOs develop. You need to give the Location Server a way to
perform location determination, i.e., it gets some identifier as input
and then it needs to determine the physical location of that node. 
In some environment that's simpler than in others and it also depends on
the quality of the location you would like to get back. 

Regardless of what identifier you pick for the lookup (let it be a MAC
address, IP address, etc.) you may want to think about cases where an
adversary uses an identifier of someone else. This would potentially
allow him to learn location of someone other than his own location. 

In certain networks this might indeed be possible, for a more detailed
discussion see

As a network operator you might want to evaluate whether your network
infrastructure is vulnerable to such an attack and to take the
corresponding steps to mitigate them. 

IETF mailing list