One document matched: draft-barnes-geopriv-secure-location-object-00.txt




Network Working Group                                          R. Barnes
Internet-Draft                                               M. Lepinski
Intended status: Informational                                  R. Watro
Expires: April 27, 2007                                 BBN Technologies
                                                        October 24, 2006


                        Secure Location Objects
             draft-barnes-geopriv-secure-location-object-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 27, 2007.

Copyright Notice

   Copyright (C) The Internet Society (2006).

Abstract

   Protection of location information is an essential requirement of the
   GEOPRIV architecture.  Since using protocols cannot be relied upon to
   provide adequate protections to the location objects they carry, the
   location objects themselves must be secured.  This document examines
   several candidates for a Secure Location Object format in the context
   of GEOPRIV and ECRIT security requirements, including both locations
   by value and by reference.



Barnes, et al.           Expires April 27, 2007                 [Page 1]

Internet-Draft           Secure Location Objects            October 2006


Requirements Language

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [RFC2119].


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Security Threats . . . . . . . . . . . . . . . . . . . . . . .  3
     2.1.  Disclosure of Location Information . . . . . . . . . . . .  4
     2.2.  Use of Fake Location Information . . . . . . . . . . . . .  4
     2.3.  Denial of Location-based Services  . . . . . . . . . . . .  5
   3.  Design Considerations  . . . . . . . . . . . . . . . . . . . .  6
     3.1.  Integration with LoST  . . . . . . . . . . . . . . . . . .  6
     3.2.  GEOPRIV Considerations . . . . . . . . . . . . . . . . . .  7
     3.3.  ECRIT Considerations . . . . . . . . . . . . . . . . . . .  7
     3.4.  Technical Considerations . . . . . . . . . . . . . . . . .  7
   4.  Candidate Secure Location Object Formats . . . . . . . . . . .  7
     4.1.  Location By Value  . . . . . . . . . . . . . . . . . . . .  8
       4.1.1.  Signed Location  . . . . . . . . . . . . . . . . . . .  8
       4.1.2.  Encrypted Location . . . . . . . . . . . . . . . . . .  9
     4.2.  Location By Reference  . . . . . . . . . . . . . . . . . . 11
     4.3.  Trust Models . . . . . . . . . . . . . . . . . . . . . . . 12
   5.  Conclusions  . . . . . . . . . . . . . . . . . . . . . . . . . 13
   6.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 14
   7.  Security Considerations  . . . . . . . . . . . . . . . . . . . 14
   8.  Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 14
   9.  References . . . . . . . . . . . . . . . . . . . . . . . . . . 14
     9.1.  Normative References . . . . . . . . . . . . . . . . . . . 14
     9.2.  Informative References . . . . . . . . . . . . . . . . . . 14
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 15
   Intellectual Property and Copyright Statements . . . . . . . . . . 16

















Barnes, et al.           Expires April 27, 2007                 [Page 2]

Internet-Draft           Secure Location Objects            October 2006


1.  Introduction

   The security of location objects as they are stored and transmitted
   over the Internet is an essential enabler of the GEOPRIV
   architecture.  Without the ability to guarantee the confidentiality
   of transmitted location information, an eavesdropper can circumvent
   GEOPRIV privacy rules; without authenticity and integrity, a third
   party can forge location information and degrade the reliability of
   the entire architecture.  Even though such security guarantees may at
   times need to be relaxed -- for instance, in an emergency calling --
   it is essential that the components of the GEOPRIV architecture make
   available a suite of security services.

   The fundamental unit of location information in the GEOPRIV
   architecture is the Location Object (LO): Location Objects are
   constructed by Location Generators; stored, transformed, and
   forwarded by Location Servers; and consumed by Location Recipients.
   In practice, these different entities are often under separate
   administrative domains, joined by various relationships and separated
   by diverse networks.  The sensitive location information contained in
   these LOs is thus stored and transmitted in a wide variety of
   circumstances, and faces the risk of unauthorized access at several
   points, even in the presence of privacy rules.

   While the GEOPRIV architecture does make certain requirements of
   "using protocols" -- protocols that read or modify LI -- it
   explicitly makes no specifications with regard to protocols used only
   for transport of LOs.  There are several transport mechanisms
   currently defined for conveying LOs from one point to another:
   Extensions have been defined for SIP, DHCP, and RADIUS, and others
   are being developed.  Of these, only SIP has any claim of secure
   transport, and even the mechanisms that SIP offers are either seldom
   implemented (S/MIME) or widely regarded as ineffective (SIPS).

   The security of LOs used in GEOPRIV thus cannot rely on the security
   of the underlying transport, but must instead by enforced by security
   features inherent in the location object itself.  We call location
   objects with such features Secure Location Objects, or SLOs.  Below,
   we summarize the threats to location information that have been
   identified by the ECRIT and GEOPRIV working groups to date, identify
   some additional design constraints that must be taken into account by
   an SLO design, and examine the feasibility of several possible SLO
   formats in light of these conditions.


2.  Security Threats

   Prior work by both the ECRIT and GEOPRIV working groups has



Barnes, et al.           Expires April 27, 2007                 [Page 3]

Internet-Draft           Secure Location Objects            October 2006


   identified a set of risks facing location information, which are
   summarized here as the risks of unauthorized disclosure, forgery, and
   denial of location-based services.  While these risks have special
   importance in the context of emergency calling, they apply broadly to
   the GEOPRIV architecture as a whole.

2.1.  Disclosure of Location Information

   The most immediate threat to location information is the disclosure
   of sensitive location information to unauthorized parties.  In
   particular, this allows an eavesdropper to circumvent any privacy
   rules that are supposed to govern the use of a LO.  Such disclosure
   could occur in either of the following ways:

   o  An attacker located on the path of communication to a legitimate
      location recipient may intercept a LO and extract sensitive
      location information.  For example, an attacker could be a
      compromised router on the public internet who scans incoming
      packets for insecure LOs.  Alternatively, such an attacker could
      be a compromised proxy server for some location-using protocol
      such as SIP

   o  An attacker may impersonate a legitimate location recipient in
      order to obtain a LO from location server.  For example, an
      attacker could attack the LoST service to cause legitimate users
      to send LOs to an attacker-controlled URI.  Alternatively, an
      attacker could supply forged credentials to a location server to
      request a LO stored on the server.

   This threat is discussed in [Geopriv-Threats], Section 4.1.1 as well
   as [Geopriv-L7], Section 10.2.  In the setting of emergency services,
   this threat is especially pertinent because the requester of
   emergency services is often in a vulnerable position and hence
   location information is particularly sensitive.  For example, a
   motorist injured in an accident on a deserted highway is an easy
   target for robbery.  The disclosure of location information in the
   event of an emergency is discussed in Security Threats and
   Requirements for Emergency Call Marking and Mapping [Ecrit-Threats]
   Section 5.2.3.

2.2.  Use of Fake Location Information

   A second threat to location information is the ability of an attacker
   to create LOs that contain false location information, i.e., a
   location that does not correspond to a target's true location.  There
   are several scenarios in which this might be accomplished:





Barnes, et al.           Expires April 27, 2007                 [Page 4]

Internet-Draft           Secure Location Objects            October 2006


   o  An attacker could replay location information corresponding to the
      attacker's true location at an earlier point in time.  For
      example, an attacker who visits New York City in January could
      obtain a legitimate LO indicating his location in New York.  The
      attacker could then use this previously obtained LO to claim he is
      in New York the following summer.

   o  An attacker could replay location information corresponding to
      another target's location at an earlier point in time.  For
      example, an attacker who has never been to New York City may
      obtain a legitimate LO that indicates that Alice is in New York
      City.  The attacker could then later use this LO to claim that he
      is in New York.  Note that this attack may or not require the
      attacker to be able to extract information from the LO.

   o  An attacker could from scratch generate a forged LO corresponding
      to an arbitrary location.  For example, an attacker could forge a
      LO indicating that he is in New York City.  The attacker could
      then pass this LO off as legitimate and claim he is in New York
      even though he doesn't know of anyone who has been there.

   An extensive discussion of this threat appears in [Geopriv-L7],
   Section 8.  The threat is also discussed in also discussed in
   [Geopriv-Threats] Section 4.1.2.  In the setting of emergency
   services, this threat is especially pertinent because fake location
   information can be used to force scarce emergency-response resources
   to be improperly allocated.  For example, in the event of a disaster,
   when the demand for emergency services exceeds supply, an attacker
   using a fake location could cause an ambulance to be sent to a
   location where no one is present.  Even worse, an attacker could
   generate huge numbers of emergency phone calls from all over the
   world that all claim to be from a particular city.  Such an attack
   could easily overwhelm the public safety access point and deny
   emergency services to legitimate residents of the city.  The use of
   fake location information as it pertains to emergency services is
   discussed briefly in [Ecrit-Threats] Section 5.2.3.

2.3.  Denial of Location-based Services

   In a similar vein, an attacker could deny location-based services to
   an individual with legitimate need for these services.  In the
   current, unsecured architecture, this could occur in several ways:

   o  As discussed in Section 2.2, an attacker can deny access to
      location-based services by using forged location information to
      overwhelm location-based services for a particular location.





Barnes, et al.           Expires April 27, 2007                 [Page 5]

Internet-Draft           Secure Location Objects            October 2006


   o  An attacker could alter a location object to indicate an incorrect
      location of a target.  For example, when a legitimate user
      attempts to access a location-based service, an attacker on the
      path of communication may alter the location object to cause the
      request to be routed to the wrong service provider.

   o  An attacker could prevent a location recipient from obtaining a
      location information.  For example, an attacker might prevent a
      service provider from dereferencing a reference to a location
      object making it difficult for the user to receive location-
      appropriate services.

   This threat is discussed in the context of emergency services in
   [Ecrit-Threats] Section 5.2.2, but is equally applicable to other
   uses of the GEOPRIV architecture.


3.  Design Considerations

   In addition to the security objectives discussed in Section 2 above,
   there are several other constraints on the design of SLOs.  In
   general, use of SLOs must be compatible with other GEOPRIV and ECRIT
   protocols and architectures, with minimal modifications to either.
   One particular issue that is likely to arise is that in several
   possible SLO designs, the user (e.g., a UAC in the SIP model) may not
   have access to his own location (by value).

3.1.  Integration with LoST

   Currently, many of the proposed use cases for the Location-to-Service
   Translation Protocol (LoST [LoST]) assume that the UAC has access to
   its own location.  For instance:

   o  As currently defined, a LoST query includes the location of the
      target in GML.  In the case that the UAC is both the target of the
      query and the originator of the query, this means that the UAC
      must have access to its own location.

   o  LoST responses typically contain a service boundary so that a UAC
      can determine when it has left the region in which its current
      PSAP URI is valid, and thus must query the LoST server again.
      Such a boundary is useful only if the UAC is aware of its own
      location.

   A security architecture in which a UAC may not know its own location,
   may necessitate revisions to the way that LoST is used.  For
   instance, access networks or VoIP providers may need to provide LoST
   proxies that have access to location information.



Barnes, et al.           Expires April 27, 2007                 [Page 6]

Internet-Draft           Secure Location Objects            October 2006


3.2.  GEOPRIV Considerations

   It is as yet unclear which communications in the GEOPRIV architecture
   can or should make use of SLOs when exchanging location data.  The
   areas of application likely will be determined by the number of each
   GEOPRIV entity and the contractual, regulatory, or other trust
   relationships among them; these considerations also will affect the
   trust model underlying a SLO design.  In addition, the functions
   required of each entity in the GEOPRIV architecture will dictate
   certain levels of access, and SLOs must accommodate these
   requirements.  For instance, since the GEOPRIV architecture specifies
   that privacy rules are applied by a Location Server, use of SLOs must
   not preclude the Location Server from having sufficient knowledge of
   location information to apply these rules.

3.3.  ECRIT Considerations

   A critical usage of GEOPRIV location objects is in emergency
   services, both for routing emergency calls to the correct PSAP and
   for directing emergency services to the location of the emergency.
   In such situations, it is essential that all relevant location
   information be available to all emergency responders that require it.
   When adding confidentiality features to a location object, therefore,
   appropriate failover mechanisms must be available.

3.4.  Technical Considerations

   User devices that are expected to handle location objects are
   becoming increasingly mobile.  In the context of SIP, this will be
   especially true as SIP is applied within cellular wireless networks.
   In order to facilitate the use of SLOs by these devices, an SLO
   design should be adaptable for use in an environment where there are
   constraints on both the processing power and bandwidth available to
   user devices.  SLOs are generally amenable to such environments,
   since they require no cryptographic operations to be performed in
   order to store or transmit them securely, and, at least when
   expressed as locations by reference, can consume very little
   bandwidth and storage space.


4.  Candidate Secure Location Object Formats

   Following the convention of SIP Location Conveyance [SIPLocation], we
   broadly divide the category of SLOs (objects that can be transmitted
   while still maintaining certain security properties) into those based
   on location by value and those based on location by reference.  We
   then discuss candidate SLOs in both categories and discuss the
   properties of a trust model relied upon by any SLO.  Note, however,



Barnes, et al.           Expires April 27, 2007                 [Page 7]

Internet-Draft           Secure Location Objects            October 2006


   that in spite of this division, these two types of SLO can be
   naturally combined, for instance multi-layer access control could be
   achieved by using a secured location reference to refer to a secured
   location value.

4.1.  Location By Value

   Conveyance of location by value is the act of transmitting an entire
   LO, rather than a reference to it.  Security properties can be added
   to such a location object by either signing the location object,
   encrypting it, or both, using a technology such as S/MIME or XMLDsig.
   Each type of object -- signed, encrypted, or both -- has a different
   set of security properties, discussed below.

   Although we separately discuss the signing and encrypting of LOs, it
   is natural to consider combining the two approaches.  This raises the
   question of whether a LO should be first signed and then encrypted,
   or vice-versa.  We therefore briefly discuss the advantages of both
   approaches.

   o  In settings where denial of service attacks are likely, signing an
      already encrypted LO is advantageous because a recipient of such
      LOs can quickly discard LOs with invalid signatures without
      needing to spend resources decrypting the object.  Additionally,
      in settings where some fields of the LO should be encrypted and
      other fields should be left unencrypted, it is advantageous to
      sign the entire LO after the private fields have been encrypted.

   o  The use of objects that are first signed and then encrypted
      requires less work on the part of the location producer.  Indeed,
      a location producer may produce a single signed object which can
      then be encrypted, by a separate party, for delivery to multiple
      recipients.  Similarly, the recipient of such an LO can re-encrypt
      the signed object for delivery to a new recipient without the
      involvement of the location producer.  Additionally, in settings
      where different portions of an LO should be signed by different
      entities, it is advantageous to first sign and then encrypt the
      LO.

4.1.1.  Signed Location

   A "signed location" SLO consists of a LO together with a signature of
   some or all of the LO by a recognized authority, likely a Location
   Server or Location Generator.  Use of a signed location SLO has the
   following security implications:

   o  Perhaps most importantly, use of a signed location SLO mitigates
      all of the threats in Section 2.2 arising from the use of forged



Barnes, et al.           Expires April 27, 2007                 [Page 8]

Internet-Draft           Secure Location Objects            October 2006


      location information.  An attacker who is not an authorized signer
      in the underlying trust model is unable to create fake location
      objects.  In particular, this prevents an attacker from claiming
      he is at a distant location.  Additionally, if a timestamp is
      included in the signed object, an attacker cannot replay a
      previously obtained location object (either his own or someone
      else's).

   o  Use of a signed location SLO partially mitigates the threats in
      Section 2.3 regarding denial of service.  An attacker on the
      communication path between a user and a location-based service
      provider cannot alter the location object in transit to make it
      appear that the user is at a distant location.  Obviously, certain
      attackers on the communication path can always deny service to an
      individual by dropping the individual's request.  However, an
      attack that drops the entire request is simpler to detect and
      respond to an attack that alters the location, since when a
      request is dropped the user finds out immediately (as soon as the
      time-out fails) but if a location is altered it is unclear how
      long it will take to determine that a problem has occurred.

   Naturally, the security properties granted by use of signed location
   SLOs fundamentally rely on a suitable trust model; as discussed in
   section 4.3, development of this trust model is a nontrivial but
   tractable problem.  In order for signed location to be useful, it
   must be difficult for an attacker to compromise an authorized signer
   of location information.  When signed location SLOs are used, it is
   the responsibility of the using protocol to take appropriate action
   when the signature fails to verify.  For example, in most cases, a
   signed SLO with an invalid signature might be discarded altogether,
   but in the special case of emergency services, a call with a location
   signature that fails to verify might be answered but given lower
   priority than calls with valid SLOs.

4.1.2.  Encrypted Location

   An "encrypted location" SLO is a LO encrypted in such a way that it
   is readable only by its intended recipient(s).  Use of an encrypted
   location SLO has the following security implications:

   o  Use of an encrypted location SLO mitigates all of the threats in
      Section 2.1 arising from improper disclosure of location
      information.  Unless the attacker is able to compromise the secret
      decryption key of the intended location recipient, it is
      infeasible for him to extract information from any encrypted
      location SLO he might obtain.  Therefore, even if the attacker is
      able, for example, to compromise a proxy on the communication path
      to a location recipient the sensitive location information



Barnes, et al.           Expires April 27, 2007                 [Page 9]

Internet-Draft           Secure Location Objects            October 2006


      contained in the SLO remains private.

   o  Use of an encrypted location SLO only partially mitigates the
      threats in Section 2.2 regarding forgery of location information.
      Depending on the key distribution architecture, it may be possible
      for an attacker to obtain the encryption key of a legitimate
      location recipient and forge an encrypted location SLO.  Of
      course, these threats can be mitigated (as described in Section
      4.1.1) by combining signing and encrypting of location objects.
      On the other hand, because an eavesdropper does not have access to
      the information contained in an encrypted location SLO, it is very
      difficult for him to modify the location in transit.

   o  Use of an encrypted location SLO can pose additional risks
      regarding the denial of service threats discussed in Section 2.3.
      In particular, use of an encrypted location SLO introduces the
      possibility that a user is denied a service because the service
      provider cannot decrypt the SLO to extract LI.  This could occur
      because of a key-management error, or because of an attack on the
      mechanism used to distribute public keys.

   The use of encrypted location SLOs relies fundamentally on a reliable
   mechanism to distribute the keys belonging to legitimate service
   providers; the difficulty of this task will derive from the
   underlying trust model.  In the context of emergency services, for
   example, one might use the LoST protocol to return a certificate for
   a PSAP in addition to the PSAP's URI.  This reduces the incremental
   risk of using encryption, since an attacker who is able to use LoST
   to distribute incorrect public keys can surely disrupt emergency
   services in other ways.

   One often-mentioned advantage of location-by-reference is that the
   required dereference operation creates an opportunity for location
   providers to enforce a scheme in which the party dereferencing the
   URL pays the provider for the location.  A secondary advantage of
   encrypted location SLOs is that they can be used to extend this model
   to location by value: The encrypted location object can be
   transmitted to the location recipient, but encrypted in such a way
   that the SLO cannot be used by the recipient until he performs a
   second decryption or key exchange transaction with the location
   provider.  However, just as the by-reference payment scheme is viable
   only if a user cannot dereference a URL to obtain his own location,
   this model forces a transaction only if a user cannot decrypt an
   encrypted location SLO containing his location.  While this may force
   some adaptation of existing protocols (as discussed in Section 3), it
   seems that use of encrypted location SLOs for this purpose is still
   consistent with broader usage.  For example, LoST servers could be
   operated by entities that maintain business relationships with



Barnes, et al.           Expires April 27, 2007                [Page 10]

Internet-Draft           Secure Location Objects            October 2006


   location providers, so that encrypted location SLOs included in LoST
   queries could be decrypted.

4.2.  Location By Reference

   Conveyance of location by reference is the act of transmitting not an
   object containing LI, but rather a URL (or other pointer) that can be
   dereferenced to obtain a LO.  Location URLs have several important
   security implications:

   o  Perhaps most importantly, use of location by reference forces a
      location recipient to conduct a separate transaction in order to
      obtain the desired LI, which has the effect of allowing any
      security decisions to be delayed until the time when a location
      URL is dereferenced.  This property allows much more complicated
      security and privacy policies to be enforced at the location
      server (such as rules about location expiration and
      retransmission), rather than delegating trust to using protocols.
      At the same time, however, it also lends itself very naturally to
      failover, since the location server can make a decision to grant
      access to parties that can demonstrate a need and authority for
      access, such as emergency service providers.

   o  Because a location URL references a resource held by a third party
      (commonly, a location server), not by the location target or
      location recipient, location references cannot be constructed by a
      user, but rather must be obtained from an location server.  This
      yields very powerful anti-forgery (hence anti-spam) properties,
      since a user cannot forge a location URL that references LI
      indicating that he is elsewhere than he is, and likewise, a third
      party (e.g., a man in the middle) cannot modify a URL to deny
      location-based services.

   We call a location reference that employs one or more security
   protocols in its dereference a secured location reference.  Any
   security protocols used in conjunction with location references will
   be reliant on a suitable trust model; as discussed in section 4.3,
   development of this trust model seems to be a nontrivial, but
   tractable problem.  In order for secured location references to be
   suitable for use in emergency services, the dereferencing protocol
   and any security protocols employed between the recipient and the
   location server must be made sufficiently reliable for use in an
   emergency.  As is the case with normal, unsecured location
   references, the most significant risk is introduced by the
   dereferencing protocol, since the location server is capable of
   granting access to LI independent of security policies and protocols.





Barnes, et al.           Expires April 27, 2007                [Page 11]

Internet-Draft           Secure Location Objects            October 2006


4.3.  Trust Models

   Any SLO system will be based on an underlying trust model.  The
   structure of this model deeply influences the nature of the security
   guarantees that the SLO system can provide.  Such guarantees include:

   o  Authentication of location recipients: Use of SLOs offers another
      mechanism for authenticating identities referenced by privacy
      rules.  Using secure location by value, objects can be encrypted
      for a specific recipient, and using secure location by reference,
      a location server can interpret a cryptographic credential to
      grant or deny access to specific recipients.  In particular,
      emergency service providers could be unambiguously identified by
      their credentials to be assured access to the LI they require.

   o  Authentication and integrity of location information: In the PSTN,
      location information is provided by wireline or wireless
      operators, and thus assumed by all using parties to be reliable.
      Use of location signing in secure location objects provides a
      mechanism to translate these assurances to IP-based telephony and
      other location-based Internet services.

   o  Non-repudiation of location information: By the same token as
      above, the current PSTN architecture allows failures of the
      location architecture to be clearly attributed to the provider of
      faulty LI, for purposes of determining regulatory or civil
      liability.  For location-based services over IP, particularly
      emergency services, this is an important function that can be
      enabled by secure location objects.

   These features require the identification and issuance of credentials
   for two classes of entities: Location producers and location
   consumers.  The case of location consumers seems to be the simpler,
   if we envision two major use cases, (1) emergency services calling,
   and (2) client-server style location-based services.  In the former
   case, the set of PSAPs and emergency service providers is small and
   stable enough to be manageable.  In some cases, even further
   simplification will be possible: In the NENA i3 architecture, for
   example, one might need to manage credentials only for gateways
   between emergency services networks and the Internet.  For other
   client-server location-based services, there are several current
   trust models that could be adapted, such as the broad, flat PKI model
   used by HTTPS or the more flexible model used in DNSSEC.

   Constructing a system for authenticating location producers is more
   difficult.  For example, an organization that administers a corporate
   network of SIP-based desk phones might provision these phones with
   fine-grained location information, such as their floor and room



Barnes, et al.           Expires April 27, 2007                [Page 12]

Internet-Draft           Secure Location Objects            October 2006


   number.  By some calculations [ref:Henning], in New York City alone
   there are thousands of organizations that might be expected to do
   become location producers in this way, several of which appear and
   disappear each day.  On the other hand, such location producers need
   only be included in a trust model if the goal of this trust model is
   to provide guarantees stronger than are offered by the PSTN.  An
   initial capability to provide PSTN-equivalent security would require
   only the inclusion of telecommunications and internet service
   providers; construction of a PKI on the scale of the former is
   already being under taken by the SIDR working group and the Regional
   Internet Registries.  In addition, many VoIP providers currently
   outsource location determination functions to other entities, which
   further consolidates the set of location producers.  Note also that
   although we have treated here the specific example of location for
   VoIP, the same access networks that provide location for these
   services will be used to access other location-based services, so a
   trust model for location producers in a VoIP setting would be
   extensible to a model for more general location-based services.


5.  Conclusions

   The purpose of this document is to start a discussion about the
   requirements of GEOPRIV and ECRIT for security in location objects.
   Clearly, it is tempting to push responsibility for security onto the
   protocols that carry LOs and the using protocols that process them.
   Currently, however, these protocols are unable to provide the end-to-
   end security guarantees necessary to mitigate threats to the privacy
   of location information and the integrity of location-based services.
   Without securing the location object itself, entities that generate
   LOs have no assurances that the LOs will not be misused, and critical
   applications such as emergency services have no assurances that the
   LOs they receive have not been forged or otherwise tampered with.

   In this document, we considered three approaches to securing LOs.
   Signing a location object can prevent forgery and mitigate resulting
   denial of service attacks.  Encrypting location objects can prevent
   the improper disclosure of location information, but encryption
   results in an opaque location object that may require adaptation of
   using protocols.  Using location by reference in conjunction with a
   secure dereferencing transaction can prevent both forgery and
   improper disclosure of location information.  However, obtaining
   location information from a location-by-reference object requires an
   additional transaction that could introduce additional risk in time-
   critical applications such as emergency services.  Naturally, these
   techniques for securing location objects can be combined to obtain
   stronger security guarantees or increased robustness.  For example, a
   location reference could be appended to a signed and encrypted



Barnes, et al.           Expires April 27, 2007                [Page 13]

Internet-Draft           Secure Location Objects            October 2006


   location object to obtain the security guarantees of location-by-
   reference and yet require a separate de-referencing transaction only
   in the event that decryption fails.  Achieving security through any
   of these mechanisms will require an appropriate trust model.


6.  IANA Considerations

   This document makes no request of IANA.

   Note to RFC Editor: this section may be removed on publication as an
   RFC.


7.  Security Considerations

   The focus of this document is security; hence security considerations
   permeate this specification.


8.  Acknowledgements


9.  References

9.1.  Normative References

   [RFC2119]  "", 2005.

9.2.  Informative References

   [Ecrit-Threats]
              Nortel, Siemens, Columbia University, and Siemens,
              "Security Threats and Requirements for Emergency Call
              Marking and Mapping", July 2006.

   [Geopriv-L7]
              Siemens Networks and Columbia University, "Geopriv Layer 7
              Location Configuration Protocol; Problem Statement and
              Requirements", October 2006.

   [Geopriv-Threats]
              Technology and Public Policy Clinic, Technology and Public
              Policy Clinic, Center for Democracy and Technology, and
              NeuStar, "Threat Analysis of the Geopriv Protocol",
              February 2004.

   [LoST]     Qualcomm, Inc., SunRocket, Columbia University, and



Barnes, et al.           Expires April 27, 2007                [Page 14]

Internet-Draft           Secure Location Objects            October 2006


              Siemens, "LoST: A Location-to-Service Translation
              Protocol", September 2006.

   [RFC3693]  Siemens AG, Center for Democracy and Technology,
              Technology and Public Policy Clinic, NeuStar, and Cisco,
              "Geopriv Requirements", February 2004.

   [SIPLocation]
              Qualcomm, Inc. and SunRocket, "Session Initiation Protocol
              Location Conveyance", October 2006.


Authors' Addresses

   Richard Barnes
   BBN Technologies
   9861 Broken Land Pkwy
   Columbia, Maryland  21046
   USA

   Phone: +1-410-290-6169
   Email: rbarnes@bbn.com


   Matt Lepinski
   BBN Technologies
   10 Moulton St.
   Cambridge, Massachusetts  02138
   USA

   Phone: +1-617-873-5939
   Email: mlepinsk@bbn.com


   Ron Watro
   BBN Technologies
   10 Moulton St.
   Cambridge, Massachusetts  02138
   USA

   Phone: +1-617-873-2551
   Email: rwatro@bbn.com









Barnes, et al.           Expires April 27, 2007                [Page 15]

Internet-Draft           Secure Location Objects            October 2006


Full Copyright Statement

   Copyright (C) The Internet Society (2006).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
   ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
   INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
   INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Barnes, et al.           Expires April 27, 2007                [Page 16]


PAFTECH AB 2003-20262026-04-23 04:09:42