One document matched: draft-gellens-geopriv-obj-req-01.txt

Differences from draft-gellens-geopriv-obj-req-00.txt


GeoPriv Working Group                                       R. Gellens
Internet Draft: GeoPriv Object/Protocol Requirements          Qualcomm
Document: draft-gellens-geopriv-obj-req-01.txt               June 2002

                  GeoPriv Object/Protocol Requirements
    
Status of this Memo
    
    This document is an Internet-Draft and is in full conformance with
    all provisions of Section 10 of RFC2026.  Internet-Drafts are
    working documents of the Internet Engineering Task Force (IETF), its
    areas, and its working groups.  Note that other groups may also
    distribute working documents as Internet-Drafts.
    
    Internet-Drafts are draft documents valid for a maximum of six
    months and may be updated, replaced, or obsoleted by other documents
    at any time.  It is inappropriate to use Internet-Drafts as
    reference material or to cite them other than as "work in progress."
    
    The list of current Internet-Drafts can be accessed at
    http://www.ietf.org/ietf/1id-abstracts.txt.  The list of Internet-
    Draft Shadow Directories can be accessed at
    http://www.ietf.org/shadow.html.
    
    
Copyright Notice
    
     Copyright (C) The Internet Society 2002. All Rights Reserved.
    
    
                           Table of Contents
     1.  Abstract . . . . . . . . . . . . . . . . . . . . . . . . . .  1
     2.  Conventions Used in This Document . . . . . . . . . . . . . . 1
     3.  Introduction . . . . . . . . . . . . . . . . . . . . . . . .  2
     4.  Requirements on the GeoPriv Object  . . . . . . . . . . . . . 2
     5.  Requirements on Protocols Using the GeoPriv Object . . . . .  2
     6.  Usage Models  . . . . . . . . . . . . . . . . . . . . . . . . 3
     7.  Security Considerations  . . . . . . . . . . . . . . . . . .  3
     8.  References  . . . . . . . . . . . . . . . . . . . . . . . . . 3
     9.  Author's Address . . . . . . . . . . . . . . . . . . . . . .  4
    10.  Full Copyright Statement  . . . . . . . . . . . . . . . . . . 4
    
    
1.  Abstract
    
    This is a straw proposal for the requirements specification for the
    GeoPriv object and protocols which make use of it.
    
    
2.  Conventions Used in This Document
    
    The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
    "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
    document are to be interpreted as described in RFC 2119 [KEYWORDS].
    


Gellens                  Expires December 2002                  [Page 1]Internet Draft      GeoPriv Object/Protocol Requirements      June 2002

3.  Introduction
    
    The GeoPriv working group needs to define requirements on its object
    and any use of this object by protocols.  This memo is an attempt to
    list the minimum set of requirements for the most common uses.  By
    starting with the simplest cases, we can more easily verify that the
    requirements are correct and that security and privacy are properly
    considered.  We can then go on to consider more complex scenarios
    and see if the requirements need to be changed for them.
    
    
4.  Requirements on the GeoPriv Object
    
    *   The object MUST be suitable for requesting and receiving a
        location.
    *   The object MUST contain enough information to allow the
        user/owner's policy to be applied, including decisions such as:
        -   to disclose the location or not
        -   the precision, accuracy, and age of the location
        -   the number of decoy locations
        -   encryption requirements
    *   The object MUST permit (but not require) the policy to be
        enforced by a third party.
    *   The object MUST be usable in a variety of protocols, such as
        HTTP [HTTP] and SIP [SIP], as well as local APIs.
    *   The object MUST be usable in a secure manner even by
        applications on constrained devices.
    *   Encryption and authentication MUST use IETF security protocols.
    *   The object MUST carry location information in a well-known and
        standard format.
    *   The object MUST be extensible.
    *   All attributes of the object MUST have default values.  This
        allows the object to be used in a more compact form, and allows
        interoperability with implementations supporting future extensions.
    *   The default value of each attribute MUST reveal the least
        information.
    
    *   The object SHOULD have attributes which allow the policy
        enforcer to comply with legal or contractual obligations.
    *   The object SHOULD have a catchy acronym; for example Location
        and Security Description (LSD).
    
    
5.  Requirements on Protocols Using the GeoPriv Object
    
    *   Location information MUST be exchanged only in accordance with
        the user/owner's policy, including:
        -   to disclose the location or not
        -   the precision, accuracy, and age of the location
        -   the number of decoy locations
        -   encryption requirements
    


Gellens                  Expires December 2002                  [Page 2]Internet Draft      GeoPriv Object/Protocol Requirements      June 2002

6.  Usage Models
    
    The model situation is where a device which knows its location wants
    to disclose it on request (for example, during an HTTP session).
    Other situations, such as a requester asking a proxy for the
    location of a target, or where the device doesn't know its location
    but a server does, can be constructed using the model situation as a
    base.
    
    The model situation requires a policy enforcer.  This may reside
    within the device, or externally.
    
    Consider as an example that a web browser on the device is asked its
    location in order to receive a document.
    
    The original HTTP request might or might not use the GeoPriv object.
    
    The web browser on the device might construct a GeoPriv object and
    fill in what it knows (e.g., the host name asking for the
    information, details of the TLS [TLS] layer in effect, etc.), or it
    might verify and extend an object received in the HTTP request.  In
    either case the object does not yet contain the location.
    
    The web browser passes the GeoPriv object to a local or remote
    policy enforcer, which applies the policy, fills in the location as
    appropriate under the policy, and returns a GeoPriv object.
    
    The web browser returns the GeoPriv object to the HTTP server.
    
    Alternatively, the web browser may return an encrypted GeoPriv
    object containing the location to the web server, which must send it
    to the policy enforcer (as specified in the object) in order to use
    the information.
    
    The policy enforcer applies the policy and returns a usable GeoPriv
    object to the web server.
    
    
7.  Security Considerations
    
    Security is a primary concern of the object and any use of it by
    protocols.  Security and privacy are considered throughout this
    document.
    
    
8.  References
    
    [ABNF] Crocker, Overell, "Augmented BNF for Syntax Specifications:
    ABNF", RFC 2234, Internet Mail Consortium, Demon Internet Ltd,
    November 1997.
    



Gellens                  Expires December 2002                  [Page 3]Internet Draft      GeoPriv Object/Protocol Requirements      June 2002

    [HTTP] Fielding, Gettys, Mogul, Frystyk, Masinter, Leach,
    Berners-Lee, "Hypertext Transfer Protocol -- HTTP/1.1", RFC 2616,
    June 1999.
    
    [KEYWORDS] Bradner, "Key words for use in RFCs to Indicate
    Requirement Levels", RFC 2119, Harvard University, March 1997.
    
    [SIP] Handley, Schulzrinne, Schooler, Rosenberg, "SIP:  Session
    Initiation Protocol", RFC 2543, March 1999.
    
    [TLS] Dierks, Allen, "The TLS Protocol Version 1.0", RFC 2246,
    January 1999.
    
    
9.  Author's Address
    
    
    Randall Gellens
    QUALCOMM Incorporated
    5775 Morehouse Dr.
    San Diego, CA   92121-2779
    U.S.A.

    Phone: +1 858 651 5115
    Email: rg+ietf@qualcomm.com
    
    
10.  Full Copyright Statement
    
    Copyright (C) The Internet Society 2002.  All Rights Reserved.
    
    This document and translations of it may be copied and furnished to
    others, and derivative works that comment on or otherwise explain it
    or assist in its implementation may be prepared, copied, published
    and distributed, in whole or in part, without restriction of any
    kind, provided that the above copyright notice and this paragraph
    are included on all such copies and derivative works.  However, this
    document itself may not be modified in any way, such as by removing
    the copyright notice or references to the Internet Society or other
    Internet organizations, except as needed for the purpose of
    developing Internet standards in which case the procedures for
    copyrights defined in the Internet Standards process must be
    followed, or as required to translate it into languages other than
    English.
    
    The limited permissions granted above are perpetual and will not be
    revoked by the Internet Society or its successors or assigns.
    
    This document and the information contained herein is provided on an
    "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
    TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
    BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION


Gellens                  Expires December 2002                  [Page 4]Internet Draft      GeoPriv Object/Protocol Requirements      June 2002

    HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
    MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.




















































Gellens                  Expires December 2002                  [Page 5]

PAFTECH AB 2003-20262026-04-24 07:34:03