Session 1: Standardization and Regulation Emergency Call Standardization



Similar documents
Internet Standards - Emergency Services

Internet based Emergency calls. Alexander Mayrhofer, nic.at GmbH RIPE 55 Oct 2007, Amsterdam

Voice over IP (SIP) Milan Milinković

VoIP LAB. 陳 懷 恩 博 士 助 理 教 授 兼 所 長 國 立 宜 蘭 大 學 資 訊 工 程 研 究 所 TEL: # 255

Request for Comments: August 2006

VoIP Emergency Calling. Foundations and Practice

Multimedia & Protocols in the Internet - Introduction to SIP

How To Understand The Purpose Of A Sip Aware Firewall/Alg (Sip) With An Alg (Sip) And An Algen (S Ip) (Alg) (Siph) (Network) (Ip) (Lib

Denial of Services on SIP VoIP infrastructures

Media Gateway Controller RTP

T5.4: Routing, Location-based Information and Caller ID

IP-Telephony SIP & MEGACO

Session Initiation Protocol (SIP)

Location in SIP/IP Core (LOCSIP)

Multimedia Communication in the Internet. SIP: Advanced Topics. Dorgham Sisalem, Sven Ehlert Mobile Integrated Services FhG FOKUS

How to make free phone calls and influence people by the grugq

For internal circulation of BSNL only

Transparent weaknesses in VoIP

ARCHITECTURES TO SUPPORT PSTN SIP VOIP INTERCONNECTION

Voice over IP & Other Multimedia Protocols. SIP: Session Initiation Protocol. IETF service vision. Advanced Networking

Three-Way Calling using the Conferencing-URI

Session Initiation Protocol (SIP) The Emerging System in IP Telephony

SIP Basics. CSG VoIP Workshop. Dennis Baron January 5, Dennis Baron, January 5, 2005 Page 1. np119

Next Generation 112 Explained

Internet Geolocation and Location-Based Services. Richard Barnes BBN Technologies IETF GEOPRIV Co-Chair Emergency Services Workshop Co-Chair

SIP and ENUM. Overview DENIC. Introduction to SIP. Addresses and Address Resolution in SIP ENUM & SIP

Formación en Tecnologías Avanzadas

IP Office Technical Tip

SIP Security. ENUM-Tag am 28. September in Frankfurt. Prof. Dr. Andreas Steffen. Agenda.

SIP: Protocol Overview

SIP Essentials Training

VoIP some threats, security attacks and security mechanisms. Lars Strand RiskNet Open Workshop Oslo, 24. June 2009

This specification this document to get an official version of this User Network Interface Specification

Telecommunication Services Engineering (TSE) Lab. Chapter V. SIP Technology For Value Added Services (VAS) in NGNs

Session Initiation Protocol

ETSI TR V1.1.1 ( ) Technical Report

NTP VoIP Platform: A SIP VoIP Platform and Its Services

VoIP. What s Voice over IP?

EE4607 Session Initiation Protocol

Session Initiation Protocol (SIP) 陳 懷 恩 博 士 助 理 教 授 兼 計 算 機 中 心 資 訊 網 路 組 組 長 國 立 宜 蘭 大 學 資 工 系 TEL: # 340

Session Initiation Protocol and Services

BROADWORKS SIP ACCESS SIDE EXTENSIONS INTERFACE SPECIFICATIONS RELEASE Version 1

NGN NNI Signalling Profile

Connecting with Free IP Call

Session Initiation Protocol (SIP)

ESINET NG911. Aparna Pragadeeswar Vinoth

HRPD Support for Emergency Services

VoIP with SIP. Session Initiation Protocol RFC-3261/RFC

Emergency Location Working Group

NAT TCP SIP ALG Support

802.11: Mobility Within Same Subnet

NAT Traversal for VoIP

Connecting with Vonage

Session Initiation Protocol (SIP)

TECHNICAL SUPPORT NOTE. 3-Way Call Conferencing with Broadsoft - TA900 Series

Best Practices for SIP Security

SIP ALG - Session Initiated Protocol Applications- Level Gateway

internet technologies and standards

Application Notes for Configuring SIP Trunking between McLeodUSA SIP Trunking Solution and an Avaya IP Office Telephony Solution 1.

On-Demand VPN Service between Home Networks for NGN Users

NAT Traversal in SIP. Baruch Sterman, Ph.D. Chief Scientist David Schwartz Director, Telephony Research

Avaya IP Office 4.0 Customer Configuration Guide SIP Trunking Configuration For Use with Cbeyond s BeyondVoice with SIPconnect Service

Adaptation of TURN protocol to SIP protocol

An outline of the security threats that face SIP based VoIP and other real-time applications

3.1 SESSION INITIATION PROTOCOL (SIP) OVERVIEW

EENA NG112 Committee. Long Term Definition Document Conference call 1 of February 2012

RN Rev 02 Release Note Release 1.4.3

A Comparative Study of Signalling Protocols Used In VoIP

SIP for Voice, Video and Instant Messaging

Hacking Trust Relationships of SIP Gateways

Advanced Networking Voice over IP & Other Multimedia Protocols

Part II. Prof. Ai-Chun Pang Graduate Institute of Networking and Multimedia, Dept. of Comp. Sci. and Info. Engr., National Taiwan University

Using SIP Protocol for Bi-directional Push-to-Talk Mechanism over Ad-Hoc Network

Application Notes for IDT Net2Phone SIP Trunking Service with Avaya IP Office Issue 1.0

FOSDEM 2007 Brussels, Belgium. Daniel Pocock B.CompSc(Melbourne)

The on NG9-1-1 Part I of III

Grandstream Networks, Inc. GXP2130/2140/2160 Auto-configuration Plug and Play

SIP Trunking & Peering Operation Guide

SIP : Session Initiation Protocol

A Call Conference Room Interception Attack and its Detection

Lehrstuhl für Informatik 4 Kommunikation und verteilte Systeme

Interoperability Test Plan for International Voice services (Release 6) May 2014

Connecting with sipgate

Internet Services & Protocols Multimedia Applications, Voice over IP

Secured Communications using Linphone & Flexisip

Mobicents 2.0 The Open Source Communication Platform. DERUELLE Jean JBoss, by Red Hat 138

Internet Services & Protocols Multimedia Applications, Voice over IP

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Session Initiation Protocol (SIP) Chapter 5

SIP OVER NAT. Pavel Segeč. University of Žilina, Faculty of Management Science and Informatics, Slovak Republic

Location Information Interoperability of CAP and PIDF-LO for Early Warning Systems

Project Code: SPBX. Project Advisor : Aftab Alam. Project Team: Umair Ashraf (Team Lead) Imran Bashir Khadija Akram

NTP VoIP Platform: A SIP VoIP Platform and Its Services 1

How To Understand How Open Source And Free Software Work Together

Transcription:

Session 1: Standardization and Regulation Emergency Call Standardization Hannes Tschofenig ECRIT IETF WG Chair Siemens AG Corporate Technology

Agenda Big Picture Determining Location Identify Emergency Call Find Correct PSAP Emergency Call

Big Picture High-Level Classification Authority to Citizen Example: Cell broadcast for Tsunami warning Authority to Authority Example: Communication between emergency personnel Citizen to Authority Example: VoIP emergency call Authorities Citizen

Citizen to Authority Communication Relevant Bodies 3GPP IEEE ITU-T PacketCable DSL Forum Wimax NENA ETSI EMTEL IETF Emergency Context Resolution with Internet Technologies (ECRIT) Geographic Location/Privacy (GEOPRIV) Internet Emergency Preparedness (IEPREP) Session Initiation Protocol (SIP) Session Initiation Proposal Investigation (SIPPING) Transport Area Working Group Third (TSVWG) Annual VoIP Security Workshop (2006)

GEOPRIV The Starting Point for Location and Privacy Work in the IETF

Important Architectural Consideration Who knows the location of the end host? OSI Model Layer 7 VoIP, Inc. (Application Service Provider) Common point - The end device! Layer 3 Layer 2 ISP, Inc. (Internet Service Provider) Last Mile, Inc. (Access Provider) Often the access provider, the Internet service provider and the application service provider are different parties.

VoIP Emergency Solution Building Blocks

Determine Location Manual configuration GPS Link layer mechanisms (e.g., LLDP) DHCP (civic and geospatial) Application layer protocol (e.g., HELD, OMA work)

Determining Location Example: DHCP for Location or DHCPINFORM [MAC=00:11:20:9d:a0:03] request response DHCPACK [option=0:us:1:ny:2:new YORK: 3:NEW YORK:6:AMSTERDAM:19:1214] DHCP Server

Determining Location Example: HELD (or similar proposals) Application layer protocol Useful if legacy equipment does not support location extensions (e.g., DHCP extensions in a DSL environment) What is PIDF-LO?

PIDF-LO Presence Information Data Format (PIDF) is an XML-based format for presence Extends PIDF to accommodate two new elements: Location-Info Encapsulates a location information GML 3.0 <feature.xsd> schema is mandatory-to-implement for all GEOPRIV-compliant applications Also defines an optional civil location format Usage-rules Used to indicate privacy preferences PDIF already contains a number of attributes: Placetype, presentity identity, status (busy, idle, ),. Most of the them are used in the presence environment (and are optional)

Abbreviated PIDF-LO Example <presence entity= pres:joe@example.com > <tuple id= sg89ae > <status> <geopriv> <location-info> <gml > </gml> </location-info> <usage-rules> <retention-expiry/> <retransmission-allowed/> <note-well> </note-well> </usage-rules> </geopriv> </status> </tuple> </presence>

Basic GML Geometries Point: LineString: Linear Ring:

More Shares Arc Band <<GML code too long>> Polygon Start Angle Stop Angle outerboundaryis innerboundaryis

Civic Location Example (non-gml based) <gp:location-info> <cl:civiladdress> <cl:country>us</cl:country> <cl:a1>new York</cl:A1> <cl:a3>new York</cl:A3> <cl:a6>broadway</cl:a6> <cl:hno>123</cl:hno> <cl:loc>suite 75</cl:LOC> <cl:pc>10027-0401</cl:pc> </cl:civiladdress> </gp:location-info>

Determining Location Security DHCP provides configuration information to the end host (not only distribute location info) DHCP is very weak on security and contains a lot of vulnerabilities See draft-ietf-dhc-v4-threat-analysis-02.txt RFC 3118 ( Authentication for DHCP Messages ) assumes a preshared security association between the DHCP client and the DHCP server. Turned out to be non-realistic assumption. Similar threats exist with other location determination solutions.

Work Split IETF work worries about emergency call, routing and location information Other organizations need to deal with an additional tough requirement: Network access without authentication (SIM-less emergency calls) Network access with authentication (but by skipping authorization) Examples: 3GPP Wimax

Mobility Environment Location by Value vs. Location by Value Problem: Location Inaccurate Obtaining location information only during network attachment Location info might be consumed later. Solution sketch: LIS creates a PIDF-LO and a reference to it. Reference is sent to the end host Subscription to the reference with information about event reduction is provided Security Challenge: Prevent unauthorized access to location information SUBSCRI BE NOTIFY (locationuri) (PIDF-LO)

Identifying an Emergency Call Purpose For UA : To send caller s location information For Proxies: To handle the emergency call specially For Mapping Protocol: To resolve to PSAP URI Emergency Identifier (Emergency Service URN) Service URN: identifies a generic service, not a specific resource For emergency: urn:service:sos urn:service:sos.ambulance urn:service:sos.fire urn:service:sos.police Can be used in request URI and To header. Security Challenge: Dial Strings (Emergency Numbers) Denial of Service: Marking calls as emergency calls

Emergency Dial Strings Dial Strings vs. Emergency identifiers Dial strings are entered by user Additional aspect: Configuration of dial strings important to map them to the emergency identifier Different emergency dial strings different in countries (e.g., 911 for North America, 112 for Europe) some countries uses separate numbers for ambulance/police/fire Required to support both home and visited emergency dial strings e.g., for an American traveler who is visiting Europe, both 911 and 112 should be recognized as emergency For the home emergency dial strings: User can set his/her home country through configuration. In initial time, UA gets the home emergency dial strings using mapping protocols. For the visited emergency dial strings: Whenever current location is changed, UA gets the visited emergency dial strings using mapping protocols. Security Challenges: Automatic configuration of dial strings

Finding the Correct PSAP Which PSAP should the call go to? Usually to the PSAP that covers the area Sometimes to a backup PSAP If no location, then default PSAP Standardization in progress: LoST: A Location-to-Service Translation Protocol PSAP determination is a mapping problem:

LoST (Location-to-Service Translation) For mapping a service identifier and location information to PSAP URL Supports both civic and geo location information Underlying transport mechanism in discussion (SOAP, UDP, HTTP) Security Challenges: Server authentication, integrity, confidentiality <mapping> <request> <operation>recurse</operation> <service>urn:service:sos</service> <gp:location-info> <cl:civicaddress> <cl:country>us</cl:country> <cl:a1>ny</cl:a1> <cl:a3>new York</cl:A3> <cl:a6>amsterdam</cl:a6> <cl:hno>1214</cl:hno> </cl:civicaddress> </gp:location-info> </request> </mapping> request response <mapping> <response expires="2006-03-09t01:53:33.396z"> <displayname>new York City PSAP</displayName> <uri>sip:psap_ny@irt.cs.columbia.edu</uri> <civicmatch> <gp:location-info> <cl:civicaddress> <cl:country>us</cl:country> <cl:a1>ny</cl:a1> <cl:a3>new York</cl:A3> <cl:a6>amsterdam</cl:a6> <cl:hno>1214</cl:hno> </cl:civicaddress> </gp:location-info> </civicmatch> </response> </mapping> LoST Server

Emergency Call: Normal Case (UA recognition, UA resolution) (1) Location (2) Location + Service Identifier (3) PSAP URL + emergency dial-string Mapping Server (4) SOS caller dial emergency dialstring or (5) INVITE PSAP URL To: urn:service:sos <Location> SIP proxy (6) INVITE PSAP URL To: urn:service:sos <Location> call taker push emergency button Security Challenges: Classical VoIP call security problems

SIP message for Location Info. INVITE urn:service:sos SIP/2.0 To: urn:service:sos Call-ID: 763782461@192.168.1.106 Via: SIP/2.0/TCP 192.168.1.106:4064;rport Content-Type: multipart/mixed; boundary From: sip:caller@irt.cs.columbia.edu Contact: <sip:eddie@160.39.54.70:5060> CSeq: 1 INVITE Content-Length: 1379 request line header fields ------ =_ZGY1NTFlZDJkMDkxY2FkMTIxMWI2MzIzNjE1M2U0OTY= MIME-Version: 1.0 content-type: application/sdp Content-Transfer-Encoding: 8bit v=0 o=eddie 1127764654 1127764654 IN IP4 192.168.1.106 s=sipc Call c=in IP4 160.39.54.70 t=0 0 m=audio 10000 RTP/AVP 0 3 m=video 20000 RTP 31 SDP ------- =_ZGY1NTFlZDJkMDkxY2FkMTIxMWI2MzIzNjE1M2U0OTY= MIME-Version: 1.0 Content-Type: application/pidf+xml Content-Transfer-Encoding: 8bit <?xml version="1.0" encoding="iso-8859-1"?> <presence xmlns="urn:ietf:params:xml:ns:pidf" xmlns:gp="urn:ietf:params:xml:ns:pidf:geopriv10" xmlns:cl=" urn:ietf:params:xml:ns:pidf:geopriv10:civilloc" xmlns:gml="urn:opengis:specification:gml:schema-xsd:feature:v3.0" entity="sip:calltaker_ny2@irt.cs.columbia.edu"> <tuple id="28185"> <status> <gp:geopriv> <gp:location-info> <cl:civiladdress> <cl:country>us</cl:country> <cl:a1>ny</cl:a1> <cl:a2>new york</cl:a2> <cl:a3>new york</cl:a3> <cl:a6>amsterdam</cl:a6> <cl:hno>1214</cl:hno> </cl:civiladdress> </gp:location-info> <gp:method>manual</gp:method> </gp:geopriv> </status> <contact priority="0.8">sip:eddie@160.39.54.70:5060</contact> <timestamp>2005-09-26t15:57:34-04:00</timestamp> </tuple> </presence> ------- =_ZGY1NTFlZDJkMDkxY2FkMTIxMWI2MzIzNjE1M2U0OTY=-- PIDF-LO

Emergency Call: No Location from UA (UA recognition, Proxy resolution) Location Database (3) Location (4) Location + Service Identifier Mapping Server (5) PSAP URL (1) dial 911 or push emergency button SOS caller (2) INVITE urn:service:sos To: urn:service:sos SIP proxy (6) INVITE PSAP URL To: urn:service:sos <Location> call taker

Emergency Call: Backward Compatible (Proxy recognition, Proxy resolution) Location Server (3) Location (4) Location + Service Identifier Mapping Server (5) PSAP URL (1) dial 911 SOS caller (2) INVITE sip:911@domain INVITE PSAP URL (6) To: sip:911@domain SIP proxy To: urn:service:sos <Location> call taker

Distributed Mapping Database Security Challenges: Authorization (Access Control), DoS! "#

Layered Defense against (D)DoS PSAP is a potential target for DDoS attacks Server itself; or First responders Emergency personnel Example: Adversary places an emergency call and attaches the wrong location information. The typical solution, namely cryptography, cannot be applied in a number of cases.

Layered Defense against (D)DoS Security Goal: 1. Determine quality of the emergency call in real-time (for ranking) [does not mean that the call is malicious if various security checks cannot be performed] 2. Catch adversary (later; non real-time) (1) How to trace back the adversary? Depends how the adversary placed the emergency call: Authenticate emergency caller to PSAP: Might require a public key infrastructure Deployment concerns Performance concerns Asserted identities: Works with approach (1) (P-Asserted-ID) and with approach (2) if you have a separate identity provider (SAML like scheme) IP address: IP traceback mechanisms (2) How to determine trustworthiness of provided information? Signing location information provided by access network

What s Next? Finalize WG documents: Requirements draft-ietf-ecrit-requirements-09.t Security Threats draft-ietf-ecrit-security-threats-01.txt Service URN draft-ietf-ecrit-service-urn-03.txt Progress LoST Continue work in ECRIT architecture design team to define the big picture. WG rechartering to include work on BCP, ECRIT Arch., Mapping Arch. Coordination meeting with 3GPP about emergency services Meeting with other organizations to synchronize VoIP emergency work

Questions?