1 / 6

ECRIT Direct Calling

ECRIT Direct Calling. draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne. Model. Builds on -phone-bcp. Not intended to replace -phone-bcp Location acquisition, route determination is the same

gittel
Download Presentation

ECRIT Direct Calling

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. ECRIT Direct Calling draft-winterbottom-ecrit-direct-01 James Winterbottom, Martin Thomson, Hannes Tschofenig, Henning Schulzrinne draft-winterbottom-ecrit-direct-01

  2. Model draft-winterbottom-ecrit-direct-01

  3. Builds on -phone-bcp • Not intended to replace -phone-bcp • Location acquisition, route determination is the same • Uses an LCP or local source (e.g., GPS) for location • Differences: • Does not rely on Route header, instead directly contacts the PSAP at the URI provided by LoST • Provides a mechanism for call-back draft-winterbottom-ecrit-direct-01

  4. Advantages • Provides emergency calling for any device • …without a need for a VSP: draft-winterbottom-ecrit-direct-01

  5. Callback • Contact header could be insufficient for callback • Intervening NAT/firewall prevents incoming flow • Devices that wish to allow callback REGISTER with the ESRP using SIP outbound (RFC 5626) • No identity/credentials needed • Potential for new or novel schemes draft-winterbottom-ecrit-direct-01

  6. Security • Problem: hoax calls with spoofed location or identity • LOTS of discussion • Presented complaint: • No intermediary to provide an independent assurance of identity using “transitive trust” • Disagreement on desired properties of any solution: • Identification for post-hoc audit/retribution • Can be for identity OR location information • Call classification for prioritization purposes • Some regions will demand that this not be used • Up to jurisdictional policy draft-winterbottom-ecrit-direct-01

More Related