slide1 n.
Download
Skip this Video
Loading SlideShow in 5 Seconds..
draft-ietf-ecrit-unauthenticated-access-03.txt PowerPoint Presentation
Download Presentation
draft-ietf-ecrit-unauthenticated-access-03.txt

Loading in 2 Seconds...

play fullscreen
1 / 8

draft-ietf-ecrit-unauthenticated-access-03.txt - PowerPoint PPT Presentation


  • 132 Views
  • Uploaded on

Extensions to the Emergency Services Architecture for dealing with Unauthenticated and Unauthorized Devices. draft-ietf-ecrit-unauthenticated-access-03.txt. Status.

loader
I am the owner, or an agent authorized to act on behalf of the owner, of the copyrighted work described.
capcha
Download Presentation

PowerPoint Slideshow about 'draft-ietf-ecrit-unauthenticated-access-03.txt' - renate


An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -
Presentation Transcript
slide1

Extensions to the Emergency Services Architecture for dealing withUnauthenticated and Unauthorized Devices

draft-ietf-ecrit-unauthenticated-access-03.txt

status
Status
  • draft-ietf-ecrit-unauthenticated-access-02.txt received a number of review comments from Bernard Aboba, Martin Thomson, and Marc Linsner
  • Main issues on the next few slides.
  • draft-ietf-ecrit-unauthenticated-access-03.txt addresses editorial comments and minor comments.
issue 1 no access authentication naa
Issue #1: No Access Authentication (NAA)

Start

Credentialsfornetworkaccessauthenticationavailable?

yes

no

Waiting for ES callinitiation

Lower-layerattach

ASP configured?

no

Emergency NW attachpossible?

yes

no

yes

Tell userthat ES callisnot

allowed in jusristiction

PhoneBCP

NASP

NAA

Authorized to make ES call?

no

yes

ZBP

PhoneBCP

call flow

(2)

Location + Service Identifier

Call Flow

Location Information Server

Routing Database

(1)

Location

(3)

PSAP URI + emergency number

(4)

(5)

INVITE

Request URI: urn:service:sos

To: urn:service:sos

Route Header: PSAP URI

<PIDF-LO>

INVITE

Request URI: urn:service:sos

To: urn:service:sos

Route Header: PSAP URI

<PIDF-LO>

dial9-1-1

SIP Proxy

PSAP

VSP

issue 2 the state of hotspot access
Issue #2: The State of Hotspot Access
  • Bernard illustrated that the current hotspot access is quite bad and there is no easy way to get to the functionality we would need.
  • The currently described functionality captures the envisioned end state and does not explain how to get to that state given the nastiness of today's network deployments.
  • On one hand we want to provide a technical write-up about the functionality that is needed to make calls in the NAA case but on the other hand we need to point to the problems to get there.
issue 3 lack of network access authorization
Issue #3: Lack of network access authorization
  • The NAA case only focuses on the lack of credentials but does not consider the case where credentials are available but network access authorization fails nevertheless.
  • Lack of authorization at the application layer is covered.
network access authentication architecture
Network Access Authentication Architecture

Network Access Server /

Authenticator /

AAA Client

End Host /

EAP Peer

AAA Server /

EAP server

EAP peer (supplicant)

EAP server

AAA Client

AAA

Server

EAP MSK

EAP MSK

EAP lower

Layer

(e.g.,

802.11i)

EAP lower

Layer

(e.g.,

802.11i)

EAP method

issue 4 document writing style
Issue #4: Document Writing Style
  • An editorial question was raised by Martin as well
    • Currently, the draft states the steps that are necessary for performing the emergency call. There are only a few steps.
    • Martin suggested to instead reference the selected parts from the phone BCP and say what is not applicable.
    • Another option is to provide a summary of what is different.