Hi Ekr, ~snip~ >> > >> When you operate a network and you want this stuff to work then you >> have to consider this aspect. >> In the past a few folks have suggested to write a BCP about how >> different deployments may deal with this aspect but I believe it is >> far too early todo so for a BCP. > >The problem is that I'm not sure that this is an issue that >can be solved by the network operator. In the example I >described, it sounds to me like new protocol work may be required. So far, there was nobody who believed that new protocol work would be required. > > >> >> The reference points to the device. What the Target uses >this reference >> >> either for itself (if it wants to learn it's own >location) or (more >> >> likely) it forwards that URI to someone else, for example >to a PSAP. >> >> >> > >> > OK, but then what protocol is spoken over that URI? (see my >> > comments on S 8 below). >> > >> > >> > >> The answer is: >> >http://tools.ietf.org/id/draft-winterbottom-geopriv-deref-proto >col-00.txt > >What's the status of that document? > At the last meeting the group agreed that this document should become a WG item. I believe my co-author has submitted the document but it got stuck somewhere. Thanks for reminding me to ping my co-authors again. > >> > Well, lots of protocols would benefit from not having IP address >> > spoofing, but again, you're making a levy on network operations >> > on a global scale, no? >> > >> > >> If you want to deal with certain attacks then you may want todo >> something about it. > >Sorry, I don't think I get what you're saying here. Let me give you an example from the emergency services space where this work could be helpful. If the network operator wants to make location information available to the end host then they have various protocol choices. However, there is more beyond just using protocols we develop in the IETF, the IEEE or some other SDOs develop. You need to give the Location Server a way to perform location determination, i.e., it gets some identifier as input and then it needs to determine the physical location of that node. In some environment that's simpler than in others and it also depends on the quality of the location you would like to get back. Regardless of what identifier you pick for the lookup (let it be a MAC address, IP address, etc.) you may want to think about cases where an adversary uses an identifier of someone else. This would potentially allow him to learn location of someone other than his own location. In certain networks this might indeed be possible, for a more detailed discussion see http://www.ietf.org/internet-drafts/draft-ietf-geopriv-l7-lcp-ps-07.txt As a network operator you might want to evaluate whether your network infrastructure is vulnerable to such an attack and to take the corresponding steps to mitigate them. Ciao Hannes _______________________________________________ IETF mailing list IETF@xxxxxxxx https://www.ietf.org/mailman/listinfo/ietf