[Docs] [txt|pdf] [Tracker] [Email] [Nits]
Versions: 00 draft-ietf-geopriv-radius-lo
Geopriv H. Tschofenig
Internet-Draft Siemens
Expires: January 10, 2005 F. Adrangi
Intel
A. Lior
M. Jones
Bridgewater
July 12, 2004
Carrying Location Objects in RADIUS
draft-tschofenig-geopriv-radius-lo-00.txt
Status of this Memo
By submitting this Internet-Draft, I certify that any applicable
patent or other IPR claims of which I am aware have been disclosed,
and any of which I become aware will be disclosed, in accordance with
RFC 3668.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as
Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 10, 2005.
Copyright Notice
Copyright (C) The Internet Society (2004). All Rights Reserved.
Abstract
This document describes RADIUS attributes for conveying the Access
Network's operational ownership and location information based on a
civil and geospatial location location format.
The distribution of location information is privacy sensitive.
Tschofenig, et al. Expires January 10, 2005 [Page 1]
Internet-Draft Carrying Location Objects in RADIUS July 2004
Dealing with mechanisms to preserve the user's privacy is important
and addressed in this document.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Delivery Methods for Location Information . . . . . . . . . . 5
3.1 Authentication/Authorization Phase Delivery . . . . . . . 5
3.2 Mid-session Delivery . . . . . . . . . . . . . . . . . . . 6
4. Scenarios . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4.1 Use Case 1 - Use of Location Information in AAA . . . . . 8
4.2 Scenario 2 - Use of Location Information for other
Services . . . . . . . . . . . . . . . . . . . . . . . . . 8
5. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1 Operator-Name Attribute . . . . . . . . . . . . . . . . . 10
5.2 Location-Information Attribute . . . . . . . . . . . . . . 10
5.2.1 Civil Location Information . . . . . . . . . . . . . . 11
5.2.2 Geospatial Location Information . . . . . . . . . . . 12
6. Policy-Information Attribute . . . . . . . . . . . . . . . . . 14
7. Location-Type Attribute . . . . . . . . . . . . . . . . . . . 15
8. Billing-Description Attribute . . . . . . . . . . . . . . . . 16
9. Attributes . . . . . . . . . . . . . . . . . . . . . . . . . . 17
9.1 Operator-Name Attribute . . . . . . . . . . . . . . . . . 17
9.2 Location-Information Attribute . . . . . . . . . . . . . . 17
9.3 Policy-Information Attribute . . . . . . . . . . . . . . . 20
9.4 Location-Type Attribute . . . . . . . . . . . . . . . . . 21
9.5 Billing-Description Attribute . . . . . . . . . . . . . . 21
10. Table of Attributes . . . . . . . . . . . . . . . . . . . . 23
11. IANA Considerations . . . . . . . . . . . . . . . . . . . . 24
12. Example . . . . . . . . . . . . . . . . . . . . . . . . . . 25
13. Privacy Considerations . . . . . . . . . . . . . . . . . . . 27
14. Security Considerations . . . . . . . . . . . . . . . . . . 30
15. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . 32
16. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . 33
17. References . . . . . . . . . . . . . . . . . . . . . . . . . 34
17.1 Normative References . . . . . . . . . . . . . . . . . . . . 34
17.2 Informative References . . . . . . . . . . . . . . . . . . . 34
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . 36
Intellectual Property and Copyright Statements . . . . . . . . 38
Tschofenig, et al. Expires January 10, 2005 [Page 2]
Internet-Draft Carrying Location Objects in RADIUS July 2004
1. Introduction
Wireless LAN (WLAN) Access Networks (AN) are being deployed in public
places such as airports, hotels, shopping malls, and coffee shops by
a diverse set of incumbent operators such as cellular carriers (GSM
and CDMA), Wireless Internet Service Providers (WISP), and fixed
broadband operators.
When an end host authenticates itself to such a network, information
about the location and operational ownership of this network needs to
be conveyed to the users's home network to which the user has a
contractal relationship. The main intent of this document is to
enable location aware billing (e.g., determine the appropriate tariff
and taxation), location aware subscriber authentication and
authorization for roaming environments and to enable location aware
services.
This document describes AAA attributes that are used by a AAA client
or a local AAA server in an access network for conveying
location-related information to the user's home AAA server. This
document defines attributes for RADIUS [RFC2865].
Although the proposed attributes in this draft are intended for
wireless LAN deployments, they can also be used in other wireless and
wired networks where location-aware services are required.
Location information needs to be protected against unauthorized
access and distribution to preserve privacy of the owner of the
location information. With [I-D.ietf-geopriv-reqs] requirements for
a protocol-independent model for the access to geographic location
information was defined. The model includes a Location Generator
(LG) that creates Location Information, a Location Server (LS) that
authorizes access to Location Information, a Location Recipient (LR)
that requests and receives information, and a Rule Maker (RM) that
provides authorization policies to the LS which enforce access
control policies on access to a target.
Tschofenig, et al. Expires January 10, 2005 [Page 3]
Internet-Draft Carrying Location Objects in RADIUS July 2004
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
RADIUS specific terminology is reused from [RFC2865] and [RFC2866].
Terminology related to privacy issues, location information and
authorization policy rules are taken from [I-D.ietf-geopriv-reqs].
Tschofenig, et al. Expires January 10, 2005 [Page 4]
Internet-Draft Carrying Location Objects in RADIUS July 2004
3. Delivery Methods for Location Information
Location Infomation Objects defined in this document are transported
over RADIUS protocol from visited access network to the AAA server.
The information can be delivered to the RADIUS server during the
authentication/authorization phase described in Section 3.1, or in
the mid-session using the dynamic authorization protocol framework
described in Section 3.2. This section describes message flow for
both delivery methods.
3.1 Authentication/Authorization Phase Delivery
Figure 1 shows an example message flow for delivering Location
Information during the network access authentication/authorization
procedure. Upon a network authentication request from an access
network client, the NAS submits a RADIUS Access-Request message which
contains location information attributes among other required
attributes. The authentication and/or authorization procedure is
completed based on a number of criteria, including the newly defined
Location-Information, Operator-Name, Location-Type,
Policy-Information attributes. A RADIUS Accounting Request message
is again allowed to carry location specific attributes.
+---------+ +---------+ +---------+
| Access | | Network | | AAA |
| Network | | Access | | Server |
| Client | | Server | | |
+---------+ +---------+ +---------+
| | |
| Authentication phase | |
| begin | |
|---------------------->| |
| | |
| | |
| | RADIUS |
| | Access-Request |
| | + Location-Information |
| | attributes |
| |----------------------------->|
| | |
: : :
: Multiple Protocol Exchanges to perform :
: Authentication, Key Exchange and Authorization :
: : :
: ...continued... :
: | |
| | RADIUS |
Tschofenig, et al. Expires January 10, 2005 [Page 5]
Internet-Draft Carrying Location Objects in RADIUS July 2004
| | Access-Accept |
| | + Rule set Information |
| |<-----------------------------|
| Authentication | |
| Accept | |
|<----------------------| |
| | |
| | RADIUS |
| | Accounting Request |
| | + Location-Information |
| | attributes |
| |----------------------------->|
| | |
Figure 1: Message Flow: Authentication/Authorization Phase Delivery
3.2 Mid-session Delivery
Mid-session delivery method uses the Change of Authorization (COA)
message as defined in [RFC3576]. In accordance to [RFC3576], at
anytime during the session the AAA server may send the access network
a COA message containing session identification attributes (see
[RFC3576] for the possible options). The COA message may instruct
the access network to generate an Authorize-Only Access-Request
(Access-Request with Service-Type set to "Authorize-Only") in which
case it is instructing the access network to send the location
information attributes.
Figure 2 shows the approach graphically.
Tschofenig, et al. Expires January 10, 2005 [Page 6]
Internet-Draft Carrying Location Objects in RADIUS July 2004
Access network AAA server
| |
| COA + Service-Type "Authorize Only" |
|<----------------------------------------------|
| |
| COA NAK + Service-Type "Authorize Only" |
| + Error-Cause "Request Initiated" |
|---------------------------------------------->|
| |
| Access-Request + Service-Type "Authorize Only"|
| + Location Information attributes |
| + Location Information policy |
|---------------------------------------------->|
| |
| Access-Accept |
|<----------------------------------------------|
| |
Figure 2: Message Flow: Mid-session Delivery
Upon receiving the Authorize-Only message from the Access network,
the AAA server MUST respond with either an Access-Accept message or
an Access-Reject message.
Tschofenig, et al. Expires January 10, 2005 [Page 7]
Internet-Draft Carrying Location Objects in RADIUS July 2004
4. Scenarios
In the following subsections we describe two scenarios for use of
location information. The location infomration may refer to network
or user location information which in some cases may be identical.
How the network obtains the user's location information is out of
scope of this document. There are two consumers of the location
information: the AAA servers and other location-based services. The
privacy implications of these scenarios are described in Section 13.
4.1 Use Case 1 - Use of Location Information in AAA
An Operator requires Location Informaion for Authorization and
Billing purposes. The operator may deny service if Location
Information is not available. Or it may offer limited service. The
NAS delivers Location Information to the Home AAA server.
The user's location is transferred from the NAS to the RADIUS server
and the NAS and intermediaries (if any) are not allowed to use that
information other then to forward it to the home network.
The RADIUS server authenticates and authroizes the session. If the
user's location policies are available to the RADIUS server, the
RADIUS server may deliver those policies in an Access Accept. This
information may be needed if intermediaries or other elements want to
act as Location Servers (see Section 4.2). In the absence of
receiving the policies intermediaries MUST NOT divulge the location
information.
Location Information may also be reported in accouning messages.
Accounting messages are generated when the session starts, stops and
periodically. Accounting messages may also be generated when the
user roams during handoff. This information may be needed by the
billing system to calculate the users bill. For example, there may
be different tarrif rates applied based on the location and their
maybe different tax rates applied based on the location. Unless
otherwise specified, location information in the accounting stream
may not be transmitted to third parties.
The location information in the accounting stream MUST only be sent
in the proxy chain to the home network (unless specified otherwise).
4.2 Scenario 2 - Use of Location Information for other Services
Location Servers are entities that receive the user's location
information and transmit it to other entities. For the purpose of
this scenario Location servers are the NAS, and RADIUS servers. The
RADIUS servers are in the home network, in the visited network, or in
Tschofenig, et al. Expires January 10, 2005 [Page 8]
Internet-Draft Carrying Location Objects in RADIUS July 2004
broker networks.
Unless otherwise specified, excluding the proxy chain from the NAS to
the Home RADIUS, the Location Server may not transmit the location
information to other parties.
Upon authentication and authorization, the Home RADIUS may transmit
the Rule set in an Access-Accept to the other Location Server
allowing them to transmit location information. Then and only then
they are allowed to share the information.
Note since the NAS is the source of all Location information that is
disimenated by RADIUS, the NAS could tag the location information
with the location rules or a reference for the location rules
received in an Access-Accept. All location information in the
Accounting Stream will now be tagged.
Tschofenig, et al. Expires January 10, 2005 [Page 9]
Internet-Draft Carrying Location Objects in RADIUS July 2004
5. Overview
The location information and operational ownership of the access
network is conveyed in five AAA attributes which are: Operator-Name,
Location-Information, Location-Type , Policy-Information and
Billing-Description. Furthermore, basic authorization policy rules
are attached to the Location-Information attribute turning Location
Information into a Location Object as defined in
[I-D.ietf-geopriv-reqs].
5.1 Operator-Name Attribute
This attribute contains an operator name which uniquely identifies
the ownership of an access network. The Attribute value is a
non-NULL terminated string whose Length MUST NOT exceed 253 bytes.
The attribute value is comprised of the prefix and the identity,
separated by a colon. The prefix identifies the operator type;
example: GSM, CDMA, and REALM. The identity uniquely identifies the
operator name within the scope of the operator type.
As an example consider the string 'GSM:TADIG' where GSM is a prefix
indicating an operator type and TADIC is a unique globally known GSM
operator ID.
This document defines three operator type prefixes which are: GSM,
CDMA, and REALM. The GSM prefix can be used to indicate operator
names based on GSMA TADIG codes. REALM can be used by any domain
name acquired from IANA. Possible forthcoming operator types MUST be
associated with an ogranization responsible for assigning/managing
operator names.
5.2 Location-Information Attribute
This document describes two formats for conveying location
information: civil and geospatial location information. Section
5.2.1 defines the civil location information format. Section 5.2.2
defines the geospatial location information format.
Additionally, the Precision field provides further information about
the location information provided via Radius. For large networks
information about the location of the user can be provided in
different degrees of accuracy. This field gives a hint. Ideally the
location of the user is returned to the home network but in some
cases it might not be available. It has to be noted that the user
does not provide the location information itself.
Tschofenig, et al. Expires January 10, 2005 [Page 10]
Internet-Draft Carrying Location Objects in RADIUS July 2004
5.2.1 Civil Location Information
Civil location is a popular way to describe the location of an
entity. Using an unstructured (as a text string) or a custom format
for civil location format is dangerous since the automatic processing
capabilities are limited.
For this document we reuse the civil location format defined in
[I-D.ietf-geopriv-dhcp-civil].
The civil location format includes a number of fields, including the
country (expressed as a two-letter ISO 3166 code) and the
administrative units of [I-D.ietf-geopriv-dhcp-civil] A1 through A6.
This designation offers street-level precision.
For completeness we include more detailed information from
[I-D.ietf-geopriv-dhcp-civil] with regard to the defined civil
location elements (A1 through A6):
+----------------------+----------------------+---------------------+
| Label | Description | Example |
+----------------------+----------------------+---------------------+
| country | The country is | US |
| | identified by the | |
| | two-letter ISO 3166 | |
| | code. | |
| | | |
| A1 | national | New York |
| | subdivisions (state, | |
| | region, province, | |
| | prefecture) | |
| | | |
| A2 | county, parish, gun | King's County |
| | (JP), district (IN) | |
| | | |
| A3 | city, township, shi | New York |
| | (JP) | |
| | | |
| A4 | city division, | Manhattan |
| | borough, city | |
| | district, ward, chou | |
| | (JP) | |
| | | |
| A5 | neighborhood, block | Morningside Heights |
| | | |
| A6 | street | Broadway |
| | | |
| PRD | Leading street | N, W |
Tschofenig, et al. Expires January 10, 2005 [Page 11]
Internet-Draft Carrying Location Objects in RADIUS July 2004
| | direction | |
| | | |
| POD | Trailing street | SW |
| | suffix | |
| | | |
| STS | Street suffix | Avenue, Platz, |
| | | Street |
| | | |
| HNO | House number, | 123 |
| | numeric part only. | |
| | | |
| HNS | House number suffix | A, 1/2 |
| | | |
| LMK | Landmark or vanity | Low Library |
| | address | |
| | | |
| LOC | Additional location | Room 543 |
| | information | |
| | | |
| FLR | Floor | 5 |
| | | |
| NAM | Name (residence, | Joe's Barbershop |
| | business or office | |
| | occupant) | |
| | | |
| PC | Postal code | 10027-0401 |
+----------------------+----------------------+---------------------+
Table 1
Additional CA types are defined in Section 3.4 of
[I-D.ietf-geopriv-dhcp-civil]. These types are useful to express
further information about the location, language specific settings
via the 'language' item and encoding information via the 'script'
item. Section 12 shows usage examples of this attribute.
All attributes are optional and can appear in any order. The values
are encoded using UTF-8 [RFC3629].
5.2.2 Geospatial Location Information
This document reusing geospatial location information from
[I-D.ietf-geopriv-dhcp-lci-option] which defines latitude, longitude,
and altitude, with resolution indicators for each. The value in the
Altitude field either indicates meters or floors (via the Altitude
Type field). As a coordinate reference system Section 2.1 of
[I-D.ietf-geopriv-dhcp-lci-option] defines (via extensible mechanism
using IANA registration) three values in the Datum field: WGS 84, NAD
Tschofenig, et al. Expires January 10, 2005 [Page 12]
Internet-Draft Carrying Location Objects in RADIUS July 2004
83 (with the associated vertical datum for the North American
Vertical Datum of 1988), NAD 83 (with the associated vertical datum
for the Mean Lower Low Water (MLLW). WGS 84 is used by the GPS
system.
During a protocol run it is possible to return Location-Information
attributes which provide both location information elements. If only
one location information element is provided then civil location MUST
be included in the request. Additionally, geospatial location MAY be
provided.
Tschofenig, et al. Expires January 10, 2005 [Page 13]
Internet-Draft Carrying Location Objects in RADIUS July 2004
6. Policy-Information Attribute
In some environments it is possible for the user to attach
information about its privacy preferences. These preferences allow
the visited network, intermediate RADIUS proxies and the home network
to authorize the distribution of the user's location information.
Without the user providing authorization information two approaches
are possible:
o The user hides its location information from the access network
and from intermediate networks using the appropriate network
access authentication mechanism. Section 13 discusses these
issues in more details.
o The access network attaches default authorization policies which
prevents intermediate networks and the home network to distribute
the location information to other entities. Additionally, the
home network might have authorization policies which control
distribution of location information. Users can dynamically
change their policies using the authroization framework defined in
[I-D.ietf-geopriv-rules] and [I-D.ietf-geopriv-rules].
With regard to authorization policies this document reuses work done
in [I-D.peterson-geopriv-pidf-lo] and encodes it in an non-XML
format.
Tschofenig, et al. Expires January 10, 2005 [Page 14]
Internet-Draft Carrying Location Objects in RADIUS July 2004
7. Location-Type Attribute
This document defines a separate attribute for the type of the
location. Instead of the values of the 'type-of-place' attribute
defined in Section 4.6 of [I-D.ietf-simple-rpid] which is reused by
[I-D.ietf-geopriv-dhcp-civil] we define our own list of values for
the Location-Type attribute. The reason for this is given by the
size constraints of the attribute, dependence to other documents and
to the location names required for the RADIUS context. Consequently,
CA type '25' which equals the placetype is not used in the
Location-Information attribute as described in Section 5.2.
0 Reserved
1 Coffee Shop
2 Hotel
3 Airport
4 Mall
5 Restaurant
6 Bus
7 Library
8 Convention Center
9 School
10 Office
11 Airplane
12 Train
13 Ship
14 Educational Institute
15 Public Place
16 Other
Using these attribute types it is possible to describe the area in
more detail.
Tschofenig, et al. Expires January 10, 2005 [Page 15]
Internet-Draft Carrying Location Objects in RADIUS July 2004
8. Billing-Description Attribute
The Billing-Description Attribute contains unstructured text to be
printed on the users bill.
Tschofenig, et al. Expires January 10, 2005 [Page 16]
Internet-Draft Carrying Location Objects in RADIUS July 2004
9. Attributes
This section defines attributes for access network operational
ownership, Location Name, Location Information and Billing
Description.
9.1 Operator-Name Attribute
Operator-Name Attribute SHOULD be sent in Access-Request, and
Accounting-Request records where the Acc-Status-Type is set to Start,
Interim, or Stop.
A summary of the Operator-Name Attribute is shown below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Operator-Name ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type:
To Be Assigned by IANA - Operator-Name
Length:
>= 3
Operator-Name:
The text field contains an Access Network Operator Name in
prefix-based format as describe above.
Example: REALM:anyisp.com
9.2 Location-Information Attribute
Location-Information attribute SHOULD be sent in Access-Request, and
Accounting-Request records where the Acc-Status-Type is set to Start,
Interim or Stop if available.
The Location-Information Attribute has two variations depending on
civil or geospatial location information. The format is shown below.
Tschofenig, et al. Expires January 10, 2005 [Page 17]
Internet-Draft Carrying Location Objects in RADIUS July 2004
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Code | Precision |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Location-Info ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type (8 bits):
To Be Assigned by IANA - Location-Information
Length (8 bits):
>= 3
Code (8 bits):
Describes which location format is carried in this attribute:
(0) describes civil location information
(1) describes geospatial location information
All other bites of the Code field is reserved
and required for alignment.
Precision (8 bits):
Describes which location this attribute refers to:
(0) describes the location of the NAS
(1) describes the location of the AAA server
(2) describes the location of the end host (user)
(3) describes the location of the network
Location-Info (variable):
Contains either civil or
geospatial location information attributes.
For civil location information the Location-Info field in the above
structure is defined as followed:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Countrycode | Civic address elements ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Countrycode (16 bits):
Two-letter ISO 3166 country code in capital ASCII leters.
Civic address elements (variable):
The text field contains location information element.
Tschofenig, et al. Expires January 10, 2005 [Page 18]
Internet-Draft Carrying Location Objects in RADIUS July 2004
The format of the civic address elements is described in Section 3.3
of [I-D.ietf-geopriv-dhcp-civil] with a TLV pair (whereby the Type
and Length fields are one-octed long). An example is given in
Section 12.
For geospatial location information the Location-Info field is
defined as follows:
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| LaRes | Latitude +
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Latitude | LoRes | Longitude +
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Longitude | AT | AltRes | Altitude +
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Altitude | Datum |
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
LaRes (6 bits):
Latitude resolution
Latitude (34 bits)
LoRes (6 bits):
Longitude resolution.
Longitude (34 bits)
Altitude (30 bits)
AltRes (6 bits)"
Altitude resolution
AT (4 bits):
Altitude Type for altitude. The following codes are defined:
(1) Meters
(2) Floors
Datum (8 bits):
Coordinate reference system
The following codes for the this field are defined:
(1) WGS 84
(2) NAD 83
Tschofenig, et al. Expires January 10, 2005 [Page 19]
Internet-Draft Carrying Location Objects in RADIUS July 2004
(3) NAD 83
The length of the Location-Information Attribute MUST NOT exceed 253
octets. The length of the geospatial location information format is
fixed with 16 bytes plus a four byte header.
The Datum field contains an identifier for the coordinate system used
to interpret the values of Latitude, Longitude and Altitude. The
field with value (2) and the value (3) both represent the NAD 83
coordinate reference system but they differ from each other with
regard to their vertical datum representation as briefly noted in
Section 5.2.2 and described in more detail in
[I-D.ietf-geopriv-dhcp-lci-option].
9.3 Policy-Information Attribute
Policy-Information attribute SHOULD be sent in Access-Request, and
Accounting-Request records where the Acc-Status-Type is set to Start,
Interim or Stop if available.
A summary of the Policy-Information attribute is shown below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Policy-Information ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type :
To Be Assigned by IANA - Policy-Information
Length:
>= 3
Policy-Information:
The text field contains information about the 'usage-rules'
element described below. Its length MUST NOT exceed 64 octets.
For this document we use the following fields of the 'usage-rules'
element, described in [I-D.peterson-geopriv-pidf-lo]:
o 'retransmission-allowed' (R): When the value of this element is
'0', then the recipient of this Location Object is not permitted
to share the enclosed Location Information, or the object as a
whole, with other parties. The value of '1' allows to share the
Location Information with other parties.
o 'retention-expires': This field specifies an absolute date at
which time the Recipient is no longer permitted to possess the
Tschofenig, et al. Expires January 10, 2005 [Page 20]
Internet-Draft Carrying Location Objects in RADIUS July 2004
location information. The data type of this field is a string and
the format is a 64 bit NTP timestamp [RFC1305].
o 'ruleset-reference': This field contains a URI that indicates
where a fuller ruleset of policies related to this object can be
found. As a deviation from [I-D.peterson-geopriv-pidf-lo] this
field only contains a reference and does not carry an attached
rule set. This modification is motivated by the size limitations
imposed by RADIUS. Per-default this field has a null-size. The
content of this field is of variable length.
We use the following encoding for the Policy-Information element.
The 'retransmission-allowed' flag consumes 1 bit, followed by 64 bits
for the NTP timestamp and a variable length 'ruleset-reference'.
We do not use the 'note-well' element since it contains a block of
text with generic privacy directives which are human-readable only.
9.4 Location-Type Attribute
Location-Type Attribute SHOULD be sent in Access-Request, and
Accounting-Request records where the Acc-Status-Type is set to Start,
Interim, or Stop if available.
A summary of the Location-Type Attribute is shown below.
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Loc-Type ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type (8 bits):
To Be Assigned by IANA - Location-Name
Length (8 bits):
>= 3
Loc-Type (variable):
The content of this field corresponds to the integer codes for
access network location type.
9.5 Billing-Description Attribute
The Billing-Description Attribute contains unstructured text to be
printed on the users bill.
Tschofenig, et al. Expires January 10, 2005 [Page 21]
Internet-Draft Carrying Location Objects in RADIUS July 2004
0 1 2 3
0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
| Type | Length | Billing-Text ...
+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
Type (8 bits):
To Be Assigned by IANA - Billing-Description
Length (8 bits):
>= 3
Billing-Text (variable):
The content of this field contains text for billing purpose.
The length of the Billing-Description Attribute MUST NOT exceed 32
octets.
Tschofenig, et al. Expires January 10, 2005 [Page 22]
Internet-Draft Carrying Location Objects in RADIUS July 2004
10. Table of Attributes
The following table provides a guide to which attributes may be found
in which kinds of packets, and in what quantity.
Request Accept Reject Challenge Accounting # Attribute
Request
0-1 0 0 0 0-1 TBD Operator-Name
0+ 0 0 0 0+ TBD Location-Information
0-1 0 0 0 0-1 TBD Policy-Information
0-1 0 0 0 0-1 TBD Location-Type
0-1 0 0 0 0 TBD Billing-Description
The Location-Information attribute may appear more than once. This
is useful if the size of one Location-Information attribute exceeds
the maximum size of an AVP.
Tschofenig, et al. Expires January 10, 2005 [Page 23]
Internet-Draft Carrying Location Objects in RADIUS July 2004
11. IANA Considerations
This document requires the assignment of four new RADIUS attribute
numbers for the following attributes:
Operator-Name
Location-Information
Policy-Information
Location-Name
Billing-Description
Please refer to Section 10 for the registered list of numbers.
Tschofenig, et al. Expires January 10, 2005 [Page 24]
Internet-Draft Carrying Location Objects in RADIUS July 2004
12. Example
This section provides an example for a civil location information
format within the Location-Information attribute. The size of the
geo-spatial location information object is fixed and well-described
examples can be found in the Appendix of
[I-D.ietf-geopriv-dhcp-lci-option].
Due to the size limitations of the RADIUS attributes we give a more
detailed example borrowed from Section 4 of
[I-D.ietf-geopriv-dhcp-civil].
+-------------+-----------+-------------------+
| Type | Length | Value |
+-------------+-----------+-------------------+
| Type | 8 bits | TBD |
| Length | 8 bits | 43 |
| Code | 16 bits | 1 |
| Precision | 8 bits | 2 |
| Countrycode | 16 bits | DE |
| CAtype | 8 bits | 1 |
| CAlength | 8 bits | 7 |
| CAvalue | 7 bytes | Bavaria |
| CAtype | 8 bits | 3 |
| CAlength | 8 bits | 6 |
| CAvalue | 6 byte | Munich |
| CAtype | 8 bits | 6 |
| CAlength | 8 bits | 11 |
| CAvalue | 11 bytes | Marienplatz |
| CAtype | 8 bits | 19 |
| CAlength | 8 bits | 1 |
| CAvalue | 1 byte | 8 |
| CAtype | 8 bits | 24 |
| CAlength | 8 bits | 5 |
| CAvalue | 5 bytes | 80331 |
+-------------+-----------+-------------------+
The Length element provides the length of the entire payload minus
the length of the initial 'Type', the 'Length' and the 'Code'
attribute. The Precision field has a value of '2' which refers to
the location of the end host (user). The CountryCode is set to 'DE'.
Note that the subsequent attributes are in Type-Length-Value format.
Type '1' indicates the region of 'Bavaria', '3' refers to the city
'Munich', '6' to the street 'Marienplatz', the house number '8' is
indicated by the type '19' and the zip code of '80331' is of type
'24'.
Tschofenig, et al. Expires January 10, 2005 [Page 25]
Internet-Draft Carrying Location Objects in RADIUS July 2004
The total sum of these attributes is 46 bytes.
Tschofenig, et al. Expires January 10, 2005 [Page 26]
Internet-Draft Carrying Location Objects in RADIUS July 2004
13. Privacy Considerations
This section discusses privacy implications for the distribution of
location lnformation within RADIUS.
In many cases the location information of the network also reveals
the current location of the user with a certain degree of precision
depending on the mechanism used, to determine the location, update
frequence, where the location was generated, size of the network and
other mechanism (such as movement traces or interpolation).
Two entities act as location servers in the configuration shown in
Section 4:
Entity in the visited network (e.g., visited AAA server): In this
scenario it is be difficult to obtain authorization policies from
the end host (or user). In this case we have to assume that the
visited network does not allow unrestricted distribution of
location information. Hence, as a simplification we can assume
that per default only the home network is allowed to receive
location information.
Entity in the home network (e.g., home AAA server): The AAA server in
the home network might be an ideal place for storing authorization
policies. Once the infrastructure is deployed and useful
applications are available there might be a strong desire to use
location information for other purposes as well (such as location
aware applications). Authorization policy rules described in
[I-D.ietf-geopriv-rules] and in [I-D.ietf-geopriv-rules] are
tailored for this environment. The user typically has a
contractual relationship to his home network and hence the trust
relationship between them are higher. These policies might be
useful for preventing further distribution of the user's location
to other location based services. The home AAA server (or a
similar entity) thereby acts as a location server for access to
location services. As a default policy we specify that the home
network MUST NOT distribute the user's location information to
other entities.
For the envisioned usage scenarios the network access authentication
procedure is tighly coupled to the transfer of location information.
If the authentication mechanism allows the visited networks or
brokers to learn the user's identity then it is possible to
correleate location information with a particular user. This allows
the visited network and brokers to learn movement patterns of users.
A scenario where the user is attached to the home network is, from a
privacy point of view, simpler than a scenario where a user roams
into a visited network (where possibly no direct relationship between
Tschofenig, et al. Expires January 10, 2005 [Page 27]
Internet-Draft Carrying Location Objects in RADIUS July 2004
the visited and the home network operator is available and some AAA
brokers need to be consulted) since the NAS and the home AAA are in
the same administrative domain. With subscription-based network
access as used today the user has a contractual relationship with the
home network provider which could allow higher privacy considerations
to be applied (including rules stored at the home network itself for
the purpose of restricting further distribution).
In many cases it is necessary to secure the transport of location
information along the RADIUS infrastructure. Mechanism to achieve
this functionality are discussed in Section 14.
One way to ensure that the visited network and intermediate networks
are incapable to learn the user identity is to use EAP methods which
hide the user identity either actively or passively. Some EAP
methods (such as [I-D.arkko-pppext-eap-aka]) protect the user's
identity against passive adversaries by utilizing temporal
identities. In some cases the visited network is still able to
retrieve the plaintext identity of the user and user identity
confidentiality is only provided against eavesdroppers at the
wireless link. Depending on the movement patters of the user, the
network topology and available roaming agreements it is possible that
a AAA broker is able to see both the plaintext user identity and
subsequent temporal identities. Associating location information and
the user identity is possible in these cases.
It is assumed that the true username is not carried within the
initial EAP-Identity Request/Response message exchange. Support for
username privacy is supported with [I-D.arkko-roamops-rfc2486bis].
For stronger security and privacy protection active user identity
confidentiality is highly suggested. EAP methods such as
[I-D.josefsson-pppext-eap-tls-eap] or [I-D.tschofenig-eap-ikev2]
provide such a protection.
Unfortunately, most users are not educated about the importance of
user identity confidentiality and many EAP methods do not provide
active user identity confidentiality. User identity confidentiality
is often treated as an exotic features which mainly aims to prevent
eavesdroppers on the wireless link to learn the user identity of the
attached users. Awareness for this type of threat model does often
not exist. In many cases it is even not possible for users to freely
select their favorite authentication and key exchange protocol (based
on their security requirements). Instead the choice is often
predetermined by a given architecture.
It was noted that different granualrity of location information can
be provided to the home network. From a privacy point of view lower
Tschofenig, et al. Expires January 10, 2005 [Page 28]
Internet-Draft Carrying Location Objects in RADIUS July 2004
granularity is preferrable. The user, however, has no control over
the granularity and cannot lie about its location.
Tschofenig, et al. Expires January 10, 2005 [Page 29]
Internet-Draft Carrying Location Objects in RADIUS July 2004
14. Security Considerations
Requirements for the security protection of a Location Object is
defined in [I-D.ietf-geopriv-reqs]: Mutual end-point authentication,
data object integrity, data object confidentiality and replay
protection. The distribution of location information can be
restricted with the help of authorization policies. Basic
authorization policies are attached to the location information
itself, in the same fashion as described in
[I-D.peterson-geopriv-pidf-lo]. It is possible that the user was
already able to transfer some authorization policies to the access
network to restrict the distribution of location information. This
is, however, rather unlikely in case of roaming users. Hence, it
will be primarily the NAS creating the Location Object which also
sets the authorization policies. If no authorization information is
provided by the user then the visited network MUST set the
authorization policies to only allow the home AAA server to use the
provided location information. Other entities, such as the visited
network and possibly AAA brokers MUST NOT use the location
information for a purpose other than described in this document.
More extensible authorization policies can be stored at the user's
home network. These policies are useful when location information is
distributed to other entities in a location-based service. This
scenario is, however, outside the scope of this document.
It is necessary to use authorization policies to prevent the
unauthorized distribution of location information. The security
requirements which are created based on [I-D.ietf-geopriv-reqs] are
inline with threats which appear in the relationship with disclosure
of location information as described in
[I-D.ietf-geopriv-threat-analysis]. [I-D.peterson-geopriv-pidf-lo]
proposes S/MIME to protect the Location Object against modifications
and against eavesdropping. To provide mutual authentication
confidentiality protection and a digital signature is necessary.
Furthermore, to offer replay protection a gurantee of freshness is
necessary (for example, based on timestamps).
The security of S/SIME is based on public key cryptography which
raises performance, deployment and size considerations. Encryption
requires that the local AAA server knows the recipient's public key
(e.g., the public key of the home AAA server). Some sort of public
key infrastructure is therfore required to obtain the public key and
to verify the digital signature (at the home network). Providing
per-object cryptographic protection is, both at the home and at the
visited network, computationally expensive.
To overcome this limitation an alternative approach is suggested.
Two security mechanisms are proposed for RADIUS:
Tschofenig, et al. Expires January 10, 2005 [Page 30]
Internet-Draft Carrying Location Objects in RADIUS July 2004
o [RFC2865] proposes the usage of a static key which is not
appropriate for protection of location information due to the
missing dynamic key management and absent confidentiality
protection. If no authentication, integrity and replay protection
between the participating entities are provided then an
adversaries can spoof and modify transmitted AVPs.
o RADIUS over IPsec [RFC3579] allows to run standard key management
mechanisms, such as KINK [I-D.ietf-kink-kink], IKE and IKEv2
[I-D.ietf-ipsec-ikev2], to establish IPsec security associations.
Confidentiality protection MUST be used to prevent eavesdropper
gaining access to location information. Confidentiality
protection is not only a property required by this document, it is
also required for the transport of keying material in the context
of EAP authentication and authorization. Hence, this requirement
is, in many environments, already fulfilled. Mutual
authentication must be provided between the local AAA server and
the home AAA server to prevent man-in-the-middle attacks. This is
another requirement raised in the area of key transport with
RADIUS and does not represent a deployment obstacle. The
performance advantages a superior compared to the usage of S/MIME
and object security since the expensive authentication and key
exchange protocol run needs to be provided only once (at for a
long time). Symmetric channel security with IPsec is highly
efficient. Since IPsec protection is suggested as a mechanism to
protect RAIDUS already no additional considerations need to be
addressed beyond those described in [RFC3579]. Where an untrusted
AAA intermediary is present, the Location Object MUST NOT be
provided to the intermediary.
Tschofenig, et al. Expires January 10, 2005 [Page 31]
Internet-Draft Carrying Location Objects in RADIUS July 2004
15. Open Issues
A future version of this document will describe the described Radius
attributes work with Diameter.
Furthermore, the scenarios described in Section 4 need to be
described in more detail.
Tschofenig, et al. Expires January 10, 2005 [Page 32]
Internet-Draft Carrying Location Objects in RADIUS July 2004
16. Acknowledgments
The authors would like to thank the following people for their help
with a previous version of this draft and for their input:
Chuck Black
Paul Congdon
Jouni Korhonen
Sami Ala-luukko
Farooq Bari
Ed Van Horne
Mark Grayson
Jukkat Tuomi
Jorge Cuellar
Christian Guenther
Henning Schulzrinne provided the civil location information content
found in this draft. The geospatial location information format is
based on work done by J. Polk, J. Schnizlein and M. Linsner. The
authorization policy format is based on the work done by Jon
Peterson.
The authors would like to thank Victor Lortz, Jose Puthenkulam,
Bernrad Aboba, Jari Arkko, Parviz Yegani, Serge Manning, Kuntal
Chowdury, Pasi Eronen Blair Bullock and Eugene Chang for their
feedback.
This document is partially based on the discussions within the IETF
GEOPRIV working group. Therefore, the authors thank Henning
Schulzrinne, James Polk and John Morris for their work they have done
in the Geopriv working group.
Furthermore, we also have to thank Allison Mankin, Randall Gellens,
Andrew Newton, Ted Hardie, Jon Peterson for their time discussing a
number of details with us.
Tschofenig, et al. Expires January 10, 2005 [Page 33]
Internet-Draft Carrying Location Objects in RADIUS July 2004
17. References
17.1 Normative References
[I-D.ietf-geopriv-dhcp-civil]
Schulzrinne, H., "Dynamic Host Configuration Protocol
(DHCPv4 and DHCPv6) Option for Civic Addresses",
draft-ietf-geopriv-dhcp-civil-02 (work in progress), March
2004, <reference.I-D.ietf-geopriv-dhcp-civil.xml>.
[I-D.ietf-geopriv-dhcp-lci-option]
Polk, J., Schnizlein, J. and M. Linsner, "Dynamic Host
Configuration Protocol Option for Coordinate-based
Location Configuration Information",
draft-ietf-geopriv-dhcp-lci-option-03 (work in progress),
December 2003,
<reference.I-D.ietf-geopriv-dhcp-lci-option.xml>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", March 1997.
[RFC2865] Rigney, C., Willens, S., Rubens, A. and W. Simpson,
"Remote Authentication Dial In User Service (RADIUS)", RFC
2865, June 2000.
[RFC2866] Rigney, C., "RADIUS Accounting", RFC 2866, June 2000,
<reference.RFC.2866.xml>.
[RFC3576] Chiba, M., Dommety, G., Eklund, M., Mitton, D. and B.
Aboba, "Dynamic Authorization Extensions to Remote
Authentication Dial In User Service (RADIUS)", RFC 3576,
July 2003, <reference.RFC.3576.xml>.
[RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
10646", STD 63, RFC 3629, November 2003,
<reference.RFC.3629.xml>.
17.2 Informative References
[I-D.adrangi-radius-bandwidth-capability]
Adrangi, F., "Access Network Bandwidth Capability",
draft-adrangi-radius-bandwidth-capability-00 (work in
progress), February 2004,
<reference.I-D.adrangi-radius-bandwidth-capability.xml>.
[I-D.arkko-pppext-eap-aka]
Arkko, J. and H. Haverinen, "EAP AKA Authentication",
draft-arkko-pppext-eap-aka-11 (work in progress), October
Tschofenig, et al. Expires January 10, 2005 [Page 34]
Internet-Draft Carrying Location Objects in RADIUS July 2004
2003, <reference.I-D.arkko-pppext-eap-aka.xml>.
[I-D.arkko-roamops-rfc2486bis]
Aboba, B., "The Network Access Identifier",
draft-arkko-roamops-rfc2486bis-00 (work in progress),
February 2004,
<reference.I-D.arkko-roamops-rfc2486bis.xml>.
[I-D.ietf-geopriv-common-rules]
Schulzrinne, H., Morris, J., Tschofenig, H. and J. Polk,
"Geopriv Rules", draft-ietf-common-rules-00 (work in
progress), January 2004,
<reference.I-D.ietf-geopriv-common-rules.xml>.
[I-D.ietf-geopriv-reqs]
Cuellar, J., Morris, J., Mulligan, D., Peterson, D. and D.
Polk, "Geopriv requirements", draft-ietf-geopriv-reqs-04
(work in progress), October 2003,
<reference.I-D.ietf-geopriv-reqs.xml>.
[I-D.ietf-geopriv-rules]
Schulzrinne, H., Morris, J., Tschofenig, H., Polk, J. and
J. Rosenberg, "Common Rules", draft-ietf-common-rules-00
(work in progress), January 2004,
<reference.I-D.ietf-geopriv-common-policy.xml>.
[I-D.ietf-geopriv-threat-analysis]
Danley, M., "Threat Analysis of the Geopriv Protocol",
draft-ietf-geopriv-threat-analysis-01 (work in progress),
September 2003,
<reference.I-D.ietf-geopriv-threat-analysis.xml>.
[I-D.ietf-ipsec-ikev2]
Kaufman, C., "Internet Key Exchange (IKEv2) Protocol",
draft-ietf-ipsec-ikev2-13 (work in progress), March 2004,
<reference.I-D.ietf-ipsec-ikev2.xml>.
[I-D.ietf-kink-kink]
Thomas, M. and J. Vilhuber, "Kerberized Internet
Negotiation of Keys (KINK)", draft-ietf-kink-kink-05 (work
in progress), January 2003,
<reference.I-D.ietf-kink-kink.xml>.
[I-D.ietf-simple-rpid]
Schulzrinne, H., Gurbani, V., Kyzivat, P. and J.
Rosenberg, "RPID: Rich Presence: Extensions to the
Presence Information Data Format (PIDF)",
draft-ietf-simple-rpid-02 (work in progress), March 2004,
Tschofenig, et al. Expires January 10, 2005 [Page 35]
Internet-Draft Carrying Location Objects in RADIUS July 2004
<reference.I-D.ietf-simple-rpid.xml>.
[I-D.josefsson-pppext-eap-tls-eap]
Josefsson, S., Palekar, A., Simon, D. and G. Zorn,
"Protected EAP Protocol (PEAP)",
draft-josefsson-pppext-eap-tls-eap-07 (work in progress),
October 2003,
<reference.I-D.josefsson-pppext-eap-tls-eap.xml>.
[I-D.peterson-geopriv-pidf-lo]
Peterson, J., "A Presence-based GEOPRIV Location Object
Format", draft-peterson-geopriv-pidf-lo-02 (work in
progress), October 2003,
<reference.I-D.peterson-geopriv-pidf-lo.xml>.
[I-D.tschofenig-eap-ikev2]
Tschofenig, H., Kroeselberg, D. and Y. Ohba, "EAP IKEv2
Method (EAP-IKEv2)", draft-tschofenig-eap-ikev2-03 (work
in progress), February 2004,
<reference.I-D.tschofenig-eap-ikev2.xml>.
[RFC1305] Mills, D., "Network Time Protocol (Version 3)
Specification, Implementation", RFC 1305, March 1992,
<reference.RFC.1305.xml>.
[RFC3579] Aboba, B. and P. Calhoun, "RADIUS (Remote Authentication
Dial In User Service) Support For Extensible
Authentication Protocol (EAP)", RFC 3579, September 2003.
Authors' Addresses
Hannes Tschofenig
Siemens
Otto-Hahn-Ring 6
Munich, Bayern 81739
Germany
EMail: Hannes.Tschofenig@siemens.com
F. Adrangi
Intel Corporatation
2111 N.E. 25th Avenue
Hillsboro OR
USA
EMail: farid.adrangi@intel.com
Tschofenig, et al. Expires January 10, 2005 [Page 36]
Internet-Draft Carrying Location Objects in RADIUS July 2004
Avi Lior
Bridgewater Systems Corporation
303 Terry Fox Drive
Ottawa, Ontario K2K 3J1
CANADA
EMail: avi@bridgewatersystems.com
Mark Jones
Bridgewater Systems Corporation
303 Terry Fox Drive
Ottawa, Ontario K2K 3J1
CANADA
EMail: mark.jones@bridgewatersystems.com
Tschofenig, et al. Expires January 10, 2005 [Page 37]
Internet-Draft Carrying Location Objects in RADIUS July 2004
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2004). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Tschofenig, et al. Expires January 10, 2005 [Page 38]
Html markup produced by rfcmarkup 1.129b, available from
https://tools.ietf.org/tools/rfcmarkup/