draft-ietf-ecrit-data-only-ea-02.txt   draft-ietf-ecrit-data-only-ea-03.txt 
ECRIT B. Rosen ECRIT B. Rosen
Internet-Draft NeuStar, Inc. Internet-Draft NeuStar, Inc.
Intended status: Experimental H. Schulzrinne Intended status: Experimental H. Schulzrinne
Expires: January 11, 2012 Columbia U. Expires: September 13, 2012 Columbia U.
H. Tschofenig H. Tschofenig
Nokia Siemens Networks Nokia Siemens Networks
July 10, 2011 March 12, 2012
Common Alerting Protocol (CAP) based Emergency Alerts using the Session Data-Only Emergency Calls
Initiation Protocol (SIP) draft-ietf-ecrit-data-only-ea-03.txt
draft-ietf-ecrit-data-only-ea-02.txt
Abstract Abstract
The Common Alerting Protocol (CAP) is a document format for RFC 6443 'Framework for Emergency Calling Using Internet Multimedia'
exchanging emergency alerts and public warnings. CAP is mainly used describes how devices use the Internet to place emergency calls and
for conveying alerts and warnings between authorities and from how Public Safety Answering Points (PSAPs) can handle Internet
authorities to citizen/individuals. This document describes how multimedia emergency calls natively. The exchange of multimedia
devices use CAP to issue emergency alerts. traffic typically involves a SIP session establishment starting with
a SIP INVITE that negotiates various parameters for that session.
In some cases, however, the transmission of application data is
everything that is needed. Examples of such environments include a
temperature sensors issuing alerts, or vehicles sending crash data.
Often these alerts are conveyed as one-shot data transmissions and in
some rare cases they may require a session to be established. These
type of interactions are called 'data-only emergency calls'.
Status of this Memo Status of this Memo
This Internet-Draft is submitted in full conformance with the This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79. provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet- working documents as Internet-Drafts. The list of current Internet-
Drafts is at http://datatracker.ietf.org/drafts/current/. Drafts is at http://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress." material or to cite them other than as "work in progress."
This Internet-Draft will expire on January 11, 2012. This Internet-Draft will expire on September 13, 2012.
Copyright Notice Copyright Notice
Copyright (c) 2011 IETF Trust and the persons identified as the Copyright (c) 2012 IETF Trust and the persons identified as the
document authors. All rights reserved. document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of (http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License. described in the Simplified BSD License.
Table of Contents Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . 4
3. Architectural Overview . . . . . . . . . . . . . . . . . . . . 5 3. Architectural Overview . . . . . . . . . . . . . . . . . . . . 5
4. Protocol Specification . . . . . . . . . . . . . . . . . . . . 7 4. Protocol Specification . . . . . . . . . . . . . . . . . . . . 8
4.1. CAP Transport . . . . . . . . . . . . . . . . . . . . . . 7 4.1. CAP Transport . . . . . . . . . . . . . . . . . . . . . . 8
4.2. Profiling of the CAP Document Content . . . . . . . . . . 7 4.2. Profiling of the CAP Document Content . . . . . . . . . . 8
5. Error Handling . . . . . . . . . . . . . . . . . . . . . . . . 9 5. Error Handling . . . . . . . . . . . . . . . . . . . . . . . . 10
5.1. 425 (Bad Alert Message) Response Code . . . . . . . . . . 9 5.1. 425 (Bad Alert Message) Response Code . . . . . . . . . . 10
5.2. The AlertMsg-Error Header Field . . . . . . . . . . . . . 9 5.2. The AlertMsg-Error Header Field . . . . . . . . . . . . . 10
6. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 6. Example . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
7. Security Considerations . . . . . . . . . . . . . . . . . . . 14 7. Security Considerations . . . . . . . . . . . . . . . . . . . 15
8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 16 8. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 17
8.1. Registration of the 'application/cap+xml' MIME type . . . 16 8.1. Registration of the 'application/cap+xml' MIME type . . . 17
8.2. IANA Registration for 425 Response Code . . . . . . . . . 17 8.2. IANA Registration for 425 Response Code . . . . . . . . . 18
8.3. IANA Registration of New AlertMsg-Error Header Field . . . 17 8.3. IANA Registration of New AlertMsg-Error Header Field . . . 18
8.4. IANA Registration for the SIP AlertMsg-Error Codes . . . . 18 8.4. IANA Registration for the SIP AlertMsg-Error Codes . . . . 19
9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 19 9. Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . 20
10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 20 10. References . . . . . . . . . . . . . . . . . . . . . . . . . . 21
10.1. Normative References . . . . . . . . . . . . . . . . . . . 20 10.1. Normative References . . . . . . . . . . . . . . . . . . . 21
10.2. Informative References . . . . . . . . . . . . . . . . . . 21 10.2. Informative References . . . . . . . . . . . . . . . . . . 22
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 22 Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 23
1. Introduction 1. Introduction
The Common Alerting Protocol (CAP) [cap] is an XML document format RFC 6443 [RFC6443] describes how devices use the Internet to place
for exchanging emergency alerts and public warnings. CAP is mainly emergency calls and how Public Safety Answering Points (PSAPs) can
used for conveying alerts and warnings between authorities and from handle Internet multimedia emergency calls natively. The exchange of
authorities to citizen/individuals. This document describes how multimedia traffic typically involves a SIP session establishment
data-only emergency calls are able to utilize the same CAP document starting with a SIP INVITE that negotiates various parameters for
format. that session.
Emergency alerts containing data are similar to regular emergency In some cases, however, there is only application data to be conveyed
calls in the sense that they require emergency call routing from the end devices to a PSAP or some other intermediary. Examples
functionality and may even have the same location requirements. On of such environments includes sensors issuing alerts, or vehicles
the other hand, the communication interaction may occur without sending crash data. These messages may be one-shot data
establishment of a voice or video channel. transmissions (i.e., SIP message handling that requires no
establishment of a session) and interactions where a sequence of
messages are transmitted in which case a session setup is useful to
ensure that all messages are indeed routed to the same PSAP. These
type of interactions are called 'data-only emergency calls'.
Data-only emergency alerts are similar to regular emergency calls in Data-only emergency calls are nevertheless similar to regular
the sense that they require emergency call routing functionality and emergency calls in the sense that they require the emergency
may even have the same location requirements. On the other hand, the indications, emergency call routing functionality and may even have
initial communication interaction will not lead to the establishment the same location requirements. However, the communication
of a voice or video channel. interaction will not lead to the exchange of Real-Time Protocol
packets, such as voice, video data or real-time text.
Based on the deployment experience with non-IP based systems, two The Common Alerting Protocol (CAP) [cap] is a document format for
major deployment scenarios are envisaged: exchanging emergency alerts and public warnings. CAP is mainly used
for conveying alerts and warnings between authorities and from
authorities to citizen/individuals.
This document uses the CAP payload to convey the semantic of a data-
only emergency call. Note that further data may be added using the
already available 'additional data' structure
[I-D.ietf-ecrit-additional-data]. Whenever data can be encoded in
the additional data structure it shall be used.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
3. Architectural Overview
This section illustrates two envisioned usage modes; targeted and
location-based emergency alert routing.
1. Emergency alerts containing only data are targeted to a recipient 1. Emergency alerts containing only data are targeted to a recipient
responsible for evaluating the next steps, which could include: responsible for evaluating the next steps, which could include:
1. Sending an alert containing only data toward a Public Safety 1. Sending an alert containing only data toward a Public Safety
Answering Point (PSAP); Answering Point (PSAP);
2. Establishing an emergency call with a PSAP that could include 2. Establishing a third-party initiated emergency call that
audio/video as well as data could include audio, video, and data.
2. Emergency alerts targeted to a Service URN used for IP-based 2. Emergency alerts targeted to a Service URN used for IP-based
emergency calls where the recipient is not known to the emergency calls where the recipient is not known to the
originator. In this scenario, the alert may contain only data originator. In this scenario, the alert may contain only data
(e.g. a CAP and a PIDF-LO payload in a SIP MESSAGE) or could be (e.g., a CAP and a PIDF-LO payload in a SIP MESSAGE).
included along with establishment of an audio/video channel (e.g.
SIP INVITE)
We describe these two cases in more detail in Section 3.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in RFC 2119 [RFC2119].
This document utilizes terminology introduced in
[I-D.ietf-atoca-requirements]. In particular, the terms for author,
originator, receiver and recipient, are relevant for this document.
The originator and the receiver are SIP-based entities while the
author and the recipient are entities that relate to the alert
message delivery, when this is relevant for the communication.
3. Architectural Overview
This section illustrates two envisioned usage modes; targeted and Figure 1 shows a deployment variant where a sensor, is pre-configured
location-based emergency alert routing. Figure 1 shows a deployment (using techniques outside the scope of this document) to issue an
variant where a sensor, as the author and originator of the alert, is alert to an aggregator that processes these messages and performs
pre-configured (using techniques outside the scope of this document) whatever steps are necessary to appropriately react on the alert.
to issue an alert to a receiver or an aggregator, a special form of For example, a security firm may use different sensor inputs to
mediator, that processes these messages and performs whatever steps dispatch their security staff to a building they protect or to
are necessary to appropriately react on the alert. For example, a initiate a third-party emergency call.
security firm may use different sensor inputs to dispatch their
security staff to a building they protect or to initiate a third
party emergency call.
+------------+ +------------+ +------------+ +------------+
| Sensor | | Aggregator | | Sensor | | Aggregator |
| | | | | | | |
+---+--------+ +------+-----+ +---+--------+ +------+-----+
| | | |
Sensors | Sensors |
trigger | trigger |
emergency | emergency |
alert | alert |
skipping to change at page 7, line 9 skipping to change at page 8, line 9
|<-------------------| | |<-------------------| |
| | | | | |
| | | | | |
Figure 2: Location-Based Emergency Alert Routing Figure 2: Location-Based Emergency Alert Routing
4. Protocol Specification 4. Protocol Specification
4.1. CAP Transport 4.1. CAP Transport
Since alerts structured via CAP require a "push" medium. The To convey CAP payloads the SIP MESSAGE [RFC3428] is used for
following SIP requests MAY carry the CAP payload defined in this exchanges where no session establishment is needed, i.e.., one-shot
document: INVITE [RFC3261], UPDATE [RFC3311], MESSAGE [RFC3428], INFO message exchange, and the SIP INVITE [RFC3261] where the
[RFC6086], NOTIFY [RFC3265], and PUBLISH [RFC3903]. The MIME type is establishment of session is useful (e.g., when multiple independent
set to 'application/cap+xml'. messages have to be logically tied together).
The MIME type is set to 'application/cap+xml'.
If the server does not support the functionality required to fulfill If the server does not support the functionality required to fulfill
the request then a 501 Not Implemented MUST be returned by RFC 3261 the request then a 501 Not Implemented MUST be returned by RFC 3261
[RFC3261]. This is the appropriate response when a UAS does not [RFC3261]. This is the appropriate response when a UAS does not
recognize the request method and is not capable of supporting it for recognize the request method and is not capable of supporting it for
any user. any user.
The 415 Unsupported Media Type error MUST be returned by RFC 3261 The 415 Unsupported Media Type error MUST be returned by RFC 3261
[RFC3261] if the server is refusing to service the request because [RFC3261] if the server is refusing to service the request because
the message body of the request is in a format not supported by the the message body of the request is in a format not supported by the
skipping to change at page 9, line 24 skipping to change at page 10, line 24
425 (Bad Alert Message) 425 (Bad Alert Message)
The 425 response code is a rejection of the request due to its The 425 response code is a rejection of the request due to its
included alert content, indicating that it was malformed or not included alert content, indicating that it was malformed or not
satisfactory for the recipient's purpose. satisfactory for the recipient's purpose.
A SIP intermediary can also reject an alert it receives from a UA A SIP intermediary can also reject an alert it receives from a UA
when it understands that the provided alert is malformed. when it understands that the provided alert is malformed.
Section 5.2 describes a AlertMsg-Error header field with more details Section 5.2 describes an AlertMsg-Error header field with more
about what was wrong with the alert message in the request. This details about what was wrong with the alert message in the request.
header field MUST be included in the 425 response. This header field MUST be included in the 425 response.
It is only appropriate to generate a 425 response when the responding It is only appropriate to generate a 425 response when the responding
entity has no other information in the request that are usable by the entity has no other information in the request that are usable by the
responder. responder.
A 425 response code MUST NOT be sent in response to a request that A 425 response code MUST NOT be sent in response to a request that
lacks an alert message entirely, as the user agent in that case may lacks an alert message entirely, as the user agent in that case may
not support this extension at all. not support this extension at all.
A 425 response is a final response within a transaction, and MUST NOT A 425 response is a final response within a transaction, and MUST NOT
skipping to change at page 10, line 40 skipping to change at page 11, line 40
not standardized - meaning an operator can change the strings - but not standardized - meaning an operator can change the strings - but
MUST NOT change the meaning of the error code. Similar to how RFC MUST NOT change the meaning of the error code. Similar to how RFC
3261 specifies, there MUST NOT be more than one string per error 3261 specifies, there MUST NOT be more than one string per error
code. code.
The AlertMsg-Error header field MAY be included in any response as an The AlertMsg-Error header field MAY be included in any response as an
alert message was in the request part of the same transaction. For alert message was in the request part of the same transaction. For
example, a UA includes an alert in an MESSAGE to a PSAP. The PSAP example, a UA includes an alert in an MESSAGE to a PSAP. The PSAP
can accept this MESSAGE, thus creating a dialog, even though his UA can accept this MESSAGE, thus creating a dialog, even though his UA
determined the alert message contained in the MESSAGE was bad. The determined the alert message contained in the MESSAGE was bad. The
PSAP merely includes a AlertMsg-Error header value in the 200 OK to PSAP merely includes an AlertMsg-Error header value in the 200 OK to
the MESSAGE informing the UA that the MESSAGE was accepted but the the MESSAGE informing the UA that the MESSAGE was accepted but the
alert provided was bad. alert provided was bad.
If, on the other hand, the PSAP cannot accept the MESSAGE without a If, on the other hand, the PSAP cannot accept the MESSAGE without a
suitable alert message, a 425 response is sent. suitable alert message, a 425 response is sent.
A SIP intermediary that requires the UA's alert message in order to A SIP intermediary that requires the UA's alert message in order to
properly process the MESSAGE may also sends a 425 with a AlertMsg- properly process the MESSAGE may also sends a 425 with a AlertMsg-
Error code. Error code.
skipping to change at page 12, line 7 skipping to change at page 13, line 7
purpose of the alert" purpose of the alert"
AlertMsg-Error: 103 ; code="Alert Payload was corrupted" AlertMsg-Error: 103 ; code="Alert Payload was corrupted"
Additionally, if an LR cannot or chooses not to process the alert Additionally, if an LR cannot or chooses not to process the alert
message from a SIP request, a 500 (Server Internal Error) SHOULD be message from a SIP request, a 500 (Server Internal Error) SHOULD be
used with or without a configurable Retry-After header field. used with or without a configurable Retry-After header field.
6. Example 6. Example
Figure 3 shows a CAP document indicating a BURLARY alert issued by a Figure 3 shows a CAP document indicating a BURGLARY alert issued by a
sensor with the identity 'sensor1@domain.com'. The location of the sensor called 'sensor1@domain.com'. The location of the sensor can
sensor can be obtained from the attached location information be obtained from the attached location information provided via the
provided via the 'geolocation' header contained in the SIP MESSAGE 'geolocation' header contained in the SIP MESSAGE structure.
structure. Additionally, the sensor provided some data long with the Additionally, the sensor provided some data long with the alert
alert message using proprietary information elements only to be message using proprietary information elements only to be processed
processed by the receiver, a SIP entity acting as an aggregator. by the receiver, a SIP entity acting as an aggregator. This example
This example reflects the description in Figure 1. reflects the description in Figure 1.
MESSAGE sip:aggregator@domain.com SIP/2.0 MESSAGE sip:aggregator@domain.com SIP/2.0
Via: SIP/2.0/TCP sensor1.domain.com;branch=z9hG4bK776sgdkse Via: SIP/2.0/TCP sensor1.domain.com;branch=z9hG4bK776sgdkse
Max-Forwards: 70 Max-Forwards: 70
From: sip:sensor1@domain.com;tag=49583 From: sip:sensor1@domain.com;tag=49583
To: sip:aggregator@domain.com To: sip:aggregator@domain.com
Call-ID: asd88asd77a@1.2.3.4 Call-ID: asd88asd77a@1.2.3.4
Geolocation: <cid:abcdef@domain.com> Geolocation: <cid:abcdef@domain.com>
;routing-allowed=yes ;routing-allowed=yes
Supported: geolocation Supported: geolocation
skipping to change at page 14, line 10 skipping to change at page 15, line 10
</presence> </presence>
--boundary1-- --boundary1--
Figure 3: Example Message conveying an Alert Figure 3: Example Message conveying an Alert
7. Security Considerations 7. Security Considerations
This section discusses security considerations when SIP user agents This section discusses security considerations when SIP user agents
issue emergency alerts utilizing CAP. Location specific threats are issue emergency alerts utilizing CAP. Location specific threats are
not unique to this document and are discussed in not unique to this document and are discussed in
[I-D.ietf-ecrit-trustworthy-location] and [I-D.ietf-ecrit-trustworthy-location] and [RFC6442].
[I-D.ietf-sipcore-location-conveyance].
The ECRIT emergency services architecture [I-D.ietf-ecrit-phonebcp] The ECRIT emergency services architecture [I-D.ietf-ecrit-phonebcp]
considers classical individual-to-authority emergency calling and the considers classical individual-to-authority emergency calling and the
identity of the emergency caller does not play a role at the time of identity of the emergency caller does not play a role at the time of
the call establishment itself, i.e., a response to the emergency call the call establishment itself, i.e., a response to the emergency call
will not depend on the identity of the caller. In case of emergency will not depend on the identity of the caller. In case of emergency
alerts generated by devices, like sensors, the processing may be alerts generated by devices, like sensors, the processing may be
different in order to reduce the number of falsely generated different in order to reduce the number of falsely generated
emergency alerts. Alerts may get triggered based on certain sensor emergency alerts. Alerts may get triggered based on certain sensor
input that may have been caused by other factors than the actual input that may have been caused by other factors than the actual
skipping to change at page 20, line 24 skipping to change at page 21, line 24
[RFC3023] Murata, M., St. Laurent, S., and D. Kohn, "XML Media [RFC3023] Murata, M., St. Laurent, S., and D. Kohn, "XML Media
Types", RFC 3023, January 2001. Types", RFC 3023, January 2001.
[RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO [RFC3629] Yergeau, F., "UTF-8, a transformation format of ISO
10646", STD 63, RFC 3629, November 2003. 10646", STD 63, RFC 3629, November 2003.
[I-D.ietf-ecrit-phonebcp] [I-D.ietf-ecrit-phonebcp]
Rosen, B. and J. Polk, "Best Current Practice for Rosen, B. and J. Polk, "Best Current Practice for
Communications Services in support of Emergency Calling", Communications Services in support of Emergency Calling",
draft-ietf-ecrit-phonebcp-17 (work in progress), draft-ietf-ecrit-phonebcp-20 (work in progress),
March 2011. September 2011.
[I-D.ietf-sipcore-location-conveyance] [RFC6442] Polk, J., Rosen, B., and J. Peterson, "Location Conveyance
Polk, J., Rosen, B., and J. Peterson, "Location Conveyance for the Session Initiation Protocol", RFC 6442,
for the Session Initiation Protocol", December 2011.
draft-ietf-sipcore-location-conveyance-08 (work in
progress), May 2011.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E. A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261, Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002. June 2002.
[RFC3311] Rosenberg, J., "The Session Initiation Protocol (SIP) [RFC3311] Rosenberg, J., "The Session Initiation Protocol (SIP)
UPDATE Method", RFC 3311, October 2002. UPDATE Method", RFC 3311, October 2002.
[RFC3428] Campbell, B., Rosenberg, J., Schulzrinne, H., Huitema, C., [RFC3428] Campbell, B., Rosenberg, J., Schulzrinne, H., Huitema, C.,
skipping to change at page 21, line 9 skipping to change at page 22, line 8
[RFC3265] Roach, A., "Session Initiation Protocol (SIP)-Specific [RFC3265] Roach, A., "Session Initiation Protocol (SIP)-Specific
Event Notification", RFC 3265, June 2002. Event Notification", RFC 3265, June 2002.
[RFC3903] Niemi, A., "Session Initiation Protocol (SIP) Extension [RFC3903] Niemi, A., "Session Initiation Protocol (SIP) Extension
for Event State Publication", RFC 3903, October 2004. for Event State Publication", RFC 3903, October 2004.
[RFC5234] Crocker, D. and P. Overell, "Augmented BNF for Syntax [RFC5234] Crocker, D. and P. Overell, "Augmented BNF for Syntax
Specifications: ABNF", STD 68, RFC 5234, January 2008. Specifications: ABNF", STD 68, RFC 5234, January 2008.
[I-D.ietf-ecrit-additional-data]
Rosen, B., Tschofenig, H., and R. Marshall, "Additional
Data related to an Emergency Call",
draft-ietf-ecrit-additional-data-02 (work in progress),
October 2011.
10.2. Informative References 10.2. Informative References
[I-D.ietf-atoca-requirements] [I-D.ietf-atoca-requirements]
Schulzrinne, H., Norreys, S., Rosen, B., and H. Rosen, B., Schulzrinne, H., Tschofenig, H., and S.
Tschofenig, "Requirements, Terminology and Framework for Norreys, "Requirements, Terminology and Framework for
Exigent Communications", draft-ietf-atoca-requirements-01 Exigent Communications", draft-ietf-atoca-requirements-02
(work in progress), January 2011. (work in progress), October 2011.
[I-D.ietf-ecrit-trustworthy-location] [I-D.ietf-ecrit-trustworthy-location]
Tschofenig, H., Schulzrinne, H., and B. Aboba, Tschofenig, H., Schulzrinne, H., and B. Aboba,
"Trustworthy Location Information", "Trustworthy Location Information",
draft-ietf-ecrit-trustworthy-location-02 (work in draft-ietf-ecrit-trustworthy-location-02 (work in
progress), May 2011. progress), May 2011.
[RFC4474] Peterson, J. and C. Jennings, "Enhancements for [RFC4474] Peterson, J. and C. Jennings, "Enhancements for
Authenticated Identity Management in the Session Authenticated Identity Management in the Session
Initiation Protocol (SIP)", RFC 4474, August 2006. Initiation Protocol (SIP)", RFC 4474, August 2006.
[RFC3325] Jennings, C., Peterson, J., and M. Watson, "Private [RFC3325] Jennings, C., Peterson, J., and M. Watson, "Private
Extensions to the Session Initiation Protocol (SIP) for Extensions to the Session Initiation Protocol (SIP) for
Asserted Identity within Trusted Networks", RFC 3325, Asserted Identity within Trusted Networks", RFC 3325,
November 2002. November 2002.
[RFC6443] Rosen, B., Schulzrinne, H., Polk, J., and A. Newton,
"Framework for Emergency Calling Using Internet
Multimedia", RFC 6443, December 2011.
Authors' Addresses Authors' Addresses
Brian Rosen Brian Rosen
NeuStar, Inc. NeuStar, Inc.
470 Conrad Dr 470 Conrad Dr
Mars, PA 16046 Mars, PA 16046
US US
Phone: Phone:
Email: br@brianrosen.net Email: br@brianrosen.net
 End of changes. 24 change blocks. 
110 lines changed or deleted 128 lines changed or added

This html diff was produced by rfcdiff 1.41. The latest version is available from http://tools.ietf.org/tools/rfcdiff/