<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.2.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-sipcore-retransmission-allowed-fixes-01" category="std" consensus="true" submissionType="IETF" xml:lang="en" updates="4119, 5606, 5774, 6442, 7378, 8262" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title abbrev="retransmission-allowed errata">A Comprehensive Errata for 'retransmission-allowed' XML Element</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-sipcore-retransmission-allowed-fixes-01"/>
    <author initials="B." surname="Rosen" fullname="Brian Rosen">
      <organization>Unaffiliated</organization>
      <address>
        <postal>
          <city>Mars</city>
          <region>PA</region>
          <country>United States of America</country>
        </postal>
        <email>br@brianrosen.net</email>
      </address>
    </author>
    <author initials="J." surname="Martin" fullname="Jeff Martin">
      <organization>Comtech TCS</organization>
      <address>
        <postal>
          <street>2401 Elliott Avenue</street>
          <city>Seattle</city>
          <region>WA</region>
          <code>98121</code>
          <country>United States of America</country>
        </postal>
        <email>jeff.martin@comtech.com</email>
      </address>
    </author>
    <date year="2025" month="October" day="15"/>
    <area>ART</area>
    <workgroup>sipcore</workgroup>
    <abstract>
      <?line 85?>

<t>This document fixes use of the 'retransmission-allowed' element of PIDF-LO in six published RFCs.  All text and examples should show 'true' or 'false' to match the XML schema definitions, but some RFCs incorrectly use 'yes' or 'no'.  This document updates RFC4119, RFC5606, RFC5774, RFC6442, RFC7378, RFC8262.</t>
    </abstract>
  </front>
  <middle>
    <?line 89?>

<section anchor="introduction">
      <name>Introduction</name>
      <t><xref target="RFC4119"/> defines the &lt;retransmission-allowed&gt; element as part of PIDF-LO.  Section 2.2.5 "Schema Definitions" defines this element as a boolean data type as described in W3C's "XML Schema Part 2: Datatypes (Second Edition)". As a boolean data type, &lt;retransmission-allowed&gt; can have the following values: 'true', 'false', '0', or '1'.</t>
      <t>Unfortunately the examples in the text of RFC 4119 used values 'yes' and 'no', which are not allowed per section 2.2.5 "Schema Definitions". This problem was reported in <eref target="https://www.rfc-editor.org/errata/eid1535">errata id 1535</eref> in 2008, and verified in 2010.</t>
      <t>Since RFC 4119, there are another 13 RFCs with &lt;retransmission-allowed&gt; example text. Despite the RFC 4119 errata, 5 of these RFCs incorrectly repeated the mistaken use of 'yes' and 'no' in their examples of &lt;retransmission-allowed&gt;: <xref target="RFC5606"/>, <xref target="RFC5774"/>, <xref target="RFC6442"/>, <xref target="RFC7378"/>, and <xref target="RFC8262"/>. The other 8 RFCs correctly use 'true' and 'false' in their examples: <xref target="RFC5580"/>, <xref target="RFC5985"/>, <xref target="RFC6397"/>, <xref target="RFC6753"/>, <xref target="RFC6772"/>, <xref target="RFC7199"/>, <xref target="RFC7852"/>, and <xref target="RFC8876"/>.</t>
      <t>Rather than submitting individual errata against the incorrect examples in those 5 RFCs, this document updates them all to replace all use of 'yes' with 'true', and all use of 'no' with 'false'.  The original RFC 4119 is also included here for completeness, to further reinforce the existing errata id 1535 for RFC 4119.</t>
      <section anchor="requirements-notation">
        <name>Requirements Notation</name>
        <t>The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL
NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED",
"MAY", and "OPTIONAL" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.
<?line -6?>
        </t>
      </section>
      <section anchor="additional-copyright-notice">
        <name>Additional Copyright Notice</name>
        <t>This document contains material from IETF Documents or IETF Contributions published before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications outside the IETF Standards Process. Without an adequate license from those person(s), this document may not be modified outside the IETF Standards Process except to format it for publication as an RFC or to translate it into languages other than English.</t>
      </section>
    </section>
    <section anchor="changes-to-documents">
      <name>Changes to Documents</name>
      <section anchor="rfc-4119-a-presence-based-geopriv-location-object-format-pidf-lo">
        <name>RFC 4119 - A Presence-based GEOPRIV Location Object Format (PIDF-LO)</name>
        <t><xref target="RFC4119"/> section 2.2.2 page 8 says:</t>
        <ul empty="true">
          <li>
            <t>'retransmission-allowed': When the value of this element is 'no', the
Recipient of this Location Object is not permitted to share the
enclosed Location Information, or the object as a whole, with
other parties.  When the value of this element is 'yes',
distributing this Location is permitted (barring an existing out-of-band
agreement or obligation to the contrary).  By default, the
value MUST be assumed to be 'no'.  Implementations MUST include
this field, with a value of 'no', if the Rule Maker specifies no
preference.</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>'retransmission-allowed': When the value of this element is <strong>'false'</strong>, the
Recipient of this Location Object is not permitted to share the
enclosed Location Information, or the object as a whole, with
other parties.  When the value of this element is <strong>'true'</strong>,
distributing this Location is permitted (barring an existing out-of-band
agreement or obligation to the contrary).  By default, the
value MUST be assumed to be <strong>'false'</strong>.  Implementations MUST include
this field, with a value of <strong>'false'</strong>, if the Rule Maker specifies no
preference.</t>
          </li>
        </ul>
        <t>Section 2.3 "Example Location Objects" shows the following in two places:</t>
        <ul empty="true">
          <li>
            <t><tt>&lt;gp:retransmission-allowed&gt;no&lt;/gp:retransmission-allowed&gt;</tt></t>
          </li>
        </ul>
        <t>Both places should show:</t>
        <ul empty="true">
          <li>
            <t><tt>&lt;gp:retransmission-allowed&gt;false&lt;/gp:retransmission-allowed&gt;</tt></t>
          </li>
        </ul>
      </section>
      <section anchor="rfc-5606-implications-of-retransmission-allowed-for-sip-location-conveyance">
        <name>RFC 5606 - Implications of 'retransmission-allowed' for SIP Location Conveyance</name>
        <t><xref target="RFC5606"/> Section 2 says:</t>
        <ul empty="true">
          <li>
            <t>These questions and concerns are particularly problematic when
&lt;retransmission-allowed&gt; is set to "no" (the default case).  This
core concern might be put as "to whom does &lt;retransmission-allowed&gt;
apply in location-based routing?"  More specifically:</t>
            <t>Is any entity that reads LI bound by &lt;retransmission-allowed&gt;?  If
so, does that mean a proxy that performs location-based routing is
unable to forward a request and complete a SIP call if
\retransmission-allowed&gt; is "no"?  Alternatively, must they strip the
location body from the message in order to complete the call?</t>
            <t>If the proxy does not understand RFC 4119, it may forward a SIP
message containing a policy statement &lt;retransmission-allowed&gt; set to
"no".  Is any proxy that does understand RFC 4119 required to parse
the LI for this statement, even if it would not do so in order to
route the message?</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>These questions and concerns are particularly problematic when
&lt;retransmission-allowed&gt; is set to <strong>"false"</strong> (the default case).  This
core concern might be put as "to whom does &lt;retransmission-allowed&gt;
apply in location-based routing?"  More specifically:</t>
            <t>Is any entity that reads LI bound by &lt;retransmission-allowed&gt;?  If
so, does that mean a proxy that performs location-based routing is
unable to forward a request and complete a SIP call if
\retransmission-allowed&gt; is <strong>"false"</strong>?  Alternatively, must they strip the
location body from the message in order to complete the call?</t>
            <t>If the proxy does not understand RFC 4119, it may forward a SIP
message containing a policy statement &lt;retransmission-allowed&gt; set to
<strong>"false"</strong>.  Is any proxy that does understand RFC 4119 required to parse
the LI for this statement, even if it would not do so in order to
route the message?</t>
          </li>
        </ul>
        <t>Section 3.1 says:</t>
        <ul empty="true">
          <li>
            <t>After extensive discussion in both GEOPRIV and SIP contexts, there
seems to be consensus that a solution for this problem must enable
location-based routing to work even when the &lt;retransmission-allowed&gt;
flag is set to "no".  A solution should also give the Rule Maker the
ability to allow or forbid the use of LI for location-based routing
and the ability to allow or forbid the use of LI for the consumption
of the endpoint.</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>After extensive discussion in both GEOPRIV and SIP contexts, there
seems to be consensus that a solution for this problem must enable
location-based routing to work even when the &lt;retransmission-allowed&gt;
flag is set to <strong>"false"</strong>.  A solution should also give the Rule Maker the
ability to allow or forbid the use of LI for location-based routing
and the ability to allow or forbid the use of LI for the consumption
of the endpoint.</t>
          </li>
        </ul>
        <t>Section 3.2 says:</t>
        <ul empty="true">
          <li>
            <t>Consensus has emerged that any SIP entity that receives a SIP message
containing LI through the operation of SIP's normal routing
procedures or as a result of location-based routing should be
considered an authorized recipient of that LI.  Because of this
presumption, one SIP element may pass the LI to another even if the
LO it contains has &lt;retransmission-allowed&gt; set to "no"; this sees
the passing of the SIP message as part of the delivery to authorized
recipients, rather than as retransmission.  SIP entities are still
enjoined from passing these messages outside the normal routing to
external entities if &lt;retransmission-allowed&gt; is set to "no", as it
is the passing to third parties that &lt;retransmission-allowed&gt; is
meant to control.</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>Consensus has emerged that any SIP entity that receives a SIP message
containing LI through the operation of SIP's normal routing
procedures or as a result of location-based routing should be
considered an authorized recipient of that LI.  Because of this
presumption, one SIP element may pass the LI to another even if the
LO it contains has &lt;retransmission-allowed&gt; set to <strong>"false"</strong>; this sees
the passing of the SIP message as part of the delivery to authorized
recipients, rather than as retransmission.  SIP entities are still
enjoined from passing these messages outside the normal routing to
external entities if &lt;retransmission-allowed&gt; is set to <strong>"false"</strong>, as it
is the passing to third parties that &lt;retransmission-allowed&gt; is
meant to control.</t>
          </li>
        </ul>
        <t>Section 3.5 says:</t>
        <ul empty="true">
          <li>
            <t>... like the PIDF-LO &lt;retransmission-allowed&gt; being set to "no", it is a ...</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>... like the PIDF-LO &lt;retransmission-allowed&gt; being set to <strong>"false"</strong>, it is a ...</t>
          </li>
        </ul>
        <t>Section 3.6 says:</t>
        <ul empty="true">
          <li>
            <t>... it must not copy location if &lt;retransmission-allowed&gt; is "no". ...</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>... it must not copy location if &lt;retransmission-allowed&gt; is <strong>"false"</strong>. ...</t>
          </li>
        </ul>
      </section>
      <section anchor="rfc-5774-considerations-for-civic-addresses-in-pidf-lo-guidelines-and-iana-registry-definition">
        <name>RFC 5774 - Considerations for Civic Addresses in PIDF-LO: Guidelines and IANA Registry Definition</name>
        <t><xref target="RFC5774"/> Section A.5 "Example" shows:</t>
        <ul empty="true">
          <li>
            <t><tt>&lt;gp:retransmission-allowed&gt;yes&lt;/gp:retransmission-allowed&gt;</tt></t>
          </li>
        </ul>
        <t>It should show:</t>
        <ul empty="true">
          <li>
            <t><tt>&lt;gp:retransmission-allowed&gt;true&lt;/gp:retransmission-allowed&gt;</tt></t>
          </li>
        </ul>
      </section>
      <section anchor="rfc-6442-location-conveyance-for-sip">
        <name>RFC 6442 - Location Conveyance for SIP</name>
        <t><xref target="RFC6442"/> section 4.4 page 18 says:</t>
        <ul empty="true">
          <li>
            <t>This location error is specific to having the PIDF-LO <xref target="RFC4119"/>
&lt;retransmission-allowed&gt; element set to "no".  This location error is
stating it requires permission (i.e., PIDF-LO &lt;retransmission-allowed&gt;
element set to "yes") to process this SIP request further.
If the LS sending the location information does not want to give this
permission, it will not change this permission in a new request.  If
the LS wants this message processed with the &lt;retransmission-allowed&gt;
element set to "yes", it MUST choose another logical path (if one
exists) for this SIP request.</t>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>This location error is specific to having the PIDF-LO <xref target="RFC4119"/>
&lt;retransmission-allowed&gt; element set to <strong>"false"</strong>.  This location error is
stating it requires permission (i.e., PIDF-LO &lt;retransmission-allowed&gt;
element set to <strong>"true"</strong>) to process this SIP request further.
If the LS sending the location information does not want to give this
permission, it will not change this permission in a new request.  If
the LS wants this message processed with the &lt;retransmission-allowed&gt;
element set to <strong>"false"</strong>, it MUST choose another logical path (if one
exists) for this SIP request.</t>
          </li>
        </ul>
        <t><eref target="https://www.rfc-editor.org/errata/eid4236">Errata id 4236</eref> incorrectly includes the following text</t>
        <ul empty="true">
          <li>
            <t>Section 5.1, 5.2 says:</t>
            <ul empty="true">
              <li>
                <t><tt>&lt;gbp:retransmission-allowed&gt;false</tt><br/>
                  <tt>&lt;/gbp:retransmission-allowed&gt;</tt></t>
              </li>
            </ul>
            <t>It should say:</t>
            <ul empty="true">
              <li>
                <t><tt>&lt;gbp:retransmission-allowed&gt;no</tt><br/>
                  <tt>&lt;/gbp:retransmission-allowed&gt;</tt></t>
              </li>
            </ul>
          </li>
        </ul>
        <t>Sections 5.1 and 5.2 of RFC6442 are correct without any need for this errata id 4236.  This errata should be ignored.</t>
      </section>
      <section anchor="rfc-7378-trustworthy-location">
        <name>RFC 7378 - Trustworthy Location</name>
        <t><xref target="RFC7378"/> section 6 page 25 says:</t>
        <ul empty="true">
          <li>
            <t>as noted in RFC5606, Section 3.2:</t>
            <ul empty="true">
              <li>
                <t>...  Because of this
presumption, one SIP element may pass the LI to another even if
the LO it contains has &lt;retransmission-allowed&gt; set to "no"; this
sees the passing of the SIP message as part of the delivery to
authorized recipients, rather than as retransmission.  SIP
entities are still enjoined from passing these messages
outside the normal routing to external entities if
&lt;retransmission-allowed&gt; is set to "no", as it is the passing to
third parties that &lt;retransmission-allowed&gt; is meant to control.</t>
              </li>
            </ul>
          </li>
        </ul>
        <t>It should say:</t>
        <ul empty="true">
          <li>
            <t>as noted in RFC5606, Section 3.2:</t>
            <ul empty="true">
              <li>
                <t>...  Because of this
presumption, one SIP element may pass the LI to another even if
the LO it contains has &lt;retransmission-allowed&gt; set to <strong>"false"</strong>; this
sees the passing of the SIP message as part of the delivery to
authorized recipients, rather than as retransmission.  SIP
entities are still enjoined from passing these messages
outside the normal routing to external entities if
&lt;retransmission-allowed&gt; is set to <strong>"false"</strong>, as it is the passing to
third parties that &lt;retransmission-allowed&gt; is meant to control.</t>
              </li>
            </ul>
          </li>
        </ul>
      </section>
      <section anchor="rfc-8262-content-id-header-field-in-sip">
        <name>RFC 8262 - Content-ID Header Field in SIP</name>
        <t><xref target="RFC8262"/> section 1.4.1 "Example 1" shows:</t>
        <ul empty="true">
          <li>
            <t><tt>&lt;gbp:retransmission-allowed&gt;no</tt><br/>
              <tt>&lt;/gbp:retransmission-allowed&gt;</tt></t>
          </li>
        </ul>
        <t>It should show:</t>
        <ul empty="true">
          <li>
            <t><tt>&lt;gbp:retransmission-allowed&gt;false</tt><br/>
              <tt>&lt;/gbp:retransmission-allowed&gt;</tt></t>
          </li>
        </ul>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>The changes in this document does not require additional security considerations beyond those already noted in the individual RFCs affected by this RFC.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>None</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-combined-references">
      <name>References</name>
      <references anchor="sec-normative-references">
        <name>Normative References</name>
        <reference anchor="RFC4119">
          <front>
            <title>A Presence-based GEOPRIV Location Object Format</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="December" year="2005"/>
            <abstract>
              <t>This document describes an object format for carrying geographical information on the Internet. This location object extends the Presence Information Data Format (PIDF), which was designed for communicating privacy-sensitive presence information and which has similar properties. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="4119"/>
          <seriesInfo name="DOI" value="10.17487/RFC4119"/>
        </reference>
        <reference anchor="RFC5606">
          <front>
            <title>Implications of 'retransmission-allowed' for SIP Location Conveyance</title>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <author fullname="T. Hardie" initials="T." surname="Hardie"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document explores an ambiguity in the interpretation of the element of the Presence Information Data Format for Location Objects (PIDF-LO) in cases where PIDF-LO is conveyed by the Session Initiation Protocol (SIP). It provides recommendations for how the SIP location conveyance mechanism should adapt to this ambiguity.</t>
              <t>Documents standardizing the SIP location conveyance mechanisms will be Standards-Track documents processed according to the usual SIP process. This document is intended primarily to provide the SIP working group with a statement of the consensus of the GEOPRIV working group on this topic. It secondarily provides tutorial information on the problem space for the general reader. This memo provides information for the Internet community.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5606"/>
          <seriesInfo name="DOI" value="10.17487/RFC5606"/>
        </reference>
        <reference anchor="RFC5774">
          <front>
            <title>Considerations for Civic Addresses in the Presence Information Data Format Location Object (PIDF-LO): Guidelines and IANA Registry Definition</title>
            <author fullname="K. Wolf" initials="K." surname="Wolf"/>
            <author fullname="A. Mayrhofer" initials="A." surname="Mayrhofer"/>
            <date month="March" year="2010"/>
            <abstract>
              <t>This document provides a guideline for creating civic address considerations documents for individual countries, as required by RFC 4776. Furthermore, this document also creates an IANA Registry referring to such address considerations documents and registers such address considerations for Austria. This memo documents an Internet Best Current Practice.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="154"/>
          <seriesInfo name="RFC" value="5774"/>
          <seriesInfo name="DOI" value="10.17487/RFC5774"/>
        </reference>
        <reference anchor="RFC6442">
          <front>
            <title>Location Conveyance for the Session Initiation Protocol</title>
            <author fullname="J. Polk" initials="J." surname="Polk"/>
            <author fullname="B. Rosen" initials="B." surname="Rosen"/>
            <author fullname="J. Peterson" initials="J." surname="Peterson"/>
            <date month="December" year="2011"/>
            <abstract>
              <t>This document defines an extension to the Session Initiation Protocol (SIP) to convey geographic location information from one SIP entity to another SIP entity. The SIP extension covers end-to-end conveyance as well as location-based routing, where SIP intermediaries make routing decisions based upon the location of the Location Target. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6442"/>
          <seriesInfo name="DOI" value="10.17487/RFC6442"/>
        </reference>
        <reference anchor="RFC7378">
          <front>
            <title>Trustworthy Location</title>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="B. Aboba" initials="B." role="editor" surname="Aboba"/>
            <date month="December" year="2014"/>
            <abstract>
              <t>The trustworthiness of location information is critically important for some location-based applications, such as emergency calling or roadside assistance.</t>
              <t>This document describes threats to conveying location, particularly for emergency calls, and describes techniques that improve the reliability and security of location information. It also provides guidelines for assessing the trustworthiness of location information.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7378"/>
          <seriesInfo name="DOI" value="10.17487/RFC7378"/>
        </reference>
        <reference anchor="RFC8262">
          <front>
            <title>Content-ID Header Field in the Session Initiation Protocol (SIP)</title>
            <author fullname="C. Holmberg" initials="C." surname="Holmberg"/>
            <author fullname="I. Sedlacek" initials="I." surname="Sedlacek"/>
            <date month="October" year="2017"/>
            <abstract>
              <t>This document specifies the Content-ID header field for usage in the Session Initiation Protocol (SIP). This document also updates RFC 5621, which only allows a Content-ID URL to reference a body part that is part of a multipart message-body. This update enables a Content-ID URL to reference a complete message-body and metadata provided by some additional SIP header fields.</t>
              <t>This document updates RFC 5368 and RFC 6442 by clarifying their usage of the SIP Content-ID header field.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8262"/>
          <seriesInfo name="DOI" value="10.17487/RFC8262"/>
        </reference>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner"/>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba"/>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references anchor="sec-informative-references">
        <name>Informative References</name>
        <reference anchor="RFC5580">
          <front>
            <title>Carrying Location Objects in RADIUS and Diameter</title>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="F. Adrangi" initials="F." surname="Adrangi"/>
            <author fullname="M. Jones" initials="M." surname="Jones"/>
            <author fullname="A. Lior" initials="A." surname="Lior"/>
            <author fullname="B. Aboba" initials="B." surname="Aboba"/>
            <date month="August" year="2009"/>
            <abstract>
              <t>This document describes procedures for conveying access-network ownership and location information based on civic and geospatial location formats in Remote Authentication Dial-In User Service (RADIUS) and Diameter.</t>
              <t>The distribution of location information is a privacy-sensitive task. Dealing with mechanisms to preserve the user's privacy is important and is addressed in this document. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5580"/>
          <seriesInfo name="DOI" value="10.17487/RFC5580"/>
        </reference>
        <reference anchor="RFC5985">
          <front>
            <title>HTTP-Enabled Location Delivery (HELD)</title>
            <author fullname="M. Barnes" initials="M." role="editor" surname="Barnes"/>
            <date month="September" year="2010"/>
            <abstract>
              <t>This document defines a Layer 7 Location Configuration Protocol (L7 LCP) and describes the use of HTTP and HTTP/TLS as transports for the L7 LCP. The L7 LCP is used for retrieving location information from a server within an access network. It includes options for retrieving location information in two forms: by value and by reference. The protocol is an extensible application-layer protocol that is independent of the session layer. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="5985"/>
          <seriesInfo name="DOI" value="10.17487/RFC5985"/>
        </reference>
        <reference anchor="RFC6397">
          <front>
            <title>Multi-Threaded Routing Toolkit (MRT) Border Gateway Protocol (BGP) Routing Information Export Format with Geo-Location Extensions</title>
            <author fullname="T. Manderson" initials="T." surname="Manderson"/>
            <date month="October" year="2011"/>
            <abstract>
              <t>This document updates the Multi-threaded Routing Toolkit (MRT) export format for Border Gateway Protocol (BGP) routing information by extending it to include optional terrestrial coordinates of a BGP collector and its BGP peers. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6397"/>
          <seriesInfo name="DOI" value="10.17487/RFC6397"/>
        </reference>
        <reference anchor="RFC6753">
          <front>
            <title>A Location Dereference Protocol Using HTTP-Enabled Location Delivery (HELD)</title>
            <author fullname="J. Winterbottom" initials="J." surname="Winterbottom"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="October" year="2012"/>
            <abstract>
              <t>This document describes how to use the Hypertext Transfer Protocol (HTTP) over Transport Layer Security (TLS) as a dereference protocol to resolve a reference to a Presence Information Data Format Location Object (PIDF-LO). This document assumes that a Location Recipient possesses a URI that can be used in conjunction with the HTTP-Enabled Location Delivery (HELD) protocol to request the location of the Target. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6753"/>
          <seriesInfo name="DOI" value="10.17487/RFC6753"/>
        </reference>
        <reference anchor="RFC6772">
          <front>
            <title>Geolocation Policy: A Document Format for Expressing Privacy Preferences for Location Information</title>
            <author fullname="H. Schulzrinne" initials="H." role="editor" surname="Schulzrinne"/>
            <author fullname="H. Tschofenig" initials="H." role="editor" surname="Tschofenig"/>
            <author fullname="J. Cuellar" initials="J." surname="Cuellar"/>
            <author fullname="J. Polk" initials="J." surname="Polk"/>
            <author fullname="J. Morris" initials="J." surname="Morris"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <date month="January" year="2013"/>
            <abstract>
              <t>This document defines an authorization policy language for controlling access to location information. It extends the Common Policy authorization framework to provide location-specific access control. More specifically, this document defines condition elements specific to location information in order to restrict access to data based on the current location of the Target.</t>
              <t>Furthermore, this document defines two algorithms for reducing the granularity of returned location information. The first algorithm is defined for usage with civic location information, whereas the other one applies to geodetic location information. Both algorithms come with limitations. There are circumstances where the amount of location obfuscation provided is less than what is desired. These algorithms might not be appropriate for all application domains. [STANDARDS-TRACK]</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="6772"/>
          <seriesInfo name="DOI" value="10.17487/RFC6772"/>
        </reference>
        <reference anchor="RFC7199">
          <front>
            <title>Location Configuration Extensions for Policy Management</title>
            <author fullname="R. Barnes" initials="R." surname="Barnes"/>
            <author fullname="M. Thomson" initials="M." surname="Thomson"/>
            <author fullname="J. Winterbottom" initials="J." surname="Winterbottom"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <date month="April" year="2014"/>
            <abstract>
              <t>Current location configuration protocols are capable of provisioning an Internet host with a location URI that refers to the host's location. These protocols lack a mechanism for the target host to inspect or set the privacy rules that are applied to the URIs they distribute. This document extends the current location configuration protocols to provide hosts with a reference to the rules that are applied to a URI so that the host can view or set these rules.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7199"/>
          <seriesInfo name="DOI" value="10.17487/RFC7199"/>
        </reference>
        <reference anchor="RFC7852">
          <front>
            <title>Additional Data Related to an Emergency Call</title>
            <author fullname="R. Gellens" initials="R." surname="Gellens"/>
            <author fullname="B. Rosen" initials="B." surname="Rosen"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="R. Marshall" initials="R." surname="Marshall"/>
            <author fullname="J. Winterbottom" initials="J." surname="Winterbottom"/>
            <date month="July" year="2016"/>
            <abstract>
              <t>When an emergency call is sent to a Public Safety Answering Point (PSAP), the originating device, the access network provider to which the device is connected, and all service providers in the path of the call have information about the call, the caller, or the location, which is helpful for the PSAP to have in handling the emergency. This document describes data structures and mechanisms to convey such data to the PSAP. The intent is that every emergency call carry as much of the information described here as possible using the mechanisms described here.</t>
              <t>The mechanisms permit the data to be conveyed by reference (as an external resource) or by value (within the body of a SIP message or a location object). This follows the tradition of prior emergency services standardization work where data can be conveyed by value within the call signaling (i.e., in the body of the SIP message) or by reference.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="7852"/>
          <seriesInfo name="DOI" value="10.17487/RFC7852"/>
        </reference>
        <reference anchor="RFC8876">
          <front>
            <title>Non-interactive Emergency Calls</title>
            <author fullname="B. Rosen" initials="B." surname="Rosen"/>
            <author fullname="H. Schulzrinne" initials="H." surname="Schulzrinne"/>
            <author fullname="H. Tschofenig" initials="H." surname="Tschofenig"/>
            <author fullname="R. Gellens" initials="R." surname="Gellens"/>
            <date month="September" year="2020"/>
            <abstract>
              <t>Use of the Internet for emergency calling is described in RFC 6443, 'Framework for Emergency Calling Using Internet Multimedia'. In some cases of emergency calls, the transmission of application data is all that is needed, and no interactive media channel is established: a situation referred to as 'non-interactive emergency calls', where, unlike most emergency calls, there is no two-way interactive media such as voice or video or text. This document describes use of a SIP MESSAGE transaction that includes a container for the data based on the Common Alerting Protocol (CAP). That type of emergency request does not establish a session, distinguishing it from SIP INVITE, which does. Any device that needs to initiate a request for emergency services without an interactive media channel would use the mechanisms in this document.</t>
            </abstract>
          </front>
          <seriesInfo name="RFC" value="8876"/>
          <seriesInfo name="DOI" value="10.17487/RFC8876"/>
        </reference>
      </references>
    </references>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact initials="G." surname="Hines" fullname="Gordon Hines">
        <organization>Comtech TCS</organization>
        <address>
          <postal>
            <street>2401 Elliott Avenue</street>
            <city>Seattle</city>
            <region>WA</region>
            <code>98121</code>
            <country>United States of America</country>
          </postal>
          <email>skip.hines@comtech.com</email>
        </address>
      </contact>
      <contact initials="R." surname="Marshall" fullname="Roger Marshall">
        <organization>Comtech TCS</organization>
        <address>
          <postal>
            <street>2401 Elliott Avenue</street>
            <city>Seattle</city>
            <region>WA</region>
            <code>98121</code>
            <country>United States of America</country>
          </postal>
          <email>roger.marshall@comtech.com</email>
        </address>
      </contact>
      <contact initials="V." surname="Burton" fullname="Victor Burton">
        <organization>Comtech TCS</organization>
        <address>
          <postal>
            <street>2401 Elliott Avenue</street>
            <city>Seattle</city>
            <region>WA</region>
            <code>98121</code>
            <country>United States of America</country>
          </postal>
          <email>victor.burton@comtech.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
