SIP working group IETF#70 Essential corrections Keith Drage.

Slides:



Advertisements
Similar presentations
Re-INVITE Handling draft-camarillo-sipping-reinvite-00.txt
Advertisements

Topics Acronyms in Action SOAP 6 November 2008 CIS 340.
Internet Control Protocols Savera Tanwir. Internet Control Protocols ICMP ARP RARP DHCP.
SIP and IMS Enabled Residential Gateway Sergio Romero Telefónica I+D Jan Önnegren Ericsson AB Alex De Smedt Thomson Telecom.
Chapter 7 – Transport Layer Protocols
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 RFC 3486 Compressing the Session Initiation Protocol (SIP) 曾朝弘 電機系 系統組 碩士班一年級.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Request History – Solution Mary Barnes SIP WG Meeting IETF-57 draft-ietf-sip-history-info-00.txt.
CECS 5460 – Assignment 3 Stacey VanderHeiden Güney.
1 CMPT 471 Networking II ICMP © Janice Regan, 2012.
REFACTORING Lecture 4. Definition Refactoring is a process of changing the internal structure of the program, not affecting its external behavior and.
1 3 Web Proxies Web Protocols and Practice. 2 Topics Web Protocols and Practice WEB PROXIES  Web Proxy Definition  Three of the Most Common Intermediaries.
Draft-campbell-dime-load- considerations-01 IETF 92 DIME Working Group Meeting Dallas, Texas.
Firewall and Internet Access Mechanism that control (1)Internet access, (2)Handle the problem of screening a particular network or an organization from.
All rights reserved © 1999, Alcatel, Paris. page n° 1 SIP for Xcast SIP for the establishment of xcast-based multiparty.
This document is for informational purposes only, and Tekelec reserves the right to change any aspect of the products, features or functionality described.
Call Control with SIP Brian Elliott, Director of Engineering, NMS.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
IETF 60 – San Diegodraft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Real-Time Streaming Protocol draft-ietf-mmusic-rfc2326bis-07 Magnus Westerlund Aravind.
Presented By Team Netgeeks SIP Session Initiation Protocol.
Omar A. Abouabdalla Network Research Group (USM) SIP – Functionality and Structure of the Protocol SIP – Functionality and Structure of the Protocol By.
Draft-elwell-sipping- redirection-reason-00 Author: John Elwell
ISCSI Extensions for RDMA (iSER) draft-ko-iwarp-iser-02 Mike Ko IBM August 2, 2004.
Security, NATs and Firewalls Ingate Systems. Basics of SIP Security.
RTSP to Draft Standard draft-ietf-mmusic-rfc2236bis-02.txt Authors: Henning Schulzrinne, Anup Rao, Robert Lanphier, Magnus Westerlund.
Chapter 9 Hardware Addressing and Frame Type Identification 1.Delivering and sending packets 2.Hardware addressing: specifying a destination 3. Broadcasting.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 11: Network Address Translation for IPv4 Routing And Switching.
1 Requirements for Internet Routers (Gateways) and Hosts Relates to Lab 3. (Supplement) Covers the compliance requirements of Internet routers and hosts.
The Client-Server Model And the Socket API. Client-Server (1) The datagram service does not require cooperation between the peer applications but such.
SIP Performance Benchmarking draft-ietf-bmwg-sip-bench-term-01 draft-ietf-bmwg-sip-bench-meth-01 March 22, 2010 Prof. Carol Davids, Illinois Inst. of Tech.
Making SIP NAT Friendly Jonathan Rosenberg dynamicsoft.
Magnus Westerlund 1 The RTSP Core specification draft-ietf-mmusic-rfc2326bis-06.txt Magnus Westerlund Aravind Narasimhan Rob Lanphier Anup Rao Henning.
Protocol Layering Chapter 11.
RFC3261 (Almost) Robert Sparks. SIPiT 10 2 Status of the New SIP RFC Passed IETF Last Call In the RFC Editor queue Author’s 48 hours review imminent IMPORTANT:
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
1 RFC4028 Session Timer in the Session Initiation Protocol Speaker : Ying Shun Lin Adviser : Quincy Wu.
GRUU Jonathan Rosenberg Cisco Systems. Changes in -06 Editorial as a result of RFC-ED early copy experiment.
Slide title In CAPITALS 50 pt Slide subtitle 32 pt RTSP draft-ietf-mmusic-rfc2396bis-10 Magnus Westerlund Co-auhtors: Henning Schulzrinne, Rob Lanphier,
July 28, 2009BLISS WG IETF-751 Shared Appearance of a SIP AOR draft-ietf-bliss-shared-appearances-03 Alan Johnston Mohsen Soroushnejad Venkatesh Venkataramanan.
Location Conveyance in SIP draft-ietf-sip-location-conveyance-01 James M. Polk Brian Rosen 2 nd Aug 05.
RFC 4068bis draft-ietf-mipshop-fmipv6-rfc4068bis-01.txt Rajeev Koodli.
March 20th, 2001 SIP WG meeting 50th IETF SIP WG meeting Overlap signalling handling
Andrew Allen ROUTING OUT OF DIALOG REQUESTS draft-allen-dispatch-routing-out-of-dialog-request-01 Dispatch IETF 92 March 23 rd 2015.
IP packet filtering Breno de Medeiros. Florida State University Fall 2005 Packet filtering Packet filtering is a network security mechanism that works.
© 2006 Open Grid Forum Network Services Interface CS Errata Guy Roberts, Chin Guok, Tomohiro Kudoh 29 Sept 2015.
EAP Applicability IETF-86 Joe Salowey. Open Issues Open Issues with Retransmission and re- authentication Remove text about lack of differentiation in.
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Session-Independent Policies draft-ietf-sipping-session-indep-policy-02 Volker Hilt Jonathan Rosenberg Gonzalo.
IP Telephony (VoIP).
Open issues with PANA Protocol
IP-NNI Joint Task Force Status Update
Jonathan Rosenberg Volker Hilt Daryl Malas
ECRIT Interim: SIP Location Conveyance
MEmos.
draft-ietf-simple-message-sessions-00 Ben Campbell
Internet Control Message Protocol (ICMP)
Host of Troubles : Multiple Host Ambiguities in HTTP Implementations
Layered Architectures
Introduction to Networking
IP-NNI Joint Task Force Status Update
Chapter 4: Access Control Lists (ACLs)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Internet Control Message Protocol (ICMP)
Change Proposals for SHAKEN Documents
Chapter 11: Network Address Translation for IPv4
SIP Session Timer Glare Handling
Exceptions and networking
Presentation transcript:

SIP working group IETF#70 Essential corrections Keith Drage

2 Essential corrections  draft-drage-sip-essential-correction-02  An essential change is one where in the absence of the correction, it will not be possible to implement the specification contained in the original RFC in a manner to ensure interoperability or correct operation.  See: ential_Corrections_Tracking ential_Corrections_Tracking

3 Format (1)  In addition to the normal rules for contents of a standards track RFC, sections to the RFC should document the following (probably as separate sections or subsections):  Reason for change. Text which explains why the change is necessary. This should be focussed on identifying why the text in the existing RFC is incorrect.  Summary of change. Enter text which describes the most important components of the change. i.e. how the change is made.  Consequences if not approved. Enter here the consequences if this change were to be rejected. Explain the issues that implementations will have in the absence of this change, i.e. what fails to operate correctly. This text should be drafted such that the working group can make a decision as to whether the change is essential or not.

4 Format (2)  The change. Provide only the normative changes outside the context of the sections of the corrected RFC. This section is for those implementors who want to understand the normative changes at an immediate view.  OPEN ISSUE: The above element has been inserted at the request of participants at IETF#69. The above element requires further study, both in the format it should take, and what occurs if after publication, it is found to differ from the next element. Should one element take precedence over the other, or do we sort it out at the next reissue of the change RFC.  The change in detail. Clearly identify the section of the RFC to be changed, and show precisely how the text changes. An implementor should be able to take the original RFC and edit the change as described to obtain the new approved text.

5 Errata  Do not make normative changes to the specification and have been underused in the SIP specifications.

6 draft-ietf-sip-record-route-fix-01 A typical function of a Session Initiation Protocol (SIP) Proxy is to set a Record-Route header on initial requests in order to make subsequent requests pass through it. This header contains a SIP Uniform Resource Identifier (URI) indicating where and how the subsequent requests should be sent to reach the proxy. Like any SIP URI, it can contain sip or sips schemes, IPV4 or IPV6 addresses, and URI parameters that could influence the routing like different transport parameters (UDP, TCP, SCTP...), or a compression indication like "comp=sigcomp". When a proxy has to change some of those parameters between its incoming and outgoing interfaces (multi-homed proxies, transport protocol switching, sip to sips or IPV4 to IPV6 scenarios...), the question arises on what should be put in Record-Route header(s). It is just not possible to make one header having the characteristics of both sides at the same time. This document aims to clarify these scenarios and fix bugs already identified on this topic; it formally recommends the use of the double Record-Route technique as an alternative to the current RFC3261 text, which only describes Record-Route rewriting solution.

7 draft-gurbani-sip-ipv6-abnf-fix-00  This memo corrects the Augmented Backus-Naur Form (ABNF) production rule associated with generating IPv6 literals in RFC3261

8 draft-hilt-sip-correction  Overload occurs in the Session Initiation Protocol (SIP) when SIP servers have insufficient resources to process all SIP messages they receive. The SIP protocol specified in RFC 3261 provides the 503 (Service Unavailable) response code as a remedy for servers under overload. However, the current definition of 503 (Service Unavailable) has problems and can in fact amplify an overload condition. This document proposes an essential correction to RFC  Defines two options – we need to choose one to proceed

9 Option 1 1. Introduce a new response code, 507 (Server Overload), for servers temporarily unavailable due to overload. This response is similar to a 500 (Server Internal Error) response. Its Retry-After header has the same semantics (i.e., it only affects the current request) and it is forwarded all the way to the UAC. 2. A difference between a 500 (Server Internal Error) and a 507 (Server Overload) response is that a 507 (Server Overload) response should not be re-tried at an alternate server. Instead, it should be returned to the UAC. This way, excess requests are quickly cleared from a network of SIP servers. A new header, "Allow-Retry", may be used to explicitly allow proxies to re-try the request at an alternate server. 3. Deprecate the use of 503 (Service Unavailable) responses for temporary unavailability due to overload. 4. Change dropping requests or refusing the connection as a replacement for sending a 503 (Service Unavailable) response from MAY to SHOULD NOT. 5. Recommend the use of IP addresses for blocking traffic after receiving a 503 (Service Unavailable) with Retry-After and not the hostname.

10 Option 2 1. Deprecate the use of Retry-After headers in 503 (Service Unavailable) responses for overload control by servers with a small client population ( 20 clients) and server maintenance. Proxies that create a 500 (Server Internal Error) response after receiving a 503 (Service Unavailable) may include a Retry-After header in the 500 (Server Internal Error) response to prevent the UAC from instantly retrying the request. 2. Introduce a new header, "Allow-Retry", for 503 (Service Unavailable) responses. This header controls whether a client receiving a 503 (Service Unavailable) response should or should not forward the request to an alternate server. The default value for this header is true. A somewhat simplistic alternative to the introduction of a new header is to deprecate forwarding requests to alternate servers if the 503 (Service Unavailable) response does not contain a Retry-After header. In this case, it can be assumed that it was created because of overload and not server maintenance. 3. Change dropping requests or refusing the connection as a replacement for sending a 503 (Service Unavailable) response from MAY to SHOULD NOT. 4. Recommend the use of IP addresses for blocking traffic after receiving a 503 (Service Unavailable) with Retry-After and not the hostname.

11 draft-dotson-sip-mutual-auth-00  This document defines updates to the Session Initiation Protocol (SIP) to add mutual authentication to proxy authentication. The Proxy- Authentication-Info header, which allows a UA to authenticate a proxy when challenged, is not defined in SIP ([RFC 3261]). Supporting mutual proxy authentication in SIP would mitigate certain risks in using SIP Digest proxy authentication.

12 draft-sparks-sip-invfix-00  This document normatively updates RFC 3261, the Session Initiation Protocol (SIP), to address an error in the specified handling of success (200 class) responses to INVITE requests. Elements following RFC 3261 exactly will misidentify retransmissions of the request as a new, unassociated, request. The correction involves modifying the INVITE transaction state machines and changing the way responses that