Re: [Asap] ASAP: Introduction & Way Forward

"Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com> Thu, 29 October 2020 06:07 UTC

Return-Path: <kinamdar@cisco.com>
X-Original-To: asap@ietfa.amsl.com
Delivered-To: asap@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A4CCB3A0BA4 for <asap@ietfa.amsl.com>; Wed, 28 Oct 2020 23:07:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -9.598
X-Spam-Level:
X-Spam-Status: No, score=-9.598 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, RCVD_IN_MSPIKE_H3=0.001, RCVD_IN_MSPIKE_WL=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=unavailable autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=ESMKoilw; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=l1hx7c3r
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id lehgTPFb0CCj for <asap@ietfa.amsl.com>; Wed, 28 Oct 2020 23:07:47 -0700 (PDT)
Received: from alln-iport-5.cisco.com (alln-iport-5.cisco.com [173.37.142.92]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 85EA83A0BA5 for <asap@ietf.org>; Wed, 28 Oct 2020 23:07:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=12826; q=dns/txt; s=iport; t=1603951667; x=1605161267; h=from:to:cc:subject:date:message-id:references: in-reply-to:content-id:content-transfer-encoding: mime-version; bh=//t25PERP1WQge/nSoms7qFfuVPwTcF421xG1FDTP34=; b=ESMKoilwM/RyJc0i7acMtaVSju4m1mS5hMZ1fiKptP6nYuwkR7w/cD9H 9OBX1gRND0ID2bTIxU96uLv/PSv4GRtQCedkIrzFlc0APEsjCypAWkNYe E5X3bfkMzkLx8ddtTWmg2NpxjQxbaLR1gDojVw6/Q9xHbB2o+pfsfVvwb U=;
IronPort-PHdr: 9a23:arurPx+B0rgLqv9uRHGN82YQeigqvan1NQcJ650hzqhDabmn44+7ZhCN6fBkllSPXIjH5bRDkeWF+6zjWGlV55GHvThCdZFXTBYKhI0QmBBoG8+KD0D3bZuIJyw3FchPThlpqne8N0UGFMP3fVaUo3Cu43gVABqsfQZwL/7+T4jVicn/3uuu+prVNgNPgjf1Yb57IBis6wvLscxDiop5IaF3wRzM8XY=
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0C6CQB6W5pf/4MNJK1XCYEJgyEjLgdwWS8tCoQzg0kDjUiKEI5rgUKBEQNVCwEBAQ0BARgLCgIEAQGESgIXgW4CJTgTAgMBAQsBAQUBAQECAQYEbYVhDIVyAQEBBAEBEBERDAEBLAsBDwIBCBEBAgEBAQMCJgICAh8GCxUCBggCBA4FIoMEAYJLAy0BAQ6jIgKBO4hodoEygwQBAQWBNwIOQUSCWg0LghADBoEOKoJyg3CGVxuBQT+BESccgk0+ghpCAQECAQGBJgEICQIBCC+DADOCLJAMJAsJgxWjLThUCoJriQeGXoYLhRADH4MXig6FSY5ynjiCbZJXAgQCBAUCDgEBBYFrI2dwcBU7KgGCPlAXAg2OJgUXg06FFIVEdAI2AgYBCQEBAwl8jDsBgRABAQ
X-IronPort-AV: E=Sophos;i="5.77,429,1596499200"; d="scan'208";a="589638421"
Received: from alln-core-1.cisco.com ([173.36.13.131]) by alln-iport-5.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 Oct 2020 06:07:46 +0000
Received: from XCH-RCD-004.cisco.com (xch-rcd-004.cisco.com [173.37.102.14]) by alln-core-1.cisco.com (8.15.2/8.15.2) with ESMTPS id 09T67kWo007929 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Thu, 29 Oct 2020 06:07:46 GMT
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by XCH-RCD-004.cisco.com (173.37.102.14) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 29 Oct 2020 01:07:45 -0500
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Thu, 29 Oct 2020 02:07:44 -0400
Received: from NAM12-BN8-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Thu, 29 Oct 2020 02:07:44 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=kmLMjHVCB1c1BQYOjR91n0+amI/VjsJPxTgfB6zWnpXkyYbUgi63EkyCyDPHd5uB88blM7bFtEZMtQ5v7G6dSwIq/mOqj/jPvgp4TVPa3H54QjFXjOQn1z78koRRi1PvINROwoWzgW3ZDxcgroqpNAVSUjNvkgVJgJRD7bVKcxL+Oqgy3Fb7hZrv1kO4fJxoBsHiS5Cj18NwNtzMUmWo/g0IS60+3awKwRl036NYeK4jrXxUkT5Xbu4YTATZeUvnib6Np3TMpC8xcY7/OGqfxgK4/ZcYPtUNNgOJ46Gl/vv6HUy5bFFHRrN6xuvZ/cCBh+6pXWgqxWgwFSoQKlZg4w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=//t25PERP1WQge/nSoms7qFfuVPwTcF421xG1FDTP34=; b=FicWX8zXXlhZ3ftzorEbKmMIyiIiYafvdy7UK1Bzc5LoOx75OOSAOfvW7pxM8rRqUpjfwyQyxYuYttMAze0W1jK+KO29Hhw8ZI40DmgzcDdpLpn49SdYD00gkLx8U6r9TOzTK2I1qwnBIKbwlSgmVIY0XcODmMioAj03vHi+/j/wRoXBejjxNMTBeTyq14/vs7wt+c2vHJZ320QUlhR75dOFjCoWN375BZflB05ZfzUbX9ixa6s4chKlwI2Poxcrj44XI5y0kbGLVnonosRK+KvW5CrHlzxXc8XSEO8pOH9OXqmS08k0lQMibq9cT8NfFHQj3t/HEU1RSkJrbegnhw==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=//t25PERP1WQge/nSoms7qFfuVPwTcF421xG1FDTP34=; b=l1hx7c3r+TDxMqPNaB7EcHYqoRJjRqwb2/xWqgdcnWjlsDbfyQYaZ4uhKIS88QO9iefVEwiYnzGGnmvV3myFPCa/nuuySnNG8GegvHTamjWQR1o8KtN2LI59DtW6jOrQ+RGnjAHnrDGjXEsCpGIs5wPcVUfmNM7Hpx1oAgnXHAI=
Received: from MWHPR11MB1774.namprd11.prod.outlook.com (2603:10b6:300:10a::19) by MWHPR11MB0029.namprd11.prod.outlook.com (2603:10b6:301:67::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3499.27; Thu, 29 Oct 2020 06:07:43 +0000
Received: from MWHPR11MB1774.namprd11.prod.outlook.com ([fe80::304c:59be:7ef1:9340]) by MWHPR11MB1774.namprd11.prod.outlook.com ([fe80::304c:59be:7ef1:9340%3]) with mapi id 15.20.3477.029; Thu, 29 Oct 2020 06:07:43 +0000
From: "Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com>
To: "Ram Mohan R (rmohanr)" <rmohanr=40cisco.com@dmarc.ietf.org>
CC: "asap@ietf.org" <asap@ietf.org>
Thread-Topic: [Asap] ASAP: Introduction & Way Forward
Thread-Index: AQHWp9Bes6+6yMf/OUqyBv8vSJ8kGKmircGAgAkUSYCAAAskAIACswQA
Date: Thu, 29 Oct 2020 06:07:43 +0000
Message-ID: <601F996A-E588-43A7-A979-766F5D0738C9@cisco.com>
References: <7CC89A67-86D2-47F9-A443-E4ADABB20922@cisco.com> <11627038-9D73-484A-8B11-EE98B75CB095@cisco.com> <ED41564B-8FDF-412A-971F-C1CA63123A5B@cisco.com> <7ADE4CD7-BAD0-416E-A9FE-1C572D6D435D@cisco.com>
In-Reply-To: <7ADE4CD7-BAD0-416E-A9FE-1C572D6D435D@cisco.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.42.20101102
authentication-results: dmarc.ietf.org; dkim=none (message not signed) header.d=none;dmarc.ietf.org; dmarc=none action=none header.from=cisco.com;
x-originating-ip: [49.207.200.99]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3eeeb1fa-f015-4f75-e7f4-08d87bd0f316
x-ms-traffictypediagnostic: MWHPR11MB0029:
x-microsoft-antispam-prvs: <MWHPR11MB002959A5D5F3BB5549C658A2D7140@MWHPR11MB0029.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: Q8C71Lo0e3JpTT18cg11dXdUetHEJev0KVTzsR7mPLi5KJqx2BjMw2kfyjXcPjjnahvW7DjPHGtNxDudiyLMSJb0iK9TUD98X9X2ZGgZTjxMOGO9oJD+7A+ITejZk/JwruuUPtEV1TKs6eUhtt/TmTFsXkTVBpNbD+33bDbAV28UHbB/34a2FSMAm//5OgB8U6+QwEjbfoHmFEOBTnUrw631h9ZT+Uzc666BhmakL1P5nrIFHYEiNl8LuLXSkoWOs9+oOaYcraGZG+OIAzA6ZK0Z0E39emI35W0DPBZO0nHy6AktGcrOQzqptblJevETBaxQpXnKbE5fsMVdRTVoVSRTYKzCHEyaeY8xsO0/EtgErbuSCraBl7E6OFDpjncBhXlk1LdkUoXCaXDl9lxV6Q==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:MWHPR11MB1774.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(396003)(136003)(366004)(376002)(346002)(39860400002)(26005)(6486002)(55236004)(53546011)(6506007)(186003)(66446008)(64756008)(86362001)(36756003)(66556008)(66476007)(71200400001)(66946007)(2616005)(83380400001)(66574015)(5660300002)(316002)(8676002)(8936002)(2906002)(478600001)(966005)(91956017)(76116006)(33656002)(4326008)(6512007); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata: n850Yxg63Xcp2vhTywxUGman8Jt3T2Q+pR3uJqVX8isHtyTci1xLHiUQdokeSVvW8iEsl77JoBbjGTnthrpqEwwCPhbFKpqzubn12cbQiiubFTxKsVb+vQwlKZK6o5XAi95dBlf2wkcpW0qZ8lwI14/n2AODSP8r5rK5asAORFTJylA75Y3WEhXdO153AlWo3rCTbiCLC2hRoaiYONCINJwp9nP02iqvxpJSo0D7kQoxLV7fWarHgRr2BUo1Yb16gYl8MY/DdiKxP6x4xy3MtFO9uKFID5C/WhWi+QwfcLatG0AESBd8E5r81k5+AMvqpnmlMOKc6xV9x1Onf+2eTIOWTaMAU7QUqw5SlyoVe6iTO17tQpJdpQiaI4LY1GOPcCLBoZqAmmPmd12CKcNeWgYRgKz8V2hKnDl5Z2gPa7dpob4IdcO16v+UisX5UlUkGyWcXhshsnWfA1kA7Ip7eGaWFPH1xz0me8g5YLdFI+wBaB2iRpLwcKsUMibKYjS77WCzNYvkq/wztVmLMr5uxsmvFCXRG5adbpjNhM0S7wvivcgt9KWHIxK3uH90ZIhqaZpJ0Lz6mKXKglkbTlVLlnTVuniIIT73xuPVT0Uo/q0pPC0ukfBc1gZzztWzOk1ROoI73J2Ud7+hG5qjDyh8Xg==
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <0890BAC48C8286468670957CCF8994D4@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: MWHPR11MB1774.namprd11.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3eeeb1fa-f015-4f75-e7f4-08d87bd0f316
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Oct 2020 06:07:43.4024 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: pT+h4rQmF8zEMlzsa0s1javyOzD11LmUF/d/F0lU9KVBLI84JmXw7s0HLTmJWhq+ytej5xEjvmG6+8UkTOhtPA==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: MWHPR11MB0029
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.14, xch-rcd-004.cisco.com
X-Outbound-Node: alln-core-1.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/asap/e2_nt2lsoXEymV38xchB3LV34u0>
Subject: Re: [Asap] ASAP: Introduction & Way Forward
X-BeenThere: asap@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: Automatic SIP trunking And Peering WG <asap.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/asap>, <mailto:asap-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/asap/>
List-Post: <mailto:asap@ietf.org>
List-Help: <mailto:asap-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/asap>, <mailto:asap-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 29 Oct 2020 06:07:50 -0000

Hi Ram,
Thanks for your comments, please find my responses inline.


On 27/10/2020, 18:24, "Asap on behalf of Ram Mohan R (rmohanr)" <asap-bounces@ietf.org on behalf of rmohanr=40cisco.com@dmarc.ietf.org> wrote:

    I just had a glance at some of the sections in the draft, did not read in depth though and here are some comments: 

    1) Section 3 3.  Reference Architecture defines SBC terminology, would it not be better to reference/re-use rfc5853 and / or rfc7092 terminology that already defines types of SBC/B2BUAs rather than creating new ones?
        Kaustubh: I don't think we introduce any new terminology here. "Edge Element" need not always be an SBC or a B2BUA, it could be a general purpose device that obtains the service provider capability set from the ITSP. A  
        Reference to RFC 5853/7092 could be added where we talk about SBCs/B2BUAs.

    2) In section 4

    >The enterprise network creates a well
    >formed HTTPS GET request to solicit the service provider capability set

     How often will this happen ? how will enterprise get updated config(if/when it changes on SP side) ?
 
     Kaustubh: Section 7 of the draft talks about this. 

    3)  >This workflow is based on HTTP version 1.1

     Is there a specific reason to restrict to HTTP 1.1 ?

     Kaustubh: The workflow described in this draft is based on HTTP 1.1 and as such ought to work with HTTP 2.0 as well. We will make the appropriate modifications to the text to convey this point.

    4)  In the section 9, 

     - 4.1)  would it be valuable to include SRV domain(for sip/sips service) in the peering capability response from ITSP ? for cases where enterprise edge SBC uses SRV lookup to resolve would be good to learn the SRV  of the SP domain via the peering config GET rather than requiring admin to configure/learn via other means.

     Kaustubh: We can add this in.

     - 4.2)  Also in section9 where you have included SRTP keying method (SDES / DTLS-SRTP) would it be useful to also include SRTP cipher suites the SP SBC side can allow to passthrough/support ?

   Kaustubh: We can add this in.

    5)  The current draft allows a way for enterprise SBC to learn SP side peering config, would there be a need/motivation for SP side also to learn enterprise side configs ? 
  
    Kaustubh: I don't see a situation wherein this would be needed.

    Regards,
    Ram

        From: Kaustubh Inamdar <kinamdar@cisco.com>
        Date: Wednesday, 21 October 2020 at 23:05
        To: "asap@ietf.org" <asap@ietf.org>
        Cc: Murray Kucherawy <superuser@gmail.com>, "Gonzalo Salgueiro (gsalguei)" <gsalguei@cisco.com>
        Subject: Re: [Asap] ASAP: Introduction & Way Forward



        Apologies. I sent the previous email without the URL of the latest version of the draft:

        https://datatracker.ietf.org/doc/draft-kinamdar-dispatch-sip-auto-peer/

        Thanks,
        Kaustubh

        From: Kaustubh Inamdar <kinamdar@cisco.com>
        Date: Wednesday, 21 October 2020 at 23:04
        To: "asap@ietf.org" <asap@ietf.org>
        Cc: Murray Kucherawy <superuser@gmail.com>, "Gonzalo Salgueiro (gsalguei)" <gsalguei@cisco.com>
        Subject: Re: [Asap] ASAP: Introduction & Way Forward



        Hi,
        We have gone ahead and added two new parameters to the capability set, namely:


        1. A parameter using which a service provider can specify the DID number range allocated to an enterprise.
        2. A parameter encapsulating the URL of a .pem encoded file containing the certificate chain of the service provider – this is useful for SIP over TLS between enterprise and service provider networks.


        Happy to hear any thoughts/comments on the draft.

        Thanks,
        Kaustubh

        From: Asap <asap-bounces@ietf.org> on behalf of "Sreekanth Narayanan (sreenara)" <sreenara=40cisco.com@dmarc.ietf.org>
        Date: Monday, 21 September 2020 at 22:35
        To: "asap@ietf.org" <asap@ietf.org>
        Cc: Cullen Jennings <fluffy@iii.ca>
        Subject: Re: [Asap] ASAP: Introduction & Way Forward



        Hi All,



        Of the four high-level items listed in the previous email, below are considerations for two of them, namely: 

        1. Modifications to the existing capability set
        2. Inclusion of a STIR specific section.


        From the perspective to modifications to the capability set, we suggest an addition - namely the DID Range allocated by an Internet Telephony Service Provider (ITSP) to the enterprise. This DID range may be continuous or disparate. This parameter is useful for an enterprise in configuring dial plans on edge elements such as SBCs. Additionally, most service providers require the calling number presented by an enterprise network for outgoing calls to fall within the allocated DID range.



        From the perspective of STIR, a section specific to secure telephony identity could include the following:



        a.  Parameter indicating whether the ITSP is STIR/SHAKEN compliant: This parameter could allow the enterprise to determine whether it needs to run a STIR Verification Service (VS) to cryptographically determine whether or not the identity presented by the caller is legitimate. While a STIR compliant provider would have a locally running VS to decode the PASSporT and provide an attestion level of A B or C, the enterprise might want to repeat the exercise and determine how to handle the call based on local policy.



        b.  Parameter indicating whether the ITSP supports Rich Call Data (RCD) PASSporTs: Going forward, enterprise networks would be able to sign PASSporTS that contain Rich Call Data (RCD) before presenting the INVITE to their service providers. In such situations, it would be useful for the enterprise to determine whether the service provider supports RCD PASSporTs. Additionally, some of the constructs required to obtain delegate certificates could also be included in the capability set. For example, the directory URL of the ACME server and the scope of delegate certificates an enterprise is authorized to obtain.



        Additionally, there could be other considerations for STIR that might warrant discussion:


        1. STIR OOB CPS hostname/IP for enterprise VS to pull PASSporTs
        2. In case of CPS federation between service providers, the IP/hostname of the CPS for PASSporT placement for outbound calls from the enterprise.


        We would be happy to hear any thoughts you'll have on the above parameters as well as the existing parameters in the capability set. If we have overlooked or missed anything in the list, we would want to close those gaps.




        Regards

        Sreekanth



        ________________________________________

        From: Sreekanth Narayanan (sreenara)
        Sent: Wednesday, August 26, 2020 6:02 PM
        To: asap@ietf.org <asap@ietf.org>
        Cc: Cullen Jennings <fluffy@iii.ca>
        Subject: ASAP: Introduction & Way Forward 



        Hi All, 


        Thank you for subscribing to the ASAP mailing list. For the benefit of folks that are new to this effort, below is a summary



        ---

        With the advent of SIP trunking, enterprise networks are increasing peering with their service providers over SIP in favour of traditional interconnection methods such as ISDN circuits and analog lines. However, due to the large number of extensions to baseline SIP & RTP and other minor considerations (formatting of the calling number, for example) administrators spend several time cycles in coming up with a configuration block that allows enterprise networks to effectively peer with their service providers over SIP. The following draft (https://tools.ietf.org/html/draft-kinamdar-dispatch-sip-auto-peer-03) defines a parameter set (and a corresponding data model), which when populated by a service provider and which when communicated to an enterprise network provides the administrator sufficient information to configure SIP trunking with the service provider.

        ---



        In order to get the draft referenced above to be formally adopted by the ASAP working group, the authors believe it would be helpful to engage in a discussion about the following so as make the draft representative of the largest possible chunk of considerations that arise/may arise(as related work matures) when deploying SIP trunking with telephony service providers.




        1. Modifications to the capability set.
        2. Inclusion of a STIR specific section
        3. Inclusion of a section for certificate management
        4. Using WebFinger as a mechanism for service discovery.




        We would like to ideally have a separate discussion thread for each of the items listed above. This mail serves as a starting point for those who are new to ASAP and would like to get familiar with the idea. A subsequent mail will cover detailed notes about each of the aforementioned points. In the meantime, we would be happy to address any thoughts or objections that you'll might have.





        Regards

        Sreekanth

    -- 
    Asap mailing list
    Asap@ietf.org
    https://www.ietf.org/mailman/listinfo/asap