Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)

"Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com> Sun, 29 March 2020 13:34 UTC

Return-Path: <kinamdar@cisco.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B62813A08EF; Sun, 29 Mar 2020 06:34:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -7.699
X-Spam-Level:
X-Spam-Status: No, score=-7.699 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, DKIM_VALID_EF=-0.1, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=hfUA9aoM; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=VLE5doUc
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id p-BvUkHqLJS3; Sun, 29 Mar 2020 06:34:55 -0700 (PDT)
Received: from alln-iport-6.cisco.com (alln-iport-6.cisco.com [173.37.142.93]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 436E63A08EA; Sun, 29 Mar 2020 06:34:55 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=130557; q=dns/txt; s=iport; t=1585488895; x=1586698495; h=from:to:cc:subject:date:message-id:references: in-reply-to:mime-version; bh=/WYyDRZE0HcbkLOrpWNewwM/vqY70bKK86zn0dwkY+4=; b=hfUA9aoMEOMimIhcPu6fhgj8aiqNmVaoQyGN1japbNyXqpU2L8a42Y2d tGwn5Q6C+DUZnJ0IKhIrxODT+WB0rE0y1fwCxLEf8iX7Q+84VrQ4QyM5f bG6L690YLzK7DCSZmkY42jUMZNGRs87gpk4cooXvwrOLiqaOljcZnmrnA A=;
IronPort-PHdr: 9a23:+PQJDxd2caBGolc3Fcqopgh5lGMj4e+mNxMJ6pchl7NFe7ii+JKnJkHE+PFxlwGQD57D5adCjOzb++D7VGoM7IzJkUhKcYcEFnpnwd4TgxRmBceEDUPhK/u/bC08FcFOXUVN9HCgOk8TE8H7NBXf
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0AzCgBfo4Be/5NdJa1mHAEBAQEBBwEBEQEEBAEBgXuBJS8kBScFbFggBAsqhBqDRQOKa4I6JZgfgUKBEANQBAoBAQEMAQEYAQoKAgQBAYN/RQIXghokOBMCAwEBCwEBBQEBAQIBBQRthVYMhXABAQEBAgEBARAIAQgKEwEBJQcLAQQLAgEIEQECAQEBIQEJAgICJQsXBggCBA4FGwQDgjlLAYF+TQMOIAEOoEkCgTmIYnWBMoJ/AQEFhTQPCYIMAwaBOIwxGoFBP4ERJwwUgk0+gmcBAQKBJQkBDAYBCQkUAwYRAQcGC4JaMoIsjVsWDjMBgkeFeoonjlcRZgqCPIxxiiQdgkyIMJBwjVdNDJxsAgQCBAUCDgEBBYFpIio9cXAVOyoBgkFQGA2OHQeBIAEJgkKFFIVBdAIBgSaLDgEBAiSCGwEB
X-IronPort-AV: E=Sophos;i="5.72,320,1580774400"; d="scan'208,217";a="479929993"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-6.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 29 Mar 2020 13:34:53 +0000
Received: from XCH-RCD-002.cisco.com (xch-rcd-002.cisco.com [173.37.102.12]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id 02TDYrkM031327 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 29 Mar 2020 13:34:53 GMT
Received: from xhs-aln-001.cisco.com (173.37.135.118) by XCH-RCD-002.cisco.com (173.37.102.12) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 29 Mar 2020 08:34:53 -0500
Received: from xhs-rcd-002.cisco.com (173.37.227.247) by xhs-aln-001.cisco.com (173.37.135.118) with Microsoft SMTP Server (TLS) id 15.0.1497.2; Sun, 29 Mar 2020 08:34:52 -0500
Received: from NAM10-MW2-obe.outbound.protection.outlook.com (72.163.14.9) by xhs-rcd-002.cisco.com (173.37.227.247) with Microsoft SMTP Server (TLS) id 15.0.1497.2 via Frontend Transport; Sun, 29 Mar 2020 08:34:52 -0500
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ik1m8KYa4s8R2/H+mTYRqSeIIlZ+jocg8cSWYVghX6pnGjRFBm6D7wbuwYRme9z5YAwFrqqBMktuhmk4qTg0cupREDv1PqjKt0lR4HBFfylPXLlTyLGpbhD1NMmxrH841py/pFSf5FX6oqrsr9j73t68X0/e2KgX3qq2ZoO2J1pqzObTSQi3HlTIIZjHh63EqIhf2wRxRgwt9g3WaEZhLmhrhv0SaVR3JTLjeGULG/ZJzb6Hiu0sWCuJkEpOyBEanPnucqZUYpglFlwbLS9GNlZ96B5sxw2mVb6TsmTlVO7BMEfSCoPB88HcRkKnkTAVclKRdfPK/7gginbL3Rbgjw==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/WYyDRZE0HcbkLOrpWNewwM/vqY70bKK86zn0dwkY+4=; b=QyvX8ZcE/Ddz4CzU0eJEXFsWdkOJXq7perPoy2mJZgRkAaE3u+cd1r/KTJlGUWBPpBSx8kuqJQUMIA4dl1h3DJYf+DIiPwrRzBdTEouzDtgtnZQqkaNJ3X9pXSV7nQZpDm9trZXqBcFKYqyb/v5eqyBzBaeg5A9ati7qR9APAW6bSsdhk4anliOBDjyttIWW9zcsjIRMEZXD2aTV1U+foY4ZVNoBAE2cyevleGh/HdsJOuvop/17yAbYU59Je31onu7sz9yqAapb4d2cJNLMTSCt7VM7oDcN70HGILYLpUaVv5mViu5UGEAJpfAhNzCrlKcW49zWSMg4mPTHQNGqng==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=/WYyDRZE0HcbkLOrpWNewwM/vqY70bKK86zn0dwkY+4=; b=VLE5doUct+lUnKi3VCBqTfG2cPK6wVyt6gd6ciaThrYeHM8KED0xRNwbPV75HAd0+U43y5pb+obSHEZ0NJZCfIPFqKfm0hEMqe7msfm2cgids91HaFxR8E1mgRf+RPgrsvQpVlcD1C0unQk3qNShhH0VyNsX7ImlXlqbpM9ld28=
Received: from DM5PR11MB1609.namprd11.prod.outlook.com (2603:10b6:4:8::12) by DM5PR11MB1804.namprd11.prod.outlook.com (2603:10b6:3:114::7) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2856.20; Sun, 29 Mar 2020 13:34:51 +0000
Received: from DM5PR11MB1609.namprd11.prod.outlook.com ([fe80::f100:d306:a4d9:2ad3]) by DM5PR11MB1609.namprd11.prod.outlook.com ([fe80::f100:d306:a4d9:2ad3%11]) with mapi id 15.20.2856.019; Sun, 29 Mar 2020 13:34:50 +0000
From: "Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com>
To: Samir Srivastava <srivastava_samir@hush.com>
CC: "dispatch-chairs@ietf.org" <dispatch-chairs@ietf.org>, "dispatch@ietf.org" <dispatch@ietf.org>, Ben Campbell <ben@nostrum.com>, "Sreekanth Narayanan (sreenara)" <sreenara@cisco.com>
Thread-Topic: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)
Thread-Index: AQHV7fJsGco3tkiq3Ey8OuVoB7iPT6hD+imAgAF/nACADiqZAIAAZF+AgABIJGSAAIy5gIAADBmjgABzaYCAAFwopYAErQMLgACvTgCABQhagA==
Date: Sun, 29 Mar 2020 13:34:50 +0000
Message-ID: <C28CC555-1F93-44D7-8214-84FC37BE2A90@cisco.com>
References: <DM6PR11MB282538125DCFDEF0A1443DFDDDE80@DM6PR11MB2825.namprd11.prod.outlook.com> <73852274-8033-4864-94AC-AAC149A9E4E0@nostrum.com> <77C1ACC4-D5CA-4A27-8507-580304CC4655@nostrum.com> <2844E7A0-171E-41CA-B08E-55CADEE48BB0@nostrum.com> <B70ECBAE-AA83-4859-9851-17DAD94F4BFC@ericsson.com> <BYAPR11MB282170B57A64CC802DAB7E6BDDF30@BYAPR11MB2821.namprd11.prod.outlook.com> <A3B45452-D4D1-4EDB-85B0-E47B0BA99B0A@ericsson.com> <BYAPR11MB2821D2C79CA40997C76DA6B8DDF30@BYAPR11MB2821.namprd11.prod.outlook.com> <DF837026-E294-4222-9FDD-2107956C47EF@ericsson.com> <BYAPR11MB28215BFFF75D7AD40D6E849BDDF00@BYAPR11MB2821.namprd11.prod.outlook.com> <BYAPR11MB28219D35E823641E7707E3D9DDCF0@BYAPR11MB2821.namprd11.prod.outlook.com> <20200326141337.9C7E4A013D@smtp.hushmail.com>
In-Reply-To: <20200326141337.9C7E4A013D@smtp.hushmail.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/16.35.20030802
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kinamdar@cisco.com;
x-originating-ip: [2001:420:c0e0:1004::275]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: f128d02c-fd91-4103-aa73-08d7d3e5f514
x-ms-traffictypediagnostic: DM5PR11MB1804:
x-ms-exchange-transport-forked: True
x-microsoft-antispam-prvs: <DM5PR11MB1804E0BB510AD8863027A2ADD7CA0@DM5PR11MB1804.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 035748864E
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM5PR11MB1609.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFTY:; SFS:(10009020)(4636009)(39860400002)(136003)(396003)(346002)(376002)(366004)(4326008)(71200400001)(2616005)(2906002)(81156014)(36756003)(33656002)(186003)(107886003)(6512007)(81166006)(66946007)(66476007)(6486002)(316002)(8676002)(54906003)(966005)(86362001)(66446008)(66556008)(64756008)(6916009)(66574012)(478600001)(53546011)(30864003)(91956017)(76116006)(6506007)(8936002)(5660300002)(559001)(579004); DIR:OUT; SFP:1101;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: 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
x-ms-exchange-antispam-messagedata: SPe5ygS203MZWb7n098Gz631k6f9YXRpz+i9P6x+w3E96kmcW/NpNx1xTRbrC+6wz4P9Iq5hcMtCSEa1vnrOtAIathq/Rt61j0s/kf1SlIUPcIoLzp/UbO3R4gKsbgymdCwPpTNxVLClCeo2c4HTNxr1S26s/yDxHfWUyzJ3Qm4=
Content-Type: multipart/alternative; boundary="_000_C28CC5551F9344D7821484FC37BE2A90ciscocom_"
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: f128d02c-fd91-4103-aa73-08d7d3e5f514
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Mar 2020 13:34:50.6099 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: U2zUmjoPWef0EinP4UR5NG2A6Xq3xxZcfuRc+B5SpEJKUphA4sypqgKh4cfPSfvTT7ejAN+6AbhPpQVRTtvkNQ==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR11MB1804
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.37.102.12, xch-rcd-002.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/155v7cmr40P7n_xgpzfdISq6Bp0>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 29 Mar 2020 13:34:59 -0000

Why is there a need to have the PoC delivered as a milestone?This framework uses a HTTPS request/response transaction to solicit and obtain a capability set from a SIP service provider, such that the capability set is encoded in XML or JSON (eventually, it would be only XML or JSON and not both). HTTPS is ubiquitous and therefore, a demonstration of this transaction seems unnecessary.
Demonstration/Implementation of the ability of an edge element to obtain a capability set and translate that into configuration blocks is out of scope as different equipment vendors have different command sets to enable functionality.

--Kaustubh

From: Samir Srivastava <srivastava_samir@hush.com>
Date: Thursday, 26 March 2020 at 19:54
To: "Sreekanth Narayanan (sreenara)" <sreenara=40cisco.com@dmarc.ietf.org>, Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>, Ben Campbell <ben@nostrum.com>, "dispatch@ietf.org" <dispatch@ietf.org>
Cc: "dispatch-chairs@ietf.org" <dispatch-chairs@ietf.org>, Kaustubh Inamdar <kinamdar@cisco.com>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)

There is no mention about the RUNNING Code. I would like to see code for proof of concept to be delivered as milestone before we send it to IESG

Thanks
Samir Srivastava

On 3/26/2020 at 9:37 AM, "Sreekanth Narayanan (sreenara)" <sreenara=40cisco.com@dmarc.ietf.org> wrote:
All,

Here's the the updated version of the proposed charter of ASAP (Automatic SIP trunking And Peering) after addressing all concerns and comments so far. Further suggestions/comments are welcome.

The deployment of a Session Initiation Protocol (SIP)-based infrastructure in enterprise and service provider communication networks has been increasing gradually over the last few years. Consequently, direct IP peering between enterprise and service provider networks is replacing traditional methods of interconnection between enterprise and service provider networks.

Currently published standards provide a strong foundation over which direct IP peering can be realized. However, given the sheer number of these standards, it is often not clear which behavioural subsets, extensions to baseline protocols and operating principles ought to be configured by the enterprise network administrator to ensure successful peering with a SIP service provider network. This lack of context often leads to interoperability issues between enterprise and service provider SIP networks resulting in a considerable number of support cases being opened with enterprise equipment manufacturers and SIP service providers. Subsequently, deployment times for SIP trunking between enterprise and service provider networks increase.

This work would define a descriptive capability set, which is populated by a SIP service provider, and which, when communicated to an enterprise network, provides the enterprise network with sufficient information to setup SIP trunking with the SIP service provider. Such a capability set would not only result in SIP trunking deployment times being scaled down, but also would result in reduction of interoperability issues between enterprise and service provider network. Over the long run, operational costs for service providers and enterprise equipment manufactures would likely decrease as a result of fewer support cases.

This work would make use of HTTPS based framework that allows a SIP service provider to offload a detailed capability set to the enterprise network. HTTPS is used in favor of SIP for the following reasons:


  1.  Most SIP service providers require the enterprise network to first register a SIP trunk before any SIP traffic can be exchanged between the two networks. Accordingly, using a SIP-based method to obtain a detailed capability set from the SIP service provider (for example, SIP OPTIONS) would require the service provider to relax the requirement of enterprise networks first registering SIP trunks. This is a significant change and could serve as a barrier to adoption of the framework this work aims to produce.
  2.  Any modifications to existing SIP-based extensions to fit the objective of this work would require equipment manufacturers to upgrade their SIP stacks.

The scope of activity includes:

  *   Define a robust capability set which encapsulates sufficient information to ensure smooth IP peering between enterprise and service provider SIP networks.
  *   Define a data model for the capability set.
  *   Extensibility of the data model to allow proprietary parameters to be encoded.
  *   A HTTPS-based transport mechanism using which the capability set is communicated from the service provider network to the enterprise network.
  *   A mechanism to discover the capability server hosted in the SIP service provider network

The following is out of scope:

  *   Extensions to SIP that enable an enterprise network to solicit and obtain a descriptive capability set from a SIP service provider.
  *   A workflow/mechanism that allows service providers to directly configure devices in the enterprise network.

The group will produce

  *   Requirements, Use Cases and Architecture draft.
  *   Specification for SIP Auto Peer.
  *   This group will co-ordinate with the SIP core workgroup and the SIPConnect efforts carried out by the SIP Forum.

Milestones:
<Date TBD> Send protocol specification to IESG


Regards
Sreekanth

________________________________
From: Sreekanth Narayanan (sreenara) <sreenara@cisco.com>
Sent: Monday, March 23, 2020 9:53 AM
To: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>; Ben Campbell <ben@nostrum.com>; dispatch@ietf.org <dispatch@ietf.org>
Cc: Kaustubh Inamdar (kinamdar) <kinamdar@cisco.com>; dispatch-chairs@ietf.org <dispatch-chairs@ietf.org>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)

Hi Christer,


> >The SBC isn’t required to modify the capability set - it simply sources the HTTPS GET and parses the response. In what scenario would the SBC require to modify the capabilities?



>Assume you e.g., have some kind of transit network, which may limit the capabilities.


The capability set is provided by the ITSP that the enterprise trunk(s) registers to. Therefore, the ITSP that provided the capability set is expected to be the one that directly peers with the enterprise network. If however, in the event there is an intermediary, the ITSP that generates the capability set must include the caps of the network that directly peers with the enterprise, which in this case is the intermediary (after all, SIP trunk registration and call sending and receiving will be directly between the intermediary and the enterprise). This aspect will be discussed in the draft...

Regards
Sreekanth

________________________________
From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>
Sent: Monday, March 23, 2020 2:22 AM
To: Sreekanth Narayanan (sreenara) <sreenara@cisco.com>; Ben Campbell <ben@nostrum.com>; dispatch@ietf.org <dispatch@ietf.org>
Cc: Kaustubh Inamdar (kinamdar) <kinamdar@cisco.com>; dispatch-chairs@ietf.org <dispatch-chairs@ietf.org>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)


Hi,



>> Having to exchange capabilities before the registration/session is established is a concrete justification. Please explain that in the proposed charter,

>> because that would probably be one of the >most important inputs for this work :)

>

> We can accommodate this in the charter.



Thanks!



>> Regarding SBCs, one of the issues by using a non-SIP mechanism is that SBCs won’t be able to modify the capabilities – unless you intend to route the HTTPS traffic through the SBCs too.

>> Perhaps there won’t be any such intermediaries in the use-cases you have in mind, but we should discuss whether we are ok with that. My point is that, before we discuss protocol details, we

>> should be clear about what functionality, and what use-cases, we want to support.

>

>The SBC isn’t required to modify the capability set - it simply sources the HTTPS GET and parses the response. In what scenario would the SBC require to modify the capabilities?



Assume you e.g., have some kind of transit network, which may limit the capabilities.



Regards,



Christer









________________________________

From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>
Sent: Sunday, March 22, 2020 6:45 PM
To: Sreekanth Narayanan (sreenara) <sreenara@cisco.com>; Ben Campbell <ben@nostrum.com>; dispatch@ietf.org <dispatch@ietf.org>
Cc: Kaustubh Inamdar (kinamdar) <kinamdar@cisco.com>; dispatch-chairs@ietf.org <dispatch-chairs@ietf.org>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)



Hi,



>What are the SIP-based mechanisms you have in mind? If there are more than one, I assume the exchange of OPTIONS/200OK (with cap set in the body of the response) is one of them.



Yes. Most mechanisms can also be used with non-OPTION methods.



>Theoretically, while it is possible to leverage something like SIP OPTIONS, SIP trunking deployment realities between enterprise and service provider networks

>require the trunk to first be registered (SIP REGISTER/200OK) before any SIP traffic can be exchanged between the two networks, for example, an OPTIONS

>or even an INVITE to setup calls.



Having to exchange capabilities before the registration/session is established is a concrete justification. Please explain that in the proposed charter, because that would probably be one of the most important inputs for this work :)



>To that end, for a SIP-based solution to work, the service provider ought to change this behaviour, why would that method be advocated when there

>is an alternative? While this entire framework attempts to ease SIP trunking between enterprise and service provider networks, why must the framework

>use SIP? Why not HTTPS? Is is purely because this framework is related to "SIP" trunking?

>

> What are the advantages of using SIP over HTTPS in this specific scenario?

> What is the barrier to deployment of a SIP-based method as opposed to a HTTPS based method? I suspect the former is more difficult.



I am not saying it must use SIP – I am asking for a justification why HTTPS would be more feasible than SIP. If we are going to use a non-SIP protocol for exchanging SIP capabilities I think it is important for people to know why we want to use a non-SIP protocol.



>Here are some of the advantages for HTTPS:

>

>The service providers need only deploy HTTPS servers accessible over the Internet so that the enterprise can obtain a capability set.

>There is no change on the part of the service provider in terms of how they handle SIP..

>There is also very little change required on part of enterprise SBC vendors. Almost all SBCs today support HTTPS, XML & YANG.

>I would like to reiterate that using HTTPS in this context doesn't in any way mean that this is the new "normal" for soliciting and obtaining a remote SIP peers capability - the OPTIONS method >was designed for that. This is A scenario for which HTTPS is conducive and has nothing to do with creating a new way of communicating capabilities.



Regarding SBCs, one of the issues by using a non-SIP mechanism is that SBCs won’t be able to modify the capabilities – unless you intend to route the HTTPS traffic through the SBCs too.

Perhaps there won’t be any such intermediaries in the use-cases you have in mind, but we should discuss whether we are ok with that. My point is that, before we discuss protocol details, we should be clear about what functionality, and what use-cases, we want to support.



Thanks!



Regards,



Christer







________________________________

From: Christer Holmberg <christer.holmberg=40ericsson.com@dmarc.ietf.org>
Sent: Sunday, March 22, 2020 6:03 AM
To: Ben Campbell <ben@nostrum.com>; dispatch@ietf.org <dispatch@ietf.org>
Cc: Sreekanth Narayanan (sreenara) <sreenara@cisco.com>; Kaustubh Inamdar (kinamdar) <kinamdar@cisco.com>; dispatch-chairs@ietf.org <dispatch-chairs@ietf.org>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)



Hi,



AFAIK, the authors of the proposed charter didn’t reply to my latest comments (which I sent twice). They may have tried to address them in the latest version of the proposed charter, but I think it would have been useful to have a discussion on the list.



I think my main issue was describing why the existing SIP capability exchange mechanisms cannot be used.



The proposed charter now says:



>1. While there are extensions to baseline SIP that could potentially allow a capability set to be communicated from the service provider to the enterprise network,

>none of these extensions are readily usable to achieve the objective of this work.



This doesn’t say much. It would be useful with some text on why none of the extensions are readily usable.



>2. Any modifications to existing SIP-based extensions to fit the objective of this work would require equipment manufacturers to upgrade their SIP stacks.



This would also need more justification, because doesn’t SIP extensions in general require upgrading of SIP stacks?



Regards,



Christer







From: dispatch <dispatch-bounces@ietf.org> on behalf of Ben Campbell <ben@nostrum.com>
Date: Saturday, 21 March 2020 at 22.35
To: "dispatch@ietf.org" <dispatch@ietf.org>
Cc: "Sreekanth Narayanan (sreenara)" <sreenara=40cisco.com@dmarc.ietf.org>, "Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com>, "dispatch-chairs@ietf.org" <dispatch-chairs@ietf.org>
Subject: Re: [dispatch] PROPOSED CHARTER FOR ASAP (Automatic SIP trunking And Peering)



Hi Everyone,



Gonzalo S. wins the chair-appreciation award for being the first to respond to a chair request for input :-)



Anyone else? We will have a tight agenda on Monday; any chance we could close this topic prior to the meeting?



On Mar 12, 2020, at 3:14 PM, Ben Campbell <ben@nostrum.com> wrote:



Hi Again Everyone,



I know people have been more caught up in how we handle the cancelation of the IETF107 in-person meeting than in day to day DISPATCH email. One way we can handle that is to complete discussions on list rather than taking meeting time. This seems like a good candidate for that.



Thanks!



Ben.



On Mar 11, 2020, at 4:21 PM, Ben Campbell <ben@nostrum.com> wrote:



Hi Everyone,



The proponents have gone through a few revisions of the proposed charter (below) based on list feedback. At this point, we’d like to call the questions on what to recommend to to the ART ADs. Please respond to the following questions:



1. Is the topic described suitable for a reasonably short-lived mini-working group, without requiring a separate BoF first?



2. Is the charter a good starting point from which to develop a final charter (through the usual charter review process for new working groups)



3. Would you participate in a working group with a charter substantially similar to this one?



Note that we have agenda time allocated for this on an upcoming virtual meeting (details TBD), but if we can close these questions via email, we can give that time back to other things.



Thanks!



Ben.



On Feb 27, 2020, at 10:56 PM, Sreekanth Narayanan (sreenara) <sreenara=40cisco.com@dmarc....ietf.org> wrote:



All,



Here are the revisions to the proposed charter of ASAP (Automatic SIP trunking And Peering) after incorporating the latest comments. Suggestions/comments are welcome.





The deployment of a Session Initiation Protocol (SIP)-based infrastructure in enterprise and service provider communication networks is increasing at a rapid pace. Consequently, direct IP peering between enterprise and service provider networks is quickly replacing traditional methods of interconnection between enterprise and service provider networks.



Currently published standards provide a strong foundation over which direct IP peering can be realized. However, given the sheer number of these standards, it is often not clear which behavioural subsets, extensions to baseline protocols and operating principles ought to be configured by the enterprise network administrator to ensure successful peering with a SIP service provider network. This lack of context often leads to interoperability issues between enterprise and service provider SIP networks resulting in a large number of support cases being opened with enterprise equipment manufacturers and SIP service providers. Subsequently, deployment times for SIP trunking between enterprise and service provider networks increase significantly.



This work would define a descriptive capability set, which is populated by a SIP service provider, and which, when communicated to an enterprise network, provides the enterprise network with sufficient information to setup SIP trunking with the SIP service provider. Such a capability set would not only result in SIP trunking deployment times being drastically scaled down, but also would result in a significant decrease in interoperability issues between enterprise and service provider network. Over the long run, operational costs for service providers and enterprise equipment manufactures would likely decrease as a result of fewer support cases.



This work would make use of HTTPS based framework that allows a SIP service provider to offload a detailed capability set to the enterprise network. HTTPS is used in favor of SIP for the following reasons:

1. While there are extensions to baseline SIP that could potentially allow a capability set to be communicated from the service provider to the enterprise network, none of these extensions are readily usable to achieve the objective of this work.

2. Any modifications to existing SIP-based extensions to fit the objective of this work would require equipment manufacturers to upgrade their SIP stacks.



The scope of activity includes:



* Define a robust capability set which encapsulates sufficient information to ensure smooth IP peering between enterprise and service provider SIP networks.

* Define a data model for the capability set.

* Extensibility of the data model to allow proprietary parameters to be encoded.

* A HTTPS-based transport mechanism using which the capability set is communicated from the service provider network to the enterprise network.

* A mechanism to discover the capability server hosted in the SIP service provider network



The following is out of scope:

* Extensions to SIP that enable an enterprise network to solicit and obtain a descriptive capability set from a SIP service provider.

* A workflow/mechanism that allows service providers to directly configure devices in the enterprise network.



The group will produce

* Requirements, Use Cases and Architecture draft.

* Specification for SIP Auto Peer.



This group will co-ordinate with the SIP core workgroup and the SIPConnect efforts carried out by the SIP Forum.



Milestones:

<Date TBD> Send protocol specification to IESG



_______________________________________________
dispatch mailing list
dispatch@ietf.org
https://www.ietf.org/mailman/listinfo/dispatch







_______________________________________________
dispatch mailing list
dispatch@ietf.org
https://www.ietf.org/mailman/listinfo/dispatch