Re: [dispatch] New Version Notification for draft-kinamdar-dispatch-sip-auto-peer-00.txt

"Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com> Sun, 22 September 2019 16:12 UTC

Return-Path: <kinamdar@cisco.com>
X-Original-To: dispatch@ietfa.amsl.com
Delivered-To: dispatch@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B2EAA1200E7 for <dispatch@ietfa.amsl.com>; Sun, 22 Sep 2019 09:12:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -14.5
X-Spam-Level:
X-Spam-Status: No, score=-14.5 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, URIBL_BLOCKED=0.001, USER_IN_DEF_DKIM_WL=-7.5] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=cisco.com header.b=aUmNFSpR; dkim=pass (1024-bit key) header.d=cisco.onmicrosoft.com header.b=kCJeyQf5
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id g6rqIFjEC9wj for <dispatch@ietfa.amsl.com>; Sun, 22 Sep 2019 09:12:25 -0700 (PDT)
Received: from alln-iport-4.cisco.com (alln-iport-4.cisco.com [173.37.142.91]) (using TLSv1.2 with cipher DHE-RSA-SEED-SHA (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5B84C1200F7 for <dispatch@ietf.org>; Sun, 22 Sep 2019 09:12:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=cisco.com; i=@cisco.com; l=14620; q=dns/txt; s=iport; t=1569168745; x=1570378345; h=from:to:subject:date:message-id:references:in-reply-to: content-id:content-transfer-encoding:mime-version; bh=FsKgSx6rhxbsGkxQPHdeKSvwdTjcVsbbU0up6GEIQjU=; b=aUmNFSpRA0qhLkmcd5n/eyr7DUjK1UoeNu4Ym99nbTg70wjW7pw37e0u vtCNqHa1LvQZk3vtjGeZ5XjeLbYCJ3aC5ZW7r3jbRtkjVsRIGMXgITYei 3H+3z14pAQxdzbeunPalKUcqMZHoAgs/WVGrLAc1NGh7f8Q61ZhUyidXs s=;
IronPort-PHdr: 9a23:ivJDmxJ2SqsAGcDilNmcpTVXNCE6p7X5OBIU4ZM7irVIN76u5InmIFeBvKd2lFGcW4Ld5roEkOfQv636EU04qZea+DFnEtRXUgMdz8AfngguGsmAXE76KvfvYyUgNM9DT1RiuXq8NBsdFQ==
X-IronPort-Anti-Spam-Filtered: true
X-IronPort-Anti-Spam-Result: A0A9AQCknIdd/5NdJa1cCRwBAQEEAQEMBAEBgVUFAQELAYFKUANtViAECyqDYkCDRwOKdU2BaiWXdIEugSQDVAkBAQEMAQEYDQgCAQGDekUCF4JyIzYHDgIDCQEBBAEBAQIBBQRthS0MhUsBAQECAQEBCgYREQwBASwJAwQLAgEGAhoCJgICAiULFRACBAESFA6DAAGBagMODwECDI06kGECgTiIYXOBMoJ9AQEFgTcCDkFAgkMYghcJgQwoAYwIGIFAP4E4DBOCFzU+gmEBAQIBAYEzQYJ0MoImjHEBMgGCNYVNlntuCoIihwWOBRuCNnKGWY8kjhqIE5ECAgQCBAUCDgEBBYFZDCWBWHAVGiEqAYJBCUcQFIFOg3KFFIU/cwGBKItpB4JNAQE
X-IronPort-AV: E=Sophos;i="5.64,537,1559520000"; d="scan'208";a="330861633"
Received: from rcdn-core-11.cisco.com ([173.37.93.147]) by alln-iport-4.cisco.com with ESMTP/TLS/DHE-RSA-SEED-SHA; 22 Sep 2019 16:12:24 +0000
Received: from XCH-ALN-013.cisco.com (xch-aln-013.cisco.com [173.36.7.23]) by rcdn-core-11.cisco.com (8.15.2/8.15.2) with ESMTPS id x8MGCNVi025554 (version=TLSv1.2 cipher=AES256-SHA bits=256 verify=FAIL); Sun, 22 Sep 2019 16:12:23 GMT
Received: from xhs-rtp-001.cisco.com (64.101.210.228) by XCH-ALN-013.cisco.com (173.36.7.23) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sun, 22 Sep 2019 11:12:23 -0500
Received: from xhs-rtp-003.cisco.com (64.101.210.230) by xhs-rtp-001.cisco.com (64.101.210.228) with Microsoft SMTP Server (TLS) id 15.0.1473.3; Sun, 22 Sep 2019 12:12:22 -0400
Received: from NAM02-BL2-obe.outbound.protection.outlook.com (64.101.32.56) by xhs-rtp-003.cisco.com (64.101.210.230) with Microsoft SMTP Server (TLS) id 15.0.1473.3 via Frontend Transport; Sun, 22 Sep 2019 12:12:22 -0400
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=dA1YDqOOq+XyPnpb3zN1EPGfqpnemxbzeFG+T1Th7ULCkoQba0tefJ17IjGaVgAZmIwb/UO+3Wf0sDBnVQBvSw3J8oOL6Vf8w2cajJ0AveMTHlpEdlIhsDmj4lkYyJrlc/X6bdo24Hl3LEra1/msSg5nkv8vXxs/WSwlP7zlFNfBceGuw+ZKouOt5Pm1JfvPQoF+aJ9dy7vLvWUKtyK7ln2zEG/26k4JEoSfSWuR1p1Kp0H+DmJ4VywSkIpAnCqo7yPTtpRyr70fW0s0xv9O5kDL2WSSANUb1AL/aYp1/5smBG8Z4wnrYXkQQe2mTDqhYMOeMsOH49zmnVbsiMZy3g==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FsKgSx6rhxbsGkxQPHdeKSvwdTjcVsbbU0up6GEIQjU=; b=Yyp5PQZ8aaW1sy3t9UXvyXLOZmllYNO2wkp32XIvwV5QXt4rxaAdId5KCOq2u0duc/EeIxoiMBfxMDzgfM3b/GyXZrEVmJMNeta8w7lUifkwxLLt1pyVBV4kQcOhtiVFHKd/MfAT4ks8rgG8e49mKnN+GNNvhRQNdV2dYjaTW2gBAxhFHhP1dLLoGmHLmI3MEL0bAmfv7cbdk0We4xBbAtkvwQGM4glUFOukDihPaobHMQ14J27a5EGcaTCd0KuxCo4KYtYKaQQTvdCqFcCUSPw/QzuxeNcLZib66Y8uePEonnOajyTc4FDjz8ZGJXu/XG3Vl3wIKHMTIzYKcE2Ocg==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=cisco.com; dmarc=pass action=none header.from=cisco.com; dkim=pass header.d=cisco.com; arc=none
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cisco.onmicrosoft.com; s=selector2-cisco-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=FsKgSx6rhxbsGkxQPHdeKSvwdTjcVsbbU0up6GEIQjU=; b=kCJeyQf5qWMSb7Bu6Cy0gwGV2zK1zsfwiMWoCJhUPcS8VI/3ntDTK0HsrPO9gvaqxIomGsXeAWEeN5T/E87Q/6vJTzWIvQ7mpwZkXhhQ7cWYFnBqot8rFysYTUeTNORO9NPwM9AwWWdcIdnS7Nn6ir1BBtRADFfj0G6XRAZaeZI=
Received: from SN6PR11MB2928.namprd11.prod.outlook.com (52.135.124.19) by SN6PR11MB3312.namprd11.prod.outlook.com (52.135.110.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.2284.18; Sun, 22 Sep 2019 16:12:21 +0000
Received: from SN6PR11MB2928.namprd11.prod.outlook.com ([fe80::2470:e79f:7c34:2e2f]) by SN6PR11MB2928.namprd11.prod.outlook.com ([fe80::2470:e79f:7c34:2e2f%6]) with mapi id 15.20.2284.023; Sun, 22 Sep 2019 16:12:21 +0000
From: "Kaustubh Inamdar (kinamdar)" <kinamdar@cisco.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>, "dispatch@ietf.org" <dispatch@ietf.org>
Thread-Topic: New Version Notification for draft-kinamdar-dispatch-sip-auto-peer-00.txt
Thread-Index: AQHVaRyi0fBHq8Wtl0KFwomJG16+yqcveTyAgACdVpCAAoChgP///ZSAgAW2N4A=
Date: Sun, 22 Sep 2019 16:12:20 +0000
Message-ID: <50A4FED6-696A-4160-BA78-35C08DDA5015@cisco.com>
References: <156825995534.13361.10232150689686123584.idtracker@ietfa.amsl.com> <DB05AE1C-7CD4-4BC6-BABB-2E8070CA29FB@cisco.com> <HE1PR07MB3161A9B78BC715149776621B938F0@HE1PR07MB3161.eurprd07.prod.outlook.com> <BF42E80F-F14A-416F-AF9F-6D35C59836AB@cisco.com> <HE1PR07MB316141DDCC915396ABC9246B93890@HE1PR07MB3161.eurprd07.prod.outlook.com>
In-Reply-To: <HE1PR07MB316141DDCC915396ABC9246B93890@HE1PR07MB3161.eurprd07.prod.outlook.com>
Accept-Language: en-US
Content-Language: en-GB
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
user-agent: Microsoft-MacOutlook/10.1d.0.190908
authentication-results: spf=none (sender IP is ) smtp.mailfrom=kinamdar@cisco.com;
x-originating-ip: [2001:420:c0e0:1006::198]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 160bd36d-6f74-4aae-699b-08d73f77a5b6
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600167)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:SN6PR11MB3312;
x-ms-traffictypediagnostic: SN6PR11MB3312:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <SN6PR11MB33129F1E1050B5BCA512244BD78A0@SN6PR11MB3312.namprd11.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 016885DD9B
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(4636009)(396003)(136003)(39860400002)(376002)(366004)(346002)(199004)(189003)(53754006)(36756003)(8676002)(33656002)(6486002)(46003)(305945005)(81156014)(7736002)(8936002)(2616005)(476003)(446003)(81166006)(11346002)(486006)(229853002)(14454004)(71200400001)(966005)(15650500001)(76176011)(53546011)(6436002)(186003)(25786009)(6506007)(86362001)(6116002)(478600001)(76116006)(91956017)(66946007)(66446008)(64756008)(66556008)(66476007)(102836004)(2906002)(58126008)(99286004)(110136005)(14444005)(316002)(71190400001)(5660300002)(6246003)(256004)(66574012)(6512007)(6306002)(2501003); DIR:OUT; SFP:1101; SCL:1; SRVR:SN6PR11MB3312; H:SN6PR11MB2928.namprd11.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1;
received-spf: None (protection.outlook.com: cisco.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: KxLYV2S5sEDg+HFHlKEbfCvFIUJVN80Kz6TUHaen2SoW33UGarUgDNhHjp5kwOpDJhOcKgm4x5lp1Hf3yuKLQNK758E4OmCm/N9E3Q7GrTdwYjERrmtzSQ6PFW/+6zUtpWjFsqgCR+hFFRuFDzH3aWQ4Zoqkl6VNd4GMDt4v6ZuF+5LuekwRWGKZ40MPzpZHMZETx4VFX9svnOhKbJTtSCLuK9DBxELR17IbQpoUagBpzfXAOEVr8MhIAESzjN7UQlocQt3PvibwXommyk+QW9RMEX7GhRYEVz0uRGSFddCK5x8U3CKevuhmeBKhuFVyirrtFOth1UW5zvBFGWI2IwqnP2h58VyJRDVq7w92U4/uT2euPPzNNde0Kx/FbKTnEe1Mkwph1UcFt3QGGgnp9uOlYofk6V7N96e3JxyJd00=
x-ms-exchange-transport-forked: True
Content-Type: text/plain; charset="utf-8"
Content-ID: <D5C5CFF21B07F8458D3CAECBFA041D34@namprd11.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-MS-Exchange-CrossTenant-Network-Message-Id: 160bd36d-6f74-4aae-699b-08d73f77a5b6
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 Sep 2019 16:12:20.8508 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 5ae1af62-9505-4097-a69a-c1553ef7840e
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: v1GFeiwt0e0sK/tscdpcZ+lUGILmefK9nY5W6qlCAJ7nI0TeWg4u7IcL6V/71ZQSOOC1RpoHJLWImtFrYv/39Q==
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN6PR11MB3312
X-OriginatorOrg: cisco.com
X-Outbound-SMTP-Client: 173.36.7.23, xch-aln-013.cisco.com
X-Outbound-Node: rcdn-core-11.cisco.com
Archived-At: <https://mailarchive.ietf.org/arch/msg/dispatch/dhXWuA101cl_n1X336sz4IHHBTE>
Subject: Re: [dispatch] New Version Notification for draft-kinamdar-dispatch-sip-auto-peer-00.txt
X-BeenThere: dispatch@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: DISPATCH Working Group Mail List <dispatch.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dispatch>, <mailto:dispatch-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/dispatch/>
List-Post: <mailto:dispatch@ietf.org>
List-Help: <mailto:dispatch-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dispatch>, <mailto:dispatch-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 22 Sep 2019 16:12:29 -0000

Hi Christer,
Sorry for the delay, please find my responses below:


Hi Kaustubh,

> Constructs in SIP such as NOTIFY and OPTIONS may be used to achieve the end goal - which is to have the SIP service provider offload its set of capabilities.
> However, with I see a couple of challenges with using OPTIONS…
>
> 1. It is entirely plausible for the SIP service provider to offload different capability set documents to different enterprises or different sites within an
> enterprise. Accordingly, it would be a challenge to fine tune the OPTIONS response on a per enterprise/site basis.

I assume the service provider will have to know from which enterprise network the OPTIONS request comes from - similar to the HTTPS GET in the draft.

Kaustubh: The point of contention isn’t how the service provider determines “where” the OPTIONS request came in from. This can be done by examining SIP header fields or the source IP address of the request. The point I was trying to make was two-fold:
 1.  Service providers would have to upgrade their SIP stacks to handle this new response type in the body of the OPTIONS response. 
 2.  I don’t know if it would be very simple to handle customised capability set responses based on enterprise identity at the SIP layer - even if it is, it is needlessly a lot of work for something that can be accomplished much more easily using an alternate mechanism.  

While I completely get that SIP OPTIONS was designed for the purpose of probing a remote entity for its capabilities, the path of least disruption seems to be to use HTTPS.
---

> 2. OPTIONS could and in many cases today is used as a keep alive mechanism between the enterprise and service provider network. Wouldn’t it be overkill to have the service
> provider embed the capability set document in every response? Unless, there is some way for the enterprise to indicate a keep alive OPTIONS request  and  a capability set soliciting OPTIONS request.

I don't think it justifies to define a new capability indication mechanism just because people are misusing the current one.
 
However, if the community thinks OPTIONS is a good mechanism for keep-alives, I am sure it would be possible to define some type of keep-alive indicator. But, what type of keep-alives are OPTIONS used for? Registration keep-alives? Session keep-alives? Something else?

Kaustubh: Registration keepalives are handled using the Expires header field value of the response to the REGISTER message(200 OK). By Session, I assume you mean calls…in which case session freshness is handled using the guidelines of RFC 4028. OPTIONS as it relates to keepalives on the other hand is used for target monitoring. In the sense that whether the target to which the OPTIONS is sent is capable of handling requests. For example,  SBC——SIP——Group of 3 Call Servers. The SBC would send OPTIONS at regular intervals to all three call servers. Depending on the response code or lack thereof, one, two or all three call servers can be as “up” - capable of handling further requests or “down” - not a viable destination to send requests to until it/they start responding to OPTIONS again. 

---

> 3. In most cases, SIP service providers would probably not respond to OPTIONS unless a SIP trunk is registered to them. If a trunk is registered, it explicitly
> means that the enterprise is ready to incoming calls. To register a trunk, then get an OPTIONS response with the capability set and then configure the edge
> element(and perhaps other devices for features with an end-to-end bearing) would leave the enterprise network vulnerable to call failure/unexpected call
> handling for a certain lapse of time.

 If the service provider is going to respond to HTTPS GET requests, I would assume they could also response to pre-registration SIP OPTIONS requests?

Kaustubh: This is highly unlikely. I don’t think service providers would respond to OPTIONS sourced from a trunk until the trunk is registered. In situations where the OPTIONS is sent prior to trunk registration, I think either the request is ignored (no response whatsoever) or responded to with a 403/5XX response without a message body.

> Also, to be able to send SIP OPTIONS, the enterprise ought to know the transport address of the OPTIONS target. The transport address of the target is something
> that is included in the capability set document.

The enterprise would have to know where to send the HTTPS GET too.
Kaustubh: How would the enterprise network know which transport protocol to use for the OPTIONS request? Assuming it is TLS, would the request have to cycle through UDP, TCP and then TLS?

To summarise, deployment realities preclude the smooth use of a SIP based mechanism for obtaining the capability set. If we were talking about two simple SIP UAs, then OPTIONS is the best and easiest way of probing remote caps. However, in the context of SIP trunking, this doesn’t seem feasible and was one of the strongest reasons we chose to use HTTP.
Regards,

Christer
 

On 19/09/19, 12:23 PM, "Christer Holmberg" <christer.holmberg@ericsson.com> wrote:

    Hi Kaustubh,
    
    > Constructs in SIP such as NOTIFY and OPTIONS may be used to achieve the end goal - which is to have the SIP service provider offload its set of capabilities. 
    > However, with I see a couple of challenges with using OPTIONS…
    >
    > 1. It is entirely plausible for the SIP service provider to offload different capability set documents to different enterprises or different sites within an
    > enterprise. Accordingly, it would be a challenge to fine tune the OPTIONS response on a per enterprise/site basis.
    
    I assume the service provider will have to know from which enterprise network the OPTIONS request comes from - similar to the HTTPS GET in the draft.
    
    ---
    
    > 2. OPTIONS could and in many cases today is used as a keep alive mechanism between the enterprise and service provider network. Wouldn’t it be overkill to have the service
    > provider embed the capability set document in every response? Unless, there is some way for the enterprise to indicate a keep alive OPTIONS request  and  a capability set soliciting OPTIONS request.
    
    I don't think it justifies to define a new capability indication mechanism just because people are misusing the current one.
    
    However, if the community thinks OPTIONS is a good mechanism for keep-alives, I am sure it would be possible to define some type of keep-alive indicator. But, what type of keep-alives are OPTIONS used for? Registration keep-alives? Session keep-alives? Something else?
    
    ---
    
    > 3. In most cases, SIP service providers would probably not respond to OPTIONS unless a SIP trunk is registered to them. If a trunk is registered, it explicitly
    > means that the enterprise is ready to incoming calls. To register a trunk, then get an OPTIONS response with the capability set and then configure the edge
    > element(and perhaps other devices for features with an end-to-end bearing) would leave the enterprise network vulnerable to call failure/unexpected call
    > handling for a certain lapse of time.
    
    If the service provider is going to respond to HTTPS GET requests, I would assume they could also response to pre-registration SIP OPTIONS requests?
    
    > Also, to be able to send SIP OPTIONS, the enterprise ought to know the transport address of the OPTIONS target. The transport address of the target is something
    > that is included in the capability set document.
    
    The enterprise would have to know where to send the HTTPS GET too.
    
    Regards,
    
    Christer
    
    
    
    
    
    On 17/09/19, 9:55 PM, "Christer Holmberg" <christer.holmberg@ericsson.com> wrote:
    
        What about SIP OPTIONS?
        
        Regards,
        
        Christer
        
        -----Alkuperäinen viesti-----
        Lähettäjä: dispatch <dispatch-bounces@ietf.org> Puolesta Kaustubh Inamdar (kinamdar)
        Lähetetty: tiistai 17. syyskuuta 2019 4.32
        Vastaanottaja: dispatch@ietf.org
        Aihe: [dispatch] FW: New Version Notification for draft-kinamdar-dispatch-sip-auto-peer-00.txt
        
        Hi All,
        The following draft has been posted to dispatch. The draft aims to simplify peering between enterprise and service provider SIP networks. Discussions/comments are welcome.
        
        -Kaustubh
        
        
        
        
        
            
            A new version of I-D, draft-kinamdar-dispatch-sip-auto-peer-00.txt
            has been successfully submitted by Cullen Jennings and posted to the
            IETF repository.
            
            Name:		draft-kinamdar-dispatch-sip-auto-peer
            Revision:	00
            Title:		Automatic Peering for SIP Trunks
            Document date:	2019-09-10
            Group:		Individual Submission
            Pages:		35
            URL:            https://www.ietf.org/internet-drafts/draft-kinamdar-dispatch-sip-auto-peer-00.txt
            Status:         https://datatracker.ietf.org/doc/draft-kinamdar-dispatch-sip-auto-peer/
            Htmlized:       https://tools.ietf.org/html/draft-kinamdar-dispatch-sip-auto-peer-00
            Htmlized:       https://datatracker.ietf.org/doc/html/draft-kinamdar-dispatch-sip-auto-peer
        
            
            
            Abstract:
               This draft specifies a configuration workflow to enable enterprise
               Session Initiation Protocol (SIP) networks to solicit the capability
               set of a SIP service provider network.  The capability set can
               subsequently be used to configure features and services on the
               enterprise edge element, such as a Session Border Controller (SBC),
               to ensure smooth peering between enterprise and service provider
               networks.
            
                                                                                              
            
            
            Please note that it may take a couple of minutes from the time of submission
            until the htmlized version and diff are available at tools.ietf.org.
            
            The IETF Secretariat
            
            
        
        _______________________________________________
        dispatch mailing list
        dispatch@ietf.org
        https://www.ietf.org/mailman/listinfo/dispatch