Re: [RAI] Time for a feature tag?

Adam Roach <adam@nostrum.com> Tue, 04 May 2010 20:47 UTC

Return-Path: <adam@nostrum.com>
X-Original-To: rai@core3.amsl.com
Delivered-To: rai@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B05C428C18C for <rai@core3.amsl.com>; Tue, 4 May 2010 13:47:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.643
X-Spam-Level:
X-Spam-Status: No, score=-1.643 tagged_above=-999 required=5 tests=[AWL=-0.532, BAYES_05=-1.11, SPF_PASS=-0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id j9ZpM3JK2OUD for <rai@core3.amsl.com>; Tue, 4 May 2010 13:47:27 -0700 (PDT)
Received: from nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by core3.amsl.com (Postfix) with ESMTP id 34B0428C37C for <rai@ietf.org>; Tue, 4 May 2010 12:58:49 -0700 (PDT)
Received: from hydra-3.local (ppp-70-249-147-216.dsl.rcsntx.swbell.net [70.249.147.216]) (authenticated bits=0) by nostrum.com (8.14.3/8.14.3) with ESMTP id o44JwV1Y060224 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 4 May 2010 14:58:33 -0500 (CDT) (envelope-from adam@nostrum.com)
Message-ID: <4BE07C66.5050406@nostrum.com>
Date: Tue, 04 May 2010 14:58:30 -0500
From: Adam Roach <adam@nostrum.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.5; en-US; rv:1.9.1.9) Gecko/20100317 Thunderbird/3.0.4
MIME-Version: 1.0
To: Spencer Dawkins <spencer@wonderhamster.org>
References: <5436393912.955738117@softarmor.com> <D9570447-752B-4A36-BCB8-F25E4CAF6A09@cisco.com> <D65910763EF94825A54108FE7587FC9D@china.huawei.com>
In-Reply-To: <D65910763EF94825A54108FE7587FC9D@china.huawei.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Received-SPF: pass (nostrum.com: 70.249.147.216 is authenticated by a trusted mechanism)
Cc: rai@ietf.org
Subject: Re: [RAI] Time for a feature tag?
X-BeenThere: rai@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "Real-time Applications and Infrastructure \(RAI\)" <rai.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/rai>, <mailto:rai-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/rai>
List-Post: <mailto:rai@ietf.org>
List-Help: <mailto:rai-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/rai>, <mailto:rai-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 04 May 2010 20:47:28 -0000

On 5/4/10 14:12, May 4, Spencer Dawkins wrote:
> Cullen,
>
> From: "Cullen Jennings" <fluffy@cisco.com>
>
>> Didn't we have this conversation under the the subject DWIM vs DWIS ?
>>
>> On Apr 14, 2010, at 16:48 , Dean Willis wrote:
>>
>>> How about creating a new extension header field called Feature. This 
>>> header field takes a list of feature values, and has the semantic 
>>> that the message sender supports the named features. The feature 
>>> namespace is entirely orthogonal to the option-tag namespace. No 
>>> feature can change the basic state machine of SIP nor nullify a 
>>> negotiated option. Further, nodes ising features MUST be able to 
>>> fall back to basic SIP in the absence of mathching feature support 
>>> in a correspondent node.
>>>
>>> Isn't that what you REALLY want?
>
> I thought so, and note that the excellent 
> https://datatracker.ietf.org/doc/draft-ietf-sipping-service-identification/ 
> is in the RFC editor queue, in AUTH state...

That's not quite it. The service-identification document is an 
informational document that highlights the perils of what Dean has 
suggested (presumably with his tongue planted firmly in his cheek). 
Here's the executive summary, taken from the document itself:

    [T]his document concludes that declarative service
    identification - the process by which a user agent inserts a moniker
    into a message that defines the desired service, separate from
    explicit and well-defined protocol mechanisms, is harmful.

Section 5 does a good job of talking about how to properly identify a 
service -- and, more importantly, how not to.

/a