[Sip] RE: [Sipping] Example of NOTIFY instead of INFO
"Christer Holmberg (JO/LMF)" <christer.holmberg@ericsson.com> Sat, 21 July 2007 18:51 UTC
Return-path: <sip-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1ICK39-0004dk-8a; Sat, 21 Jul 2007 14:51:31 -0400
Received: from sip by megatron.ietf.org with local (Exim 4.43) id 1ICK37-0004bl-PG for sip-confirm+ok@megatron.ietf.org; Sat, 21 Jul 2007 14:51:29 -0400
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1ICK37-0004bb-FZ for sip@ietf.org; Sat, 21 Jul 2007 14:51:29 -0400
Received: from mailgw4.ericsson.se ([193.180.251.62]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1ICK36-0005cp-EC for sip@ietf.org; Sat, 21 Jul 2007 14:51:29 -0400
Received: from mailgw4.ericsson.se (unknown [127.0.0.1]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id D9B5920582; Sat, 21 Jul 2007 20:51:27 +0200 (CEST)
X-AuditID: c1b4fb3e-ae831bb0000007e1-16-46a255affe85
Received: from esealmw128.eemea.ericsson.se (unknown [153.88.254.121]) by mailgw4.ericsson.se (Symantec Mail Security) with ESMTP id A99F620550; Sat, 21 Jul 2007 20:51:27 +0200 (CEST)
Received: from esealmw113.eemea.ericsson.se ([153.88.200.4]) by esealmw128.eemea.ericsson.se with Microsoft SMTPSVC(6.0.3790.1830); Sat, 21 Jul 2007 20:51:27 +0200
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
Date: Sat, 21 Jul 2007 20:51:24 +0200
Message-ID: <7374777208BDC7449D5620EF942325670743C924@esealmw113.eemea.ericsson.se>
In-Reply-To: <C2C6962C.7C3B%eburger@bea.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: [Sipping] Example of NOTIFY instead of INFO
Thread-Index: AcfLDlF1j+IXaTcBEdyGRgAWy4mm/wAd8g2A
References: <C2C6962C.7C3B%eburger@bea.com>
From: "Christer Holmberg (JO/LMF)" <christer.holmberg@ericsson.com>
To: Eric Burger <eburger@bea.com>, IETF SIP <sip@ietf.org>
X-OriginalArrivalTime: 21 Jul 2007 18:51:27.0478 (UTC) FILETIME=[24CED160:01C7CBC8]
X-Brightmail-Tracker: AAAAAA==
X-Spam-Score: 0.0 (/)
X-Scan-Signature: d185fa790257f526fedfd5d01ed9c976
Cc:
Subject: [Sip] RE: [Sipping] Example of NOTIFY instead of INFO
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
Errors-To: sip-bounces@ietf.org
Hi, >[Please keep discussion of INFO to the SIP list. Copied to >the SIPPING list because this message touches upon SPITSTOP. >Please keep discussion of SPITSTOP to the SIPPING list.] > > >Let us take the case of Malicious Indicator. This is where a >subscriber receives a call, realizes it is a malicious call >(threatening, SPIT, etc.). >They then press the SPIT button (or press *xx), which tells >their service provider to mark the UAC as a bad actor. One >framework proposed for this is the SPITSTOP Reference >Scenario, draft-niccolini-sipping-spitstop-00.txt. > >One might be tempted to think that INFO would be a great >option for this service. It follows the return path of the >INVITE, and so the INFO will hit the caller's inbound proxy, >which it can learn the caller is (statistically) a bad actor. >That way the inbound proxy can do stuff like notify law >enforcement, add a vote to "this is a SPIT source," or other >useful action. > >However, consider a few issues. First, since INFO lives >exclusively within an established dialog, there is no way to >assert this message after the call completes. Second, this >mechanism *relies* on an active service provider topology. >If there is no proxy in the chain that will eat the INFO, the >caller will see the "this is a bad guy" message, which may >have consequences in the real world. Third, there is no >a'priori way for the UAS to know whether or not it can issue >the INFO. The caller CERTAINLY will not advertise, "please >tell me if I am bad, particularly I know in advance that I >*am* a bad actor." This is an example of a special case, where you don't want to INFO to go "all the way back", ie you want it to be terminated somewhere along the dialog path, and I don't think that is a valid justification why you couldn't use INFO in cases where you don't have that issue. I don't even think this behavior would be allowed according to the proxy rules, so the proxy would more or less be a B2BUA in this case. So, if the outbound proxy supports this mechanism, and DOES want to use INFO, it can insert application/mal-ind in the Accept header before forwarding it towards the UAS (since it is acting as a B2BUA, it is allowed to do so). >What is the correct way of doing this? Here is where we have theory and practice. > >Theory says the proxy needs to SUBSCRIBE for the SPIT event >at the UAS. At this point, life is good, interoperable, and >works across networks. This enables events after the dialog >is torn down, as presumably the SPIT event will refer not to, >"this dialog," which does not exist, but to "that dialog >identifier," which exists (and is theoretically unique) forever. > >[PLEASE TURN YOUR FLAME THROWERS OFF AT THIS POINT] Practice >is that service providers might be able to add value by >providing proprietary phones or IAD's to their subscribers >that just "know" they have an implicit subscription for this >service. Yes, there is a whole host of problems with this, >but if you are in a controlled, limited, no desire for >inter-network connectivity, this mechanism will work. >Moreover, by creating, in this case, a SPIT event package, it >will even allow the *possibility* of interoperable interworking if the endpoints >implement the full SUBSCRIBE protocol. > >This approach shuts down the, "Oh, but with INFO I can save 3 messages, even though this all happens after the call >connects so it adds no user-visible delay" argument. I am a little confused. I thought YOU have been saying that we shall define mechanisms which are NOT based on behavior in controlled and limited networks... Regards, Christer _______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use sip-implementors@cs.columbia.edu for questions on current sip Use sipping@ietf.org for new developments on the application of sip
- [Sip] Example of NOTIFY instead of INFO Eric Burger
- [Sip] RE: [Sipping] Example of NOTIFY instead of … Christer Holmberg (JO/LMF)