[Sip] Need for RPH in SIP Responses

"Sandesara, Niranjan B" <nsandesa@telcordia.com> Wed, 21 November 2007 20:56 UTC

Return-path: <sip-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IuwcR-0002Ce-It; Wed, 21 Nov 2007 15:56:23 -0500
Received: from sip by megatron.ietf.org with local (Exim 4.43) id 1IuwcP-00024i-SY for sip-confirm+ok@megatron.ietf.org; Wed, 21 Nov 2007 15:56:21 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IuwcP-00024a-Id for sip@ietf.org; Wed, 21 Nov 2007 15:56:21 -0500
Received: from dnsmx1pya.telcordia.com ([128.96.20.31]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1IuwcJ-00049F-8Q for sip@ietf.org; Wed, 21 Nov 2007 15:56:21 -0500
Received: from pya-dte-ieg01.cc.telcordia.com (pya-dte-ieg01.cc.telcordia.com [128.96.20.21]) by dnsmx1pya.telcordia.com (8.11.7+Sun/8.9.3) with SMTP id lALKuCD04764 for <sip@ietf.org>; Wed, 21 Nov 2007 15:56:12 -0500 (EST)
Received: from rrc-dte-exbh01.dte.telcordia.com ([128.96.150.31]) by pya-dte-ieg01.cc.telcordia.com (SMSSMTP 4.1.9.35) with SMTP id M2007112115560915794 for <sip@ietf.org>; Wed, 21 Nov 2007 15:56:09 -0500
Received: from rrc-dte-exs01.dte.telcordia.com ([128.96.150.34]) by rrc-dte-exbh01.dte.telcordia.com with Microsoft SMTPSVC(6.0.3790.1830); Wed, 21 Nov 2007 15:56:10 -0500
X-MimeOLE: Produced By Microsoft Exchange V6.5
Content-class: urn:content-classes:message
MIME-Version: 1.0
Date: Wed, 21 Nov 2007 15:56:09 -0500
Message-ID: <A09345776B6C7A4985573569C0F3004318E7A558@rrc-dte-exs01.dte.telcordia.com>
X-MS-Has-Attach:
X-MS-TNEF-Correlator:
Thread-Topic: Need for RPH in SIP Responses
thread-index: AcgsgPFAQ9r3KFNvRbGMwEjTuLtQag==
From: "Sandesara, Niranjan B" <nsandesa@telcordia.com>
To: sip@ietf.org
X-OriginalArrivalTime: 21 Nov 2007 20:56:10.0248 (UTC) FILETIME=[F1B22880:01C82C80]
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 1094b1c84fa6e846d476f39271f5074f
Subject: [Sip] Need for RPH in SIP Responses
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
Content-Type: multipart/mixed; boundary="===============1109480351=="
Errors-To: sip-bounces@ietf.org

Hi!

 

The SIP Resource Priority Header (RPH), in its current form, is not
allowed in SIP responses.  This was a design choice during RFC 4412's
development. This is not a good choice in certain scenarios. The
Internet Draft, "Allowing SIP Resource Priority Header in SIP Responses"
(draft-polk-sip-rph-in-responses-00) describes a modification to RFC4412
to permit RPH in responses. The Internet Draft, "Requirements for SIP
Resource Priority Header in SIP Responses"
(draft-gunn-sip-req-for-rph-in-responses-00), describes one of the
requirements associated with systems using RPH, that could be easily met
by the modification of RFC 4412 to permit RPH in responses, and can not
be easily met by other methods. Additional scenarios and requirement are
described below that can be easily met if RPH is permitted in responses
per draft-polk-sip-rph-in-responses-00.

 

All aspects of a GETS/WPS call require priority treatment in order to
ensure that it is successfully established with priority, maintained
with adequate quality and priority, and released with priority.  RFC
3261 permits stateless servers. There are scenarios involving stateless
servers that require such servers to provide priority treatment to
GETS/WPS calls. Three scenarios are described below where inclusion of
RPH in SIP responses would enable a stateless server to provide priority
treatment.

1.	If there is congestion at a SIP server, it is important that SIP
messages (requests as well as responses) related to a GETS/WPS call are
processed with priority, and discarded last in comparison with normal
calls. Presence of RPH in SIP responses would enable a stateless server
to provide such capability.
2.	A network can mark IP packets that carry SIP messages related to
GETS/WPS calls with a specific DiffServ Code Point (DSCP). This could be
used as one mechanism to ensure that such packets receive priority
treatment in transport through an IP network. A stateless server can
mark IP packets that carry SIP responses in this manner only if it
recognizes the responses that are related to GETS/WPS calls. Presence of
RPH in SIP responses would enable a stateless server to mark packets
carrying SIP responses in this manner or other priority transport
mechanisms (e.g. MPLS path selection). 
3.	On receipt of a SIP response related to a GETS/WPS call, if a
stateless server needs to invoke other services and interact with other
servers with priority, it needs to be aware of the GETS/WPS call.
Presence of RPH in SIP responses would enable a stateless server to
provide such capability.

 

As described in the internet draft, "Requirements for SIP Resource
Priority Header in SIP Responses"
(draft-gunn-sip-req-for-rph-in-responses-00), GETS/WPS paradigm is
different from the MLPP paradigm. One important difference between the
two is that a GETS/WPS call request from the calling party may not
include an RPH. It is possible that SIP servers (whether stateful or
stateless) preceding the server that authenticates and authorizes a
GETS/WPS call request have RPH capability but do not have the capability
to identify the request as a GETS/WPS call request. After successful
authorization, the authenticating server will insert an RPH in all
requests it sends. In this scenario, the servers preceding the
authenticating servers would not become aware of the priority nature of
the call and would not provide any priority treatment until they receive
a SIP request with an RPH from the authenticating server.  This is not
desirable. This situation can be easily remedied if RPH is permitted in
SIP responses.

 

As has been pointed out earlier, possible security risk of permitting
RPH in SIP responses is minimal in managed IP networks where this
capability is generally expected to be used. 

 

Regards,

 

Niranjan Sandesara

_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sipping@ietf.org for new developments on the application of sip