Re: [Sip] namespaces in RFC 4411, 4412 and draft-ietf-sip-rph-new-namespaces-00

Paul Kyzivat <pkyzivat@cisco.com> Tue, 06 November 2007 22:34 UTC

Return-path: <sip-bounces@ietf.org>
Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1IpX0P-0001Li-3L; Tue, 06 Nov 2007 17:34:45 -0500
Received: from sip by megatron.ietf.org with local (Exim 4.43) id 1IpX0M-0001Gc-87 for sip-confirm+ok@megatron.ietf.org; Tue, 06 Nov 2007 17:34:42 -0500
Received: from [10.90.34.44] (helo=chiedprmail1.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1IpX0L-0001GU-TW for sip@ietf.org; Tue, 06 Nov 2007 17:34:41 -0500
Received: from sj-iport-2-in.cisco.com ([171.71.176.71] helo=sj-iport-2.cisco.com) by chiedprmail1.ietf.org with esmtp (Exim 4.43) id 1IpX0L-0006rD-Fk for sip@ietf.org; Tue, 06 Nov 2007 17:34:41 -0500
X-IronPort-AV: E=Sophos;i="4.21,380,1188802800"; d="scan'208";a="413921529"
Received: from sj-dkim-1.cisco.com ([171.71.179.21]) by sj-iport-2.cisco.com with ESMTP; 06 Nov 2007 14:34:40 -0800
Received: from sj-core-5.cisco.com (sj-core-5.cisco.com [171.71.177.238]) by sj-dkim-1.cisco.com (8.12.11/8.12.11) with ESMTP id lA6MYeCH009348; Tue, 6 Nov 2007 14:34:40 -0800
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com [64.102.31.102]) by sj-core-5.cisco.com (8.12.10/8.12.6) with ESMTP id lA6MYTQM016371; Tue, 6 Nov 2007 22:34:38 GMT
Received: from xfe-rtp-202.amer.cisco.com ([64.102.31.21]) by xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 6 Nov 2007 17:34:29 -0500
Received: from [161.44.174.216] ([161.44.174.216]) by xfe-rtp-202.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Tue, 6 Nov 2007 17:34:29 -0500
Message-ID: <4730EBF6.7070904@cisco.com>
Date: Tue, 06 Nov 2007 17:34:30 -0500
From: Paul Kyzivat <pkyzivat@cisco.com>
User-Agent: Thunderbird 2.0.0.6 (Windows/20070728)
MIME-Version: 1.0
To: Dale.Worley@comcast.net
Subject: Re: [Sip] namespaces in RFC 4411, 4412 and draft-ietf-sip-rph-new-namespaces-00
References: <OFFC5712C2.6A97CD45-ON8525738A.007A66F2-8525738A.007B51F4@csc.com> <200711062220.lA6MKcDY032532@dragon.ariadne.com>
In-Reply-To: <200711062220.lA6MKcDY032532@dragon.ariadne.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 06 Nov 2007 22:34:29.0257 (UTC) FILETIME=[31953F90:01C820C5]
X-TM-AS-Product-Ver: SMEX-8.0.0.1181-5.000.1023-15528.002
X-TM-AS-Result: No--10.800000-8.000000-31
X-TM-AS-User-Approved-Sender: No
X-TM-AS-User-Blocked-Sender: No
DKIM-Signature: v=0.5; a=rsa-sha256; q=dns/txt; l=1322; t=1194388480; x=1195252480; c=relaxed/simple; s=sjdkim1004; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pkyzivat@cisco.com; z=From:=20Paul=20Kyzivat=20<pkyzivat@cisco.com> |Subject:=20Re=3A=20[Sip]=20namespaces=20in=20RFC=204411, =094412=20and=09 draft-ietf-sip-rph-new-namespaces-00 |Sender:=20; bh=+KbU2xM95KZ48ZyICeEwHITH0S4hyFSfNwU/mZVKhK0=; b=W/rGI0fiolGQcLxEAhFd99MOY14alCaE8OYZtgMc6vrn5x2ZVJF5hof/shQmKcu9SWUvL9y0 zDuMIJX3/HLQUdS+rmwfDLVWxA5ORdKfYkZfDeYZIPX2+0sX3DGErajLHxm5JoC0ZUuFv3f76F IWA/C4oOBBSIL1A1aa0sZewHU=;
Authentication-Results: sj-dkim-1; header.From=pkyzivat@cisco.com; dkim=pass ( sig from cisco.com/sjdkim1004 verified; );
X-Spam-Score: 0.0 (/)
X-Scan-Signature: 8abaac9e10c826e8252866cbe6766464
Cc: sip@ietf.org
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
Errors-To: sip-bounces@ietf.org


Dale.Worley@comcast.net wrote:
>    From: Janet P Gunn <jgunn6@csc.com>
> 
>    Your suggested behavior would seem to violate this.
> 
> That's true.  But I think the RFC-compliant behavior doesn't take into
> account how the incoming request validates that it is authorized to
> use the priority it has claimed.  The practical result is that
> whenever a request crosses a trust boundary, the network operator of
> the network being entered is going to remove any priority request.
> 
> I expect that the rules of the RFC will be followed by any elements
> inside a *network*.  But I expect network ingress/egress elements to
> violate it by default.

If the header is truly only a *request*, with no implication of asserted 
authorization, then there is no reason to remove it.

BUT, unless you can authenticate the sender of the request and authorize 
them to receive the priority they have requested, then there is little 
likelihood that it will be granted.

So the key issue is how authorization is determined. If this is a closed 
military network then I imagine they will have some kind of transitive 
trust that will support this.

But if the goal here is for emergency service workers to obtain priority 
over all sorts of networks, then I can't imagine how it can work.

	Paul


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sipping@ietf.org for new developments on the application of sip