Re: [Sip] [Technical Errata Reported] RFC3329 (2170)
Dean Willis <dean.willis@softarmor.com> Fri, 23 April 2010 16:13 UTC
Return-Path: <dean.willis@softarmor.com>
X-Original-To: sip@core3.amsl.com
Delivered-To: sip@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 429403A6A88 for <sip@core3.amsl.com>; Fri, 23 Apr 2010 09:13:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.385
X-Spam-Level:
X-Spam-Status: No, score=-2.385 tagged_above=-999 required=5 tests=[AWL=0.214, BAYES_00=-2.599]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id getZ3k8ls-mn for <sip@core3.amsl.com>; Fri, 23 Apr 2010 09:13:31 -0700 (PDT)
Received: from nylon.softarmor.com (nylon.softarmor.com [66.135.38.164]) by core3.amsl.com (Postfix) with ESMTP id 3C7153A6A67 for <sip@ietf.org>; Fri, 23 Apr 2010 09:13:30 -0700 (PDT)
Received: from [192.168.2.115] (cpe-66-25-30-183.tx.res.rr.com [66.25.30.183]) (authenticated bits=0) by nylon.softarmor.com (8.14.3/8.14.3/Debian-5+lenny1) with ESMTP id o3NGD9ce024012 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Fri, 23 Apr 2010 11:13:11 -0500
Message-Id: <D9EE2DA4-F7BD-4D42-BA7A-295FE8590B4B@softarmor.com>
From: Dean Willis <dean.willis@softarmor.com>
To: RFC Errata System <rfc-editor@rfc-editor.org>
In-Reply-To: <20100423132754.91575E07CC@rfc-editor.org>
Content-Type: text/plain; charset="US-ASCII"; format="flowed"; delsp="yes"
Content-Transfer-Encoding: 7bit
Mime-Version: 1.0 (Apple Message framework v936)
Date: Fri, 23 Apr 2010 11:13:04 -0500
References: <20100423132754.91575E07CC@rfc-editor.org>
X-Mailer: Apple Mail (2.936)
Cc: jari.arkko@ericsson.com, sip@ietf.org, peter.dawes@vodafone.com, drage@alcatel-lucent.com, Gonzalo.Camarillo@ericsson.com, vesa.torvinen@ericsson.fi, aki.niemi@nokia.com, tao.haukka@nokia.com
Subject: Re: [Sip] [Technical Errata Reported] RFC3329 (2170)
X-BeenThere: sip@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: Session Initiation Protocol <sip.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sip>
List-Post: <mailto:sip@ietf.org>
List-Help: <mailto:sip-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sip>, <mailto:sip-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 23 Apr 2010 16:13:33 -0000
These reports should probably be going to DISPATCH rather than SIP, I think. Or is it SIPCORE? On Apr 23, 2010, at 8:27 AM, RFC Errata System wrote: > > The following errata report has been submitted for RFC3329, > "Security Mechanism Agreement for the Session Initiation Protocol > (SIP)". > > -------------------------------------- > You may review the report below and at: > http://www.rfc-editor.org/errata_search.php?rfc=3329&eid=2170 > > -------------------------------------- > Type: Technical > Reported by: Peter Dawes <peter.dawes@vodafone.com> > > Section: 4.2 > > Original Text > ------------- > The second INVITE (4) and the ACK (8) contain a Security-Verify > header field that mirrors the Security-Server header field received > in the 421. > > Corrected Text > -------------- > The second INVITE (4) contains a Security-Verify > header field that mirrors the Security-Server header field received > in the 421. > > Notes > ----- > RFC 3329 Section 2.6, Table 1: Summary of Header Usage. indicates > that Security-Client, Security-Server, Security-Verify are "Not > applicable" to the SIP ACK request. > > RFC 3261 says "Not applicable" means that the header field MUST NOT > be present in a request. If one is placed in a request by mistake, > it MUST be ignored by the UAS receiving the request." > > Instructions: > ------------- > This errata is currently posted as "Reported". If necessary, please > use "Reply All" to discuss whether it should be verified or > rejected. When a decision is reached, the verifying party (IESG) > can log in to change the status and edit the report, if necessary. > > -------------------------------------- > RFC3329 (draft-ietf-sip-sec-agree-05) > -------------------------------------- > Title : Security Mechanism Agreement for the Session > Initiation Protocol (SIP) > Publication Date : January 2003 > Author(s) : J. Arkko, V. Torvinen, G. Camarillo, A. Niemi, > T. Haukka > Category : PROPOSED STANDARD > Source : Session Initiation Protocol > Area : Real-time Applications and Infrastructure > Stream : IETF > Verifying Party : IESG >
- [Sip] [Technical Errata Reported] RFC3329 (2170) RFC Errata System
- Re: [Sip] [Technical Errata Reported] RFC3329 (21… Dean Willis