Re: [sipcore] [Editorial Errata Reported] RFC3261 (3237)

"Kevin P. Fleming" <kpfleming@digium.com> Thu, 31 May 2012 19:45 UTC

Return-Path: <kpfleming@digium.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7218711E80AD for <sipcore@ietfa.amsl.com>; Thu, 31 May 2012 12:45:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -106.599
X-Spam-Level:
X-Spam-Status: No, score=-106.599 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, RCVD_IN_DNSWL_MED=-4, USER_IN_WHITELIST=-100]
Received: from mail.ietf.org ([12.22.58.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 1GNevw7Y5Z-o for <sipcore@ietfa.amsl.com>; Thu, 31 May 2012 12:45:12 -0700 (PDT)
Received: from mail.digium.com (mail.digium.com [216.207.245.2]) by ietfa.amsl.com (Postfix) with ESMTP id 4359111E808C for <sipcore@ietf.org>; Thu, 31 May 2012 12:45:12 -0700 (PDT)
Received: from [10.24.55.203] (helo=zimbra.hsv.digium.com) by mail.digium.com with esmtp (Exim 4.69) (envelope-from <kpfleming@digium.com>) id 1SaBIy-0000Fv-0Y; Thu, 31 May 2012 14:45:08 -0500
Received: from localhost (localhost.localdomain [127.0.0.1]) by zimbra.hsv.digium.com (Postfix) with ESMTP id EBB8D1A2028; Thu, 31 May 2012 14:45:07 -0500 (CDT)
Received: from zimbra.hsv.digium.com ([127.0.0.1]) by localhost (zimbra.hsv.digium.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fR9w+uDsq3KT; Thu, 31 May 2012 14:45:05 -0500 (CDT)
Received: from [10.24.250.46] (unknown [10.24.250.46]) by zimbra.hsv.digium.com (Postfix) with ESMTPSA id 0C0C7D8002; Thu, 31 May 2012 14:45:05 -0500 (CDT)
Message-ID: <4FC7CA35.8070403@digium.com>
Date: Thu, 31 May 2012 14:44:53 -0500
From: "Kevin P. Fleming" <kpfleming@digium.com>
Organization: Digium, Inc.
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:12.0) Gecko/20120430 Thunderbird/12.0.1
MIME-Version: 1.0
To: Brett Tate <brett@broadsoft.com>
References: <20120531125741.4B83D621A3@rfc-editor.org> <4FC783D0.4070505@nostrum.com> <7FF1E5E16911C54BB2D57D4C4A2ED35A0C2CC55856@EXMBXCLUS01.citservers.local>
In-Reply-To: <7FF1E5E16911C54BB2D57D4C4A2ED35A0C2CC55856@EXMBXCLUS01.citservers.local>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-Mailman-Approved-At: Thu, 31 May 2012 12:47:01 -0700
Cc: "jdrosen@dynamicsoft.com" <jdrosen@dynamicsoft.com>, "schooler@research.att.com" <schooler@research.att.com>, "rsparks@dynamicsoft.com" <rsparks@dynamicsoft.com>, "schulzrinne@cs.columbia.edu" <schulzrinne@cs.columbia.edu>, "sipcore@ietf.org" <sipcore@ietf.org>, "drage@alcatel-lucent.com" <drage@alcatel-lucent.com>, "jon.peterson@neustar.com" <jon.peterson@neustar.com>, "mjh@icir.org" <mjh@icir.org>, "alan.johnston@wcom.com" <alan.johnston@wcom.com>, "dean.willis@softarmor.com" <dean.willis@softarmor.com>, RFC Errata System <rfc-editor@rfc-editor.org>
Subject: Re: [sipcore] [Editorial Errata Reported] RFC3261 (3237)
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sipcore>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 31 May 2012 19:45:13 -0000

On 05/31/2012 11:12 AM, Brett Tate wrote:
> There are normative MUST increment statements else within RFC 3261 concerning the topic.  Thus if a UAC or proxy is ignoring the indication to increment cseq, they should not be surprised if it results in a 482 response.

Agreed; if there's no need to make the suggested change in a future 
update to RFC3261, I'm certainly fine with that. It just seemed like a 
reasonable suggestion :)

>
> Section 22.2:
>
>     "When a UAC resubmits a request with its credentials after receiving a
>     401 (Unauthorized) or 407 (Proxy Authentication Required) response,
>     it MUST increment the CSeq header field value as it would normally
>     when sending an updated request."
>
> Section 22.3:
>
>    "The use of Proxy-Authenticate and Proxy-Authorization parallel that
>     described in [17], with one difference.  Proxies MUST NOT add values
>     to the Proxy-Authorization header field.  All 407 (Proxy
>     Authentication Required) responses MUST be forwarded upstream toward
>     the UAC following the procedures for any other response.  It is the
>     UAC's responsibility to add the Proxy-Authorization header field
>     value containing credentials for the realm of the proxy that has
>     asked for authentication.
>
>        If a proxy were to resubmit a request adding a Proxy-Authorization
>        header field value, it would need to increment the CSeq in the new
>        request.  However, this would cause the UAC that submitted the
>        original request to discard a response from the UAS, as the CSeq
>        value would be different."
>
> 8.2.2.2 Merged Requests
>
>     If the request has no tag in the To header field, the UAS core MUST
>     check the request against ongoing transactions.  If the From tag,
>     Call-ID, and CSeq exactly match those associated with an ongoing
>     transaction, but the request does not match that transaction (based
>     on the matching rules in Section 17.2.3), the UAS core SHOULD
>     generate a 482 (Loop Detected) response and pass it to the server
>     transaction.
>
>        The same request has arrived at the UAS more than once, following
>        different paths, most likely due to forking.  The UAS processes
>        the first such request received and responds with a 482 (Loop
>        Detected) to the rest of them.
>
>
>> -----Original Message-----
>> From: sipcore-bounces@ietf.org [mailto:sipcore-bounces@ietf.org] On
>> Behalf Of Robert Sparks
>> Sent: Thursday, May 31, 2012 10:45 AM
>> To: RFC Errata System
>> Cc: jdrosen@dynamicsoft.com; schooler@research.att.com;
>> rsparks@dynamicsoft.com; schulzrinne@cs.columbia.edu; sipcore@ietf.org;
>> drage@alcatel-lucent.com; alan.johnston@wcom.com; mjh@icir.org;
>> jon.peterson@neustar.com; dean.willis@softarmor.com;
>> kpfleming@digium.com
>> Subject: Re: [sipcore] [Editorial Errata Reported] RFC3261 (3237)
>>
>> (adding the sipcore list)
>>
>> Kevin -
>>
>> The important part of "new transaction" is the branch identifier. Are
>> the issues you're having
>> really with transaction identification? (I could only see that being
>> the
>> case if you had 2543 elements
>> involved.) Or is the real pain with policy on what a response to a
>> digest challenge has to look like?
>>
>> What current IETF discussions are you pointing to below?
>>
>> RjS
>>
>> On 5/31/12 7:57 AM, RFC Errata System wrote:
>>> The following errata report has been submitted for RFC3261,
>>> "SIP: Session Initiation Protocol".
>>>
>>> --------------------------------------
>>> You may review the report below and at:
>>> http://www.rfc-editor.org/errata_search.php?rfc=3261&eid=3237
>>>
>>> --------------------------------------
>>> Type: Editorial
>>> Reported by: Kevin P. Fleming<kpfleming@digium.com>
>>>
>>> Section: 8.1.3.5
>>>
>>> Original Text
>>> -------------
>>> In all of the above cases, the request is retried by creating a new
>> request with the appropriate modifications.  This new request
>> constitutes a new transaction and SHOULD have the same value of the
>> Call-ID, To, and From of the previous request, but the CSeq should
>> contain a new sequence number that is one higher than the previous.
>>>
>>> Corrected Text
>>> --------------
>>> In all of the above cases, the request is retried by creating a new
>> request with the appropriate modifications.  This new request
>> constitutes a new transaction and SHOULD have the same value of the
>> Call-ID, To, and From of the previous request, but the CSeq SHOULD
>> contain a new sequence number that is one higher than the previous.
>>>
>>> Notes
>>> -----
>>> We have had one implementor claim that they are not required to
>> increment CSeq when retrying the request because the RFC says 'should'
>> and not 'SHOULD'. Based on current IETF discussions, though, these
>> should probably be changed to MUST anyway, but that's a much more
>> substantive change throughout the whole RFC.
>>>
>>> Instructions:
>>> -------------
>>> This errata is currently posted as "Reported". If necessary, please
>>> use "Reply All" to discuss whether it should be verified or
>>> rejected. When a decision is reached, the verifying party (IESG)
>>> can log in to change the status and edit the report, if necessary.
>>>
>>> --------------------------------------
>>> RFC3261 (draft-ietf-sip-rfc2543bis-09)
>>> --------------------------------------
>>> Title               : SIP: Session Initiation Protocol
>>> Publication Date    : June 2002
>>> Author(s)           : J. Rosenberg, H. Schulzrinne, G. Camarillo, A.
>> Johnston, J. Peterson, R. Sparks, M. Handley, E. Schooler
>>> Category            : PROPOSED STANDARD
>>> Source              : Session Initiation Protocol
>>> Area                : Real-time Applications and Infrastructure
>>> Stream              : IETF
>>> Verifying Party     : IESG
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org
>> https://www.ietf.org/mailman/listinfo/sipcore


-- 
Kevin P. Fleming
Digium, Inc. | Director of Software Technologies
Jabber: kfleming@digium.com | SIP: kpfleming@digium.com | Skype: kpfleming
445 Jan Davis Drive NW - Huntsville, AL 35806 - USA
Check us out at www.digium.com & www.asterisk.org