Re: [sipcore] Adam Roach's Discuss on draft-ietf-sipcore-sip-push-21: (with DISCUSS and COMMENT) - the DISCUSS issues Part 2

Paul Kyzivat <pkyzivat@alum.mit.edu> Wed, 09 January 2019 22:16 UTC

Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id B24C212D84C for <sipcore@ietfa.amsl.com>; Wed, 9 Jan 2019 14:16:27 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.043
X-Spam-Level:
X-Spam-Status: No, score=-2.043 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIMWL_WL_MED=-0.142, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=mitprod.onmicrosoft.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CqVOrIp6FGuh for <sipcore@ietfa.amsl.com>; Wed, 9 Jan 2019 14:16:25 -0800 (PST)
Received: from NAM01-SN1-obe.outbound.protection.outlook.com (mail-eopbgr820094.outbound.protection.outlook.com [40.107.82.94]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 42C73126DBF for <sipcore@ietf.org>; Wed, 9 Jan 2019 14:16:25 -0800 (PST)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=mitprod.onmicrosoft.com; s=selector1-mitprod-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=RWz3sDBvuxJ6mrH+B4b1qt15X4uAjEPoPjmvXXHuXwQ=; b=chgeSwZiQhasSvBfrxkgzIPGBMKX2h1EkNOzUtFaaN9xcKAF2B8Naq+dgjOvcJCieMpJO4Xj31xTTyAp22avRJoHqk2iBX+nEI3tJ72u3tJ1uoEdZzawgbi4M/ZrU+3uaJOFaeDdHEzHNRhZ+bPqZZe6gqNPQeLN+J1eItd4/aM=
Received: from CY4PR01CA0006.prod.exchangelabs.com (2603:10b6:903:1f::16) by SN2PR01MB2031.prod.exchangelabs.com (2603:10b6:804:9::24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1495.6; Wed, 9 Jan 2019 22:16:23 +0000
Received: from CO1NAM03FT039.eop-NAM03.prod.protection.outlook.com (2a01:111:f400:7e48::204) by CY4PR01CA0006.outlook.office365.com (2603:10b6:903:1f::16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1516.14 via Frontend Transport; Wed, 9 Jan 2019 22:16:23 +0000
Authentication-Results: spf=pass (sender IP is 18.7.68.33) smtp.mailfrom=alum.mit.edu; ericsson.com; dkim=none (message not signed) header.d=none;ericsson.com; dmarc=bestguesspass action=none header.from=alum.mit.edu;
Received-SPF: Pass (protection.outlook.com: domain of alum.mit.edu designates 18.7.68.33 as permitted sender) receiver=protection.outlook.com; client-ip=18.7.68.33; helo=outgoing-alum.mit.edu;
Received: from outgoing-alum.mit.edu (18.7.68.33) by CO1NAM03FT039.mail.protection.outlook.com (10.152.81.202) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384) id 15.20.1471.13 via Frontend Transport; Wed, 9 Jan 2019 22:16:22 +0000
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x09MGK0c006903 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Wed, 9 Jan 2019 17:16:21 -0500
To: Christer Holmberg <christer.holmberg@ericsson.com>, "sipcore@ietf.org" <sipcore@ietf.org>
References: <HE1PR07MB316165F6D52E313281D15544938B0@HE1PR07MB3161.eurprd07.prod.outlook.com> <14586687-e946-cd8f-45c1-124183f4dd1b@alum.mit.edu> <HE1PR07MB3161FA5C783E9F9D651EE951938B0@HE1PR07MB3161.eurprd07.prod.outlook.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <dfd11114-8554-99e5-a120-d6b71a67ed44@alum.mit.edu>
Date: Wed, 09 Jan 2019 17:16:20 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.4.0
MIME-Version: 1.0
In-Reply-To: <HE1PR07MB3161FA5C783E9F9D651EE951938B0@HE1PR07MB3161.eurprd07.prod.outlook.com>
Content-Type: text/plain; charset="utf-8"; format="flowed"
Content-Language: en-US
Content-Transfer-Encoding: 7bit
X-EOPAttributedMessage: 0
X-Forefront-Antispam-Report: CIP:18.7.68.33; IPV:CAL; SCL:-1; CTRY:US; EFV:NLI; SFV:NSPM; SFS:(10019020)(39860400002)(376002)(396003)(346002)(136003)(2980300002)(189003)(199004)(6246003)(11346002)(75432002)(476003)(2616005)(336012)(230700001)(65826007)(446003)(126002)(26005)(186003)(2486003)(23676004)(2501003)(53546011)(65806001)(76176011)(486006)(65956001)(31696002)(64126003)(956004)(5660300001)(110136005)(36906005)(786003)(316002)(106002)(86362001)(31686004)(356004)(106466001)(478600001)(47776003)(58126008)(67846002)(104016004)(2906002)(50466002)(305945005)(8676002)(246002)(8936002)(7596002)(88552002)(26826003)(229853002); DIR:OUT; SFP:1102; SCL:1; SRVR:SN2PR01MB2031; H:outgoing-alum.mit.edu; FPR:; SPF:Pass; LANG:en; PTR:outgoing-alum.mit.edu; MX:1; A:1;
X-Microsoft-Exchange-Diagnostics: 1; CO1NAM03FT039; 1:Yg/ZeOFLVvQpaSVxt11tSAPkrdcKXO+uwQirKP7lpxuTHzA/53j6GV7YYQYl3zaVogrDxlJLYLHCak9mGkw+39h4WYq4dm4l5W2hhaQNkcLp/3WNf893jmq8Q355mowb
X-MS-PublicTrafficType: Email
X-MS-Office365-Filtering-Correlation-Id: e21d99bb-13cf-4aaa-7f77-08d6768016f2
X-Microsoft-Antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600109)(711020)(4608076)(4709027)(2017052603328)(7153060); SRVR:SN2PR01MB2031;
X-Microsoft-Exchange-Diagnostics: 1; SN2PR01MB2031; 3:NhZ5KdPnvhoa2R53r7ttQk1A2M49ihixaX+H0duvGqIr0MxP0hID761xCiMhIYgAbhh96ICtd2Ofe7VXK8wP1Ss3D/aKY8yzQiMG82ls1WkqqYUrzZacCUKPgP2NM/iHSYAAzYYPPZ8Gc13gFVes2MrRhSPAsnLyqBFmPub9aPhdY/Jlf7yAsfvNZKqUduVJi8yy9gkATmzJbQF8XqFahpbGv6lKE/dBgVudAgIR4Guew1XAwcAUgM6oPPDwNR03l694HHQ0iWFKtdZF4GbwysVTPNjL1+3Abnk0NCfsMIcmydmIJJtfgAIxWgqQR80lhRXDPJfrj9Gckrz8M+OWo9daFa9H6ofyFNbnEpkcQwhIUVXe36EfMV4ViCIWL2PS; 25:y2Mpst/Wn2+wQm0dQaisuunPOPwVUhCFyW+3tB+e91B/jSpTaiqjexpoaHvPb1CzVNwLQfFFxSRs8sSF5EoVL7o/CSoyZK5E+Yv8Ij4sTVa6eT+SBb5Of5VaHbjPODYfXLEF6/65rmIpYyViqc3lDYsdh9vLjEWqNo7iRLgtZmEDVQcdtCJcgx1GprDNEh4QFeLJeTDvB7HuW9CFigFJeg5PAsdzAx584ATjVOzOEqk5SCfRJwZ0QD2cqJojndTVtdhuTcrwSpKrwki1cWitTw7Com5EjBwTeYJY2QKXZ8oYBH+gvvMxJdSyNRAdRVSnOmdPxrmqu3QYlKp0NNMYRw==
X-MS-TrafficTypeDiagnostic: SN2PR01MB2031:
X-Microsoft-Exchange-Diagnostics: 1; SN2PR01MB2031; 31:fs7aN0JTtNLQwxY0J11OmInP0e6+MVM0T6pAjc9LNCEggNuTxN2wkXOgfyO44orzxEM8I5FTlvhuXj5FBeX9kykKkJuFDC9SiHCAxKLy5SZJ90WGHfXhfHJLrvZhxTq9pCDiH9wo4x8PtYMOWbZTIsMM8Oh6i04J+ICfiqaZde25baOXVkieRPXOUfEdGPdhhVS8Nb1ahZQ2uUBhHn+H08T9A65RcvSRnd/KhawMoyE=; 20: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
X-Microsoft-Antispam-PRVS: <SN2PR01MB2031E7EA8F464AC7FEA2A47EF98B0@SN2PR01MB2031.prod.exchangelabs.com>
X-Microsoft-Exchange-Diagnostics: 1; SN2PR01MB2031; 4:icVBOT6oAOFum9nTIlX6MGOqqc5MC1C92GkO8BZJ4nN8L6adufHjGKvwgAkakslH6sVtsplEqLTykoWbuGTPJx9D1sGZ6rVX68/MXQWkseFBHZRF82QQeeIA7A050/Dv8AQcynloi2Q8HXQ8LvbVU9b9hsPn/tg/tulwRNByGq3TxQVmFGqSZJMxx6nXGXabevjVr63P5QF/Psk4QvG1dUkL36frKJPKKN4Ec32ahw1RQe9GDzXLK2OdPaO97nBYAs0xIPTblC2H0YREA/80EqcKnyEaFxhEXwwso//NiLg=
X-Forefront-PRVS: 0912297777
X-Microsoft-Exchange-Diagnostics: 1;SN2PR01MB2031;23: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
X-MS-Exchange-SenderADCheck: 1
X-Microsoft-Antispam-Message-Info: o9Ixd+U0nhLWSbsZ3HRAohWsdMCt49D7+tjrpSPAHL7LmHnfKPxi+H19wou05GWz+ofqoJNGWZccLXEs0+chkJ9vC0n7ibR9tEs+cP6WZEiEdfpa18NO7k+rpmfvSOCZ7G7ESqzmahK1No4I/Abjys+UvLDrXrRqea/UGEwetufLvG7e4e6NdgLHbnPMQ4wEds8BtRT0dptU6TJ0gZBnv9dr+GLP6HWAzZM/KXo5Zuw5uuGLzDJfY1rv/bYvl1xEQ7itRfbgk6RSBlt7hxwrS5QBVjqYq8rh5XIf1aDQlxPhz/nnHQqi3YCNY7yrn5hi
X-Microsoft-Exchange-Diagnostics: 1; SN2PR01MB2031; 6:Qb8umHhqgWUZXJMCg7In73hU5ruGQ6L1YmoIwCl5nuWpVQGyCqzaa1Y1NbLVdRz7W6iPM4CrFFIzQB/FtEY5encXPTo6tgOXxq2PEp1X6iJ6zwz4DrkD3x1yZlULdtmyFzD8Yi85WAWYoI8oIrEtq7x8c75hMk6r6AyHrJe6f4pGJI5vxUx26ZtnUVVvt6cLjrFstA1eSdyIcAGwUFROX/9kmJFxx6WKj5eqaeFAn4BqND4eRBGi1gHedpVsFYA/bC5G6/w+BQy2UtnC3TJ7H/pK6CEgdYisiAnkR6norKenDa+lkwPkmow9B7Qjl/w+XUNAKNm4ORrjnFDf1FM/ve8tHsv9kIFa3j3vryNL3kJRLfd11WuUhO91qQRL0migZx2fowAR0OMheq0mlh3eKfKtLoiU6JzBGp9tv+CN/9ixLXqX3ESwO6YVqiIj61mafq07/Zj7++F7XsRXa5TlJw==; 5:l0SJBrYDOIinfkGfjdjneY9UE+LY5hAZ4EbE2t0JXZax19b7QzizbwrcdKuGP9lP4uZHvXDBS529R0SkmBy6TKDze88okg6BiuzITEu6jd4ml2l96ZSyc8gv14LMrWEfgxmOjF544jop96hKeF6EqTWC1OAVbB7PONvDlIxDGmbpTGS5+XhcSr3Rs3iGmhwXZbqPBb2excyUqR4drtyskg==; 7:GRS6EF087/Tpygt65LT+2XO5YEiEQrVOiNlMxCB90WsDc5mbiIlqwL+L0s5F/jQeJgY8G3JM2+qp3e2v3AGAQcGoJcMRzAqTj17VSwS4hshuej9m7CzqkdyN0yf98SXmXjUEIMNWi5tnMVNk+Ooj6g==
SpamDiagnosticOutput: 1:99
SpamDiagnosticMetadata: NSPM
X-OriginatorOrg: alum.mit.edu
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 09 Jan 2019 22:16:22.7855 (UTC)
X-MS-Exchange-CrossTenant-Network-Message-Id: e21d99bb-13cf-4aaa-7f77-08d6768016f2
X-MS-Exchange-CrossTenant-Id: 64afd9ba-0ecf-4acf-bc36-935f6235ba8b
X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=64afd9ba-0ecf-4acf-bc36-935f6235ba8b; Ip=[18.7.68.33]; Helo=[outgoing-alum.mit.edu]
X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem
X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN2PR01MB2031
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/k8_kbMIRezabku_BkW5zOepv11A>
Subject: Re: [sipcore] Adam Roach's Discuss on draft-ietf-sipcore-sip-push-21: (with DISCUSS and COMMENT) - the DISCUSS issues Part 2
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 09 Jan 2019 22:16:28 -0000

On 1/9/19 12:24 PM, Christer Holmberg wrote:
> Hi,
> 
>>>> I think you need a different discovery mechanism here -- either have
>>>> one that has the client offering multiple PNS protocols and the proxy responding with one, or have one in
>>>> which the proxy indicates all of its supported services in a response, and the client chooses one to use in its next REGISTER message.
>>>
>>> I suggest the first option, where the client can offer multiple PNS protocols (pn-provider values) and the proxy responds with one.
>>
>> There could be a situation where there are multiple proxies on the path, each supporting a different mechanism.
>> Then what happens? Does the first proxy "win", or the last one?
>>
>> If this starts with the proxies each indicating their support, then the client gets to choose the one he prefers. This also
>> means the client doesn't need to include any additional information until it knows that it will be supported. Of course this
>> requires a double registration at startup, but considering the number of register requests that will be used during the session
>> this doesn't seem a huge burden.
> 
> If a proxy has indicated support of push, another proxy should not do it. The current syntax doesn't allow it.
> 
> Also, I am not aware of any scenario where there would be multiple proxies supporting push, so I don't think it is a real-life issue. Even if a network support multiple PNSs, they will all be handled by the same proxy.

That seems unfortunate. It may be that there is no single proxy 
implementation that supports all the different, while there might not be 
a single PNS that all the clients support. What is the deployment to do 
in that case? Deploying multiple proxies on the path, supporting 
different PNSs would be a solution. It wouldn't be too burdensome 
because only the chosen one would need to stay on the path.

But apparently that option is currently not supported.

	Thanks,
	Paul