Re: [sipcore] AD review: draft-ietf-sipcore-event-rate-control-03

Adam Roach <adam@nostrum.com> Tue, 13 July 2010 22:18 UTC

Return-Path: <adam@nostrum.com>
X-Original-To: sipcore@core3.amsl.com
Delivered-To: sipcore@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B93AF3A69F1 for <sipcore@core3.amsl.com>; Tue, 13 Jul 2010 15:18:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level:
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[AWL=0.000, BAYES_00=-2.599, SPF_PASS=-0.001]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dlKiLdJHu0oD for <sipcore@core3.amsl.com>; Tue, 13 Jul 2010 15:18:43 -0700 (PDT)
Received: from nostrum.com (nostrum-pt.tunnel.tserv2.fmt.ipv6.he.net [IPv6:2001:470:1f03:267::2]) by core3.amsl.com (Postfix) with ESMTP id A25493A69E5 for <sipcore@ietf.org>; Tue, 13 Jul 2010 15:18:42 -0700 (PDT)
Received: from hydra-3.local (ppp-70-249-149-233.dsl.rcsntx.swbell.net [70.249.149.233]) (authenticated bits=0) by nostrum.com (8.14.3/8.14.3) with ESMTP id o6DMInrR093518 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Tue, 13 Jul 2010 17:18:50 -0500 (CDT) (envelope-from adam@nostrum.com)
Message-ID: <4C3CE649.1060309@nostrum.com>
Date: Tue, 13 Jul 2010 17:18:49 -0500
From: Adam Roach <adam@nostrum.com>
User-Agent: Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; en-US; rv:1.9.2.4) Gecko/20100608 Thunderbird/3.1
MIME-Version: 1.0
To: Robert Sparks <rjsparks@nostrum.com>
References: <99619466-573D-4CEA-ACCD-3A3D262EB2B0@nostrum.com> <A80667440D58A1469E651BA443BED3C1547F4EDE9D@NOK-EUMSG-01.mgdnok.nokia.com> <4C3BCEFB.5010201@nostrum.com> <739E9B6D-24B5-4A45-9BC7-0387BFB5CF32@nostrum.com>
In-Reply-To: <739E9B6D-24B5-4A45-9BC7-0387BFB5CF32@nostrum.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
Received-SPF: pass (nostrum.com: 70.249.149.233 is authenticated by a trusted mechanism)
Cc: sipcore@ietf.org
Subject: Re: [sipcore] AD review: draft-ietf-sipcore-event-rate-control-03
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: SIP Core Working Group <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/sipcore>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 13 Jul 2010 22:18:43 -0000

  On 7/13/10 16:23, Jul 13, Robert Sparks wrote:
> I don't think it's as clear-cut as that.
>
> 4662 used the extension points 3265 expected to be used.

Not any more than anything else. The extension points that 3265 defines 
are new event packages. 4662 uses feature tags to negotiate usage -- a 
basic SIP extension mechanism.

Event-rate-control uses new header field parameters -- another basic SIP 
extension mechanism.

>   Someone that had written a network monitor, for example, just using
> 3265 for reference could have produced code that made sense out of a stream of messages emitted by implementations of 4662.
>
> That same code would probably not do the right thing with a stream of messages from this spec

I can't imagine why not. It will look like a stream of state information 
sent in NOTIFY messages.

I also don't have a lot of sympathy for the "network monitor" use case 
as a motivator unless we're going to explicitly deprecate TLS and S/MIME.


> - at the very least, it wouldn't know to be looking for Event headers in 200 responses

No, and it won't know to care about them either. Which is exactly the 
right thing to do reaction.

The event header fields in responses are there as a syntactic concession 
-- we needed somewhere to hang the parameters. The actual event name 
itself can't change. It can be safely ignored by network monitors, and 
they'll do the right thing.

> What does 3265bis say about Event headers in responses to NOTIFYs at the moment?

Nothing yet. I have a note to add text addressing this case (as well as 
the suppressed NOTIFY situation that arises from subnot-etags).

/a