Re: Utility of Alert-Info (was: Re: [Sipping] draft-stucker-sipping-early-media-coping)

Paul Kyzivat <pkyzivat@cisco.com> Thu, 16 November 2006 18:47 UTC

Received: from [127.0.0.1] (helo=stiedprmman1.va.neustar.com) by megatron.ietf.org with esmtp (Exim 4.43) id 1GkmHC-0007jy-RE; Thu, 16 Nov 2006 13:47:54 -0500
Received: from [10.91.34.44] (helo=ietf-mx.ietf.org) by megatron.ietf.org with esmtp (Exim 4.43) id 1GkmHC-0007jt-2P for sipping@ietf.org; Thu, 16 Nov 2006 13:47:54 -0500
Received: from sj-iport-5.cisco.com ([171.68.10.87]) by ietf-mx.ietf.org with esmtp (Exim 4.43) id 1GkmHA-0003gD-IY for sipping@ietf.org; Thu, 16 Nov 2006 13:47:54 -0500
Received: from rtp-dkim-2.cisco.com ([64.102.121.159]) by sj-iport-5.cisco.com with ESMTP; 16 Nov 2006 10:47:50 -0800
Received: from rtp-core-2.cisco.com (rtp-core-2.cisco.com [64.102.124.13]) by rtp-dkim-2.cisco.com (8.12.11/8.12.11) with ESMTP id kAGIlnFw004860; Thu, 16 Nov 2006 13:47:49 -0500
Received: from xbh-rtp-211.amer.cisco.com (xbh-rtp-211.cisco.com [64.102.31.102]) by rtp-core-2.cisco.com (8.12.10/8.12.6) with ESMTP id kAGIlnDO021872; Thu, 16 Nov 2006 13:47:49 -0500 (EST)
Received: from xfe-rtp-201.amer.cisco.com ([64.102.31.38]) by xbh-rtp-211.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Thu, 16 Nov 2006 13:47:48 -0500
Received: from [161.44.79.184] ([161.44.79.184]) by xfe-rtp-201.amer.cisco.com with Microsoft SMTPSVC(6.0.3790.1830); Thu, 16 Nov 2006 13:47:48 -0500
Message-ID: <455CB253.9060604@cisco.com>
Date: Thu, 16 Nov 2006 13:47:47 -0500
From: Paul Kyzivat <pkyzivat@cisco.com>
User-Agent: Thunderbird 1.5.0.8 (Windows/20061025)
MIME-Version: 1.0
To: Jonathan Rosenberg <jdrosen@cisco.com>
Subject: Re: Utility of Alert-Info (was: Re: [Sipping] draft-stucker-sipping-early-media-coping)
References: <6FC4416DDE56C44DA0AEE67BC7CA43715DFA91@zrc2hxm2.corp.nortel.com> <454F837E.1010504@cisco.com> <455A80A6.5020902@cisco.com>
In-Reply-To: <455A80A6.5020902@cisco.com>
Content-Type: text/plain; charset="ISO-8859-1"; format="flowed"
Content-Transfer-Encoding: 7bit
X-OriginalArrivalTime: 16 Nov 2006 18:47:48.0394 (UTC) FILETIME=[B63100A0:01C709AF]
DKIM-Signature: v=0.5; a=rsa-sha256; q=dns/txt; l=3574; t=1163702869; x=1164566869; c=relaxed/simple; s=rtpdkim2001; h=Content-Type:From:Subject:Content-Transfer-Encoding:MIME-Version; d=cisco.com; i=pkyzivat@cisco.com; z=From:=20Paul=20Kyzivat=20<pkyzivat@cisco.com> |Subject:=20Re=3A=20Utility=20of=20Alert-Info=20(was=3A=20Re=3A=09[Sippin g]=09draft-stucker-sipping-early-media-coping) |Sender:=20 |To:=20Jonathan=20Rosenberg=20<jdrosen@cisco.com>; bh=d+CUEd3wVz/N7SmVhB1NJXGxaUwcR0lTMbUvmsQp1YY=; b=MR2hxaxeX9gEL0YvPwzKkRQPAJJkkdTdKpzuj27hAUKGADb2Hpx7k76UvXYG6l0mCcsGi/5Q kX3UruDdKY3j9VAcirZP+FgssfE22G/RyUiDZWZsRxD404hdtmRpXVux;
Authentication-Results: rtp-dkim-2; header.From=pkyzivat@cisco.com; dkim=pass ( sig from cisco.com/rtpdkim2001 verified; );
X-Spam-Score: 0.0 (/)
X-Scan-Signature: b280b4db656c3ca28dd62e5e0b03daa8
Cc: Cullen Jennings <fluffy@cisco.com>, sipping <sipping@ietf.org>, Brian Stucker <bstucker@nortel.com>
X-BeenThere: sipping@ietf.org
X-Mailman-Version: 2.1.5
Precedence: list
List-Id: "SIPPING Working Group \(applications of SIP\)" <sipping.ietf.org>
List-Unsubscribe: <https://www1.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=unsubscribe>
List-Post: <mailto:sipping@ietf.org>
List-Help: <mailto:sipping-request@ietf.org?subject=help>
List-Subscribe: <https://www1.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=subscribe>
Errors-To: sipping-bounces@ietf.org

I mostly agree with Jonathan. One slight difference inline.

	Paul

Jonathan Rosenberg wrote:
> inline.
> 
> Paul Kyzivat wrote:
> 
>> Brian,
>>
>> The case you specify is almost the same case I am talking about, but 
>> make more specific.
>>
>> I didn't say anything about what values the specific URIs should be. I 
>> think there are three interesting categories:
>> 1) a URL of a remote resource that the UAS may actually retrieve
>>    and render
>>
>> 2) a URL of a resource local to the UAS.
>>
>> 3) a URN, that simply specifies a name of a particular alerting style.
>>    The UAS must know what to do for one of these to use it, or have its
>>    own way of discovering that given the URN.
>>
>> I have seen (2) used, but usually as an alternative for (3) in that it 
>> isn't really expected that the UAS will necessarily have something 
>> stored in exactly this way. I find (2) to be unreasonable in most 
>> deployments, and (3) to be a much more reasonable approach, that has 
>> equivalent functionality.
>>
>> This is all orthogonal to how trustworthiness of Alert-Info headers is 
>> managed. I find it difficult to imagine any cases when the UAS would 
>> want to honor a value sent by the UAC.
> 
> Well, here is where URN helps. Since the UA that has to render the URN 
> has to know what it means, you can authorize it or not based on that 
> understanding.
> 
> As others have pointed out, the URN is not going to help cases where 
> people want Britney Spears songs as ringback, but it can help with 
> country-specific ringbacks, where we could easily create a registry.
> 
> I've become convinced that custom ringtones are best done the way they 
> are done today. The ringtone is stored on the called party device, and 
> logic on the phone itself selects which one to use based on the identity 
> of the caller.

I think the above is a perfectly reasonable mechanism, well suited to 
reasonably smart devices with UIs and capabilities for the necessary 
configuration, and when it makes sense to manage each device independently.

I also see value in a case where some of this logic is offloaded from 
the device to a server acting on its behalf. The server makes a decision 
about which alert as appropriate for each call, while the device does 
the rendering of that alert. This is potentially useful for devices that 
are limited in their capabilities in general and their UI in particular. 
  It also could be helpful when there are multiple devices and the same 
alert selection logic is desired for them all.

> Having the caller select content that gets rendered at 
> the called party, without asking the called party for authorization 
> (which is the case for ringtones), is a recipe for absolute disaster. 
> I'm not worried about tasteless music - I'm worried about some malicious 
> user that decides to record some highly offensive content and then start 
> calling random numbers to cause the content to get played out 
> automatically. Big mistake.

Yes, I agree. At most, I can see a UA (or a proxy acting on behalf of 
the UA) accepting a small selection of Alert-Info values that it 
considers benign. Other values should be ignored.

If a UA knows it has a proxy acting on its behalf in screen Alert-Info, 
and perhaps inserting values based on policy carried out by the proxy, 
then the UA may be willing to trust any value it receives via that 
proxy, and render any Alert-Info value it is capable of rendering.

	Paul

> 
> -Jonathan R.
> 

_______________________________________________
Sipping mailing list  https://www1.ietf.org/mailman/listinfo/sipping
This list is for NEW development of the application of SIP
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sip@ietf.org for new developments of core SIP