[Sipping] P-Served-User contents

Rocío Collado <rcollado@experienceis.com> Tue, 14 October 2008 07:17 UTC

Return-Path: <sipping-bounces@ietf.org>
X-Original-To: sipping-archive@optimus.ietf.org
Delivered-To: ietfarch-sipping-archive@core3.amsl.com
Received: from [127.0.0.1] (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id B83153A67D0; Tue, 14 Oct 2008 00:17:36 -0700 (PDT)
X-Original-To: sipping@core3.amsl.com
Delivered-To: sipping@core3.amsl.com
Received: from localhost (localhost [127.0.0.1]) by core3.amsl.com (Postfix) with ESMTP id 7B04D3A6BCC for <sipping@core3.amsl.com>; Tue, 14 Oct 2008 00:17:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.299
X-Spam-Level:
X-Spam-Status: No, score=-6.299 tagged_above=-999 required=5 tests=[BAYES_00=-2.599, MIME_8BIT_HEADER=0.3, RCVD_IN_DNSWL_MED=-4]
Received: from mail.ietf.org ([64.170.98.32]) by localhost (core3.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dMV-d6LjUFRL for <sipping@core3.amsl.com>; Tue, 14 Oct 2008 00:17:34 -0700 (PDT)
Received: from correo11.acens.net (correo11.acens.net [217.116.0.29]) by core3.amsl.com (Postfix) with ESMTP id BA1693A67D0 for <sipping@ietf.org>; Tue, 14 Oct 2008 00:17:33 -0700 (PDT)
Received: (qmail 22539 invoked from network); 14 Oct 2008 07:18:04 -0000
Received: from unknown (HELO hp09rocio) ([88.2.60.18]) (envelope-sender <rcollado@experienceis.com>) by correo11.acens.net (qmail-ldap-1.03) with SMTP for <sip-implementors@cs.columbia.edu>; 14 Oct 2008 07:18:03 -0000
From: Rocío Collado <rcollado@experienceis.com>
To: 'sipping' <sipping@ietf.org>
References: <20080907181501.896DB3A6929@core3.amsl.com> <48C5A90B.6020803@cisco.com> <5D1A7985295922448D5550C94DE291800231D59B@DEEXC1U01.de.lucent.com>
In-Reply-To: <5D1A7985295922448D5550C94DE291800231D59B@DEEXC1U01.de.lucent.com>
Date: Tue, 14 Oct 2008 09:18:01 +0200
Message-ID: <000e01c92dcc$ff7c3c00$fe74b400$@com>
MIME-Version: 1.0
X-Mailer: Microsoft Office Outlook 12.0
Thread-Index: AckSA0uDWenDCU0YQOCpK1GKs+L72QHs1d3QBQUc6mA=
Content-Language: es
X-Antivirus: avast! (VPS 081013-0, 13/10/2008), Outbound message
X-Antivirus-Status: Clean
Cc: sip-implementors@cs.columbia.edu
Subject: [Sipping] P-Served-User contents
X-BeenThere: sipping@ietf.org
X-Mailman-Version: 2.1.9
Precedence: list
List-Id: "SIPPING Working Group \(applications of SIP\)" <sipping.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=unsubscribe>
List-Archive: <https://www.ietf.org/mailman/private/sipping>
List-Post: <mailto:sipping@ietf.org>
List-Help: <mailto:sipping-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipping>, <mailto:sipping-request@ietf.org?subject=subscribe>
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable
Sender: sipping-bounces@ietf.org
Errors-To: sipping-bounces@ietf.org

Hi, all!!


	After having read I-D draft-vanelburg-sipping-served-user-07.txt
there is something unclear to me:

Where are the P-Served-User header field contents extracted from? (in
particular, in the session establishment procedure)

Is this header field filled in with some other header value (Request-URI,
P-Asserted-Id...)? Is perhaps the value taken from some previously stored
information (from registration or subscription procedure)? Does it depend on
the scenario? Do the S-CSCF and the AS extract it from the same origin?

	Thank you very much for your help!!


Rocío Collado Collado
eXperience Ingeniería y Servicios - Boecillo
Tlf.:     983 54 98 48
Móvil: 659 74 57 91
rcollado@experienceis.com

-----Mensaje original-----
De: sipping-bounces@ietf.org [mailto:sipping-bounces@ietf.org] En nombre de
DRAGE, Keith (Keith)
Enviado el: jueves, 18 de septiembre de 2008 19:51
Para: Paul Kyzivat; sipping
Asunto: Re: [Sipping] I-D Action:draft-vanelburg-sipping-served-user-07.txt

Paul wrote:

> >  o The next hop proxy supports the P-Served-User header.	
> >  o The next hop proxy requires the served user information
> >    for its proper operation.	
> 
> I don't know how you can know these things. Are these really 
> important to know? Does it hurt anything to insert the header 
> without knowing this?
>

The normal way of dealing with this is that if the next hop does not
support the header, it is configured to not form part of the same trust
domain, and therefore it would be removed by those rules.

That I believe is consistent with your final comment, and indeed has the
same effect.

It is also the way we've defined it is defined in IMS (I think)!

Keith



> -----Original Message-----
> From: sipping-bounces@ietf.org 
> [mailto:sipping-bounces@ietf.org] On Behalf Of Paul Kyzivat
> Sent: Monday, September 08, 2008 11:37 PM
> To: sipping
> Subject: Re: [Sipping] I-D 
> Action:draft-vanelburg-sipping-served-user-07.txt
> 
> I haven't looked at this since version -00. Compared to that, 
> this is much improved.
> 
> This is clearly very focused for IMS usage, and not 
> meaningful in anything much different from that. But it is a 
> P- header, and so that scoping is ok.
> 
> Just a couple of comments:
> 
> Section 7.1 says:
> 
> >  o The next hop proxy is part of the same Trust Domain
> >    for P-Served-User.	
> 
> Its not good to talk about the "next hop proxy". While you 
> can tell the address of the next hop, whether it is a proxy 
> or not is not determinable by examining the address. So I 
> think it is better to simply 
> say: "the next hop is part of the same Trust Domain", etc.	
> 
> >  o The next hop proxy supports the P-Served-User header.	
> >  o The next hop proxy requires the served user information
> >    for its proper operation.	
> 
> I don't know how you can know these things. Are these really 
> important to know? Does it hurt anything to insert the header 
> without knowing this?
> 
> Section 7.2 says:
> 
> > A proxy that supports the header, MUST remove the header 
> from requests 
> > or responses before further
> > forwarding the message.	
> > 				
> > When the next hop might requires served user information, then the 
> > procedure as in Section 7.1 MUST apply before
> > forwarding the message.	
> 
> Combined with 7.1, this means that the strategy for keeping 
> this header from leaking out into the wild is to insert if 
> for exactly one hop, and depend on the recipient to remove 
> it. This puts a dependency on a lot of nodes.
> 
> Wouldn't it be more consistent to treat this more like 
> P-Asserted-Identity? Namely, remove the header when leaving 
> the trust domain. This only requires the last element in the 
> trust domain to remove it.
> 
> For this header there is the added complication that the role 
> can change from originating to terminating without leaving 
> the trust domain. So it would also be necessary to 
> remove/replace the (old) header when changing roles. But it 
> still need only be done by select elements.
> 
> This would mean that one could always insert the header when 
> sending to 
> an AS, without regard for whether the AS supports it or not.	
> 
> 	Thanks,
> 	Paul
> _______________________________________________
> Sipping mailing list  https://www.ietf.org/mailman/listinfo/sipping
> This list is for NEW development of the application of SIP 
> Use sip-implementors@cs.columbia.edu for questions on current 
> sip Use sip@ietf.org for new developments of core SIP
> 
_______________________________________________
Sipping mailing list  https://www.ietf.org/mailman/listinfo/sipping
This list is for NEW development of the application of SIP
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sip@ietf.org for new developments of core SIP

_______________________________________________
Sipping mailing list  https://www.ietf.org/mailman/listinfo/sipping
This list is for NEW development of the application of SIP
Use sip-implementors@cs.columbia.edu for questions on current sip
Use sip@ietf.org for new developments of core SIP