Notes from SIPPING Session 1 at IETF 62

Reported by Spencer Dawkins


SIPPING - IETF 62 Agenda
Chairs: Gonzalo Camarillo, Rohan Mahy, and Dean Willis

THURSDAY, March 10, 2005, 0900-1130,  Salon D
Time Length Discussion Leader Topic Relevant Documents Slides
0900 - 0915 15 minutes Chairs Status and Agenda Bash

    •      Robert Sparks pointed out that SipIT registration closes next week
    •     Please look at "Semi Regular Examples" individual I-D and comment to the author
    •     Robert Sparks talked about dialog-usage I-D - not on the agenda, please look at it and comment
    •     We have volunteers to review Torture Test draft, but please send e-mail to Robert/Gonzalo if you'd like to help
    •     Have published Early Session Disposition/Early Media as RFCs, Transcoding and 3GPP R5 are in RFC Editor Queue
    •     Conferencing drafts are post WGLC (so is URI-list Services), but all are dependent on consent framework
    •     Please ignore official milestones on IETF web page - they are outdated
    •     We would like for people to work for more than one week each IETF cycle
    •     Cullen is working on security flows draft in SIP - please read and comment, authors think they are done
    •     Location requirements was moved to SIP, so this milestone will go there, too
0915 - 0945 30 minutes Dan Petrie -  Configuration Framework and Data Sets
 draft-ietf-sipping-config-framework-06.txt

    •     Delivery server mandates HTTP/HTTPS, UA can choose either
    •     Security section in framework has been rewritten
    •     Separated Normative/Informative references
    •     Event package names and parameters had several issues raised on the list, mostly (not all) cosmetic
    •     Other comments on the list - looking for more use case examples, cross references to normative descriptions, less terse security section, clarify "cache" term, need name-addr, token references
    •     XCAP section is too abstract - remove this section or better define use and scheme for "document" and "app-id" header parameters - need a volunteer to provide text in this section - needs to be either correct or removed, but we can figure out which offline - issue is mostly where we define a binding, don't need a new package to support XCAP - will work this off-line
    •     Cullen - security as described doesn't work for anything except HTTP transport (LDAP, etc.), but we said we can use more than HTTP as transport - need to pass userid and password in SIP if we're going to allow other transports - and dropping the other protocols would be fine with Cullen - any objections to pulling these protocols out? None in the room - if we can demonstrate it's possible to use another protocol, fine - there's not even a procedure for negotiating transport, this is multiple options that don't help interoperability, HTTP/HTTPS are mandatory for server, why do we need this? Choices are bad  - we could fix this, but do we want to? Fixing this doesn't seem to be the consensus of the group - Dan will remove references to other transports in the next revision
    •     This draft is just about ready for last call - if you'd like to implement, please contact the authors
draft-petrie-sipping-profile-datasets-01.txt

    •     Added use case scenarios, removed more complicated constraints elements, added simpler constraints attributes, defined default merging algorithms, added examples correlated to use cases
    •     There are properties that may occur in more than one profile - need to merge/resolve collisions. Merging strategy is specific to the property. Some properties need to be constrained, some properities need to be mandated or disallowed
    •     Need to specify what properties may/may not be changed
    •     Proposing a profile hiearchy of precedence - device, user, application, local-network
    •     Merging will be statically associated with a specific property, and constrained by "policy" attribute
    •     Right direction? Generally positive-to-neutral thumbs display from people who have read the document
    •     If there are use cases where hiearchy doesn't work, please say so!
    •     Framework document is almost done, except that there's no default content type in the framework. This is the likely default type - can the framework proceed without this work being completed? Rohan thinks that this would be OK because the framework useful - chairs have discussed with Allyson
    •     Volker - what about cases where there are conflicts with no common ground? What is the appropriate resolution? Highest-hierarchy wins in Dan's proposal, is this OK?
    •     What about specific-case overrides? Dan worries about the degrees of trust we'd be tripping over - would you trust the local-network to change your user agent? Is trust about content of data, or about source of data?
    •     Cullen - conflicts can be real - if you have no ethernet card, you can't make calls, no matter what - we need to finish, this is the most important work going on in SIPPING right now
    •     Discussions will continue on the list
0945 - 1015 30 minutes - Volker Hilt - Session Policies
draft-ietf-sipping-session-indep-policy-02.txt

    •     Minor changes on this draft
draft-hilt-sipping-session-spec-policy-02.txt  

    •     Chair interrupt - Not enough people are reading these drafts! This is important work
    •     Adam - SIP/SIPPING/SIMPLE/XCON drafts on the agenda = more than four novels that come out in the four weeks before a meeting - it's not realistic to expect everyone to read everything
    •     Agenda is actually in "priority order" - but this is news to a lot of people
    •     James Polk - people are writing drafts, too, they don't have time to read them
    •     Paul - if these drafts were spaced out ... interim meetings?
    •     Cullen - interim meetings suck and are not the solution to this problem in general (although they do help)
    •     Back to the draft...
    •     Major change is to simplify format
    •     BSPF policies are XML elements with flat structure - merging rules are defined individually for each policy element
    •     Merging rules are defined for each policy element
    •     Open issue 1 - what elements should be included? proposals to add media and protocol elements - feedback?
    •     Dave - there are registries for lots of these elements - doing elements as text strings is going to be de-synchronized - if there's not an XML scheme, design one for the IANA and then everyone will have it
    •     We have XCON media elements, too - where do we draw the line?
    •     We've run into validation problems with extensibility mechanisms - can't look up extensible values in the registry, right?
    •     --------------------
    •     Jonathan - would like to use "we're going to use this" as criterion for adding elements
    •     Dan - primary reason for local-network profile was for policy, but no reason you couldn't put policy in other profiles with a well-defined hierarchy
    •     Do we need a transcoder as an element? Defer this to later discussion
    •     Open issue 2 - how to deal with policy conflicts
    •     If policies are enforced in the network, there will be times you can't make a call - but that's OK, it's a fact of life
    •     Policy channel protocol is an Open Issue
    •     SUBSCRIBE/NOTIFY? Plus PUBLISH? with SDP in the SUBSCRIBE body?
    •     HTTP? Asynchronous updates aren't possible
    •     COPS? UA would be PEP
    •     BEEP? this would allow asynchronous updates, but isn't widely implemented in UAs
    •     Feedback? Henning - this is getting close to NETCONF framework - should look at this draft before designing it again piece by piece
    •     Is SUBSCRIBE/NOTIFY good enough? Sending SDP in body is OK
    •     Jonathan - how about Corba? Just kidding ...
    •     -------------------
    •     What are the demands for session-dependent policy? We need to have this discussion before we can move forward
    •     Tom Taylor - go with SUBSCRIBE/NOTIFY model
    •     Paul - session-independent and session-dependent are two ways of looking at the same thing. One is just more efficient than the other
    •     Jon - "Pre-empt" is a great word - things that change and need to be sent to UAs
    •     Jonathan - is this turning into CAC? We need use cases to understand what people are trying to do, to move forward - what are the higher-level things people are trying to do?
    •     Gonzalo - people who don't want to disclose all the rules in their network, only what you need to know for a specific session
    •     What is way forward to this work? Continue discussions on the list
    •     James Polk - are we talking about policy servers that communicate across domains? No, this is out of scope - policy servers talk to UAs
1015 - 1045 30 minutes Gonzalo Camarillo - Consent Framework
 draft-ietf-sipping-consent-reqs-00.txt
 draft-ietf-sipping-consent-framework-01.txt 

    •     Mostly stable - add text about amplification attacks, cross-domain consent
    •     Translation requests- use a header instead of Request-URI? similar to Record-Route header?
    •     Dave Oran - is there a privacy problem revealing the target of the translation? exactly, that's why we're avoiding Request-URI
    •     Don't have a strong preference between Request-URI and header - feedback from the WG?
    •     Can you keep all the state you need encrypted in a URI parameter (like GRUUs/GRIDs)? We think so
    •     Please give feedback if you have an opinion!
    •     SIP PUBLISH, XCAP, or a hybrid?
    •     XCAP allows a read operation, SIP PUBLISH can use SIP Identity
    •     Maybe don't want to restrict consent framework to UAs that support XCAP
    •     Jon - use PUBLISH with SUBSCRIBE? Actually, yes, and SUBSCRIBE could provide read operations
    •     Henning - how is this fundamentally different from configuration requirements?
    •     Does a user add a single document or a lot of documents? This affects SUBSCRIBE/PUBLISH alternative
    •     Can you aggregate documents for different users in a single PUBLISH? This is the same issue as previously
    •     XCAP would work better if you are uploading to your own proxy
    •     Discussion of prearranged permissions is too brief in the current draft
    •     Rohan - support hybrid model - some people do want to do write operations without read operations - with PUBLISH as must-implement
    •     Jonathan - no one will implement anything except mandatory-to-implement - somebody is going to try to do buddy lists with this, if we're going here, let's kill XCAP. PUBLISH only works with totally flat composition policy - in the general-case,  people don't want to see notifications, so forcing SUBSCRIBE is awkward - can you do wildcard-style filtering in this model?
    •     Markus - Should accommodate devices that don't implement XCAP - PUBLISH should be mandatory-to-implement
    •     Dean - consent information isn't just uploading to local proxy - there is no single respository that knows about all consent. This isn't a composited document world we're talking about
    •     Rohan - primary operation is write operation, in many cases the user doesn't care about read operations anyway. There are lots of things that PUBLISH prevents, and this is NOT a bad thing
    •     Dave Oran - is there a requirement to revoke consent? Don't you have to keep state about where you've consented to what? How does putting headers everywhere help with retargeting?
    •     Dean - this is like a mailing list where every message tells you how to unsubscribe - Jon - but this is more like an exploder that relies on identities? What is trust relationship with the other server? Just return-rerouteability
    •     Markus - what about case where you DO want to talk to your own proxy?
    •     Hesham - you want to create an event package in order to use PUBLISH - "small terminals won't implement XCAP" is a weak argument, because XCAP is a thin layer on top of HTTP and small terminals implement HTTP
    •     Jonathan - I hate to pick a protocol because it has the right identification characteristics - Imagine a SIP exploder the size of the IETF list - we don't have anything like this yet, but we're working on it - role-based consent?
    •     Cullen - critical to remember that you consent about your AOR, so consent needs to work when you consent from a great handset and then try to revoke from the lamest of handsets
    •     ---------------------- resumed discussion at end of meeting ----------------------------------
    •     Rohan - we can do SIP PUBLISH right now
    •     Jonathan - this affects basic SIP processing, want to support minimal UAs - even XML isn't required in SIP today - but I think I can describe how to use XCAP whether you understand XCAP or not, just define documents well - RFC 3261 doesn't even require PUBLISH, so...
    •     Jon - differences really are slight - need a consolidated authorization approach, and that would be XCAP, but I support the hybrid approach
    •     Rohan - two issues here, ease of implementation for a really dumb device, and deployment - today, we have PUBLISH - we should move forward with PUBLISH as mandatory-to-implement
    •     Jonathan - what isn't deployed today is SIP Identity, don't kid ourselves about where we are. I know where we will go - PUBLISH will be in every phone and PUBLISH will take over this functionality as hack extensions
    •     Rohan - don't agree that this will happen. SIP Identity is deployable, even if it hasn't been deployed, you're comparing this to approaches that don't even exist yet.
    •     There are no real low-end devices that don't support HTTP, and they have for years
    •     Paul - How do we handle XCAP avalanche restart when we get new IP addresses? Rohan - does this apply to consent?
    •     Hesham - Need an event package (repeating) - we are going to use PUBLISH and THEN define an event package?
    •     User agents are smarter than you think - why can't we do just one solution?
    •     Mandatory-to-implement? Don't have a hum consensus at this time
1045 - 1100 15 minutes Gonzalo Camarillo - Transcoding Framework
 draft-ietf-sipping-transc-framework-01.txt

    •      No change from previous version, just resubmitted
    •     No signalling from transcoder to called party
    •     Problems with this model - lots of messages over slow radio links, many UAs don't support 3pcc. New model needed
    •     Treat the transcoder as if it was a conference, address it as if it was a proxy?
    •     Conference model requires UAs to support list bodies
    •     Route model prevents you from knowing who is the RTP recipient from the SDP contents
    •     This is not just an SBC topic, it's for B2BUAs
    •     Jon - route model means you lose control of consent - conference makes this implicit
    •     Eric - conference model just works, router model breaks SIP stuff - how to have receiving party request transcoding?
    •     For Route model, originator needs to know he needs to request transcoding? But this can be done with OPTIONS, etc. You have to discover this anyway. We're trying to avoid "trusting the network to do the right thing"
    •     Do we all like the conferencing model? Gonzalo will reissue the conferencing-only version of the draft after the IETF
    •     Jonathan is OK with the conferencing model - concerned that proxy will still be making the same decisions with no consent - but they can do this today anyway
1100 - 1105 5 minutes  Gonzalo Camarillo - IPv6 Transition
 draft-camarillo-sipping-v6-transition-00.txt

    •      IESG is requiring SIPPING to have IPv6 transition document using existing mechanisms (ICE, ANAT ) - defining new mechanisms is out of scope
    •     Allison - v6ops is asking for this - does anyone have energy other than Gonzolo? Cullen will help review this document
    •     Adopt as baseline text? Unanimous hum "yes".
1105 - 1115  10 minutes Jani Hautakorpi - SBC Functions
 draft-camarillo-sipping-sbc-funcs-00.txt
draft-bhatia-sipping-sbc-00.txt

    •     Two drafts on functions with SBCs, intended as input to related WGs in IET
    •     Scope is to identify non-SIP friendly functions (not to define SBCs)
    •     Spencer - what target WGs? SIP, probably SIPPING as well
    •     Ben - want to say "no" for new work in this working group, with too much to do now, but need to find a way to move this forward - design team? Design team is already working in this space.