SIPPING                                                  V. Gurbani, Ed.
Internet-Draft                         Bell Laboratories, Alcatel-Lucent
Intended status: Informational                            E. Burger, Ed.
Expires: August 12, 2010                                   Neustar, Inc.
                                                               T. Anjali
                                        Illinois Institute of Technology
                                                             H. Abdelnur
                                                               O. Festor
                                                                   INRIA
                                                        February 8, 2010


 The Common Log Format (CLF) for the Session Initiation Protocol (SIP)
                 draft-ietf-sipclf-problem-statement-00

Abstract

   Well-known web servers such as Apache and web proxies like Squid
   support event logging using a common log format.  The logs produced
   using these de-facto standard formats are invaluable to system
   administrators for trouble-shooting a server and tool writers to
   craft tools that mine the log files and produce reports and trends.
   Furthermore, these log files can also be used to train anomaly
   detection systems and feed events into a security event management
   system.  The Session Initiation Protocol does not have a common log
   format, and as a result, each server supports a distinct log format
   that makes it unnecessarily complex to produce tools to do trend
   analysis and security detection.  We propose a common log file format
   for SIP servers that can be used uniformly by proxies, registrars,
   redirect servers as well as back-to-back user agents.

Status of this Memo

   This Internet-Draft is submitted to IETF in full conformance with the
   provisions of BCP 78 and BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.



Gurbani, et al.          Expires August 12, 2010                [Page 1]


Internet-Draft                   SIP CLF                   February 2010


   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on August 12, 2010.

Copyright Notice

   Copyright (c) 2010 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents
   (http://trustee.ietf.org/license-info) in effect on the date of
   publication of this document.  Please review these documents
   carefully, as they describe your rights and restrictions with respect
   to this document.  Code Components extracted from this document must
   include Simplified BSD License text as described in Section 4.e of
   the Trust Legal Provisions and are provided without warranty as
   described in the BSD License.
































Gurbani, et al.          Expires August 12, 2010                [Page 2]


Internet-Draft                   SIP CLF                   February 2010


Table of Contents

   1.  Terminology  . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   3.  Problem statement  . . . . . . . . . . . . . . . . . . . . . .  4
   4.  What SIP CLF is and what it is not . . . . . . . . . . . . . .  4
   5.  Alternative approaches to SIP CLF  . . . . . . . . . . . . . .  5
     5.1.  SIP CLF and CDRs . . . . . . . . . . . . . . . . . . . . .  5
     5.2.  SIP CLF and Wireshark packet capture . . . . . . . . . . .  6
   6.  Motivation and use cases . . . . . . . . . . . . . . . . . . .  6
   7.  Challenges in establishing a SIP CLF . . . . . . . . . . . . .  8
   8.  SIP CLF fields . . . . . . . . . . . . . . . . . . . . . . . .  9
   9.  Security Considerations  . . . . . . . . . . . . . . . . . . . 11
   10. Operational guidance . . . . . . . . . . . . . . . . . . . . . 12
   11. IANA Considerations  . . . . . . . . . . . . . . . . . . . . . 12
   12. Acknowledgments  . . . . . . . . . . . . . . . . . . . . . . . 12
   13. References . . . . . . . . . . . . . . . . . . . . . . . . . . 12
     13.1. Normative References . . . . . . . . . . . . . . . . . . . 12
     13.2. Informative References . . . . . . . . . . . . . . . . . . 12
   Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 13































Gurbani, et al.          Expires August 12, 2010                [Page 3]


Internet-Draft                   SIP CLF                   February 2010


1.  Terminology

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in RFC 2119 [1].

   RFC 3261 [2] defines additional terms used in this document that are
   specific to the SIP domain such as "proxy"; "registrar"; "redirect
   server"; "user agent server" or "UAS"; "user agent client" or "UAC";
   "back-to-back user agent" or "B2BUA"; "dialog"; "transaction";
   "server transaction".

   This document uses the term "SIP Server" that is defined to include
   the following SIP entities: user agent server, registrar, redirect
   server, a SIP proxy in the role of user agent server, and a B2BUA in
   the role of a user agent server.


2.  Introduction

   Servers executing on Internet hosts produce log records as part of
   their normal operations.  A log record is, in essence, a summary of
   an application layer protocol data unit (PDU), that captures in
   precise terms an event that was processed by the server.  These log
   records serve many purposes, including analysis and troubleshooting.

   Well-known web servers such as Apache and Squid support event logging
   using a Common Log Format (CLF), the common structure for logging
   requests and responses serviced by the web server.  It can be argued
   that a good part of the success of Apache has been its CLF because it
   allowed third parties to produce tools that analyzed the data and
   generated traffic reports and trends.  The Apache CLF has been so
   successful that not only did it become the de-facto standard in
   producing logging data for web servers, but also many commercial web
   servers can be configured to produce logs in this format.  An example
   of Apache CLF is depicted next:

             %h      %l     %u       %t   \"%r\"   %s    %b
        remotehost rfc931 authuser [date] request status bytes

   remotehost:  Remote hostname (or IP number if DNS hostname is not
      available, or if DNSLookup is Off.

   rfc931:  The remote logname of the user.







Gurbani, et al.          Expires August 12, 2010                [Page 4]


Internet-Draft                   SIP CLF                   February 2010



   authuser:  The username by which the user has authenticated himself.

   [date]:  Date and time of the request.

   request:  The request line exactly as it came from the client.

   status:  The HTTP status code returned to the client.

   bytes:  The content-length of the document transferred.



3.  Problem statement

   The Session Initiation Protocol [2](SIP) is an Internet multimedia
   session signaling protocol that is increasingly used for other
   services besides session establishment.  A typical delpoyment of SIP
   in an enterprise will consist of SIP entities from multiple vendors.
   Currently, if these entities are capable of producing a log file of
   the transactions being handled by them, the log files are produced in
   a proprietary format.  The result of multiplicity of the log file
   formats is the inability of the support staff to easily trace a call
   from one entity to another, or even to craft common tools that will
   perform trend analysis, debugging and troubleshooting problems
   uniformly across the SIP entities of multiple vendors.

   SIP does not currently have a CLF format and this document serves to
   provide the rationale to establish a SIP CLF and identifies the
   required minimal information that must appear in any SIP CLF record.


4.  What SIP CLF is and what it is not

   The SIP CLF is a standardized manner of producing a text file.  This
   format can be used by SIP clients, SIP Servers, proxies, and B2BUAs.
   The SIP CLF is simply an easily digestible log of currently occurring
   events and past transactions.  It contains enough information to
   allow humans and automata to derive relationships between discrete
   transactions handled at a SIP entity.  For example, a SIP
   administrator should be able to issue a concise command to discover
   relationships between transactions or to search a certain dialog or
   transaction.

      Note: The exact form of the "concise command" is left unspecified
      until the working group agrees to one or more formats for encoding
      the fields.




Gurbani, et al.          Expires August 12, 2010                [Page 5]


Internet-Draft                   SIP CLF                   February 2010


   The SIP CLF is amenable to quick parsing (i.e., well-delimited
   fields) and it is platform and operating system neutral.

   The SIP CLF is amenable to easy parsing and lends itself well to
   creating other innovative tools.

   The SIP CLF is not a billing tool.  It is not expected that
   enterprises will bill customers based on SIP CLF.  The SIP CLF
   records events at the signaling layer only and does not attempt to
   correlate the veracity of these events with the media layer.  Thus,
   it cannot be used to trigger customer billing.

   The SIP CLF is not a quality of service (QoS) measurement tool.  If
   QoS is defined as measuring the mean opinion score (MOS) of the
   received media, then SIP CLF does not aid in this task since it does
   not summarize events at the media layer.


5.  Alternative approaches to SIP CLF

   It is perhaps tempting to consider other approaches --- which though
   not standardized, are in wide enough use in networks today --- to
   determine whether or not a SIP CLF would benefit a SIP network
   consisting of mutil-vendor products.  The two existing approaches
   that approximate what SIP CLF does are Call Detail Records (CDRs) and
   Wireshark packet sniffing.

5.1.  SIP CLF and CDRs

   CDRs are used in operator networks widely and with the adoption of
   SIP, standardization bodies such as 3GPP have subsequently defined
   SIP-related CDRs as well.  Today, CDRs are used to implement the
   functionality approximated by SIP CLF, however, there are important
   differences.

   One, SIP CLF operates natively at the transaction layer and maintains
   enough information in the information elements being logged that
   dialog-related data can be subsequently derived from the transaction
   logs.  Thus, esoteric SIP fields and parameters like the To header,
   including tags; the From header, including tags, the CSeq number,
   etc. are logged in SIP CLF.  By contrast, a CDR is used mostly for
   charging and thus saves information to facilitate that very aspect.
   A CDR will most certainly log the public user identification of a
   party requesting a service (which may not correspond to the From
   header) and the public user identification of the party called party
   (which may not correspond to the To header.)  Furthermore, the
   sequence numbers maintained by the CDR may not correspond to the SIP
   CSeq header.  Thus it will be hard to piece together the state of a



Gurbani, et al.          Expires August 12, 2010                [Page 6]


Internet-Draft                   SIP CLF                   February 2010


   dialog through a sequence of CDR records.

   Two, a CDR record will, in all probability, be generated at a SIP
   entity performing some form of proxy-like functionality of a B2BUA
   providing some service.  By contrast, SIP CLF is light- weight enough
   that it can be generated by a canonical SIP user agent server and
   user agent client as well, including those that execute on resource
   constrained devices (mobile phones).

   Finally, SIP is also being deployed outside of operator- managed VoIP
   networks.  Universities, research laboratories, and small-to-medium
   size companies are deploying SIP-based VoIP solutions on networks
   owned and managed by them.  Much of the latter constituencies will
   not have an interest in generating CDRs, but they will like to have a
   concise representation of the messages being handled by the SIP
   entities in a common format.

5.2.  SIP CLF and Wireshark packet capture

   Wireshark is a popular raw packet capture tool.  It contains filters
   that can understand SIP at the protocol level and break down a
   captured message into its individual header components.  While
   Wireshark is appropriate to capture and view discrete SIP messages,
   it does not suffice to serve in the same capacity as SIP CLF for two
   reasons.

   First, while the Wireshark format saves bulk of the information
   needed to create transaction and dialog state, the Wireshark format
   is a binary format that does not lend itself very well to being
   manipulated by text-based tools.  Second and more importantly, if the
   SIP messages are exchanged over a TLS-oriented transport, Wireshark
   will be unable to decrypt them and render them as individual SIP
   headers.


6.  Motivation and use cases

   As SIP becomes pervasive in multiple business domains and ubiquitous
   in academic and research environments, it is beneficial to establish
   a CLF for the following reasons:

   Common reference for interpreting events:  In a laboratory
      environment or an enterprise service offering there will typically
      be SIP servers from multiple vendors participating in routing
      requests.  Absent a CLF format, each server will produce output
      records in a native format making it hard to establish commonality
      for tools that operate on the log file.




Gurbani, et al.          Expires August 12, 2010                [Page 7]


Internet-Draft                   SIP CLF                   February 2010



   Writing common tools:  A CLF format allows independent tool providers
      to craft tools and applications that interpret the CLF data to
      produce insightful trend analysis and detailed traffic reports.
      The format should be such that it retains the ability to be read
      by humans and processed using traditional Unix text processing
      tools.

   Session correlation across diverse processing elements:  In
      operational SIP networks, a request will typically be processed by
      more than one SIP server.  A SIP CLF will allow the network
      operator to trace the progression of the request (or a set of
      requests) as they traverse through the different servers to
      establish a concise diagnostic trail of a SIP session.


         Note that tracing the request through a set of servers is
         considerably less challenging if all the servers belong to the
         same administrative domain.

   Message correlation across transactions:  A SIP CLF can enable a
      quick lookup of all messages that comprise a transaction (e.g.,
      "Find all messages corresponding to server transaction X,
      including all forked branches.")

   Message correlation across dialogs:  A SIP CLF can correlate
      transactions that comprise a dialog (e.g., "Find all messages for
      dialog created by Call-ID C, From tag F and To tag T.")

   Trend analysis:  A SIP CLF allows an administrator to collect data
      and spot patterns or trends in the information (e.g., "What is the
      domain where the most sessions are routed to between 9:00 AM and
      12:00 PM?")

   Train anomaly detection systems:  A SIP CLF will allow for the
      training of anomaly detection systems that once trained can
      monitor the CLF file to trigger an alarm on the subsequent
      deviations from accepted patterns in the data set.  Currently,
      anomaly detection systems monitor the network and parse raw
      packets that comprise a SIP message -- a process that is
      unsuitable for anomaly detection systems [3].  With all the
      necessary event data at their disposal, network operations
      managers and information technology operation managers are in a
      much better position to correlate, aggregate, and prioritize log
      data to maintain situational awareness.






Gurbani, et al.          Expires August 12, 2010                [Page 8]


Internet-Draft                   SIP CLF                   February 2010



   Testing:  A SIP CLF allows for automatic testing of SIP equipment by
      writing tools that can parse a SIP CLF file to ensure behavior of
      a device under test.

   Troubleshooting:  A SIP CLF can enable cursory trouble shooting of a
      SIP server (e.g., "How long did it take to generate a final
      response for the INVITE associated with Call-ID X?")

   Offline analysis:  A SIP CLF allows for offline analysis of the data
      gathered.  Once a SIP CLF file has been generated, it can be
      transported (subject to the security considerations in Section 9)
      to a host with appropriate computing resources to perform
      subsequent analysis.

   Real-time monitoring:  A SIP CLF allows administrators to visually
      notice the events occurring at a SIP server in real-time providing
      accurate situational awareness.


7.  Challenges in establishing a SIP CLF

   Establishing a CLF for SIP is a challenging task.  The behavior of a
   SIP entity is more complex when compared to the equivalent HTTP
   entity.

   Base protocol services such as parallel or serial forking elicit
   multiple final responses.  Ensuing delays between sending a request
   and receiving a final response all add complexity when considering
   what fields should comprise a CLF and in what manner.  Furthermore,
   unlike HTTP, SIP groups multiple discrete transactions into a dialog,
   and these transactions may arrive at a varying inter-arrival rate at
   a proxy.  For example, the BYE transaction usually arrives much after
   the corresponding INVITE transaction was received, serviced and
   expunged from the transaction list.  Nonetheless, it is advantageous
   to relate these transactions such that automata or a human monitoring
   the log file can construct a set consisting of related transactions.

   ACK requests in SIP need careful consideration as well.  In SIP, an
   ACK is a special method that is associated with an INVITE only.  It
   does not require a response, and furthermore, if it is acknowledging
   a non-2xx response, then the ACK is considered part of the original
   INVITE transaction.  If it is acknowledging a 2xx-class response,
   then the ACK is a separate transaction consisting of a request only
   (i.e., there is not a response for an ACK request.)  CANCEL is
   another method that is tied to an INVITE transaction, but unlike ACK,
   the CANCEL request elicits a final response.




Gurbani, et al.          Expires August 12, 2010                [Page 9]


Internet-Draft                   SIP CLF                   February 2010


   While most requests elicit a response immediately, the INVITE request
   in SIP can pend at a proxy as it forks branches downstream or at a
   user agent server while it alerts the user.  RFC 3261 [2] instructs
   the server transaction to send a 1xx-class provisional response if a
   final response is delayed for more than 200 ms.  A SIP CLF log file
   needs to include such provisional responses because they help train
   automata associated with anomaly detection systems and provide some
   positive feedback for a human observer monitoring the log file.

   Finally, beyond supporting native SIP actors such as proxies,
   registrars, redirect servers, and user agent servers (UAS), it is
   beneficial to derive a CLF format that supports back-to-back user
   agent (B2BUA) behavior, which may vary considerably depending on the
   specific nature of the B2BUA.


8.  SIP CLF fields

   The inspiration for the SIP CLF is the Apache CLF.  However, the
   state machinery for a HTTP transaction is much simpler than that of
   the SIP transaction (as evidenced in Section 7).  The SIP CLF needs
   to do considerably more.

   Accordingly, the following SIP CLF fields are defined as mininal
   information that must appear in any SIP CLF record:

   date:  Date and time of the request or response represented as the
      number of seconds and milliseconds since the Unix epoch.

   remotehost:  The DNS name or IP address of the upstream client.

   authuser:  The user name by which the user has been authenticated.
      If the user name is unknown or when a request is challenged, the
      value in this field must be "-"

   method:  The upper-case name of the SIP method.

   request-uri:  The Request-URI, including any URI parameters.

   from:  The From URI, including the tag.  Whilst one may question the
      value of the From URI in light of RFC4744 [4], the From URI,
      nonetheless, imparts some information.  For one, the From tag is
      important and, in the case of a REGISTER request, the From URI can
      provide information on whether this was a third-party registration
      or a first-party one.






Gurbani, et al.          Expires August 12, 2010               [Page 10]


Internet-Draft                   SIP CLF                   February 2010



   to:  The To URI, including tag.

   callid:  The Call-ID.

   status:  The SIP response status code returned upstream.

   contactlist:  Contact URIs in the response, if any.  A "-" field
      value may be used if there aren't any Contact URIs.

   server-txn:  Server transaction identification code - the transaction
      identifier associated with the server transaction.
      Implementations can reuse the server transaction identifier (the
      topmost branch-id of the incoming request, with or without the
      magic cookie), or they could generate a unique identification
      string for a server transaction (this identifier needs to be
      locally unique to the server only.)  This identifier is used to
      correlate ACKs and CANCELs to an INVITE transaction; it is also
      used to aid in forking as explained later in this section.

   client-txn:  Client transaction identification code - this field is
      used to associate client transactions with a server transaction
      for forking proxies or B2BUAs.  Upon forking, implementations can
      reuse the value they inserted into the topmost Via header's branch
      parameter, or they can generate a unique identification string for
      the client transaction.  A more detailed explanation of why it is
      needed is provided next.

   SIP Proxies may fork, creating several client transactions that
   correlate to a single server transaction.  Responses arriving on
   these client transactions, or new requests (CANCEL, ACK) sent on the
   client transaction need log file entries that correlate with a server
   transaction.  Similarly, a B2BUA may create one or more client
   transactions in response to an incoming request.  These transactions
   will require correlation as well.

      To best demonstrate the correlation directives "server-txn" and
      "client-txn", some examples are necessary.  In order to do so, it
      helps to use a canonical representation for the SIP CLF.  The most
      expedient way to do so is to use an ASCII representation for
      illustration purposes only, but to be safe, the working group
      should okay this since a specific SIP CLF format has not been
      defined yet.  To get a gist of how these correlation directives
      help, please see Section 6 of a predecessor [5] to this draft.

   Finally, the SIP CLF should be extensible such that future SIP
   methods, headers and bodies can be represented as well.




Gurbani, et al.          Expires August 12, 2010               [Page 11]


Internet-Draft                   SIP CLF                   February 2010


      Note: Not sure what else to say here since the specific format
      used to encode the CLF has some bearing on extensibility.  A type-
      length-value (TLV) format or a PCAP format has advantages over an
      ASCII format.  All three formats -- the ASCII, binary TLV format,
      and the PCAP format -- are available in Gurbani et al. [5], Roach
      [6], and Kaplan [7], respectively.


9.  Security Considerations

   A log file by its nature reveals the both the state of the entity
   producing it and the nature of the information being logged.  To the
   extent that this state should not be publicly accessible and that the
   information is to be considered private, appropriate file and
   directory permissions attached to the log file should be used.  In
   the worst case, public access to the SIP log file provides the same
   information that an adversary can gain using network sniffing tools
   (assuming that the SIP traffic is in clear text.)  If all SIP traffic
   on a network segment is encrypted, then special attention must be
   directed to the file and directory permissions associated with the
   log file to preserve privacy such that only a privileged user can
   access the contents of the log file.

   Transporting SIP CLF files across the network pose special challenges
   as well.  While transporting SIP CLF files is out of scope in the
   current working group charter, it seems worth drawing attention to
   the fact that if the file is transported using unencrypted FTP or
   email, intermediaries and adversaries may have access to the raw SIP
   CLF records.  Accordingly, if the SIP CLF file is to be moved from
   the generating host, secure FTP or secure email must be used instead.

   The SIP CLF represents the minimum fields that lend themselves to
   trend analysis and serve as information that may be deemed useful.
   Other formats can be defined that include more headers (and the body)
   from Section 8.  However, where to draw a judicial line regarding the
   inclusion of non-mandatory headers can be challenging.  Clearly, the
   more information a SIP server logs, the longer time the logging
   process will take, the more disk space the log entry will consume,
   and the more potentially sensitive information could be breached.
   Therefore, adequate tradeoffs should be taken in account when logging
   more fields than the ones recommended in Section 8.

   Implementers need to pay particular attention to buffer handling when
   reading or writing log files.  SIP CLF entries can be unbounded in
   length.  It would be reasonable for a full dump of a SIP message to
   be thousands of octets long.  This is of particular importance to CLF
   log parsers, as a SIP CLF log writers may add one or more extension
   fields to the message to be logged.



Gurbani, et al.          Expires August 12, 2010               [Page 12]


Internet-Draft                   SIP CLF                   February 2010


10.  Operational guidance

   SIP CLF log files will take up substantive amount of disk space
   depending on traffic volume at a processing entity and the amount of
   information being logged.  As such, any enterprise using SIP CLF
   should establish operational procedures for file rollovers as
   appropriate to the needs of the organization.

   Listing such operational guidelines in this document is out of scope
   for this work.


11.  IANA Considerations

   This document does not require any considerations from IANA.


12.  Acknowledgments

   Members of the sipping, dispatch, ipfix and syslog working groups
   provided invaluable input to the formulation of the draft.  These
   include Benoit Claise, Spencer Dawkins, David Harrington, Christer
   Holmberg, Hadriel Kaplan, Atsushi Kobayashi, Jiri Kuthan, Scott
   Lawrence, Simon Perreault, Adam Roach, Dan Romascanu, Robert Sparks,
   Brian Trammell, Dale Worley, Theo Zourzouvillys and others that we
   have undoubtedly, but inadvertently, missed.

   Adam Roach proposed and documented the binary TLV-format and Hadriel
   Kaplan proposed and documented the PCAP-based format as alternative
   SIP CLF representations.


13.  References

13.1.  Normative References

   [1]   Bradner, S., "Key words for use in RFCs to Indicate Requirement
         Levels", BCP 14, RFC 2119, March 1997.

   [2]   Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
         Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
         Session Initiation Protocol", RFC 3261, June 2002.

13.2.  Informative References

   [3]   Rieck, K., Wahl, S., Laskov, P., Domschitz, P., and K-R.
         Muller, "A Self-learning System for Detection of Anomalous SIP
         Messages",  Principles, Systems and Applications of IP



Gurbani, et al.          Expires August 12, 2010               [Page 13]


Internet-Draft                   SIP CLF                   February 2010


         Telecommunications  Services and Security for Next Generation
         Networks (IPTComm),  LNCS 5310, pp. 90-106, 2008.

   [4]   Peterson, J. and C. Jennings, "Enhancements for Authenticated
         Identity Management in the Session Initiation Protocol (SIP)",
         RFC 4474, August 2006.

   [5]   Gurbani, V., Burger, E., Anjali, T., Abdelnur, H., and O.
         Festor, "The Common Log File (CLF) format for the Session
         Initiation Protocol (SIP)", draft-gurbani-sipping-clf-01 (work
         in progress), March 2009.

   [6]   Roach, A., "Binary Syntax for SIP Common Log Format",
         draft-roach-sipping-clf-syntax-01 (work in progress), May 2009.

   [7]   Kaplan, H., "PCAP-compatible Binary Syntax for SIP Common Log
         File Format", draft-kaplan-sipping-clf-pcap-00 (work in
         progress), June 2009.

   [8]   Debar, H., Curry, D., and B. Feinstein, "The Intrusion
         Detection Message Exchange Format (IDMEF)", RFC 4765,
         March 2007.

   [9]   Claise, B., "Specification of the IP Flow Information Export
         (IPFIX) Protocol for the Exchange of IP Traffic Flow
         Information", RFC 5101, January 2008.

   [10]  Gerhards, R., "The Syslog Protocol", RFC 5424, March 2009.


Authors' Addresses

   Vijay K. Gurbani (editor)
   Bell Laboratories, Alcatel-Lucent
   1960 Lucent Lane
   Naperville, IL  60566
   USA

   Email: vkg@bell-labs.com


   Eric W. Burger (editor)
   Neustar, Inc.
   USA

   Email: eburger@standardstrack.com
   URI:   http://www.standardstrack.com




Gurbani, et al.          Expires August 12, 2010               [Page 14]


Internet-Draft                   SIP CLF                   February 2010


   Tricha Anjali
   Illinois Institute of Technology
   316 Siegel Hall
   Chicago, IL  60616
   USA

   Email: tricha@ece.iit.edu


   Humberto Abdelnur
   INRIA
   INRIA - Nancy Grant Est
   Campus Scientifique
   54506, Vandoeuvre-les-Nancy Cedex
   France

   Email: Humberto.Abdelnur@loria.fr


   Olivier Festor
   INRIA
   INRIA - Nancy Grant Est
   Campus Scientifique
   54506, Vandoeuvre-les-Nancy Cedex
   France

   Email: Olivier.Festor@loria.fr
























Gurbani, et al.          Expires August 12, 2010               [Page 15]