Session Initiation Protocol (SIP) User Agent Configuration
RFC 6011
Revision differences
Document history
Date | Rev. | By | Action |
---|---|---|---|
2020-01-21 |
03 | (System) | Received changes through RFC Editor sync (added Verified Errata tag) |
2015-10-14 |
03 | (System) | Notify list changed from john.elwell@siemens-enterprise.com, xmlscott@gmail.com, draft-lawrence-sipforum-user-agent-config@ietf.org to (None) |
2012-08-22 |
03 | (System) | post-migration administrative database adjustment to the No Objection position for Sean Turner |
2012-08-22 |
03 | (System) | post-migration administrative database adjustment to the No Objection position for Ralph Droms |
2012-08-22 |
03 | (System) | post-migration administrative database adjustment to the No Objection position for Alexey Melnikov |
2012-08-22 |
03 | (System) | post-migration administrative database adjustment to the No Objection position for Adrian Farrel |
2010-10-29 |
03 | Cindy Morgan | State changed to RFC Published from RFC Ed Queue by Cindy Morgan |
2010-10-29 |
03 | Cindy Morgan | [Note]: 'RFC 6011' added by Cindy Morgan |
2010-10-28 |
03 | (System) | RFC published |
2010-07-14 |
03 | (System) | IANA Action state changed to RFC-Ed-Ack from Waiting on RFC Editor |
2010-07-14 |
03 | (System) | IANA Action state changed to Waiting on RFC Editor from In Progress |
2010-07-14 |
03 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2010-07-13 |
03 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2010-07-13 |
03 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2010-07-08 |
03 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2010-07-08 |
03 | (System) | IANA Action state changed to In Progress from Waiting on Authors |
2010-07-07 |
03 | (System) | IANA Action state changed to Waiting on Authors from In Progress |
2010-06-29 |
03 | Amy Vezza | State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza |
2010-06-28 |
03 | (System) | IANA Action state changed to In Progress |
2010-06-28 |
03 | Cindy Morgan | IESG state changed to Approved-announcement sent |
2010-06-28 |
03 | Cindy Morgan | IESG has approved the document |
2010-06-28 |
03 | Cindy Morgan | Closed "Approve" ballot |
2010-06-26 |
03 | Gonzalo Camarillo | State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Gonzalo Camarillo |
2010-06-26 |
03 | Ralph Droms | [Ballot Position Update] Position for Ralph Droms has been changed to No Objection from Discuss by Ralph Droms |
2010-06-26 |
03 | Adrian Farrel | [Ballot Position Update] Position for Adrian Farrel has been changed to No Objection from Discuss by Adrian Farrel |
2010-06-24 |
03 | Alexey Melnikov | [Ballot Position Update] Position for Alexey Melnikov has been changed to No Objection from Discuss by Alexey Melnikov |
2010-06-23 |
03 | (System) | New version available: draft-lawrence-sipforum-user-agent-config-03.txt |
2010-06-22 |
03 | Alexey Melnikov | [Ballot discuss] 2.4.1. Configuration Data Request Authentication If the CS requires HTTP authentication of the configuration data request, the HTTP 'username' parameter used … [Ballot discuss] 2.4.1. Configuration Data Request Authentication If the CS requires HTTP authentication of the configuration data request, the HTTP 'username' parameter used MUST be the same value as the sfua-user value provided in the configuration data request parameters. The UA MUST support using either Basic or Digest authentication as specified by RFC 2617 [RFC2617]. The last sentence: this doesn't guaranty interoperability. I think UAs MUST support both, not either. |
2010-06-21 |
03 | Sean Turner | [Ballot Position Update] Position for Sean Turner has been changed to No Objection from Discuss by Sean Turner |
2010-06-21 |
03 | Sean Turner | [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're … [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're dancing around not using 2119 language: OLD: A User Agent implementation compliant to this specification MAY also implement additional mechanisms that may be required in particular environments, or for use when the services specified here are not available. NEW: A User Agent implementation compliant to this specification MAY also implement additional mechanisms necessary for particular environments, or for use when the services specified here are not available. #3) Sec 2.4.2: Is the list of failures inclusive or are there other ways it can fail? #4) Sec 3.1: r/should/SHOULD #5) Sec 5: r/Url/URL #6) Sec 5: r/to provide for including that/to provide that |
2010-06-21 |
03 | Sean Turner | [Ballot discuss] [Updated to based on -02 version.] #1) Addressed in -02. #2) Addressed in -02. #3) Addressed in -02. #4) Addressed in -02. #5) … [Ballot discuss] [Updated to based on -02 version.] #1) Addressed in -02. #2) Addressed in -02. #3) Addressed in -02. #4) Addressed in -02. #5) Addressed (no change required). #6) Addressed (no change required). #7) Addressed in -02. #8) Addressed in -02. #10) Addressed (no change required). #11) Addressed (no change required). #12) Addressed in -02. #13) Addressed in -02. #14) Addressed. |
2010-06-21 |
03 | Sean Turner | [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're … [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're dancing around not using 2119 language: OLD: A User Agent implementation compliant to this specification MAY also implement additional mechanisms that may be required in particular environments, or for use when the services specified here are not available. NEW: A User Agent implementation compliant to this specification MAY also implement additional mechanisms necessary for particular environments, or for use when the services specified here are not available. #3) Sec 2.4.2: Is the list of failures inclusive or are there other ways it can fail? #4) Sec 3.1: r/should/SHOULD #5) Sec 5: r/Url/URL #6) Sec 5: r/to provide for including that/to provide that |
2010-06-21 |
03 | Sean Turner | [Ballot discuss] [Updated to based on -02 version.] #1) Addressed in -02. #2) Addressed in -02. #3) Addressed in -02. #4) Addressed in -02. #5) … [Ballot discuss] [Updated to based on -02 version.] #1) Addressed in -02. #2) Addressed in -02. #3) Addressed in -02. #4) Addressed in -02. #5) Addressed (no change required). #6) Addressed (no change required). #7) Addressed in -02. #8) Addressed in -02. #10) Addressed (no change required). #11) Addressed (no change required). #12) Addressed in -02. #13) Addressed in -02. #14) This is a place-holder DISCUSS. Awaiting response to the SECDIR review provided by Jeffrey Hutzelman on 2010-05-03. |
2010-06-21 |
03 | (System) | Sub state has been changed to AD Follow up from New Id Needed |
2010-06-21 |
02 | (System) | New version available: draft-lawrence-sipforum-user-agent-config-02.txt |
2010-05-18 |
03 | Ralph Droms | [Ballot comment] |
2010-05-18 |
03 | Ralph Droms | [Ballot discuss] This Discuss position was updated on 5-17 after an e-mail discussion among the authors, Ted Lemon (dhc WG co-chair) and myself. Thread begins … [Ballot discuss] This Discuss position was updated on 5-17 after an e-mail discussion among the authors, Ted Lemon (dhc WG co-chair) and myself. Thread begins here: https://www.ietf.org/mailman/private/iesg/2010-May/071964.html and and continues here: https://www.ietf.org/mailman/private/iesg/2010-May/071932.html This Discuss is based on the -01 rev of the doc. Ideally, discovery of a SIP UA configuration service would use newly defined DHCPv4 and DHCPv6 options to pass the Local Network Domain to the SIP UA. Reuse/overloading of existing options incurs other costs and unexpected results. draft-lawrence-sipforum-user-agent-config specifies the use of contents of the DHCPv4 "Domain Name" option (code 15) and the contents of the DHCPv6 "SIP Servers Domain Name List" option (code 21) as candidates for the UA's "Local Network Domain". Overloading these options may conflict with other uses of the options or with the use of other options (e.g., DHCPv4 "Domain Search" option [code 119]). Also, the options carry data in different formats: the "Domain Name" option a name like "example.com", while the "SIP Servers Domain Name List" option carries names like "sip1.example.com". If existing DHCP options are overloaded to carry candidates for the "Local Netwrok Domain", the options should be consistent between DCHPv4 and DHCPv6 so a single DNS NAPTR record can serve both options; e.g., "Domain Search" option and "Domain Search List" option, or the DHCPv4 and DHCPv6 versions of the "SIP Servers Domain Name List" |
2010-05-07 |
03 | (System) | Removed from agenda for telechat - 2010-05-06 |
2010-05-06 |
03 | Gonzalo Camarillo | State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Gonzalo Camarillo |
2010-05-06 |
03 | Gonzalo Camarillo | The authors will revise the draft in order to address a set of discusses that were received during its IESG evaluation. |
2010-05-06 |
03 | Ralph Droms | [Ballot comment] Related to the Comment Russ entered: add text to explain how a dual-stacked host operates. |
2010-05-06 |
03 | Ralph Droms | [Ballot discuss] I'm not sure the use of DHCPv4 and DHCPv6 options is consistent and/or correct. DHCPv4 option 120, "SIP Servers DHCP Option" and DHCPv6 … [Ballot discuss] I'm not sure the use of DHCPv4 and DHCPv6 options is consistent and/or correct. DHCPv4 option 120, "SIP Servers DHCP Option" and DHCPv6 option 21, "SIP Servers Domain Name List" both return a list of FQDNs for SIP servers to be used by the client host. This doc specifies the use of the DHCPv4 option 15, "Domain Name" to obtain the domain name over IPv4 and DHCPv6 option 21 over IPv6. I don't think the use of DHCPv6 option 21 is correct, as I think it will deliver the FQDN for SIP servers, rather than the SIP domain in which the host is attached. |
2010-05-06 |
03 | Ralph Droms | [Ballot Position Update] New position, Discuss, has been recorded by Ralph Droms |
2010-05-06 |
03 | Ralph Droms | [Ballot comment] Related to the Comment Russ entered: add text to explain how a dual-stacked host operates. |
2010-05-06 |
03 | Adrian Farrel | [Ballot discuss] Thank you for bring this work from the SIP Forum and undergoing the pain necessary to get a tag allocated. I noticed two … [Ballot discuss] Thank you for bring this work from the SIP Forum and undergoing the pain necessary to get a tag allocated. I noticed two small issues related to RFC2119 langauge: Section 2.3.2 3. Any parameter not defined by the specification is allowed, but MAY be ignored by any Configuration Service that does not recognize it. I suspect that if the CS doesn't understand the parameter is doesn't have the luxury of "MAY". In fact, since you don't describe any other procedures for handling unknown parameters, I think this is a "MUST". --- Section 2.6 As Sean points out, "NOT REQUIRED" is not defined. I suggest you turn this into a positive statement... OLD There is no assurance that such configuration data is still useful, but the UA is NOT REQUIRED to stop using or delete the data. NEW There is no assurance that such configuration data is still useful, and the UA MAY choose to retain the data without deletion and to continue to use it. |
2010-05-06 |
03 | Adrian Farrel | [Ballot Position Update] New position, Discuss, has been recorded by Adrian Farrel |
2010-05-06 |
03 | Dan Romascanu | [Ballot Position Update] New position, Yes, has been recorded by Dan Romascanu |
2010-05-06 |
03 | Stewart Bryant | [Ballot Position Update] New position, No Objection, has been recorded by Stewart Bryant |
2010-05-06 |
03 | Sean Turner | [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're … [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're dancing around not using 2119 language: OLD: A User Agent implementation compliant to this specification MAY also implement additional mechanisms that may be required in particular environments, or for use when the services specified here are not available. NEW: A User Agent implementation compliant to this specification MAY also implement additional mechanisms necessary for particular environments, or for use when the services specified here are not available. #3) Sec 2.4.2: Is the list of failures inclusive or are there other ways it can fail? #4) Sec 3.1: r/should/SHOULD #5) Sec 5: r/Url/URL #6) Sec 5: r/to provide for including that/to provide that |
2010-05-06 |
03 | Sean Turner | [Ballot discuss] [Updated to fix numbering and some bad spelling. Removed #9, but retained the original numbering scheme.] #1) Normative references for HTTPS (i.e., RFCs … [Ballot discuss] [Updated to fix numbering and some bad spelling. Removed #9, but retained the original numbering scheme.] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are needed. Gonzalo: Note RFC 2818 is Informational but is included in the DOWNREF registry. #2) Sec 2.4.1: Need normative reference to TLS: RFC 5246 #3) Sec 2.4.1: Is it intentional that you're point to RFC 3546 and not RFC 5246? 3546 was obsoleted by 4366 which in turn was obsoleted by 5246. #4) Sec 2.4.1: Why is the requirement for the CS to validate client certificates a SHOULD as opposed to MUST? If the client provides one the server better check it. More bluntly: r/The CS SHOULD validate the UA client's certificate, if one is provided./The CS MUST validate the UA client's certificate, if one is provided. #5) Sec 2.4.2: Text is need to address what happens when a TLS handshake fails and there is only one server in the list and it is removed as a result an error? #6) Sec 2.5.2: Is HTTPS required when using change polling? I think the text should be explicit about it being required or not. #7) Sec 2.6: NOT REQUIRED is not defined by RFC 2119. #8) Sec 2.6.1: r/HTTP GET/HTTPS GET It was HTTPS GET in Sec 2.4. #10) Sec 3.1.3: Is there some kind of recommendation that should included in username about character set support? #11) Sec 3.1.4: RFC2317 defines two schemes: Basic and Digest Access. Please specify which is required (I assume it's digest because SIP doesn't allow basic according to RFC 3261?). #12) Sec 5: The XMPP WG come up with the following (thank you Peter and Simon) that I think should be added here: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, SIP UAs, SIP Service Provider, and the Configuration Service Host MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. #13) I also support Peter's DISCUSS wrt the client checking the server's certificate. #14) This is a place-holder DISCUSS. Awaiting response to the SECDIR review provided by Jeffrey Hutzelman on 2010-05-03. |
2010-05-05 |
03 | Russ Housley | [Ballot comment] > 2.2.1. The Local Network Domain > > The UA MUST attempt to use the Local Network Domain name (see … [Ballot comment] > 2.2.1. The Local Network Domain > > The UA MUST attempt to use the Local Network Domain name (see > Section 2.1.2, "Network Layer Provisioning") as the Configuration > Service Domain. If multiple DNS names are provided by DHCPv6 option > 21, the UA MUST attempt to use each of the names provided, in the > order they were given by the DHCPv6 service, until a configuration is > successfully obtained. > > If the DHCP service does not provide any local domain name value, > the UA SHOULD use the manual mechanism defined in Section 2.2.2, > "Manual Domain Name Entry". > Please add something here about what to do if the SIP UA is connected to more than one network and gets responses from more than one DHCP server, presumeably one associated with each interface. |
2010-05-05 |
03 | Russ Housley | [Ballot Position Update] New position, No Objection, has been recorded by Russ Housley |
2010-05-05 |
03 | Alexey Melnikov | [Ballot discuss] 2.3. Constructing the Configuration Request URL Using the Configuration Service Domain name obtained in Section 2.2, "Obtaining the Configuration Service Domain", … [Ballot discuss] 2.3. Constructing the Configuration Request URL Using the Configuration Service Domain name obtained in Section 2.2, "Obtaining the Configuration Service Domain", the UA MUST construct an HTTPS URL with which to request configuration. This needs a Normative reference to RFC 2818 (HTTP over TLS). 2.3.3. Configuration Request URI Example https://p1.example.net/cfg ?sfua-anchor=urn:uuid:00000000-0000-1000-8000-001122334455 &sfua-vendor=examplecorp.com &sfua-model=HypoComm &sfua-revision=2.1 https://p2.example.net/cfg ?sfua-anchor=urn:uuid:00000000-0000-1000-8000-001122334455 &sfua-vendor=examplecorp.com &sfua-model=HypoComm &sfua-revision=2.1 sfua-anchor is not defined in this document. Did you mean sfua-id? 2.4.1. Configuration Data Request Authentication If the UA is capable of doing so, it SHOULD validate the server certificate provided by the CS. I think this needs a pointer to the document that talks about server identity validation. You probably want to point to RFC 2818 here. If the CS requires HTTP authentication of the configuration data request, the HTTP 'username' parameter used MUST be the same value as the sfua-user value provided in the configuration data request parameters. This should be clear about which HTTP authentication method should be used. (RFC 2617 specifies 2: Basic and Digest.) 2.4.2. Configuration Data Request Failure o If the request returns a permanent HTTP failure response, the UA MUST remove the failed URL from the list of alternatives for this Configuration Service Domain. Please define (or list) which failure responses are considered "permanent". 2.5. Configuration Changes o Indicate that the UA is to subscribe for change notifications. This is indicated by the CS including a Link header in the response with the link relation 'monitor' and SIP URI. This choice is specified in Section 2.5.1 Configuration Change Subscriptions. This needs a Normative reference to draft-nottingham-http-link-header (just about to be approved for publication). 5. Security Considerations The connection to the Configuration Service is made over TLS. As the TLS server, the CS always provides a server certificate during the TLS handshake; if possible, the UA should validate that certificate and confirm that it contains as a subject the Configuration Service Domain Name or at least the host name from the Configuration Service Base Url. I don't think this is detailed enough to be implementable. Please either specify the exact procedure, or reference RFC 2818 here. |
2010-05-05 |
03 | Peter Saint-Andre | [Ballot Position Update] Position for Peter Saint-Andre has been changed to Yes from Discuss by Peter Saint-Andre |
2010-05-05 |
03 | Peter Saint-Andre | [Ballot discuss] |
2010-05-05 |
03 | Ron Bonica | [Ballot Position Update] New position, No Objection, has been recorded by Ron Bonica |
2010-05-05 |
03 | Sean Turner | [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're … [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're dancing around not using 2119 language: OLD: A User Agent implementation compliant to this specification MAY also implement additional mechanisms that may be required in particular environments, or for use when the services specified here are not available. NEW: A User Agent implementation compliant to this specification MAY also implement additional mechanisms necessary for particular environments, or for use when the services specified here are not available. #3) Sec 2.4.2: Is the list of failures inclusive or are there other ways it can fail? #4) Sec 3.1: r/should/SHOULD #5) Sec 5: r/Url/URL #6) Sec 5: r/to provide for including that/to provide that |
2010-05-05 |
03 | Sean Turner | [Ballot discuss] [Updated to fix numbering. Removed #9, but retained the original numbering scheme.] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are … [Ballot discuss] [Updated to fix numbering. Removed #9, but retained the original numbering scheme.] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are needed. Gonzolo: Note RFC 2818 is Informational but is included in the DOWNREF registry. #2) Sec 2.4.1: Need normative reference to TLS: RFC 5246 #3) Sec 2.4.1: Is it intentional that you're point to RFC 3546 and not RFC 5246? 3546 was obsoleted by 4366 which in turn was obsoleted by 5246. #4) Sec 2.4.1: Why is the requirement for the CS to validate client certificates a SHOULD as opposed to MUST? If the client provides one the server better check it. More bluntly: r/The CS SHOULD validate the UA client's certificate, if one is provided./The CS MUST validate the UA client's certificate, if one is provided. #5) Sec 2.4.2: Text is need to address what happens when a TLS handshake fails and there is only one server in the list and it is removed as a result an error? #6) Sec 2.5.2: Is HTTPS required when using change polling? I think the text should be explicit about it being required or not. #7) Sec 2.6: NOT REQUIRED is not defined by RFC 2119. #8) Sec 2.6.1: r/HTTP GET/HTTPS GET It was HTTPS GET in Sec 2.4. #10) Sec 3.1.3: Is there some kind of recommendation that should included in username about character set support? #11) Sec 3.1.4: RFC2317 defines two schemes: Basic and Digest Access. Please specify which is required (I assume it's digest because SIP doesn't allow basic according to RFC 3261?). #12) Sec 5: The XMPP WG come up with the following (thank you Peter and Simon) that I think should be added here: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, SIP UAs, SIP Service Provider, and the Configuration Service Host MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. #13) I also support Peter's DISCUSS wrt the client checking the server's certificate. #14) This is a place-holder DISCUSS. Awaiting response to the SECDIR review provided by Jeffrey Hutzelman on 2010-05-03. |
2010-05-05 |
03 | Sean Turner | [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're … [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're dancing around not using 2119 language: OLD: A User Agent implementation compliant to this specification MAY also implement additional mechanisms that may be required in particular environments, or for use when the services specified here are not available. NEW: A User Agent implementation compliant to this specification MAY also implement additional mechanisms necessary for particular environments, or for use when the services specified here are not available. #3) Sec 2.4.2: Is the list of failures inclusive or are there other ways it can fail? #4) Sec 3.1: r/should/SHOULD #5) Sec 5: r/Url/URL #6) Sec 5: r/to provide for including that/to provide that |
2010-05-05 |
03 | Sean Turner | [Ballot discuss] [Updated to fix numbering] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are needed. Gonzolo: Note RFC 2818 is Informational but … [Ballot discuss] [Updated to fix numbering] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are needed. Gonzolo: Note RFC 2818 is Informational but is included in the DOWNREF registry. #2) Sec 2.4.1: Need normative reference to TLS: RFC 5246 #3) Sec 2.4.1: Is it intentional that you're point to RFC 3546 and not RFC 5246? 3546 was obsoleted by 4366 which in turn was obsoleted by 5246. #4) Sec 2.4.1: Why is the requirement for the CS to validate client certificates a SHOULD as opposed to MUST? If the client provides one the server better check it. More bluntly: r/The CS SHOULD validate the UA client's certificate, if one is provided./The CS MUST validate the UA client's certificate, if one is provided. #5) Sec 2.4.2: Text is need to address what happens when a TLS handshake fails and there is only one server in the list and it is removed as a result an error? #6) Sec 2.5.2: Is HTTPS required when using change polling? I think the text should be explicit about it being required or not. #7) Sec 2.6: NOT REQUIRED is not defined by RFC 2119. #8) Sec 2.6.1: r/HTTP GET/HTTPS GET It was HTTPS GET in Sec 2.4. #9) Sec 3: This headed for INFORMATIONAL so it's unnecessary to include the 2nd sentence in the 1st paragraph: As such, the contents of this section are non-normative. #10) Sec 3.1.3: Is there some kind of recommendation that should included in username about character set support? #11) Sec 3.1.4: RFC2317 defines two schemes: Basic and Digest Access. Please specify which is required (I assume it's digest because SIP doesn't allow basic according to RFC 3261?). #12) Sec 5: The XMPP WG come up with the following (thank you Peter and Simon) that I think should be added here: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, SIP UAs, SIP Service Provider, and the Configuration Service Host MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. #13) I also support Peter's DISCUSS wrt the client checking the server's certificate. #14) This is a place-holder DISCUSS. Awaiting response to the SECDIR review provided by Jeffrey Hutzelman on 2010-05-03. |
2010-05-05 |
03 | Sean Turner | [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're … [Ballot comment] #1) Sec 1: You might want to answer the question with . This document provides the answer. #2) Sec 1.1: Seems like you're dancing around not using 2119 language: OLD: A User Agent implementation compliant to this specification MAY also implement additional mechanisms that may be required in particular environments, or for use when the services specified here are not available. NEW: A User Agent implementation compliant to this specification MAY also implement additional mechanisms necessary for particular environments, or for use when the services specified here are not available. #3) Sec 2.4.2: Is the list of failures inclusive or are there other ways it can fail? #4) Sec 3.1: r/should/SHOULD #5) Sec 5: r/Url/URL #6) Sec 5: r/to provide for including that/to provide that |
2010-05-05 |
03 | Sean Turner | [Ballot discuss] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are needed. Gonzolo: Note RFC 2818 is Informational but is included in the … [Ballot discuss] #1) Normative references for HTTPS (i.e., RFCs 2817 & 2818) are needed. Gonzolo: Note RFC 2818 is Informational but is included in the DOWNREF registry. #2) Sec 2.4.1: Need normative reference to TLS: RFC 5246 #3) Sec 2.4.1: Is it intentional that you're point to RFC 3546 and not RFC 5246? 3546 was obsoleted by 4366 which in turn was obsoleted by 5246. #4) Sec 2.4.1: Why is the requirement for the CS to validate client certificates a SHOULD as opposed to MUST? If the client provides one the server better check it. More bluntly: r/The CS SHOULD validate the UA client's certificate, if one is provided./The CS MUST validate the UA client's certificate, if one is provided. #5) Sec 2.4.2: Text is need to address what happens when a TLS handshake fails and there is only one server in the list and it is removed as a result an error? #6) Sec 2.5.2: Is HTTPS required when using change polling? I think the text should be explicit about it being required or not. #7) Sec 2.6: NOT REQUIRED is not defined by RFC 2119. #8) Sec 2.6.1: r/HTTP GET/HTTPS GET It was HTTPS GET in Sec 2.4. #9) Sec 3: This headed for INFORMATIONAL so it's unnecessary to include the 2nd sentence in the 1st paragraph: As such, the contents of this section are non-normative. #10) Sec 3.1.3: Is there some kind of recommendation that should included in username about character set support? #11) Sec 3.1.4: RFC2317 defines two schemes: Basic and Digest Access. Please specify which is required (I assume it's digest because SIP doesn't allow basic according to RFC 3261?). #12) Sec 5: The XMPP WG come up with the following (thank you Peter and Simon) that I think should be added here: Implementations of TLS typically support multiple versions of the Transport Layer Security protocol as well as the older Secure Sockets Layer (SSL) protocol. Because of known security vulnerabilities, SIP UAs, SIP Service Provider, and the Configuration Service Host MUST NOT request, offer, or use SSL 2.0. See Appendix E.2 of [TLS] for further details. #12) I also support Peter's DISCUSS wrt the client checking the server's certificate. #13) This is a place-holder DISCUSS. Awaiting response to the SECDIR review provided by Jeffrey Hutzelman on 2010-05-03. |
2010-05-05 |
03 | Sean Turner | [Ballot Position Update] New position, Discuss, has been recorded by Sean Turner |
2010-05-04 |
03 | Peter Saint-Andre | [Ballot discuss] This document is a pleasure to read. However, this statement seems a bit weak: If the UA is capable of doing so, … [Ballot discuss] This document is a pleasure to read. However, this statement seems a bit weak: If the UA is capable of doing so, it SHOULD validate the server certificate provided by the CS. If a UA is capable of validating server certificates, why would the spec not state that the UA MUST do so? Under what conditions would a UA legitimately not be capable of validating server certificates? And what are the rules for certificate validation? (Given that the Configuration Request URL scheme is HTTPS, a reference to Section 3.1 of RFC 2818 seems to be in order.) |
2010-05-04 |
03 | Peter Saint-Andre | [Ballot Position Update] New position, Discuss, has been recorded by Peter Saint-Andre |
2010-05-04 |
03 | Alexey Melnikov | [Ballot discuss] 2.3. Constructing the Configuration Request URL Using the Configuration Service Domain name obtained in Section 2.2, "Obtaining the Configuration Service Domain", … [Ballot discuss] 2.3. Constructing the Configuration Request URL Using the Configuration Service Domain name obtained in Section 2.2, "Obtaining the Configuration Service Domain", the UA MUST construct an HTTPS URL with which to request configuration. This needs a Normative reference to RFC 2818 (HTTP over TLS). 2.3.2.1. Configuration Request Parameters sfua-id The URN identifying the User Agent, constructed as specified in This needs a normative reference to the URN spec. section 4.1 of [RFC5626] "Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)". 2.3.3. Configuration Request URI Example https://p1.example.net/cfg ?sfua-anchor=urn:uuid:00000000-0000-1000-8000-001122334455 &sfua-vendor=examplecorp.com &sfua-model=HypoComm &sfua-revision=2.1 https://p2.example.net/cfg ?sfua-anchor=urn:uuid:00000000-0000-1000-8000-001122334455 &sfua-vendor=examplecorp.com &sfua-model=HypoComm &sfua-revision=2.1 sfua-anchor is not defined in this document. Did you mean sfua-id? 2.4.1. Configuration Data Request Authentication If the UA is capable of doing so, it SHOULD validate the server certificate provided by the CS. I think this needs a pointer to the document that talks about server identity validation. You probably want to point to RFC 2818 here. If the CS requires HTTP authentication of the configuration data request, the HTTP 'username' parameter used MUST be the same value as the sfua-user value provided in the configuration data request parameters. This should be clear about which HTTP authentication method should be used. (RFC 2617 specifies 2: Basic and Digest.) 2.4.2. Configuration Data Request Failure o If the request returns a permanent HTTP failure response, the UA MUST remove the failed URL from the list of alternatives for this Configuration Service Domain. Please define (or list) which failure responses are considered "permanent". 2.5. Configuration Changes o Indicate that the UA is to subscribe for change notifications. This is indicated by the CS including a Link header in the response with the link relation 'monitor' and SIP URI. This choice is specified in Section 2.5.1 Configuration Change Subscriptions. This needs a Normative reference to draft-nottingham-http-link-header (currently in IESG review). 5. Security Considerations The connection to the Configuration Service is made over TLS. As the TLS server, the CS always provides a server certificate during the TLS handshake; if possible, the UA should validate that certificate and confirm that it contains as a subject the Configuration Service Domain Name or at least the host name from the Configuration Service Base Url. I don't think this is detailed enough to be implementable. Please either specify the exact procedure, or reference RFC 2818 here. |
2010-05-04 |
03 | Robert Sparks | [Ballot Position Update] New position, Recuse, has been recorded by Robert Sparks |
2010-05-04 |
03 | Samuel Weiler | Request for Last Call review by SECDIR Completed. Reviewer: Jeffrey Hutzelman. |
2010-05-03 |
03 | Alexey Melnikov | [Ballot discuss] 2.3. Constructing the Configuration Request URL Using the Configuration Service Domain name obtained in Section 2.2, "Obtaining the Configuration Service Domain", … [Ballot discuss] 2.3. Constructing the Configuration Request URL Using the Configuration Service Domain name obtained in Section 2.2, "Obtaining the Configuration Service Domain", the UA MUST construct an HTTPS URL with which to request configuration. This needs a Normative reference to RFC 2818 (HTTP over TLS). 2.3.2.1. Configuration Request Parameters sfua-id The URN identifying the User Agent, constructed as specified in This needs a normative reference to the URN spec. section 4.1 of [RFC5626] "Managing Client-Initiated Connections in the Session Initiation Protocol (SIP)". 2.3.3. Configuration Request URI Example https://p1.example.net/cfg ?sfua-anchor=urn:uuid:00000000-0000-1000-8000-001122334455 &sfua-vendor=examplecorp.com &sfua-model=HypoComm &sfua-revision=2.1 https://p2.example.net/cfg ?sfua-anchor=urn:uuid:00000000-0000-1000-8000-001122334455 &sfua-vendor=examplecorp.com &sfua-model=HypoComm &sfua-revision=2.1 sfua-anchor is not defined in this document. Did you mean sfua-id? 2.4.1. Configuration Data Request Authentication If the UA is capable of doing so, it SHOULD validate the server certificate provided by the CS. I think this needs a pointer to the document that talks about server identity validation. You probably want to point to RFC 2818 here. If the CS requires HTTP authentication of the configuration data request, the HTTP 'username' parameter used MUST be the same value as the sfua-user value provided in the configuration data request parameters. This should be clear about which HTTP authentication method should be used. (RFC 2617 specifies 2: Basic and Digest.) 2.4.2. Configuration Data Request Failure o If the request returns a permanent HTTP failure response, the UA MUST remove the failed URL from the list of alternatives for this Configuration Service Domain. Please define (or list) which failure responses are considered "permanent". 2.5. Configuration Changes o Indicate that the UA is to subscribe for change notifications. This is indicated by the CS including a Link header in the response with the link relation 'monitor' and SIP URI. This choice is specified in Section 2.5.1 Configuration Change Subscriptions. This needs a Normative reference to draft-nottingham-http-link-header (currently in IESG review). |
2010-05-03 |
03 | Alexey Melnikov | [Ballot Position Update] New position, Discuss, has been recorded by Alexey Melnikov |
2010-04-29 |
03 | Gonzalo Camarillo | [Ballot Position Update] New position, Yes, has been recorded by Gonzalo Camarillo |
2010-04-29 |
03 | Gonzalo Camarillo | State Changes to IESG Evaluation from Waiting for AD Go-Ahead by Gonzalo Camarillo |
2010-04-29 |
03 | Gonzalo Camarillo | Placed on agenda for telechat - 2010-05-06 by Gonzalo Camarillo |
2010-04-20 |
03 | (System) | State has been changed to Waiting for AD Go-Ahead from In Last Call by system |
2010-04-16 |
03 | Amanda Baber | IANA comments: Upon approval of this document, IANA will make the following assignments in the "S-NAPTR Application Service Tags" registry at http://www.iana.org/assignments/s-naptr-parameters/s-naptr-parameters.xhtml Tag Reference -------- … IANA comments: Upon approval of this document, IANA will make the following assignments in the "S-NAPTR Application Service Tags" registry at http://www.iana.org/assignments/s-naptr-parameters/s-naptr-parameters.xhtml Tag Reference -------- ------------------------------------------- SFUA.CFG [RFC-lawrence-sipforum-user-agent-config-01] |
2010-04-16 |
03 | Gonzalo Camarillo | Responsible AD has been changed to Gonzalo Camarillo from Cullen Jennings |
2010-04-16 |
03 | Gonzalo Camarillo | Note field has been cleared by Gonzalo Camarillo |
2010-04-15 |
01 | (System) | New version available: draft-lawrence-sipforum-user-agent-config-01.txt |
2010-03-24 |
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman |
2010-03-24 |
03 | Samuel Weiler | Request for Last Call review by SECDIR is assigned to Jeffrey Hutzelman |
2010-03-23 |
03 | Amy Vezza | Last call sent |
2010-03-23 |
03 | Amy Vezza | State Changes to In Last Call from Last Call Requested by Amy Vezza |
2010-03-23 |
03 | Cullen Jennings | Last Call was requested by Cullen Jennings |
2010-03-23 |
03 | Cullen Jennings | State Changes to Last Call Requested from AD Evaluation by Cullen Jennings |
2010-03-23 |
03 | Cullen Jennings | [Ballot Position Update] New position, Yes, has been recorded for Cullen Jennings |
2010-03-23 |
03 | Cullen Jennings | Ballot has been issued by Cullen Jennings |
2010-03-23 |
03 | Cullen Jennings | Created "Approve" ballot |
2010-03-23 |
03 | (System) | Ballot writeup text was added |
2010-03-23 |
03 | (System) | Last call text was added |
2010-03-23 |
03 | (System) | Ballot approval text was added |
2010-03-23 |
03 | Cullen Jennings | State Changes to AD Evaluation from Publication Requested by Cullen Jennings |
2010-03-23 |
03 | Cullen Jennings | Draft Added by Cullen Jennings in state Publication Requested |
2010-03-22 |
00 | (System) | New version available: draft-lawrence-sipforum-user-agent-config-00.txt |