| < draft-ietf-soc-load-control-event-package-10.txt | draft-ietf-soc-load-control-event-package-11.txt > | |||
|---|---|---|---|---|
| IETF SOC Working Group C. Shen | IETF SOC Working Group C. Shen | |||
| Internet-Draft H. Schulzrinne | Internet-Draft H. Schulzrinne | |||
| Intended status: Standards Track Columbia U. | Intended status: Standards Track Columbia U. | |||
| Expires: May 09, 2014 A. Koike | Expires: May 28, 2014 A. Koike | |||
| NTT | NTT | |||
| November 05, 2013 | November 24, 2013 | |||
| A Session Initiation Protocol (SIP) Load Control Event Package | A Session Initiation Protocol (SIP) Load Control Event Package | |||
| draft-ietf-soc-load-control-event-package-10.txt | draft-ietf-soc-load-control-event-package-11.txt | |||
| Abstract | Abstract | |||
| We define a load control event package for the Session Initiation | We define a load control event package for the Session Initiation | |||
| Protocol (SIP). It allows SIP entities to distribute load filtering | Protocol (SIP). It allows SIP entities to distribute load filtering | |||
| policies to other SIP entities in the network. The load filtering | policies to other SIP entities in the network. The load filtering | |||
| policies contain rules to throttle calls based on their source or | policies contain rules to throttle calls based on their source or | |||
| destination domain, telephone number prefix or for a specific user. | destination domain, telephone number prefix or for a specific user. | |||
| The mechanism helps to prevent signaling overload and complements | The mechanism helps to prevent signaling overload and complements | |||
| feedback-based SIP overload control efforts. | feedback-based SIP overload control efforts. | |||
| skipping to change at page 1, line 38 ¶ | skipping to change at page 1, line 38 ¶ | |||
| Internet-Drafts are working documents of the Internet Engineering | Internet-Drafts are working documents of the Internet Engineering | |||
| Task Force (IETF). Note that other groups may also distribute | Task Force (IETF). Note that other groups may also distribute | |||
| working documents as Internet-Drafts. The list of current Internet- | working documents as Internet-Drafts. The list of current Internet- | |||
| Drafts is at http://datatracker.ietf.org/drafts/current/. | Drafts is at http://datatracker.ietf.org/drafts/current/. | |||
| Internet-Drafts are draft documents valid for a maximum of six months | Internet-Drafts are draft documents valid for a maximum of six months | |||
| and may be updated, replaced, or obsoleted by other documents at any | and may be updated, replaced, or obsoleted by other documents at any | |||
| time. It is inappropriate to use Internet-Drafts as reference | time. It is inappropriate to use Internet-Drafts as reference | |||
| material or to cite them other than as "work in progress." | material or to cite them other than as "work in progress." | |||
| This Internet-Draft will expire on May 09, 2014. | This Internet-Draft will expire on May 28, 2014. | |||
| Copyright Notice | Copyright Notice | |||
| Copyright (c) 2013 IETF Trust and the persons identified as the | Copyright (c) 2013 IETF Trust and the persons identified as the | |||
| document authors. All rights reserved. | document authors. All rights reserved. | |||
| This document is subject to BCP 78 and the IETF Trust's Legal | This document is subject to BCP 78 and the IETF Trust's Legal | |||
| Provisions Relating to IETF Documents | Provisions Relating to IETF Documents | |||
| (http://trustee.ietf.org/license-info) in effect on the date of | (http://trustee.ietf.org/license-info) in effect on the date of | |||
| publication of this document. Please review these documents | publication of this document. Please review these documents | |||
| skipping to change at page 2, line 21 ¶ | skipping to change at page 2, line 21 ¶ | |||
| 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3 | |||
| 2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 3. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 5 | 3. Definitions . . . . . . . . . . . . . . . . . . . . . . . . . 5 | |||
| 4. Design Requirements . . . . . . . . . . . . . . . . . . . . . 6 | 4. Design Requirements . . . . . . . . . . . . . . . . . . . . . 6 | |||
| 5. SIP Load Filtering Overview . . . . . . . . . . . . . . . . . 6 | 5. SIP Load Filtering Overview . . . . . . . . . . . . . . . . . 6 | |||
| 5.1. Load Filtering Policy Format . . . . . . . . . . . . . . 6 | 5.1. Load Filtering Policy Format . . . . . . . . . . . . . . 6 | |||
| 5.2. Load Filtering Policy Computation . . . . . . . . . . . . 7 | 5.2. Load Filtering Policy Computation . . . . . . . . . . . . 7 | |||
| 5.3. Load Filtering Policy Distribution . . . . . . . . . . . 7 | 5.3. Load Filtering Policy Distribution . . . . . . . . . . . 7 | |||
| 5.4. Applicable Network Domains . . . . . . . . . . . . . . . 10 | 5.4. Applicable Network Domains . . . . . . . . . . . . . . . 10 | |||
| 6. Load Control Event Package . . . . . . . . . . . . . . . . . 11 | 6. Load Control Event Package . . . . . . . . . . . . . . . . . 11 | |||
| 6.1. Event Package Name . . . . . . . . . . . . . . . . . . . 11 | 6.1. Event Package Name . . . . . . . . . . . . . . . . . . . 12 | |||
| 6.2. Event Package Parameters . . . . . . . . . . . . . . . . 12 | 6.2. Event Package Parameters . . . . . . . . . . . . . . . . 12 | |||
| 6.3. SUBSCRIBE Bodies . . . . . . . . . . . . . . . . . . . . 12 | 6.3. SUBSCRIBE Bodies . . . . . . . . . . . . . . . . . . . . 12 | |||
| 6.4. SUBSCRIBE Duration . . . . . . . . . . . . . . . . . . . 12 | 6.4. SUBSCRIBE Duration . . . . . . . . . . . . . . . . . . . 12 | |||
| 6.5. NOTIFY Bodies . . . . . . . . . . . . . . . . . . . . . . 12 | 6.5. NOTIFY Bodies . . . . . . . . . . . . . . . . . . . . . . 12 | |||
| 6.6. Notifier Processing of SUBSCRIBE Requests . . . . . . . . 12 | 6.6. Notifier Processing of SUBSCRIBE Requests . . . . . . . . 12 | |||
| 6.7. Notifier Generation of NOTIFY Requests . . . . . . . . . 13 | 6.7. Notifier Generation of NOTIFY Requests . . . . . . . . . 13 | |||
| 6.8. Subscriber Processing of NOTIFY Requests . . . . . . . . 13 | 6.8. Subscriber Processing of NOTIFY Requests . . . . . . . . 13 | |||
| 6.9. Handling of Forked Requests . . . . . . . . . . . . . . . 14 | 6.9. Handling of Forked Requests . . . . . . . . . . . . . . . 14 | |||
| 6.10. Rate of Notifications . . . . . . . . . . . . . . . . . . 15 | 6.10. Rate of Notifications . . . . . . . . . . . . . . . . . . 15 | |||
| 6.11. State Delta . . . . . . . . . . . . . . . . . . . . . . . 15 | 6.11. State Delta . . . . . . . . . . . . . . . . . . . . . . . 15 | |||
| skipping to change at page 3, line 6 ¶ | skipping to change at page 3, line 6 ¶ | |||
| 8. XML Schema Definition for Load Control . . . . . . . . . . . 27 | 8. XML Schema Definition for Load Control . . . . . . . . . . . 27 | |||
| 9. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 30 | 9. Related Work . . . . . . . . . . . . . . . . . . . . . . . . 30 | |||
| 9.1. Relationship with Load Filtering in PSTN . . . . . . . . 30 | 9.1. Relationship with Load Filtering in PSTN . . . . . . . . 30 | |||
| 9.2. Relationship with Other IETF SIP Overload Control Efforts 31 | 9.2. Relationship with Other IETF SIP Overload Control Efforts 31 | |||
| 10. Discussion of this specification meeting the requirements of | 10. Discussion of this specification meeting the requirements of | |||
| RFC5390 . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 | RFC5390 . . . . . . . . . . . . . . . . . . . . . . . . . . . 32 | |||
| 11. Security Considerations . . . . . . . . . . . . . . . . . . . 37 | 11. Security Considerations . . . . . . . . . . . . . . . . . . . 37 | |||
| 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 38 | 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 38 | |||
| 12.1. Load Control Event Package Registration . . . . . . . . 38 | 12.1. Load Control Event Package Registration . . . . . . . . 38 | |||
| 12.2. application/load-control+xml MIME Registration . . . . . 38 | 12.2. application/load-control+xml MIME Registration . . . . . 38 | |||
| 12.3. Load Control Schema Registration . . . . . . . . . . . . 39 | 12.3. URN Sub-Namespace Registration . . . . . . . . . . . . . 39 | |||
| 13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 39 | 12.4. Load Control Schema Registration . . . . . . . . . . . . 40 | |||
| 13. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 40 | ||||
| 14. References . . . . . . . . . . . . . . . . . . . . . . . . . 40 | 14. References . . . . . . . . . . . . . . . . . . . . . . . . . 40 | |||
| 14.1. Normative References . . . . . . . . . . . . . . . . . . 40 | 14.1. Normative References . . . . . . . . . . . . . . . . . . 40 | |||
| 14.2. Informative References . . . . . . . . . . . . . . . . . 41 | 14.2. Informative References . . . . . . . . . . . . . . . . . 41 | |||
| Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 41 | Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 42 | |||
| 1. Introduction | 1. Introduction | |||
| Proper functioning of Session Initiation Protocol (SIP) [RFC3261] | Proper functioning of Session Initiation Protocol (SIP) [RFC3261] | |||
| signaling servers is critical in SIP-based communications networks. | signaling servers is critical in SIP-based communications networks. | |||
| The performance of SIP servers can be severely degraded when the | The performance of SIP servers can be severely degraded when the | |||
| server is overloaded with excessive number of signaling requests. | server is overloaded with excessive number of signaling requests. | |||
| Both legitimate and malicious traffic can overload SIP servers, | Both legitimate and malicious traffic can overload SIP servers, | |||
| despite appropriate capacity planning. | despite appropriate capacity planning. Some of the SIP server | |||
| overload situations are predictable, while others are not. | ||||
| There are three common examples of legitimate short-term increases in | There are four common examples of predictable short-term increases in | |||
| call volumes. Viewer-voting TV shows or ticket giveaways may | call volumes. Viewer-voting TV shows or ticket giveaways, special | |||
| generate millions of calls within a few minutes. Call volume may | holidays such as New Year's Day and Mother's Day, end-of-season peaks | |||
| also spike during special holidays such as New Year's Day and | in phone orders, or after forecastable natural disasters such as | |||
| Mother's Day. Finally, callers may want to reach friends and family | hurricanes. On the other hand, examples of unpredicted or | |||
| in natural disaster areas such as those affected by hurricanes. When | unpredictable mass calling may happen after earthquakes, terrorist | |||
| possible, only calls traversing overloaded servers should be | attacks, or at call centers that provide troubleshooting services | |||
| throttled under those conditions. | when a mass service fails. When possible, only calls traversing | |||
| overloaded servers should be throttled under overload conditions. | ||||
| SIP load control mechanisms are needed to prevent congestion collapse | SIP load control mechanisms are needed to prevent congestion collapse | |||
| in these cases [RFC5390]. There are two types of load control | in these cases [RFC5390]. There are two types of load control | |||
| approaches. In the first approach, feedback control, SIP servers | approaches. In the first approach, feedback control, SIP servers | |||
| provide load limits to upstream servers, to reduce the incoming rate | provide load limits to upstream servers, to reduce the incoming rate | |||
| of all SIP requests [I-D.ietf-soc-overload-control]. These upstream | of all SIP requests [I-D.ietf-soc-overload-control]. These upstream | |||
| servers then drop or delay incoming SIP requests. Feedback control | servers then drop or delay incoming SIP requests. Feedback control | |||
| is reactive and affects signaling messages that have already been | is reactive and affects signaling messages that have already been | |||
| issued by user agent clients. They work well when SIP proxy servers | issued by user agent clients. They work well when SIP proxy servers | |||
| in the core networks (core proxy servers) or destination-specific SIP | in the core networks (core proxy servers) or destination-specific SIP | |||
| skipping to change at page 4, line 13 ¶ | skipping to change at page 4, line 17 ¶ | |||
| policies that indicate calls to specific destinations or from | policies that indicate calls to specific destinations or from | |||
| specific sources should be rate-limited or randomly dropped. These | specific sources should be rate-limited or randomly dropped. These | |||
| load filtering policies are then distributed to SIP servers and | load filtering policies are then distributed to SIP servers and | |||
| possibly SIP user agents that are likely to generate calls to the | possibly SIP user agents that are likely to generate calls to the | |||
| affected destinations or from the affected sources. Load filtering | affected destinations or from the affected sources. Load filtering | |||
| works best if it prevents calls as close to the originating user | works best if it prevents calls as close to the originating user | |||
| agent clients as possible. | agent clients as possible. | |||
| The load filtering approach is most applicable for situations where a | The load filtering approach is most applicable for situations where a | |||
| traffic surge and its source/destination distribution can be | traffic surge and its source/destination distribution can be | |||
| predicted in advance. For instance, it is appropriate for a mass- | predicted in advance. It is less likely to be effective for the | |||
| phone-voting event, Mother's Day, New Year's Day, and even a | initial phase of unpredicted or unpredictable mass calling events. | |||
| hurricane. However, it is less likely to be effective for the | In the latter cases, the local traffic load may peak by more than an | |||
| initial phase of unpredicted/unpredictable mass calling events, such | order of magnitude in minutes, if not seconds. This does not allow | |||
| as earthquakes or terrorist attacks. In these latter cases, the | time to either effectively identify the load filtering policies | |||
| local traffic load may peak by more than an order of magnitude in | needed, nor distribute them to the appropriate servers soon enough to | |||
| minutes, if not seconds. This does not allow time to either | prevent server congestion. Once other, more immediate, techniques | |||
| effectively identify the load filtering policies needed, nor | (such as the loss-based or rate-based load feedback control methods) | |||
| distribute them to the appropriate servers soon enough to prevent | have prevented the initial congestion collapse, the load filtering | |||
| server congestion. Once other, more immediate, techniques (such as | ||||
| the loss-based or rate-based load feedback control methods) have | ||||
| prevented the initial congestion collapse, the load filtering | ||||
| approach can be used to effectively control the continuing overload. | approach can be used to effectively control the continuing overload. | |||
| Performing SIP load filtering involves the following components of | Performing SIP load filtering involves the following components of | |||
| load filtering policies: format definition, computation, distribution | load filtering policies: format definition, computation, distribution | |||
| and enforcement. This specification defines the load filtering | and enforcement. This specification defines the load filtering | |||
| policy, distribution and enforcement in the SIP load control event | policy, distribution and enforcement in the SIP load control event | |||
| package built upon existing SIP event notification framework. | package built upon existing SIP event notification framework. | |||
| However, load filtering policy computation is out of scope of this | However, load filtering policy computation is out of scope of this | |||
| specification, because it depends heavily on the actual network | specification, because it depends heavily on the actual network | |||
| topology and other service provider policies. | topology and other service provider policies. | |||
| skipping to change at page 5, line 8 ¶ | skipping to change at page 5, line 8 ¶ | |||
| The rest of this specification is structured as follows: we begin by | The rest of this specification is structured as follows: we begin by | |||
| listing the design requirements for this work in Section 4. We then | listing the design requirements for this work in Section 4. We then | |||
| give an overview of load filtering operation in Section 5. The load | give an overview of load filtering operation in Section 5. The load | |||
| control event package for load filtering policy distribution is | control event package for load filtering policy distribution is | |||
| detailed in Section 6. The load filtering policy format is defined | detailed in Section 6. The load filtering policy format is defined | |||
| in the two sections that follow, with Section 7 introducing the XML | in the two sections that follow, with Section 7 introducing the XML | |||
| document for load filtering policies and Section 8 listing the | document for load filtering policies and Section 8 listing the | |||
| associated schema. Section 9 relates this work to corresponding | associated schema. Section 9 relates this work to corresponding | |||
| mechanisms in PSTN and other IETF efforts addressing SIP overload | mechanisms in PSTN and other IETF efforts addressing SIP overload | |||
| control. Section 10 evaluates whether this specification meets the | control. Section 10 evaluates whether this specification meets the | |||
| SIP overload control requirements set forth by RFC5390 [RFC5390]. | SIP overload control requirements set forth by [RFC5390]. Finally, | |||
| Finally, Section 11 presents security considerations and Section 12 | Section 11 presents security considerations and Section 12 provides | |||
| provides IANA considerations. | IANA considerations. | |||
| 2. Conventions | 2. Conventions | |||
| The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", | |||
| "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this | |||
| document are to be interpreted as described in [RFC2119]. | document are to be interpreted as described in [RFC2119]. | |||
| 3. Definitions | 3. Definitions | |||
| This specification reuses the definitions for "Event Package", | This specification reuses the definitions for "Event Package", | |||
| skipping to change at page 6, line 39 ¶ | skipping to change at page 6, line 39 ¶ | |||
| the load filtering policy should be able to specify the caller. | the load filtering policy should be able to specify the caller. | |||
| o Caller and callee need to be specified as both SIP URIs and 'tel' | o Caller and callee need to be specified as both SIP URIs and 'tel' | |||
| URIs [RFC3966] in load filtering policies. | URIs [RFC3966] in load filtering policies. | |||
| o It should be possible to specify particular information in the SIP | o It should be possible to specify particular information in the SIP | |||
| headers (e.g., prefixes in telephone numbers) which allow load | headers (e.g., prefixes in telephone numbers) which allow load | |||
| filtering over limited regionally-focused overloads. | filtering over limited regionally-focused overloads. | |||
| o The solution should draw upon experiences from related PSTN | o The solution should draw upon experiences from related PSTN | |||
| mechanisms where applicable. | mechanisms [Q.1248.2][E.412][E.300SerSup3] where applicable. | |||
| o The solution should be extensible to meet future needs. | o The solution should be extensible to meet future needs. | |||
| 5. SIP Load Filtering Overview | 5. SIP Load Filtering Overview | |||
| 5.1. Load Filtering Policy Format | 5.1. Load Filtering Policy Format | |||
| Load filtering policies are specified by sets of rules. Each rule | Load filtering policies are specified by sets of rules. Each rule | |||
| contains both load filtering conditions and actions. The load | contains both load filtering conditions and actions. The load | |||
| filtering conditions define identities of the targets to be | filtering conditions define identities of the targets to be | |||
| skipping to change at page 11, line 15 ¶ | skipping to change at page 11, line 15 ¶ | |||
| o The mechanisms used to secure the communication among SIP entities | o The mechanisms used to secure the communication among SIP entities | |||
| within the Trust Domain. | within the Trust Domain. | |||
| o The manner used to determine which SIP entities are part of the | o The manner used to determine which SIP entities are part of the | |||
| Trust Domain. | Trust Domain. | |||
| o That SIP entities in the Trust Domain are compliant to SIP | o That SIP entities in the Trust Domain are compliant to SIP | |||
| [RFC3261] | [RFC3261] | |||
| o That SIP entities in the Trust Domain are compliant to SIP | ||||
| [RFC6665] | ||||
| o That SIP entities in the Trust Domain are compliant to this | o That SIP entities in the Trust Domain are compliant to this | |||
| document. | document. | |||
| o The agreement on what types of calls can be affected by this SIP | o The agreement on what types of calls can be affected by this SIP | |||
| load filtering mechanism. For example, call identity condition | load filtering mechanism. For example, call identity condition | |||
| elements (Section 7.3.1) <one> and <many> might be limited to | elements (Section 7.3.1) <one> and <many> might be limited to | |||
| describe specific domains; <many-tel> and <except-tel> might be | describe specific domains; <many-tel> and <except-tel> might be | |||
| limited to describe within certain prefixes. | limited to describe within certain prefixes. | |||
| o The agreement on the destinations to which calls may be redirected | o The agreement on the destinations to which calls may be redirected | |||
| skipping to change at page 39, line 9 ¶ | skipping to change at page 39, line 4 ¶ | |||
| Encoding considerations: Same as encoding considerations of | Encoding considerations: Same as encoding considerations of | |||
| application/xml in [RFC3023] | application/xml in [RFC3023] | |||
| Security considerations: See Section 10 of [RFC3023] and Section 11 | Security considerations: See Section 10 of [RFC3023] and Section 11 | |||
| of this specification | of this specification | |||
| Interoperability considerations: None | Interoperability considerations: None | |||
| Published Specification: This specification | Published Specification: This specification | |||
| Applications which use this media type: load control of SIP entities | Applications which use this media type: load control of SIP entities | |||
| Additional information: | Additional information: | |||
| Magic number: None | Magic number: None | |||
| File extension: .xml | File extension: .xml | |||
| Macintosh file type code: 'TEXT' | Macintosh file type code: 'TEXT' | |||
| Personal and email address for further information: | Personal and email address for further information: | |||
| Charles Shen, charles@cs.columbia.edu | Charles Shen, charles@cs.columbia.edu | |||
| Intended usage: COMMON | Intended usage: COMMON | |||
| Author/Change Controller: IETF SOC Working Group <sip- | Author/Change Controller: IETF SOC Working Group <sip- | |||
| overload@ietf.org>, as designated by the IESG <iesg@ietf.org> | overload@ietf.org>, as designated by the IESG <iesg@ietf.org> | |||
| 12.3. Load Control Schema Registration | 12.3. URN Sub-Namespace Registration | |||
| This section registers a new XML namespace, as per the guidelines in | ||||
| [RFC3688] | ||||
| URI: The URI for this namespace is | ||||
| urn:ietf:params:xml:ns:load-control | ||||
| Registrant Contact: IETF SOC Working Group <sip-overload@ietf.org>, | ||||
| as designated by the IESG <iesg@ietf.org> | ||||
| XML: | ||||
| BEGIN | ||||
| <?xml version="1.0"?> | ||||
| <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML Basic 1.0//EN" | ||||
| "http://www.w3.org/TR/xhtml-basic/xhtml-basic10.dtd"> | ||||
| <html xmlns="http://www.w3.org/1999/xhtml"> | ||||
| <head> | ||||
| <meta http-equiv="content-type" | ||||
| content="text/html;charset=iso-8859-1"/> | ||||
| <title>SIP Load Control Namespace</title> | ||||
| </head> | ||||
| <body> | ||||
| <h1>Namespace for SIP Load Control</h1> | ||||
| <h2>urn:ietf:params:xml:ns:load-control</h2> | ||||
| <p>See <a href="http://www.rfc-editor.org/rfc/rfc[?].txt"> | ||||
| RFC[?]</a>.</p> | ||||
| </body> | ||||
| </html> | ||||
| END | ||||
| 12.4. Load Control Schema Registration | ||||
| URI: urn:ietf:params:xml:schema:load-control | URI: urn:ietf:params:xml:schema:load-control | |||
| Registrant Contact: IETF SOC working group, Charles Shen | Registrant Contact: IETF SOC working group, Charles Shen | |||
| (charles@cs.columbia.edu). | (charles@cs.columbia.edu). | |||
| XML: the XML schema to be registered is contained in Section 8. | XML: the XML schema to be registered is contained in Section 8. | |||
| Its first line is | Its first line is | |||
| skipping to change at page 39, line 51 ¶ | skipping to change at page 40, line 31 ¶ | |||
| and its last line is | and its last line is | |||
| </xs:schema> | </xs:schema> | |||
| 13. Acknowledgements | 13. Acknowledgements | |||
| The authors would like to thank Richard Barnes, Bruno Chatras, Martin | The authors would like to thank Richard Barnes, Bruno Chatras, Martin | |||
| Dolly, Keith Drage, Ashutosh Dutta, Janet Gunn, Vijay Gurbani, Volker | Dolly, Keith Drage, Ashutosh Dutta, Janet Gunn, Vijay Gurbani, Volker | |||
| Hilt, Geoff Hunt, Carolyn Johnson, Hadriel Kaplan, Paul Kyzivat, | Hilt, Geoff Hunt, Carolyn Johnson, Hadriel Kaplan, Paul Kyzivat, | |||
| Salvatore Loreto, Timothy Moran, Eric Noel, Parthasarathi R, Adam | Pearl Liang, Salvatore Loreto, Timothy Moran, Eric Noel, | |||
| Roach, Shida Schubert, Robert Sparks, Phil Williams and other members | Parthasarathi R, Adam Roach, Dan Romascanu, Shida Schubert, Robert | |||
| of the SOC and SIPPING working group for many helpful comments. In | Sparks, Phil Williams and other members of the SOC and SIPPING | |||
| particular, Bruno Chatras proposed the <method> and <target-sip- | working group for many helpful comments. In particular, Bruno | |||
| entity> condition elements along with many other text improvements. | Chatras proposed the <method> and <target-sip-entity> condition | |||
| Janet Gunn provided detailed text suggestions including Section 10. | elements along with many other text improvements. Janet Gunn | |||
| Eric Noel suggested clarification on load filtering policy | provided detailed text suggestions including Section 10. Eric Noel | |||
| distribution initialization process. Shida Schubert made many | suggested clarification on load filtering policy distribution | |||
| suggestions such as terminology usage. Phil Williams suggested | initialization process. Shida Schubert made many suggestions such as | |||
| adding support for delta updates. Ashutosh Dutta gave pointers to | terminology usage. Phil Williams suggested adding support for delta | |||
| PSTN references. Adam Roach suggested RFC6665-related and other | updates. Ashutosh Dutta gave pointers to PSTN references. Adam | |||
| helpful clarifications. Richard Barnes made many suggestions such as | Roach suggested RFC6665-related and other helpful clarifications. | |||
| referencing the Trust Domain concept of RFC3324, the use of a | Richard Barnes made many suggestions such as referencing the Trust | |||
| separate element for 'tel' URI grouping and addressing the "redirect" | Domain concept of RFC3324, the use of a separate element for 'tel' | |||
| action security threat. | URI grouping and addressing the "redirect" action security threat. | |||
| 14. References | 14. References | |||
| 14.1. Normative References | 14.1. Normative References | |||
| [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate | |||
| Requirement Levels", BCP 14, RFC 2119, March 1997. | Requirement Levels", BCP 14, RFC 2119, March 1997. | |||
| [RFC2141] Moats, R., "URN Syntax", RFC 2141, May 1997. | [RFC2141] Moats, R., "URN Syntax", RFC 2141, May 1997. | |||
| skipping to change at page 41, line 9 ¶ | skipping to change at page 41, line 37 ¶ | |||
| [RFC6665] Roach, A., "SIP-Specific Event Notification", RFC 6665, | [RFC6665] Roach, A., "SIP-Specific Event Notification", RFC 6665, | |||
| July 2012. | July 2012. | |||
| [RFC6838] Freed, N., Klensin, J., and T. Hansen, "Media Type | [RFC6838] Freed, N., Klensin, J., and T. Hansen, "Media Type | |||
| Specifications and Registration Procedures", BCP 13, RFC | Specifications and Registration Procedures", BCP 13, RFC | |||
| 6838, January 2013. | 6838, January 2013. | |||
| 14.2. Informative References | 14.2. Informative References | |||
| [E.300SerSup3] | [E.300SerSup3] | |||
| ITU-T, ., "North American Precise Audible Tone Plan", | ITU-T, , "North American Precise Audible Tone Plan", E.300 | |||
| E.300 Series Supplement 3 , November 1988. | Series Supplement 3 , November 1988. | |||
| [E.412] ITU-T, ., "Network Management Controls", E.412-2003 , | [E.412] ITU-T, , "Network Management Controls", E.412-2003 , | |||
| January 2003. | January 2003. | |||
| [I-D.ietf-soc-overload-control] | [I-D.ietf-soc-overload-control] | |||
| Gurbani, V., Hilt, V., and H. Schulzrinne, "Session | Gurbani, V., Hilt, V., and H. Schulzrinne, "Session | |||
| Initiation Protocol (SIP) Overload Control", draft-ietf- | Initiation Protocol (SIP) Overload Control", draft-ietf- | |||
| soc-overload-control-13 (work in progress), May 2013. | soc-overload-control-13 (work in progress), May 2013. | |||
| [Q.1248.2] | [Q.1248.2] | |||
| ITU-T, ., "Interface Recommendation for Intelligent | ITU-T, , "Interface Recommendation for Intelligent Network | |||
| Network Capability Set4:SCF-SSF interface", Q.1248.2 , | Capability Set4:SCF-SSF interface", Q.1248.2 , July 2001. | |||
| July 2001. | ||||
| [RFC2648] Moats, R., "A URN Namespace for IETF Documents", RFC 2648, | [RFC2648] Moats, R., "A URN Namespace for IETF Documents", RFC 2648, | |||
| August 1999. | August 1999. | |||
| [RFC3324] Watson, M., "Short Term Requirements for Network Asserted | [RFC3324] Watson, M., "Short Term Requirements for Network Asserted | |||
| Identity", RFC 3324, November 2002. | Identity", RFC 3324, November 2002. | |||
| [RFC4412] Schulzrinne, H. and J. Polk, "Communications Resource | [RFC4412] Schulzrinne, H. and J. Polk, "Communications Resource | |||
| Priority for the Session Initiation Protocol (SIP)", RFC | Priority for the Session Initiation Protocol (SIP)", RFC | |||
| 4412, February 2006. | 4412, February 2006. | |||
| End of changes. 19 change blocks. | ||||
| 56 lines changed or deleted | 90 lines changed or added | |||
This html diff was produced by rfcdiff 1.48. The latest version is available from http://tools.ietf.org/tools/rfcdiff/ | ||||