One document matched: draft-marocco-p2psip-interwork-00.txt
Network Working Group E. Marocco
Internet-Draft Telecom Italia
Expires: February 5, 2007 D. Bryan
William and Mary/SIPeerior
Technologies
August 4, 2006
Interworking between P2PSIP Overlays and Conventional SIP Networks
draft-marocco-p2psip-interwork-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on February 5, 2007.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This document describes how user agents registered in P2PSIP overlay
networks can interwork with those in conventional SIP networks.
Communications between any two user agents will happen through the
SIP protocol and the location of SIP servers will follow the usual
procedures. However, interworking in some environments may require
the support of additional elements; this document also describes such
Marocco & Bryan Expires February 5, 2007 [Page 1]
Internet-Draft Interworking between P2PSIP and SIP August 2006
elements and how to locate them in P2PSIP overlays.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 3
1.1. Terminology . . . . . . . . . . . . . . . . . . . . . . . 3
2. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
2.1. P2PSIP Overlay Identifier . . . . . . . . . . . . . . . . 8
3. Additional Elements . . . . . . . . . . . . . . . . . . . . . 9
3.1. P2PSIP Proxy Peer . . . . . . . . . . . . . . . . . . . . 9
3.2. Relay Agent Peer . . . . . . . . . . . . . . . . . . . . . 9
3.2.1. Relay Agent Peer Selection . . . . . . . . . . . . . . 10
3.3. Resource Lookup . . . . . . . . . . . . . . . . . . . . . 10
3.3.1. P2PSIP Proxy Peer URI . . . . . . . . . . . . . . . . 10
3.3.2. Relay Agent Peers URIs . . . . . . . . . . . . . . . . 10
4. User Registration . . . . . . . . . . . . . . . . . . . . . . 11
4.1. Registering with the Overlay . . . . . . . . . . . . . . . 11
4.2. Registering with a Public SIP Network . . . . . . . . . . 11
5. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.1. Caller and Callee within the Overlay . . . . . . . . . . . 12
5.2. Callee within a Public SIP Network . . . . . . . . . . . . 13
5.3. Caller within a Public SIP Network . . . . . . . . . . . . 15
6. Security Considerations . . . . . . . . . . . . . . . . . . . 17
7. Open Issues . . . . . . . . . . . . . . . . . . . . . . . . . 18
8. References . . . . . . . . . . . . . . . . . . . . . . . . . . 18
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . . 20
Intellectual Property and Copyright Statements . . . . . . . . . . 21
Marocco & Bryan Expires February 5, 2007 [Page 2]
Internet-Draft Interworking between P2PSIP and SIP August 2006
1. Introduction
This document describes how user agents registered in P2PSIP overlay
networks [I-D.willis-p2psip-concepts] can interwork with those in
conventional SIP networks [RFC3261]. In particular, no assumption is
made about the overlay but that it allows clients to insert and
retrieve routing information, possibly bound to URIs [RFC3986].
The main goal of peer-to-peer networks is to build distributed
systems using resources such as bandwidth, storage and computation
power, shared by participating peers. P2PSIP overlay peer protocols,
in particular, aim to enable lookup services for clients initiating
and managing SIP protocol sessions without relying on central
servers.
To enable P2PSIP overlays to fully interwork with conventional SIP
networks (i.e. handling sessions either originated or terminated in
public domains), some peers must provide more resources than those
required for maintaining the overlay through the P2PSIP peer
protocol. Indeed, connectivity with public domains requires some
peers willing to share their ability to exchange messages with public
hosts on the Internet and, even more important, to be registered in
the public naming service (DNS) for a fully qualified domain name
(FQDN) which uniquely identifies the overlay they participate in.
The purpose of this document is to define the elements which can
supply the additional resources required for full interworking, to
specify how such elements can register and be located within the
overlay, and to describe how user agents (UAs) can establish sessions
across overlay boundaries.
1.1. Terminology
In this document, the key words "MUST", "MUST NOT", "REQUIRED",
"SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT
RECOMMENDED", "MAY", and "OPTIONAL" are to be interpreted as
described RFC 2119 [RFC2119].
Terminology defined in RFC 3261 [RFC3261] and in P2PSIP concepts
draft [I-D.willis-p2psip-concepts] is used without definition.
Conventional SIP Network: A SIP network where location and routing
functionalities are provided by centralized elements, as described in
RFC 3261 [RFC3261].
Public SIP Network: A SIP network, either conventional or P2PSIP
based, whose user agents can be located using procedures specified in
RFC 3263 [RFC3263].
Marocco & Bryan Expires February 5, 2007 [Page 3]
Internet-Draft Interworking between P2PSIP and SIP August 2006
P2PSIP Proxy Peer: An element registered with the P2PSIP overlay
which is able to route SIP messages directed to public URLs. If a
P2PSIP proxy peer is bound to a FQDN, it can be used also for routing
SIP messages directed to UAs in the P2PSIP overlay.
Relay Agent Peer: An element registered with the P2PSIP overlay which
provides relayed transport addresses through protocols like TURN
[I-D.ietf-behave-turn] and TEREDO [RFC4380] for allowing media
streaming between UAs without direct connectivity.
Marocco & Bryan Expires February 5, 2007 [Page 4]
Internet-Draft Interworking between P2PSIP and SIP August 2006
2. Overview
User agents registered in a P2PSIP overlay are able to reach each
other through the SIP protocol, with resource location handled by the
overlay itself. Figure 1 shows a typical example of the very basic
deployment, where the overlay supplies the functionalities which, in
canonical networks, are usually provided by registrars and proxies.
sip:alice@p2psip.org
___
/_\ Media--------+
SIP |
: |
+-----------:-----------+ |
|p2psip.org : | |
| : | |
| : | |
|P2PSIP : | |
|Overlay : | |
| : | |
| : | |
| : | |
| : | |
+-----------:-----------+ |
: |
: |
___ |
/_\ -------------+
sip:bob@p2psip.org
Session between P2PSIP user agents. Media streams flow directly
between UAs.
Figure 1
The example in Figure 1 requires that all UAs have direct
connectivity with each other. However, since such connectivity is
often impeded by environmental constraints introduced by NATs,
firewalls or simply by lack of physical links, resources other than
those used for maintaining the overlay are generally needed for users
to effectively establish multimedia sessions.
Figure 2 shows an example where UAs use the overlay for routing SIP
messages and relay resources registered in the overlay by relay agent
peers (Section 3.2) for effectively exchange data.
Marocco & Bryan Expires February 5, 2007 [Page 5]
Internet-Draft Interworking between P2PSIP and SIP August 2006
sip:alice@p2psip.org
___
/_\ Media--------+
SIP |
: |
+-----------:-----------+ |
|p2psip.org : +-----------------+
| : +-----------------+|
| : |Relay Agent Peer |+
|P2PSIP : +-----------------+
|Overlay : | |
| : | |
| : | |
| : | |
| : | |
+-----------:-----------+ |
: |
: |
___ |
/_\ -------------+
sip:bob@p2psip.org
Session between P2PSIP user agents. Media streams are relayed.
Figure 2
Overlays such as those depicted in Figure 1 and Figure 2 can be used
only for local communications. Even in network environments where
connectivity is not a problem, interworking with non-P2PSIP nodes
must be considered. While P2PSIP UAs can initiate sessions with
conventional SIP UAs using common resolution procedures defined in
RFC 3263 [RFC3263], they cannot be addressed in any way from outside
the overlay.
Overlays intended to provide global connectivity must provide
interworking with canonical SIP, in addition to providing relaying
services amongst the P2PSIP overlay peers. These overlays must
provide mechanisms for routing SIP messages to conventional SIP
entities in the public Internet and to be located and contacted using
standard SIP procedures. Figure 3 shows an example where
communication is enabled both within the overlay and across its
boundaries, thanks to resources shared by P2PSIP Proxy Peers
(Section 3.1).
Marocco & Bryan Expires February 5, 2007 [Page 6]
Internet-Draft Interworking between P2PSIP and SIP August 2006
sip:alice@p2psip.org sip:carol@example.com
___ ___
/_\ Media--------+ +--------------------- /_\
SIP | | :
: | | :
+-----------:-----------+ | | :
|p2psip.org : +-----------------+ :
| : +-----------------+| :
| : |Relay Agent Peer |+ :
|P2PSIP : +-----------------+ :
|Overlay : | :
| : +-----------------+ :
| : +-----------------+| +---------+
| :.......|P2PSIP Proxy Peer|+...........|SIP Proxy|
| +-----------------+ +---------+
+-----------------------+sip:p2psip.org sip:example.com
Example of a system connecting a UA in a P2PSIP overlay and one in a
conventional SIP network. The user in the P2PSIP overlay is
addressed by her local URI and data streams are relayed.
Figure 3
It is worth noting that, in the example in Figure 3, users who
register in the overlay MUST have URLs whose host parts match with
the FQDN for which overlay's P2PSIP proxy peers are bound to. That
is, the P2P overlay identifier for the overlay must be an FQDN.
Section 4 defines the detailed procedure for user registration.
Overlays such as the one in Figure 3, which have resources for both
relaying data and routing SIP messages to and from public servers can
be considered equivalent to conventional SIP networks when viewed
from the outside. Such a property is extremely important for P2PSIP
UAs which have also an account with conventional SIP providers, but
do not have direct connectivity with their servers. Indeed, such
UAs, following the usual procedures defined in RFC 3261 [RFC3261],
can register their overlay URL as a contact for their conventional
SIP address of record (AOR).
Figure 4 shows an example where a user (alice) registers both in an
overlay (p2psip.org) and, through P2PSIP proxy peers, with a
conventional SIP network (sip:example.org). SIP messages sent by
another user (carol) who only knows her conventional SIP URL
(sip:alice@example.org) are routed to her conventional SIP proxy
(sip:example.org) and, from here, to overlay's P2PSIP proxy
peers(sip:p2psip.org) which eventually reach her through the overlay.
Marocco & Bryan Expires February 5, 2007 [Page 7]
Internet-Draft Interworking between P2PSIP and SIP August 2006
sip:alice@example.org (public AOR)
sip:alice@p2psip.org sip:carol@example.com
___ ___
/_\ Media--------+ +--------------------- /_\
SIP | | :
: | | :
+-----------:-----------+ | | :
|p2psip.org : +-----------------+ :
| : +-----------------+| :
| : |Relay Agent Peer |+ :
|P2PSIP : +----------------+ :
|Overlay : | :
| : +-----------------+ :
| : +-----------------+| +---------+
| :.......|P2PSIP Proxy Peer|+.... ....|SIP Proxy|
| +-----------------+ : : +---------+
+-----------------------+sip:p2psip.org : : sip:example.com
: :
: :
+---------+
|SIP Proxy|
+---------+
sip:example.org
(alice's client-server proxy)
Interworking between one UA in a P2PSIP overlay and one in a
conventional SIP network. The user in the P2PSIP overlay is
addressed by her well known global URI and data streams are relayed
Figure 4
2.1. P2PSIP Overlay Identifier
For overlays which wish to interconnect with existing SIP networks,
the P2PSIP overlay identifier MUST be a FQDN. Moreover, some entity
(humans or automata) responsible for the overlay MUST be able to
manipulate DNS records referring to such identifier for registering
and unregistering P2PSIP proxy peers as defined in Section 3.1.
Procedures for selecting overlay identifiers and for manipulating DNS
records are outside of the scope of this document.
Marocco & Bryan Expires February 5, 2007 [Page 8]
Internet-Draft Interworking between P2PSIP and SIP August 2006
3. Additional Elements
This section describes the network elements which provide the
additional resources that P2PSIP overlays need for interworking with
conventional SIP networks. Note that these are logical roles, and
may (and in fact likely would) be combined into one entity such as a
P2PSIP UA. As with the functions in RFC 3261 [RFC3261], we treat
them as separate entities in this document for clarity.
3.1. P2PSIP Proxy Peer
A P2PSIP proxy peer is an element which can exchange SIP messages
with public domains and provides this function as a service to the
overlay it is registered in. In particular, the most important
characteristics are the following:
o A P2PSIP proxy peer MUST be able to send SIP requests and receive
SIP responses directed to hosts with a public Internet address.
o A P2PSIP proxy peer MUST be able to perform location procedures
defined in RFC 3263 [RFC3263]. This implies that it MUST also be
able to query the DNS.
o A P2PSIP proxy peer SHOULD have a binding in the DNS so that any
resolution for the overlay identifier performed according to
location procedures defined in RFC 3263 [RFC3263] returns a list
of P2PSIP proxy peers including this node. If such binding
doesn't exist for any of the P2PSIP proxy peers, the overlay
cannot be reached by public SIP networks.
P2PSIP proxy peers will generally be located on devices with direct
Internet access. It is NOT RECOMMENDED to insert records in the DNS
for P2PSIP proxy peers behind NATs. While NAT traversal mechanisms
such as STUN [I-D.ietf-behave-rfc3489bis] and TEREDO [RFC4380] can be
used to determine a public address and port which can be registered
in the DNS, NAT binding changes are not deterministic and can cause
inconsistencies.
P2PSIP proxy peer MUST record route on SIP request crossing overlay's
boundaries, using the overlay identifier instead of their local
address, due to the ephemeral nature of P2PSIP nodes.
3.2. Relay Agent Peer
A relay agent peer is an element which can directly exchange media
with hosts on the public Internet. STUN relay servers (previously
called TURN servers), specified in the STUN draft [I-D.ietf-behave-
turn] and TEREDO [RFC4380] relays are typical examples of relay
Marocco & Bryan Expires February 5, 2007 [Page 9]
Internet-Draft Interworking between P2PSIP and SIP August 2006
agents.
Relay agent peers can be located behind some types of NATs if, using
traversal mechanisms not based on relay (e.g. STUN [I-D.ietf-behave-
rfc3489bis]), they can obtain several public address-port pairs.
3.2.1. Relay Agent Peer Selection
It is extremely difficult to determine apriori which type of relay
agent peer fits best for a media session with a particular UA. To
avoid this choice, UAs SHOULD find as many relay agent peers as
possible and MUST establish media sessions using the ICE [I-D.ietf-
mmusic-ice] mechanism so that the most appropriate relay can be
chosen at run time.
3.3. Resource Lookup
P2PSIP UAs often need to locate resources or obtain services provided
by P2PSIP proxy peers and relay agent peers. Such lookup is
performed directly in the overlay through the P2PSIP client protocol.
One possible way to allow the location of resources within the
overlay is to define URI for identifying the elements which provide
them. While many mechanisms are possible, we outline a simple
possible approach below.
3.3.1. P2PSIP Proxy Peer URI
P2PSIP proxy peers act as SIP servers and are identified by SIP URLs.
Such URLs MUST have only the host field set, and its value MUST match
the overlay identifier.
For example, the URL which identifies P2PSIP proxy peers registered
within the overlay "p2psip.org" could be "sip:p2psip.org".
3.3.2. Relay Agent Peers URIs
Since relay agent peers can implement different protocols, there will
be different URI schemas for identifying each kind. As a general
rule, URLs identifying relay agent peers which implement a given
protocol, will be formed according to the specific scheme and will
have the host field (or the equivalent field) matching the overlay
identifier.
While such URI schema do not currently exist, one could use something
like "turn:p2psip.org" and "teredo:p2psip.org" identify relay agent
peers registered in the overlay "p2psip.org" and implementing TURN
and TEREDO protocols respectively.
Marocco & Bryan Expires February 5, 2007 [Page 10]
Internet-Draft Interworking between P2PSIP and SIP August 2006
4. User Registration
In order to be reachable from a conventional SIP UA, a UA
participating in a P2PSIP overlay that supports interworking MUST
create a binding in the overlay between its local contact and an URL
(i.e. P2PSIP overlay user identifier) as defined in Section 4.1. If
the user associated with the UA has another public SIP URI, they MAY
register such a URL with the authoritative registrar using a P2PSIP
proxy peer as described in Section 4.2.
4.1. Registering with the Overlay
UAs perform registration in the overlay through the P2PSIP client
protocol. Such registration consists of an insertion of a P2PSIP
overlay user routing record bound to the user identifier.
To support interworking with canonical SIP, the user identifier MUST
be a well formed SIP URL, with the host field matching the overlay
identifier. The user field MUST be set, and its value will usually
be the P2PSIP overlay user identifier.
According to local policies, the user MAY need to enroll and obtain
appropriate credentials for their URL before being able to register
records for it.
4.2. Registering with a Public SIP Network
Users registered in fully interworking P2PSIP overlays can use P2PSIP
proxy peers for sending messages to public SIP networks. This is
especially useful for registering bindings for AORs for which the
overlay is not authoritative. This mechanism can be used to register
the contact for a node participating in a P2PSIP overlay with a well
known SIP URI associated with the user that is well known to their
usual buddies but outside the overlay.
For registering with a public SIP network, an UA follows these steps:
1. The UA MUST perform user registration as defined in Section 4.1.
2. The UA MUST get the address of a P2PSIP proxy peer performing a
lookup as defined in Section 3.3.
3. The UA MUST send a REGISTER message for binding the URL it has
registered in the overlay to its public AOR. The message MUST be
sent using the P2PSIP proxy peer as an outbound proxy.
Marocco & Bryan Expires February 5, 2007 [Page 11]
Internet-Draft Interworking between P2PSIP and SIP August 2006
5. Examples
5.1. Caller and Callee within the Overlay
The following example refers to the network depicted in Figure 2.
Alice overlay relay relay Bob
| | | | |
| | | | |
| (1) Get Relay | | | |
|-------------->| | | |
| (2) Response | | | |
|<--------------| | | |
| | | | |
| (3) Init Relay| | | |
|------------------------------>| | |
| (4) Ok | | | |
|<------------------------------| | |
| | | | |
| (5) INVITE | | | |
|-------------->| (6) INVITE | | |
| |---------------------------------------------->|
| | | | |
| | | | (7) Get Relay |
| |<----------------------------------------------|
| | | | (8) Response |
| |---------------------------------------------->|
| | | | |
| | | |(9) Init Relay |
| | | |<--------------|
| | | | (10) Ok |
| | | |-------------->|
| | | | |
| | | | |
| (11) ICE | | | |
| /-----------\ | /-------------------------------------------\ |
|/ \|/ \|
|\ /|\ /|
| \-----------/ | \-------------------------------------------/ |
| | | | |
| (12) Media | | | |
|<=============================>|<=============>|<=============>|
| | | | |
Figure 5
Marocco & Bryan Expires February 5, 2007 [Page 12]
Internet-Draft Interworking between P2PSIP and SIP August 2006
First Alice queries the overlay for discovering the location of some
relay agent peers (1-2) and initializes one (3-4) for preparing an
ICE candidate. Then she sends an INVITE request with an ICE offer to
Bob through the overlay (5-6).
When Bob receives the INVITE, he queries the overlay to obtain the
location of some relay agent peers (7-8) and initializes one (9-10)
for preparing an ICE candidate. Then the session establishment
completes carrying ICE offers and answers and following the signaling
path of the first INVITE (11).
Eventually, the media is relayed across both Alice's and Bob's relay
agent peers (12).
5.2. Callee within a Public SIP Network
The following example refers to the network depicted in Figure 3.
Marocco & Bryan Expires February 5, 2007 [Page 13]
Internet-Draft Interworking between P2PSIP and SIP August 2006
---------------- overlay members ------------- ----- public -----
Alice overlay relay P2PSIP Carol's Carol
| | | proxy peer proxy |
| | | | | |
|(1) Get Relay | | | | |
|------------->| | | | |
|(2) Response | | | | |
|<-------------| | | | |
| | | | | |
|(3) Init Relay| | | | |
|------------------------->| | | |
|(4) Ok | | | | |
|<-------------------------| | | |
| | | | | |
|(5) Get Proxy | | | | |
|------------->| | | | |
|(6) Response | | | | |
|<-------------| | | | |
| | | | | |
|(7) INVITE | | | | |
|------------------------------------->|(8) INVITE | |
| | | |---------->|(9) INVITE |
| | | | |---------->|
| | | | | |
| (10) ICE | | | | |
| /----------------------------------\ | /-------------------\ |
|/ \|/ \|
|\ /|\ /|
| \----------------------------------/ | \-------------------/ |
| | | | | |
|(11) Media | | | | |
|<========================>|<=================================>|
| | | | | |
Figure 6
First Alice queries the overlay for discovering the location of one
or more relay agent peers (1-2) and initializes one (3-4) for
preparing an ICE candidate. Then she queries the overlay requesting
the location of some P2PSIP proxy peers (5-6) and sends an INVITE
request with an ICE offer to Carol through one of those (7).
The P2PSIP proxy peers performs common location procedures and
discovers the address of Carol's authoritative proxy for routing the
INVITE. Before sending (8), it adds to the message a Record-Route
header with a value equal to the overlay identifier, so that any
Marocco & Bryan Expires February 5, 2007 [Page 14]
Internet-Draft Interworking between P2PSIP and SIP August 2006
other request will reach a P2PSIP proxy peer registered in the same
overlay. Carol's location is found by her proxy based on
registration information (9).
When Carol receives the INVITE, the session establishment completes
carrying ICE offers and answers (if supported) (11).
Media is relayed across Alice's relay agent peer (11).
5.3. Caller within a Public SIP Network
The following example refers to the network depicted in Figure 3.
Alice overlay relay P2PSIP Carol
| | | proxy peer |
| | | | |
| | | | (1) INVITE |
| | | (2) INVITE |<--------------|
| (3) INVITE |<------------------------------| |
|<--------------| | | |
| | | | |
|(4) Get Relay | | | |
|-------------->| | | |
|(5) Response | | | |
|<--------------| | | |
| | | | |
|(6) Init Relay | | | |
|------------------------------>| | |
|(7) Ok | | | |
|<------------------------------| | |
| | | | |
| (8) ICE | | | |
| /-------------------------------------------\ | /-----------\ |
|/ \|/ \|
|\ /|\ /|
| \-------------------------------------------/ | \-----------/ |
| | | | |
| (9) Media | | | |
|<=============================>|<=============================>|
| | | | |
Figure 7
When Carol wants to contact Alice (using the address bound to the P2P
Marocco & Bryan Expires February 5, 2007 [Page 15]
Internet-Draft Interworking between P2PSIP and SIP August 2006
overlay identifier), she performs a conventional SIP location
procedure (RFC3263) and finds the address of one or more P2PSIP proxy
peers for the overlay. Carol then sends an INVITE message addressed
to Alice to any one of the set of such addresses (1). The P2PSIP
proxy peer routes the INVITE to Alice through the overlay (2-3) using
the overlay's resource location and routing mechanisms.
When Alice receives the INVITE, she queries the overlay to discover
the location of one or more relay agent peers (4-5) and initializes
one for preparing an ICE candidate (or an answer, if the INVITE
didn't declare to support ICE) (6-7).
Then the session establishment completes carrying ICE offers and
answers (if the INVITE declared to support it) (8).
Finally, media is relayed across Alice's relay agent peer (9).
Marocco & Bryan Expires February 5, 2007 [Page 16]
Internet-Draft Interworking between P2PSIP and SIP August 2006
6. Security Considerations
Besides the security issues already raised in SIP [2] and other
P2PSIP work, the interconnection model based on "well known" URIs is
vulnerable to spoofing attacks. More work, or the application of
existing SIP work on identity should applied to this to mitigate this
risk.
Another security issue is the registration of P2P SIP proxy peers
with a public DNS; it could be either a point of failure, if
registration policies are too permissive, or a threat to the peer to
peer model, if they are too restrictive. Mechanisms must allow for
nodes to be entered and removed, in a secure fashion. This work is
related to and likely to use dynamic DNS.
In a full interworking scenario identity assertion is critically
important; this document shows how it could be achieved proxying
regular authentication to traditional SIP domains. Mechanisms such
as issuing certificates to assert and validate user identities should
be used.
Marocco & Bryan Expires February 5, 2007 [Page 17]
Internet-Draft Interworking between P2PSIP and SIP August 2006
7. Open Issues
1. URI schemas for relay agent peers are not defined. Is it
feasible to define URNs for those protocols for which a URI
schema doesn't exist?
2. UAs route SIP messages addressed to external hosts directly to
P2PSIP proxy peers, without involving the overlay. We should
define in details how and why this works, but there are some
implications on the P2PSIP client protocol to be defined.
3. Include an example showing registration with public SIP networks
in the future.
4. As security/identity mechanisms for P2PSIP (certificate based or
otherwise) emerge, they should be worked into this document.
5. We need to define a mechanism for authenticating and inserting
and removing DNS records for the overlay. Need to work with
dynamic DNS group to address this.
8. References
[I-D.ietf-behave-rfc3489bis]
Rosenberg, J., "Simple Traversal Underneath Network
Address Translators (NAT) (STUN)",
draft-ietf-behave-rfc3489bis-04 (work in progress),
July 2006.
[I-D.ietf-behave-turn]
Rosenberg, J., "Obtaining Relay Addresses from Simple
Traversal of UDP Through NAT (STUN)",
draft-ietf-behave-turn-01 (work in progress), June 2006.
[I-D.ietf-mmusic-ice]
Rosenberg, J., "Interactive Connectivity Establishment
(ICE): A Methodology for Network Address Translator (NAT)
Traversal for Offer/Answer Protocols",
draft-ietf-mmusic-ice-09 (work in progress), June 2006.
[I-D.willis-p2psip-concepts]
Willis, D., Bryan, D., Matthews, P., and E. Shim,
"Concepts and Terminology for Peer to Peer SIP",
draft-willis-p2psip-concepts-00 (work in progress),
June 2006.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Marocco & Bryan Expires February 5, 2007 [Page 18]
Internet-Draft Interworking between P2PSIP and SIP August 2006
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002.
[RFC3263] Rosenberg, J. and H. Schulzrinne, "Session Initiation
Protocol (SIP): Locating SIP Servers", RFC 3263,
June 2002.
[RFC3986] Berners-Lee, T., Fielding, R., and L. Masinter, "Uniform
Resource Identifier (URI): Generic Syntax", STD 66,
RFC 3986, January 2005.
[RFC4380] Huitema, C., "Teredo: Tunneling IPv6 over UDP through
Network Address Translations (NATs)", RFC 4380,
February 2006.
Marocco & Bryan Expires February 5, 2007 [Page 19]
Internet-Draft Interworking between P2PSIP and SIP August 2006
Authors' Addresses
Enrico Marocco
Telecom Italia
Via G. Reiss Romoli, 274
Turin 10148
Italy
Phone: +39 011 228 5029
Email: enrico.marocco@telecomitalia.it
David Bryan
William and Mary Dept. of Computer Science and SIPeerior Technologies
P.O. Box 6741
Williamsburg, VA 23188
USA
Email: bryan@ethernot.org
Marocco & Bryan Expires February 5, 2007 [Page 20]
Internet-Draft Interworking between P2PSIP and SIP August 2006
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2006). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Marocco & Bryan Expires February 5, 2007 [Page 21]
| PAFTECH AB 2003-2026 | 2026-04-24 02:44:46 |