One document matched: draft-venkatar-sipping-called-name-00.txt
SIPPING WG Venkatesh
Venkataramanan
Internet Draft Sunil Veluvali
draft-venkatar-sipping-called-name-00.txt
June 2003 Sylantro Systems
Expires: Dec 2003
Enhancements to Asserted Identity to Enable Called Party Name
Delivery using SIP
Status of this Memo
This document is an Internet-Draft and is in full conformance with
all provisions of Section 10 of RFC2026.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six
months and may be updated, replaced, or obsoleted by other documents
at any time. It is inappropriate to use Internet-Drafts as
reference material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
Abstract
This document describes the expected business telephony requirements
for delivering called party name towards SIP entities. A couple of
mechanisms exist to deliver calling name and number to the called
party. None exist for exposing the called party name or preferred
identity to the calling party. This draft proposes a mechanism to
provide this capability.
Table of Contents
Status of this Memo................................................1
Abstract...........................................................1
Conventions used in this document..................................3
Requirements for Called Name Delivery..............................3
Overview...........................................................4
Proxy Behavior.....................................................5
User Agent Client Behavior.........................................5
V. Venkataramanan et. al. 1
Internet Draft called-name 6/2/2003
The P-Asserted-Identity Header.....................................5
Open Issues........................................................5
Security Considerations............................................5
Acknowledgements...................................................6
References.........................................................7
Author's Addresses.................................................7
V. Venkataramanan et. al. 2
Internet Draft called-name 6/2/2003
Applicability
This draft describes the modification to the P-Asserted-Identity [3]
extensions to SIP [2] that enables a network of SIP entities to
exchange called party information in a trusted network. The use of
this extension follows the guidelines specified in RFC 3325 [3].
This document does not describe how to use network elements to
determine the identity of an entity.
Conventions used in this document
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in
this document are to be interpreted as described in RFC-2119 [1] and
indicate requirement levels for compliant mechanisms.
Introduction
Delivering Called Name and Number is one of the many services
provided by traditional business communication systems, and a
service expected by most users of business communication systems.
This same functionality is required in next-generation SIP based
deployments.
The baseline SIP specification, RFC 3261 [2] allows called UAÆs (the
UAS) to place their display name and the number in SIP headers in
order to indicate their identity to the calling UA. The "Contact"
SIP header is one such example of this. However, use of the Contact
header does not solve all the requirements for providing called name
and number.
This document presents a method to extend a simple mechanism to
provide called party identification based on the requirements
detailed below.
Requirements for Called Name Delivery
. The name and number of the UAS is delivered to the UAC before
the call is established.
. In the case of calls to numbers like hunt-groups or ACD numbers
that are forked, every UAS that receives the INVITE will place
its local contact information in the response to this request.
The UAC will therefore know that the call was placed to an ACD
group number but will not know which of these agents the call
is being offered to.
. A feature proxy providing called name look up services for a UA
might have policies that define a particular SIP URL to be
displayed in a particular format and/or language that differs
V. Venkataramanan et. al. 3
Internet Draft called-name 6/2/2003
from the display preferences of the UAS that is registered for
this URL. If such a conflict arises, the display policy
implemented on the feature proxy will override that of the UAS.
. A feature proxy providing called name lookup services for a
user community may contain a list of users in a centralized
directory database with content differing from that of the UAS.
If this is the case, the information provided by the feature
proxy will be displayed, rather than that of the UAS.
. For URLÆs that are serviced via a PSTN gateway, the amount of
information that can be displayed about a called party is
restricted. Under such circumstances, a local feature proxy may
be configured to provide information such as called name to the
UA.
. Once a session is established, the UA and UAS information may
undergo many changes (transfer to a third party, the caller
gets parked and picked up by another end user, etc). In such
cases, it is desirable that the UA and the UAS are refreshed
with the current calling and called names.
Overview
Some of the above requirements are already supported in the base SIP
specification [2]. The UAS receiving the INVITE can place its
display name and number (its SIP-URL) in the "Contact" header in a
1xx or a 200-class response, which can be rendered to the user by
the UA. However, this does not cover or support all of the
requirements specified above.
For example, in cases where the call is forked to multiple user
agents (like applications like ACD or hunt groups), while the ôToö
header in the INVITE would indicate to the UAS receiving the INVITE
some information as to where the call was initially directed
towards, it would not provide details as to what the ôname
corresponding to this number isö or what to set the Contact display
name so that the ôdesiredö value may be rendered back to the UAC.
Arguably some of this may be achieved by local configuration of some
sort (tell the UAS what display name to use based on the To URL),
but it necessitates that the UA's involved in all types of call
flows know about all features, call redirection, and/or services
offered by the network to be able to deliver this service correctly.
Further services enabled by a feature proxy require that the proxy
be able to add this information in a SIP message. The Contact header
is a non-modifiable header by proxies in a 200 response per table 2
of the base SIP specification [2].
The draft proposes to use the P-Asserted-Identity header field as
described in RFC 3325 [3] in SIP responses to achieve rendering
called name and number to the UAC.
V. Venkataramanan et. al. 4
Internet Draft called-name 6/2/2003
A proxy server that handles a SIP response message, or generates a
100 Trying response on receipt of an INVITE, MAY after inspecting
the UACÆs profile add or modify the P-Asserted-Identity header in a
SIP response message before forwarding the same to the UAC or its
next hop. The guidelines for adding or removing the P-Asserted-
Identity in responses, remains as defined in RFC 3325 [3]. Simply
stated, the P-Asserted-Identity header is removed when forwarding
responses towards un-trusted UAÆs or proxies.
Proxy Behavior
Proxies are allowed to remove and/or add P-Asserted-Identity header
while processing any class of response. Any proxy that decides to
insert a P-Asserted-Identity in a SIP response message MUST do so,
only if the response being forwarded is to a trusted SIP entity.
Consequently, a proxy forwarding a SIP response MUST remove the P-
Asserted-Identity header if the same is being forwarded to an un-
trusted entity. This is in conformance with the rules outlined in
RFC 3325 [3].
User Agent Client Behavior
The same rules as those detailed for a User Agent Server in RFC 3325
[3] apply to the UAC while handling the header in a SIP response.
The draft RECOMMENDS that user agent render the contents of this
header to the end user. The draft also RECOMMENDS that the UAC
consider the identity provided in P-Asserted-Identity header field
more trust-worthy than the ôFromö and ôContactö header field of a
response.
The P-Asserted-Identity Header
This draft modifies the following entry to table 2 of [2]:
Header Field where proxy INV BYE CANCEL OPTIONS REG
------------ ----- ----- --- --- ------ ------- ---
P-Asserted-Identity 100 adm o o - - -
P-Asserted-Identity 1xx adm o o - - -
P-Asserted-Identity 2xx-6xx adm o o - - -
SUB NOT REF INF UPD PRA
--- --- --- --- --- ---
- - o - o -
Open Issues
Is the usage of the P-Asserted-Identity header for accomplishing the
same acceptable?
Security Considerations
V. Venkataramanan et. al. 5
Internet Draft called-name 6/2/2003
Since the draft extends the support of the P-Asserted-Identity
header defined in [3], all security considerations detailed in [3]
apply to this draft as well.
Acknowledgements
Many thanks to Cullen Jennings [3] for providing many useful
comments and support during authoring of this draft. Many thanks to
Kent Fritz, Mike Chack, John Weald, Sylantro Systems for their
comments.
V. Venkataramanan et. al. 6
Internet Draft called-name 6/2/2003
References
2 RFC 2119 Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997
[1] S. Bradner, "Key words for use in RFCs to indicate requirement
levels," Request for Comments 2119, Internet Engineering Task Force,
Mar. 1997.
[2] J. Rosenberg, H. Schulzrinne, et al., "SIP: Session initiation
protocol," Request for Comments 3261, Internet Engineering Task
Force, June 2002.
[3] C. Jennings, J. Peterson, ôPrivate Extensions to Session
Initiation Protocol (SIP) for Asserted Identity in Trusted
Networksö, November 2002
[4] J. Peterson, ôA Privacy Mechanism for the Session Initiation
Protocol (SIP)ö, RFC 3323, November 2002
Author's Addresses
Venkatesh Venkataramanan Email: venkatar@sylantro.com
sip:venkatar@sip.sylantro.com
(408) 626 3025
Sunil Veluvali Email: sunil.veluvali@sylantro.com
sip:sunil.veluvali@sip.sylantro.com
(408) 626 2309
Full Copyright Statement
Copyright (C) The Internet Society (2003). All Rights Reserved.
This document and translations of it may be copied and furnished to
others, and derivative works that comment on or otherwise explain it
or assist in its implementation may be prepared, copied, published
and distributed, in whole or in part, without restriction of any
kind, provided that the above copyright notice and this paragraph
are included on all such copies and derivative works. However, this
document itself may not be modified in any way, such as by removing
the copyright notice or references to the Internet Society or other
Internet organizations, except as needed for the purpose of
developing Internet standards in which case the procedures for
copyrights defined in the Internet Standards process must be
followed, or as required to translate it into languages other than
English.
The limited permissions granted above are perpetual and will not be
revoked by the Internet Society or its successors or assigns.
V. Venkataramanan et. al. 7
Internet Draft called-name 6/2/2003
This document and the information contained herein is provided on an
"AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
V. Venkataramanan et. al. 8
| PAFTECH AB 2003-2026 | 2026-04-23 20:00:32 |