diff options
author | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
---|---|---|
committer | Thomas Voss <mail@thomasvoss.com> | 2024-11-27 20:54:24 +0100 |
commit | 4bfd864f10b68b71482b35c818559068ef8d5797 (patch) | |
tree | e3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc3313.txt | |
parent | ea76e11061bda059ae9f9ad130a9895cc85607db (diff) |
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc3313.txt')
-rw-r--r-- | doc/rfc/rfc3313.txt | 899 |
1 files changed, 899 insertions, 0 deletions
diff --git a/doc/rfc/rfc3313.txt b/doc/rfc/rfc3313.txt new file mode 100644 index 0000000..45b4a3f --- /dev/null +++ b/doc/rfc/rfc3313.txt @@ -0,0 +1,899 @@ + + + + + + +Network Working Group W. Marshall, Ed. +Request for Comments: 3313 AT&T +Category: Informational January 2003 + + + Private Session Initiation Protocol (SIP) Extensions + for Media Authorization + +Status of this Memo + + This memo provides information for the Internet community. It does + not specify an Internet standard of any kind. Distribution of this + memo is unlimited. + +Copyright Notice + + Copyright (C) The Internet Society (2003). All Rights Reserved. + +Abstract + + This document describes the need for Quality of Service (QoS) and + media authorization and defines a Session Initiation Protocol (SIP) + extension that can be used to integrate QoS admission control with + call signaling and help guard against denial of service attacks. The + use of this extension is only applicable in administrative domains, + or among federations of administrative domains with previously + agreed-upon policies, where both the SIP proxy authorizing the QoS, + and the policy control of the underlying network providing the QoS, + belong to that administrative domain or federation of domains. + + + + + + + + + + + + + + + + + + + + + + +Marshall, Ed. Informational [Page 1] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +Table of Contents + + 1. Scope of Applicability......................................... 2 + 2. Conventions Used in this Document.............................. 3 + 3. Background and Motivation...................................... 3 + 4. Overview....................................................... 4 + 5. Changes to SIP to Support Media Authorization.................. 4 + 5.1 SIP Header Extension....................................... 5 + 5.2 SIP Procedures............................................. 5 + 5.2.1 User Agent Client (UAC)................................ 6 + 5.2.2 User Agent Server (UAS)................................ 6 + 5.2.3 Originating Proxy (OP)................................. 7 + 5.2.4 Destination Proxy (DP)................................. 7 + 6. Examples....................................................... 8 + 6.1 Requesting Bandwidth via RSVP Messaging.................... 8 + 6.1.1 User Agent Client Side................................. 8 + 6.1.2 User Agent Server Side................................. 10 + 7. Advantages of the Proposed Approach............................ 12 + 8. Security Considerations........................................ 13 + 9. IANA Considerations............................................ 13 + 10. Notice Regarding Intellectual Property Rights................. 13 + 11. Normative References.......................................... 14 + 12. Informative References........................................ 14 + 13. Contributors.................................................. 15 + 14. Acknowledgments............................................... 15 + 15. Editor's Address.............................................. 15 + 16. Full Copyright Statement...................................... 16 + +1. Scope of Applicability + + This document defines a SIP extension that can be used to integrate + QoS admission control with call signaling and help guard against + denial of service attacks. The use of this extension is only + applicable in administrative domains, or among federations of + administrative domains with previously agreed-upon policies, where + both the SIP proxy authorizing the QoS, and the policy control of the + underlying network providing the QoS, belong to that administrative + domain or federation of domains. Furthermore, the mechanism is + generally incompatible with end-to-end encryption of message bodies + that describe media sessions. + + This is in contrast with general Internet principles, which separate + data transport from applications. Thus, the solution described in + this document is not applicable to the Internet at large. Despite + these limitations, there are sufficiently useful specialized + deployments that meet the assumptions described above, and can accept + the limitations that result, to warrant informational publication of + this mechanism. An example deployment would be a closed network, + + + +Marshall, Ed. Informational [Page 2] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + which emulates a traditional circuit switched telephone network. + This document specifies a private header, facilitating use in these + specialized configurations. + +2. Conventions Used in this Document + + The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", + "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this + document are to be interpreted as described in RFC 2119 [2]. + +3. Background and Motivation + + Current IP telephony systems assume a perfect world in which there is + either an unlimited amount of bandwidth, or network layer Quality of + Service (QoS) is provided without any kind of policy control. + However, the reality is that end-to-end bandwidth is not unlimited + and uncontrolled access to QoS, in general, is unlikely. The primary + reason for this is that QoS provides preferential treatment of one + flow, at the expense of another. Consequently, it is important to + have policy control over whether a given flow should have access to + QoS. This will not only enable fairness in general, but can also + prevent denial of service attacks. + + In this document, we are concerned with providing QoS for media + streams established via the Session Initiation Protocol (SIP) [3]. + We assume an architecture that integrates call signaling with media + authorization, as illustrated in the Figure below. The solid lines + (A and B) show interfaces, whereas the dotted line (C) illustrates + the QoS enabled media flow: + + +---------+ + | Proxy | + +--------->| | + | +---------+ + | ^ + A)| B) | + | { } + | | + | v + v +------+ + +------+ C) | Edge | + | UA |........|router|...... + +------+ +------+ + + + Figure 1 - Basic Architecture + + + + + +Marshall, Ed. Informational [Page 3] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + In this architecture, we assume a SIP UA connected to a QoS enabled + network with an edge router acting as a Policy Enforcement Point + (PEP) [6]. We further assume that a SIP UA that wishes to obtain QoS + initiates sessions through a proxy which can interface with the QoS + policy control for the data network being used. We will refer to + such a proxy as a QoS enabled proxy. We assume that the SIP UA needs + to present an authorization token to the network in order to obtain + Quality of Service (C). The SIP UA obtains this authorization token + via SIP (A) from the QoS enabled proxy by means of an extension SIP + header, defined in this document. The proxy, in turn, communicates + either directly with the edge router or with a Policy Decision Point + (PDP - not shown) [6] in order to obtain a suitable authorization + token for the UA. + + Examples of access data networks, where such a QoS enabled proxy + could be used, include DOCSIS based cable networks and 3rd generation + (3G) wireless networks. + +4. Overview + + A session that needs to obtain QoS for the media streams in + accordance with our basic architecture described above goes through + the following steps. + + The SIP UA sends an INVITE to the QoS enabled proxy, which for each + resulting dialog includes one or more media authorization tokens in + all unreliable provisional responses (except 100), the first reliable + 1xx or 2xx response, and all retransmissions of that reliable + response for the dialog. When the UA requests QoS, it includes the + media authorization tokens with the resource reservation. + + A SIP UA may also receive an INVITE from its QoS enabled proxy which + includes one or more media authorization tokens. In that case, when + the UA requests QoS, it includes the media authorization tokens with + the resource reservation. The resource reservation mechanism is not + part of SIP and is not described within the scope of this document. + +5. Changes to SIP to Support Media Authorization + + This document defines a private SIP header extension to support a + media authorization scheme. In this architecture, a QoS enabled SIP + proxy supplies the UA with one or more authorization tokens which are + to be used in QoS requests. The extension defined allows network QoS + resources to be authorized by the QoS enabled SIP proxy. + + + + + + + +Marshall, Ed. Informational [Page 4] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +5.1 SIP Header Extension + + A new P-Media-Authorization general header field is defined. The P- + Media-Authorization header field contains one or more media + authorization tokens which are to be included in subsequent resource + reservations for the media flows associated with the session, that + is, passed to an independent resource reservation mechanism, which is + not specified here. The media authorization tokens are used for + authorizing QoS for the media stream(s). The P-Media-Authorization + header field is described by the following ABNF [4]: + + P-Media-Authorization = "P-Media-Authorization" HCOLON + P-Media-Authorization-Token + *(COMMA P-Media-Authorization-Token) + + P-Media-Authorization-Token = 1*HEXDIG + + Table 1 below is an extension of tables 2 and 3 in [3] for the new + header field defined here. For informational purposes, this table + also includes relevant entries for standards track extension methods + published at the time this document was published. The INFO, PRACK, + UPDATE, and SUBSCRIBE and NOTIFY methods are defined respectively in + [11], [9], [12], and [10]. + + Where proxy ACK BYE CAN INV OPT REG + P-Media-Authorization R ad o - - o - - + P-Media-Authorization 2xx ad - - - o - - + P-Media-Authorization 101-199 ad - - - o - - + + Where proxy INF PRA UPD SUB NOT + P-Media-Authorization R ad - o o - - + P-Media-Authorization 2xx ad - o o - - + + Table 1: Summary of header fields. + + The P-Media-Authorization header field can be used only in SIP + requests or responses that can carry a SIP offer or answer. This + naturally keeps the scope of this header field narrow. + +5.2 SIP Procedures + + This section defines SIP [3] procedures for usage in media + authorization compatible systems, from the point of view of the + authorizing QoS. + + + + + + + +Marshall, Ed. Informational [Page 5] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +5.2.1 User Agent Client (UAC) + + The initial SIP INVITE message, mid-call messages that result in + network QoS resource changes, and mid-call changes in call + destination should be authorized. These SIP messages are sent + through the QoS enabled proxies to receive this authorization. In + order to authorize QoS, the QoS enabled SIP proxy MAY need to inspect + message bodies that describe the media streams (e.g., SDP). Hence, + it is recommended (as may be appropriate within the applicability + scope in Section 1 of this document) that such message bodies not be + encrypted end-to-end. + + The P-Media-Authorization-Token, which is contained in the P-Media- + Authorization header, is included for each dialog in all unreliable + provisional responses (except 100), the first reliable 1xx or 2xx + response, and all retransmissions of that reliable response for the + dialog sent by the QoS enabled SIP proxy to the UAC. + + The UAC should use all the P-Media-Authorization-Tokens from the most + recent request/response that contained the P-Media-Authorization + header when requesting QoS for the associated media stream(s). This + applies to both initial and subsequent refresh reservation messages + (for example, in an RSVP-based reservation system). A reservation + function within the UAC should convert each string of hex digits into + binary, and utilize each result as a Policy-Element, as defined in + RFC 2750 [5] (excluding Length, but including P-Type which is + included in each token). These Policy-Elements would typically + contain the authorizing entity and credentials, and be used in an + RSVP request for media data stream QoS resources. + +5.2.2 User Agent Server (UAS) + + The User Agent Server receives the P-Media-Authorization-Token in an + INVITE (or other) message from the QoS enabled SIP proxy. If the + response contains a message body that describes media streams for + which the UA desires QoS, it is recommended (as may be appropriate + within the applicability scope in Section 1 of this document) that + this message body not be encrypted end-to-end. + + The UAS should use all the P-Media-Authorization-Tokens from the most + recent request/response that contained the P-Media-Authorization + header when requesting QoS for the associated media stream(s). This + applies both to initial and subsequent refresh reservation messages + (for example, in an RSVP-based reservation system). A reservation + function within the UAS should convert each string of hex digits into + binary, and utilize each result as a Policy-Element, as defined in + RFC 2750 [5] (excluding Length, but including P-Type which is + included in each token). These Policy-Elements would typically + + + +Marshall, Ed. Informational [Page 6] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + contain the authorizing entity and credentials, and be used in an + RSVP request for media data stream QoS resources. + +5.2.3 Originating Proxy (OP) + + When the originating QoS enabled proxy (OP) receives an INVITE (or + other) message from the UAC, the proxy authenticates the caller, and + verifies that the caller is authorized to receive QoS. + + In cooperation with an originating Policy Decision Point (PDP-o), the + OP obtains and/or generates one or more media authorization tokens. + These contain sufficient information for the UAC to get the + authorized QoS for the media streams. Each media authorization token + is formatted as a Policy-Element, as defined in RFC 2750 [5] + (excluding Length, but including P-Type which is included in each + token), and then converted to a string of hex digits to form a P- + Media-Authorization-Token. The proxy's resource management function + may inspect message bodies that describe the media streams (e.g., + SDP), in both requests and responses in order to decide what QoS to + authorize. + + For each dialog that results from the INVITE (or other) message + received from the UAC, the originating proxy must add a P-Media- + Authorization header with the P-Media-Authorization-Token in all + unreliable provisional responses (except 100), the first reliable 1xx + or 2xx response, and all retransmissions of that reliable response + the proxy sends to the UAC, if that response may result in network + QoS changes. A response with an SDP may result in such changes. + +5.2.4 Destination Proxy (DP) + + The Destination QoS Enabled Proxy (DP) verifies that the called party + is authorized to receive QoS. + + In cooperation with a terminating Policy Decision Point (PDP-t), the + DP obtains and/or generates a media authorization token that contains + sufficient information for the UAS to get the authorized QoS for the + media streams. The media authorization token is formatted as a + Policy-Element, as defined in RFC 2750 [5] (excluding Length, but + including P-Type which is included in each token), and then converted + to a string of hex digits to form a P-Media-Authorization-Token. The + proxy's resource management function may inspect message bodies that + describe the media streams (e.g., SDP), in both requests and + responses in order to decide what QoS to authorize. + + + + + + + +Marshall, Ed. Informational [Page 7] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + The Destination Proxy must add the P-Media-Authorization header with + the P-Media-Authorization-Token in the INVITE (or other) request that + it sends to the UAS if that message may result in network QoS + changes. A message with an SDP body may result in such changes. + +6. Examples + +6.1 Requesting Bandwidth via RSVP Messaging + + Below we provide an example of how the P-Media-Authorization header + field can be used in conjunction with the Resource Reservation + Protocol (RSVP) [7]. The example assumes that an offer arrives in + the initial INVITE and an answer arrives in a reliable provisional + response [9], which contains an SDP description of the media flow. + +6.1.1 User Agent Client Side + + Figure 2 presents a high-level overview of a basic call flow with + media authorization from the viewpoint of the UAC. Some policy + interactions have been omitted for brevity. + + When a user goes off-hook and dials a telephone number, the UAC + collects the dialed digits and sends the initial (1)INVITE message to + the originating SIP proxy. + + The originating SIP proxy (OP) authenticates the user/UAC and + forwards the (2)INVITE message to the proper SIP proxy. + + Assuming the call is not forwarded, the terminating end-point sends a + (3)18x response to the initial INVITE via OP. Included in this + response is an indication of the negotiated bandwidth requirement for + the connection (in the form of an SDP description [8]). + + When OP receives the (3)18x, it has sufficient information regarding + the end-points, bandwidth and characteristics of the media exchange. + It initiates a Policy-Setup message to PDP-o, (4)AuthProfile. + + The PDP-o stores the authorized media description in its local store, + generates an authorization token that points to this description, and + returns the authorization token to the OP, (5)AuthToken. + + + + + + + + + + + +Marshall, Ed. Informational [Page 8] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + UAC ER-o PDP-o OP + |(1)INVITE | | | Client Authentication + |------------------------------------------->| and Call Authoriz. + | | | | (2)INVITE + | | | |--------------> + | | | | (3)18x + | | |(4)AuthProfile |<-------------- + | | |<--------------| + | | |(5)AuthToken | + | | |-------------->| Auth. Token put into + | | | (6)18x | P-Media-Authorization + |<-------------------------------------------| header extension. + |---(7)PRACK-------------------------------->| + | |--(8)PRACK----> + | |<-(9)200 (PRACK) + |<--(10)200 (PRACK)--------------------------| + | | | | + |Copies the RSVP policy object | + |from the P-Media-Authorization | + |(11)RSVP-PATH | | + |----------->| (12)REQ | | + | |-------------->| Using the Auth-Token and Authorized + | | (13)DEC | Profile that is set by the SIP Proxy + | |<--------------| the PDP makes the decision + | | | |(14)RSVP-PATH + | |------------------------------------------------> + | | | |(15)RSVP-PATH + |<-------------------------------------------------------------- + |Copies the RSVP policy object | + |from the P-Media-Authorization | + |(16)RSVP-RESV | | + |----------->| (17)REQ | | + | |-------------->| Using the Auth-Token and Authorized + | | (18)DEC | Profile that is set by the SIP Proxy + | |<--------------| the PDP makes the decision + | | | |(19)RSVP-RESV + | |---------------------------------------------------> + | | | |(20)RSVP-RESV + |<---------------------------------------------------------------- + | | | | + + Figure 2 - Media Authorization with RSVP (UAC) + + The OP includes the authorization token in the P-Media-Authorization + header extension of the (6)18x message. + + + + + + +Marshall, Ed. Informational [Page 9] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + Upon receipt of the (6)18x message, the UAC stores the media + authorization token from the P-Media-Authorization header. Also, the + UAC acknowledges the 18x message by sending a (7)PRACK message, which + is responded to with (10) 200. + + Before sending any media, the UAC requests QoS by sending an + (11)RSVP-PATH message, which includes the previously stored P-Media- + Authorization-Token as a Policy-Element. + + ER-o, upon receipt of the (11)RSVP-PATH message, checks the + authorization through a PDP-o COPS message exchange, (12)REQ. PDP-o + checks the authorization using the stored authorized media + description that was linked to the authorization token it returned to + OP. If authorization is successful, PDP-o returns an "install" + Decision, (13)DEC. + + ER-o checks the admissibility for the request, and if admission + succeeds, it forwards the (14)RSVP-PATH message. + + Once UAC receives the (15)RSVP-PATH message from UAS, it sends the + (16)RSVP-RESV message to reserve the network resources. + + ER-o, upon receiving the (16)RSVP-RESV message checks the + authorization through a PDP-o COPS message exchange, (17)REQ. PDP-o + checks the authorization using the stored authorized media + description that was linked to the authorization token it returned to + OP. If authorization is successful, PDP-o returns an "install" + Decision, (18)DEC. + + ER-o checks the admissibility for the request, and if admission + succeeds, it forwards the (19)RSVP-RESV message. + + Upon receiving the (20)RSVP-RESV message, network resources have been + reserved in both directions. + +6.1.2 User Agent Server Side + + Figure 3 presents a high-level overview of a call flow with media + authorization from the viewpoint of the UAS. Some policy + interactions have been omitted for brevity. + + Since the destination SIP proxy (DP) has sufficient information + regarding the endpoints, bandwidth, and characteristics of the media + exchange, it initiates a Policy-Setup message to the terminating + Policy Decision Point (PDP-t) on receipt of the (1)INVITE. + + + + + + +Marshall, Ed. Informational [Page 10] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + UAS ER-t PDP-t DP + | | | | (1)INVITE + | | | |<-------------- + | | | | Proxy Authentication + | | | (2)AuthProfile| and Call Authoriz. + | | |<--------------| + | | | (3)AuthToken | + | | |-------------->| Auth. Token put into + | | | (4)INVITE | P-Media-Authorization + |<------------------------------------------| header extension + | (5)18x | | | + |------------------------------------------>| (6)18x + |Copies the RSVP policy object |--------------> + |from the P-Media-Authorization | + |(7)RSVP-PATH | | + |---------->| (8)REQ | | + | |-------------->| Using the Auth-Token and Authorized + | | (9)DEC | Profile that is set by the SIP Proxy + | |<--------------| the PDP makes the decision + | | | |(10)RSVP-PATH + | |--------------------------------------------------> + | | | |(11)RSVP-PATH + |<-------------------------------------------------------------- + |Copies the RSVP policy object | + |from the P-Media-Authorization | + | (12)RSVP-RESV | | + |---------->| | | + | | (13)REQ | | + | |-------------->| Using the Auth-Token and Authorized + | | (14)DEC | Profile that is set by the SIP Proxy + | |<--------------| the PDP makes the decision + | | | |(15)RSVP-RESV + | |---------------------------------------------------> + | | | |(16)RSVP-RESV + |<--------------------------------------------------------------- + | | | |<-(17)PRACK--------- + |<--(18)PRACK ------------------------------| + |---(19)200 (PRACK) ----------------------->| + | | | |--(20)200 (PRACK)--> + | | | | + + Figure 3 - Media Authorization with RSVP (UAS) + + PDP-t stores the authorized media description in its local store, + generates an authorization token that points to this description, and + returns the authorization token to DP. The token is placed in the + (4)INVITE message and forwarded to the UAS. + + + + +Marshall, Ed. Informational [Page 11] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + + Assuming that the call is not forwarded, the UAS sends a (5)18x + response to the initial INVITE message, which is forwarded back to + UAC. At the same time, the UAS sends a (7)RSVP-PATH message which + includes the previously stored P-Media-Authorization-Token as a + Policy-Element. + + ER-t, upon receiving the (7)RSVP-PATH message checks the + authorization through a PDP-t COPS message exchange. PDP-t checks + the authorization using the stored authorized media description that + was linked to the authorization token it returned to DP. If + authorization is successful, PDP-t returns an "install" Decision, + (9)DEC. + + ER-t checks the admissibility for the request, and if admission + succeeds, it forwards the (10)RSVP-PATH message. + + Once the UAS receives the (11)RSVP-PATH message, it sends the + (12)RSVP-RESV message to reserve the network resources. + + ER-t, upon reception of the (12)RSVP-RESV message, checks the + authorization through a PDP-t COPS message exchange. PDP-t checks + the authorization using the stored authorized media description that + was linked to the authorization token that it returned to DP. If + authorization is successful, PDP-t returns an "install" Decision, + (14)DEC. + + ER-t checks the admissibility for the request and if admission + succeeds, it forwards the (15)RSVP-RESV message. + + Upon receiving the (16)RSVP-RESV message, network resources have been + reserved in both directions. + + For completeness, we show the (17)PRACK message for the (5) 18x + response and the resulting (19) 200 response acknowledging the PRACK. + +7. Advantages of the Proposed Approach + + The use of media authorization makes it possible to control the usage + of network resources. In turn, this makes IP Telephony more robust + against denial of service attacks and various kinds of service + frauds. By using the authorization capability, the number of flows, + and the amount of network resources reserved can be controlled, + thereby making the IP Telephony system dependable in the presence of + scarce resources. + + + + + + + +Marshall, Ed. Informational [Page 12] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +8. Security Considerations + + In order to control access to QoS, a QoS enabled proxy should + authenticate the UA before providing it with a media authorization + token. Both the method and policy associated with such + authentication are outside the scope of this document, however it + could, for example, be done by using standard SIP authentication + mechanisms, as described in [3]. + + Media authorization tokens sent in the P-Media-Authorization header + from a QoS enabled proxy to a UA MUST be protected from eavesdropping + and tampering. This can, for example, be done through a mechanism + such as IPSec or TLS. However, this will only provide hop-by-hop + security. If there is one or more intermediaries (e.g., proxies), + between the UA and the QoS enabled proxy, these intermediaries will + have access to the P-Media-Authorization header field value, thereby + compromising confidentiality and integrity. This will enable both + theft-of-service and denial-of-service attacks against the UA. + Consequently, the P-Media-Authorization header field MUST NOT be + available to any untrusted intermediary in the clear or without + integrity protection. There is currently no mechanism defined in SIP + that would satisfy these requirements. Until such a mechanism + exists, proxies MUST NOT send P-Media-Authorization headers through + untrusted intermediaries, which might reveal or modify the contents + of this header. (Note that S/MIME-based encryption in SIP is not + available to proxy servers, as proxies are not allowed to add message + bodies.) + + QoS enabled proxies may need to inspect message bodies describing + media streams (e.g., SDP). Consequently, such message bodies should + not be encrypted. In turn, this will prevent end-to-end + confidentiality of the said message bodies, which lowers the overall + security possible. + +9. IANA Considerations + + This document defines a new private SIP header for media + authorization, "P-Media-Authorization". This header has been + registered by the IANA in the SIP header registry, using the RFC + number of this document as its reference. + +10. Notice Regarding Intellectual Property Rights + + The IETF has been notified of intellectual property rights claimed in + regard to some or all of the specification contained in this + document. For more information consult the online list of claimed + rights. + + + + +Marshall, Ed. Informational [Page 13] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +11. Normative References + + [1] Bradner, S., "The Internet Standards Process -- Revision 3", BCP + 9, RFC 2026, October 1996. + + [2] Bradner, S., "Key words for use in RFCs to Indicate Requirement + Levels", BCP 14, RFC 2119, March 1997. + + [3] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., + Peterson, J., Sparks, R., Handley, M. and E. Schooler, "SIP: + Session Initiation Protocol", RFC 3261, June 2002. + + [4] Crocker, D. and P. Overell, "Augmented BNF for Syntax + Specifications: ABNF", RFC 2234, November 1997. + + [5] Herzog, S., "RSVP Extensions for Policy Control", RFC 2750, + January 2000. + +12. Informative References + + [6] Yavatkar, R., Pendarakis, D. and R. Guerin, "A Framework for + Policy-based Admission Control", RFC 2753, January 2000. + + [7] Braden, R., Zhang, L., Berson, S., Herzog, S. and S. Jamin, + "Resource Reservation Protocol (RSVP) -- Version 1 Functional + Specification", RFC 2205, September 1997. + + [8] Handley, M. and V. Jacobson, "SDP: Session Description + Protocol", RFC 2327, April 1998. + + [9] Rosenberg, J. and H. Schulzrinne, "Reliability of Provisional + Responses in Session Initiation Protocol (SIP)", RFC 3262, June + 2002. + + [10] Roach, A. B., "Session Initiation Protocol (SIP)-Specific Event + Notification", RFC 3265, June 2002. + + [11] Donovan, S., "The SIP INFO Method", RFC 2976, October 2000. + + [12] Rosenberg, J., "The Session Initiation Protocol (SIP) UPDATE + Method", RFC 3311, September 2002. + + + + + + + + + + +Marshall, Ed. Informational [Page 14] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +13. Contributors + + The following people contributed significantly and were co-authors on + earlier versions of this document: + + Bill Marshall (AT&T), K. K. Ramakrishnan (AT&T), Ed Miller + (Terayon), Glenn Russell (CableLabs), Burcak Beser (Juniper + Networks), Mike Mannette (3Com), Kurt Steinbrenner (3Com), Dave + Oran (Cisco), Flemming Andreasen (Cisco), John Pickens (Com21), + Poornima Lalwaney (Nokia), Jon Fellows (Copper Mountain Networks), + Doc Evans (Arris), and Keith Kelly (NetSpeak). + +14. Acknowledgments + + The Distributed Call Signaling work in the PacketCable project is the + work of a large number of people, representing many different + companies. The contributors would like to recognize and thank the + following for their assistance: John Wheeler, Motorola; David + Boardman, Daniel Paul, Arris Interactive; Bill Blum, Jay Strater, + Jeff Ollis, Clive Holborow, Motorola; Doug Newlin, Guido Schuster, + Ikhlaq Sidhu, 3Com; Jiri Matousek, Bay Networks; Farzi Khazai, + Nortel; John Chapman, Bill Guckel, Michael Ramalho, Cisco; Chuck + Kalmanek, Doug Nortz, John Lawser, James Cheng, Tung-Hai Hsiao, + Partho Mishra, AT&T; Telcordia Technologies; and Lucent Cable + Communications. Dean Willis and Rohan Mahy provided valuable + feedback as well. + +15. Editor's Address + + Bill Marshall + AT&T + Florham Park, NJ 07932 + + EMail: wtm@research.att.com + + + + + + + + + + + + + + + + + +Marshall, Ed. Informational [Page 15] + +RFC 3313 SIP Extensions for Media Authorization January 2003 + + +16. Full Copyright Statement + + Copyright (C) The Internet Society (2003). All Rights Reserved. + + This document and translations of it may be copied and furnished to + others, and derivative works that comment on or otherwise explain it + or assist in its implementation may be prepared, copied, published + and distributed, in whole or in part, without restriction of any + kind, provided that the above copyright notice and this paragraph are + included on all such copies and derivative works. However, this + document itself may not be modified in any way, such as by removing + the copyright notice or references to the Internet Society or other + Internet organizations, except as needed for the purpose of + developing Internet standards in which case the procedures for + copyrights defined in the Internet Standards process must be + followed, or as required to translate it into languages other than + English. + + The limited permissions granted above are perpetual and will not be + revoked by the Internet Society or its successors or assigns. + + This document and the information contained herein is provided on an + "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING + TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING + BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION + HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF + MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. + +Acknowledgement + + Funding for the RFC Editor function is currently provided by the + Internet Society. + + + + + + + + + + + + + + + + + + + +Marshall, Ed. Informational [Page 16] + |