summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5079.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc5079.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc5079.txt')
-rw-r--r--doc/rfc/rfc5079.txt451
1 files changed, 451 insertions, 0 deletions
diff --git a/doc/rfc/rfc5079.txt b/doc/rfc/rfc5079.txt
new file mode 100644
index 0000000..ee8e67b
--- /dev/null
+++ b/doc/rfc/rfc5079.txt
@@ -0,0 +1,451 @@
+
+
+
+
+
+
+Network Working Group J. Rosenberg
+Request for Comments: 5079 Cisco
+Category: Standards Track December 2007
+
+
+ Rejecting Anonymous Requests in the Session Initiation Protocol (SIP)
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Abstract
+
+ The Session Initiation Protocol (SIP) allows for users to make
+ anonymous calls. However, users receiving such calls have the right
+ to reject them because they are anonymous. SIP has no way to
+ indicate to the caller that the reason for call rejection was that
+ the call was anonymous. Such an indication is useful to allow the
+ call to be retried without anonymity. This specification defines a
+ new SIP response code for this purpose.
+
+Table of Contents
+
+ 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . . . 2
+ 3. Server Behavior . . . . . . . . . . . . . . . . . . . . . . . . 3
+ 4. UAC Behavior . . . . . . . . . . . . . . . . . . . . . . . . . 4
+ 5. 433 (Anonymity Disallowed) Definition . . . . . . . . . . . . . 4
+ 6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . . 4
+ 7. Security Considerations . . . . . . . . . . . . . . . . . . . . 5
+ 8. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . . 5
+ 9. References . . . . . . . . . . . . . . . . . . . . . . . . . . 6
+ 9.1. Normative References . . . . . . . . . . . . . . . . . . . 6
+ 9.2. Informative References . . . . . . . . . . . . . . . . . . 6
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 1]
+
+RFC 5079 ACR Response Code December 2007
+
+
+1. Introduction
+
+ The Session Initiation Protocol (SIP) [RFC3261] allows for users to
+ make anonymous calls. In RFC 3261, this is done by including a From
+ header field whose display name has the value of "Anonymous".
+ Greater levels of anonymity were subsequently defined in [RFC3323],
+ which introduces the Privacy header field. The Privacy header field
+ allows a requesting User Agent (UA) to ask for various levels of
+ anonymity, including user level anonymity, header level anonymity,
+ and session level anonymity. [RFC3325] additionally defined the
+ P-Asserted-Identity header field, used to contain an asserted
+ identity. RFC 3325 also defined the 'id' value for the Privacy
+ header field, which is used to request the network to remove the
+ P-Asserted-Identity header field.
+
+ Though users need to be able to make anonymous calls, users that
+ receive such calls retain the right to reject the call because it is
+ anonymous. SIP does not provide a response code that allows the User
+ Agent Server (UAS), or a proxy acting on its behalf, to explicitly
+ indicate that the request was rejected because it was anonymous. The
+ closest response code is 403 (Forbidden), which doesn't convey a
+ specific reason. While it is possible to include a reason phrase in
+ a 403 response that indicates to the human user that the call was
+ rejected because it was anonymous, that reason phrase is not useful
+ for automata and cannot be interpreted by callers that speak a
+ different language. An indication that can be understood by an
+ automaton would allow for programmatic handling, including user
+ interface prompts, or conversion to equivalent error codes in the
+ Public Switched Telephone Network (PSTN) when the client is a
+ gateway.
+
+ To remedy this, this specification defines the 433 (Anonymity
+ Disallowed) response code.
+
+2. Terminology
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in [RFC2119].
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 2]
+
+RFC 5079 ACR Response Code December 2007
+
+
+3. Server Behavior
+
+ A server (generally acting on behalf of the called party, though this
+ need not be the case) MAY generate a 433 (Anonymity Disallowed)
+ response when it receives an anonymous request, and the server
+ refuses to fulfill the request because the requestor is anonymous. A
+ request SHOULD be considered anonymous when the identity of the
+ originator of the request has been explicitly withheld by the
+ originator. This occurs in any one of the following cases:
+
+ o The From header field contains a URI within the anonymous.invalid
+ domain.
+
+ o The From header field contains a display name whose value is
+ either 'Anonymous' or 'anonymous'. Note that display names make a
+ poor choice for indicating anonymity, since they are meant to be
+ consumed by humans, not automata. Thus, language variations and
+ even misspelling can cause an automaton to miss a hint in the
+ display name. Despite these problems, a check on the display name
+ is included here because RFC 3261 explicitly calls out the usage
+ of the display name as a way to declare anonymity.
+
+ o The request contained a Privacy header field whose value indicates
+ that the user wishes its identity withheld. Values meeting this
+ criteria are 'id' [RFC3325] or 'user'.
+
+ o The From header field contains a URI that has an explicit
+ indication that it is anonymous. One such example of a mechanism
+ that would meet this criteria is [coexistence]. This criteria is
+ true even if the request has a validated Identity header field
+ [RFC4474], which can be used in concert with anonymized From
+ header fields.
+
+ Lack of a network-asserted identity (such as the P-Asserted-Identity
+ header field), in and of itself, SHOULD NOT be considered an
+ indication of anonymity. Even though a Privacy header field value of
+ 'id' will cause the removal of a network-asserted identity, there is
+ no way to differentiate this case from one in which a network-
+ asserted identity was not supported by the originating domain. As a
+ consequence, a request without a network-asserted identity is
+ considered anonymous only when there is some other indication of
+ this, such as a From header field with a display name of 'Anonymous'.
+
+ In addition, requests where the identity of the requestor cannot be
+ determined or validated, but it is not a consequence of an explicit
+ action on the part of the requestor, are not considered anonymous.
+ For example, if a request contains a non-anonymous From header field,
+ along with the Identity and Identity-Info header fields [RFC4474],
+
+
+
+Rosenberg Standards Track [Page 3]
+
+RFC 5079 ACR Response Code December 2007
+
+
+ but the certificate could not be obtained from the reference in the
+ Identity-Info header field, it is not considered an anonymous
+ request, and the 433 response code SHOULD NOT be used.
+
+4. UAC Behavior
+
+ A User Agent Client (UAC) receiving a 433 (Anonymity Disallowed) MUST
+ NOT retry the request without anonymity unless it obtains
+ confirmation from the user that this is desirable. Such confirmation
+ could be obtained through the user interface, or by accessing user-
+ defined policy. If the user has indicated that this is desirable,
+ the UAC MAY retry the request without requesting anonymity. Note
+ that if the UAC were to automatically retry the request without
+ anonymity in the absence of an indication from the user that this
+ treatment is desirable, then the user's expectations would not be
+ met. Consequently, a user might think it had completed a call
+ anonymously when it is not actually anonymous.
+
+ Receipt of a 433 response to a mid-dialog request SHOULD NOT cause
+ the dialog to terminate, and SHOULD NOT cause the specific usage of
+ that dialog to terminate [RFC5057].
+
+ A UAC that does not understand or care about the specific semantics
+ of the 433 response will treat it as a 400 response.
+
+5. 433 (Anonymity Disallowed) Definition
+
+ This response indicates that the server refused to fulfill the
+ request because the requestor was anonymous. Its default reason
+ phrase is "Anonymity Disallowed".
+
+6. IANA Considerations
+
+ This section registers a new SIP response code according to the
+ procedures of RFC 3261.
+
+ RFC Number: RFC 5079
+
+ Response Code Number: 433
+
+ Default Reason Phrase: Anonymity Disallowed
+
+
+
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 4]
+
+RFC 5079 ACR Response Code December 2007
+
+
+7. Security Considerations
+
+ The fact that a request was rejected because it was anonymous does
+ reveal information about the called party -- that the called party
+ does not accept anonymous calls. This information may or may not be
+ sensitive. If it is, a UAS SHOULD reject the request with a 403
+ instead.
+
+ In the Public Switched Telephone Network (PSTN), the Anonymous Call
+ Rejection (ACR) feature is commonly used to prevent unwanted calls
+ from telemarketers (also known as spammers). Since telemarketers
+ frequently withhold their identity, anonymous call rejection has the
+ desired effect in many (but not all) cases. It is important to note
+ that the response code described here is likely to be ineffective in
+ blocking SIP-based spam. The reason is that a malicious caller can
+ include a From header field and display name that is not anonymous,
+ but is meaningless and invalid. Without a Privacy header field, such
+ a request will not appear anonymous and thus not be blocked by an
+ anonymity screening service. Dealing with SIP-based spam is not a
+ simple problem. The reader is referred to [sipping-spam] for a
+ discussion of the problem.
+
+ When anonymity services are being provided as a consequence of an
+ anonymizer function acting as a back-to-back user agent (B2BUA)
+ [RFC3323], and the anonymizer receives a 433 response, the anonymizer
+ MUST NOT retry the request without anonymization unless it has been
+ explicitly configured by the user to do so. In essence, the same
+ rules that apply to a UA in processing of a 433 response apply to a
+ network-based anonymization function, and for the same reasons.
+
+8. Acknowledgements
+
+ This document was motivated based on the requirements in
+ [tispan-req], and has benefited from the concepts in [hautakorpi].
+ Thanks to Keith Drage, Paul Kyzivat, and John Elwell for their
+ reviews of this document.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 5]
+
+RFC 5079 ACR Response Code December 2007
+
+
+9. References
+
+9.1. Normative References
+
+ [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G.,
+ Johnston, A., Peterson, J., Sparks, R., Handley, M.,
+ and E. Schooler, "SIP: Session Initiation Protocol",
+ RFC 3261, June 2002.
+
+ [RFC3323] Peterson, J., "A Privacy Mechanism for the Session
+ Initiation Protocol (SIP)", RFC 3323, November 2002.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+ [RFC4474] Peterson, J. and C. Jennings, "Enhancements for
+ Authenticated Identity Management in the Session
+ Initiation Protocol (SIP)", RFC 4474, August 2006.
+
+9.2. Informative References
+
+ [RFC3325] Jennings, C., Peterson, J., and M. Watson, "Private
+ Extensions to the Session Initiation Protocol (SIP)
+ for Asserted Identity within Trusted Networks",
+ RFC 3325, November 2002.
+
+ [coexistence] Rosenberg, J., "Coexistence of P-Asserted-ID and SIP
+ Identity", Work in Progress, June 2006.
+
+ [tispan-req] Jesske, R., "Input Requirements for the Session
+ Initiation Protocol (SIP) in support for the
+ European Telecommunications Standards Institute",
+ Work in Progress, July 2007.
+
+ [hautakorpi] Hautakorpi, J. and G. Camarillo, "Extending the
+ Session Initiation Protocol Reason Header with
+ Warning Codes", Work in Progress, October 2005.
+
+ [RFC5057] Sparks, R., "Multiple Dialog Usages in the Session
+ Initiation Protocol", RFC in 5057, November 2007.
+
+ [sipping-spam] Jennings, C. and J. Rosenberg, "The Session
+ Initiation Protocol (SIP) and Spam", Work
+ in Progress, August 2007.
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 6]
+
+RFC 5079 ACR Response Code December 2007
+
+
+Author's Address
+
+ Jonathan Rosenberg
+ Cisco
+ Edison, NJ
+ US
+
+ EMail: jdrosen@cisco.com
+ URI: http://www.jdrosen.net
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 7]
+
+RFC 5079 ACR Response Code December 2007
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2007).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Rosenberg Standards Track [Page 8]
+