summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5118.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc5118.txt')
-rw-r--r--doc/rfc/rfc5118.txt1011
1 files changed, 1011 insertions, 0 deletions
diff --git a/doc/rfc/rfc5118.txt b/doc/rfc/rfc5118.txt
new file mode 100644
index 0000000..731bacb
--- /dev/null
+++ b/doc/rfc/rfc5118.txt
@@ -0,0 +1,1011 @@
+
+
+
+
+
+
+Network Working Group V. Gurbani
+Request for Comments: 5118 Bell Laboratories, Alcatel-Lucent
+Category: Informational C. Boultond
+ Ubiquity Software Corporation
+ R. Sparks
+ Estacado Systems
+ February 2008
+
+
+ Session Initiation Protocol (SIP) Torture Test Messages for
+ Internet Protocol Version 6 (IPv6)
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Abstract
+
+ This document provides examples of Session Initiation Protocol (SIP)
+ test messages designed to exercise and "torture" the code of an
+ IPv6-enabled SIP implementation.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 1]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+Table of Contents
+
+ 1. Overview ........................................................2
+ 2. Document conventions ............................................2
+ 3. SIP and IPv6 Network Configuration ..............................4
+ 4. Parser Torture Tests ............................................4
+ 4.1. Valid SIP Message with an IPv6 Reference ...................5
+ 4.2. Invalid SIP Message with an IPv6 Reference .................5
+ 4.3. Port Ambiguous in a SIP URI ................................6
+ 4.4. Port Unambiguous in a SIP URI ..............................7
+ 4.5. IPv6 Reference Delimiters in Via Header ....................7
+ 4.6. SIP Request with IPv6 Addresses in
+ Session Description Protocol (SDP) Body.....................9
+ 4.7. Multiple IP Addresses in SIP Headers .......................9
+ 4.8. Multiple IP Addresses in SDP ..............................10
+ 4.9. IPv4-Mapped IPv6 Addresses ................................11
+ 4.10. IPv6 Reference Bug in RFC 3261 ABNF ......................11
+ 5. Security Considerations ........................................13
+ 6. Acknowledgments ................................................13
+ 7. References .....................................................13
+ 7.1. Normative References ......................................13
+ 7.2. Informative References ....................................14
+ Appendix A. Bit-Exact Archive of Each Test Message ...............15
+ A.1. Encoded Reference Messages ...............................16
+
+1. Overview
+
+ This document is informational, and is *not normative* on any aspect
+ of SIP.
+
+ This document contains test messages based on the current version
+ (2.0) of the Session Initiation Protocol as defined in [RFC3261].
+
+ This document is expected to be used as a companion document to the
+ more general SIP torture test document [RFC4475], which does not
+ include specific tests for IPv6 network identifiers.
+
+ This document does not attempt to catalog every way to make an
+ invalid message, nor does it attempt to be comprehensive in exploring
+ unusual, but valid, messages. Instead, it tries to focus on areas
+ that may cause interoperability problems in IPv6 deployments.
+
+2. Document Conventions
+
+ This document contains many examples of SIP messages with IPv6
+ network identifiers. The appendix contains an encoded binary form
+ containing the bit-exact representation of all the messages and the
+ script needed to decode them into separate files.
+
+
+
+Gurbani, et al. Informational [Page 2]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+ The IPv6 addresses used in this document correspond to the 2001:
+ DB8::/32 address prefix reserved for documentation [RFC3489].
+ Likewise, the IPv4 addresses used in this document correspond to the
+ 192.0.2.0/24 address block as described in [RFC3330].
+
+ Although SIP is a text-based protocol, some of these examples cannot
+ be unambiguously rendered without additional markup due to the
+ constraints placed on the formatting of RFCs. This document uses the
+ <allOneLine/> markup convention established in [RFC4475] to avoid
+ ambiguity and meet the Internet-Draft layout requirements. For the
+ sake of completeness, the text defining this markup from Section 2.1
+ of [RFC4475] is reproduced in its entirety below:
+
+ Several of these examples contain unfolded lines longer than 72
+ characters. These are captured between <allOneLine/> tags. The
+ single unfolded line is reconstructed by directly concatenating
+ all lines appearing between the tags (discarding any line feeds or
+ carriage returns). There will be no whitespace at the end of
+ lines. Any whitespace appearing at a fold-point will appear at
+ the beginning of a line.
+
+ The following represent the same string of bits:
+
+ Header-name: first value, reallylongsecondvalue, third value
+
+ <allOneLine>
+ Header-name: first value,
+ reallylongsecondvalue
+ , third value
+ </allOneLine>
+
+ <allOneLine>
+ Header-name: first value,
+ reallylong
+ second
+ value,
+ third value
+ </allOneLine>
+
+ Note that this is NOT SIP header-line folding, where different
+ strings of bits have equivalent meaning.
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 3]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+3. SIP and IPv6 Network Configuration
+
+ System-level issues like deploying a dual-stack proxy server,
+ populating DNS with A and AAAA Resource Records (RRs), zero-
+ configuration discovery of outbound proxies for IPv4 and IPv6
+ networks, when a dual-stack proxy should Record-Route itself, and
+ media issues also play a major part in the transition to IPv6. This
+ document does not, however, address these issues. Instead, a
+ companion document [sip-trans] provides more guidance on these
+ issues.
+
+4. Parser Torture Tests
+
+ The test messages are organized into several sections. Some stress
+ only the SIP parser and others stress both the parser and the
+ application above it. Some messages are valid and some are not.
+ Each example clearly calls out what makes any invalid messages
+ incorrect.
+
+ Please refer to the complete Augmented Backus-Naur Form (ABNF) in
+ [RFC3261] on representing IPv6 references in SIP messages. IPv6
+ references are delimited by a "[" and "]". When an IPv6 reference is
+ part of a SIP Uniform Resource Identifier (URI), RFC 3261 mandates
+ that the "IPv6reference" production rule be used to recognize tokens
+ that comprise an IPv6 reference. More specifically, the ABNF states
+ the following:
+
+ SIP-URI = "sip:" [ userinfo ] hostport
+ uri-parameters [ headers ]
+ hostport = host [ ":" port ]
+ host = hostname / IPv4address / IPv6reference
+ IPv4address = 1*3DIGIT "." 1*3DIGIT "." 1*3DIGIT "." 1*3DIGIT
+ IPv6reference = "[" IPv6address "]"
+ IPv6address = hexpart [ ":" IPv4address ]
+ hexpart = hexseq / hexseq "::" [ hexseq ] / "::" [ hexseq ]
+ hexseq = hex4 *( ":" hex4)
+ hex4 = 1*4HEXDIG
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 4]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+4.1. Valid SIP Message with an IPv6 Reference
+
+ The request below is well-formatted according to the grammar in
+ [RFC3261]. An IPv6 reference appears in the Request-URI (R-URI), Via
+ header field, and Contact header field.
+
+ Message Details: ipv6-good
+
+ REGISTER sip:[2001:db8::10] SIP/2.0
+ To: sip:user@example.com
+ From: sip:user@example.com;tag=81x2
+ Via: SIP/2.0/UDP [2001:db8::9:1];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Max-Forwards: 70
+ Contact: "Caller" <sip:caller@[2001:db8::1]>
+ CSeq: 98176 REGISTER
+ Content-Length: 0
+
+4.2. Invalid SIP Message with an IPv6 Reference
+
+ The request below is not well-formatted according to the grammar in
+ [RFC3261]. The IPv6 reference in the R-URI does not contain the
+ mandated delimiters for an IPv6 reference ("[" and "]").
+
+ A SIP implementation receiving this request should respond with a 400
+ Bad Request error.
+
+ Message Details: ipv6-bad
+
+ REGISTER sip:2001:db8::10 SIP/2.0
+ To: sip:user@example.com
+ From: sip:user@example.com;tag=81x2
+ Via: SIP/2.0/UDP [2001:db8::9:1];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Max-Forwards: 70
+ Contact: "Caller" <sip:caller@[2001:db8::1]>
+ CSeq: 98176 REGISTER
+ Content-Length: 0
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 5]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+4.3. Port Ambiguous in a SIP URI
+
+ IPv6 uses the colon to delimit octets. This may lead to ambiguity if
+ the port number on which to contact a SIP server is inadvertently
+ conflated with the IPv6 reference. Consider the REGISTER request
+ below. The sender of the request intended to specify a port number
+ (5070) to contact a server, but inadvertently, inserted the port
+ number inside the closing "]" of the IPv6 reference. Unfortunately,
+ since the IPv6 address in the R-URI is compressed, the intended port
+ number becomes the last octet of the reference.
+
+ From a parsing perspective, the request below is well-formed.
+ However, from a semantic point of view, it will not yield the desired
+ result. Implementations must ensure that when a raw IPv6 address
+ appears in a SIP URI, then a port number, if required, appears
+ outside the closing "]" delimiting the IPv6 reference. Raw IPv6
+ addresses can occur in many header fields, including the Contact,
+ Route, and Record-Route header fields. They also can appear as the
+ result of the "sent-by" production rule of the Via header field.
+ Implementers are urged to consult the ABNF in [RFC3261] for a
+ complete list of fields where a SIP URI can appear.
+
+ Message Details: port-ambiguous
+
+ REGISTER sip:[2001:db8::10:5070] SIP/2.0
+ To: sip:user@example.com
+ From: sip:user@example.com;tag=81x2
+ Via: SIP/2.0/UDP [2001:db8::9:1];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Contact: "Caller" <sip:caller@[2001:db8::1]>
+ Max-Forwards: 70
+ CSeq: 98176 REGISTER
+ Content-Length: 0
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 6]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+4.4. Port Unambiguous in a SIP URI
+
+ In contrast to the example in Section 4.3, the following REGISTER
+ request leaves no ambiguity whatsoever on where the IPv6 address ends
+ and the port number begins. This REGISTER request is well formatted
+ per the grammar in [RFC3261].
+
+ Message Details: port-unambiguous
+
+ REGISTER sip:[2001:db8::10]:5070 SIP/2.0
+ To: sip:user@example.com
+ From: sip:user@example.com;tag=81x2
+ Via: SIP/2.0/UDP [2001:db8::9:1];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Contact: "Caller" <sip:caller@[2001:db8::1]>
+ Max-Forwards: 70
+ CSeq: 98176 REGISTER
+ Content-Length: 0
+
+4.5. IPv6 Reference Delimiters in Via Header
+
+ IPv6 references can also appear in Via header fields; more
+ specifically in the "sent-by" production rule and the "via-received"
+ production rule. In the "sent-by" production rule, the sequence of
+ octets comprising the IPv6 address is defined to appear as an
+ "IPv6reference" non-terminal, thereby mandating the "[" and "]"
+ delimiters. However, this is not the case for the "via-received"
+ non-terminal. The "via-received" production rule is defined as
+ follows:
+
+ via-received = "received" EQUAL (IPv4address / IPv6address)
+
+ The "IPv6address" non-terminal is defined not to include the
+ delimiting "[" and "]". This has led to the situation documented
+ during the 18th SIP Interoperability Event [Email-SIPit]:
+
+ Those testing IPv6 made different assumptions about enclosing
+ literal v6 addresses in Vias in []. By the end of the event, most
+ implementations were accepting either. Its about 50/50 on what
+ gets sent.
+
+ While it would be beneficial if the same non-terminal
+ ("IPv6reference") was used for both the "sent-by" and "via-received"
+ production rules, there has not been a consensus in the working group
+ to that effect. Thus, the best that can be suggested is that
+ implementations must follow the Robustness Principle [RFC1122] and be
+ liberal in accepting a "received" parameter with or without the
+
+
+
+
+Gurbani, et al. Informational [Page 7]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+ delimiting "[" and "]" tokens. When sending a request,
+ implementations must not put the delimiting "[" and "]" tokens.
+
+ The two test cases below are designed to stress this behavior. A SIP
+ implementation receiving either of these messages must parse them
+ successfully.
+
+ The request below contains an IPv6 address in the Via "received"
+ parameter. The IPv6 address is delimited by "[" and "]". Even
+ though this is not a valid request based on a strict interpretation
+ of the grammar in [RFC3261], robust implementations must nonetheless
+ be able to parse the topmost Via header field and continue processing
+ the request.
+
+ Message Details: via-received-param-with-delim
+
+ BYE sip:[2001:db8::10] SIP/2.0
+ To: sip:user@example.com;tag=bd76ya
+ From: sip:user@example.com;tag=81x2
+ <allOneLine>
+ Via: SIP/2.0/UDP [2001:db8::9:1];received=[2001:db8::9:255];
+ branch=z9hG4bKas3-111
+ </allOneLine>
+ Call-ID: SSG9559905523997077@hlau_4100
+ Max-Forwards: 70
+ CSeq: 321 BYE
+ Content-Length: 0
+
+ The OPTIONS request below contains an IPv6 address in the Via
+ "received" parameter without the adorning "[" and "]". This request
+ is valid according to the grammar in [RFC3261].
+
+ Message Details: via-received-param-no-delim
+
+ OPTIONS sip:[2001:db8::10] SIP/2.0
+ To: sip:user@example.com
+ From: sip:user@example.com;tag=81x2
+ <allOneLine>
+ Via: SIP/2.0/UDP [2001:db8::9:1];received=2001:db8::9:255;
+ branch=z9hG4bKas3
+ </allOneLine>
+ Call-ID: SSG95523997077@hlau_4100
+ Max-Forwards: 70
+ Contact: "Caller" <sip:caller@[2001:db8::9:1]>
+ CSeq: 921 OPTIONS
+ Content-Length: 0
+
+
+
+
+
+Gurbani, et al. Informational [Page 8]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+4.6. SIP Request with IPv6 Addresses in Session Description Protocol
+ (SDP) Body
+
+ This request below is valid and well-formed according to the grammar
+ in [RFC3261]. Note that the IPv6 addresses in the SDP [RFC4566] body
+ do not have the delimiting "[" and "]".
+
+ Message Details: ipv6-in-sdp
+
+ INVITE sip:user@[2001:db8::10] SIP/2.0
+ To: sip:user@[2001:db8::10]
+ From: sip:user@example.com;tag=81x2
+ Via: SIP/2.0/UDP [2001:db8::20];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Contact: "Caller" <sip:caller@[2001:db8::20]>
+ CSeq: 8612 INVITE
+ Max-Forwards: 70
+ Content-Type: application/sdp
+ Content-Length: 268
+
+ v=0
+ o=assistant 971731711378798081 0 IN IP6 2001:db8::20
+ s=Live video feed for today's meeting
+ c=IN IP6 2001:db8::20
+ t=3338481189 3370017201
+ m=audio 6000 RTP/AVP 2
+ a=rtpmap:2 G726-32/8000
+ m=video 6024 RTP/AVP 107
+ a=rtpmap:107 H263-1998/90000
+
+4.7. Multiple IP Addresses in SIP Headers
+
+ The request below is valid and well-formed according to the grammar
+ in [RFC3261]. The Via list contains a mix of IPv4 addresses and IPv6
+ references.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 9]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+ Message Details: mult-ip-in-header
+
+ BYE sip:user@host.example.net SIP/2.0
+ Via: SIP/2.0/UDP [2001:db8::9:1]:6050;branch=z9hG4bKas3-111
+ Via: SIP/2.0/UDP 192.0.2.1;branch=z9hG4bKjhja8781hjuaij65144
+ <allOneLine>
+ Via: SIP/2.0/TCP [2001:db8::9:255];branch=z9hG4bK451jj;
+ received=192.0.2.200
+ </allOneLine>
+ Call-ID: 997077@lau_4100
+ Max-Forwards: 70
+ CSeq: 89187 BYE
+ To: sip:user@example.net;tag=9817--94
+ From: sip:user@example.com;tag=81x2
+ Content-Length: 0
+
+4.8. Multiple IP Addresses in SDP
+
+ The request below is valid and well-formed according to the grammar
+ in [RFC3261]. The SDP contains multiple media lines, and each media
+ line is identified by a different network connection address.
+
+ Message Details: mult-ip-in-sdp
+
+ INVITE sip:user@[2001:db8::10] SIP/2.0
+ To: sip:user@[2001:db8::10]
+ From: sip:user@example.com;tag=81x2
+ Via: SIP/2.0/UDP [2001:db8::9:1];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Contact: "Caller" <sip:caller@[2001:db8::9:1]>
+ Max-Forwards: 70
+ CSeq: 8912 INVITE
+ Content-Type: application/sdp
+ Content-Length: 181
+
+ v=0
+ o=bob 280744730 28977631 IN IP4 host.example.com
+ s=
+ t=0 0
+ m=audio 22334 RTP/AVP 0
+ c=IN IP4 192.0.2.1
+ m=video 6024 RTP/AVP 107
+ c=IN IP6 2001:db8::1
+ a=rtpmap:107 H263-1998/90000
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 10]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+4.9. IPv4-Mapped IPv6 Addresses
+
+ An IPv4-mapped IPv6 address is usually represented with the last 32
+ bits appearing as a dotted-decimal IPv4 address; e.g., ::ffff:
+ 192.0.2.1. A SIP implementation receiving a message that contains
+ such a mapped address must be prepared to parse it successfully. An
+ IPv4-mapped IPv6 address may appear in signaling, or in the SDP
+ carried by the signaling message, or in both. If a port number is
+ part of the URI represented by the IPv4-mapped IPv6 address, then it
+ must appear outside the delimiting "]" (cf. Section 4.4).
+
+ The message below is well-formed according to the grammar in
+ [RFC3261]. The Via list contains two Via headers, both of which
+ include an IPv4-mapped IPv6 address. An IPv4-mapped IPv6 address
+ also appears in the Contact header and the SDP. The topmost Via
+ header includes a port number that is appropriately delimited by "]".
+
+ Message Details: ipv4-mapped-ipv6
+
+ INVITE sip:user@example.com SIP/2.0
+ To: sip:user@example.com
+ From: sip:user@east.example.com;tag=81x2
+ Via: SIP/2.0/UDP [::ffff:192.0.2.10]:19823;branch=z9hG4bKbh19
+ Via: SIP/2.0/UDP [::ffff:192.0.2.2];branch=z9hG4bKas3-111
+ Call-ID: SSG9559905523997077@hlau_4100
+ Contact: "T. desk phone" <sip:ted@[::ffff:192.0.2.2]>
+ CSeq: 612 INVITE
+ Max-Forwards: 70
+ Content-Type: application/sdp
+ Content-Length: 236
+
+ v=0
+ o=assistant 971731711378798081 0 IN IP6 ::ffff:192.0.2.2
+ s=Call me soon, please!
+ c=IN IP6 ::ffff:192.0.2.2
+ t=3338481189 3370017201
+ m=audio 6000 RTP/AVP 2
+ a=rtpmap:2 G726-32/8000
+ m=video 6024 RTP/AVP 107
+ a=rtpmap:107 H263-1998/90000
+
+4.10. IPv6 Reference Bug in RFC 3261 ABNF
+
+ It is possible to follow the IPv6reference production rule of RFC
+ 3261 ABNF -- the relevant portion of which is reproduced at the top
+ of Section 4 -- and arrive at the following construct:
+
+ [2001:db8:::192.0.2.1]
+
+
+
+Gurbani, et al. Informational [Page 11]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+ Note the extra colon before the IPv4 address in the above construct.
+ The correct construct, of course, is:
+
+ [2001:db8::192.0.2.1]
+
+ The ABNF pertaining to IPv6 references in RFC 3261 was derived from
+ RFC 2373 [RFC2373], which has been obsoleted by RFC 4291 [RFC4291].
+ The specific behavior of inserting an extra colon was inherited from
+ RFC 2373, and has been remedied in RFC 4291. However, following the
+ Robustness Principle [RFC1122], an implementation must tolerate both
+ of the above constructs.
+
+ The message below includes an extra colon in the IPv6 reference. A
+ SIP implementation receiving such a message may exhibit robustness by
+ successfully parsing the IPv6 reference (it can choose to ignore the
+ extra colon when parsing the IPv6 reference. If the SIP
+ implementation is acting in the role of a proxy, it may additionally
+ serialize the message without the extra colon to aid the next
+ downstream server).
+
+ Message Details: ipv6-bug-abnf-3-colons
+
+ OPTIONS sip:user@[2001:db8:::192.0.2.1] SIP/2.0
+ To: sip:user@[2001:db8:::192.0.2.1]
+ From: sip:user@example.com;tag=810x2
+ Via: SIP/2.0/UDP lab1.east.example.com;branch=z9hG4bKas3-111
+ Call-ID: G9559905523997077@hlau_4100
+ CSeq: 689 OPTIONS
+ Max-Forwards: 70
+ Content-Length: 0
+
+ The next message has the correct syntax for the IPv6 reference in the
+ R-URI.
+
+ Message Details: ipv6-correct-abnf-2-colons
+
+ OPTIONS sip:user@[2001:db8::192.0.2.1] SIP/2.0
+ To: sip:user@[2001:db8::192.0.2.1]
+ From: sip:user@example.com;tag=810x2
+ Via: SIP/2.0/UDP lab1.east.example.com;branch=z9hG4bKas3-111
+ Call-ID: G9559905523997077@hlau_4100
+ CSeq: 689 OPTIONS
+ Max-Forwards: 70
+ Content-Length: 0
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 12]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+5. Security Considerations
+
+ This document presents examples of SIP messages with IPv6 references
+ contained in the signaling headers and SDP payload. While this
+ document may clarify the behavior of SIP elements processing a
+
+ message with IPv6 references, it does not normatively change the base
+ SIP [RFC3261] specification in any way. Consequently, all security
+ considerations in [RFC3261] apply.
+
+ Parsers must carefully consider edge conditions and malicious input
+ as part of their design. Attacks on many Internet systems use
+ crafted input to cause implementations to behave in undesirable ways.
+ Many of the messages in this document are designed to stress a parser
+ implementation at points traditionally used for such attacks. This
+ document does not, however, attempt to be comprehensive. It contains
+ some common pitfalls that the authors have discovered while parsing
+ IPv6 identifiers in SIP implementations.
+
+6. Acknowledgments
+
+ The authors thank Jeroen van Bemmel, Dennis Bijwaard, Gonzalo
+ Camarillo, Bob Gilligan, Alan Jeffrey, Larry Kollasch, Erik Nordmark,
+ Kumiko Ono, Pekka Pessi, Jon Peterson, and other members of the SIP-
+ related working groups for input provided during the construction of
+ the document and discussion of the test cases.
+
+ This work is being discussed on the sipping@ietf.org mailing list.
+
+ A.B. Nataraju and A.C. Mahendran provided working group last call
+ comments.
+
+ Mohamed Boucadair and Brian Carpenter suggested new test cases for
+ inclusion in the document.
+
+7. References
+
+7.1. Normative References
+
+ [RFC1122] Braden, R., Ed., "Requirements for Internet Hosts -
+ Communication Layers", STD 3, RFC 1122, October 1989.
+
+ [RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G.,
+ Johnston, A., Peterson, J., Sparks, R., Handley, M.,
+ and E. Schooler, "SIP: Session Initiation Protocol",
+ RFC 3261, June 2002.
+
+
+
+
+
+Gurbani, et al. Informational [Page 13]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+ [RFC3330] IANA, "Special-Use IPv4 Addresses", RFC 3330, September
+ 2002.
+
+ [RFC3489] Rosenberg, J., Weinberger, J., Huitema, C., and R.
+ Mahy, "STUN - Simple Traversal of User Datagram
+ Protocol (UDP) Through Network Address Translators
+ (NATs)", RFC 3489, March 2003.
+
+ [RFC4475] Sparks, R., Ed., Hawrylyshen, A., Johnston, A.,
+ Rosenberg, J., and H. Schulzrinne, "Session Initiation
+ Protocol (SIP) Torture Test Messages", RFC 4475, May
+ 2006.
+
+ [RFC4566] Handley, M., Jacobson, V., and C. Perkins, "SDP:
+ Session Description Protocol", RFC 4566, July 2006.
+
+7.2. Informative References
+
+ [RFC2373] Hinden, R. and S. Deering, "IP Version 6 Addressing
+ Architecture", RFC 2373, July 1998.
+
+ [RFC4291] Hinden, R. and S. Deering, "IP Version 6 Addressing
+ Architecture", RFC 4291, February 2006.
+
+ [sip-trans] Camarillo, G., El Malki, K., and V. Gurbani, "IPv6
+ Transition in the Session Initiation Protocol (SIP)",
+ Work in Progress, August 2007.
+
+ [Email-SIPit] Sparks, R., "preliminary report: SIPit 18", Electronic
+ Mail archived at http://www1.ietf.org/mail-archive/web/
+ sip/current/msg14103.html, April 2006.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 14]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+Appendix A. Bit-Exact Archive of Each Test Message
+
+ The following text block is an encoded, gzip compressed TAR archive
+ of files that represent each of the example messages discussed in
+ Section 4.
+
+ To recover the compressed archive file intact, the text of this
+ document may be passed as input to the following Perl script (the
+ output should be redirected to a file or piped to "tar -xzvf -").
+
+ #!/usr/bin/perl
+ use strict;
+ my $bdata = "";
+ use MIME::Base64;
+ while(<>) {
+ if (/-- BEGIN MESSAGE ARCHIVE --/ .. /-- END MESSAGE ARCHIVE --/) {
+ if ( m/^\s*[^\s]+\s*$/) {
+ $bdata = $bdata . $_;
+ }
+ }
+ }
+ print decode_base64($bdata);
+
+ Alternatively, the base-64 encoded block can be edited by hand to
+ remove document structure lines and fed as input to any base-64
+ decoding utility.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 15]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+A.1. Encoded Reference Messages
+
+ -- BEGIN MESSAGE ARCHIVE --
+ H4sICPujD0cAA21zZy50YXIA7Vpbc6M2GPUzv0Ldl74UWzckIHUnbXY39XS760ncz
+ HQ6mY5sFBuvDRSwN+mvrwAb303c2GQ34byAjYSEpHO+i1Rv1E4OCCnkEKorRJyl1+
+ R2dk1RQ6oE4RhxRNT/CCHGa8bpu1arTaJYhKrJ6ef+3nJ+PJDhnufzD8ku+LidPB3
+ qDTeYUn0sgkA6urpnx28DIggZpbvmHyFOF/NPWTL/FFFcg8fvyiZe+fy3Pt60Ou9A
+ 5Ab2JJLhubwX42Ak6z1/DK5b7QauQ63j21sLaO9Df7z8SERxfen5WSz6TRPdY+3GF
+ fb8dY0/3rbBX7Z9p2AjS/1Tx3UEb9W9iclZNxReb9D81xpc0u5v3QGyimvj27VqIi
+ K60hDtQoxGeuutqn19aRmGZUHDwMSyOOT8fDASk7+pWpvahe/Fohfb4E2nDhwZfQb
+ BwPfkG/Bj8m2xdM43W/xJu7iW/9iAIQyyQdR+F/f6ez/8IkInsgHP3iu9WO88BNIG
+ imIjtydi1/cakRPkTz9Irx8PbIAJ07RpE2p+U0SRq9alFwOLI06UKiLCTW6Z0EQAq
+ vZAq83Aep+0qJl8MBhLEPm+9wNQ8yAi+Z3Wa+6qETcJISY1ETItQAhPGIoh0sZNMX
+ FcHzC1lsFVp934+aYNsCaaYRworbAxuOSY6QQ3TFVCFZ+6jkyKY5oXV5ReVFA/wK+
+ YqWmxLLNhJRzRnnvtV5jpP9O7wjldGwX6DyklSv8Z5AZEmPNE/7FBWKX/JeDq3WXr
+ uvPuKlVxrEbedrqmreh6uPo/TvgXbVg2eqJubxXcTMiTN8hwpuC99Mf5Utso12/LV
+ GsSzIdhQ5Sh9rJlasb/vu+fTgCK+W8s+I9pyn9OKv+vDKzwf5kg8LZSgFegADP+u5
+ 6uXNITtVEU/0GO5/zHkKX2X7m8vOJ/CViP/x4jAatlnqwCGB4tfCvgvGppTnrziHE
+ bMw+L25Y7pGK2D+5Ugix+upPSAXd+CGLfEQ/fRyqUk7Hr9RcR3ErdKnqr8ETUG+PJ
+ KNbdIDEBAymcvSL3/1Dk/6l1l+s/wjDN/xECK/0vAb/8uST+A38pgefJOJf/IifOZ
+ tCAO0R8o26e81urMBwMhclNNBhOhDtkBqJ0tXLnYq1hbBjrpoMaaDg8C2VPKlV1mn
+ mmKzETc2syMyB7nMjMRFjI5EAN0HYHWI1Pat8S91HXLfooO/jVOZcr/D+RC1jEf85
+ Zzn+MMv9PWc6K/yXgK/D/nh4FPtoBtNKwbzffc5fwMA8QmWjuAXb9LsAm5JRyAtWd
+ pRY3QZnnR8GKwCYRdNRUThwEMHfZMCZk4YTBueNHF6q5213b4iSiIh+u3gj8MNbFu
+ Ov2J/4kOsUaK8z/GLn9R4Rl9l+NYMX/ErA7/2MbkH8bSaCDcj47yP9ak0Az/k+8Ey
+ rAIfynGKX8p8So+F8C9uR/UwGo+P/S+T91hT6Pl/RAhGKse77uyJE7PlIbhfxni/1
+ fg6X7Pwzzav+nDHxqd1qfPl4/3/ZPHqqvBfabkrAuB0fdDrKWN4QwArNxefFCsJX/
+ X9x4cEQFKOQ/Xth/I4v/GcMV/8vAPP93IPdTgncdzh7EkWWgKMH35A3ilOJEUTzJ7
+ L10ehdifv5r0tdF17vTid7zR7531CigmP/Z+W/MGUvPfSUygKvzX2Vg2f6vJ/cWp3
+ OLE4FLZYsFAW5ThJHoovrGEeIC8u8NC7LzuaaVG/OdG70L+j/3fJSNGf97fqgUOM4
+ 0AB9ZAwr5j1jOf+UFpPZfSUDF/xKwj/8H0L9if4UKFSp8Y/gPJmWg1AA6AAA=
+ -- END MESSAGE ARCHIVE --
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 16]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+Authors' Addresses
+
+ Vijay K. Gurbani
+ Bell Laboratories, Alcatel-Lucent
+ 2701 Lucent Lane
+ Rm 9F-546
+ Lisle, IL 60532
+ USA
+
+ Phone: +1 630 224 0216
+ EMail: vkg@alcatel-lucent.com
+
+
+ Chris Boulton
+ Ubiquity Software Corporation
+ Building 3
+ West Fawr Lane
+ St Mellons
+ Cardiff, South Wales CF3 5EA
+
+ EMail: cboulton@ubiquitysoftware.com
+
+
+ Robert J. Sparks
+ Estacado Systems
+
+ EMail: RjS@estacado.net
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 17]
+
+RFC 5118 SIP IPv6 Torture Tests February 2008
+
+
+Full Copyright Statement
+
+ Copyright (C) The IETF Trust (2008).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
+ THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
+ OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
+ THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+
+
+
+
+
+
+
+
+
+
+
+Gurbani, et al. Informational [Page 18]
+