1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
|
Network Working Group R. Sparks
Request for Comments: 4321 Estacado Systems
Category: Informational January 2006
Problems Identified Associated with the
Session Initiation Protocol's (SIP) Non-INVITE Transaction
Status of This Memo
This memo provides information for the Internet community. It does
not specify an Internet standard of any kind. Distribution of this
memo is unlimited.
Copyright Notice
Copyright (C) The Internet Society (2006).
Abstract
This document describes several problems that have been identified
with the Session Initiation Protocol's (SIP) non-INVITE transaction.
Table of Contents
1. Problems under the Current Specifications .......................2
1.1. NITs must complete immediately or risk losing a race .......2
1.2. Provisional responses can delay recovery from lost
final responses ............................................3
1.3. Delayed responses will temporarily blacklist an element ....4
1.4. 408 for non-INVITE is not useful ...........................6
1.5. Non-INVITE timeouts doom forking proxies ...................7
1.6. Mismatched timer values make winning the race harder .......7
2. Security Considerations .........................................8
3. Acknowledgements ................................................8
4. Informative References ..........................................9
Sparks Informational [Page 1]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
1. Problems under the Current Specifications
There are a number of unpleasant edge conditions created by the SIP
non-INVITE transaction (NIT) model's fixed duration. The negative
aspects of some of these are exacerbated by the effect that
provisional responses have on the non-INVITE transaction state
machines as currently defined.
1.1. NITs must complete immediately or risk losing a race
The non-INVITE transaction defined in RFC 3261 [1] is designed to
have a fixed and finite duration (dependent on T1). A consequence of
this design is that participants must strive to complete the
transaction as quickly as possible. Consider the race condition
shown in Figure 1.
UAC UAS
| request |
--- |---. |
^ | `---. |
| | `-->| ---
| | | ^
| | | |
64*T1 | | |
| | | |
| | | 64*T1
| | | |
| | | |
v | | |
timeout <=== --- | 200 OK | |
| .---| v
| .---' | ---
|<--' |
Figure 1: Non-Invite Race Condition
The User Agent Server (UAS) in this figure believes it has responded
to the request in time, and that the request succeeded. The User
Agent Client (UAC), on the other hand, believes the request has
timed-out, hence failed. No longer having a matching client
transaction, the UAC core will ignore what it believes to be a
spurious response. As far as the UAC is concerned, it received no
response at all to its request. The ultimate result is that the UAS
and UAC have conflicting views of the outcome of the transaction.
Sparks Informational [Page 2]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
Therefore, a UAS cannot wait until the last possible moment to send a
final response within a NIT. It must, instead, send its response so
that it will arrive at the UAC before that UAC times out.
Unfortunately, the UAS has no way to accurately measure the
propagation time of the request or predict the propagation time of
the response. The uncertainty it faces is compounded by each proxy
that participates in the transaction. Thus, the UAS's only choice is
to send its final response as soon as it possibly can and hope for
the best.
This result constrains the set of problems that can be solved with a
single NIT. Any delay introduced during processing of a request
increases the probability of losing the race. If the timing
characteristics of that processing are not predictable and
controllable, a single NIT is an inappropriate model for handling the
request. One viable alternative is to accept the request with a 202
and send the ultimate results in a new request in the reciprocal
direction.
In specialized networks, a UAS might have some reliable knowledge of
inter-hop latency and could use that knowledge to determine if it has
time to delay its final response in order to perform some processing
such as a database lookup while mitigating its risk of losing the
race in Figure 1. Establishing this knowledge across arbitrary
networks (perhaps using resource reservation techniques and
deterministic transports) is not currently feasible.
1.2. Provisional responses can delay recovery from lost final responses
The non-INVITE client transaction state machine provides reliability
for NITs over unreliable transports (UDP) through retransmission of
the request message. Timer E is set to T1 when a request is
initially transmitted. As long as the machine remains in the Trying
state, each time Timer E fires, it will be reset to twice its
previous value (capping at T2) and the request is retransmitted.
If the non-INVITE client transaction state machine sees a provisional
response, it transitions to the Proceeding state, where
retransmission continues, but the algorithm for resetting Timer E is
simply to use T2 instead of doubling at each firing. (Note that
Timer E is not altered during the transition to Proceeding.)
Making the transition to the Proceeding state before Timer E is reset
to T2 can cause recovery from a lost final response to take extra
time. Figure 2 shows recovery from a lost final response with and
without a provisional message during this window. Recovery occurs
within 2*T1 in the case without the provisional. With the
provisional, recovery is delayed until T2, which by default is 8*T1.
Sparks Informational [Page 3]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
In practical terms, a provisional response to a NIT in currently
deployed networks can delay transaction completion by up to 3.5
seconds.
UAC UAS UAC UAS
| | | |
--- |----. | --- |----. |
^ | `-->| ^ | `--->|
E = T1 | | E = T1 | .-----|(provisional)
v | | v |<--' |
--- |----. | --- |----. |
^ | `-->| ^ | `--->|
| | X<----|(lost final) | | X<-----|(lost final)
| | | | | |
E = 2*T1 | | | | |
| | | | | |
| | | | | |
v | | | | |
--- |----. | | | |
| `-->| | | |
| .-----|(final) | | |
|<-' | | | |
| | | | |
\/\ /\/ /\/ /\/ /\/
E = T2
\/\ /\/ /\/ /\/ /\/
| | | | |
| | v | |
| | --- |----. |
| | | `--->|
| | | .-----|(final)
| | |<--' |
| | | |
Figure 2: Provisionals Can Harm Recovery
No additional delay is introduced if the first provisional response
is received after Timer E has reached its maximum reset interval of
T2.
1.3. Delayed responses will temporarily blacklist an element
A SIP element's use of DNS Service Record Resource Records [3] is
specified in RFC 3263 [2]. That specification discusses how SIP
ensures high availability by having upstream elements detect failure
of downstream elements. It proceeds to define several types of
failure detection and instructions for failover. Two of the
behaviors it describes are important to this document:
Sparks Informational [Page 4]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
o Within a transaction, transport failure is detected either through
an explicit report from the transport layer or through timeout.
Note specifically that timeout will indicates transport failure
regardless of the transport in use. When transport failure is
detected, the request is retried at the next element from the
sorted results of the SRV query.
o Between transactions, locations reporting temporary failure
(through 503/Retry-After, for example) are not used until their
requested black-out period expires.
The specification notes the benefit of caching locations that are
successfully contacted, but does not discuss how such a cache is
maintained. It is unclear whether an element should stop using
(temporarily blacklist) a location returned in the SRV query that
results in a transport error. If it does, when should such a
location be removed from the blacklist?
Without such a blacklist (or equivalent mechanism), the intended
availability mechanism fails miserably. Consider traffic between two
domains. Proxy pA in domain A needs to forward a sequence of non-
INVITE requests to domain B. Through DNS SRV, pA discovers pB1 and
pB2, and the ordering rules of [2] and [3] indicate it should use pB1
first. The first request to pB1 times out. Since pA is a proxy and
a NIT has a fixed duration, pA has no opportunity to retry the
request at pB2. If pA does not remember pB1's failure, the second
request (and all subsequent non-INVITE requests until pB1 recovers)
are doomed to the same failure. Caching would allow the subsequent
requests to be tried at pB2.
Since miserable failure is not acceptable in deployed networks, we
should anticipate that elements will, in fact, cache timeout failures
between transactions. Then the race in Figure 1 becomes important.
If an element fails to respond "soon enough", it has effectively not
responded at all and will be blacklisted at its peer for some period
of time.
(Note that even with caching, the first request timeout results in a
timeout failure all the way back to the original submitter. The
failover mechanisms in [2] work well to increase the resiliency of a
given INVITE transaction, but do nothing for a given non-INVITE
transaction.)
Sparks Informational [Page 5]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
1.4. 408 for non-INVITE is not useful
Consider the race condition in Figure 1 when the final response is
408 instead of 200. Under the current specification, the race is
guaranteed to be lost. Most existing endpoints will emit a 408 for a
non-INVITE request 64*T1 after receiving the request if they have not
emitted an earlier final response. Such a 408 is guaranteed to
arrive at the next upstream element too late to be useful. In fact,
in the presence of proxies, these messages are even harmful. When
the 408 arrives, each proxy will have already terminated its
associated client transaction due to timeout. Therefore, each proxy
must forward the 408 upstream statelessly. This, in turn, is
guaranteed to arrive too late. As Figure 3 shows, this can
ultimately result in bombarding the original requester with spurious
408s. (Note that the proxy's client transaction state machine never
enters the Completed state, so Timer K does not enter into play.)
UAC P1 P2 P3 UAS
| | | | |
--- ===---. | | | |
^ | `-->===---. | | |
| | | `-->===---. | |
| | | | `-->===---. |
64*T1 | | | | `-->===
| | | | | |
| | | | | |
v | | | | |
(timeout) --- === | | | |
| .-408=== | | |
|<--' | .-408=== | |
| .-408-|<--' | .-408=== |
|<--' | .-408-|<--' | .-408===
| .-408-|<--' | .-408-|<--' |
|<--' | .-408-|<--' | |
| .-408-|<--' | | |
|<--' | | | |
| | | | |
Figure 3: Late 408s to Non-INVITEs
This response bombardment is not limited to the 408 response, though
it only exists when participating client transaction state machines
are timing out. Figure 4 generalizes Figure 1 to include multiple
hops. Note that even though the UAS responds "in time" to P3, the
response is too late for P2, P1, and the UAC.
Sparks Informational [Page 6]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
UAC P1 P2 P3 UAS
| | | | |
--- ===---. | | | |
^ | `-->===---. | | |
| | | `-->===---. | |
| | | | `-->===---. |
64*T1 | | | | `-->===
| | | | | |
| | | | | |
v | | | | |
(timeout) --- === | | | |
| .-408=== | | .-200-|
|<--' | .-408=== .-200-|<--' |
| .-408-|<--'.-200-|<--' === |
|<--'.-200-|<--' | | ===
|<--' | | | |
| | | | |
Figure 4: Additional Timeout-Related Error
1.5. Non-INVITE timeouts doom forking proxies
A single branch with a delayed or missing final response will
dominate the processing at proxy that receives no 2xx responses to a
forked non-INVITE request. This proxy is required to allow all of
its client transactions to terminate before choosing a "best
response". This forces the proxy's server transaction to lose the
race in Figure 1. Any response it ultimately forwards (a 401, for
example) will arrive at the upstream elements too late to be used.
Thus, if no element among the branches would return a 2xx response,
failure of a single element (or its transport) dooms the proxy to
failure.
1.6. Mismatched timer values make winning the race harder
There are many failure scenarios due to misconfiguration or
misbehavior that the SIP specification does not discuss. One is
placing two elements with different configured values for T1 and T2
on the same network. Review of Figure 1 illustrates that the race
failure is only made more likely in this misconfigured state (it may
appear that shortening T1 at the element behaving as a UAS improves
this particular situation, but remember that these elements may trade
roles on the next request). Since the protocol provides no mechanism
for discovering/negotiating a peer's timer values, exceptional care
must be taken when deploying systems with non-defaults to ensure that
they will never directly communicate with elements with default
values.
Sparks Informational [Page 7]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
2. Security Considerations
This document describes some problems in the core SIP specification
[1] related to the SIP non-INVITE requests, the messages other than
INVITE that begin transactions. A few of the problems lead to
flooding or forgery risk, and could possibly be exploited by an
adversary in a denial of service attack. Solutions are defined in
the companion document [4].
One solution there prohibits proxies and User Agents from sending 408
responses to non-INVITE transactions. Without this change, proxies
automatically generate a storm of useless responses. An attacker
could capitalize on this by enticing User Agents to send non-INVITE
requests to a black hole (through social engineering or DNS
poisoning) or by selectively dropping responses.
Another solution prohibits proxies from forwarding late responses.
Without this change, an attacker could easily forge messages which
appear to be late responses. All proxies compliant with RFC 3261 are
required to forward these responses, wasting bandwidth and CPU and
potentially overwhelming target User Agents (especially those with
low speed connections).
3. Acknowledgements
This document captures many conversations about non-INVITE issues.
Significant contributers include Ben Campbell, Gonzalo Camarillo,
Steve Donovan, Rohan Mahy, Dan Petrie, Adam Roach, Jonathan
Rosenberg, and Dean Willis.
Sparks Informational [Page 8]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
4. Informative References
[1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
Session Initiation Protocol", RFC 3261, June 2002.
[2] Rosenberg, J. and H. Schulzrinne, "Session Initiation Protocol
(SIP): Locating SIP Servers", RFC 3263, June 2002.
[3] Gulbrandsen, A., Vixie, P., and L. Esibov, "A DNS RR for
specifying the location of services (DNS SRV)", RFC 2782,
February 2000.
[4] Sparks, R., "Actions Addressing Identified Issues with the
Session Initiation Protocol's (SIP) Non-INVITE Transaction", RFC
4320, January 2006.
Author's Address
Robert J. Sparks
Estacado Systems
17210 Campbell Road
Suite 250
Dallas, TX 75252-4203
EMail: rjsparks@estacado.net
Sparks Informational [Page 9]
^L
RFC 4321 SIP Non-INVITE Problems January 2006
Full Copyright Statement
Copyright (C) The Internet Society (2006).
This document is subject to the rights, licenses and restrictions
contained in BCP 78, and except as set forth therein, the authors
retain all their rights.
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Intellectual Property
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Acknowledgement
Funding for the RFC Editor function is provided by the IETF
Administrative Support Activity (IASA).
Sparks Informational [Page 10]
^L
|