summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5503.txt
blob: 5b87c8392c32ad245f08443a0155da4eac04133c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
1001
1002
1003
1004
1005
1006
1007
1008
1009
1010
1011
1012
1013
1014
1015
1016
1017
1018
1019
1020
1021
1022
1023
1024
1025
1026
1027
1028
1029
1030
1031
1032
1033
1034
1035
1036
1037
1038
1039
1040
1041
1042
1043
1044
1045
1046
1047
1048
1049
1050
1051
1052
1053
1054
1055
1056
1057
1058
1059
1060
1061
1062
1063
1064
1065
1066
1067
1068
1069
1070
1071
1072
1073
1074
1075
1076
1077
1078
1079
1080
1081
1082
1083
1084
1085
1086
1087
1088
1089
1090
1091
1092
1093
1094
1095
1096
1097
1098
1099
1100
1101
1102
1103
1104
1105
1106
1107
1108
1109
1110
1111
1112
1113
1114
1115
1116
1117
1118
1119
1120
1121
1122
1123
1124
1125
1126
1127
1128
1129
1130
1131
1132
1133
1134
1135
1136
1137
1138
1139
1140
1141
1142
1143
1144
1145
1146
1147
1148
1149
1150
1151
1152
1153
1154
1155
1156
1157
1158
1159
1160
1161
1162
1163
1164
1165
1166
1167
1168
1169
1170
1171
1172
1173
1174
1175
1176
1177
1178
1179
1180
1181
1182
1183
1184
1185
1186
1187
1188
1189
1190
1191
1192
1193
1194
1195
1196
1197
1198
1199
1200
1201
1202
1203
1204
1205
1206
1207
1208
1209
1210
1211
1212
1213
1214
1215
1216
1217
1218
1219
1220
1221
1222
1223
1224
1225
1226
1227
1228
1229
1230
1231
1232
1233
1234
1235
1236
1237
1238
1239
1240
1241
1242
1243
1244
1245
1246
1247
1248
1249
1250
1251
1252
1253
1254
1255
1256
1257
1258
1259
1260
1261
1262
1263
1264
1265
1266
1267
1268
1269
1270
1271
1272
1273
1274
1275
1276
1277
1278
1279
1280
1281
1282
1283
1284
1285
1286
1287
1288
1289
1290
1291
1292
1293
1294
1295
1296
1297
1298
1299
1300
1301
1302
1303
1304
1305
1306
1307
1308
1309
1310
1311
1312
1313
1314
1315
1316
1317
1318
1319
1320
1321
1322
1323
1324
1325
1326
1327
1328
1329
1330
1331
1332
1333
1334
1335
1336
1337
1338
1339
1340
1341
1342
1343
1344
1345
1346
1347
1348
1349
1350
1351
1352
1353
1354
1355
1356
1357
1358
1359
1360
1361
1362
1363
1364
1365
1366
1367
1368
1369
1370
1371
1372
1373
1374
1375
1376
1377
1378
1379
1380
1381
1382
1383
1384
1385
1386
1387
1388
1389
1390
1391
1392
1393
1394
1395
1396
1397
1398
1399
1400
1401
1402
1403
1404
1405
1406
1407
1408
1409
1410
1411
1412
1413
1414
1415
1416
1417
1418
1419
1420
1421
1422
1423
1424
1425
1426
1427
1428
1429
1430
1431
1432
1433
1434
1435
1436
1437
1438
1439
1440
1441
1442
1443
1444
1445
1446
1447
1448
1449
1450
1451
1452
1453
1454
1455
1456
1457
1458
1459
1460
1461
1462
1463
1464
1465
1466
1467
1468
1469
1470
1471
1472
1473
1474
1475
1476
1477
1478
1479
1480
1481
1482
1483
1484
1485
1486
1487
1488
1489
1490
1491
1492
1493
1494
1495
1496
1497
1498
1499
1500
1501
1502
1503
1504
1505
1506
1507
1508
1509
1510
1511
1512
1513
1514
1515
1516
1517
1518
1519
1520
1521
1522
1523
1524
1525
1526
1527
1528
1529
1530
1531
1532
1533
1534
1535
1536
1537
1538
1539
1540
1541
1542
1543
1544
1545
1546
1547
1548
1549
1550
1551
1552
1553
1554
1555
1556
1557
1558
1559
1560
1561
1562
1563
1564
1565
1566
1567
1568
1569
1570
1571
1572
1573
1574
1575
1576
1577
1578
1579
1580
1581
1582
1583
1584
1585
1586
1587
1588
1589
1590
1591
1592
1593
1594
1595
1596
1597
1598
1599
1600
1601
1602
1603
1604
1605
1606
1607
1608
1609
1610
1611
1612
1613
1614
1615
1616
1617
1618
1619
1620
1621
1622
1623
1624
1625
1626
1627
1628
1629
1630
1631
1632
1633
1634
1635
1636
1637
1638
1639
1640
1641
1642
1643
1644
1645
1646
1647
1648
1649
1650
1651
1652
1653
1654
1655
1656
1657
1658
1659
1660
1661
1662
1663
1664
1665
1666
1667
1668
1669
1670
1671
1672
1673
1674
1675
1676
1677
1678
1679
1680
1681
1682
1683
1684
1685
1686
1687
1688
1689
1690
1691
1692
1693
1694
1695
1696
1697
1698
1699
1700
1701
1702
1703
1704
1705
1706
1707
1708
1709
1710
1711
1712
1713
1714
1715
1716
1717
1718
1719
1720
1721
1722
1723
1724
1725
1726
1727
1728
1729
1730
1731
1732
1733
1734
1735
1736
1737
1738
1739
1740
1741
1742
1743
1744
1745
1746
1747
1748
1749
1750
1751
1752
1753
1754
1755
1756
1757
1758
1759
1760
1761
1762
1763
1764
1765
1766
1767
1768
1769
1770
1771
1772
1773
1774
1775
1776
1777
1778
1779
1780
1781
1782
1783
1784
1785
1786
1787
1788
1789
1790
1791
1792
1793
1794
1795
1796
1797
1798
1799
1800
1801
1802
1803
1804
1805
1806
1807
1808
1809
1810
1811
1812
1813
1814
1815
1816
1817
1818
1819
1820
1821
1822
1823
1824
1825
1826
1827
1828
1829
1830
1831
1832
1833
1834
1835
1836
1837
1838
1839
1840
1841
1842
1843
1844
1845
1846
1847
1848
1849
1850
1851
1852
1853
1854
1855
1856
1857
1858
1859
1860
1861
1862
1863
1864
1865
1866
1867
1868
1869
1870
1871
1872
1873
1874
1875
1876
1877
1878
1879
1880
1881
1882
1883
1884
1885
1886
1887
1888
1889
1890
1891
1892
1893
1894
1895
1896
1897
1898
1899
1900
1901
1902
1903
1904
1905
1906
1907
Network Working Group                                       F. Andreasen
Request for Comments: 5503                                         Cisco
Obsoletes: 3603                                              B. McKibben
Category: Informational                                        CableLabs
                                                             B. Marshall
                                                                    AT&T
                                                              March 2009


Private Session Initiation Protocol (SIP) Proxy-to-Proxy Extensions for
   Supporting the PacketCable Distributed Call Signaling Architecture

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Copyright Notice

   Copyright (c) 2009 IETF Trust and the persons identified as the
   document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal
   Provisions Relating to IETF Documents in effect on the date of
   publication of this document (http://trustee.ietf.org/license-info).
   Please review these documents carefully, as they describe your rights
   and restrictions with respect to this document.

   This document may contain material from IETF Documents or IETF
   Contributions published or made publicly available before November
   10, 2008.  The person(s) controlling the copyright in some of this
   material may not have granted the IETF Trust the right to allow
   modifications of such material outside the IETF Standards Process.
   Without obtaining an adequate license from the person(s) controlling
   the copyright in such materials, this document may not be modified
   outside the IETF Standards Process, and derivative works of it may
   not be created outside the IETF Standards Process, except to format
   it for publication as an RFC or to translate it into languages other
   than English.











Andreasen, et al.            Informational                      [Page 1]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


Abstract

   In order to deploy a residential telephone service at a very large
   scale across different domains, it is necessary for trusted elements
   owned by different service providers to exchange trusted information
   that conveys customer-specific information and expectations about the
   parties involved in the call.  This document describes private
   extensions to the Session Initiation Protocol, RFC 3261, for
   supporting the exchange of customer information and billing
   information between trusted entities in the PacketCable Distributed
   Call Signaling Architecture.  These extensions provide mechanisms for
   access network coordination to prevent theft of service, customer
   originated trace of harassing calls, support for operator services
   and emergency services, and support for various other regulatory
   issues.  The use of the extensions is only applicable within closed
   administrative domains, or among federations of administrative
   domains with previously agreed-upon policies where coordination of
   charging and other functions is required.

































Andreasen, et al.            Informational                      [Page 2]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


Table of Contents

   1. Applicability Statement .........................................4
   2. Introduction ....................................................4
   3. Trust Boundary ..................................................6
   4. Conventions Used in This Document ...............................7
   5. P-DCS-TRACE-PARTY-ID ............................................7
      5.1. Syntax .....................................................8
      5.2. Procedures at an Untrusted User Agent Client (UAC) .........9
      5.3. Procedures at a Trusted User Agent Client (UAC) ............9
      5.4. Procedures at an Untrusted User Agent Server (UAS) .........9
      5.5. Procedures at a Trusted User Agent Server (UAS) ............9
      5.6. Procedures at Proxy .......................................10
           5.6.1. Procedures at Originating Proxy ....................10
           5.6.2. Procedures at Terminating Proxy ....................11
   6. P-DCS-OSPS .....................................................11
      6.1. Syntax ....................................................11
      6.2. Procedures at an Untrusted User Agent Client (UAC) ........12
      6.3. Procedures at a Trusted User Agent Client (UAC) ...........12
      6.4. Procedures at an Untrusted User Agent Server (UAS) ........13
      6.5. Procedures at a Trusted User Agent Server (UAS) ...........13
      6.6. Procedures at Proxy .......................................14
   7. P-DCS-BILLING-INFO .............................................14
      7.1. Syntax ....................................................16
      7.2. Procedures at an Untrusted User Agent Client (UAC) ........18
      7.3. Procedures at a Trusted User Agent Client (UAC) ...........18
      7.4. Procedures at an Untrusted User Agent Server (UAS) ........18
      7.5. Procedures at a Trusted User Agent Server (UAS) ...........18
      7.6. Procedures at Proxy .......................................19
           7.6.1. Procedures at Originating Proxy ....................19
           7.6.2. Procedures at Terminating Proxy ....................20
           7.6.3. Procedures at Tandem Proxy .........................21
   8. P-DCS-LAES and P-DCS-Redirect ..................................21
      8.1. Syntax ....................................................23
      8.2. Procedures at an Untrusted User Agent Client (UAC) ........24
      8.3. Procedures at a Trusted User Agent Client (UAC) ...........24
      8.4. Procedures at an Untrusted User Agent Server (UAS) ........25
      8.5. Procedures at a Trusted User Agent Server (UAS) ...........25
      8.6. Procedures at Proxy .......................................26
           8.6.1. Procedures at Originating Proxy ....................26
           8.6.2. Procedures at Terminating Proxy ....................28
   9. Security Considerations ........................................29
   10. IANA Considerations ...........................................29
   11. Changes since RFC 3603 ........................................31
   12. Acknowledgments ...............................................32
   13. References ....................................................32
      13.1. Normative References .....................................32
      13.2. Informative References ...................................33



Andreasen, et al.            Informational                      [Page 3]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


1.  Applicability Statement

   The Session Initiation Protocol (SIP) [RFC3261] extensions described
   in this document make certain assumptions regarding network topology,
   linkage between SIP and lower layers, and the availability of
   transitive trust.  These assumptions are generally not applicable in
   the Internet as a whole.  The use of these headers is only applicable
   within closed administrative domains, or among federations of
   administrative domains with previously agreed-upon policies where
   coordination of charging and other functions is required, as in, for
   example, the architecture presented in [DCSARCH].  Use outside such a
   domain could result in the leakage of potentially sensitive or
   private information.  User consent to the privacy implications of the
   policies in [DCSARCH] is strongly encouraged in those domains as
   well.

   Although [RFC2119] language is used in this document, the scope of
   the normative language is only for the area of applicability of the
   document and, like the technology, it does not apply to the general
   Internet.

2.  Introduction

   In order to deploy a SIP based residential telephone service at very
   large scale across different domains, it is necessary for trusted
   elements owned by different service providers to exchange trusted
   information that conveys billing information and expectations about
   the parties involved in the call.

   There are many billing models used in deriving revenue from telephony
   services today.  Charging for telephony services is tightly coupled
   to the use of network resources.  It is outside the scope of this
   document to discuss the details of these numerous and varying
   methods.

   A key motivating principle of the Distributed Call Signaling (DCS)
   architecture described in [DCSARCH] is the need for network service
   providers to be able to control and monitor network resources;
   revenue may be derived from the usage of these resources as well as
   from the delivery of enhanced services such as telephony.
   Furthermore, the DCS architecture recognizes the need for
   coordination between call signaling and resource management.  This
   coordination ensures that users are authenticated and authorized
   before receiving access to network resources and billable enhanced
   services.






Andreasen, et al.            Informational                      [Page 4]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   DCS Proxies, as defined in [DCSARCH], have access to subscriber
   information and act as policy decision points and trusted
   intermediaries along the call signaling path.  Edge routers provide
   the network connectivity and resource policy enforcement mechanism
   and also capture and report network connectivity and resource usage
   information.  Edge routers need to be given billing information that
   can be logged with Record-Keeping or Billing servers.  The DCS Proxy,
   as a central point of coordination between call signaling and
   resource management, can provide this information based on the
   authenticated identity of the calling and called parties.  Since
   there is a trust relationship among DCS Proxies, they can be relied
   upon to exchange trusted billing information pertaining to the
   parties involved in a call.  See [DCSARCH] for a description of the
   trust boundary and trusted versus untrusted entities.

   For these reasons, it is appropriate to consider defining SIP header
   extensions to allow DCS Proxies to exchange information during call
   setup.  The extensions only appear on trusted network segments, are
   inserted upon entering a trusted network region, and are removed
   before leaving trusted network segments.

   Significant amounts of information are retrieved by an originating
   DCS Proxy in its handling of a connection setup request from a user
   agent.  Such information includes location information about the
   subscriber (essential for emergency services calls), billing
   information, and station information (e.g., coin-operated phone).  In
   addition, while translating the destination number, information such
   as the local-number-portability office code is obtained and will be
   needed by all other proxies handling this call.

   For Usage Accounting records, it is necessary to have an identifier
   that can be associated with all the event records produced for the
   call.  The SIP Call-ID header field cannot be used as such an
   identifier since it is selected by the originating user agent, and it
   may not be unique among all past calls as well as current calls.
   Further, since this identifier is to be used by the service provider,
   it should be chosen in a manner and in a format that meets the
   service provider's needs.

   Billing information may not necessarily be unique for each user
   (consider the case of calls from an office all billed to the same
   account).  Billing information may not necessarily be identical for
   all calls made by a single user (consider prepaid calls, credit card
   calls, collect calls, etc).  It is therefore necessary to carry
   billing information separate from the calling and called party
   identification.  Furthermore, some billing models call for split-
   charging where multiple entities are billed for portions of the call.




Andreasen, et al.            Informational                      [Page 5]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   The addition of a SIP General Header Field allows for the capture of
   billing information and billing identification for the duration of
   the call.

   The billing extensions only appear on trusted network segments and
   MAY be inserted by a DCS Proxy in INVITE and REFER requests and
   INVITE responses in a trusted network segment, and removed before
   leaving trusted network segments.

   In addition to support for billing, current residential telephone
   service includes the need for customer-originated trace (of harassing
   or obscene calls), for operator services such as busy line
   verification and emergency interrupt (initiated by an operator from
   an Operator Services Position System (OSPS)), for emergency services
   such as 9-1-1 calls to a Public Service Access Point (PSAP) and the
   subsequent call handling, and for support of Electronic Surveillance
   and Law Enforcement access as required by applicable legislation and
   court orders.  In all of these cases, additional information about
   the call and about the subscribers involved in the call needs to be
   exchanged between the proxies.

3.  Trust Boundary

   The DCS architecture [DCSARCH] defines a trust boundary around the
   various systems and servers that are owned, operated by, and/or
   controlled by the service provider.  These trusted systems include
   the proxies and various servers such as bridge servers, voicemail
   servers, announcement servers, etc.  Outside of the trust boundary
   lie the customer premises equipment and various application and media
   servers operated by third-party service providers.

   Certain subscriber-specific information, such as billing and
   accounting information, stays within the trust boundary.  Other
   subscriber-specific information, such as endpoint identity, may be
   presented to untrusted endpoints or may be withheld based on
   subscriber profiles.

   The User Agent (UA) may be either within the trust boundary or
   outside the trust boundary, depending on exactly what function is
   being performed and exactly how it is being performed.  Accordingly,
   the procedures followed by a user agent are different depending on
   whether the UA is within the trust boundary or outside the trust
   boundary.








Andreasen, et al.            Informational                      [Page 6]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   The following sections giving procedures for user agents therefore
   are subdivided into trusted user agents and untrusted user agents.
   Since UAs may support client and server functions, the UA sections
   include procedures for the User Agent Client (UAC) and User Agent
   Server (UAS).

4.  Conventions Used in This Document

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in BCP 14, [RFC2119].

   The term "private-URL" used in this document refers to a SIP URI that
   is generated by a proxy, contains a "hostport" that identifies the
   proxy, and contains a "userinfo" string that is generated by the
   proxy.  The userinfo typically contains (or points to) information
   that is not to be disclosed outside the trusted domain of the
   proxies, such as billing account numbers, electronic surveillance
   indication, electronic surveillance parameters, and call redirection
   information.  Consequently, the information is either stored locally
   by the proxy, or encrypted with a private key known only to the proxy
   and encoded in a character string in the userinfo portion of the URL.
   A checksum is included in the userinfo data to detect tampering.  The
   mechanism by which a proxy recognizes a userinfo as a private-URL and
   decodes and recovers the original information is local to the proxy
   and is not subject to standardization.  Some possible implementations
   include an initial magic cookie (e.g., z9hG4Bk followed by the
   pointer/information), or use of a reserved "user" name (e.g.,
   "private") with the optional "password" containing the pointer/
   information.

5.  P-DCS-TRACE-PARTY-ID

   In the telephone network, calling identity information is used to
   support regulatory requirements such as the Customer Originated Trace
   service, which provide the called party with the ability to report
   obscene or harassing phone calls to law enforcement.  This service is
   provided independently of caller-id, and works even if the caller
   requested anonymity.  The calling party is here identified as the
   station originating the call.  In order for this service to be
   dependable, the called party must be able to trust that the calling
   identity information being presented is valid.  One way to achieve
   this is described in [RFC3325].

   To initiate a customer-originated-trace from an untrusted User Agent
   Client (UAC), an additional header is defined for the INVITE request.
   This header is called P-DCS-Trace-Party-ID, and does not appear in
   any other request or response.  The untrusted UAC also includes the



Andreasen, et al.            Informational                      [Page 7]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   Target-Dialog header field, defined in [RFC4538], in the INVITE
   request in order to explicitly identify the call to be traced.  The
   entity addressed by the Request-URI performs the service-provider-
   specific functions of recording and reporting the caller identity in
   the P-DCS-Trace-Party-ID for law enforcement action.  It then
   forwards the call to either an announcement server or to the service
   provider's business office to collect further information about the
   complaint.  A trusted UAC does not use this header, as it initiates
   this action locally.

5.1.  Syntax

   The ABNF description of this header is (some terms used in this ABNF
   are defined in [RFC3261]):

   P-DCS-Trace-Party-ID = "P-DCS-Trace-Party-ID" HCOLON name-addr
                           *1(SEMI timestamp-param) *(SEMI trace-param)
   timestamp-param      = "timestamp=" 1*DIGIT ["." 1*DIGIT]
   trace-param          = generic-param ; defined in RFC 3261

   This document adds the following entry to Table 2 of [RFC3261]:

   Header field         where proxy  ACK  BYE  CAN  INV  OPT  REG  PUB
   ------------         ----- -----  ---  ---  ---  ---  ---  ---  ---
   P-DCS-Trace-Party-ID   R    dmr    -    -    -    o    -    -    -
                                     SUB  NOT  REF  INF  UPD  PRA  MSG
                                     ---  ---  ---  ---  ---  ---  ---
                                      -    -    -    -    -    -    -

   The addr-spec contained in name-addr contains a URL that identifies
   the remote endpoint.  Addr-spec typically contains a tel URL or SIP
   URI giving the identity of the remote endpoint, as provided in the
   signaling messages that established the session to be traced.

   The timestamp-param contains the value of the time the UA determines
   it received the session initiation request of the call requested to
   be traced.  The timestamp-param is populated using the Network Time
   Protocol timestamp format defined in RFC 1305 [RFC1305] and used by
   the Simple Network Time Protocol [RFC4330].  The timestamp SHOULD be
   encoded in UTF-8 Format per [RFC3629].  The trace-param is a generic
   parameter for future extensions.

   An example of the P-DCS-Trace-Party-ID header is shown as follows:

   P-DCS-Trace-Party-ID: <sip:+12345678912@domain.com;user=phone>;
   timestamp=3434688831.2327





Andreasen, et al.            Informational                      [Page 8]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


5.2.  Procedures at an Untrusted User Agent Client (UAC)

   The UAC MUST insert a P-DCS-Trace-Party-ID header into the initial
   INVITE message for a customer-originated-trace request.  The trace
   request from the Untrusted User Agent Client is able to be initiated
   during the dialog or after the release of the dialog or call that is
   requested to be traced.  The UAC MUST use a SIP URI in the Request-
   URI with userinfo set to "call-trace" and hostport identifying the
   call tracing entity for the untrusted UA.  The [RFC3603] version of
   the P-DCS-Trace-Party-ID did not include the timestamp-param
   parameter; however, the syntax is backwards compatible with
   [RFC3603].  A UAC compliant to this updated specification MUST insert
   the timestamp and the Target-Dialog header field defined in [RFC4538]
   if known to the UAC.

   In case of an anonymous malicious call, where the remote party is not
   known to the Untrusted UAC, the Untrusted UAC SHOULD indicate the
   user as anonymous in the P-DCS-Trace-Party-ID, for example, as
   follows: sip:anonymous@anonymous.invalid.

5.3.  Procedures at a Trusted User Agent Client (UAC)

   A trusted UAC performs the customer-originated-trace in a manner
   similar to the trusted User Agent Server (UAS), described below.  A
   trusted UAC MUST NOT include this header in any request.

5.4.  Procedures at an Untrusted User Agent Server (UAS)

   This header MUST NOT appear in any response sent by a UAS.

5.5.  Procedures at a Trusted User Agent Server (UAS)

   If the P-DCS-Trace-Party-ID header is present in the initial INVITE
   request from a UAC, and the Request-URI of the INVITE has userinfo
   set to "call-trace" and hostport set to the UAS, the UAS MUST perform
   the service-provider-specific functions of recording and reporting
   the caller identity and associated trace parameters (if any) from the
   Target-Dialog header field for law enforcement action.  The UAS then
   MUST redirect the call, via a 3xx response, to either an announcement
   server or to the service provider's business office to collect
   further information about the complaint.

   This header MUST NOT appear in any response sent by a UAS.

   If the P-DCS-Trace-Party-ID header is not present in the initial
   INVITE request from a UAC, and the Request-URI of the INVITE has
   userinfo set to "call-trace" the UAS MUST reject the request.




Andreasen, et al.            Informational                      [Page 9]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


5.6.  Procedures at Proxy

   Two sets of proxy procedures are defined: (1) the procedures at an
   originating proxy, and (2) the procedures at a terminating proxy.
   The originating proxy is a proxy that received the INVITE request
   from an untrusted endpoint.

   The terminating proxy is a proxy that sends the INVITE request to an
   untrusted endpoint.

   A proxy that both receives the INVITE request from an untrusted
   endpoint, and sends the INVITE request to an untrusted endpoint,
   performs both sets of procedures.

5.6.1.  Procedures at Originating Proxy

   If the P-DCS-Trace-Party-ID header is present in the initial INVITE
   request from the UAC, and the Request-URI of the INVITE has userinfo
   other than "call-trace" and hostport set to other than a potentially
   provisioned call tracing entity, then the proxy MAY reject the
   request, or it MAY remove the P-DCS-Trace-Party-ID header from the
   request.  If the header is present in a valid request, and contains a
   private-URL that identifies the proxy in the hostport, then the
   originating proxy SHOULD replace the private-URL with its original
   contents (i.e., the verified identity of the caller of the session
   that is being traced and trace parameters from the Target-Dialog
   header fields defined in [RFC4538]).

   The proxy records the caller URL and target dialog IDs on sessions
   directed toward the untrusted UAC if provisioned to do so by the
   network operator.  If the is P-DCS-Trace-Party-ID header is present
   in a valid request, and contains an anonymous caller indication in
   the name-addr parameter, the originating proxy MUST replace the
   anonymous URL with the verified identity of the caller of the session
   that is being traced if available and recorded by the proxy.
   Otherwise, the proxy does not replace the anonymous URL.

   If the origination proxy is provisioned to store URLs and target
   dialog IDs for incoming calls, and if the proxy detects that the URL
   and target dialog ID in a trace request does not match a recorded
   incoming dialog request, then the proxy MUST reject the trace call
   request.

   The origination proxy does not add the P-DCS-Trace-Party-ID header
   from a request that does not already contain the header.






Andreasen, et al.            Informational                     [Page 10]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


5.6.2.  Procedures at Terminating Proxy

   This header MUST NOT appear in any request or response sent by a
   terminating proxy to an untrusted endpoint.

6.  P-DCS-OSPS

   Some calls have special call processing requirements that may not be
   satisfied by normal user agent call processing.  For example, when a
   user is engaged in a call and another call arrives, such a call might
   be rejected with a busy indication.  However, some Public Switched
   Telephone Network (PSTN) operator services require special call
   processing.  In particular, the Busy Line Verification (BLV) and
   Emergency Interrupt (EI) services initiated by an operator from an
   Operator Services Position System (OSPS) on the PSTN network have
   such a need.  Similarly, emergency calls to a 9-1-1 Public Service
   Access Point (PSAP) may result in trunk signaling causing operator
   ringback using a howling tone or sustained ring on the originating
   line (country-specific variations may exist).

   In order to inform the SIP user agent that special treatment should
   be given to a call, we use a new P-DCS-OSPS header, with a field that
   may be set to a value indicating when a special type of call
   processing is requested.  We define three values in this header
   field, namely "BLV" for busy line verification, "EI" for emergency
   interrupt, and "RING" for operator ringback (e.g., howling/sustained
   tone ring in the US).

   If the user agent decides to honor such a request, the response of
   the user agent to an INVITE with either "BLV" or "EI" will not be a
   busy indication.  Since "EI" and "RING" only occur on established
   dialogs, they may also appear in UPDATE requests.

6.1.  Syntax

   The ABNF description of the P-DCS-OSPS header is as follows (some
   terms used in this ABNF are defined in [RFC3261]):

      P-DCS-OSPS      = "P-DCS-OSPS" HCOLON OSPS-Tag
      OSPS-Tag        = "BLV" / "EI" / "RING" / token











Andreasen, et al.            Informational                     [Page 11]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   This document adds the following entry to Table 2 of [RFC3261]:

     Header field         where proxy  ACK  BYE  CAN  INV  OPT  REG  PUB
     ------------         ----- -----  ---  ---  ---  ---  ---  ---  ---
     P-DCS-OSPS             R     dr    -    -    -    o    -    -    -
                                       SUB  NOT  REF  INF  UPD  PRA  MSG
                                       ---  ---  ---  ---  ---  ---  ---
                                        -    -    -    -    o    -    -

   The OSPS-Tag value of "token" is defined for extensibility, and is
   reserved for future use.

6.2.  Procedures at an Untrusted User Agent Client (UAC)

   The P-DCS-OSPS header MUST NOT be sent in a request from an untrusted
   UAC.

6.3.  Procedures at a Trusted User Agent Client (UAC)

   This header is typically only inserted by a Media Gateway Controller
   [DCSARCH] that is controlling a Media Gateway with special trunks to
   a PSTN OSPS system or PSAP.  This trunk group is usually referred to
   as a BLV-trunk group and employs special signaling procedures that
   prevent inadvertent use.  Calls originating at the PSTN OSPS system
   are sent over this trunk group, and result in an INVITE request with
   the P-DCS-OSPS header.

   This header MAY be sent in an INVITE request, and MUST NOT appear in
   any message other than those listed below.

   OSPS-Tag value "BLV" MUST NOT appear in any request other than an
   initial INVITE request establishing a new dialog.

   OSPS-Tag value "EI" MUST NOT appear in any request or response other
   than (1) a subsequent INVITE within a preexisting dialog established
   with the OSPS-Tag value of "BLV", or (2) an UPDATE request within a
   preexisting dialog established with the OSPS-Tag value of "BLV".

   OSPS-Tag value "RING" MUST NOT appear in any request or response
   other than (1) a subsequent INVITE within a preexisting dialog
   established by a UAC to an operator or PSAP, or (2) an UPDATE request
   within a preexisting dialog established by a UAC to an operator or
   PSAP.








Andreasen, et al.            Informational                     [Page 12]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


6.4.  Procedures at an Untrusted User Agent Server (UAS)

   If the UAS receives an INVITE request with an OSPS-Tag of "BLV",
   dialog identification that matches an existing dialog, it MUST reject
   the request with a 403 (Forbidden) response.

   If the UAS receives an INVITE/UPDATE request with an OSPS-Tag value
   of "EI" or "RING", with dialog identification that does not match an
   existing dialog that was established with the OSPS-Tag value of
   "BLV", it MUST reject the request with a 403 (Forbidden) response.

   If the UAS receives an INVITE that contains an OSPS-Tag value of
   "BLV" and is not willing to cooperate in offering this service, it
   MUST reject the request with a 403 (Forbidden) response.

   The UAS SHOULD NOT reject an INVITE with a "BLV" OSPS-Tag due to a
   busy condition.  The UAS MUST NOT respond with a 3xx-Redirect
   response code to an INVITE with a "BLV" OSPS-Tag.  The UAS SHOULD NOT
   alert the user of the incoming call attempt if the "BLV" OSPS-Tag is
   present in the INVITE.

   If an INVITE with OSPS-Tag of "BLV" is accepted (e.g., meeting all
   quality-of-service (QoS) pre-conditions, etc.), the UAS MUST send an
   audio stream on this connection to the address and port given in the
   Session Description Protocol (SDP) of the INVITE.  The UAS MAY
   perform a mixing operation between the two ends of an existing active
   call and send the resulting media stream to the address and port
   indicated.  Alternatively, the UAS MAY send a copy of the local voice
   stream, and (if there is no activity on the local voice stream) send
   a copy of the received voice stream of an existing call.  If the
   state of the UAS is idle, the UAS SHOULD send a stream of silence
   packets to OSPS.  If the state of the UAS is ringing or ringback, the
   UAS SHOULD send a ringback stream to OSPS.

   If an INVITE/UPDATE with OSPS-Tag of "EI" is accepted, the UAS MUST
   enable communication between the UAC and the local user.  The UAS MAY
   put any existing call on hold, or initiate an ad hoc conference.

   If an INVITE/UPDATE with OSPS-Tag of "RING" is accepted, the UAS MUST
   perform operator ringback in accordance with local procedures, e.g.,
   generate a 3-second howling tone or a sustained ring, depending on
   the state of the user equipment.

6.5.  Procedures at a Trusted User Agent Server (UAS)

   The procedures at a trusted UAS MUST be identical to those described
   in 6.4.




Andreasen, et al.            Informational                     [Page 13]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


6.6.  Procedures at Proxy

   In the DCS architecture, the OSPS is considered a trusted UAC.  If a
   proxy receives a P-DCS-OSPS header in a request from an untrusted
   source, it MUST either remove the header or reject the request with a
   403 (Forbidden) response.

   A proxy that implements a call-forwarding service MUST NOT respond to
   an INVITE request with a 3xx response, if the request contained the
   P-DCS-OSPS header.

7.  P-DCS-BILLING-INFO

   There are many billing models used in deriving revenue from telephony
   services today.  Charging for telephony services is tightly coupled
   to the use of network resources.  It is outside the scope of this
   document to discuss the details of these numerous and varying
   methods.

   Proxies have access to subscriber information and act as policy
   decision points and trusted intermediaries along the call signaling
   path.  Edge routers provide the network connection and resource
   policy enforcement mechanism and also capture and report network
   connection and resource usage information.  Edge routers need to be
   given billing information that can be logged with Record-Keeping or
   Billing servers.  The proxy, as a central point of coordination
   between call signaling and resource management, can provide this
   information based on the authenticated identity of the calling and
   called parties.  Since there is a trust relationship among proxies,
   they can be relied upon to exchange trusted billing information
   pertaining to the parties involved in a call.

   For Usage Accounting records, it is necessary to have an identifier
   that can be associated with all the event records produced for the
   call.  The SIP Call-ID header field cannot be used as such an
   identifier since it is selected by the originating user agent, and
   may not be unique among all past calls as well as current calls.
   Further, since this identifier is to be used by the service provider,
   it should be chosen in a manner and in a format that meets the
   service provider's needs.

   Billing information may not necessarily be unique for each user
   (consider the case of calls from an office all billed to the same
   account).  Billing information may not necessarily be identical for
   all calls made by a single user (consider prepaid calls, credit card
   calls, collect calls, etc).  It is therefore necessary to carry





Andreasen, et al.            Informational                     [Page 14]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   billing information separate from the calling and called party
   identification.  Furthermore, some billing models call for
   split-charging where multiple entities are billed for portions of the
   call.

   The addition of a SIP General Header Field allows for the capture of
   billing information and billing identification for the duration of
   the call.

   The billing extensions only appear on trusted network segments, and
   MAY be inserted by a proxy or trusted UA in INVITE and SUBSCRIBE
   requests in a trusted network segment, and removed before leaving
   trusted network segments.  The P-DCS-Billing-Info header extension is
   used only on requests and responses between proxies and trusted UAs.
   It is never sent to an untrusted UA.  It is expected that untrusted
   UAs do not send this header.



































Andreasen, et al.            Informational                     [Page 15]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


7.1.  Syntax

   The DCS-Billing-Info header is defined by the following ABNF (some
   terms used in this ABNF are defined in [RFC3261]):

   P-DCS-Billing-Info      = "P-DCS-Billing-Info" HCOLON
                              Billing-Correlation-ID "/" FEID
                              *(SEMI Billing-Info-param)
   Billing-Correlation-ID  = 1*48(HEXDIG)
   FEID                    = 1*16(HEXDIG) "@" host
   Billing-Info-param      = RKS-Group-ID-param / Charge-param /
                             Calling-param / Called-param /
                             Routing-param / Loc-Routing-param /
                             JIP-param / generic-param
   RKS-Group-ID-param      = "rksgroup" EQUAL RKS-Group-ID
   RKS-Group-ID            = token
   Charge-param            = "charge" EQUAL Acct-Charge-URI
   Acct-Charge-URI         = LDQUOT addr-spec RDQUOT
   Calling-param           = "calling" EQUAL Acct-Calling-URI
   Acct-Calling-URI        = LDQUOT addr-spec RDQUOT
   Called-param            = "called" EQUAL Acct-Called-URI
   Acct-Called-URI         = LDQUOT addr-spec RDQUOT
   Routing-param           = "routing" EQUAL Acct-Routing-URI
   Acct-Routing-URI        = LDQUOT addr-spec RDQUOT
   Loc-Routing-param       = "locroute" EQUAL Acct-Loc-Routing-URI
   Acct-Loc-Routing-URI    = LDQUOT addr-spec RDQUOT
   JIP-param               = "jip" EQUAL jip
   jip                     = LDQUOT 1*phonedigit-hex jip-context RDQUOT
   jip-context             = ";jip-context=" jip-descriptor
   jip-descriptor          = global-hex-digits
   global-hex-digits       = "+" 1*3(phonedigit) *phonedigit-hex
   phonedigit              = DIGIT / [ visual-separator ]
   phonedigit-hex          = HEXDIG / "*" / "#" / [ visual-separator ]
   visual-separator        = "-" / "." / "(" / ")"

   This document adds the following entry to Table 2 of [RFC3261]:

   Header field         where proxy  ACK  BYE  CAN  INV  OPT  REG  PUB
   ------------         ----- -----  ---  ---  ---  ---  ---  ---  ---
   P-DCS-Billing-Info         admr    -    -    -    o    -    -    -

                                     SUB  NOT  REF  INF  UPD  PRA  MSG
                                     ---  ---  ---  ---  ---  ---  ---
                                      -    -    -    -    -    -    -







Andreasen, et al.            Informational                     [Page 16]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   The P-DCS-Billing-Info extension contains an identifier that can be
   used by an event recorder to associate multiple usage records,
   possibly from different sources, with a billable account.  It further
   contains the subscriber account information, and other information
   necessary for accurate billing of the service.  This header is only
   used between proxies and trusted UAs.

   The Billing-Correlation-ID, BCID, is specified in [PCEM] as a 24-byte
   binary structure, containing 4 bytes of NTP timestamp, 8 bytes of the
   unique identifier of the network element that generated the ID, 8
   bytes giving the time zone, and 4 bytes of monotonically increasing
   sequence number at that network element.  This identifier is chosen
   to be globally unique within the system for a window of several
   months.  This MUST be encoded in the P-DCS-Billing-Info header as a
   hexadecimal string of up to 48 characters.  Leading zeroes MAY be
   suppressed.

   The Financial-Entity-ID (FEID) is specified in [PCEM] as an 8-byte
   structure, containing the financial identifier for that domain,
   followed by a domain name.  FEID can be associated with a type of
   service and could be assigned to multiple domains by the same
   provider.  A domain could contain multiple assigned FEIDs.  This
   8-byte structure MUST be encoded in the P-DCS-Billing-Info header as
   a hexadecimal string of up to 16 characters.  Trailing zeroes MAY be
   suppressed.  "Host" contains the domain name.

   The RKS-Group-ID specifies a Record-Keeping server (or group of
   cooperating servers) for event messages relating to this call.  It is
   used to control certain optimizations of procedures when multiple
   event message streams are being sent to the same Record-Keeping
   server.

   Additional parameters contain the information needed for generation
   of event message records.  Acct-Charge-URI, Acct-Calling-URI, Acct-
   Called-URI, Acct-Routing-URI, and Acct-Loc-Routing-URI are each
   defined as URLs; they should all contain tel URLs with E.164
   formatted addresses.  These fields are further defined in [PCEM]
   under the element identifiers "Charge_Number" (element ID 16),
   "Calling_Party_Number" (element ID 4), "Called_Party_Number" (element
   ID 5), "Routing Number" (element ID 25), and
   "Location_Routing_Number" (element ID 22).

   The JIP-param contains the calling jurisdiction information, or
   numbering plan area, of the network in which the call originated.
   The field is further defined in [PCEM] under the element identifier
   "Jurisdiction_Information_Parameter" (element ID 82).  An older
   [RFC3603] compliant implementation may not use the JIP-param.




Andreasen, et al.            Informational                     [Page 17]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


7.2.  Procedures at an Untrusted User Agent Client (UAC)

   This header is never sent to an untrusted UA.  It is expected that
   untrusted UAs do not send this header.

7.3.  Procedures at a Trusted User Agent Client (UAC)

   The UAC MUST generate the Billing-Correlation-ID for the call, and
   insert it into the P-DCS-Billing-Info header in the initial INVITE or
   SUBSCRIBE message sent to the terminating entity, along with the
   charging information for the call.  The UAC MUST include its FEID,
   and the RKS-Group-ID for the Record-Keeping server being used by the
   UAC.  If the UAC performed a Local Number Portability (LNP) query, it
   MUST include the Routing Number and Location Routing Number returned
   by the query.  If available to the UAC, the UAC MUST include the JIP-
   param.

   If the response to the initial INVITE is a 3xx-Redirect, the UAC
   generates a new initial INVITE request to the destination specified
   in the Contact header field, as per standard SIP.  If a UAC receives
   a 3xx-Redirect response to an initial INVITE, the new INVITE
   generated by the UAC MUST contain the P-DCS-Billing-Info header field
   values from the 3xx-Redirect response.  If the UAC is acting as a
   back-to-back user agent (B2BUA), instead of generating a new INVITE
   it MAY generate a private-URL and place it in the Contact header
   field of a 3xx-Redirect response sent to the originating endpoint.
   This private-URL MUST contain (or contain a pointer to) the P-DCS-
   Billing-Info value, which indicates the charging arrangement for the
   new call, and an expiration time very shortly in the future, to limit
   the ability of the originator to re-use this private-URL for multiple
   calls.

   A UAC that includes a Refer-To header in a REFER request MUST include
   a P-DCS-Billing-Info header in the Refer-To's URL.  This P-DCS-
   Billing-Info header MUST include the accounting information of the
   initiator of the REFER.

7.4.  Procedures at an Untrusted User Agent Server (UAS)

   This header is never sent to an untrusted UAS, and is never sent by
   an untrusted UAS.

7.5.  Procedures at a Trusted User Agent Server (UAS)

   The UAS MUST include a P-DCS-Billing-Info header in the first
   reliable 1xx (except 100) or 2xx response to an initial INVITE or
   SUBSCRIBE message.  This P-DCS-Billing-Info header MUST include the
   Billing-Correlation-ID generated by the UAS, the FEID of the UAS, and



Andreasen, et al.            Informational                     [Page 18]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   the RKS-Group-ID of the Record-Keeping server being used by the UAS.
   The UAS MAY change the values of Acct-Charge-URI if it wishes to
   override the billing information that was present in the INVITE
   (e.g., for a toll-free call).  The decision to do this and the
   contents of the new Acct-Charge-URI MUST be determined by service
   provider policy provisioned in the UAS.  If the UAS performed an LNP
   query, it MUST include the Routing Number and Location Routing Number
   returned by the query.

   The UAS MUST add a P-DCS-Billing-Info header to a 3xx-Redirect
   response to an initial INVITE, giving the accounting information for
   the call forwarder, for the call segment from the destination to the
   forwarded-to destination.

7.6.  Procedures at Proxy

   Three sets of proxy procedures are defined: (1) the procedures at an
   originating proxy, (2) the procedures at a terminating proxy, and (3)
   the procedures at a tandem proxy.

   The originating proxy is a proxy that received the INVITE or
   SUBSCRIBE request from an untrusted endpoint.

   The terminating proxy is a proxy that sends the INVITE or SUBSCRIBE
   request to an untrusted endpoint.

   A proxy that is neither an originating proxy nor a terminating proxy
   is a tandem proxy.

   For purposes of mid-call changes, such as call transfers, the proxy
   that receives the request from an untrusted endpoint is considered
   the initiating proxy; the proxy that sends the request to a non-
   trusted endpoint is considered the recipient proxy.  Procedures for
   the initiating proxy are included below with those for originating
   proxies, while procedures for the recipient proxy are included with
   those for terminating proxies.

   A proxy that both receives the request from an untrusted endpoint,
   and sends the request to an untrusted endpoint, performs both sets of
   procedures.

7.6.1.  Procedures at Originating Proxy

   The originating proxy MUST generate the Billing-Correlation-ID for
   the call, and insert it into the P-DCS-Billing-Info header in the
   initial INVITE or SUBSCRIBE message sent to the terminating entity,
   along with the charging information for the call.  The originating
   proxy MUST include its FEID and the RKS-Group-ID for the



Andreasen, et al.            Informational                     [Page 19]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   Record-Keeping server being used by the originating proxy.  If the
   originating proxy performed an LNP query, it MUST include the Routing
   Number, Location Routing Number, and JIP-param returned by the query.
   Any P-DCS-Billing-Info header present from an untrusted UA MUST be
   removed.

   If the Request-URI contains a private-URL, and the decoded username
   contains billing information, the originating proxy MUST generate a
   P-DCS-Billing-Info header with that decrypted information.
   Otherwise, the originating proxy MUST determine the accounting
   information for the call originator and insert a P-DCS-Billing-Info
   header including that information.

   If the response to the initial INVITE is a 3xx-Redirect, received
   prior to a non-100 provisional response, the originating proxy
   generates a new initial INVITE request to the destination specified
   in the Contact header field, as per standard SIP.  If an originating
   proxy receives a 3xx-Redirect response to an initial INVITE prior to
   a non-100 provisional response, the INVITE generated by the proxy
   MUST contain the P-DCS-Billing-Info header from the 3xx-Redirect
   response.

   If the response to the initial INVITE is a 3xx-Redirect, received
   after a non-100 provisional response, the originating proxy generates
   a private-URL and places it in the Contact header of a 3xx-Redirect
   response sent to the originating endpoint.  This private-URL MUST
   contain (or contain a pointer to) the P-DCS-Billing-Info value, which
   indicates the charging arrangement for the new call, and an
   expiration time very shortly in the future, to limit the ability of
   the originator to re-use this private-URL for multiple calls.

   An originating proxy that processes a REFER request from an untrusted
   UA MUST include a P-DCS-Billing-Info header in the Refer-To's URL.
   This P-DCS-Billing-Info header MUST include the accounting
   information of the initiator.

7.6.2.  Procedures at Terminating Proxy

   The terminating proxy MUST NOT send the P-DCS-Billing-Info header to
   an untrusted destination.

   The terminating proxy MUST include a P-DCS-Billing-Info header in the
   first reliable 1xx (except 100) or 2xx response to an initial INVITE
   or SUBSCRIBE message.  This P-DCS-Billing-Info header MUST include
   the Billing-Correlation-ID generated by the terminating proxy, the
   FEID of the terminating proxy, and the RKS-Group-ID of the Record-
   Keeping server being used by the terminating proxy.  The terminating
   proxy MAY change the values of Acct-Charge-URI if it wishes to



Andreasen, et al.            Informational                     [Page 20]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   override the billing information that was present in the INVITE
   (e.g., for a toll-free call).  The decision to do this and the
   contents of the resulting P-DCS-Billing-Info header MUST be
   determined by service provider policy provisioned in the terminating
   proxy.  If the terminating proxy performed an LNP query, it MUST
   include the Routing Number and Location Routing Number returned by
   the query.

   The terminating proxy MUST add P-DCS-Billing-Info headers to a 3xx-
   Redirect response to an initial INVITE, giving the accounting
   information for the call forwarder, for the call segment from the
   destination to the forwarded-to destination.

   A proxy receiving a mid-call REFER request that includes a Refer-To
   header generates a private-URL and places it in the Refer-To header
   sent to the endpoint.  This private-URL MUST contain the P-DCS-
   Billing-Info value, which indicates the charging arrangement for the
   new call, and an expiration time very shortly in the future, to limit
   the ability of the endpoint to re-use this private-URL for multiple
   calls.

7.6.3.  Procedures at Tandem Proxy

   If the tandem proxy performed an LNP query, it MUST insert the
   Routing Number and Location Routing Number returned by the query into
   the P-DCS-Billing-Info header in the first reliable 1xx/2xx/3xx
   (except 100) response.

8.  P-DCS-LAES and P-DCS-Redirect

   NOTE: According to RFC 2804 [RFC2804], the IETF supports
   documentation of lawful intercept technology if it is necessary to
   develop it.  The following section provides such documentation.  The
   [RFC2119] language, as stated above, describes the requirements of
   the specification only if implemented, and strictly within the
   applicability domain described above.  See RFC 2804 for description
   of issues regarding privacy, security, and complexity in relation to
   this technology.

   The P-DCS-LAES extension contains the information needed to support
   Lawfully Authorized Electronic Surveillance.  This header contains
   the address and port of an Electronic Surveillance Delivery Function
   for delivery of a duplicate stream of event messages related to this
   call.  The header fields MAY also contain the associated BCID for the
   event stream as well as additional address and port for delivery of
   call content and associated cccid.  The BCID is used to correlate a
   series of events associated with a single call or session.  The cccid
   is used to identify an intercepted call content to an intercepted



Andreasen, et al.            Informational                     [Page 21]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   call.  The P-DCS-LAES header is only used between proxies and trusted
   UAs.  The P-DCS-LAES header defined here is not backwards compatible
   with that defined in [RFC3603], which is deprecated by the document.
   This version of the P-DCS-LAES header adds a cccid parameter to
   support the intercept of content, and deletes security key
   information.  This version does not mandate the use of the BCID.

   The P-DCS-Redirect extension contains call identifying information
   needed to support the requirements of Lawfully Authorized Electronic
   Surveillance of redirected calls.  This header is only used between
   proxies and trusted UAs.

   Note that there is overlap in function between the P-DCS-Redirect
   header and the History-Info header specified in RFC 4244.  The
   original P-DCS-Redirect came to existence in RFC 3603 before the
   History-Info.  Therefore, the P-DCS-Redirect header is continued here
   for backwards compatibility with existing implementations.

   Use of P-DCS-LAES and P-DCS-Redirect is controlled by a combination
   of legislation, regulation, and court orders, which MUST be followed.
   In certain cases, inclusion of these headers will be mandated, and
   therefore MUST be present in the requests and responses indicated.
   In other cases, inclusion of these headers will be forbidden, and
   therefore MUST NOT be present in the request and responses indicated.
   In the sub-sections that follow, use of "SHOULD" is intended to
   capture these conflicting situations, e.g., a P-DCS-LAES header
   SHOULD be included in an initial INVITE means either that it MUST be
   included or that it MUST NOT be included, based on the applicable
   court orders.






















Andreasen, et al.            Informational                     [Page 22]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


8.1.  Syntax

   The formats of the P-DCS-LAES and P-DCS-Redirect headers are given by
   the following ABNF (some terms used in this ABNF are defined in
   [RFC3261] and [RFC5234]):

      P-DCS-LAES        = "P-DCS-LAES" HCOLON Laes-sig
                           *(SEMI Laes-param)
      Laes-sig          = hostport
      Laes-param        = Laes-content / Laes-cccid
                          Laes-bcid / generic-param
      Laes-content      = "content" EQUAL hostport

      Laes-bcid         = "bcid" EQUAL 1*48(HEXDIG)
      Laes-cccid        = "cccid" EQUAL 1*8(HEXDIG)

      P-DCS-Redirect    = "P-DCS-Redirect" HCOLON Called-ID
                          *(SEMI redir-params)
      Called-ID         = LDQUOT addr-spec RDQUOT
      redir-params      = redir-uri-param / redir-count-param /
                          generic-param
      redir-uri-param   = "redirector-uri" EQUAL Redirector
      Redirector        = LDQUOT addr-spec RDQUOT
      redir-count-param = "count" EQUAL Redir-count
      Redir-count       = 1*DIGIT

   This document adds the following entry to Table 2 of [RFC3261]:

     Header field         where proxy  ACK  BYE  CAN  INV  OPT  REG  PUB
     ------------         ----- -----  ---  ---  ---  ---  ---  ---  ---
     P-DCS-LAES                  adr    -    -    -    o    -    -    -
     P-DCS-Redirect              adr    -    -    -    o    -    -    -

                                       SUB  NOT  REF  INF  UPD  PRA  MSG
                                       ---  ---  ---  ---  ---  ---  ---
                                        -    -    -    -    -    -    -
                                        -    -    -    -    -    -    -

   The values of Laes-sig and Laes-content are addresses of the
   Electronic Surveillance Delivery Function, and used as the
   destination address for call-identifying information and call-
   content, respectively.  Laes-bcid contains a correlation ID that is
   used to link a sequence of intercepted call processing events related
   to a single call.  Laes-cccid contains an identifier of the
   intercepted call content.  The Laes-bcid field MAY be present.  The
   BCID is included per network operator configuration to support events
   reported as defined in [PCEM].  The Laes-cccid field MAY be present
   when the Laes-content field is present.  The Laes-cccid is included



Andreasen, et al.            Informational                     [Page 23]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   per network operator configuration for networks where entities
   receiving the intercepted contents may act a media relay functions to
   other surveillance functions that are the source of the content
   surveillance request.  The design of multiple surveillance entities
   that receive call content is beyond the scope of this document.

   The P-DCS-Redirect header contains redirection information.  The
   Called-ID indicates the original destination requested by the user
   (e.g., number dialed originally), the redir-uri-param indicates the
   entity performing the redirection, and the Redir-count indicates the
   number of redirections that have occurred.  For example, if A calls
   B, who forwards to C, who forwards to D, then, when C forwards to D,
   the Called-ID will be A, redir-uri-param will be C, and count will be
   2.

8.2.  Procedures at an Untrusted User Agent Client (UAC)

   This header MUST NOT be sent to an untrusted UAC, and MUST NOT be
   sent by an untrusted UAC.

8.3.  Procedures at a Trusted User Agent Client (UAC)

   The UAC checks for an outstanding lawfully authorized surveillance
   order for the originating subscriber, and, if present, MAY include
   this information in the Authorization for Quality of Service [PCDQOS]
   or MAY signal this information to the device performing the intercept
   (e.g., a Media Gateway).  Otherwise, intercept access points are
   instructed to perform call content and/or call data intercept by
   mechanisms that are outside the scope of this document.

   If the P-DCS-LAES header is present in the first reliable 1xx (except
   100), 2xx, or 3xx response (indicating surveillance is required on
   the terminating subscriber, but that the terminating equipment is
   unable to perform that function), the UAC MAY include this
   information in the Authorization for Quality of Service, or MAY
   signal this information to the device performing the intercept (e.g.,
   a Media Gateway).  Otherwise, intercept access points are instructed
   to perform call content and/or call data intercept by mechanisms that
   are outside the scope of this document.

   If a 3xx-Redirect response to the initial INVITE request is received,
   and if a P-DCS-LAES header is present in the 3xx response, the UAC
   SHOULD include that header unchanged in the reissued INVITE.  The UAC
   SHOULD also include a P-DCS-Redirect header containing the original
   dialed number, the most recent redirecting party, and the number of
   redirections that have occurred.  Although it is technically possible
   for the originating equipment to perform this surveillance (or add to
   its existing surveillance of the call), the design of the



Andreasen, et al.            Informational                     [Page 24]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   surveillance system has the terminating equipment performing the
   surveillance for all the intermediate forwardings.

   A UAC that includes a Refer-To header in a REFER request, when the
   originating subscriber has an outstanding lawfully authorized
   surveillance order, SHOULD include a P-DCS-LAES header attached to
   the Refer-To.  The UAC MAY also include a P-DCS-Redirect header.  The
   P-DCS-LAES header MAY include the Laes-bcid parameter set to a value
   that uniquely identifies the call, SHOULD include the address and
   port of the local Electronic Surveillance Delivery Function for a
   copy of the call's event messages, SHOULD include the address and
   port of the local Electronic Surveillance Delivery Function for the
   copy of call content if call content is to be intercepted, and MAY
   include the Laes-cccid parameter set to a value that uniquely
   identifies the intercepted audio stream if call content is to be
   intercepted.

   The trusted UAC MUST NOT send the P-DCS-LAES and P-DCS-Redirect
   headers to an untrusted entity.

8.4.  Procedures at an Untrusted User Agent Server (UAS)

   This header MUST NOT be sent to an untrusted UAS, and MUST NOT be
   sent by an untrusted UAS.

8.5.  Procedures at a Trusted User Agent Server (UAS)

   The UAS checks for an outstanding lawfully authorized surveillance
   order for the terminating subscriber, or presence of the P-DCS-LAES
   header in the INVITE request.  If either is present, the UAS MAY
   include this information in the authorization for Quality of Service
   [PCDQOS].  Otherwise, intercept access points are instructed to
   perform call content and/or call data intercept by mechanisms that
   are outside the scope of this document.

   If the terminating equipment is unable to perform the required
   surveillance (e.g., if the destination is a voicemail server), the
   UAS SHOULD include a P-DCS-LAES header in the first reliable 1xx
   (except 100), 2xx, or 3xx response requesting the originating proxy
   to perform the surveillance.  The P-DCS-LAES header MAY include the
   Laes-bcid parameter with a value that uniquely identifies the call,
   SHOULD include the address and port of the local Electronic
   Surveillance Delivery Function for a copy of the call's event
   messages, SHOULD include the address and port of the local Electronic
   Surveillance Delivery Function for the copy of call content if call






Andreasen, et al.            Informational                     [Page 25]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   content is to be intercepted, and MAY include the Laes-cccid
   parameter set to a value that uniquely identifies the intercepted
   audio stream if call content is to be intercepted.

   If the response to the initial INVITE request is a 3xx-Redirect
   response, and there is an outstanding lawfully authorized
   surveillance order for the terminating subscriber, the UAS SHOULD
   include a P-DCS-LAES header in the 3xx-Redirect response, with
   contents as described above.

   The trusted UAS MUST NOT send the P-DCS-LAES and P-DCS-Redirect
   headers to an untrusted entity.

8.6.  Procedures at Proxy

   Two sets of proxy procedures are defined: (1) the procedures at an
   originating proxy, and (2) the procedures at a terminating proxy.
   The originating proxy is a proxy that receives the INVITE request
   from an untrusted endpoint.

   The terminating proxy is a proxy that sends the INVITE request to an
   untrusted endpoint.

   For purposes of mid-call changes, such as call transfers, the proxy
   that receives the request from an untrusted endpoint is considered
   the initiating proxy; the proxy that sends the request to an
   untrusted endpoint is considered the recipient proxy.  Procedures for
   the initiating proxy are included below with those for originating
   proxies, while procedures for the recipient proxy are included with
   those for terminating proxies.

   A proxy that both receives the INVITE request from an untrusted
   endpoint, and sends the INVITE request to an untrusted endpoint, MUST
   NOT generate P-DCS-LAES nor P-DCS-Redirect headers.

   A proxy that is neither an originating proxy nor a terminating proxy
   SHOULD pass the P-DCS-Laes and P-DCS-Redirect headers in requests and
   responses.

8.6.1.  Procedures at Originating Proxy

   The originating proxy MUST remove any P-DCS-LAES and P-DCS-Redirect
   headers in requests or responses to or from an untrusted proxy or
   untrusted UA.

   The originating proxy checks for an outstanding lawfully authorized
   surveillance order for the originating subscriber, and, if present,
   MAY include this information in the Authorization for Quality of



Andreasen, et al.            Informational                     [Page 26]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   Service [PCDQOS] or MAY signal this information to the device
   performing the intercept (e.g., a Media Gateway).  Otherwise,
   intercept access points are instructed to perform call content and/or
   call data intercept by mechanisms that are outside the scope of this
   document.

   If the P-DCS-LAES header is present in the first reliable 1xx (except
   100), 2xx, or 3xx response (indicating surveillance is required on
   the terminating subscriber, but that the terminating equipment is
   unable to perform that function), the originating proxy MAY include
   this information in the Authorization for Quality of Service, or MAY
   signal this information to the device performing the intercept (e.g.,
   a Media Gateway).  Otherwise, intercept access points are instructed
   to perform call content and/or call data intercept by mechanisms that
   are outside the scope of this document.

   If the Request-URI in an initial INVITE request contains a private-
   URL, the originating proxy MUST decrypt the userinfo information to
   find the real destination for the call, and other special processing
   information.  If electronic surveillance information is contained in
   the decrypted userinfo, the originating proxy SHOULD generate a P-
   DCS-LAES and (if necessary) a P-DCS-REDIRECT header with the
   surveillance information.

   If a 3xx-Redirect response to the initial INVITE request is received
   prior to a non-100 provisional response, and if a P-DCS-LAES header
   is present in the 3xx response, the originating proxy SHOULD include
   that header unchanged in the reissued INVITE.  The originating proxy
   SHOULD also include a P-DCS-Redirect header containing the original
   dialed number, the most recent redirecting party, and the number of
   redirections that have occurred.

   If a 3xx-Redirect response to the initial INVITE request is received
   after a non-100 provisional response, the originating proxy generates
   a private-URL and places it in the Contact header of a 3xx-Redirect
   response sent to the originating endpoint.  If a P-DCS-LAES header is
   present in the 3xx response, this private-URL MUST contain (1) the
   electronic surveillance information from the 3xx-Redirect response,
   (2) the original destination number, (3) the identity of the
   redirecting party, and (4) the number of redirections of this call.

   An originating proxy that processes a REFER request [RFC3515] from an
   untrusted UA, when the originating subscriber has an outstanding
   lawfully authorized surveillance order, becomes a B2BUA for that
   request.  It SHOULD reissue the request with a P-DCS-LAES header
   added to the Refer-To's URL.  It MAY also include a P-DCS-Redirect
   header.  The P-DCS-LAES header SHOULD include (1) the address and
   port of the local Electronic Surveillance Delivery Function for a



Andreasen, et al.            Informational                     [Page 27]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   copy of the call's event messages, (2) the address and port of the
   local Electronic Surveillance Delivery Function for the copy of call
   content if call content is to be intercepted.  The P-DCS-LAES header
   MAY include (1) the Laes-bcid parameter set to a value that uniquely
   identifies the call, and (2) the Laes-cccid parameter set to a value
   that uniquely identifies the intercepted audio stream if call content
   is to be intercepted.

   An initiating proxy that sends a mid-call REFER request including a
   Refer-To header, when the initiating subscriber has an outstanding
   lawfully authorized surveillance order, SHOULD include a P-DCS-LAES
   header in the Refer-To's URL.

   The originating proxy MUST NOT send the P-DCS-LAES and P-DCS-Redirect
   headers to an untrusted entity.

8.6.2.  Procedures at Terminating Proxy

   The terminating proxy MUST remove any P-DCS-LAES and P-DCS-Redirect
   headers in requests or responses to or from an untrusted proxy or UA.

   The terminating proxy checks for an outstanding lawfully authorized
   surveillance order for the terminating subscriber.  If present, the
   terminating proxy MAY include this information in the authorization
   for Quality of Service [PCDQOS].  Otherwise, intercept access points
   are instructed to perform call content and/or call data intercept by
   mechanisms that are outside the scope of this document.

   The terminating proxy MUST NOT send the P-DCS-LAES and P-DCS-Redirect
   headers to an untrusted entity, either as headers in the request or
   response, or as headers attached to URIs in the request or response.

   If the terminating equipment is unable to perform the required
   surveillance (e.g., if the destination is a voicemail server), the
   terminating proxy SHOULD include a P-DCS-LAES header in the first
   reliable 1xx/2xx/3xx (except 100) response requesting the originating
   proxy to perform the surveillance.  The P-DCS-LAES header MAY include
   the Laes-bcid parameter set to a value that uniquely identifies the
   call, SHOULD include the address and port of the local Electronic
   Surveillance Delivery Function for a copy of the call's event
   messages, SHOULD include the address and port of the local Electronic
   Surveillance Delivery Function for the copy of call content if call
   content is to be intercepted, and MAY include the Laes-cccid
   parameter set to a value that uniquely identifies the audio stream if
   call content is to be intercepted.






Andreasen, et al.            Informational                     [Page 28]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   If the response to the initial INVITE request is a 3xx-Redirect
   response, and there is an outstanding lawfully authorized
   surveillance order for the terminating subscriber, the terminating
   proxy SHOULD include a P-DCS-LAES header in the 3xx-Redirect
   response, with contents as described above.

   A proxy receiving a mid-call REFER request [RFC3515] that includes a
   Refer-To header with a P-DCS-LAES header attached becomes a B2BUA for
   this request.  It MUST generate a private-URL and place it in the
   Refer-To header sent to the endpoint.  This private-URL MUST contain
   the P-DCS-LAES and P-DCS-Redirect information from the attached
   header fields.

9.  Security Considerations

   QoS gate coordination, billing information, and electronic
   surveillance information are all considered to be sensitive
   information that MUST be protected from eavesdropping and furthermore
   require integrity checking.  It is therefore necessary that the
   trusted UAs and proxies take precautions to protect this information
   from eavesdropping and tampering.  Use of IPsec or TLS between
   proxies and trusted UAs is REQUIRED.  A minimum mandatory-to-
   implement IPsec configuration for the DCS architecture is given by
   [PCSEC].  Also REQUIRED is mutual authentication (1) between Proxies
   and (2) between trusted UAs and Proxies, both of which MAY be
   implemented with administratively pre-shared keys, or through
   consultation with another trusted third party.  If IPsec is to be
   used, the specification of the security policies and procedures of
   the administrative domain where these headers are applicable (and all
   connections between administrative domains in the federation) MUST
   define an interoperable set of options.

10.  IANA Considerations

   The following changes to the Session Initiation Protocol (SIP)
   Parameters registry have been made by IANA.

   The Header Fields registry has been updated as follows:

     Header Name        compact    Reference
     -----------------  -------    ---------
     P-DCS-Trace-Party-ID          [RFC5503]
     P-DCS-OSPS                    [RFC5503]
     P-DCS-Billing-Info            [RFC5503]
     P-DCS-LAES                    [RFC5503]
     P-DCS-Redirect                [RFC5503]





Andreasen, et al.            Informational                     [Page 29]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   The following entries in the Header Field Parameters and Parameter
   Values registry have been updated:

   Header Field                  Parameter Name               Values
   Reference
   ----------------------------  ---------------------------  ----------

   P-DCS-Billing-Info            called                       No
   [RFC5503]
   P-DCS-Billing-Info            calling                      No
   [RFC5503]
   P-DCS-Billing-Info            charge                       No
   [RFC5503]
   P-DCS-Billing-Info            locroute                     No
   [RFC5503]
   P-DCS-Billing-Info            rksgroup                     No
   [RFC5503]
   P-DCS-Billing-Info            routing                      No
   [RFC3603]
   P-DCS-LAES                    content                      No
   [RFC5503]
   P-DCS-Redirect                count                        No
   [RFC5503]
   P-DCS-Redirect                redirector-uri               No
   [RFC5503]

   The following entry in the Header Field Parameters and Parameter
   Values registry has been marked "OBSOLETED":

   Header Field                  Parameter Name               Values
   Reference
   ----------------------------  ---------------------------  ----------
   P-DCS-LAES                    key (OBSOLETED)              No
   [RFC3603][RFC5503]

















Andreasen, et al.            Informational                     [Page 30]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   The following entries in the Header Field Parameters and Parameter
   Values registry have been created:

   Header Field                  Parameter Name               Values
   Reference
   ----------------------------  ---------------------------  ----------
   P-DCS-Billing-Info            jip                          No
   [RFC5503]
   P-DCS-LAES                    bcid                         No
   [RFC5503]
   P-DCS-LAES                    cccid                        No
   [RFC5503]
   P-DCS-Trace-Party-ID          timestamp                    No
   [RFC5503]

11.  Changes since RFC 3603

   o  A timestamp parameter is added to the P-DCS-Trace-Party-ID header
      when available.  Procedures on the use of the Target-Dialog header
      used together with the P-DCS-Trace-Party-ID are added.

   o  The JIP parameter is added to the P-DCS-Billing-Info header when
      available.

   o  The BCID billing correlation identifier and cccid (call content
      channel identifier) are added to the P-DCS-LAES header.

   o  P-DCS-Billing-Info header is applied to the SUBSCRIBE method.

   o  P-DCS-REDIRECT header is applied to the REFER method.

   o  The use of QoS authorization to establish content intercept is
      made optional in order not to preclude alternative content
      intercept provisioning mechanisms.

   o  PUBLISH and MESSAGE methods are added to the SIP method
      applicability matrices throughout.

   o  Correction is made to Table 2 to add m=modify.

   o  IANA considerations are updated.

   o  Corrections are made to timestamp format, and references are
      updated.







Andreasen, et al.            Informational                     [Page 31]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


12.  Acknowledgments

   The Distributed Call Signaling work in the PacketCable project is the
   work of a large number of people, representing many different
   companies.  The authors would like to recognize and thank the
   following for their assistance: John Wheeler, Motorola; David
   Boardman, Daniel Paul, Arris Interactive; Bill Blum, Jon Fellows, Jay
   Strater, Jeff Ollis, Clive Holborow, Motorola; Doug Newlin, Guido
   Schuster, Ikhlaq Sidhu, 3Com; Jiri Matousek, Bay Networks; Farzi
   Khazai, Brian Lindsay.  Nortel; John Chapman, Bill Guckel, Michael
   Ramalho, Cisco; Chuck Kalmanek, Doug Nortz, John Lawser, James Cheng,
   Tung-Hai Hsiao, Partho Mishra, AT&T; Telcordia Technologies; Lucent
   Cable Communications; and Miguel Garcia, Ericsson.

   Previous versions further acknowledged, as co-authors, several people
   for providing the text of this document.  They are:

   Bill Marshall (wtm@research.att.com) and K. K. Ramakrishnan
   (kkrama@research.att.com), AT&T; Ed Miller
   (edward.miller@terayon.com), Terayon; David Hancock (D.Hancock@
   Cablelabs.com) and Glenn Russell (G.Russell@Cablelabs.com),
   CableLabs; Burcak Beser (burcak@juniper.net) Juniper Networks; Mike
   Mannette (Michael_Mannette@3com.com) and Kurt Steinbrenner
   (Kurt_Steinbrenner@3com.com), 3Com; Dave Oran (oran@cisco.com) and
   Flemming Andreasen (fandreas@cisco.com), Cisco Systems; John Pickens
   (jpickens@com21.com), Com21; Poornima Lalwaney
   (poornima.lalwaney@nokia.com), Nokia; Jon Fellows
   (jfellows@coppermountain.com), Copper Mountain Networks; Doc Evans
   (n7dr@arrisi.com) Arris, and Keith Kelly (keith@netspeak.com),
   NetSpeak.

13.  References

13.1.  Normative References

   [RFC1305]  Mills, D., "Network Time Protocol (Version 3)
              Specification, Implementation", RFC 1305, March 1992.

   [RFC2119]  Bradner, S., "Key words for use in RFCs to Indicate
              Requirement Levels", BCP 14, RFC 2119, March 1997.

   [RFC3261]  Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
              A., Peterson, J., Sparks, R., Handley, M., and E.
              Schooler, "SIP: Session Initiation Protocol", RFC 3261,
              June 2002.

   [RFC3515]  Sparks, R., "The Session Initiation Protocol (SIP) Refer
              Method", RFC 3515, April 2003.



Andreasen, et al.            Informational                     [Page 32]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


   [RFC3629]  Yergeau, F., "UTF-8, a transformation format of ISO
              10646", STD 63, RFC 3629, November 2003.

   [RFC4330]  Mills, D., "Simple Network Time Protocol (SNTP) Version 4
              for IPv4, IPv6 and OSI", RFC 4330, January 2006.

   [RFC4538]  Rosenberg, J., "Request Authorization through Dialog
              Identification in the Session Initiation Protocol (SIP)",
              RFC 4538, June 2006.

   [RFC5234]  Crocker, D. and P. Overell, "Augmented BNF for Syntax
              Specifications: ABNF", STD 68, RFC 5234, January 2008.

13.2.  Informative References

   [DCSARCH]  Marshall, W., Osman, M., Andreasen, F., and D. Evans,
              "Architectural Considerations for Providing Carrier Class
              Telephony Services Utilizing SIP-based Distributed Call
              Control Mechanisms", January 2003.

   [PCDQOS]   Cable Television Laboratories, Inc., "PacketCable 1.5
              Specifications, Dynamic Quality of Service", August 2005.

   [PCEM]     Cable Television Laboratories, Inc., "PacketCable 1.5
              Specifications, Event Messages", December 2005.

   [PCSEC]    Cable Television Laboratories, Inc., "PacketCable 1.5
              Specifications, Security", January 2005.

   [RFC2804]  IAB and IESG, "IETF Policy on Wiretapping", RFC 2804,
              May 2000.

   [RFC3325]  Jennings, C., Peterson, J., and M. Watson, "Private
              Extensions to the Session Initiation Protocol (SIP) for
              Asserted Identity within Trusted Networks", RFC 3325,
              November 2002.

   [RFC3603]  Marshall, W. and F. Andreasen, "Private Session Initiation
              Protocol (SIP) Proxy-to-Proxy Extensions for Supporting
              the PacketCable Distributed Call Signaling Architecture",
              RFC 3603, October 2003.










Andreasen, et al.            Informational                     [Page 33]
^L
RFC 5503             SIP Proxy-to-Proxy Extensions            March 2009


Authors' Addresses

   Flemming Andreasen
   Cisco
   Edison, NJ
   USA

   EMail: fandreas@cisco.com


   Bernie McKibben
   CableLabs
   Louisville, CO
   USA

   EMail: B.McKibben@cablelabs.com


   Bill Marshall
   AT&T
   Florham Park, NJ
   USA

   EMail: wtm@research.att.com



























Andreasen, et al.            Informational                     [Page 34]
^L