Tech-invite3GPPspaceIETF RFCsSIP
9190898887868584838281807978777675747372717069686766656463626160595857565554535251504948474645444342414039383736353433323130292827262524232221201918171615141312111009080706050403020100
in Index   Prev   Next

RFC 5002

The Session Initiation Protocol (SIP) P-Profile-Key Private Header (P-Header)

Pages: 7
Informational
Errata
Updated by:  8217

Top   ToC   RFC5002 - Page 1
Network Working Group                                       G. Camarillo
Request for Comments: 5002                                     G. Blanco
Category: Informational                                         Ericsson
                                                             August 2007


                 The Session Initiation Protocol (SIP)
                P-Profile-Key Private Header (P-Header)

Status of This Memo

   This memo provides information for the Internet community.  It does
   not specify an Internet standard of any kind.  Distribution of this
   memo is unlimited.

Abstract

This document specifies the SIP P-Profile-Key P-header. This header field is used in the 3rd-Generation Partnership Project (3GPP) IMS (IP Multimedia Subsystem) to provide SIP registrars and SIP proxy servers with the key of the profile corresponding to the destination SIP URI of a particular SIP request.

Table of Contents

1. Introduction ....................................................2 2. Terminology .....................................................2 3. Scenario ........................................................2 4. Requirements ....................................................3 5. P-Profile-Key Header Field Definition ...........................3 6. Applicability ...................................................4 7. IANA Considerations .............................................4 8. Security Considerations .........................................5 9. Acknowledgements ................................................5 10. References .....................................................5 10.1. Normative References ......................................5 10.2. Informative References ....................................6
Top   ToC   RFC5002 - Page 2

1. Introduction

The 3rd-Generation Partnership Project (3GPP) IMS (IP Multimedia Subsystem) uses SIP [RFC3261] as its main signalling protocol. (For more information on the IMS, a detailed description can be found in 3GPP TS 23.228 [3GPP.23.228] and 3GPP TS 24.229 [3GPP.24.229]). 3GPP has identified a set of requirements that can be met, according to the procedures in [RFC3427], by defining a new SIP P-header. The remainder of this document is organized as follows. Section 3 describes the scenario considered by 3GPP and Section 4 discusses the requirements derived from this scenario. Section 5 defines the P- Profile-Key header field, which meets those requirements, and Section 6 discusses the applicability and scope of this new header field. Section 7 registers the P-Profile-Key header field with the IANA and Section 8 discusses the security properties of the environment where this header field is intended to be used.

2. Terminology

HSS: Home Subscriber Server. I-CSCF: Interrogating - Call/Session Control Function. Public Service Identity: A SIP URI that refers to a service instead of a user. S-CSCF: Serving - Call/Session Control Function. Wildcarded Public Service Identity: A set of Public Service Identities that match a regular expression and share the same profile.

3. Scenario

In the 3GPP IMS, there are scenarios where a set of proxies handling a request need to consult the same user database, as described in [RFC4457]. Those proxies typically use the destination SIP URI of the request as the key for their database queries. Nevertheless, when a proxy handles a Wildcarded Public Service Identity, the key to be used in its database query is not the destination SIP URI of the request, but a regular expression instead. Public Service Identities are SIP URIs that refer to services instead of users. That is, they address a specific application in an Application Server. Wildcarded Public Service Identities are a set of Public Service Identities that match a regular expression and share the same profile. For example, the Public Service Identities
Top   ToC   RFC5002 - Page 3
   'sip:chatroom-12@example.com' and 'sip:chatroom-657@example.com'
   would match the Wildcarded Public Service Identity
   'sip:chatroom-!.*!@example.com'.  For a description of Wildcarded
   Public Service Identities, see 3GPP TS 23.003 [3GPP.23.003].

   When a proxy queries the user database for a Public Service Identity
   for which there is no profile in the user database, the user database
   needs to find its matching Wildcarded Public Service Identity.  For
   example, if the user database receives a query for
   'sip:chatroom-657@example.com', the user database needs to go through
   all the Wildcarded Public Service Identity it has until it finds a
   matching one; in this case, 'sip:chatroom-!.*!@example.com'.  The
   process to find a matching Wildcarded Public Service Identity can be
   computationally expensive, time consuming, or both.

   When two proxies query the user database for the same Public Service
   Identity, which matches a Wildcarded Public Service Identity, the
   user database needs to perform the matching process twice.  Having to
   perform that process twice can be avoided by having the first proxy
   obtain the Wildcarded Public Service Identity from the user database
   and transfer it, piggy-backed in the SIP message, to the second
   proxy.  This way, the second proxy can query the user database using
   the Wildcarded Public Service Identity directly.

   An alternative, but undesirable, solution would consist of having the
   user database store every Public Service Identity and its matching
   Wildcarded Public Service Identity.  The scalability and
   manageability properties of this approach are considerably worse than
   those of the approach described earlier.

4. Requirements

This section lists the requirements derived from the previous scenario: 1. It is necessary to optimize the response time for session establishment in the 3GPP IMS. 2. It is necessary to keep the user database's size and maintenance manageable (e.g., storing individual Public Service Identities matching a Wildcarded Public Service Identity in the user database is not believed to be an acceptable solution).

5. P-Profile-Key Header Field Definition

This document defines the SIP P-Profile-Key P-header. The P- Profile-Key P-header contains the key to be used by a proxy to query the user database for a given profile.
Top   ToC   RFC5002 - Page 4
   The augmented Backus-Naur Form (BNF) [RFC4234] syntax of the
   P-Profile-Key header field is the following:

      P-Profile-Key     = "P-Profile-Key" HCOLON (name-addr / addr-spec)
                           *( SEMI generic-param )

   The format of HCOLON, name-addr, addr-spec, and generic-param are
   defined in [RFC3261].  The format of Wildcarded Public Service
   Identities is defined in 3GPP TS 23.003 [3GPP.23.003].  They take the
   form of Extended Regular Expressions (ERE) as defined in Chapter 9 of
   IEEE 1003.1-2004 Part 1 [IEEE.1003.1-2004].

   The following is an example of a P-Profile-Key header field that
   contains a Wildcarded Public Service Identity:

      P-Profile-Key: <sip:chatroom-!.*!@example.com>

6. Applicability

According to [RFC3427], P-headers have a limited applicability. Specifications of P-headers such as this RFC need to clearly document the useful scope of the proposal, and explain its limitations and why it is not suitable for the general use of SIP on the Internet. The P-Profile-Key header field is intended to be used in 3GPP IMS networks. This header field carries the key of a service profile, that is stored in a user database referred to as HSS, between two proxies, which are referred to as I-CSCF and S-CSCF. The I-CSCF and the S-CSCF belong to the same administrative domain and share a common frame of reference to the user database. The I-CSCF inserts the P-Profile-Key header field into a SIP request and the S-CSCF removes it before routing the request further. (For a description of how an I-CSCF and an S-CSCF query the same user database for a single request, see [RFC4457].) Typically, when SIP is used on the Internet, there are not multiple proxies with a trust relationship between them querying the same user database. Consequently, the P-Profile-Key header field does not seem useful in a general Internet environment.

7. IANA Considerations

This document defines a new SIP header field: P-Profile-Key. This header field has been registered by the IANA in the SIP Parameters registry under the Header Fields subregistry.
Top   ToC   RFC5002 - Page 5

8. Security Considerations

The P-Profile-Key defined in this document is to be used in an environment where elements are trusted and where attackers are not supposed to have access to the protocol messages between those elements. Traffic protection between network elements is sometimes achieved by using IPsec and sometimes by physically protecting the network. In any case, the environment where the P-Profile-Key header field will be used ensures the integrity and the confidentiality of the contents of this header field. The P-Profile-Key header field MUST NOT be used in environments that do not have these characteristics. The P-Profile-Key header field needs to be integrity protected to keep attackers from modifying its contents. An attacker able to modify the contents of this header field could make the network apply a different service than the one corresponding to the request carrying the P-Profile-Key header field. The contents of the P-Profile-Key field need to be kept confidential. An attacker able to access the contents of this header field would obtain certain knowledge about the way services are structured in a given domain.

9. Acknowledgements

Alf Heidermark and Timo Forsman provided input to this document. Miguel Angel Garcia-Martin performed an expert review on this document on behalf of the SIPPING working group. Jon Peterson provided comments on this document.

10. References

10.1. Normative References

[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP: Session Initiation Protocol", RFC 3261, June 2002. [RFC3427] Mankin, A., Bradner, S., Mahy, R., Willis, D., Ott, J., and B. Rosen, "Change Process for the Session Initiation Protocol (SIP)", BCP 67, RFC 3427, December 2002. [RFC4234] Crocker, D. and P. Overell, "Augmented BNF for Syntax Specifications: ABNF", RFC 4234, October 2005.
Top   ToC   RFC5002 - Page 6
   [3GPP.23.003]       3GPP, "Numbering, addressing and identification",
                       3GPP TS 23.003 3.15.0, October 2006.

   [IEEE.1003.1-2004]  "Standard for information technology - portable
                       operating system interface (POSIX).  Base
                       definitions", IEEE  1003.1-2004, 2004.

10.2. Informative References

[RFC4457] Camarillo, G. and G. Blanco, "The Session Initiation Protocol (SIP) P-User-Database Private-Header (P-Header)", RFC 4457, April 2006. [3GPP.23.228] 3GPP, "IP Multimedia Subsystem (IMS); Stage 2", 3GPP TS 23.228 5.15.0, June 2006. [3GPP.24.229] 3GPP, "Internet Protocol (IP) multimedia call control protocol based on Session Initiation Protocol (SIP) and Session Description Protocol (SDP); Stage 3", 3GPP TS 24.229 5.18.0, October 2006.

Authors' Addresses

Gonzalo Camarillo Ericsson Hirsalantie 11 Jorvas 02420 Finland EMail: Gonzalo.Camarillo@ericsson.com German Blanco Ericsson Via de los Poblados 13 Madrid 28033 Spain EMail: German.Blanco@ericsson.com
Top   ToC   RFC5002 - Page 7
Full Copyright Statement

   Copyright (C) The IETF Trust (2007).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.

Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.