文档库 最新最全的文档下载
当前位置:文档库 › rfc3455.Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3rd-Ge

rfc3455.Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3rd-Ge

rfc3455.Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3rd-Ge
rfc3455.Private Header (P-Header) Extensions to the Session Initiation Protocol (SIP) for the 3rd-Ge

Network Working Group M. Garcia-Martin Request for Comments: 3455 Ericsson Category: Informational E. Henrikson Lucent D. Mills Vodafone January 2003 Private Header (P-Header) Extensions to the Session Initiation

Protocol (SIP) for the 3rd-Generation Partnership Project (3GPP) Status of this Memo

This memo provides information for the Internet community. It does

not specify an Internet standard of any kind. Distribution of this

memo is unlimited.

Copyright Notice

Copyright (C) The Internet Society (2003). All Rights Reserved. Abstract

This document describes a set of private Session Initiation Protocol (SIP) headers (P-headers) used by the 3rd-Generation Partnership

Project (3GPP), along with their applicability, which is limited to

particular environments. The P-headers are for a variety of purposes within the networks that the partners use, including charging and

information about the networks a call traverses.

Table of Contents

1. Overall Applicability . . . . . . . . . . . . . . . . . . . . 3

2. Conventions . . . . . . . . . . . . . . . . . . . . . . . . . 3

3. Overview . . . . . . . . . . . . . . . . . . . . . . . . . . 3

4. SIP Private Headers . . . . . . . . . . . . . . . . . . . . . 3

4.1 The P-Associated-URI header. . . . . . . . . . . . . . . . 3

4.1.1 Applicability statement for the

P-Associated-URI header. . . . . . . . . . . . . . . 4

4.1.2 Usage of the P-Associated-URI header . . . . . . . . 4

4.2 The P-Called-Party-ID header . . . . . . . . . . . . . . . 6

4.2.1 Applicability statement for the

P-Called-Party-ID header. . . . . . . . . . . . . . . 9

4.2.2 Usage of the P-Called-Party-ID header. . . . . . . . 10

4.3 The P-Visited-Network-ID header. . . . . . . . . . . . . . 11

4.3.1 Applicability statement for the

P-Visited-Network-ID header. . . . . . . . . . . . . 11 Garcia-Martin, et. al. Informational [Page 1]

4.3.2 Usage of the P-Visited-Network-ID header . . . . . . 12

4.4 The P-Access-Network-Info header . . . . . . . . . . . . . 15

4.4.1 Applicability Statement for the

P-Access-Network-Info header . . . . . . . . . . . . 16

4.4.2 Usage of the P-Access-Network-Info header . . . . . 17

4.5 The P-Charging-Function-Addresses header . . . . . . . . . 18

4.5.1 Applicability Statement for the

P-Charging-Function-Addresses header . . . . . . . . 18

4.5.2 Usage of the P-Charging-Function-Addresses

headerd. . . . . . . . . . . . . . . . . . . . . . . 19

4.6 The P-Charging-Vector header . . . . . . . . . . . . . . . 21

4.6.1 Applicability Statement for the

P-Charging-Vector header . . . . . . . . . . . . . . 22

4.6.2 Usage of the P-Charging-Vector header . . . . . . . 23

5. Formal Syntax . . . . . . . . . . . . . . . . . . . . . . . . 25

5.1 P-Associated-URI header syntax . . . . . . . . . . . . . . 25

5.2 P-Called-Party-ID header syntax. . . . . . . . . . . . . . 25

5.3 P-Visited-Network-ID header syntax . . . . . . . . . . . . 25

5.4 P-Access-Network-Info header syntax. . . . . . . . . . . . 25

5.5 P-Charging-Function-Addresses header syntax. . . . . . . . 26

5.6 P-Charging-Vector header syntax. . . . . . . . . . . . . . 26

5.7 Table of new headers . . . . . . . . . . . . . . . . . . . 27

6. Security Considerations . . . . . . . . . . . . . . . . . . . 28

6.1 P-Associated-URI . . . . . . . . . . . . . . . . . . . . . 28

6.2 P-Called-Party-ID. . . . . . . . . . . . . . . . . . . . . 28

6.3 P-Visited-Network-ID . . . . . . . . . . . . . . . . . . . 28

6.4 P-Access-Network-Info. . . . . . . . . . . . . . . . . . . 29

6.5 P-Charging-Function-Addresses. . . . . . . . . . . . . . . 30

6.6 P-Charging-Vector. . . . . . . . . . . . . . . . . . . . . 30

7. IANA Considerations. . . . . . . . . . . . . . . . . . . . . 30

8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 31

9. Acknowledgments. . . . . . . . . . . . . . . . . . . . . . . 32

10. Normative References . . . . . . . . . . . . . . . . . . . . 32

11. Informative References . . . . . . . . . . . . . . . . . . . 32

Authors’ Addresses . . . . . . . . . . . . . . . . . . . . . . . 33

Full Copyright Statement . . . . . . . . . . . . . . . . . . . . 34 Garcia-Martin, et. al. Informational [Page 2]

1. Overall Applicability

The SIP extensions specified in this document make certain

assumptions regarding network topology, linkage between SIP and lower layers, and the availability of transitive trust. These assumptions are generally NOT APPLICABLE in the Internet as a whole. The

mechanisms specified here were designed to satisfy the requirements

specified in the 3GPP Release 5 requirements on SIP [4] for which

either no general-purpose solution was planned, where insufficient

operational experience was available to understand if a general

solution is needed, or where a more general solution is not yet

mature. For more details about the assumptions made about these

extensions, consult the Applicability subsection for each extension.

2. Conventions

The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",

"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in BCP 14, RFC 2119 [2].

3. Overview

The Third Generation Partnership Project (3GPP) has selected SIP as

the protocol used to establish and tear down multimedia sessions in

the context of its IP Multimedia Subsystem (IMS). (For more

information on the IMS, a detailed description can be found in 3GPP

TS 23.228 [14] and 3GPP TS 24.229 [15]). 3GPP notified the IETF SIP and SIPPING working groups that existing SIP documents provided

almost all the functionality needed to satisfy the requirements of

the IMS, but that they required some additional functionality in

order to use SIP for this purpose. These requirements [4] are

documented in an Internet Draft which was submitted to the SIPPING

Working Group. Some of these requirements are satisfied by chartered extensions, while other requirements were applicable to SIP, but not sufficiently general for the SIP Working Group to adopt. This

document describes private extensions to address those requirements. Each extension, or set of related extensions is described in its own section below.

4. SIP Private Headers

4.1 The P-Associated-URI header

This extension allows a registrar to return a set of associated URIs for a registered address-of-record. We define the P-Associated-URI

header field, used in the 200 OK response to a REGISTER request. The P-Associated-URI header field transports the set of Associated URIs

to the registered address-of-record.

Garcia-Martin, et. al. Informational [Page 3]

An associated URI is a URI that the service provider has allocated to a user for his own usage. A registrar contains information that

allows an address-of-record URI to be associated with zero or more

URIs. Usually, all these URIs (the address-of-record URI and the

associated URIs) are allocated for the usage of a particular user.

This extension to SIP allows the UAC to know, upon a successful

authenticated registration, which other URIs, if any, the service

provider has associated to an address-of-record URI.

Note that, generally speaking, the registrar does not register the

associated URIs on behalf of the user. Only the address-of-record

which is present in the To header field of the REGISTER is registered and bound to the contact address. The only information conveyed is

that the registrar is aware of other URIs to be used by the same

user.

It may be possible, however, that an application server (or even the registrar itself) registers any of the associated URIs on behalf of

the user by means of a third party registration. However, this third party registration is out of the scope of this document. A UAC MUST NOT assume that the associated URIs are registered.

If a UAC wants to check whether any of the associated URIs is

registered, it can do so by mechanisms specified outside this

document, e.g., the UA may send a REGISTER request with the To header field value set to any of the associated URIs and without a Contact

header. The 200 OK response will include a Contact header with the

list of registered contact addresses. If the associated URI is not

registered, the UA MAY register it prior to its utilization.

4.1.1 Applicability statement for the P-Associated-URI header

The P-Associated-URI header is applicable in SIP networks where the

SIP provider is allocating the set of identities that a user can

claim (in headers like the From field) in requests that the UA

generates. It furthermore assumes that the provider knows the entire set of identities that a user can legitimately claim, and that the

user is willing to restrict its claimed identities to that set. This is in contrast to normal SIP usage, where the From field is

explicitly an end-user specified field.

4.1.2 Usage of the P-Associated-URI header

The registrar inserts the P-Associated-URI header field into the 200 OK response to a REGISTER request. The header field value is

populated with a list containing zero or more URIs that are

associated to the address-of-record.

Garcia-Martin, et. al. Informational [Page 4]

If the registrar supports the P-Associated-URI header extension, then the registrar MUST always insert the P-Associated-URI header field in all the 200 OK responses to a REGISTER request, regardless of whether the REGISTER was an initial registration, re-registration, or

de-registration and regardless of whether there are zero or more

associated URIs.

4.1.2.1 Procedures at the UA

A UAC may receive a P-Associated-URI header field in the 200 OK

response for a REGISTER. The presence of the header field in the 200 OK response for a REGISTER request implies that the extension is

supported at the registrar.

The header value contains a list of zero or more associated URIs to

the address-of-record URI. The UAC MAY use any of the associated

URIs to populate the From header value, or any other SIP header value that provides information of the identity of the calling party, in a subsequent request.

The UAC MAY check whether the associated URI is registered or not.

This check can be done, e.g., by populating the To header value in a REGISTER sent to the registrar and without a Contact header. The 200 OK response will include a Contact header with the list of registered contact addresses. As described in SIP [1], the 200 OK response may contain a Contact header field with zero or more values (zero meaning the address-of-record is not registered).

4.1.2.2 Procedures at the registrar

A registrar that receives and authorizes a REGISTER request, may

associate zero or more URIs with the address-of-record.

A registrar that supports this specification MUST include a

P-Associated-URI header field in the 200 OK response to a REGISTER

request. The header MUST be populated with a comma-separated list of SIP or SIPS URIs which are associated to the address-of-record under registration.

In case the address-of-record under registration does not have any

other SIP or SIPS URIs associated, the registrar MUST include an

empty P-Associated-URI header value.

4.1.2.3 Procedures at the proxy

This memo does not define any procedure at the proxy.

Garcia-Martin, et. al. Informational [Page 5]

4.2 The P-Called-Party-ID header

A proxy server inserts a P-Called-Party-ID header, typically in an

INVITE request, en-route to its destination. The header is populated with the Request-URI received by the proxy in the request. The UAS

identifies which address-of-record, out of several registered

address-of-records, the invitation was sent to (for example, the user may be simultaneously using a personal and a business SIP URIs to

receive invitation to sessions). The UAS may use the information to render different distinctive audiovisual alerting tones, depending on the URI used to receive the invitation to the session.

Users in the 3GPP IP Multimedia Subsystem (IMS) may get one or

several SIP URIs (address-of-record) to identify the user. For

instance, a user may get a business SIP URI and a personal one. As

an example of utilization, the user may make available the business

SIP URI to co-workers and may make available the personal SIP URI to members of the family.

At a certain point in time, both the business SIP URI and the

personal SIP URI are registered in the SIP registrar, so both URIs

can receive invitations to new sessions. When the user receives an

invitation to join a session, he/she should be aware of which of the several registered SIP URIs this session was sent to.

This requirement is stated in the 3GPP Release 5 requirements on SIP [4].

The problem arises during the terminating side of a session

establishment, when the SIP proxy that is serving a UA gets an

INVITE, and the SIP server retargets the SIP URI which is present in the Request-URI field, and replaces it by the SIP URI published by

the user in the Contact header field of the REGISTER request at

registration time. When the UAS receives the SIP INVITE, it cannot

determine which address-of-record the request was sent to.

One can argue that the To header field conveys the semantics of the

called user, and therefore, this extension to SIP is not needed.

Although the To header field in SIP may convey the called party ID in most situations, there are two particular cases when the above

assumption is not correct:

1. The session has been forwarded, redirected, etc., by previous SIP proxies, before arriving to the proxy which is serving the called user.

2. The UAC builds an INVITE request and the To header field is not

the same as the Request-URI.

Garcia-Martin, et. al. Informational [Page 6]

The problem of using the To header field is that this field is

populated by the UAC and not modified by proxies in the path. If the UAC, for any reason, did not populate the To header field with the

address-of-record of the destination user, then the destination user is not able to distinguish which address-of-record the session was

destined.

Another possible solution to the problem is built upon the

differentiation of the Contact header value between different

address-of-record at registration time. The UA can differentiate

each address-of-record it registers by assigning a different Contact header value. For instance, when the UA registers the address-of-

record sip:id1, the Contact header value can be sip:id1@ua; the

registration of sip:id2 can be bound to the Contact value sip:id2@ua. The solution described above assumes that the UA explicitly registers each of its address-of-record URIs, and therefore, it has full

control over the contact address values assigned to each

registration. However, in the case the UA does not have full control of its registered address-of-record, because of, e.g., a third party registration, the solution does not work. This may be the case of

the 3GPP registration, where the UA may have previously indicated the network, by means outside of SIP, that some other address-of-record

URIs may be automatically registered when the UA registers a

particular address-of-record. The requirement is covered in the 3GPP Release 5 requirements on SIP [4].

In the next paragraphs we show an example of the problem, in the case there has been some sort of call forwarding in the session, so that

the UAC is not aware of the intended destination URI in the current

INVITE.

We assume that a User Agent (UA) is registering to his proxy (P1).

Scenario UA --- P1

F1 Register UA -> P1

REGISTER sip:https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP 192.0.2.4:5060;branch=z9hG4bKnashds7

To: sip:user1-business@https://www.wendangku.net/doc/53398764.html,

From: sip:user1-business@https://www.wendangku.net/doc/53398764.html,;tag=456248

Call-ID: 843817637684230998sdasdh09

CSeq: 1826 REGISTER

Contact:

The user also registers his personal URI to his/her registrar.

Garcia-Martin, et. al. Informational [Page 7]

F2 Register UA -> P1

REGISTER sip:https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP 192.0.2.4:5060;branch=z9hG4bKnashdt8

To: sip:user1-personal@https://www.wendangku.net/doc/53398764.html,

From: sip:user1-personal@https://www.wendangku.net/doc/53398764.html,;tag=346249

Call-ID: 2Q3817637684230998sdasdh10

CSeq: 1827 REGISTER

Contact:

Later, the proxy/registrar (P1) receives an INVITE from another proxy (P2) destined to the user’s business SIP address-of-record. We

assume that this SIP INVITE has undergone some sort of forwarding in the past, and as such, the To header field is not populated with the SIP URI of the user. In this case we assume that the session was

initially addressed to sip:other-user@https://www.wendangku.net/doc/53398764.html,. The SIP

server at https://www.wendangku.net/doc/53398764.html, has forwarded this session to

sip:user1-business@https://www.wendangku.net/doc/53398764.html,

Scenario UA --- P1 --- P2

F3 Invite P2 -> P1

INVITE sip:user1-business@https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP 192.0.2.20:5060;branch=z9hG4bK03djaoe1

To: sip:other-user@https://www.wendangku.net/doc/53398764.html,

From: sip:another-user@https://www.wendangku.net/doc/53398764.html,;tag=938s0

Call-ID: 843817637684230998sdasdh09

CSeq: 101 INVITE

The proxy P1 retargets the user and replaces the Request-URI with the SIP URI published during registration time in the Contact header

value.

F4 Invite P1 -> UA

INVITE sip:user1@192.0.2.4 SIP/2.0

Via: SIP/2.0/UDP 192.0.2.10:5060;branch=z9hG4bKg48sh128

Via: SIP/2.0/UDP 192.0.2.20:5060;branch=z9hG4bK03djaoe1

To: sip:other-user@https://www.wendangku.net/doc/53398764.html,

From: sip:another-user@https://www.wendangku.net/doc/53398764.html,;tag=938s0

Call-ID: 843817637684230998sdasdh09

CSeq: 101 INVITE

When the UAS receives the INVITE, it cannot determine whether it got the session invitation due to his registration of the business or the personal address-of-record. Neither the UAS nor proxies or

application servers can provide this user a service based on the

destination address-of-record of the session.

Garcia-Martin, et. al. Informational [Page 8]

We solve this problem by allowing the proxy that is responsible for

the home domain (as defined in SIP) of the user to insert a

P-Called-Party-ID header that identifies the address-of-record to

which this session is destined.

If this SIP extension is used, the proxy serving the called user will get the message flow F5, it will populate the P-Called-Party-ID

header in message flow F6 with the contents of the Request-URI in F4. This is show in flows F5 and F6 below:

F5 Invite P2 -> P1

INVITE sip:user1-business@https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP 192.0.2.20:5060;branch=z9hG4bK03djaoe1

To: sip:other-user@https://www.wendangku.net/doc/53398764.html,

From: sip:another-user@https://www.wendangku.net/doc/53398764.html,;tag=938s0

Call-ID: 843817637684230998sdasdh09

CSeq: 101 INVITE

F6 Invite P1 -> UA

INVITE sip:user1@192.0.2.4 SIP/2.0

Via: SIP/2.0/UDP 192.0.2.10:5060;branch=z9hG4bKg48sh128

Via: SIP/2.0/UDP 192.0.2.20:5060;branch=z9hG4bK03djaoe1

To: sip:other-user@https://www.wendangku.net/doc/53398764.html,

From: sip:another-user@https://www.wendangku.net/doc/53398764.html,;tag=938s0

Call-ID: 843817637684230998sdasdh09

P-Called-Party-ID: sip:user1-business@https://www.wendangku.net/doc/53398764.html,

CSeq: 101 INVITE

When the UA receives the INVITE request F6 it can determine the

intended address-of-record of the session, and apply whatever service is needed for that address-of-record.

4.2.1 Applicability statement for the P-Called-Party-ID header

The P-Called-Party-ID is applicable when the UAS needs to be aware of the intended address-of-record that was present in the Request-URI of the request, before the proxy retargets to the contact address. The UAS may be interested in applying different audiovisual alerting

effects or other filtering services, depending on the intended

destination of the request. It is specially valuable when the UAS

has registered several address-of-record URIs to his registrar, and

therefore, the UAS is not aware of the address-of-record that was

present in the INVITE request when it hit his proxy/registrar, unless this extension is used.

Requirements for a more general solution are proposed in [12], but

have not been adopted by SIP, nor a solution has been developed. Garcia-Martin, et. al. Informational [Page 9]

4.2.2 Usage of the P-Called-Party-ID header

The P-Called-Party-ID header field provides proxies and the UAS with the address-of-record that was present in the Request-URI of the

request, before a proxy retargets the request. This information is

intended to be used by subsequent proxies in the path or by the UAS. Typically, a SIP proxy inserts the P-Called-Party-ID header prior to retargetting the Request-URI in the SIP request. The header value is populated with the contents of Request-URI, prior to replacing it

with the Contact address.

4.2.2.1 Procedures at the UA

A UAC MUST NOT insert a P-Called-Party-ID header field in any SIP

request or response.

A UAS may receive a SIP request that contains a P-Called-Party-ID

header field. The header will be populated with the address-of-

record received by the proxy in the Request-URI of the request, prior to its forwarding to the UAS.

The UAS may use the value in the P-Called-Party-ID header field to

provide services based on the called party URI, such as, e.g.,

filtering of calls depending on the date and time, distinctive

presentation services, distinctive alerting tones, etc.

4.2.2.2 Procedures at the proxy

A proxy that has access to the Contact information of the user, MAY

insert a P-Called-Party-ID header field in any of the requests

indicated in the Table 1 (Section 5.7). The proxy MUST populate the header value with the contents of the Request-URI present in the SIP request that the proxy received.

It is necessary that the proxy which inserts the P-Called-Party-ID

header has information about the user, in order to prevent a wrong

delivery of the called party ID. This information may have been

learned through a registration process, for instance.

A proxy or application server that receives a request containing a

P-Called-Party-ID header may use the contents of the header to

provide a service to the user based on the URI of that header value.

A SIP proxy MUST NOT insert a P-Called-Party-ID header in REGISTER

requests.

Garcia-Martin, et. al. Informational [Page 10]

4.3 The P-Visited-Network-ID header

3GPP networks are composed of a collection of so called home

networks, visited networks and subscribers. A particular home

network may have roaming agreements with one or more visited

networks. This has the effect that when a mobile terminal is

roaming, it can use resources provided by the visited network in a

transparent fashion.

One of the conditions for a home network to accept the registration

of a UA roaming to a particular visited network, is the existence of a roaming agreement between the home and the visited network. There is a need to indicate to the home network which one is the visited

network that is providing services to the roaming UA.

3GPP user agents always register to the home network. The REGISTER

request is proxied by one or more proxies located in the visited

network towards the home network. For the sake of a simple approach, it seems sensible that the visited network includes an identification that is known at the home network. This identification should be

globally unique, and takes the form of a quoted text string or a

token. The home network may use this identification to verify the

existence of a roaming agreement with the visited network, and to

authorize the registration through that visited network.

4.3.1 Applicability statement for the P-Visited-Network-ID header

The P-Visited-Network-ID is applicable whenever the following

circumstances are met:

1. There is transitive trust in intermediate proxies between the UA

and the home network proxy via established relationships between

the home network and the visited network, and generally supported by the use of standard security mechanisms, e.g., IPsec, AKA, or

TLS.

2. An endpoint is using resources provided by one or more visited

networks (a network to which the user does not have a direct

business relationship).

3. A proxy that is located in one of the visited networks wants to be identified at the user’s home network.

4. There is no requirement that every visited network needs to be

identified at the home network. Those networks that want to be

identified make use of the extension defined in this document.

Those networks that do not want to be identified do nothing.

Garcia-Martin, et. al. Informational [Page 11]

5. A commonly pre-agreed text string or token identifies the visited network at the home network.

6. The UAC sends a REGISTER or dialog-initiating request (e.g.,

INVITE) or a standalone request outside a dialog (e.g., OPTIONS)

to a proxy in a visited network.

7. The request traverses, en route to its destination, a first proxy located in the visited network, and a second proxy located in the home network or its destination is the registrar in the home

network.

8. The registrar or home proxy verifies and authorizes the usage of

resources (e.g., proxies) in the visited network.

4.3.2 Usage of the P-Visited-Network-ID header

The P-Visited-Network-ID header field is used to convey to the

registrar or home proxy in the home network the identifier of a

visited network. The identifier is a text string or token that is

known by both the registrar or the home proxy at the home network and the proxies in the visited network.

Typically, the home network authorizes the UA to roam to a particular visited network. This action requires an existing roaming agreement between the home and the visited network.

While it is possible for a home network to identify one or more

visited networks by inspecting the domain name in the Via header

fields, this approach has a heavy dependency on DNS. It is an option for a proxy to populate the via header with an IP address, for

example, and in the absence of a reverse DNS entry, the IP address

will not convey the desired information.

Any SIP proxy that receives any of the requests indicated in Table 1 (Section 5.7) MAY insert a P-Visited-Network-ID header when it

forwards the request. In case a REGISTER or other request is

traversing different administrative domains (e.g., different visited networks), a SIP proxy MAY insert a new P-Visited-Network-ID header

if the request does not contain a P-Visited-Network-ID header with

the same network identifier as its own network identifier (e.g., if

the request has traversed other different administrative domains).

Note also that, there is not requirement for the header value to be

readable in the proxies. Therefore, a first proxy may insert an

encrypted header that only the registrar can decrypt. If the request traverses a second proxy located in the same administrative domain as the first proxy, the second proxy may not be able to read the

Garcia-Martin, et. al. Informational [Page 12]

contents of the P-Visited-Network-ID header. In this situation, the second proxy will consider that its visited network identifier is not already present in the value of the header, and therefore, it will

insert a new P-Visited-Network-ID header value (hopefully with the

same identifier that the first proxy inserted, although perhaps, not encrypted). When the request arrives at the registrar or proxy in

the home network, it will notice that the header value is repeated

(both the first and the second proxy inserted it). The decrypted

values should be the same, because both proxies where part of the

same administrative domain. While this situation is not desirable,

it does not create any harm at the registrar or proxy in the home

network.

The P-Visited-Network-ID is normally used at registration. However, this extension does not preclude other usages. For instance, a proxy located in a visited network that does not maintain registration

state may insert a P-Visited-Network-ID header into any standalone

request outside a dialog or a request that creates a dialog. At the time of writing this document, the only requests that create dialogs are INVITE [1], SUBSCRIBE [6] and REFER [11].

In order to avoid conflicts with identifiers, especially when the

number of roaming agreements between networks increase, care must be taken when selecting the value of the P-Visited-Network-ID. The

identifier should be a globally unique to avoid duplications.

Although there are many mechanism to create globally unique

identifiers across networks, one of such as mechanisms is already in operation, and that is DNS. The P-Visited-Network-ID does not have

any connection to DNS, but the values in the header can be chosen

from the own DNS entry representing the domain name of the network.

This guarantees the uniqueness of the value.

4.3.2.1 Procedures at the UA

User agent clients SHOULD NOT insert a P-Visited-Network-ID header in any SIP message.

4.3.2.2 Procedures at the registrar and proxy

A SIP proxy which is located in a visited network MAY insert a

P-Visited-Network-ID header field in any of the requests indicated in the Table 1 (Section 5.7). The header MUST be populated with the

contents of a text string or a token that identifies the

administrative domain of the network where the proxy is operating at the user’s home network.

Garcia-Martin, et. al. Informational [Page 13]

A SIP proxy or registrar which is located in the home network may use the contents of the P-Visited-Network-ID as an identifier of one or

more visited networks that the request traversed. The proxy or

registrar in the home network may take local policy driven actions

based on the existence or not of a roaming agreement between the home and the visited networks. This means, for instance, authorize the

actions of the request based on the contents of the

P-Visited-Network-ID header.

A SIP proxy which is located in the home network MUST delete this

header when forwarding the message outside the home network

administrative domain, in order to retain the user’s privacy.

A SIP proxy which is located in the home network SHOULD delete this

header when the home proxy has used the contents of the header or the request is routed based on the called party, even when the request is not forwarded outside the home network administrative domain.

4.3.2.3 Examples of Usage

We present example in the context of the scenario presented in the

following network diagram:

Scenario UA --- P1 --- P2 --- REGISTRAR

This example shows the message sequence for an REGISTER transaction

originating from UA1 eventually arriving at REGISTRAR. P1 is an

outbound proxy for UA1. In this case P1 also inserts the

P-Visited-Network-ID header. P1 then routes the REGISTER request to the Registrar via P2.

Message sequence for REGISTER using P-Visited-Network-ID header:

F1 Register UA -> P1

REGISTER sip:https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP 192.0.2.4:5060;branch=z9hG4bKnashds7

To: sip:user1-business@https://www.wendangku.net/doc/53398764.html,

From: sip:user1-business@https://www.wendangku.net/doc/53398764.html,;tag=456248

Call-ID: 843817637684230998sdasdh09

CSeq: 1826 REGISTER

Contact:

In flow F2, proxy P2 adds its own identifier to the

P-Visited-Network-ID header.

Garcia-Martin, et. al. Informational [Page 14]

F2 Register P1 -> P2

REGISTER sip:https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP https://www.wendangku.net/doc/53398764.html,;branch=z9hG4bK203igld

Via: SIP/2.0/UDP 192.0.2.4:5060;branch=z9hG4bKnashdt8

To: sip:user1-personal@https://www.wendangku.net/doc/53398764.html,

From: sip:user1-personal@https://www.wendangku.net/doc/53398764.html,;tag=346249

Call-ID: 2Q3817637684230998sdasdh10

CSeq: 1826 REGISTER

Contact:

P-Visited-Network-ID: "Visited network number 1"

Finally, in flow F3, proxy P2 decides to insert his own identifier,

derived from its own domain name.

F3 Register P2 -> REGISTRAR

REGISTER sip:https://www.wendangku.net/doc/53398764.html, SIP/2.0

Via: SIP/2.0/UDP https://www.wendangku.net/doc/53398764.html,;branch=z9hG4bK2bndnvk

Via: SIP/2.0/UDP https://www.wendangku.net/doc/53398764.html,;branch=z9hG4bK203igld

Via: SIP/2.0/UDP 192.0.2.4:5060;branch=z9hG4bKnashdt8

To: sip:user1-personal@https://www.wendangku.net/doc/53398764.html,

From: sip:user1-personal@https://www.wendangku.net/doc/53398764.html,;tag=346249

Call-ID: 2Q3817637684230998sdasdh10

CSeq: 1826 REGISTER

Contact:

P-Visited-Network-ID: https://www.wendangku.net/doc/53398764.html,, "Visited network number 1" 4.4 The P-Access-Network-Info header

This section describes the P-Access-Network-Info header. This header is useful in SIP-based networks that also provide layer 2/layer 3

connectivity through different access technologies. SIP User Agents may use this header to relay information about the access technology to proxies that are providing services. The serving proxy may then

use this information to optimize services for the UA. For example, a 3GPP UA may use this header to pass information about the access

network such as radio access technology and radio cell identity to

its home service provider.

For the purpose of this extension, we define an access network as the network providing the layer 2/layer 3 IP connectivity which in turn

provides a user with access to the SIP capabilities and services

provided.

In some cases, the SIP server that provides the user with services

may wish to know information about the type of access network that

the UA is currently using. Some services are more suitable or less Garcia-Martin, et. al. Informational [Page 15]

suitable depending on the access type, and some services are of more value to subscribers if the access network details are known by the

SIP proxy which provides the user with services.

In other cases, the SIP server that provides the user with services

may simply wish to know crude location information in order to

provide certain services to the user. For example, many of the

location based services available in wireless networks today require the home network to know the identity of the cell the user is being

served by.

Some regulatory requirements exist mandating that for cellular radio systems, the identity of the cell where an emergency call is

established is made available to the emergency authorities.

The SIP server that provides services to the user may desire

knowledge about the access network. This is achieved by defining a

new private SIP extension header, P-Access-Network-Info. This header carries information relating to the access network between the UAC

and its serving proxy in the home network.

4.4.1 Applicability Statement for the P-Access-Network-Info header

This mechanism is appropriate in environments where SIP services are dependent on SIP elements knowing details about the IP and lower

layer technologies used by a UA to connect to the SIP network.

Specifically, the extension requires that the UA know the access

technology it is using, and that a proxy desires such information to provide services. Generally, SIP is built on the "Everything over IP and IP over everything" principle, where the access technology is not relevant for the operation of SIP. Since SIP systems generally

should not care or even know about the access technology, this SIP

extension is not for general SIP usage.

The information revealed in the P-Access-Network-Info header is

potentially very sensitive. Proper protection of this information

depends on the existence of specific business and security

relationships amongst the proxies that will see SIP messages

containing this header. It also depends on explicit knowledge of the UA of the existence of those relationships. Therefore, this

mechanism is only suitable in environments where the appropriate

relationships are in place, and the UA has explicit knowledge that

they exist.

Garcia-Martin, et. al. Informational [Page 16]

4.4.2 Usage of the P-Access-Network-Info header

When a UA generates a SIP request or response which it knows is going to be securely sent to its SIP proxy that is providing services, the UA inserts a P-Access-Network-Info header into the SIP message. This header contains information on the access network that the UA is

using to get IP connectivity. The header is typically ignored by

intermediate proxies between the UA and the SIP proxy that is

providing services. The proxy providing services can inspect the

header and make use of the information contained there to provide

appropriate services, depending on the value of the header. Before

proxying the request onwards, this proxy strips the header from the

message.

4.4.2.1 UA behavior

A UA that supports this extension and is willing to disclose the

related parameters MAY insert the P-Access-Network-Info header in any SIP request or response.

The UA inserting this information MUST trust the proxy that is

providing services to protect its privacy by deleting the header

before forwarding the message outside of the proxy’s domain. This

proxy is typically located in the home network.

In order to do the deletion of the header, there must also be a

transitive trust in intermediate proxies between the UA and the proxy that provides the services. This trust is established by business

agreements between the home network and the access network, and

generally supported by the use of standard security mechanisms, e.g., IPsec, AKA, and TLS.

4.4.2.2 Proxy behavior

A proxy MUST NOT insert or modify the value of the

P-Access-Network-Info header.

A proxy which is providing services to the UA, may act upon any

information present in the P-Access-Network-Info header value, if is present, to provide a different service depending on the network or

the location through which the UA is accessing the server. For

example, for cellular radio access networks the SIP proxy located in the home network may use the cell ID to provide basic localized

services.

A proxy that provides services to the user, the proxy typically

located in the home network, and therefore trusted, MUST delete the

header when the SIP signaling is forwarded to a SIP server located in Garcia-Martin, et. al. Informational [Page 17]

a non-trusted administrative network domain. The SIP server

providing services to the UA uses the access network information and is of no interest to other proxies located in different

administrative domains.

4.5 The P-Charging-Function-Addresses header

3GPP has defined a distributed architecture that results in multiple network entities becoming involved in providing access and services. There is a need to inform each SIP proxy involved in a transaction

about the common charging functional entities to receive the

generated charging records or charging events.

The solution provided by 3GPP is to define two types of charging

functional entities: Charging Collection Function (CCF) and Event

Charging Function (ECF). CCF is used for off-line charging (e.g.,

for postpaid account charging). ECF is used for on-line charging

(e.g., for pre-paid account charging). There may be more than a

single instance of CCF and ECF in a network, in order to provide

redundancy in the network. In case there are more than a single

instance of either the CCF or the ECF addresses, implementations

SHOULD attempt sending the charging data to the ECF or CCF address,

starting with the first address of the sequence (if any) in the

P-Charging-Function-Addresses header. The CCF and ECF addresses may be passed during the establishment of a dialog or in a standalone

transaction. More detailed information about charging can be found

in 3GPP TS 32.200 [16] and 3GPP TS 32.225 [17].

We define the SIP private header P-Charging-Function-Addresses. A

proxy MAY include this header, if not already present, in either the initial request or response for a dialog, or in the request and

response of a standalone transaction outside a dialog. Only one

instance of the header MUST be present in a particular request or

response.

The mechanisms by which a SIP proxy collects the values to populate

the P-Charging-Function-Addresses header values are outside the scope of this document. However, as an example, a SIP proxy may have

preconfigured these addresses, or may obtain them from a subscriber

database.

4.5.1 Applicability Statement for the P-Charging-Function-Addresses

header

The P-Charging-Function-Addresses header is applicable within a

single private administrative domain where coordination of charging

is required, for example, according to the architecture specified in 3GPP TS 32.200 [16].

Garcia-Martin, et. al. Informational [Page 18]

The P-Charging-Function-Addresses header is not included in a SIP

message sent outside of the own administrative domain. The header is not applicable if the administrative domain does not provide a

charging function.

The P-Charging-Function-Addresses header is applicable whenever the

following circumstances are met:

1. A UA sends a REGISTER or dialog-initiating request (e.g., INVITE) or a standalone transaction request outside a dialog to a proxy

located in the administrative domain of a private network.

2. A registrar, proxy or UA that is located in the administrative

domain of the private network wants to generate charging records.

3. A registrar, proxy or UA that is located in the private network

has access to the addresses of the charging function entities for that network.

4. There are other proxies located in the same administrative domain of the private network, that are generated charging records or

charging events. The proxies want to send, by means outside SIP, the charging information to the same charging collecting entities than the first proxy.

4.5.2 Usage of the P-Charging-Function-Addresses header

A SIP proxy that receives a SIP request may insert a

P-Charging-Function-Addresses header prior to forwarding the request, if the header was not already present in the SIP request. The header value contains one or more parameters that contain the hostnames or

IP addresses of the nodes that are willing to receive charging

information.

A SIP proxy that receives a SIP request that includes a

P-Charging-Function-Addresses may use the hostnames or IP addresses

included in the value, as the destination of charging information or charging events. The means to send those charging information or

events are outside the scope of this document, and usually, do not

use SIP for that purpose.

4.5.2.1 Procedures at the UA

This document does not specify any procedure at the UA, with regard

to the P-Charging-Function-Addresses header. UAs need not understand this header.

Garcia-Martin, et. al. Informational [Page 19]

However, it might be possible that a UA is located within the

administrative domain of a private network (e.g., a PSTN gateway, or conference mixer), and it may have access to the addresses of the

charging entities. In this cases, a UA MAY insert the

P-Charging-Function-Addresses header in a SIP request or response

when the next hop for the message is a proxy located in the same

administrative domain.

4.5.2.2 Procedures at the Proxy

A SIP proxy that supports this extension and receives a request or

response without the P-Charging-Function-Addresses MAY insert a

P-Charging-Function-Addresses header prior to forwarding the message. The header is populated with a list of the addresses of one or more

charging entities where the proxy should send charging related

information.

If a proxy that supports this extension receives a request or

response with the P-Charging-Function-Addresses, it may retrieve the information from the header value to use with application specific

logic, i.e., charging. If the next hop for the message is within the administrative domain of the proxy, then the proxy SHOULD include the P-Charging-Function-Addresses header in the outbound message.

However, if the next hop for the message is outside the

administrative domain of the proxy, then the proxy MUST remove the

P-Charging-Function-Addresses header.

4.5.2.3 Examples of Usage

We present example in the context of the scenario presented in the

following network diagram:

Scenario UA1 --- P1 --- P2 --- UA2

In the scenario we assume that P1 and P2 belong to the same

administrative domain.

The example below shows the message sequence for an INVITE

transaction originating from UA1 eventually arriving at UA2. P1 is

an outbound proxy for UA1. In this case P1 also inserts charging

information. P1 then routes the call via P2 to UA2.

Message sequence for INVITE using P-Charging-Function-Addresses: Garcia-Martin, et. al. Informational [Page 20]

相关文档