
From nobody Wed May  8 05:08:33 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id A966A12008D; Wed,  8 May 2019 05:08:22 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155731730251.22763.16454068531348168725@ietfa.amsl.com>
Date: Wed, 08 May 2019 05:08:22 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/qtiQbSkqN4fnAxZYeKuGx8RO9zk>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-01.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 12:08:25 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : The Session Initiation Protocol (SIP) Digest Authentication Scheme
        Author          : Rifaat Shekh-Yusef
	Filename        : draft-ietf-sipcore-digest-scheme-01.txt
	Pages           : 8
	Date            : 2019-05-08

Abstract:
   This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for secure
   digest algorithms to replace the broken MD5 algorithm.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-01
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-01

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-01


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Wed May  8 05:12:25 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 086F012006A for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 05:12:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 5yXstqQdasNO for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 05:12:22 -0700 (PDT)
Received: from mail-it1-x12e.google.com (mail-it1-x12e.google.com [IPv6:2607:f8b0:4864:20::12e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E29FA12004C for <sipcore@ietf.org>; Wed,  8 May 2019 05:12:21 -0700 (PDT)
Received: by mail-it1-x12e.google.com with SMTP id l10so3646859iti.3 for <sipcore@ietf.org>; Wed, 08 May 2019 05:12:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=M3OE1jivVgytjdRhqZ7pXrwo6lQTJkf/MYjiTx1xnhU=; b=Oj2s3iDnrc03F2CaeDS0JNzd7ByhA5xi17xp/rWMYx6VTFeYz3HwHuUe4U1SoK2XCt KbwzRb9hcedM55vT8lHNYsA8FKrGwC17sg4UKbzp2Wwg0UfkSQt/JaF9yw0ceZOTfYe/ tQZUlsK4+fH0ct5bdHLra/0dOyb/kRTxnScjB/BHPMZKpKjt6iP61sBZGVmA0zCXsFGW yni3LULGWQy3OUkDuPvNkf/BGAGF/uoIwm9iGS2GbFMnXN/zTWO3FbZO4QtFKmXCi271 lZMAuxX2X3aKpltQS4fqDvfHABYtLu+wsan1iFQZwACXHdqXJxgPkHyqJe0z/Zbn7LWk YaSw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=M3OE1jivVgytjdRhqZ7pXrwo6lQTJkf/MYjiTx1xnhU=; b=Z2KtT7XlXi+sTvlvHBgLByGoi9fVvLplDEetscKnWDMJdahv/zC+QFgfxYM0OWFzTn /70egv2KFe1QeGD+8+ktxJy+NXX6gDk868bpMKO+GZNeQ5qwPvfKbIGY2Uud91oxEWHn z69ptO4YsIv2dvAZnKRoLmdHOk/G4jErdf2VC/mHC6HG/MhSmEhxu6ooNtMSbOv4pXBM L2DlIO6KxRdXabc4SGJkHZLbl53eafPnL7PtoXPMIzRl7m2uu3bsbyioTif8XucgjK1f IdOubEgrWNQeHEAu4++TxakXCn7cwSvppi4iW+8HNjkulYo9XU9nH9CmbHGLg69SyIB0 Nnxg==
X-Gm-Message-State: APjAAAUzpDNYltLJ7Oz1cIujeWYUyxmhnrTnB5n6jr9AQzcGcOK5lN5D OlkeAvamsc9DyOGVgvLffyvzhcXoePDC6ymiRQ40uqSAS7c=
X-Google-Smtp-Source: APXvYqz7agQ+k2+0xcRAAklEYcAD0EVR82FL4tlvT67SQsB5VOF6U2xOx9pownoh/ux0D6/04Eg6aMQeGT0EXRiDggo=
X-Received: by 2002:a02:6a28:: with SMTP id l40mr25967250jac.25.1557317541225;  Wed, 08 May 2019 05:12:21 -0700 (PDT)
MIME-Version: 1.0
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com>
In-Reply-To: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Wed, 8 May 2019 08:12:10 -0400
Message-ID: <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com>
To: "A. Jean Mahoney" <mahoney@nostrum.com>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000d8ea0905885f3e63"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/dlxbapV8s1McVpdw18V81cpeGSM>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 12:12:24 -0000

--000000000000d8ea0905885f3e63
Content-Type: text/plain; charset="UTF-8"

I have submitted a new version of the draft to address the only comments I
received during this time from Christer.
https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/

Regards,
 Rifaat


On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney <mahoney@nostrum.com> wrote:

> Hi all,
>
> This starts a 2-week Working Group Last Call for
> draft-ietf-sipcore-digest-scheme. Please send your comments to the list
> by May 6.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> Thanks!
>
> Jean
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--000000000000d8ea0905885f3e63
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">I have submitted a new version of the dra=
ft to address the only comments I received during this time from Christer.<=
div><a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-s=
cheme/">https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/<=
/a><br></div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div>=
<br></div></div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=
=3D"gmail_attr">On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney &lt;<a href=
=3D"mailto:mahoney@nostrum.com">mahoney@nostrum.com</a>&gt; wrote:<br></div=
><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border=
-left:1px solid rgb(204,204,204);padding-left:1ex">Hi all,<br>
<br>
This starts a 2-week Working Group Last Call for <br>
draft-ietf-sipcore-digest-scheme. Please send your comments to the list <br=
>
by May 6.<br>
<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-sipcore-digest-scheme/</a><br>
<br>
Thanks!<br>
<br>
Jean<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>

--000000000000d8ea0905885f3e63--


From nobody Wed May  8 05:43:16 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C95901200F6 for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 05:43:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SrWCu6qzuYoI for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 05:43:12 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70084.outbound.protection.outlook.com [40.107.7.84]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B113A120089 for <sipcore@ietf.org>; Wed,  8 May 2019 05:43:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hZ4aWAWUD2AMJPP2vpzOaj5GojawJILvbS/JtTxmZq8=; b=kua1ajes//Uaw7q9umH18ntAjl+IeCt4uR4Kkv0Fbkg/uP4rjore+chk7HOa1ASEXioUlfWAeSeZufXipZD4QTF8Gv2MxCrzCTsfbSHWd8lwQCtXc4sbo8he6ywna45fpEDhDrg7rXmf6k5LWIeG+RBUf/uXfBEbjgQYKkYx+NQ=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB4188.eurprd07.prod.outlook.com (20.176.166.29) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.18; Wed, 8 May 2019 12:43:08 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1878.019; Wed, 8 May 2019 12:43:08 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, "A. Jean Mahoney" <mahoney@nostrum.com>
CC: SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
Thread-Index: AQHU+UFBI5+mE+EEBUOqnq66N/NDDaZhPAMAgAA68gA=
Date: Wed, 8 May 2019 12:43:08 +0000
Message-ID: <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com>
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com>
In-Reply-To: <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.18.0.190414
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: a05dde85-4342-4105-091f-08d6d3b2b983
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB4188; 
x-ms-traffictypediagnostic: HE1PR07MB4188:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <HE1PR07MB4188DF7B4FCD0F03D76541FD93320@HE1PR07MB4188.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0031A0FFAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(396003)(136003)(39860400002)(346002)(199004)(189003)(18543002)(53754006)(446003)(66066001)(6436002)(11346002)(6246003)(6486002)(68736007)(81166006)(81156014)(66946007)(76116006)(73956011)(4326008)(66446008)(66476007)(66556008)(64756008)(478600001)(229853002)(606006)(102836004)(3846002)(53546011)(6116002)(6506007)(5660300002)(99286004)(186003)(76176011)(486006)(7736002)(476003)(2616005)(236005)(2906002)(82746002)(26005)(71190400001)(83716004)(71200400001)(33656002)(86362001)(14454004)(110136005)(58126008)(6512007)(44832011)(54896002)(6306002)(8676002)(316002)(36756003)(53936002)(8936002)(256004)(966005)(25786009); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB4188; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 6AmjH+yrOXvvYhZaiNh+cYW2Zm6I5njvgD5VDRBLasbnUaBUxcYYVTi74XgyIPehV65xjKs6YtJNU0EY7D8ZKACNxmi7beNJthGG71m7cTTlCYWXE6HUibk/g8V4nUf1TMhfrsZuRn/kfj8H841usIyGCVujA8DCkS9s7F0PFmpKiNJ2/ilcNknr0hs0ubO2tMz9D2QG6Mf6c067R8/9T5lItCO3SAqLaxyk4+SS1zx/Jf3q14e4bmQgKe5wqWl5ch807/4v5xsyOUORnFcWtsmhGM+FBIVZKOrm/AjZyoc5veCsRU2SJdMi6R9Q5lzMiXhQCmHI9zyGX8vhD8lngaC80Ss8gpD6vDe2NdvqUip9yKOdOpAVl8tpK1+hPGLWjFVR8bna305Y9GPmbgIuBd+MMisCyvG3Iu9LoWnmMg4=
Content-Type: multipart/alternative; boundary="_000_72C482929D284EC8888A2F912277A166ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: a05dde85-4342-4105-091f-08d6d3b2b983
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 May 2019 12:43:08.8226 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4188
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/1Ko68awYT4A8ULuCjaC8N3sXugg>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 12:43:15 -0000

--_000_72C482929D284EC8888A2F912277A166ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_72C482929D284EC8888A2F912277A166ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <391D1927B34998409B2431D2FF744771@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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==

--_000_72C482929D284EC8888A2F912277A166ericssoncom_--


From nobody Wed May  8 05:50:18 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DBC2E1200F6 for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 05:50:16 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id E9iIEcQx8l0T for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 05:50:14 -0700 (PDT)
Received: from mail-it1-x135.google.com (mail-it1-x135.google.com [IPv6:2607:f8b0:4864:20::135]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A783C120089 for <sipcore@ietf.org>; Wed,  8 May 2019 05:50:14 -0700 (PDT)
Received: by mail-it1-x135.google.com with SMTP id m186so3694482itd.4 for <sipcore@ietf.org>; Wed, 08 May 2019 05:50:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=t6YEVUcE92JjDJOeMAIZjicYgWRMKP7kMTU3nz5aXuo=; b=lyp3cE1DTvAWZbd6NF4MX/pJcL3NZUEAEU6IF5/shWEs4bnUWUNMrXMwJtg105gb96 wWC9kOj9T/kQjgyTnqSyifchMfLhwQhvaKsVaY+u1c8MxHck3Xlz0QC+NCkfSsLGjkBr TwYrmivaYto0G2fgW6eYh7s4O0nTPCYhe6cGZhYjGwnUasTdFbjozZHBBVCO+KsiTfcL pELQQI/BGsIC7YPfil3CvbuVibqpgpYyCxrdaUS2bSUcOUghATBrFYjD+4Lc3rCJMch5 Ty1Zie9kRwOZyK42TvGBeR7eJN34rbXV2Zi113ZpTg0lUeaXB1DdEeENfvDSHIcxJRfR aypw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=t6YEVUcE92JjDJOeMAIZjicYgWRMKP7kMTU3nz5aXuo=; b=o/mDGCuOOCCDh7ZB/cmLriVNnWQhw+Aee9PQxt5gNDhDvZtOsbEF2ZhrTzp5rYQvLK 7qhL5m3/qTc1zvL1dk/vKe7ED25eX9fqUrP5SgIKKbLMDsRfuj+C1VRIFf+Gh2m81LJW +OI3Xx9B8pCqWjAh8yB/pp+UI8YLltmb/VSHOUDakJbOyAV5WSwYhW3kmK3l+HFXIkEb z1m8CctyWHxpdInP+2hStnCL8EzcmnC3KvjRNbcLpTA/gDlYs5PQuxT5B2j8y5x5zuAw pz+hqv7OzjFZ+XEHzIQaJdNWPrdhbK1rDja2S6/9ZJUPNG2C3qwrprfHFw41EeMH+Xvs iHBA==
X-Gm-Message-State: APjAAAVWCNgdCJjAqBybpZvr33Wq0lapEdry2zhle+NEyG6zEW4GFDWm +ED1qBZJLNsXu1B34599UEN3QD6X/5kLzxrIxVI=
X-Google-Smtp-Source: APXvYqxilDKu9NlG3k5YquioZFf4xoHsx6NrShrbCzoxUfILlPW3j0C+8hB5S/y2Q5ahakxoXh3HEBlO6j/eiB47Y14=
X-Received: by 2002:a05:660c:12c4:: with SMTP id k4mr3078254itd.165.1557319814011;  Wed, 08 May 2019 05:50:14 -0700 (PDT)
MIME-Version: 1.0
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com> <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com>
In-Reply-To: <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Wed, 8 May 2019 08:50:02 -0400
Message-ID: <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "A. Jean Mahoney" <mahoney@nostrum.com>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000050de5a05885fc639"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/-DYUFE9Z1lV5udB3eKyoveNLVkM>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 12:50:17 -0000

--00000000000050de5a05885fc639
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Hi Christer,

I added the following statement to section 2.6:

   For completeness, the bullets specified below are mostly copied
from section 22.4 of
   [RFC3261]; the only semantic changes are specified in bullets 7 and 8 be=
low.


Does this address your Q1 comment?

Regards,
 Rifaat



On Wed, May 8, 2019 at 8:43 AM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi Rifaat,
>
>
>
> When comparing the new version with the previous, it seems like you have
> addressed Q2, regarding =E2=80=9Cheader field=E2=80=9D terminology.
>
>
>
> However, I don=E2=80=99t think you have addressed Q1, and I have not seen=
 any
> reply where you would indicate that you don=E2=80=99t agree with my comme=
nt etc.
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
> *From: *sipcore <sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Wednesday, 8 May 2019 at 15.17
> *To: *"A. Mahoney" <mahoney@nostrum.com>
> *Cc: *"sipcore@ietf.org" <sipcore@ietf.org>
> *Subject: *Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
>
>
>
> I have submitted a new version of the draft to address the only comments =
I
> received during this time from Christer.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
> On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney <mahoney@nostrum.com>
> wrote:
>
> Hi all,
>
> This starts a 2-week Working Group Last Call for
> draft-ietf-sipcore-digest-scheme. Please send your comments to the list
> by May 6.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> Thanks!
>
> Jean
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>

--00000000000050de5a05885fc639
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi Christer,<div><br></div><div>I added the following stat=
ement to section 2.6:</div><div><br></div><div><pre style=3D"box-sizing:bor=
der-box;overflow:auto;font-family:&quot;PT Mono&quot;,Monaco,monospace;font=
-size:14px;padding:10px;margin-top:0px;margin-bottom:10.5px;line-height:1.2=
14;color:rgb(0,0,0);word-break:break-all;background-color:rgb(255,253,245);=
border:1px solid rgb(204,204,204);border-radius:4px">   For completeness, t=
he bullets specified below are mostly copied from section 22.4 of
   [RFC3261]; the only semantic changes are specified in bullets 7 and 8 be=
low.</pre></div><div><br></div><div>Does this address your Q1 comment?</div=
><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div><d=
iv><br></div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D=
"gmail_attr">On Wed, May 8, 2019 at 8:43 AM Christer Holmberg &lt;<a href=
=3D"mailto:christer.holmberg@ericsson.com">christer.holmberg@ericsson.com</=
a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0p=
x 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">





<div lang=3D"FI">
<div class=3D"gmail-m_-9007831913827870230WordSection1">
<p class=3D"MsoNormal">Hi Rifaat,<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">When comparing the new version =
with the previous, it seems like you have addressed Q2, regarding =E2=80=9C=
header field=E2=80=9D terminology.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">However, I don=E2=80=99t think =
you have addressed Q1, and I have not seen any reply where you would indica=
te that you don=E2=80=99t agree with my comment etc.<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From: =
</span></b><span style=3D"font-size:12pt;color:black">sipcore &lt;<a href=
=3D"mailto:sipcore-bounces@ietf.org" target=3D"_blank">sipcore-bounces@ietf=
.org</a>&gt; on behalf of Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.i=
etf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Date: </b>Wednesday, 8 May 2019 at 15.17<br>
<b>To: </b>&quot;A. Mahoney&quot; &lt;<a href=3D"mailto:mahoney@nostrum.com=
" target=3D"_blank">mahoney@nostrum.com</a>&gt;<br>
<b>Cc: </b>&quot;<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipc=
ore@ietf.org</a>&quot; &lt;<a href=3D"mailto:sipcore@ietf.org" target=3D"_b=
lank">sipcore@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme<u></u>=
<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">I have submitted a new version of the draft to addre=
ss the only comments I received during this time from Christer.
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><a href=3D"https://datatracker.ietf.org/doc/draft-ie=
tf-sipcore-digest-scheme/" target=3D"_blank">https://datatracker.ietf.org/d=
oc/draft-ietf-sipcore-digest-scheme/</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney &lt;=
<a href=3D"mailto:mahoney@nostrum.com" target=3D"_blank">mahoney@nostrum.co=
m</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<p class=3D"MsoNormal">Hi all,<br>
<br>
This starts a 2-week Working Group Last Call for <br>
draft-ietf-sipcore-digest-scheme. Please send your comments to the list <br=
>
by May 6.<br>
<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sipcore-d=
igest-scheme/</a><br>
<br>
Thanks!<br>
<br>
Jean<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank"=
>https://www.ietf.org/mailman/listinfo/sipcore</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>

</blockquote></div>

--00000000000050de5a05885fc639--


From nobody Wed May  8 06:03:51 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id A911E120104 for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 06:03:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id zg9bQcQiRHYp for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 06:03:45 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150054.outbound.protection.outlook.com [40.107.15.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 64C6F1200FE for <sipcore@ietf.org>; Wed,  8 May 2019 06:03:45 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=qYkffemWwtRTZUuQUPxR6dekh2mLgXjpsf/kqg2mlxI=; b=NpQB+JiZrwTOgmTjRc2diA244MkxjhLjltjzpUdkvrHeYNpD+iougNGgrVhZ+TNGR7ayBodhv9xvsmR6WwdCY947FAI3rDZSCxTNG2EkiikE86R5QsnlfbePh9hvSFri67msq+wgqGZkmhLNvzC2UGsmOVSWpANjvXJhJks2a0Q=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3209.eurprd07.prod.outlook.com (10.170.246.12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.11; Wed, 8 May 2019 13:03:42 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1878.019; Wed, 8 May 2019 13:03:42 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "A. Jean Mahoney" <mahoney@nostrum.com>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
Thread-Index: AQHU+UFBI5+mE+EEBUOqnq66N/NDDaZhPAMAgAA68gD//8+iAIAANhuA
Date: Wed, 8 May 2019 13:03:42 +0000
Message-ID: <A299A1C1-60A3-4F8D-9B84-44A79C9999BA@ericsson.com>
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com> <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com> <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com>
In-Reply-To: <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.18.0.190414
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5419db49-65c4-41fa-9a81-08d6d3b598c2
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB3209; 
x-ms-traffictypediagnostic: HE1PR07MB3209:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <HE1PR07MB3209DEAF857B6BB6F56BD68493320@HE1PR07MB3209.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0031A0FFAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(376002)(346002)(39860400002)(396003)(366004)(53754006)(18543002)(199004)(189003)(6486002)(966005)(6436002)(54906003)(14454004)(68736007)(229853002)(316002)(256004)(102836004)(66476007)(64756008)(66446008)(14444005)(6506007)(53546011)(478600001)(66556008)(99286004)(2906002)(83716004)(71190400001)(71200400001)(5660300002)(58126008)(76176011)(8936002)(8676002)(36756003)(476003)(25786009)(6916009)(81156014)(81166006)(66066001)(2616005)(486006)(33656002)(7736002)(53936002)(6246003)(11346002)(44832011)(236005)(6306002)(54896002)(6512007)(73956011)(66946007)(76116006)(6116002)(3846002)(606006)(82746002)(86362001)(26005)(4326008)(186003)(446003); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3209; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Gz3QcFIEhSV0oFc6e/Bnxdu0FU0ECZbF5+D1zK68dnvAtGOEL/z+owVsQbTC5g5wpC5BRY165FzKnWaZ9LvN69bga5i6BO4Q7KJvFjh5INEJ6Kafe8AO3GtTrC4NaK12RlnjhOvdGPLD7Z+58INiPJjJeGB0S6vd0fcuoiDgAgmiTLx9Leg76iCQJ5sfxGMGKSNRT3N7qIi6DUjyzcYvtuA8Ss9YgsGUYYMRCGELYyZihCjZP485F99jpLvM1DK3j0roVUOk/harKDFoF20wMvGaFrPlMqHn3Q3/qATXkichtjt4bDKixmbzB44+GsjJnsbU8pGhrIzCDvrnEHDLw5ahB1rRuyCnyEG0eBTdxidyVwAVgHIAzNsFku/QUGmvlX6O5dbdzFy7KTDZcv7ySiOUwXprUdh4ETWNLSga8NY=
Content-Type: multipart/alternative; boundary="_000_A299A1C160A34F8D9B8444A79C9999BAericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5419db49-65c4-41fa-9a81-08d6d3b598c2
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 May 2019 13:03:42.3816 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3209
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/AQ0gf80ee4JL_i2aZolN7q43sRo>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 13:03:50 -0000

--_000_A299A1C160A34F8D9B8444A79C9999BAericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_A299A1C160A34F8D9B8444A79C9999BAericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <199AFD847B578942860E7F2DC5C4DAE9@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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==

--_000_A299A1C160A34F8D9B8444A79C9999BAericssoncom_--


From nobody Wed May  8 06:31:08 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6BBB112014A for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 06:31:06 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id gR8-z2sCJL9T for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 06:31:04 -0700 (PDT)
Received: from mail-io1-xd34.google.com (mail-io1-xd34.google.com [IPv6:2607:f8b0:4864:20::d34]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D22411202D0 for <sipcore@ietf.org>; Wed,  8 May 2019 06:31:00 -0700 (PDT)
Received: by mail-io1-xd34.google.com with SMTP id m14so17079605ion.13 for <sipcore@ietf.org>; Wed, 08 May 2019 06:31:00 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=2ljiuVYIF3+6G58PQsXaeHZ1PZlQ+vMMw7M1YuznEEU=; b=o12d/A0xNHKJ10roiphP95go9YiUnYiftnOmLhBnFW5tH0bhkepOSIXb/5HrQnD4ZN LXmFZCOkpgodY1d8AWdsMuoat5Gj/CfLHgn31Oowh7yUxwS7/DKGYyNuDdOsz8wLF1cX qmEYycn8dG6EJs2MxadT4Sf8zSaqOC6zolyMS3d+x8uAi/27dN18EEK7R39uEI4p5en2 kpEuvzgJ3PTY2bvRC9iLTRY7oBsHNlOF/s8iXvBrWUjp2pLPorIrXO8xjThtgKQY3FMR gVPsitadTDbJ2xFs/wjMPzlFiwnN152p+IZ/T4KTP595fIW44yrnF8miv+jx0s9Ez7N9 Fr4Q==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=2ljiuVYIF3+6G58PQsXaeHZ1PZlQ+vMMw7M1YuznEEU=; b=ilGVsBukIgBwxQR5LorYT06yK6SuYM0Cc6jZoGQGlb4wHExuQY1uzbdIyASsQN4W7n WMfTFEfsswfWgN/f2ZXuskSL/nZJbd2Xm0ikC1XnwzdvIWTvDpp0Fjjam56dbWHeF1zd TIHN5KRlVmLesFwlnFxxmENE0DZIyyFvFI5lDOmUPSJGftJlwpguU0aVW4/BZKyXl1JN mr3QlqfDdDxyso9J1DleGkcCbLw5gsZnU2iaF3yKGyoIaxEw2RtejEOjQ5JadmwiV3GU EDnuUbIyAhBIRpP6VcJZNLKsKjfNwG2f4Y2ID32cPV65Yaw7G9iE+8Dn9c4jlxlWFWor 6R4g==
X-Gm-Message-State: APjAAAW9wQP1a63hIUGcMeK+jIl40av+3b0YL85dwcQwBplA8JxSfgwQ h/sLExEzTr43d8ERSLBnPxOTZeL0WdycM3pkvkM=
X-Google-Smtp-Source: APXvYqxtRT5SPMeGN/hH+LPmu3ulusLk++pR/9c+yL5Tew498MolYUsoXWKsP13uEFgubBQixMfIB5ULtpMveMR1nw4=
X-Received: by 2002:a6b:3108:: with SMTP id j8mr2619202ioa.0.1557322260193; Wed, 08 May 2019 06:31:00 -0700 (PDT)
MIME-Version: 1.0
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com> <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com> <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com> <A299A1C1-60A3-4F8D-9B84-44A79C9999BA@ericsson.com>
In-Reply-To: <A299A1C1-60A3-4F8D-9B84-44A79C9999BA@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Wed, 8 May 2019 09:30:49 -0400
Message-ID: <CAGL6ep+JyBZfU2i0KH7y6UfKxzkT8HUkYanN83WgtSbYLRW-fg@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "A. Jean Mahoney" <mahoney@nostrum.com>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000001eac0d0588605833"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/FseeQiYw1Dl4kqI0lcOhUAj_Exo>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 13:31:06 -0000

--0000000000001eac0d0588605833
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I believe that each section has enough details that describe what is being
changed.
I am not sure how rearranging the sections makes it better, but I do not
mind doing that if that addresses your concerns.

Regards,
 Rifaat



On Wed, May 8, 2019 at 9:03 AM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
>
>
> Section 2.6 only covers one update. My comment was that I would like to
> have an high-level description of the updates to RFC 3261 that are done i=
n
> section 2 and 3.
>
>
>
> Perhaps changing the name of section 2 to =E2=80=9CUpdates to RFC 3261=E2=
=80=9D, and then
> change section 3 to section 2.7.
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
> *From: *Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Wednesday, 8 May 2019 at 15.52
> *To: *Christer Holmberg <christer.holmberg@ericsson.com>
> *Cc: *"A. Mahoney" <mahoney@nostrum.com>, "sipcore@ietf.org" <
> sipcore@ietf.org>
> *Subject: *Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
>
>
>
> Hi Christer,
>
>
>
> I added the following statement to section 2.6:
>
>
>
>    For completeness, the bullets specified below are mostly copied from s=
ection 22.4 of
>
>    [RFC3261]; the only semantic changes are specified in bullets 7 and 8 =
below.
>
>
>
> Does this address your Q1 comment?
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
>
>
> On Wed, May 8, 2019 at 8:43 AM Christer Holmberg <
> christer.holmberg@ericsson.com> wrote:
>
> Hi Rifaat,
>
>
>
> When comparing the new version with the previous, it seems like you have
> addressed Q2, regarding =E2=80=9Cheader field=E2=80=9D terminology.
>
>
>
> However, I don=E2=80=99t think you have addressed Q1, and I have not seen=
 any
> reply where you would indicate that you don=E2=80=99t agree with my comme=
nt etc.
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
> *From: *sipcore <sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Wednesday, 8 May 2019 at 15.17
> *To: *"A. Mahoney" <mahoney@nostrum.com>
> *Cc: *"sipcore@ietf.org" <sipcore@ietf.org>
> *Subject: *Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
>
>
>
> I have submitted a new version of the draft to address the only comments =
I
> received during this time from Christer.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
> On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney <mahoney@nostrum.com>
> wrote:
>
> Hi all,
>
> This starts a 2-week Working Group Last Call for
> draft-ietf-sipcore-digest-scheme. Please send your comments to the list
> by May 6.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> Thanks!
>
> Jean
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>

--0000000000001eac0d0588605833
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>I believe that each section has enough details that d=
escribe what is being changed.</div><div>I am not sure how rearranging the =
sections makes it better, but I do not mind doing that if that addresses yo=
ur=C2=A0concerns.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat<=
/div><div><br></div><div>=C2=A0<br></div></div><br><div class=3D"gmail_quot=
e"><div dir=3D"ltr" class=3D"gmail_attr">On Wed, May 8, 2019 at 9:03 AM Chr=
ister Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christ=
er.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail=
_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204=
,204);padding-left:1ex">





<div lang=3D"FI">
<div class=3D"gmail-m_7276935653234352001WordSection1">
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Section 2.6 only covers one upd=
ate. My comment was that I would like to have an high-level description of =
the updates to RFC 3261 that are done in section 2 and 3.<u></u><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Perhaps changing the name of se=
ction 2 to =E2=80=9CUpdates to RFC 3261=E2=80=9D, and then change section 3=
 to section 2.7.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From: =
</span></b><span style=3D"font-size:12pt;color:black">Rifaat Shekh-Yusef &l=
t;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gm=
ail.com</a>&gt;<br>
<b>Date: </b>Wednesday, 8 May 2019 at 15.52<br>
<b>To: </b>Christer Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericss=
on.com" target=3D"_blank">christer.holmberg@ericsson.com</a>&gt;<br>
<b>Cc: </b>&quot;A. Mahoney&quot; &lt;<a href=3D"mailto:mahoney@nostrum.com=
" target=3D"_blank">mahoney@nostrum.com</a>&gt;, &quot;<a href=3D"mailto:si=
pcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a>&quot; &lt;<a href=3D=
"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme<u></u>=
<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Hi Christer, <u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I added the following statement to section 2.6:<u></=
u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<div style=3D"border:1pt solid rgb(204,204,204);padding:8pt;background:rgb(=
255,253,245)">
<pre style=3D"margin-bottom:7.9pt;background:rgb(255,253,245);word-break:br=
eak-all;border:none;padding:0cm;box-sizing:border-box;border-radius:4px;ove=
rflow:auto"><span style=3D"font-size:10.5pt;font-family:&quot;PT Mono&quot;=
;color:black">=C2=A0=C2=A0 For completeness, the bullets specified below ar=
e mostly copied from section 22.4 of<u></u><u></u></span></pre>
<pre style=3D"margin-bottom:7.9pt;background:rgb(255,253,245);word-break:br=
eak-all;border:none;padding:0cm"><span style=3D"font-size:10.5pt;font-famil=
y:&quot;PT Mono&quot;;color:black">=C2=A0=C2=A0 [RFC3261]; the only semanti=
c changes are specified in bullets 7 and 8 below.<u></u><u></u></span></pre=
>
</div>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Does this address your Q1 comment?<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Wed, May 8, 2019 at 8:43 AM Christer Holmberg &lt=
;<a href=3D"mailto:christer.holmberg@ericsson.com" target=3D"_blank">christ=
er.holmberg@ericsson.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal">Hi Rifaat,<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">When comparing the new version =
with the previous, it seems like you have addressed Q2, regarding =E2=80=9C=
header field=E2=80=9D terminology.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">However, I don=E2=80=99t think =
you have addressed Q1, and I have not seen any reply where you would indica=
te that you don=E2=80=99t agree with my comment etc.</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From:
</span></b><span style=3D"font-size:12pt;color:black">sipcore &lt;<a href=
=3D"mailto:sipcore-bounces@ietf.org" target=3D"_blank">sipcore-bounces@ietf=
.org</a>&gt; on behalf of Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.i=
etf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Date: </b>Wednesday, 8 May 2019 at 15.17<br>
<b>To: </b>&quot;A. Mahoney&quot; &lt;<a href=3D"mailto:mahoney@nostrum.com=
" target=3D"_blank">mahoney@nostrum.com</a>&gt;<br>
<b>Cc: </b>&quot;<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipc=
ore@ietf.org</a>&quot; &lt;<a href=3D"mailto:sipcore@ietf.org" target=3D"_b=
lank">sipcore@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme</span>=
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">I have submitted a new version of the draft to addre=
ss the only comments I received during this time from Christer.
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><a href=3D"https://datatracker.ietf.org/doc/draft-ie=
tf-sipcore-digest-scheme/" target=3D"_blank">https://datatracker.ietf.org/d=
oc/draft-ietf-sipcore-digest-scheme/</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney &lt;=
<a href=3D"mailto:mahoney@nostrum.com" target=3D"_blank">mahoney@nostrum.co=
m</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin:5pt 0c=
m 5pt 4.8pt">
<p class=3D"MsoNormal">Hi all,<br>
<br>
This starts a 2-week Working Group Last Call for <br>
draft-ietf-sipcore-digest-scheme. Please send your comments to the list <br=
>
by May 6.<br>
<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sipcore-d=
igest-scheme/</a><br>
<br>
Thanks!<br>
<br>
Jean<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank"=
>https://www.ietf.org/mailman/listinfo/sipcore</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>
</blockquote>
</div>
</div>
</div>

</blockquote></div>

--0000000000001eac0d0588605833--


From nobody Wed May  8 07:09:35 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4E057120026 for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 07:09:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QuUStJ5YsOUE for <sipcore@ietfa.amsl.com>; Wed,  8 May 2019 07:09:31 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30081.outbound.protection.outlook.com [40.107.3.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 79F0D120089 for <sipcore@ietf.org>; Wed,  8 May 2019 07:09:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Om+KHYhykibkrvf9US6Z9yX1IDCP8LVK2UCxvymzq6Q=; b=DuoI/iitE4eeA1uKUb/LxnHe+BA5UdOGhwtrk0hYb9Yor6wywZvjN4QrNC9dIyqMXwsgiA84p9P2EcO5oJ22ok7cdGc1Plycoq6QFQTF/e6xfpz09fQIud2nUGRsO5ieEbpsyn9us2rtkaQ84txn+vEwhLYPT62JLzfId92qlIk=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3372.eurprd07.prod.outlook.com (10.170.247.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1878.11; Wed, 8 May 2019 14:09:27 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1878.019; Wed, 8 May 2019 14:09:27 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "A. Jean Mahoney" <mahoney@nostrum.com>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
Thread-Index: AQHU+UFBI5+mE+EEBUOqnq66N/NDDaZhPAMAgAA68gD//8+iAIAANhuA///VS4CAAD0VgA==
Date: Wed, 8 May 2019 14:09:27 +0000
Message-ID: <BE6EA965-8405-4888-9C15-BD4BD5408657@ericsson.com>
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com> <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com> <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com> <A299A1C1-60A3-4F8D-9B84-44A79C9999BA@ericsson.com> <CAGL6ep+JyBZfU2i0KH7y6UfKxzkT8HUkYanN83WgtSbYLRW-fg@mail.gmail.com>
In-Reply-To: <CAGL6ep+JyBZfU2i0KH7y6UfKxzkT8HUkYanN83WgtSbYLRW-fg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.18.0.190414
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: bd94597b-2556-4124-ee0b-08d6d3bec86b
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB3372; 
x-ms-traffictypediagnostic: HE1PR07MB3372:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <HE1PR07MB3372CBF1B071EE3C899512CC93320@HE1PR07MB3372.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0031A0FFAF
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(396003)(376002)(346002)(39860400002)(136003)(189003)(199004)(53754006)(18543002)(33656002)(36756003)(6246003)(6486002)(58126008)(14454004)(5660300002)(53936002)(81166006)(8676002)(4326008)(966005)(102836004)(236005)(316002)(76116006)(486006)(73956011)(476003)(81156014)(11346002)(66066001)(446003)(8936002)(6436002)(2616005)(6306002)(54896002)(68736007)(6512007)(7736002)(606006)(99286004)(76176011)(26005)(6116002)(186003)(3846002)(6506007)(14444005)(53546011)(229853002)(83716004)(256004)(54906003)(71190400001)(71200400001)(25786009)(478600001)(66446008)(64756008)(66946007)(2906002)(44832011)(66556008)(66476007)(82746002)(86362001)(6916009); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3372; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: iNs1i9lpfigWVZ+YJCHIrJXQJc0NEM9H17HUeSV6vx4r/XSlHuy7qUVkh4c/tJBbK+fuckOq6fsPH7Z8zrHrm2tcscRqDhOW6y3wUQn66kNP4EB6prjfJYS/ODajyZzaVrw+oXZ4RnrAqkWt/DhQgTFSp6dNUsvosCCVidt/8KVCm+EmfFncC1JV/6OSijZWdpvOmPEKgrDpidWw5+AGRfhBb17WZjWgDt8eGDuskDaRI+FT03862SpYrD3oPZ4tN4dtI+1Ziwkb7YQiO5035zRHtEXIeXNdbdZ3+v8yk2gERDtDFMnxd+eggFBOAsNTn734pDdZJG0DfxJzTd9KeEPmkV2m2AmoqIgvMcfQ2RvAGxyYSlpAkDTjN0PABtSKNEp8JV9Vzo5lC5EjeNRx47RAPclRzkd7DPVriSY1Aqs=
Content-Type: multipart/alternative; boundary="_000_BE6EA965840548889C15BD4BD5408657ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: bd94597b-2556-4124-ee0b-08d6d3bec86b
X-MS-Exchange-CrossTenant-originalarrivaltime: 08 May 2019 14:09:27.7728 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3372
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/NKjZyY5k5LtHzPuhurPsBNUeie8>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 08 May 2019 14:09:33 -0000

--_000_BE6EA965840548889C15BD4BD5408657ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_BE6EA965840548889C15BD4BD5408657ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <80089C45C5BF95468527E1C5409D0F38@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_BE6EA965840548889C15BD4BD5408657ericssoncom_--


From nobody Thu May  9 12:39:06 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B9FD1120131; Thu,  9 May 2019 12:38:56 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155743073666.24648.13236304346000054465@ietfa.amsl.com>
Date: Thu, 09 May 2019 12:38:56 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/AbE8lxhV4gIZuhnXMkoUISFrPHw>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-02.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 19:38:57 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : The Session Initiation Protocol (SIP) Digest Authentication Scheme
        Author          : Rifaat Shekh-Yusef
	Filename        : draft-ietf-sipcore-digest-scheme-02.txt
	Pages           : 8
	Date            : 2019-05-09

Abstract:
   This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for secure
   digest algorithms to replace the broken MD5 algorithm.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-02
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-02

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-02


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu May  9 12:40:34 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id F02AE1200F4 for <sipcore@ietfa.amsl.com>; Thu,  9 May 2019 12:40:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bJEyI-Yq4AfA for <sipcore@ietfa.amsl.com>; Thu,  9 May 2019 12:40:30 -0700 (PDT)
Received: from mail-it1-x12f.google.com (mail-it1-x12f.google.com [IPv6:2607:f8b0:4864:20::12f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8148F120025 for <sipcore@ietf.org>; Thu,  9 May 2019 12:40:30 -0700 (PDT)
Received: by mail-it1-x12f.google.com with SMTP id g71so5316285ita.5 for <sipcore@ietf.org>; Thu, 09 May 2019 12:40:30 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=wQwRF0Yt+tV/qunq5qNjNhVI0X8BqKJQX3SfbN/r6KA=; b=sga6+P5bWpeg7G3rTvOyutzHPgD3qqmGxMleIDucTO5mExsUwEGW1dGApU4SIH2yQj AafTM6QxrwTMybgKAXkblLAPpiNdpOPQv/ibhQDX4xHSNZKm0fPF/NF5QiymN7ebGcsm 13qLFdDK5+wWBOsL+CcBCh6cTOWZ3/cZvmIj/kfhDCZBu99G+xqKpFQe7CYhPHqZVUbj fUUWyTqqw9MVjlbu4NwoZt/xGg9pmv/YLGljO8myzMqLNOOVu7hndOBxNLApnZf2m5ve DA70WJVZXMS35T+q1GAqjBdF6EYL6LRlmf9FRXhEXh6pwywcXAbHKHbUQN398ePWF50o MiXw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=wQwRF0Yt+tV/qunq5qNjNhVI0X8BqKJQX3SfbN/r6KA=; b=l5jKgq0sSHKllcX/0D1yy8+R00KQ8ARPB2xrgCc4sARPqyy6nVV2pSnZWTQj5ddMtd Cbh1W05HB5A6hTx5XOdmCypiluBcpcowJZZpDWin9INVOxnVeJ2H50MoQ6QZcTDLd8z9 8XGEFAZO7EbCk9PbRiK7v7q5NUxoUBI5xjiN4Vq8s/B1m3qbzrvFCatcBYX0Z6yCFtgr 3vJEGK55rlvpeWSE8wLvBwttNnyr+1lOQU0JSHbKPUFiQfsVfuQ1LmsHLzDLKMvypBcj m4I+Y4A1QfH9vwlDa7U6JdKyCn4cqeubasYTlZlFyNq6N574qoPS2Bi2ct8ORVAjU9sm IqlQ==
X-Gm-Message-State: APjAAAWkM+gE1/BxcbVWscuLf6Ol8rS/d1P3NxVXKZYfvWR2yLg63QAJ IxgoAjhcjR62W2mngomZFvf7t3mvDppXV/0xSXQ=
X-Google-Smtp-Source: APXvYqyN9ur+aukQnVMiaPewWO52ePqL5f9CC1ikORRvQbbTK3jGan+0LnYCxy4wUqVp2nJUu2SEk9nOg8hCYqrT8cM=
X-Received: by 2002:a24:3201:: with SMTP id j1mr4794448ita.107.1557430829845;  Thu, 09 May 2019 12:40:29 -0700 (PDT)
MIME-Version: 1.0
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com> <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com> <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com> <A299A1C1-60A3-4F8D-9B84-44A79C9999BA@ericsson.com> <CAGL6ep+JyBZfU2i0KH7y6UfKxzkT8HUkYanN83WgtSbYLRW-fg@mail.gmail.com> <BE6EA965-8405-4888-9C15-BD4BD5408657@ericsson.com>
In-Reply-To: <BE6EA965-8405-4888-9C15-BD4BD5408657@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 9 May 2019 15:40:18 -0400
Message-ID: <CAGL6epK8WmBf3DAxTx6+NTFMAnh7BWzSFEKKtqAi+9QZP_jC4Q@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "A. Jean Mahoney" <mahoney@nostrum.com>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000006011ee0588799f14"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/PXoxVY8NNUYgJttcigePymneQk8>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 09 May 2019 19:40:33 -0000

--0000000000006011ee0588799f14
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Done.

On Wed, May 8, 2019 at 10:09 AM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
>
>
> >I believe that each section has enough details that describe what is
> being changed.
>
> >I am not sure how rearranging the sections makes it better, but I do not
> mind doing that if that addresses your concerns.
>
>
>
> The only =E2=80=9Crearranging=E2=80=9D I am requesting is to make section=
 3 a 2.x
> subsection, and change the name of section 2 to =E2=80=9CUpdates to RFC 3=
261=E2=80=9D =F0=9F=98=8A
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
>
>
>
>
>
>
>
>
> On Wed, May 8, 2019 at 9:03 AM Christer Holmberg <
> christer.holmberg@ericsson.com> wrote:
>
> Hi,
>
>
>
> Section 2.6 only covers one update. My comment was that I would like to
> have an high-level description of the updates to RFC 3261 that are done i=
n
> section 2 and 3.
>
>
>
> Perhaps changing the name of section 2 to =E2=80=9CUpdates to RFC 3261=E2=
=80=9D, and then
> change section 3 to section 2.7.
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
> *From: *Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Wednesday, 8 May 2019 at 15.52
> *To: *Christer Holmberg <christer.holmberg@ericsson.com>
> *Cc: *"A. Mahoney" <mahoney@nostrum.com>, "sipcore@ietf.org" <
> sipcore@ietf.org>
> *Subject: *Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
>
>
>
> Hi Christer,
>
>
>
> I added the following statement to section 2.6:
>
>
>
>    For completeness, the bullets specified below are mostly copied from s=
ection 22.4 of
>
>    [RFC3261]; the only semantic changes are specified in bullets 7 and 8 =
below.
>
>
>
> Does this address your Q1 comment?
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
>
>
> On Wed, May 8, 2019 at 8:43 AM Christer Holmberg <
> christer.holmberg@ericsson.com> wrote:
>
> Hi Rifaat,
>
>
>
> When comparing the new version with the previous, it seems like you have
> addressed Q2, regarding =E2=80=9Cheader field=E2=80=9D terminology.
>
>
>
> However, I don=E2=80=99t think you have addressed Q1, and I have not seen=
 any
> reply where you would indicate that you don=E2=80=99t agree with my comme=
nt etc.
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
> *From: *sipcore <sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Wednesday, 8 May 2019 at 15.17
> *To: *"A. Mahoney" <mahoney@nostrum.com>
> *Cc: *"sipcore@ietf.org" <sipcore@ietf.org>
> *Subject: *Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
>
>
>
> I have submitted a new version of the draft to address the only comments =
I
> received during this time from Christer.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
> On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney <mahoney@nostrum.com>
> wrote:
>
> Hi all,
>
> This starts a 2-week Working Group Last Call for
> draft-ietf-sipcore-digest-scheme. Please send your comments to the list
> by May 6.
>
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> Thanks!
>
> Jean
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>

--0000000000006011ee0588799f14
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Done.=C2=A0<br></div><br><div class=3D"gmail_quote"><div d=
ir=3D"ltr" class=3D"gmail_attr">On Wed, May 8, 2019 at 10:09 AM Christer Ho=
lmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christer.holmb=
erg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pa=
dding-left:1ex">





<div lang=3D"FI">
<div class=3D"gmail-m_8008330723292078891WordSection1">
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&gt;I believe that each section=
 has enough details that describe what is being changed.<u></u><u></u></spa=
n></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US">&gt;I am not sure how rearrangi=
ng the sections makes it better, but I do not mind doing that if that addre=
sses your=C2=A0concerns.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">The only =E2=80=9Crearranging=
=E2=80=9D I am requesting is to make section 3 a 2.x subsection, and change=
 the name of section 2 to =E2=80=9CUpdates to RFC 3261=E2=80=9D
</span><span lang=3D"EN-US" style=3D"font-family:&quot;Apple Color Emoji&qu=
ot;">=F0=9F=98=8A</span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Wed, May 8, 2019 at 9:03 AM Christer Holmberg &lt=
;<a href=3D"mailto:christer.holmberg@ericsson.com" target=3D"_blank">christ=
er.holmberg@ericsson.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<div>
<div>
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Section 2.6 only covers one upd=
ate. My comment was that I would like to have an high-level description of =
the updates to RFC 3261 that are done in section 2 and
 3.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Perhaps changing the name of se=
ction 2 to =E2=80=9CUpdates to RFC 3261=E2=80=9D, and then change section 3=
 to section 2.7.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From:
</span></b><span style=3D"font-size:12pt;color:black">Rifaat Shekh-Yusef &l=
t;<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gm=
ail.com</a>&gt;<br>
<b>Date: </b>Wednesday, 8 May 2019 at 15.52<br>
<b>To: </b>Christer Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericss=
on.com" target=3D"_blank">christer.holmberg@ericsson.com</a>&gt;<br>
<b>Cc: </b>&quot;A. Mahoney&quot; &lt;<a href=3D"mailto:mahoney@nostrum.com=
" target=3D"_blank">mahoney@nostrum.com</a>&gt;, &quot;<a href=3D"mailto:si=
pcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a>&quot; &lt;<a href=3D=
"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme</span>=
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Hi Christer,
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I added the following statement to section 2.6:<u></=
u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<div style=3D"border:1pt solid rgb(204,204,204);padding:8pt">
<pre style=3D"margin-bottom:7.9pt;background:rgb(255,253,245);word-break:br=
eak-all;box-sizing:border-box;border-radius:4px;overflow:auto"><span style=
=3D"font-size:10.5pt;font-family:&quot;PT Mono&quot;;color:black">=C2=A0=C2=
=A0 For completeness, the bullets specified below are mostly copied from se=
ction 22.4 of</span><u></u><u></u></pre>
<pre style=3D"margin-bottom:7.9pt;background:rgb(255,253,245);word-break:br=
eak-all"><span style=3D"font-size:10.5pt;font-family:&quot;PT Mono&quot;;co=
lor:black">=C2=A0=C2=A0 [RFC3261]; the only semantic changes are specified =
in bullets 7 and 8 below.</span><u></u><u></u></pre>
</div>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Does this address your Q1 comment?<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Wed, May 8, 2019 at 8:43 AM Christer Holmberg &lt=
;<a href=3D"mailto:christer.holmberg@ericsson.com" target=3D"_blank">christ=
er.holmberg@ericsson.com</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin:5pt 0c=
m 5pt 4.8pt">
<div>
<div>
<p class=3D"MsoNormal">Hi Rifaat,<u></u><u></u></p>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">When comparing the new version =
with the previous, it seems like you have addressed Q2, regarding =E2=80=9C=
header field=E2=80=9D terminology.</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">However, I don=E2=80=99t think =
you have addressed Q1, and I have not seen any reply where you would indica=
te that you don=E2=80=99t agree with my comment etc.</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer</span><u></u><u></u></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0</span><u></u><u></u></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From:
</span></b><span style=3D"font-size:12pt;color:black">sipcore &lt;<a href=
=3D"mailto:sipcore-bounces@ietf.org" target=3D"_blank">sipcore-bounces@ietf=
.org</a>&gt; on behalf of Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.i=
etf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Date: </b>Wednesday, 8 May 2019 at 15.17<br>
<b>To: </b>&quot;A. Mahoney&quot; &lt;<a href=3D"mailto:mahoney@nostrum.com=
" target=3D"_blank">mahoney@nostrum.com</a>&gt;<br>
<b>Cc: </b>&quot;<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipc=
ore@ietf.org</a>&quot; &lt;<a href=3D"mailto:sipcore@ietf.org" target=3D"_b=
lank">sipcore@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme</span>=
<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal">I have submitted a new version of the draft to addre=
ss the only comments I received during this time from Christer.
<u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><a href=3D"https://datatracker.ietf.org/doc/draft-ie=
tf-sipcore-digest-scheme/" target=3D"_blank">https://datatracker.ietf.org/d=
oc/draft-ietf-sipcore-digest-scheme/</a><u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
</div>
</div>
</div>
<p class=3D"MsoNormal">=C2=A0<u></u><u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Mon, Apr 22, 2019 at 3:26 PM A. Jean Mahoney &lt;=
<a href=3D"mailto:mahoney@nostrum.com" target=3D"_blank">mahoney@nostrum.co=
m</a>&gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin:5pt 0c=
m 5pt 4.8pt">
<p class=3D"MsoNormal">Hi all,<br>
<br>
This starts a 2-week Working Group Last Call for <br>
draft-ietf-sipcore-digest-scheme. Please send your comments to the list <br=
>
by May 6.<br>
<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sipcore-d=
igest-scheme/</a><br>
<br>
Thanks!<br>
<br>
Jean<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank"=
>https://www.ietf.org/mailman/listinfo/sipcore</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>
</blockquote>
</div>
</div>
</div>
</blockquote>
</div>
</div>
</div>

</blockquote></div>

--0000000000006011ee0588799f14--


From nobody Wed May 15 00:34:56 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 950041202C4 for <sipcore@ietfa.amsl.com>; Wed, 15 May 2019 00:34:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OzYaNtbt4mb1 for <sipcore@ietfa.amsl.com>; Wed, 15 May 2019 00:34:49 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-eopbgr50046.outbound.protection.outlook.com [40.107.5.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DBC421202B5 for <sipcore@ietf.org>; Wed, 15 May 2019 00:34:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lEfH+Suolk6MLWpz6uEUBG+hyBbSAhQY+pKdNby58Ec=; b=qlUaausQ4KeTpKOaqnJfwt46Qz7saAD1uvMql9q/KFptL+ZUXw/Vz7BVyzMsQzLUmHfO5RKox9JLq1l10adOxok3AYPOWl+WJO5as3hRkGMd1L69+m55okPBhzobN8dzz5qkY+VO/wHjWgIVoIHvI/U97+6TkrD8UPgxlLO2lJ8=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3514.eurprd07.prod.outlook.com (10.170.247.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1900.7; Wed, 15 May 2019 07:34:45 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1900.010; Wed, 15 May 2019 07:34:45 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "A. Jean Mahoney" <mahoney@nostrum.com>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
Thread-Index: AQHU+UFBI5+mE+EEBUOqnq66N/NDDaZhPAMAgAA68gD//8+iAIAANhuA///VS4CAAD0VgIABvHsAgAjVjwA=
Date: Wed, 15 May 2019 07:34:45 +0000
Message-ID: <F907EA3D-BF86-46B0-A919-DB7A916294B6@ericsson.com>
References: <f3afe0a4-4e11-abdd-681f-cf276a71122c@nostrum.com> <CAGL6epKFzmBVG85-qnUYO+jr14y9pREmLJM6EoeijQ_wKnXFPQ@mail.gmail.com> <72C48292-9D28-4EC8-888A-2F912277A166@ericsson.com> <CAGL6epKb1Ua6cUoNUqLOUoVH2CTHh6J-id3hVT-D9bSV=+Z9Gg@mail.gmail.com> <A299A1C1-60A3-4F8D-9B84-44A79C9999BA@ericsson.com> <CAGL6ep+JyBZfU2i0KH7y6UfKxzkT8HUkYanN83WgtSbYLRW-fg@mail.gmail.com> <BE6EA965-8405-4888-9C15-BD4BD5408657@ericsson.com> <CAGL6epK8WmBf3DAxTx6+NTFMAnh7BWzSFEKKtqAi+9QZP_jC4Q@mail.gmail.com>
In-Reply-To: <CAGL6epK8WmBf3DAxTx6+NTFMAnh7BWzSFEKKtqAi+9QZP_jC4Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.18.0.190414
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 63e9c761-8ae3-4e45-fe8b-08d6d907cdaf
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB3514; 
x-ms-traffictypediagnostic: HE1PR07MB3514:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <HE1PR07MB35141BEA23C435F6AD7DF7DC93090@HE1PR07MB3514.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0038DE95A2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(39860400002)(376002)(136003)(346002)(366004)(18543002)(53754006)(189003)(199004)(66476007)(66446008)(64756008)(66556008)(66946007)(73956011)(36756003)(86362001)(58126008)(76116006)(82746002)(54906003)(316002)(966005)(486006)(99286004)(3846002)(6116002)(76176011)(66066001)(508600001)(5660300002)(186003)(44832011)(53546011)(6506007)(26005)(11346002)(446003)(2616005)(476003)(102836004)(14454004)(83716004)(71190400001)(71200400001)(14444005)(256004)(8676002)(6916009)(53936002)(54896002)(6306002)(68736007)(6436002)(6486002)(2906002)(33656002)(7736002)(8936002)(81166006)(25786009)(81156014)(4326008)(229853002)(6246003)(236005)(6512007)(606006); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3514; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: bvKCDTXvV/C48846Gt5lxmDPdm6m8mPuEknqnwhPRP0GkeoZBndHY9WkWrg8fx2U1QbGmRSKonRxOBKbgJjPoUGIY1nZfQeujP0a/t5/CgbjewF3MiRyglPKXZd+k6Lwq1CWPr7NRPYlNw2rmbXozKsHuXRT8YcE+r3xh6fkQpXnxaSetvUcq1+8VE+ZLbXIf+borI+atTu5BxS/Mf7nGdm7mpZY5WmtnArExw4cimRf25TjMm2QjCEjydx8tuirFjpVCLd2rymZu/amZTqKSpCvWrzJadVIXZ2W4Rd8n2EhXtHRHKnWichAj72MJ23f8oUdpE45A+w3zeS80yZdK8+Xla9kGiO16TAtaL2mCC3/CdXjZBc8YqzUCUsLozVnaLm7HmiKpXIzVYJoB6ztU+99lHz9RGFWTk1SAejHXSY=
Content-Type: multipart/alternative; boundary="_000_F907EA3DBF8646B0A919DB7A916294B6ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 63e9c761-8ae3-4e45-fe8b-08d6d907cdaf
X-MS-Exchange-CrossTenant-originalarrivaltime: 15 May 2019 07:34:45.7196 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3514
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/j9BRxfPrDzd-lk-b7klH3j8MS3g>
Subject: Re: [sipcore] WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 15 May 2019 07:34:55 -0000

--_000_F907EA3DBF8646B0A919DB7A916294B6ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_F907EA3DBF8646B0A919DB7A916294B6ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <EC01F6D545689E46A213CB804FC68C5E@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4
bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo
dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo
dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp
dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l
dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg
bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj
ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2
IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy
IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQpAZm9udC1mYWNlDQoJe2ZvbnQtZmFtaWx5OiJBcHBsZSBD
b2xvciBFbW9qaSI7DQoJcGFub3NlLTE6MCAwIDAgMCAwIDAgMCAwIDAgMDt9DQpAZm9udC1mYWNl
DQoJe2ZvbnQtZmFtaWx5OkNvbnNvbGFzOw0KCXBhbm9zZS0xOjIgMTEgNiA5IDIgMiA0IDMgMiA0
O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6IlBUIE1vbm8iOw0KCXBhbm9zZS0xOjIgNiA1
IDkgMiAyIDUgMiAyIDQ7fQ0KLyogU3R5bGUgRGVmaW5pdGlvbnMgKi8NCnAuTXNvTm9ybWFsLCBs
aS5Nc29Ob3JtYWwsIGRpdi5Nc29Ob3JtYWwNCgl7bWFyZ2luOjBjbTsNCgltYXJnaW4tYm90dG9t
Oi4wMDAxcHQ7DQoJZm9udC1zaXplOjExLjBwdDsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fu
cy1zZXJpZjt9DQphOmxpbmssIHNwYW4uTXNvSHlwZXJsaW5rDQoJe21zby1zdHlsZS1wcmlvcml0
eTo5OTsNCgljb2xvcjpibHVlOw0KCXRleHQtZGVjb3JhdGlvbjp1bmRlcmxpbmU7fQ0KYTp2aXNp
dGVkLCBzcGFuLk1zb0h5cGVybGlua0ZvbGxvd2VkDQoJe21zby1zdHlsZS1wcmlvcml0eTo5OTsN
Cgljb2xvcjpwdXJwbGU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQpwcmUNCgl7bXNv
LXN0eWxlLXByaW9yaXR5Ojk5Ow0KCW1zby1zdHlsZS1saW5rOiJIVE1MIFByZWZvcm1hdHRlZCBD
aGFyIjsNCgltYXJnaW46MGNtOw0KCW1hcmdpbi1ib3R0b206LjAwMDFwdDsNCglmb250LXNpemU6
MTAuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDb3VyaWVyIE5ldyI7fQ0KcC5tc29ub3JtYWwwLCBsaS5t
c29ub3JtYWwwLCBkaXYubXNvbm9ybWFsMA0KCXttc28tc3R5bGUtbmFtZTptc29ub3JtYWw7DQoJ
bXNvLW1hcmdpbi10b3AtYWx0OmF1dG87DQoJbWFyZ2luLXJpZ2h0OjBjbTsNCgltc28tbWFyZ2lu
LWJvdHRvbS1hbHQ6YXV0bzsNCgltYXJnaW4tbGVmdDowY207DQoJZm9udC1zaXplOjExLjBwdDsN
Cglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjt9DQpzcGFuLkhUTUxQcmVmb3JtYXR0
ZWRDaGFyDQoJe21zby1zdHlsZS1uYW1lOiJIVE1MIFByZWZvcm1hdHRlZCBDaGFyIjsNCgltc28t
c3R5bGUtcHJpb3JpdHk6OTk7DQoJbXNvLXN0eWxlLWxpbms6IkhUTUwgUHJlZm9ybWF0dGVkIjsN
Cglmb250LWZhbWlseTpDb25zb2xhczt9DQpzcGFuLkVtYWlsU3R5bGUyMA0KCXttc28tc3R5bGUt
dHlwZTpwZXJzb25hbC1yZXBseTsNCglmb250LWZhbWlseToiQ2FsaWJyaSIsc2Fucy1zZXJpZjsN
Cgljb2xvcjp3aW5kb3d0ZXh0O30NCi5Nc29DaHBEZWZhdWx0DQoJe21zby1zdHlsZS10eXBlOmV4
cG9ydC1vbmx5Ow0KCWZvbnQtc2l6ZToxMC4wcHQ7fQ0KQHBhZ2UgV29yZFNlY3Rpb24xDQoJe3Np
emU6NjEyLjBwdCA3OTIuMHB0Ow0KCW1hcmdpbjo3MC44NXB0IDIuMGNtIDcwLjg1cHQgMi4wY207
fQ0KZGl2LldvcmRTZWN0aW9uMQ0KCXtwYWdlOldvcmRTZWN0aW9uMTt9DQotLT48L3N0eWxlPg0K
PC9oZWFkPg0KPGJvZHkgbGFuZz0iRkkiIGxpbms9ImJsdWUiIHZsaW5rPSJwdXJwbGUiPg0KPGRp
diBjbGFzcz0iV29yZFNlY3Rpb24xIj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPkhpLDxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+SeKAmWQgc3RpbGwgcHJlZmVyIHRv
IGNhbGwgc2VjdGlvbiAyIOKAnVVwZGF0ZXMgdG8gUkZDIDMyNjHigJ0uPG86cD48L286cD48L3Nw
YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5i
c3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVO
LVVTIj5SZWdhcmRzLDxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIGxhbmc9IkVOLVVTIj48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+Q2hyaXN0ZXI8bzpwPjwvbzpwPjwvc3Bh
bj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJz
cDs8L286cD48L3NwYW4+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpz
b2xpZCAjQjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGNtIDBjbSAwY20iPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PGI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29sb3I6YmxhY2si
PkZyb206IDwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29sb3I6Ymxh
Y2siPlJpZmFhdCBTaGVraC1ZdXNlZiAmbHQ7cmlmYWF0LmlldGZAZ21haWwuY29tJmd0Ozxicj4N
CjxiPkRhdGU6IDwvYj5UaHVyc2RheSwgOSBNYXkgMjAxOSBhdCAyMi40MDxicj4NCjxiPlRvOiA8
L2I+Q2hyaXN0ZXIgSG9sbWJlcmcgJmx0O2NocmlzdGVyLmhvbG1iZXJnQGVyaWNzc29uLmNvbSZn
dDs8YnI+DQo8Yj5DYzogPC9iPiZxdW90O0EuIE1haG9uZXkmcXVvdDsgJmx0O21haG9uZXlAbm9z
dHJ1bS5jb20mZ3Q7LCAmcXVvdDtzaXBjb3JlQGlldGYub3JnJnF1b3Q7ICZsdDtzaXBjb3JlQGll
dGYub3JnJmd0Ozxicj4NCjxiPlN1YmplY3Q6IDwvYj5SZTogW3NpcGNvcmVdIFdHTEM6IGRyYWZ0
LWlldGYtc2lwY29yZS1kaWdlc3Qtc2NoZW1lPG86cD48L286cD48L3NwYW4+PC9wPg0KPC9kaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8L2Rp
dj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj5Eb25lLiZuYnNwOzxvOnA+PC9vOnA+PC9w
Pg0KPC9kaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxk
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+T24gV2VkLCBNYXkgOCwgMjAxOSBhdCAx
MDowOSBBTSBDaHJpc3RlciBIb2xtYmVyZyAmbHQ7PGEgaHJlZj0ibWFpbHRvOmNocmlzdGVyLmhv
bG1iZXJnQGVyaWNzc29uLmNvbSI+Y2hyaXN0ZXIuaG9sbWJlcmdAZXJpY3Nzb24uY29tPC9hPiZn
dDsgd3JvdGU6PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxibG9ja3F1b3RlIHN0eWxlPSJib3Jk
ZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCAjQ0NDQ0NDIDEuMHB0O3BhZGRpbmc6MGNtIDBjbSAw
Y20gNi4wcHQ7bWFyZ2luLWxlZnQ6NC44cHQ7bWFyZ2luLXJpZ2h0OjBjbSI+DQo8ZGl2Pg0KPGRp
dj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bztt
c28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+SGksPG86cD48L286cD48L3A+DQo8ZGl2Pg0KPHAg
Y2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJn
aW4tYm90dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4N
CjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1
dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIGxhbmc9IkVOLVVTIj4mZ3Q7SSBi
ZWxpZXZlIHRoYXQgZWFjaCBzZWN0aW9uIGhhcyBlbm91Z2ggZGV0YWlscyB0aGF0IGRlc2NyaWJl
IHdoYXQgaXMgYmVpbmcgY2hhbmdlZC48L3NwYW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxk
aXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87
bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIGxhbmc9IkVOLVVTIj4mZ3Q7SSBhbSBu
b3Qgc3VyZSBob3cgcmVhcnJhbmdpbmcgdGhlIHNlY3Rpb25zIG1ha2VzIGl0IGJldHRlciwgYnV0
IEkgZG8gbm90IG1pbmQgZG9pbmcgdGhhdCBpZiB0aGF0IGFkZHJlc3NlcyB5b3VyJm5ic3A7Y29u
Y2VybnMuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9t
LWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21z
by1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+VGhlIG9ubHkg4oCc
cmVhcnJhbmdpbmfigJ0gSSBhbSByZXF1ZXN0aW5nIGlzIHRvIG1ha2Ugc2VjdGlvbiAzIGEgMi54
IHN1YnNlY3Rpb24sIGFuZCBjaGFuZ2UgdGhlIG5hbWUgb2Ygc2VjdGlvbiAyIHRvIOKAnFVwZGF0
ZXMgdG8gUkZDIDMyNjHigJ0NCjwvc3Bhbj48c3BhbiBsYW5nPSJFTi1VUyIgc3R5bGU9ImZvbnQt
ZmFtaWx5OiZxdW90O0FwcGxlIENvbG9yIEVtb2ppJnF1b3Q7LHNlcmlmIj4mIzEyODUyMjs8L3Nw
YW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdp
bi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIGxhbmc9IkVO
LVVTIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8i
PjxzcGFuIGxhbmc9IkVOLVVTIj5SZWdhcmRzLDwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNs
YXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2lu
LWJvdHRvbS1hbHQ6YXV0byI+PHNwYW4gbGFuZz0iRU4tVVMiPiZuYnNwOzwvc3Bhbj48bzpwPjwv
bzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6
YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PHNwYW4gbGFuZz0iRU4tVVMiPkNocmlz
dGVyPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1z
by1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBs
YW5nPSJFTi1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05v
cm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFs
dDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0K
PC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9w
LWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2lu
LXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5ic3A7PG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1t
YXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpw
PjwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1z
by1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj5PbiBXZWQs
IE1heSA4LCAyMDE5IGF0IDk6MDMgQU0gQ2hyaXN0ZXIgSG9sbWJlcmcgJmx0OzxhIGhyZWY9Im1h
aWx0bzpjaHJpc3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5jb20iIHRhcmdldD0iX2JsYW5rIj5jaHJp
c3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5jb208L2E+Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9ImJvcmRlcjpub25lO2JvcmRlci1sZWZ0OnNvbGlk
ICNDQ0NDQ0MgMS4wcHQ7cGFkZGluZzowY20gMGNtIDBjbSA2LjBwdDttYXJnaW4tbGVmdDo0Ljhw
dDttYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1yaWdodDowY207bWFyZ2luLWJvdHRvbTo1LjBwdCI+
DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRv
cC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+SGksPG86cD48L286cD48L3A+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNv
LW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90
dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+U2VjdGlvbiAyLjYgb25seSBjb3ZlcnMg
b25lIHVwZGF0ZS4gTXkgY29tbWVudCB3YXMgdGhhdCBJIHdvdWxkIGxpa2UgdG8gaGF2ZSBhbiBo
aWdoLWxldmVsIGRlc2NyaXB0aW9uIG9mIHRoZSB1cGRhdGVzIHRvIFJGQyAzMjYxIHRoYXQgYXJl
IGRvbmUgaW4gc2VjdGlvbiAyIGFuZA0KIDMuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4t
Ym90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9v
OnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDph
dXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+UGVyaGFw
cyBjaGFuZ2luZyB0aGUgbmFtZSBvZiBzZWN0aW9uIDIgdG8g4oCcVXBkYXRlcyB0byBSRkMgMzI2
MeKAnSwgYW5kIHRoZW4gY2hhbmdlIHNlY3Rpb24gMyB0byBzZWN0aW9uIDIuNy48L3NwYW4+PG86
cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3At
YWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIGxhbmc9IkVOLVVTIj4m
bmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFu
IGxhbmc9IkVOLVVTIj5SZWdhcmRzLDwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJN
c29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRv
bS1hbHQ6YXV0byI+PHNwYW4gbGFuZz0iRU4tVVMiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bztt
c28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PHNwYW4gbGFuZz0iRU4tVVMiPkNocmlzdGVyPC9z
cGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJn
aW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJF
Ti1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5v
bmU7Ym9yZGVyLXRvcDpzb2xpZCAjQjVDNERGIDEuMHB0O3BhZGRpbmc6My4wcHQgMGNtIDBjbSAw
Y20iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRv
O21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEy
LjBwdDtjb2xvcjpibGFjayI+RnJvbToNCjwvc3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6
ZToxMi4wcHQ7Y29sb3I6YmxhY2siPlJpZmFhdCBTaGVraC1ZdXNlZiAmbHQ7PGEgaHJlZj0ibWFp
bHRvOnJpZmFhdC5pZXRmQGdtYWlsLmNvbSIgdGFyZ2V0PSJfYmxhbmsiPnJpZmFhdC5pZXRmQGdt
YWlsLmNvbTwvYT4mZ3Q7PGJyPg0KPGI+RGF0ZTogPC9iPldlZG5lc2RheSwgOCBNYXkgMjAxOSBh
dCAxNS41Mjxicj4NCjxiPlRvOiA8L2I+Q2hyaXN0ZXIgSG9sbWJlcmcgJmx0OzxhIGhyZWY9Im1h
aWx0bzpjaHJpc3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5jb20iIHRhcmdldD0iX2JsYW5rIj5jaHJp
c3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5jb208L2E+Jmd0Ozxicj4NCjxiPkNjOiA8L2I+JnF1b3Q7
QS4gTWFob25leSZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOm1haG9uZXlAbm9zdHJ1bS5jb20i
IHRhcmdldD0iX2JsYW5rIj5tYWhvbmV5QG5vc3RydW0uY29tPC9hPiZndDssICZxdW90OzxhIGhy
ZWY9Im1haWx0bzpzaXBjb3JlQGlldGYub3JnIiB0YXJnZXQ9Il9ibGFuayI+c2lwY29yZUBpZXRm
Lm9yZzwvYT4mcXVvdDsgJmx0OzxhIGhyZWY9Im1haWx0bzpzaXBjb3JlQGlldGYub3JnIiB0YXJn
ZXQ9Il9ibGFuayI+c2lwY29yZUBpZXRmLm9yZzwvYT4mZ3Q7PGJyPg0KPGI+U3ViamVjdDogPC9i
PlJlOiBbc2lwY29yZV0gV0dMQzogZHJhZnQtaWV0Zi1zaXBjb3JlLWRpZ2VzdC1zY2hlbWU8L3Nw
YW4+PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8i
PiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDph
dXRvIj5IaSBDaHJpc3RlciwNCjxvOnA+PC9vOnA+PC9wPg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1h
bHQ6YXV0byI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0i
TXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0
b20tYWx0OmF1dG8iPkkgYWRkZWQgdGhlIGZvbGxvd2luZyBzdGF0ZW1lbnQgdG8gc2VjdGlvbiAy
LjY6PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBz
dHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8i
PiZuYnNwOzxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPGRpdiBzdHlsZT0iYm9yZGVy
OnNvbGlkICNDQ0NDQ0MgMS4wcHQ7cGFkZGluZzo4LjBwdCA4LjBwdCA4LjBwdCA4LjBwdCI+DQo8
cHJlIHN0eWxlPSJtYXJnaW4tYm90dG9tOjcuOXB0O2JhY2tncm91bmQ6I0ZGRkRGNTt3b3JkLWJy
ZWFrOmJyZWFrLWFsbDtib3gtc2l6aW5nOmJvcmRlci1ib3g7Ym9yZGVyLXJhZGl1czo0cHg7b3Zl
cmZsb3c6YXV0byI+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMC41cHQ7Zm9udC1mYW1pbHk6JnF1
b3Q7UFQgTW9ubyZxdW90Oztjb2xvcjpibGFjayI+Jm5ic3A7Jm5ic3A7IEZvciBjb21wbGV0ZW5l
c3MsIHRoZSBidWxsZXRzIHNwZWNpZmllZCBiZWxvdyBhcmUgbW9zdGx5IGNvcGllZCBmcm9tIHNl
Y3Rpb24gMjIuNCBvZjwvc3Bhbj48bzpwPjwvbzpwPjwvcHJlPg0KPHByZSBzdHlsZT0ibWFyZ2lu
LWJvdHRvbTo3LjlwdDtiYWNrZ3JvdW5kOiNGRkZERjU7d29yZC1icmVhazpicmVhay1hbGwiPjxz
cGFuIHN0eWxlPSJmb250LXNpemU6MTAuNXB0O2ZvbnQtZmFtaWx5OiZxdW90O1BUIE1vbm8mcXVv
dDs7Y29sb3I6YmxhY2siPiZuYnNwOyZuYnNwOyBbUkZDMzI2MV07IHRoZSBvbmx5IHNlbWFudGlj
IGNoYW5nZXMgYXJlIHNwZWNpZmllZCBpbiBidWxsZXRzIDcgYW5kIDggYmVsb3cuPC9zcGFuPjxv
OnA+PC9vOnA+PC9wcmU+DQo8L2Rpdj4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6
YXV0byI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20t
YWx0OmF1dG8iPkRvZXMgdGhpcyBhZGRyZXNzIHlvdXIgUTEgY29tbWVudD88bzpwPjwvbzpwPjwv
cD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2lu
LXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5ic3A7PG86cD48L286
cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1h
cmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPlJlZ2FyZHMsPG86
cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0i
bXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNw
O1JpZmFhdDxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1h
bCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDph
dXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29O
b3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1h
bHQ6YXV0byI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90
dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8ZGl2Pg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4t
Ym90dG9tLWFsdDphdXRvIj5PbiBXZWQsIE1heSA4LCAyMDE5IGF0IDg6NDMgQU0gQ2hyaXN0ZXIg
SG9sbWJlcmcgJmx0OzxhIGhyZWY9Im1haWx0bzpjaHJpc3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5j
b20iIHRhcmdldD0iX2JsYW5rIj5jaHJpc3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5jb208L2E+Jmd0
OyB3cm90ZTo8bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGJsb2NrcXVvdGUgc3R5bGU9ImJvcmRl
cjpub25lO2JvcmRlci1sZWZ0OnNvbGlkICNDQ0NDQ0MgMS4wcHQ7cGFkZGluZzowY20gMGNtIDBj
bSA2LjBwdDttYXJnaW4tbGVmdDo0LjhwdDttYXJnaW4tdG9wOjUuMHB0O21hcmdpbi1yaWdodDow
Y207bWFyZ2luLWJvdHRvbTo1LjBwdCI+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3Jt
YWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6
YXV0byI+SGkgUmlmYWF0LDxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5
bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj4m
bmJzcDs8bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFy
Z2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PHNwYW4gbGFuZz0i
RU4tVVMiPldoZW4gY29tcGFyaW5nIHRoZSBuZXcgdmVyc2lvbiB3aXRoIHRoZSBwcmV2aW91cywg
aXQgc2VlbXMgbGlrZSB5b3UgaGF2ZSBhZGRyZXNzZWQgUTIsIHJlZ2FyZGluZyDigJxoZWFkZXIg
ZmllbGTigJ0gdGVybWlub2xvZ3kuPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xhc3M9Ik1z
b05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9t
LWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9vOnA+PC9w
Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21z
by1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+SG93ZXZlciwgSSBk
b27igJl0IHRoaW5rIHlvdSBoYXZlIGFkZHJlc3NlZCBRMSwgYW5kIEkgaGF2ZSBub3Qgc2VlbiBh
bnkgcmVwbHkgd2hlcmUgeW91IHdvdWxkIGluZGljYXRlIHRoYXQgeW91IGRvbuKAmXQgYWdyZWUg
d2l0aCBteSBjb21tZW50IGV0Yy48L3NwYW4+PG86cD48L286cD48L3A+DQo8cCBjbGFzcz0iTXNv
Tm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdpbi1ib3R0b20t
YWx0OmF1dG8iPjxzcGFuIGxhbmc9IkVOLVVTIj4mbmJzcDs8L3NwYW4+PG86cD48L286cD48L3A+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNv
LW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxzcGFuIGxhbmc9IkVOLVVTIj5SZWdhcmRzLDwvc3Bh
bj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2lu
LXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+PHNwYW4gbGFuZz0iRU4t
VVMiPiZuYnNwOzwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0
eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+
PHNwYW4gbGFuZz0iRU4tVVMiPkNocmlzdGVyPC9zcGFuPjxvOnA+PC9vOnA+PC9wPg0KPHAgY2xh
c3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4t
Ym90dG9tLWFsdDphdXRvIj48c3BhbiBsYW5nPSJFTi1VUyI+Jm5ic3A7PC9zcGFuPjxvOnA+PC9v
OnA+PC9wPg0KPGRpdiBzdHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLXRvcDpzb2xpZCAjQjVDNERG
IDEuMHB0O3BhZGRpbmc6My4wcHQgMGNtIDBjbSAwY20iPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIg
c3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRv
Ij48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdDtjb2xvcjpibGFjayI+RnJvbToNCjwv
c3Bhbj48L2I+PHNwYW4gc3R5bGU9ImZvbnQtc2l6ZToxMi4wcHQ7Y29sb3I6YmxhY2siPnNpcGNv
cmUgJmx0OzxhIGhyZWY9Im1haWx0bzpzaXBjb3JlLWJvdW5jZXNAaWV0Zi5vcmciIHRhcmdldD0i
X2JsYW5rIj5zaXBjb3JlLWJvdW5jZXNAaWV0Zi5vcmc8L2E+Jmd0OyBvbiBiZWhhbGYgb2YgUmlm
YWF0IFNoZWtoLVl1c2VmICZsdDs8YSBocmVmPSJtYWlsdG86cmlmYWF0LmlldGZAZ21haWwuY29t
IiB0YXJnZXQ9Il9ibGFuayI+cmlmYWF0LmlldGZAZ21haWwuY29tPC9hPiZndDs8YnI+DQo8Yj5E
YXRlOiA8L2I+V2VkbmVzZGF5LCA4IE1heSAyMDE5IGF0IDE1LjE3PGJyPg0KPGI+VG86IDwvYj4m
cXVvdDtBLiBNYWhvbmV5JnF1b3Q7ICZsdDs8YSBocmVmPSJtYWlsdG86bWFob25leUBub3N0cnVt
LmNvbSIgdGFyZ2V0PSJfYmxhbmsiPm1haG9uZXlAbm9zdHJ1bS5jb208L2E+Jmd0Ozxicj4NCjxi
PkNjOiA8L2I+JnF1b3Q7PGEgaHJlZj0ibWFpbHRvOnNpcGNvcmVAaWV0Zi5vcmciIHRhcmdldD0i
X2JsYW5rIj5zaXBjb3JlQGlldGYub3JnPC9hPiZxdW90OyAmbHQ7PGEgaHJlZj0ibWFpbHRvOnNp
cGNvcmVAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5rIj5zaXBjb3JlQGlldGYub3JnPC9hPiZndDs8
YnI+DQo8Yj5TdWJqZWN0OiA8L2I+UmU6IFtzaXBjb3JlXSBXR0xDOiBkcmFmdC1pZXRmLXNpcGNv
cmUtZGlnZXN0LXNjaGVtZTwvc3Bhbj48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxw
IGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFy
Z2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFsdDph
dXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj5JIGhhdmUgc3VibWl0dGVkIGEgbmV3IHZl
cnNpb24gb2YgdGhlIGRyYWZ0IHRvIGFkZHJlc3MgdGhlIG9ubHkgY29tbWVudHMgSSByZWNlaXZl
ZCBkdXJpbmcgdGhpcyB0aW1lIGZyb20gQ2hyaXN0ZXIuDQo8bzpwPjwvbzpwPjwvcD4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNv
LW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPjxhIGhyZWY9Imh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0
Zi5vcmcvZG9jL2RyYWZ0LWlldGYtc2lwY29yZS1kaWdlc3Qtc2NoZW1lLyIgdGFyZ2V0PSJfYmxh
bmsiPmh0dHBzOi8vZGF0YXRyYWNrZXIuaWV0Zi5vcmcvZG9jL2RyYWZ0LWlldGYtc2lwY29yZS1k
aWdlc3Qtc2NoZW1lLzwvYT48bzpwPjwvbzpwPjwvcD4NCjwvZGl2Pg0KPGRpdj4NCjxwIGNsYXNz
PSJNc29Ob3JtYWwiIHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJv
dHRvbS1hbHQ6YXV0byI+Jm5ic3A7PG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNvLW1hcmdp
bi1ib3R0b20tYWx0OmF1dG8iPlJlZ2FyZHMsPG86cD48L286cD48L3A+DQo8L2Rpdj4NCjxkaXY+
DQo8cCBjbGFzcz0iTXNvTm9ybWFsIiBzdHlsZT0ibXNvLW1hcmdpbi10b3AtYWx0OmF1dG87bXNv
LW1hcmdpbi1ib3R0b20tYWx0OmF1dG8iPiZuYnNwO1JpZmFhdDxvOnA+PC9vOnA+PC9wPg0KPC9k
aXY+DQo8ZGl2Pg0KPHAgY2xhc3M9Ik1zb05vcm1hbCIgc3R5bGU9Im1zby1tYXJnaW4tdG9wLWFs
dDphdXRvO21zby1tYXJnaW4tYm90dG9tLWFsdDphdXRvIj4mbmJzcDs8bzpwPjwvbzpwPjwvcD4N
CjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJtc28t
bWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+Jm5ic3A7PG86
cD48L286cD48L3A+DQo8ZGl2Pg0KPGRpdj4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiIHN0eWxlPSJt
c28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0byI+T24gTW9u
LCBBcHIgMjIsIDIwMTkgYXQgMzoyNiBQTSBBLiBKZWFuIE1haG9uZXkgJmx0OzxhIGhyZWY9Im1h
aWx0bzptYWhvbmV5QG5vc3RydW0uY29tIiB0YXJnZXQ9Il9ibGFuayI+bWFob25leUBub3N0cnVt
LmNvbTwvYT4mZ3Q7IHdyb3RlOjxvOnA+PC9vOnA+PC9wPg0KPC9kaXY+DQo8YmxvY2txdW90ZSBz
dHlsZT0iYm9yZGVyOm5vbmU7Ym9yZGVyLWxlZnQ6c29saWQgI0NDQ0NDQyAxLjBwdDtwYWRkaW5n
OjBjbSAwY20gMGNtIDYuMHB0O21hcmdpbi1sZWZ0OjQuOHB0O21hcmdpbi10b3A6NS4wcHQ7bWFy
Z2luLXJpZ2h0OjBjbTttYXJnaW4tYm90dG9tOjUuMHB0Ij4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
IHN0eWxlPSJtc28tbWFyZ2luLXRvcC1hbHQ6YXV0bzttc28tbWFyZ2luLWJvdHRvbS1hbHQ6YXV0
byI+SGkgYWxsLDxicj4NCjxicj4NClRoaXMgc3RhcnRzIGEgMi13ZWVrIFdvcmtpbmcgR3JvdXAg
TGFzdCBDYWxsIGZvciA8YnI+DQpkcmFmdC1pZXRmLXNpcGNvcmUtZGlnZXN0LXNjaGVtZS4gUGxl
YXNlIHNlbmQgeW91ciBjb21tZW50cyB0byB0aGUgbGlzdCA8YnI+DQpieSBNYXkgNi48YnI+DQo8
YnI+DQo8YSBocmVmPSJodHRwczovL2RhdGF0cmFja2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRm
LXNpcGNvcmUtZGlnZXN0LXNjaGVtZS8iIHRhcmdldD0iX2JsYW5rIj5odHRwczovL2RhdGF0cmFj
a2VyLmlldGYub3JnL2RvYy9kcmFmdC1pZXRmLXNpcGNvcmUtZGlnZXN0LXNjaGVtZS88L2E+PGJy
Pg0KPGJyPg0KVGhhbmtzITxicj4NCjxicj4NCkplYW48YnI+DQo8YnI+DQpfX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fXzxicj4NCnNpcGNvcmUgbWFpbGluZyBs
aXN0PGJyPg0KPGEgaHJlZj0ibWFpbHRvOnNpcGNvcmVAaWV0Zi5vcmciIHRhcmdldD0iX2JsYW5r
Ij5zaXBjb3JlQGlldGYub3JnPC9hPjxicj4NCjxhIGhyZWY9Imh0dHBzOi8vd3d3LmlldGYub3Jn
L21haWxtYW4vbGlzdGluZm8vc2lwY29yZSIgdGFyZ2V0PSJfYmxhbmsiPmh0dHBzOi8vd3d3Lmll
dGYub3JnL21haWxtYW4vbGlzdGluZm8vc2lwY29yZTwvYT48bzpwPjwvbzpwPjwvcD4NCjwvYmxv
Y2txdW90ZT4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0K
PC9kaXY+DQo8L2Rpdj4NCjwvYmxvY2txdW90ZT4NCjwvZGl2Pg0KPC9kaXY+DQo8L2Rpdj4NCjwv
YmxvY2txdW90ZT4NCjwvZGl2Pg0KPC9kaXY+DQo8L2JvZHk+DQo8L2h0bWw+DQo=

--_000_F907EA3DBF8646B0A919DB7A916294B6ericssoncom_--


From nobody Fri May 17 05:20:14 2019
Return-Path: <worley@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3A27A120359 for <sipcore@ietfa.amsl.com>; Fri, 17 May 2019 05:20:12 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.934
X-Spam-Level: 
X-Spam-Status: No, score=-1.934 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcastmailservice.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bjJ1ez5j3zh4 for <sipcore@ietfa.amsl.com>; Fri, 17 May 2019 05:20:10 -0700 (PDT)
Received: from resqmta-ch2-07v.sys.comcast.net (resqmta-ch2-07v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:39]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BA1ED120357 for <sipcore@ietf.org>; Fri, 17 May 2019 05:20:10 -0700 (PDT)
Received: from resomta-ch2-20v.sys.comcast.net ([69.252.207.116]) by resqmta-ch2-07v.sys.comcast.net with ESMTP id RbjYhIIt3KkkfRbqLhecX6; Fri, 17 May 2019 12:20:09 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastmailservice.net; s=20180828_2048; t=1558095609; bh=sLnJlBWJ19O2nEpMbEgLVTnJvAEZ6u2YZz52sS/BKzs=; h=Received:Received:Received:Received:From:To:Subject:Date: Message-ID; b=A4RDI0F7bky5qip82WxfyRntZcHkUBwqSG8UspICQwdNRHnA/R7fMGSjtPyO3Iip9 UUfj3S3QxBLUNmFOWA8ApQ6OMTA29ZrJeHIWqu9QFaDkFzfVPdoTwFauq5vfETGA2d zNrtxM48tdFM5GfnI79pjHZgBtX+6wqSl2g5IQ19Vl38wRkpXdNF7iw+UgU3L2UuKU XauZyogUQPLVwNkQMsRSWR7HXFaQcbYDxumhf27aMnED689HubxwNS7BPWB1IaYZam XuJZxtt2l62F21fsm1X7jfq0LVx/CdY4LoPLiCGRYS+vD0GOiMnChpMRWgcuc0OffH U9Wurj+oTAQxQ==
Received: from hobgoblin.ariadne.com ([IPv6:2601:192:4603:9471:222:fbff:fe91:d396]) by resomta-ch2-20v.sys.comcast.net with ESMTPA id RbqKhlDv45DQoRbqLhpmgf; Fri, 17 May 2019 12:20:09 +0000
X-Xfinity-VMeta: sc=0;st=legit
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id x4HCK79Y018210 for <sipcore@ietf.org>; Fri, 17 May 2019 08:20:07 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id x4HCK6r3018203; Fri, 17 May 2019 08:20:06 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com (Dale R. Worley)
To: sipcore@ietf.org
Sender: worley@ariadne.com (Dale R. Worley)
Date: Fri, 17 May 2019 08:20:06 -0400
Message-ID: <87bm01mfwp.fsf@hobgoblin.ariadne.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/A3ITIUqn3jwO1tPQSXnBkmCH9xA>
Subject: [sipcore] Resend:  WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 12:20:12 -0000

[resend -- for some reason, this didn't get through to the mailing list]

Sorry for being late with this.  Below are my detailed comments, but
generally the significant ones fall into two groups:

1) When is the binding time of "the contents of the Hash Algorithms for
HTTP Digest Authentication registry"?  That is, if a new algorithm is
added to the registry, does it automatically become authorized for use
in SIP?

My impression is that the answer is Yes.  But if so, the wording should
be updated in several places, because it seems to me that the current
wording tends to imply that this document copies the list of algorithms
from the registry at this time and authorizes those algorithms.

2) There is discussion "The IANA registry ... specifies the algorithms
... and specifies a priority for each algorithm."  But I cannot find the word
priority in the registry, nor in the sole reference in the registry, RFC
7616.  Can you update this to point to whatever defines the priority?

Dale

----------

   Abstract

   This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for secure
   digest algorithms to replace the broken MD5 algorithm.

Might be worth specifying what the "secure digest algorithms" are.

   1.  Introduction

   [...] which by default uses MD5 as
   the default algorithm.

Do you want "default" twice in this phrase?

   This document updates the Digest Access Authentication scheme used by
   SIP to support the list of digest algorithms defined in the "Hash
   Algorithms for HTTP Digest Authentication" registry defined by
   [RFC7616].

This should be phrased "to support the algorithms defined in the "Hash
Algorithms for HTTP Digest Authentication" registry".  This phrasing
gives a late-binding interpretation, that is, if an algorithm is added
to the registry, ipso facto it becomes authorized for use in SIP.

   2.  The SIP Digest Authentication Scheme

   This section describes the modifications to the operation of the
   Digest mechanism as specified in [RFC3261] in order to support the
   SHA- 256 and SHA-512/256 algorithms as described in [RFC7616], and
   also to require support for the "qop" option."

Similarly, you want this to be late-binding:

   This section describes the modifications to the operation of the
   Digest mechanism as specified in [RFC3261] in order to support the
   algorithms defined in the "Hash Algorithms for HTTP Digest
   Authentication" registry defined by [RFC7616].
	      
--

   2.1.  Hash Algorithms

   The Digest scheme has an 'algorithm' parameter that specifies the
   algorithm to be used to compute the digest of the response.  The IANA
   registry named "HTTP Digest Hash Algorithms" specifies the algorithms
   that correspond to 'algorithm' values, and specifies a priority for
   each algorithm.

I don't see a priority specified in the registry.

   3.  Augmented BNF for the SIP Protocol

   The number of hex digits must be specified by the specification of
   the algorithm used.

It might be better to say that the number of hex digits is implied by
the length of the value of the algorithm used, since the specification
of an algorithm might explicitly define its output as a sequence of
hex digits.

   It extends the algorithm parameter as follows to allow for SHA2
   algorithms to be used:

Or indeed, any algorithm in the registry.

   5.  IANA Considerations

   This document will use the algorithms defined in that
   registry.

Again is the question of binding time:

   This document specifies that algorithms defined in that registry
   may be used in SIP digest authentication.

[END]


From nobody Fri May 17 06:38:46 2019
Return-Path: <oej@edvina.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21D1112018B for <sipcore@ietfa.amsl.com>; Fri, 17 May 2019 06:38:45 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.901
X-Spam-Level: 
X-Spam-Status: No, score=-1.901 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id QaGCR6gInc7T for <sipcore@ietfa.amsl.com>; Fri, 17 May 2019 06:38:42 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 15AC2120137 for <sipcore@ietf.org>; Fri, 17 May 2019 06:38:40 -0700 (PDT)
Received: from [10.13.111.14] (static-212-247-19-62.cust.tele2.se [212.247.19.62]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id 9E184A40; Fri, 17 May 2019 15:38:36 +0200 (CEST)
From: "Olle E. Johansson" <oej@edvina.net>
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: quoted-printable
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.8\))
Message-Id: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net>
Date: Fri, 17 May 2019 15:38:35 +0200
Cc: Olle E Johansson <oej@edvina.net>
To: sipcore@ietf.org
X-Mailer: Apple Mail (2.3445.104.8)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/vPIwHVsHlsq2AyA-DwFVvMatQ00>
Subject: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 17 May 2019 13:38:45 -0000

Hi!
Sorry to be late in this discussion.

" This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for secure
   digest algorithms to replace the broken MD5 algorithm.=E2=80=9D

I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor =
more secure=E2=80=9D to be a bit humble.
In XXX years, the schemes suggested here will be less secure than now.
The good thing is that we don=E2=80=99t have to update this document =
every time
IANA adds a new algorithm to the registry. :-)

section 2: "SHA- 256=E2=80=9D - remove the extra space. Also, there=E2=80=99=
s an extra
quotation mark at the end of the section.

Section 2.1:

"Note that [RFC7616
] defines a -sess variant for each algorithm; the
   -sess variants are not used with SIP.=E2=80=9D

Is this already forbidden in 3261 or is this new proposed language? If =
so, =E2=80=9Care not=E2=80=9D should propably
be something like =E2=80=9CMUST not=E2=80=9D

Section 2.2:

Is this an update to 7616 or just an explanation of 7616?

Section 2.4:

"When the UAC receives a response with multiple header fields with the
   same realm it SHOULD use the topmost header field that it supports,
   unless a local policy dictates otherwise.=E2=80=9D

Why a SHOULD? I would prefer a MUST.

=E2=80=9CWhen the UAC receives a 401 response with multiple =
WWW-Authenticate
   header fields with different realms it SHOULD retry and include an
   Authorization header field containing credentials that match the
   topmost header field of any one of the realms.=E2=80=9D

If you are disallowing multiple Authorization headers for the same =
realm,
but with different algorithms I think this should be clearly written. In =
my
view, that would be a good thing.

 "8.  Servers MUST be able to properly handle "qop" parameter received
   in an authorization header field, and clients MUST be able to
   properly handle "qop" parameter received in WWW-Authenticate and
   Proxy-Authenticate header fields.  Servers MUST always send a "qop"
   parameter in WWW-Authenticate and Proxy-Authenticate header field
   values, and clients MUST send the "qop" parameter in any resulting
   authorization header field.=E2=80=9D

This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D =
then we
add that to SIP 2.0 with no backwards options or compatibility.
Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it =
seems like you
assume that clients have a choise of whether they use it. I think
one has to be a bit more clear so developers understands how
to modify their implementations.


In addition:
Are we ready to require that all SIP 2.0 compliant software support QOP?

I would like to run an online-SIPit when we have software that supports =
this
so we can test the behaviour, especially looking into downgrade attacks.

And as Dave said, I don=E2=80=99t see any priority in the IANA registry. =
RFC 7616 mentions
=E2=80=9Cstrongest=E2=80=9D algorithm. "A user agent MUST choose to use =
the strongest auth-scheme it
   understands and request credentials from the user based upon that
   challenge.=E2=80=9D and then adds "When the server offers choices of =
authentication schemes using the
   WWW-Authenticate header field, the strength of the resulting
   authentication is only as good as that of the of the weakest of the
   authentication schemes.=E2=80=9D

I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=9D =
in RFC 7616.=20

Note that this document also suggests that UACs remember the =
=E2=80=9Cstrongest=E2=80=9D
algorithm used by a specific server/service and refuse a downgrade =
attack
- without discussing any implementation issues.


Good work. A small step forward!

Cheers,
/O



From nobody Sat May 18 10:42:58 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6F9CD1200FC for <sipcore@ietfa.amsl.com>; Sat, 18 May 2019 10:42:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id BKsaNfpZWVGT for <sipcore@ietfa.amsl.com>; Sat, 18 May 2019 10:42:53 -0700 (PDT)
Received: from mail-io1-xd2b.google.com (mail-io1-xd2b.google.com [IPv6:2607:f8b0:4864:20::d2b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 33FC31200B4 for <sipcore@ietf.org>; Sat, 18 May 2019 10:42:53 -0700 (PDT)
Received: by mail-io1-xd2b.google.com with SMTP id s20so7961928ioj.7 for <sipcore@ietf.org>; Sat, 18 May 2019 10:42:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=8bkBQZtIcugXUXMb49m82ehLUakBS0j+Y6yPeo1w6lY=; b=TtuegRVLR0GHP4e+ZMucJ1x08tqD7d4G92oxqecL74kcAX4cn/DkRyRd0+BpN0jgfO xCVbzHTjwFghuUB25MWnDw8Cizvx0peRCwkFJ1UWcv9fIUeqsrv5f5wkSyZazojIky11 et0JdvBRbhgwjD/ZLkfRTxnflsjif7+meNw5S8zpLhYzTgAqkfm8/8Vc6Tlk3znvfgbM oy+jXavJGHGduzRTm7PugzvvTw42Q11+dIc0KN77yQlyD1BfxpzfiBlSZaz24SthGCQx E2gEjXQcnOtW0c5+pVIWv/463p/40n0kIGNxyZbRfe5E9V8n6w+BfWQ8k2csY09uYS6Z zUpA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=8bkBQZtIcugXUXMb49m82ehLUakBS0j+Y6yPeo1w6lY=; b=ajgSfQJOjfxgwPm9nP8BxwxKhsl2F4Wj8cw8i+MqHAp7tQBIknCFYtWWfx/5x3TBVx oI7aXgrdmVR2JBXjp0M09im+ydCssw89/2MSspCy8pDbVu0EOnWxMLDZpsWwNYTfK0pc iBuQ91b66/R8d/1lCXreHHuhRML7O3kJH+IF94OwJ7aXwuMRqy7Wq6LOY1tvqNw7NbSs SZ+nYahTcQ4SaEaOB3Dp21TOOg0ffE4BntL2R4L/2VKy+VdpSU9KWpqwFX1BYR7EzfBd ic4zUBuAc8PWFpkdFOi64WbEYXTEMx9IXM2p0q4c36mSofjWUFL5asMWhOV8RyEPQVSI KBHA==
X-Gm-Message-State: APjAAAUQPl58o1Y5Z0C+q+41PFzeHTlOuwz5NprH/nw5+478Cb6Borv1 sH45x47zMw9Lp5o3J9ilWh0m1VUPRVFjEsH3nk1P346L
X-Google-Smtp-Source: APXvYqzueBYQJhFrTF84gvT04DMOvusGZdVSIOrm5j42avjmUhCKc2eptdfKzIoOHhQaMWZ/JTnIivkNlJLS99DzWy4=
X-Received: by 2002:a5d:8e0c:: with SMTP id e12mr23164700iod.31.1558201372507;  Sat, 18 May 2019 10:42:52 -0700 (PDT)
MIME-Version: 1.0
References: <87bm01mfwp.fsf@hobgoblin.ariadne.com>
In-Reply-To: <87bm01mfwp.fsf@hobgoblin.ariadne.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 18 May 2019 13:42:41 -0400
Message-ID: <CAGL6epKK=4YCJhsP9DB_R5P3EMZpR14WxY07xMwWrz-hE0hB_Q@mail.gmail.com>
To: "Dale R. Worley" <worley@ariadne.com>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004c036805892d072a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Ec2v49IGyItvFBj0adgeL8PTjaE>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 May 2019 17:42:57 -0000

--0000000000004c036805892d072a
Content-Type: text/plain; charset="UTF-8"

Thanks Dale!

See my replies below.

Regards,
 Rifaat


On Fri, May 17, 2019 at 8:20 AM Dale R. Worley <worley@ariadne.com> wrote:

> [resend -- for some reason, this didn't get through to the mailing list]
>
> Sorry for being late with this.  Below are my detailed comments, but
> generally the significant ones fall into two groups:
>
> 1) When is the binding time of "the contents of the Hash Algorithms for
> HTTP Digest Authentication registry"?  That is, if a new algorithm is
> added to the registry, does it automatically become authorized for use
> in SIP?
>
> My impression is that the answer is Yes.  But if so, the wording should
> be updated in several places, because it seems to me that the current
> wording tends to imply that this document copies the list of algorithms
> from the registry at this time and authorizes those algorithms.
>
>
Yes, that is correct.
I will try to make it clearer; feel free to suggest a text, if you want.




> 2) There is discussion "The IANA registry ... specifies the algorithms
> .... and specifies a priority for each algorithm."  But I cannot find the
> word
> priority in the registry, nor in the sole reference in the registry, RFC
> 7616.  Can you update this to point to whatever defines the priority?
>
>
It is specified in section 3.7:
https://tools.ietf.org/html/rfc7616#section-3.7

But I think the wording in the draft is confusing; I will try to clarify
that.



> Dale
>
> ----------
>
>    Abstract
>
>    This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for secure
>    digest algorithms to replace the broken MD5 algorithm.
>
> Might be worth specifying what the "secure digest algorithms" are.
>

Ok



>
>    1.  Introduction
>
>    [...] which by default uses MD5 as
>    the default algorithm.
>
> Do you want "default" twice in this phrase?
>
> No I do not :)
I will fix that.



>    This document updates the Digest Access Authentication scheme used by
>    SIP to support the list of digest algorithms defined in the "Hash
>    Algorithms for HTTP Digest Authentication" registry defined by
>    [RFC7616].
>
> This should be phrased "to support the algorithms defined in the "Hash
> Algorithms for HTTP Digest Authentication" registry".  This phrasing
> gives a late-binding interpretation, that is, if an algorithm is added
> to the registry, ipso facto it becomes authorized for use in SIP.
>

Ok


>
>    2.  The SIP Digest Authentication Scheme
>
>    This section describes the modifications to the operation of the
>    Digest mechanism as specified in [RFC3261] in order to support the
>    SHA- 256 and SHA-512/256 algorithms as described in [RFC7616], and
>    also to require support for the "qop" option."
>
> Similarly, you want this to be late-binding:
>

Ok.



>
>    This section describes the modifications to the operation of the
>    Digest mechanism as specified in [RFC3261] in order to support the
>    algorithms defined in the "Hash Algorithms for HTTP Digest
>    Authentication" registry defined by [RFC7616].
>
> --
>
>    2.1.  Hash Algorithms
>
>    The Digest scheme has an 'algorithm' parameter that specifies the
>    algorithm to be used to compute the digest of the response.  The IANA
>    registry named "HTTP Digest Hash Algorithms" specifies the algorithms
>    that correspond to 'algorithm' values, and specifies a priority for
>    each algorithm.
>
> I don't see a priority specified in the registry.
>

I will clarify it.


>
>    3.  Augmented BNF for the SIP Protocol
>
>    The number of hex digits must be specified by the specification of
>    the algorithm used.
>
> It might be better to say that the number of hex digits is implied by
> the length of the value of the algorithm used, since the specification
> of an algorithm might explicitly define its output as a sequence of
> hex digits.
>
> Ok



>    It extends the algorithm parameter as follows to allow for SHA2
>    algorithms to be used:
>
> Or indeed, any algorithm in the registry.
>
> Ok


>    5.  IANA Considerations
>
>    This document will use the algorithms defined in that
>    registry.
>
> Again is the question of binding time:
>
>    This document specifies that algorithms defined in that registry
>    may be used in SIP digest authentication.

Ok



>
> [END]
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--0000000000004c036805892d072a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>Thanks=C2=A0Dale!</div><div><br></div><div>See my rep=
lies=C2=A0below.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</=
div><div><br></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D=
"gmail_attr">On Fri, May 17, 2019 at 8:20 AM Dale R. Worley &lt;<a href=3D"=
mailto:worley@ariadne.com">worley@ariadne.com</a>&gt; wrote:<br></div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:=
1px solid rgb(204,204,204);padding-left:1ex">[resend -- for some reason, th=
is didn&#39;t get through to the mailing list]<br>
<br>
Sorry for being late with this.=C2=A0 Below are my detailed comments, but<b=
r>
generally the significant ones fall into two groups:<br>
<br>
1) When is the binding time of &quot;the contents of the Hash Algorithms fo=
r<br>
HTTP Digest Authentication registry&quot;?=C2=A0 That is, if a new algorith=
m is<br>
added to the registry, does it automatically become authorized for use<br>
in SIP?<br>
<br>
My impression is that the answer is Yes.=C2=A0 But if so, the wording shoul=
d<br>
be updated in several places, because it seems to me that the current<br>
wording tends to imply that this document copies the list of algorithms<br>
from the registry at this time and authorizes those algorithms.<br>
<br></blockquote><div><br></div><div>Yes, that is correct.</div><div>I will=
 try to make it clearer; feel free to suggest a text, if you want.</div><di=
v><br></div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204)=
;padding-left:1ex">
2) There is discussion &quot;The IANA registry ... specifies the algorithms=
<br>
.... and specifies a priority for each algorithm.&quot;=C2=A0 But I cannot =
find the word<br>
priority in the registry, nor in the sole reference in the registry, RFC<br=
>
7616.=C2=A0 Can you update this to point to whatever defines the priority?<=
br>
<br></blockquote><div><br></div><div>It is specified in section 3.7:</div><=
div><a href=3D"https://tools.ietf.org/html/rfc7616#section-3.7">https://too=
ls.ietf.org/html/rfc7616#section-3.7</a><br></div><div><br></div><div>But I=
 think the wording in the draft is confusing; I will try to clarify that.=
=C2=A0=C2=A0<br></div><div><br></div><div>=C2=A0</div><blockquote class=3D"=
gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(20=
4,204,204);padding-left:1ex">
Dale<br>
<br>
----------<br>
<br>
=C2=A0 =C2=A0Abstract<br>
<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for secur=
e<br>
=C2=A0 =C2=A0digest algorithms to replace the broken MD5 algorithm.<br>
<br>
Might be worth specifying what the &quot;secure digest algorithms&quot; are=
.<br></blockquote><div><br></div><div>Ok</div><div><br></div><div>=C2=A0</d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
=C2=A0 =C2=A01.=C2=A0 Introduction<br>
<br>
=C2=A0 =C2=A0[...] which by default uses MD5 as<br>
=C2=A0 =C2=A0the default algorithm.<br>
<br>
Do you want &quot;default&quot; twice in this phrase?<br>
<br></blockquote><div>No I do not :)</div><div>I will fix that.</div><div><=
br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin=
:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"=
>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0SIP to support the list of digest algorithms defined in the &q=
uot;Hash<br>
=C2=A0 =C2=A0Algorithms for HTTP Digest Authentication&quot; registry defin=
ed by<br>
=C2=A0 =C2=A0[RFC7616].<br>
<br>
This should be phrased &quot;to support the algorithms defined in the &quot=
;Hash<br>
Algorithms for HTTP Digest Authentication&quot; registry&quot;.=C2=A0 This =
phrasing<br>
gives a late-binding interpretation, that is, if an algorithm is added<br>
to the registry, ipso facto it becomes authorized for use in SIP.<br></bloc=
kquote><div><br></div><div>Ok</div><div>=C2=A0</div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex">
<br>
=C2=A0 =C2=A02.=C2=A0 The SIP Digest Authentication Scheme<br>
<br>
=C2=A0 =C2=A0This section describes the modifications to the operation of t=
he<br>
=C2=A0 =C2=A0Digest mechanism as specified in [RFC3261] in order to support=
 the<br>
=C2=A0 =C2=A0SHA- 256 and SHA-512/256 algorithms as described in [RFC7616],=
 and<br>
=C2=A0 =C2=A0also to require support for the &quot;qop&quot; option.&quot;<=
br>
<br>
Similarly, you want this to be late-binding:<br></blockquote><div><br></div=
><div>Ok.</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex">
<br>
=C2=A0 =C2=A0This section describes the modifications to the operation of t=
he<br>
=C2=A0 =C2=A0Digest mechanism as specified in [RFC3261] in order to support=
 the<br>
=C2=A0 =C2=A0algorithms defined in the &quot;Hash Algorithms for HTTP Diges=
t<br>
=C2=A0 =C2=A0Authentication&quot; registry defined by [RFC7616].<br>
<br>
--<br>
<br>
=C2=A0 =C2=A02.1.=C2=A0 Hash Algorithms<br>
<br>
=C2=A0 =C2=A0The Digest scheme has an &#39;algorithm&#39; parameter that sp=
ecifies the<br>
=C2=A0 =C2=A0algorithm to be used to compute the digest of the response.=C2=
=A0 The IANA<br>
=C2=A0 =C2=A0registry named &quot;HTTP Digest Hash Algorithms&quot; specifi=
es the algorithms<br>
=C2=A0 =C2=A0that correspond to &#39;algorithm&#39; values, and specifies a=
 priority for<br>
=C2=A0 =C2=A0each algorithm.<br>
<br>
I don&#39;t see a priority specified in the registry.<br></blockquote><div>=
<br></div><div>I will clarify it.</div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">
<br>
=C2=A0 =C2=A03.=C2=A0 Augmented BNF for the SIP Protocol<br>
<br>
=C2=A0 =C2=A0The number of hex digits must be specified by the specificatio=
n of<br>
=C2=A0 =C2=A0the algorithm used.<br>
<br>
It might be better to say that the number of hex digits is implied by<br>
the length of the value of the algorithm used, since the specification<br>
of an algorithm might explicitly define its output as a sequence of<br>
hex digits.<br>
<br></blockquote><div>Ok</div><div><br></div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">
=C2=A0 =C2=A0It extends the algorithm parameter as follows to allow for SHA=
2<br>
=C2=A0 =C2=A0algorithms to be used:<br>
<br>
Or indeed, any algorithm in the registry.<br>
<br></blockquote><div>Ok</div><div>=C2=A0</div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex">
=C2=A0 =C2=A05.=C2=A0 IANA Considerations<br>
<br>
=C2=A0 =C2=A0This document will use the algorithms defined in that<br>
=C2=A0 =C2=A0registry.<br>
<br>
Again is the question of binding time:<br>
<br>
=C2=A0 =C2=A0This document specifies that algorithms defined in that regist=
ry<br>
=C2=A0 =C2=A0may be used in SIP digest authentication.</blockquote><div>Ok<=
/div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" styl=
e=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);paddin=
g-left:1ex">
<br>
[END]<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div></div>

--0000000000004c036805892d072a--


From nobody Sat May 18 10:50:54 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id EE2EA120090 for <sipcore@ietfa.amsl.com>; Sat, 18 May 2019 10:50:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id xSHwaklPFzW1 for <sipcore@ietfa.amsl.com>; Sat, 18 May 2019 10:50:49 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00077.outbound.protection.outlook.com [40.107.0.77]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 256E8120181 for <sipcore@ietf.org>; Sat, 18 May 2019 10:50:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ecSdjrJLa9sB4OINoCS8kdExGRH5GfHx5Owov7aaiw4=; b=fKg5FudX+i/4unbExCi9jm9sBQjzXlIVoazeZJRe/hHa578ap5BtPzkH31/hdPG/dZ00AwtxBCplVPTq+psyx33YBlms5XATJkcCGolrzA0yWTlc+Z74EN2KTQamSaUlgwFxQbF4m+5YqKBQyjQ+JIc2r8cFoRr75bcdai2ST00=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3403.eurprd07.prod.outlook.com (10.170.247.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.9; Sat, 18 May 2019 17:50:45 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.013; Sat, 18 May 2019 17:50:45 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, "Dale R. Worley" <worley@ariadne.com>
CC: SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
Thread-Index: AQHVDaEsb6699VZVvkm5wlNaw5cTyaZxOe8A
Date: Sat, 18 May 2019 17:50:45 +0000
Message-ID: <030A5F97-2F5F-4220-BDD7-7A554E8BBDE3@ericsson.com>
References: <87bm01mfwp.fsf@hobgoblin.ariadne.com> <CAGL6epKK=4YCJhsP9DB_R5P3EMZpR14WxY07xMwWrz-hE0hB_Q@mail.gmail.com>
In-Reply-To: <CAGL6epKK=4YCJhsP9DB_R5P3EMZpR14WxY07xMwWrz-hE0hB_Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [192.176.1.81]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 178637f2-0ff1-47e5-24a2-08d6dbb95a8d
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB3403; 
x-ms-traffictypediagnostic: HE1PR07MB3403:
x-ms-exchange-purlcount: 2
x-microsoft-antispam-prvs: <HE1PR07MB340382B0D5C03EC239D235A293040@HE1PR07MB3403.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0041D46242
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(376002)(39860400002)(366004)(346002)(136003)(18543002)(199004)(189003)(66946007)(73956011)(66556008)(6116002)(66476007)(26005)(2906002)(66066001)(229853002)(81156014)(6246003)(82746002)(6512007)(76116006)(3846002)(54896002)(8676002)(7736002)(68736007)(81166006)(236005)(6436002)(6306002)(8936002)(64756008)(36756003)(66446008)(53936002)(86362001)(256004)(14444005)(2616005)(606006)(71190400001)(71200400001)(966005)(316002)(11346002)(76176011)(33656002)(478600001)(83716004)(446003)(58126008)(5660300002)(102836004)(6506007)(53546011)(476003)(14454004)(486006)(25786009)(99286004)(44832011)(4326008)(186003)(6486002)(110136005); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3403; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: HuvtyxXgNJ7Obm+eVUApT1s55YbUYCv0sYGR4g3Gu7WYDurt/q+XyTEsxuMZW5M1P/YHHPa4ubtvUWUaeDkqpTYU/RBepvOLoWSWrH7cr/1KwtzEFnHu9gNNuoSUg1DhyqJOWJCihyNHC9ACiis0G5Nt2pfkfbT1I/JJs2GwbdWPQdGNN0cuS52fhCiDzPMVjaXzOfazzzBgsTmtXX7Twm6RytsZBizAIljEVp3u84E9OhBcOf4Ilw/XrSzdWaaYctTUdPJiGORM4ozKj5Io27AL4mEiCWh4uJtVtgLU/YpS6OeIe3Y5JgcHMqk0QqY1xiwLZNCagdAtOe1Ash+aZqa1b0KYFaw00edBZSTKBWeg4jRYNtBHRzC4T69g//Pcz6yJ7+nkXs1+sFWx1bjcrP1Mfe2jVFqbRz4UnCLgZfE=
Content-Type: multipart/alternative; boundary="_000_030A5F972F5F4220BDD77A554E8BBDE3ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 178637f2-0ff1-47e5-24a2-08d6dbb95a8d
X-MS-Exchange-CrossTenant-originalarrivaltime: 18 May 2019 17:50:45.1897 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3403
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/AsSvKRf_hb0XKPJSfhO-ERxE5ho>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 May 2019 17:50:53 -0000

--_000_030A5F972F5F4220BDD77A554E8BBDE3ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_030A5F972F5F4220BDD77A554E8BBDE3ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <70370D767025994FA5C8A7DC83070BEE@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_030A5F972F5F4220BDD77A554E8BBDE3ericssoncom_--


From nobody Sat May 18 11:37:55 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2469A1200E6 for <sipcore@ietfa.amsl.com>; Sat, 18 May 2019 11:37:54 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id rbv5NKQjTocf for <sipcore@ietfa.amsl.com>; Sat, 18 May 2019 11:37:51 -0700 (PDT)
Received: from mail-it1-x135.google.com (mail-it1-x135.google.com [IPv6:2607:f8b0:4864:20::135]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1F6B812003E for <sipcore@ietf.org>; Sat, 18 May 2019 11:37:51 -0700 (PDT)
Received: by mail-it1-x135.google.com with SMTP id i10so17011809ite.0 for <sipcore@ietf.org>; Sat, 18 May 2019 11:37:51 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Tksfom3BiBzGxfPg7w9GsGsrVoGJRlnNTMpYYKK7P78=; b=bUY8hMSOV9JiQvbUZBf/noll/Cdd0vFd9z1cQ+x2+32UJW92qjgNxiDWtH0wlsd3dX ++0khFFkRfKZIAA++e0IH8JAibvwexIjt377YdXn86wYmDxwz3LCpAb/sxke0Km5WFBq pacOqEyVy+AfjtKu25VmODOLIfFTNHBNhPTDpEVuspI9Y2wytqm+CSeffOX1nqiqrwrT 6VNbs1lOd1gXDGpk1SdnO8/D9UssTNyDu7bzQu5/UwDmQCk/I8k+2TF03mQZj9g5lXOw dn8wpmI6p9rx8ssFUTd3KQJADVmL6jy39BEcTHw37TPpvNdQsf9bliCbC4kPJBERUDXe szxA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Tksfom3BiBzGxfPg7w9GsGsrVoGJRlnNTMpYYKK7P78=; b=qd5eft6WRus0uwaF4teKIbNNW8tOm7ZbIsnSiCRgO2sXxmXmdJpl7ajegtumnfFYGQ 0Gbfw7H4mf2bLwuyrpI0ylPZSIpc5/UpxqUm6VxRlU2xqvRv3Ubl0OQHMwHYtcQLKnMv klv0cTxHb4UFYFMwnHc/bB4ufUfJ9rEnxz71ud7eJqbucXvMrAhBXOq/H2Tqt83OOcXK t6EiywyMCnWBYU2e2QJN/w+taqpwYgHcbjKfO9KCajsdBJ4YXjJVjfB9T7WUF2qoShhM xR+FV0SPJs5Tc8wHHHp5FaYglIKLTYpeooErOS3VaZiRkvBE5jd8mGMftVX0TNxY0AoI VeRw==
X-Gm-Message-State: APjAAAUrwo39Wdnl7N5CK+p7jJHYQTJhKESrmzlQHrX587O45UFfGPay jHtLTDtIaOrRpcxMI1C7sP7B2UqYhTWN3S5E8Bf+DFa4
X-Google-Smtp-Source: APXvYqzCv6QJ9l91ppJMtuePMRIyeLFmXTGoIsaitRRtETDeVtjviQD8VcNmOEf98FxVgYwmZw2Uq7fvPUzwwWorDhE=
X-Received: by 2002:a24:e3c6:: with SMTP id d189mr18681362ith.145.1558204670416;  Sat, 18 May 2019 11:37:50 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net>
In-Reply-To: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 18 May 2019 14:37:39 -0400
Message-ID: <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com>
To: "Olle E. Johansson" <oej@edvina.net>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000de1c0d05892dcb61"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/4pRTHCiiSbpG8ekelL6tPRgd-ZQ>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 18 May 2019 18:37:54 -0000

--000000000000de1c0d05892dcb61
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Thanks Olle!

See my replies below.

Regards,
 Rifaat




On Fri, May 17, 2019 at 9:38 AM Olle E. Johansson <oej@edvina.net> wrote:

> Hi!
> Sorry to be late in this discussion.
>
> " This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for secure
>    digest algorithms to replace the broken MD5 algorithm.=E2=80=9D
>
> I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor mor=
e secure=E2=80=9D to be a bit
> humble.
> In XXX years, the schemes suggested here will be less secure than now.
> The good thing is that we don=E2=80=99t have to update this document ever=
y time
> IANA adds a new algorithm to the registry. :-)
>

Ok



>
> section 2: "SHA- 256=E2=80=9D - remove the extra space. Also, there=E2=80=
=99s an extra
> quotation mark at the end of the section.
>
> Ok



> Section 2.1:
>
> "Note that [RFC7616
> ] defines a -sess variant for each algorithm; the
>    -sess variants are not used with SIP.=E2=80=9D
>
> Is this already forbidden in 3261 or is this new proposed language? If so=
,
> =E2=80=9Care not=E2=80=9D should propably
> be something like =E2=80=9CMUST not=E2=80=9D
>
> I do not think that 3261 forbids the -sess variant, and I do not see the
need to forbid it here either.



> Section 2.2:
>
> Is this an update to 7616 or just an explanation of 7616?
>

No update, just an explanation.


>
> Section 2.4:
>
> "When the UAC receives a response with multiple header fields with the
>    same realm it SHOULD use the topmost header field that it supports,
>    unless a local policy dictates otherwise.=E2=80=9D
>
> Why a SHOULD? I would prefer a MUST.
>

I can do that, but the last part of this paragraph states that local policy
can override this recommendations anyway.
So, does it make any difference?


>
> =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Authentic=
ate
>    header fields with different realms it SHOULD retry and include an
>    Authorization header field containing credentials that match the
>    topmost header field of any one of the realms.=E2=80=9D
>
> If you are disallowing multiple Authorization headers for the same realm,
> but with different algorithms I think this should be clearly written. In =
my
> view, that would be a good thing.
>

This is allowed.


>
>  "8.  Servers MUST be able to properly handle "qop" parameter received
>    in an authorization header field, and clients MUST be able to
>    properly handle "qop" parameter received in WWW-Authenticate and
>    Proxy-Authenticate header fields.  Servers MUST always send a "qop"
>    parameter in WWW-Authenticate and Proxy-Authenticate header field
>    values, and clients MUST send the "qop" parameter in any resulting
>    authorization header field.=E2=80=9D
>
> This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D =
then we
> add that to SIP 2.0 with no backwards options or compatibility.
> Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it see=
ms like you
> assume that clients have a choise of whether they use it. I think
> one has to be a bit more clear so developers understands how
> to modify their implementations.
>
> In addition:
> Are we ready to require that all SIP 2.0 compliant software support QOP?
>
>
Here is a quote form RFC3261:

"Use of the "qop" parameter is optional in RFC 2617 for the purposes
of backwards compatibility with RFC 2069; since RFC 2543 was
based on RFC 2069, the "qop" parameter must unfortunately
remain optional for clients and servers to receive."


That is no longer the case with RFC7616.




> I would like to run an online-SIPit when we have software that supports
> this
> so we can test the behaviour, especially looking into downgrade attacks.
>
> Take a look at the security considerations section for more information
about downgrade attacks recommendations.



> And as Dave said, I don=E2=80=99t see any priority in the IANA registry. =
RFC 7616
> mentions
> =E2=80=9Cstrongest=E2=80=9D algorithm. "A user agent MUST choose to use t=
he strongest
> auth-scheme it
>    understands and request credentials from the user based upon that
>    challenge.=E2=80=9D and then adds "When the server offers choices of
> authentication schemes using the
>    WWW-Authenticate header field, the strength of the resulting
>    authentication is only as good as that of the of the weakest of the
>    authentication schemes.=E2=80=9D
>
> I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=9D=
 in RFC 7616.
>
> See section 3.7
https://tools.ietf.org/html/rfc7616#section-3.7

I will make it clearer.



> Note that this document also suggests that UACs remember the =E2=80=9Cstr=
ongest=E2=80=9D
> algorithm used by a specific server/service and refuse a downgrade attack
> - without discussing any implementation issues.
>
>
> Good work. A small step forward!
>
> Cheers,
> /O
>
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--000000000000de1c0d05892dcb61
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Thanks Olle!<div><br></div><div>See my re=
plies below.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div>=
<div><br><div><br></div><div><br></div></div></div><br><div class=3D"gmail_=
quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, May 17, 2019 at 9:38 A=
M Olle E. Johansson &lt;<a href=3D"mailto:oej@edvina.net" target=3D"_blank"=
>oej@edvina.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" s=
tyle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pad=
ding-left:1ex">Hi!<br>
Sorry to be late in this discussion.<br>
<br>
&quot; This document updates the Digest Access Authentication scheme used b=
y<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for secur=
e<br>
=C2=A0 =C2=A0digest algorithms to replace the broken MD5 algorithm.=E2=80=
=9D<br>
<br>
I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor more =
secure=E2=80=9D to be a bit humble.<br>
In XXX years, the schemes suggested here will be less secure than now.<br>
The good thing is that we don=E2=80=99t have to update this document every =
time<br>
IANA adds a new algorithm to the registry. :-)<br></blockquote><div><br></d=
iv><div>Ok</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">
<br>
section 2: &quot;SHA- 256=E2=80=9D - remove the extra space. Also, there=E2=
=80=99s an extra<br>
quotation mark at the end of the section.<br>
<br></blockquote><div>Ok</div><div><br></div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">
Section 2.1:<br>
<br>
&quot;Note that [RFC7616<br>
] defines a -sess variant for each algorithm; the<br>
=C2=A0 =C2=A0-sess variants are not used with SIP.=E2=80=9D<br>
<br>
Is this already forbidden in 3261 or is this new proposed language? If so, =
=E2=80=9Care not=E2=80=9D should propably<br>
be something like =E2=80=9CMUST not=E2=80=9D<br>
<br></blockquote><div>I do not think that 3261 forbids the -sess variant, a=
nd I do not see the need to forbid it here either.</div><div><br></div><div=
>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px =
0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Section 2.2:<br>
<br>
Is this an update to 7616 or just an explanation of 7616?<br></blockquote><=
div><br></div><div>No update, just an explanation.</div><div>=C2=A0</div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-le=
ft:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Section 2.4:<br>
<br>
&quot;When the UAC receives a response with multiple header fields with the=
<br>
=C2=A0 =C2=A0same realm it SHOULD use the topmost header field that it supp=
orts,<br>
=C2=A0 =C2=A0unless a local policy dictates otherwise.=E2=80=9D<br>
<br>
Why a SHOULD? I would prefer a MUST.<br></blockquote><div><br></div><div>I =
can do that, but the last part of this paragraph states that local policy c=
an override this recommendations anyway.</div><div>So, does it make any dif=
ference?</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left=
:1ex">
<br>
=E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Authenticat=
e<br>
=C2=A0 =C2=A0header fields with different realms it SHOULD retry and includ=
e an<br>
=C2=A0 =C2=A0Authorization header field containing credentials that match t=
he<br>
=C2=A0 =C2=A0topmost header field of any one of the realms.=E2=80=9D<br>
<br>
If you are disallowing multiple Authorization headers for the same realm,<b=
r>
but with different algorithms I think this should be clearly written. In my=
<br>
view, that would be a good thing.<br></blockquote><div><br></div><div>This =
is allowed.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">
<br>
=C2=A0&quot;8.=C2=A0 Servers MUST be able to properly handle &quot;qop&quot=
; parameter received<br>
=C2=A0 =C2=A0in an authorization header field, and clients MUST be able to<=
br>
=C2=A0 =C2=A0properly handle &quot;qop&quot; parameter received in WWW-Auth=
enticate and<br>
=C2=A0 =C2=A0Proxy-Authenticate header fields.=C2=A0 Servers MUST always se=
nd a &quot;qop&quot;<br>
=C2=A0 =C2=A0parameter in WWW-Authenticate and Proxy-Authenticate header fi=
eld<br>
=C2=A0 =C2=A0values, and clients MUST send the &quot;qop&quot; parameter in=
 any resulting<br>
=C2=A0 =C2=A0authorization header field.=E2=80=9D<br>
<br>
This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D th=
en we<br>
add that to SIP 2.0 with no backwards options or compatibility.<br>
Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it seems=
 like you<br>
assume that clients have a choise of whether they use it. I think<br>
one has to be a bit more clear so developers understands how<br>
to modify their implementations.<br>
<br></blockquote></div><div class=3D"gmail_quote"><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,20=
4,204);padding-left:1ex">In addition:<br>
Are we ready to require that all SIP 2.0 compliant software support QOP?<br=
>
<br></blockquote><div><br></div><div class=3D"gmail_quote"><div>Here is a q=
uote form RFC3261:</div></div><blockquote style=3D"margin:0px 0px 0px 40px;=
border:none;padding:0px"><div class=3D"gmail_quote"><div>&quot;Use of the &=
quot;qop&quot; parameter is optional in RFC 2617 for the purposes</div></di=
v><div class=3D"gmail_quote">of backwards compatibility with RFC 2069; sinc=
e RFC 2543 was</div><div class=3D"gmail_quote">based on RFC 2069, the &quot=
;qop&quot; parameter must unfortunately</div><div class=3D"gmail_quote"><di=
v>remain optional for clients and servers to receive.&quot;</div></div></bl=
ockquote><div class=3D"gmail_quote"><div><br></div><div>That is no longer t=
he case with RFC7616.</div><br class=3D"gmail-Apple-interchange-newline"></=
div><div class=3D"gmail_quote"><br></div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">
I would like to run an online-SIPit when we have software that supports thi=
s<br>
so we can test the behaviour, especially looking into downgrade attacks.<br=
>
<br></blockquote><div>Take a look at the security considerations section fo=
r more information about downgrade attacks recommendations.</div><div><br><=
/div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
And as Dave said, I don=E2=80=99t see any priority in the IANA registry. RF=
C 7616 mentions<br>
=E2=80=9Cstrongest=E2=80=9D algorithm. &quot;A user agent MUST choose to us=
e the strongest auth-scheme it<br>
=C2=A0 =C2=A0understands and request credentials from the user based upon t=
hat<br>
=C2=A0 =C2=A0challenge.=E2=80=9D and then adds &quot;When the server offers=
 choices of authentication schemes using the<br>
=C2=A0 =C2=A0WWW-Authenticate header field, the strength of the resulting<b=
r>
=C2=A0 =C2=A0authentication is only as good as that of the of the weakest o=
f the<br>
=C2=A0 =C2=A0authentication schemes.=E2=80=9D<br>
<br>
I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=9D i=
n RFC 7616. <br>
<br></blockquote><div>See section 3.7</div><div><a href=3D"https://tools.ie=
tf.org/html/rfc7616#section-3.7">https://tools.ietf.org/html/rfc7616#sectio=
n-3.7</a></div><div><br></div><div>I will make it clearer.</div><div><br></=
div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Note that this document also suggests that UACs remember the =E2=80=9Cstron=
gest=E2=80=9D<br>
algorithm used by a specific server/service and refuse a downgrade attack<b=
r>
- without discussing any implementation issues.<br>
<br>
<br>
Good work. A small step forward!<br>
<br>
Cheers,<br>
/O<br>
<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>
</div>

--000000000000de1c0d05892dcb61--


From nobody Sun May 19 18:16:03 2019
Return-Path: <worley@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 034B7120019 for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 18:16:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.933
X-Spam-Level: 
X-Spam-Status: No, score=-1.933 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665, URIBL_BLOCKED=0.001] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcastmailservice.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id aIiDz-cthi2D for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 18:15:58 -0700 (PDT)
Received: from resqmta-ch2-04v.sys.comcast.net (resqmta-ch2-04v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:36]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 29AD0120108 for <sipcore@ietf.org>; Sun, 19 May 2019 18:15:57 -0700 (PDT)
Received: from resomta-ch2-15v.sys.comcast.net ([69.252.207.111]) by resqmta-ch2-04v.sys.comcast.net with ESMTP id SWtZhc63sUTqrSWuChC1hH; Mon, 20 May 2019 01:15:56 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastmailservice.net; s=20180828_2048; t=1558314956; bh=UB5QIks2hTVP4F6UrJ8rvodXu3AFzzgpwnPWvEqb01U=; h=Received:Received:Received:Received:From:To:Subject:Date: Message-ID; b=WmoIQfzaAU6q740hnP/yO5LT7E5zRMiFbkvlaCZ3LE/iv+Mv/pXV98neelJlSn0RP l1/ph0x+7GlFQ/AHSffKsyjcoRk08RhAZ5S2L3eVtk09MTED8/ueObXce73aT7+sdT EHFmPjvrsh32bfZvd8FX0HSCVeKiYTJYDid07B6v05P/K+fkqrKiwZpWNS/twnsRkX mkQ3DU1CVhqes99haXHOGYYXCRqNEJsu6F8WWYNdVnEHbLTk79I+K9k3AVtZYi6Id6 ToTUtppM4ejZfira0itjcSATNN3d5gUEaNrvjR1h7r5KwXhH+WBovMWMsSP+EYve7A /bBqeZ2xOopEg==
Received: from hobgoblin.ariadne.com ([24.91.37.100]) by resomta-ch2-15v.sys.comcast.net with ESMTPA id SWuBhOgvrCDqZSWuChHDcT; Mon, 20 May 2019 01:15:56 +0000
X-Xfinity-VAAS: gggruggvucftvghtrhhoucdtuddrgeduuddruddtjedggeeiucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuvehomhgtrghsthdqtfgvshhipdfqfgfvpdfpqffurfetoffkrfenuceurghilhhouhhtmecufedttdenucdnvehorghsthgrlhculdeftddtmdenucfjughrpefhvffujghssedttddttddttddtnecuhfhrohhmpeifohhrlhgvhiesrghrihgrughnvgdrtghomhculdffrghlvgcutfdrucghohhrlhgvhidmnecuffhomhgrihhnpehivghtfhdrohhrghenucfkphepvdegrdeluddrfeejrddutddtnecurfgrrhgrmhephhgvlhhopehhohgsghhosghlihhnrdgrrhhirggunhgvrdgtohhmpdhinhgvthepvdegrdeluddrfeejrddutddtpdhmrghilhhfrhhomhepfihorhhlvgihsegrlhhumhdrmhhithdrvgguuhdprhgtphhtthhopehrihhfrggrthdrihgvthhfsehgmhgrihhlrdgtohhmpdhrtghpthhtohepshhiphgtohhrvgesihgvthhfrdhorhhgnecuvehluhhsthgvrhfuihiivgeptd
X-Xfinity-VMeta: sc=300;st=spam
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id x4K1FtCU027480; Sun, 19 May 2019 21:15:55 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id x4K1FsV4027477; Sun, 19 May 2019 21:15:54 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com (Dale R. Worley)
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: sipcore@ietf.org
In-Reply-To: <CAGL6epKK=4YCJhsP9DB_R5P3EMZpR14WxY07xMwWrz-hE0hB_Q@mail.gmail.com> (rifaat.ietf@gmail.com)
Sender: worley@ariadne.com (Dale R. Worley)
Date: Sun, 19 May 2019 21:15:54 -0400
Message-ID: <87d0keexit.fsf@hobgoblin.ariadne.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/ucSj6XbY_5mb8enZxtXi4TA5N-I>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 01:16:00 -0000

Looking into this issue:

> > 2) There is discussion "The IANA registry ... specifies the algorithms
> > .... and specifies a priority for each algorithm."  But I cannot find the
> > word
> > priority in the registry, nor in the sole reference in the registry, RFC
> > 7616.  Can you update this to point to whatever defines the priority?
> >
> >
> It is specified in section 3.7:
> https://tools.ietf.org/html/rfc7616#section-3.7
> 
> But I think the wording in the draft is confusing; I will try to clarify
> that.

Looking at section 2.1 of draft-ietf-sipcore-digest-scheme-02, it reads

   2.1.  Hash Algorithms

   The Digest scheme has an 'algorithm' parameter that specifies the
   algorithm to be used to compute the digest of the response.  The IANA
   registry named "HTTP Digest Hash Algorithms" specifies the algorithms
   that correspond to 'algorithm' values, and specifies a priority for
   each algorithm.

   [RFC3261] specifies only one algorithm, MD5, which is used by
   default.  This document extends [RFC3261] to allow use of any
   registered algorithm.

   The priority of the algorithm defines its usage preference.  UAs
   SHOULD prefer algorithms with higher priorities.

   Note that [RFC7616] defines a -sess variant for each algorithm; the
   -sess variants are not used with SIP.

A nit is that the registry is named "Hash Algorithms for HTTP Digest
Authentication".

RFC 7616 is not referenced here as establishing the priorities, but
rather the IANA registry is referenced.  The critical text is from RFC
7616, which establishes the preference ordering of algorithms not
globally, but based on the authentication challenge in a particular
challenge/response transaction:

   The server MUST
   add these challenges to the response in order of preference, starting
   with the most preferred algorithm, followed by the less preferred
   algorithm.
   [...]
   When the client receives the first challenge, it SHOULD use the first
   challenge it supports, unless a local policy dictates otherwise.

This suggests the wording could be improved along thse lines (changes
marked with "|"):

   2.1.  Hash Algorithms

   The Digest scheme has an 'algorithm' parameter that specifies the
   algorithm to be used to compute the digest of the response.  The IANA
 | registry named "Hash Algorithms for HTTP Digest Authentication"
 | specifies the algorithms
 | that correspond to 'algorithm' values.

   [RFC3261] specifies only one algorithm, MD5, which is used by
   default.  This document extends [RFC3261] to allow use of any
   registered algorithm.

 | [RFC7616] specifies the usage preference when a response
 | contains multiple challenges specifying different algorithms.  That
 | specification is not changed by this document.

   Note that [RFC7616] defines a -sess variant for each algorithm; the
   -sess variants are not used with SIP.

And there is this issue:

> 1) When is the binding time of "the contents of the Hash Algorithms for
> HTTP Digest Authentication registry"?  That is, if a new algorithm is
> added to the registry, does it automatically become authorized for use
> in SIP?
>
> My impression is that the answer is Yes.

Perhaps I am being too fussy about this issue.  But I would like to
ensure that nobody mistakes the intention of this document.  I think
the following two wording changes would be more than enough to avoid
any problems:

   1.  Introduction

   This document updates the Digest Access Authentication scheme used by
   SIP to support the list of digest algorithms defined in the "Hash
 | Algorithms for HTTP Digest Authentication" registry (defined by
 | [RFC7616]) as it is updated from time to time.

   2.1.  Hash Algorithms

   [RFC3261] specifies only one algorithm, MD5, which is used by
   default.  This document extends [RFC3261] to allow use of any
 | algorithm that is registered at the time of use.

Dale


From nobody Sun May 19 19:49:06 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3AB7112003F for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 19:49:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id M7bhzrwZd6rd for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 19:49:03 -0700 (PDT)
Received: from mail-io1-xd36.google.com (mail-io1-xd36.google.com [IPv6:2607:f8b0:4864:20::d36]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 00789120019 for <sipcore@ietf.org>; Sun, 19 May 2019 19:49:02 -0700 (PDT)
Received: by mail-io1-xd36.google.com with SMTP id e19so9858424iob.3 for <sipcore@ietf.org>; Sun, 19 May 2019 19:49:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=4bPVg1VTPUBmBOG14NXxd7tFa4ntMdwlraFNJhrhUDw=; b=Mz/gRdflqS4+FPbcXBkTmG1kWB6QUvVYODjLUGhm4OBC7u34L2lIBe7B2zPeZEtyRx o9z+YzOU5g9LQl27DP+bKZnVESeUblPeXmEz6Y+eSH4ariXY98p0Dz4VWRv4uslxVo6d dJvQcbrXzeB2mliA4z09DzsmV+U0pApHTWdnCERy1gj23pd/AIZ/dp0a2nFuq4waq1qi VmbNAx2HVK+cBMXmYMHQiUul1XGkmpDgj5Is+ZgFRDp0DZwO/ISXyNzCSzNtGFplKsCd srk2M+TyPIq52qFsxmBO2KpRw7NNpT09uS1R2riUbmMxol3Zw+7gKvPGKqsi6n3I32Ny 2fbw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=4bPVg1VTPUBmBOG14NXxd7tFa4ntMdwlraFNJhrhUDw=; b=ATOglwnzaHUoGbzqG6XrIXEMpxxCsD3QfOiVTP/2DC/3/zG58Xz7c+fXdw4PmXner7 wCJpyPVAG7Gkpou9LM++EFEAnzhbW8Azz2oUlPVd7AJ4aNBRGUJI0y1GcJV6YGKZ7TE1 guGxllZQrEuyTWvysTM4YuqvZSJd+mRoB1M/0jF1RPHltayPCpwU8bYp3QuREYZt5kz2 DCVJO7VQurHrB4b9+EBOZpR5Rsnp0vDYJi2KqXhmDFrWiczhhWrRnro7SfA2GzXnQwv/ l/1y5Trzod7COyBdhHdqKgdHVmT4q6Sz7d02LIQFRT5dmeGRJKXEySeqSJ9GIdE98Ihc AzRg==
X-Gm-Message-State: APjAAAWZKHsoofWRtEV4YGrE69+GhoqPiKT+OUgC6o4/cpYDXbKP9chK 7LHmn/eadPZzt1EJEyo6I0in8WFNOsV8EsS+Zrebew==
X-Google-Smtp-Source: APXvYqyUJ59JwexLAzD8oONoGpA39uaoQS4r6+1Z0mWC/dp4jejkgctUA8MEk4aVu0hSGcdsfciWGhI+j68xL65dmNs=
X-Received: by 2002:a6b:7a49:: with SMTP id k9mr22444143iop.73.1558320542278;  Sun, 19 May 2019 19:49:02 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epKK=4YCJhsP9DB_R5P3EMZpR14WxY07xMwWrz-hE0hB_Q@mail.gmail.com> <87d0keexit.fsf@hobgoblin.ariadne.com>
In-Reply-To: <87d0keexit.fsf@hobgoblin.ariadne.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 19 May 2019 22:48:52 -0400
Message-ID: <CAGL6epLxSTSXWxfNjsHjAh22c0OgvyP4Ss5rWpjjQi5D84ou4A@mail.gmail.com>
To: "Dale R. Worley" <worley@ariadne.com>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000005e67f4058948c68a"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Q38EUPJs95VQhX--kujnZF1ZIvo>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 02:49:05 -0000

--0000000000005e67f4058948c68a
Content-Type: text/plain; charset="UTF-8"

Thanks Dale!

I liked your proposed changes; I will incorporate them into the next
version of the document.

Regards,
 Rifaat


On Sun, May 19, 2019 at 9:15 PM Dale R. Worley <worley@ariadne.com> wrote:

> Looking into this issue:
>
> > > 2) There is discussion "The IANA registry ... specifies the algorithms
> > > .... and specifies a priority for each algorithm."  But I cannot find
> the
> > > word
> > > priority in the registry, nor in the sole reference in the registry,
> RFC
> > > 7616.  Can you update this to point to whatever defines the priority?
> > >
> > >
> > It is specified in section 3.7:
> > https://tools.ietf.org/html/rfc7616#section-3.7
> >
> > But I think the wording in the draft is confusing; I will try to clarify
> > that.
>
> Looking at section 2.1 of draft-ietf-sipcore-digest-scheme-02, it reads
>
>    2.1.  Hash Algorithms
>
>    The Digest scheme has an 'algorithm' parameter that specifies the
>    algorithm to be used to compute the digest of the response.  The IANA
>    registry named "HTTP Digest Hash Algorithms" specifies the algorithms
>    that correspond to 'algorithm' values, and specifies a priority for
>    each algorithm.
>
>    [RFC3261] specifies only one algorithm, MD5, which is used by
>    default.  This document extends [RFC3261] to allow use of any
>    registered algorithm.
>
>    The priority of the algorithm defines its usage preference.  UAs
>    SHOULD prefer algorithms with higher priorities.
>
>    Note that [RFC7616] defines a -sess variant for each algorithm; the
>    -sess variants are not used with SIP.
>
> A nit is that the registry is named "Hash Algorithms for HTTP Digest
> Authentication".
>
> RFC 7616 is not referenced here as establishing the priorities, but
> rather the IANA registry is referenced.  The critical text is from RFC
> 7616, which establishes the preference ordering of algorithms not
> globally, but based on the authentication challenge in a particular
> challenge/response transaction:
>
>    The server MUST
>    add these challenges to the response in order of preference, starting
>    with the most preferred algorithm, followed by the less preferred
>    algorithm.
>    [...]
>    When the client receives the first challenge, it SHOULD use the first
>    challenge it supports, unless a local policy dictates otherwise.
>
> This suggests the wording could be improved along thse lines (changes
> marked with "|"):
>
>    2.1.  Hash Algorithms
>
>    The Digest scheme has an 'algorithm' parameter that specifies the
>    algorithm to be used to compute the digest of the response.  The IANA
>  | registry named "Hash Algorithms for HTTP Digest Authentication"
>  | specifies the algorithms
>  | that correspond to 'algorithm' values.
>
>    [RFC3261] specifies only one algorithm, MD5, which is used by
>    default.  This document extends [RFC3261] to allow use of any
>    registered algorithm.
>
>  | [RFC7616] specifies the usage preference when a response
>  | contains multiple challenges specifying different algorithms.  That
>  | specification is not changed by this document.
>
>    Note that [RFC7616] defines a -sess variant for each algorithm; the
>    -sess variants are not used with SIP.
>
> And there is this issue:
>
> > 1) When is the binding time of "the contents of the Hash Algorithms for
> > HTTP Digest Authentication registry"?  That is, if a new algorithm is
> > added to the registry, does it automatically become authorized for use
> > in SIP?
> >
> > My impression is that the answer is Yes.
>
> Perhaps I am being too fussy about this issue.  But I would like to
> ensure that nobody mistakes the intention of this document.  I think
> the following two wording changes would be more than enough to avoid
> any problems:
>
>    1.  Introduction
>
>    This document updates the Digest Access Authentication scheme used by
>    SIP to support the list of digest algorithms defined in the "Hash
>  | Algorithms for HTTP Digest Authentication" registry (defined by
>  | [RFC7616]) as it is updated from time to time.
>
>    2.1.  Hash Algorithms
>
>    [RFC3261] specifies only one algorithm, MD5, which is used by
>    default.  This document extends [RFC3261] to allow use of any
>  | algorithm that is registered at the time of use.
>
> Dale
>

--0000000000005e67f4058948c68a
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks=C2=A0Dale!<div><br></div><div>I liked your proposed=
 changes; I will incorporate them into the next version of the document.</d=
iv><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div>=
</div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">=
On Sun, May 19, 2019 at 9:15 PM Dale R. Worley &lt;<a href=3D"mailto:worley=
@ariadne.com">worley@ariadne.com</a>&gt; wrote:<br></div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">Looking into this issue:<br>
<br>
&gt; &gt; 2) There is discussion &quot;The IANA registry ... specifies the =
algorithms<br>
&gt; &gt; .... and specifies a priority for each algorithm.&quot;=C2=A0 But=
 I cannot find the<br>
&gt; &gt; word<br>
&gt; &gt; priority in the registry, nor in the sole reference in the regist=
ry, RFC<br>
&gt; &gt; 7616.=C2=A0 Can you update this to point to whatever defines the =
priority?<br>
&gt; &gt;<br>
&gt; &gt;<br>
&gt; It is specified in section 3.7:<br>
&gt; <a href=3D"https://tools.ietf.org/html/rfc7616#section-3.7" rel=3D"nor=
eferrer" target=3D"_blank">https://tools.ietf.org/html/rfc7616#section-3.7<=
/a><br>
&gt; <br>
&gt; But I think the wording in the draft is confusing; I will try to clari=
fy<br>
&gt; that.<br>
<br>
Looking at section 2.1 of draft-ietf-sipcore-digest-scheme-02, it reads<br>
<br>
=C2=A0 =C2=A02.1.=C2=A0 Hash Algorithms<br>
<br>
=C2=A0 =C2=A0The Digest scheme has an &#39;algorithm&#39; parameter that sp=
ecifies the<br>
=C2=A0 =C2=A0algorithm to be used to compute the digest of the response.=C2=
=A0 The IANA<br>
=C2=A0 =C2=A0registry named &quot;HTTP Digest Hash Algorithms&quot; specifi=
es the algorithms<br>
=C2=A0 =C2=A0that correspond to &#39;algorithm&#39; values, and specifies a=
 priority for<br>
=C2=A0 =C2=A0each algorithm.<br>
<br>
=C2=A0 =C2=A0[RFC3261] specifies only one algorithm, MD5, which is used by<=
br>
=C2=A0 =C2=A0default.=C2=A0 This document extends [RFC3261] to allow use of=
 any<br>
=C2=A0 =C2=A0registered algorithm.<br>
<br>
=C2=A0 =C2=A0The priority of the algorithm defines its usage preference.=C2=
=A0 UAs<br>
=C2=A0 =C2=A0SHOULD prefer algorithms with higher priorities.<br>
<br>
=C2=A0 =C2=A0Note that [RFC7616] defines a -sess variant for each algorithm=
; the<br>
=C2=A0 =C2=A0-sess variants are not used with SIP.<br>
<br>
A nit is that the registry is named &quot;Hash Algorithms for HTTP Digest<b=
r>
Authentication&quot;.<br>
<br>
RFC 7616 is not referenced here as establishing the priorities, but<br>
rather the IANA registry is referenced.=C2=A0 The critical text is from RFC=
<br>
7616, which establishes the preference ordering of algorithms not<br>
globally, but based on the authentication challenge in a particular<br>
challenge/response transaction:<br>
<br>
=C2=A0 =C2=A0The server MUST<br>
=C2=A0 =C2=A0add these challenges to the response in order of preference, s=
tarting<br>
=C2=A0 =C2=A0with the most preferred algorithm, followed by the less prefer=
red<br>
=C2=A0 =C2=A0algorithm.<br>
=C2=A0 =C2=A0[...]<br>
=C2=A0 =C2=A0When the client receives the first challenge, it SHOULD use th=
e first<br>
=C2=A0 =C2=A0challenge it supports, unless a local policy dictates otherwis=
e.<br>
<br>
This suggests the wording could be improved along thse lines (changes<br>
marked with &quot;|&quot;):<br>
<br>
=C2=A0 =C2=A02.1.=C2=A0 Hash Algorithms<br>
<br>
=C2=A0 =C2=A0The Digest scheme has an &#39;algorithm&#39; parameter that sp=
ecifies the<br>
=C2=A0 =C2=A0algorithm to be used to compute the digest of the response.=C2=
=A0 The IANA<br>
=C2=A0| registry named &quot;Hash Algorithms for HTTP Digest Authentication=
&quot;<br>
=C2=A0| specifies the algorithms<br>
=C2=A0| that correspond to &#39;algorithm&#39; values.<br>
<br>
=C2=A0 =C2=A0[RFC3261] specifies only one algorithm, MD5, which is used by<=
br>
=C2=A0 =C2=A0default.=C2=A0 This document extends [RFC3261] to allow use of=
 any<br>
=C2=A0 =C2=A0registered algorithm.<br>
<br>
=C2=A0| [RFC7616] specifies the usage preference when a response<br>
=C2=A0| contains multiple challenges specifying different algorithms.=C2=A0=
 That<br>
=C2=A0| specification is not changed by this document.<br>
<br>
=C2=A0 =C2=A0Note that [RFC7616] defines a -sess variant for each algorithm=
; the<br>
=C2=A0 =C2=A0-sess variants are not used with SIP.<br>
<br>
And there is this issue:<br>
<br>
&gt; 1) When is the binding time of &quot;the contents of the Hash Algorith=
ms for<br>
&gt; HTTP Digest Authentication registry&quot;?=C2=A0 That is, if a new alg=
orithm is<br>
&gt; added to the registry, does it automatically become authorized for use=
<br>
&gt; in SIP?<br>
&gt;<br>
&gt; My impression is that the answer is Yes.<br>
<br>
Perhaps I am being too fussy about this issue.=C2=A0 But I would like to<br=
>
ensure that nobody mistakes the intention of this document.=C2=A0 I think<b=
r>
the following two wording changes would be more than enough to avoid<br>
any problems:<br>
<br>
=C2=A0 =C2=A01.=C2=A0 Introduction<br>
<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0SIP to support the list of digest algorithms defined in the &q=
uot;Hash<br>
=C2=A0| Algorithms for HTTP Digest Authentication&quot; registry (defined b=
y<br>
=C2=A0| [RFC7616]) as it is updated from time to time.<br>
<br>
=C2=A0 =C2=A02.1.=C2=A0 Hash Algorithms<br>
<br>
=C2=A0 =C2=A0[RFC3261] specifies only one algorithm, MD5, which is used by<=
br>
=C2=A0 =C2=A0default.=C2=A0 This document extends [RFC3261] to allow use of=
 any<br>
=C2=A0| algorithm that is registered at the time of use.<br>
<br>
Dale<br>
</blockquote></div>

--0000000000005e67f4058948c68a--


From nobody Sun May 19 22:40:58 2019
Return-Path: <oej@edvina.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C0EFE120129 for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 22:40:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SraLnbjGOdSy for <sipcore@ietfa.amsl.com>; Sun, 19 May 2019 22:40:52 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F18B6120041 for <sipcore@ietf.org>; Sun, 19 May 2019 22:40:50 -0700 (PDT)
Received: from haworthia-20.webway.org (h-205-16.A165.corp.bahnhof.se [176.10.205.16]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id ED6C22E63; Mon, 20 May 2019 07:40:46 +0200 (CEST)
From: "Olle E. Johansson" <oej@edvina.net>
Message-Id: <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_95652F9B-627F-4BBF-BB19-5FDC0589D1F5"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Mon, 20 May 2019 07:40:46 +0200
In-Reply-To: <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com>
Cc: Olle E Johansson <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Hx79zfOp4kFBX2ShhlxwasQl53Y>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 20 May 2019 05:40:56 -0000

--Apple-Mail=_95652F9B-627F-4BBF-BB19-5FDC0589D1F5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On 18 May 2019, at 20:37, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> =
wrote:
>=20
> Thanks Olle!
>=20
> See my replies below.
>=20
> Regards,
>  Rifaat
>=20
>=20
>=20
>=20
> On Fri, May 17, 2019 at 9:38 AM Olle E. Johansson <oej@edvina.net =
<mailto:oej@edvina.net>> wrote:
> Hi!
> Sorry to be late in this discussion.
>=20
> " This document updates the Digest Access Authentication scheme used =
by
>    the Session Initiation Protocol (SIP) to add support for secure
>    digest algorithms to replace the broken MD5 algorithm.=E2=80=9D
>=20
> I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor =
more secure=E2=80=9D to be a bit humble.
> In XXX years, the schemes suggested here will be less secure than now.
> The good thing is that we don=E2=80=99t have to update this document =
every time
> IANA adds a new algorithm to the registry. :-)
>=20
> Ok
>=20
> =20
>=20
> section 2: "SHA- 256=E2=80=9D - remove the extra space. Also, =
there=E2=80=99s an extra
> quotation mark at the end of the section.
>=20
> Ok
>=20
> =20
> Section 2.1:
>=20
> "Note that [RFC7616
> ] defines a -sess variant for each algorithm; the
>    -sess variants are not used with SIP.=E2=80=9D
>=20
> Is this already forbidden in 3261 or is this new proposed language? If =
so, =E2=80=9Care not=E2=80=9D should propably
> be something like =E2=80=9CMUST not=E2=80=9D
>=20
> I do not think that 3261 forbids the -sess variant, and I do not see =
the need to forbid it here either
So then I suggest we remove the statement that the -sess variants are =
not used with SIP.

>=20
> =20
> Section 2.2:
>=20
> Is this an update to 7616 or just an explanation of 7616?
>=20
> No update, just an explanation.
> =20
>=20
> Section 2.4:
>=20
> "When the UAC receives a response with multiple header fields with the
>    same realm it SHOULD use the topmost header field that it supports,
>    unless a local policy dictates otherwise.=E2=80=9D
>=20
> Why a SHOULD? I would prefer a MUST.
>=20
> I can do that, but the last part of this paragraph states that local =
policy can override this recommendations anyway.
> So, does it make any difference?
Should we allow that? Why would local policy enforce a downgrade?
> =20
>=20
> =E2=80=9CWhen the UAC receives a 401 response with multiple =
WWW-Authenticate
>    header fields with different realms it SHOULD retry and include an
>    Authorization header field containing credentials that match the
>    topmost header field of any one of the realms.=E2=80=9D
>=20
> If you are disallowing multiple Authorization headers for the same =
realm,
> but with different algorithms I think this should be clearly written. =
In my
> view, that would be a good thing.
>=20
> This is allowed.
> =20
>=20
>  "8.  Servers MUST be able to properly handle "qop" parameter received
>    in an authorization header field, and clients MUST be able to
>    properly handle "qop" parameter received in WWW-Authenticate and
>    Proxy-Authenticate header fields.  Servers MUST always send a "qop"
>    parameter in WWW-Authenticate and Proxy-Authenticate header field
>    values, and clients MUST send the "qop" parameter in any resulting
>    authorization header field.=E2=80=9D
>=20
> This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D=
 then we
> add that to SIP 2.0 with no backwards options or compatibility.
> Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it =
seems like you
> assume that clients have a choise of whether they use it. I think
> one has to be a bit more clear so developers understands how
> to modify their implementations.
>=20
> In addition:
> Are we ready to require that all SIP 2.0 compliant software support =
QOP?
>=20
>=20
> Here is a quote form RFC3261:
> "Use of the "qop" parameter is optional in RFC 2617 for the purposes
> of backwards compatibility with RFC 2069; since RFC 2543 was
> based on RFC 2069, the "qop" parameter must unfortunately
> remain optional for clients and servers to receive."
>=20
> That is no longer the case with RFC7616.
Since this is a change from RFC 3261 we propably want clarify that for =
developers.=20
I think that if we want to modify RFC7616 for SIP, we can. The question =
still
stands - are we ready to change the way current auth works today in =
SIP/2.0. There=E2=80=99s
a lot of implementations out there that will suddenly not be =
standard-following.

I=E2=80=99m not saying it=E2=80=99s a bad thing, just that we have to =
understand the implication.
>=20
>=20
> =20
> I would like to run an online-SIPit when we have software that =
supports this
> so we can test the behaviour, especially looking into downgrade =
attacks.
>=20
> Take a look at the security considerations section for more =
information about downgrade attacks recommendations.
>=20
> =20
> And as Dave said, I don=E2=80=99t see any priority in the IANA =
registry. RFC 7616 mentions
> =E2=80=9Cstrongest=E2=80=9D algorithm. "A user agent MUST choose to =
use the strongest auth-scheme it
>    understands and request credentials from the user based upon that
>    challenge.=E2=80=9D and then adds "When the server offers choices =
of authentication schemes using the
>    WWW-Authenticate header field, the strength of the resulting
>    authentication is only as good as that of the of the weakest of the
>    authentication schemes.=E2=80=9D
>=20
> I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=9D=
 in RFC 7616.=20
>=20
> See section 3.7
> https://tools.ietf.org/html/rfc7616#section-3.7 =
<https://tools.ietf.org/html/rfc7616#section-3.7>
>=20
> I will make it clearer.
But that is not part of the registry, so what happens if I somewhere in =
the future add Edvina-9042 to
the registry? What=E2=80=99s the order then? This section just says =
what=E2=80=99s mandatory to implement but doesn=E2=80=99t
say anything about priority or which one that is the =E2=80=9Cstrongest=E2=
=80=9D one.

I like the idea of a prioritized list for developers with some =
=E2=80=9Cstrength=E2=80=9D weight but fail to find one
in these documents.  There has to be some advice in some RFC somewhere.
=E2=80=A6at this point I can=E2=80=99t find anything out there.

Cheers,
/O

>=20
> =20
> Note that this document also suggests that UACs remember the =
=E2=80=9Cstrongest=E2=80=9D
> algorithm used by a specific server/service and refuse a downgrade =
attack
> - without discussing any implementation issues.
>=20
>=20
> Good work. A small step forward!
>=20
> Cheers,
> /O
>=20
>=20
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org <mailto:sipcore@ietf.org>
> https://www.ietf.org/mailman/listinfo/sipcore =
<https://www.ietf.org/mailman/listinfo/sipcore>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore


--Apple-Mail=_95652F9B-627F-4BBF-BB19-5FDC0589D1F5
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On 18 May 2019, at 20:37, Rifaat Shekh-Yusef &lt;<a =
href=3D"mailto:rifaat.ietf@gmail.com" =
class=3D"">rifaat.ietf@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"ltr" =
class=3D""><div dir=3D"ltr" class=3D"">Thanks Olle!<div class=3D""><br =
class=3D""></div><div class=3D"">See my replies below.</div><div =
class=3D""><br class=3D""></div><div class=3D"">Regards,</div><div =
class=3D"">&nbsp;Rifaat</div><div class=3D""><br class=3D""><div =
class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""></div></div></div><br class=3D""><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, May =
17, 2019 at 9:38 AM Olle E. Johansson &lt;<a =
href=3D"mailto:oej@edvina.net" target=3D"_blank" =
class=3D"">oej@edvina.net</a>&gt; wrote:<br class=3D""></div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">Hi!<br class=3D"">
Sorry to be late in this discussion.<br class=3D"">
<br class=3D"">
" This document updates the Digest Access Authentication scheme used =
by<br class=3D"">
&nbsp; &nbsp;the Session Initiation Protocol (SIP) to add support for =
secure<br class=3D"">
&nbsp; &nbsp;digest algorithms to replace the broken MD5 =
algorithm.=E2=80=9D<br class=3D"">
<br class=3D"">
I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor =
more secure=E2=80=9D to be a bit humble.<br class=3D"">
In XXX years, the schemes suggested here will be less secure than =
now.<br class=3D"">
The good thing is that we don=E2=80=99t have to update this document =
every time<br class=3D"">
IANA adds a new algorithm to the registry. :-)<br =
class=3D""></blockquote><div class=3D""><br class=3D""></div><div =
class=3D"">Ok</div><div class=3D""><br class=3D""></div><div =
class=3D"">&nbsp;</div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex">
<br class=3D"">
section 2: "SHA- 256=E2=80=9D - remove the extra space. Also, there=E2=80=99=
s an extra<br class=3D"">
quotation mark at the end of the section.<br class=3D"">
<br class=3D""></blockquote><div class=3D"">Ok</div><div class=3D""><br =
class=3D""></div><div class=3D"">&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">
Section 2.1:<br class=3D"">
<br class=3D"">
"Note that [RFC7616<br class=3D"">
] defines a -sess variant for each algorithm; the<br class=3D"">
&nbsp; &nbsp;-sess variants are not used with SIP.=E2=80=9D<br class=3D"">=

<br class=3D"">
Is this already forbidden in 3261 or is this new proposed language? If =
so, =E2=80=9Care not=E2=80=9D should propably<br class=3D"">
be something like =E2=80=9CMUST not=E2=80=9D<br class=3D"">
<br class=3D""></blockquote><div class=3D"">I do not think that 3261 =
forbids the -sess variant, and I do not see the need to forbid it here =
either</div></div></div></div></blockquote>So then I suggest we remove =
the statement that the -sess variants are not used with =
SIP.</div><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D""><div dir=3D"ltr" class=3D""><div class=3D"gmail_quote"><div =
class=3D""><br class=3D""></div><div class=3D"">&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">
Section 2.2:<br class=3D"">
<br class=3D"">
Is this an update to 7616 or just an explanation of 7616?<br =
class=3D""></blockquote><div class=3D""><br class=3D""></div><div =
class=3D"">No update, just an explanation.</div><div =
class=3D"">&nbsp;</div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex">
<br class=3D"">
Section 2.4:<br class=3D"">
<br class=3D"">
"When the UAC receives a response with multiple header fields with =
the<br class=3D"">
&nbsp; &nbsp;same realm it SHOULD use the topmost header field that it =
supports,<br class=3D"">
&nbsp; &nbsp;unless a local policy dictates otherwise.=E2=80=9D<br =
class=3D"">
<br class=3D"">
Why a SHOULD? I would prefer a MUST.<br class=3D""></blockquote><div =
class=3D""><br class=3D""></div><div class=3D"">I can do that, but the =
last part of this paragraph states that local policy can override this =
recommendations anyway.</div><div class=3D"">So, does it make any =
difference?</div></div></div></div></blockquote>Should we allow that? =
Why would local policy enforce a downgrade?<br class=3D""><blockquote =
type=3D"cite" class=3D""><div class=3D""><div dir=3D"ltr" class=3D""><div =
class=3D"gmail_quote"><div class=3D"">&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">
<br class=3D"">
=E2=80=9CWhen the UAC receives a 401 response with multiple =
WWW-Authenticate<br class=3D"">
&nbsp; &nbsp;header fields with different realms it SHOULD retry and =
include an<br class=3D"">
&nbsp; &nbsp;Authorization header field containing credentials that =
match the<br class=3D"">
&nbsp; &nbsp;topmost header field of any one of the realms.=E2=80=9D<br =
class=3D"">
<br class=3D"">
If you are disallowing multiple Authorization headers for the same =
realm,<br class=3D"">
but with different algorithms I think this should be clearly written. In =
my<br class=3D"">
view, that would be a good thing.<br class=3D""></blockquote><div =
class=3D""><br class=3D""></div><div class=3D"">This is =
allowed.</div><div class=3D"">&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">
<br class=3D"">
&nbsp;"8.&nbsp; Servers MUST be able to properly handle "qop" parameter =
received<br class=3D"">
&nbsp; &nbsp;in an authorization header field, and clients MUST be able =
to<br class=3D"">
&nbsp; &nbsp;properly handle "qop" parameter received in =
WWW-Authenticate and<br class=3D"">
&nbsp; &nbsp;Proxy-Authenticate header fields.&nbsp; Servers MUST always =
send a "qop"<br class=3D"">
&nbsp; &nbsp;parameter in WWW-Authenticate and Proxy-Authenticate header =
field<br class=3D"">
&nbsp; &nbsp;values, and clients MUST send the "qop" parameter in any =
resulting<br class=3D"">
&nbsp; &nbsp;authorization header field.=E2=80=9D<br class=3D"">
<br class=3D"">
This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D =
then we<br class=3D"">
add that to SIP 2.0 with no backwards options or compatibility.<br =
class=3D"">
Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it =
seems like you<br class=3D"">
assume that clients have a choise of whether they use it. I think<br =
class=3D"">
one has to be a bit more clear so developers understands how<br =
class=3D"">
to modify their implementations.<br class=3D"">
<br class=3D""></blockquote></div><div class=3D"gmail_quote"><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">In addition:<br class=3D"">
Are we ready to require that all SIP 2.0 compliant software support =
QOP?<br class=3D"">
<br class=3D""></blockquote><div class=3D""><br class=3D""></div><div =
class=3D"gmail_quote"><div class=3D"">Here is a quote form =
RFC3261:</div></div><blockquote style=3D"margin:0px 0px 0px =
40px;border:none;padding:0px" class=3D""><div class=3D"gmail_quote"><div =
class=3D"">"Use of the "qop" parameter is optional in RFC 2617 for the =
purposes</div></div><div class=3D"gmail_quote">of backwards =
compatibility with RFC 2069; since RFC 2543 was</div><div =
class=3D"gmail_quote">based on RFC 2069, the "qop" parameter must =
unfortunately</div><div class=3D"gmail_quote"><div class=3D"">remain =
optional for clients and servers to =
receive."</div></div></blockquote><div class=3D"gmail_quote"><div =
class=3D""><br class=3D""></div><div class=3D"">That is no longer the =
case with RFC7616.</div></div></div></div></div></blockquote>Since this =
is a change from RFC 3261 we propably want clarify that for =
developers.&nbsp;</div><div>I think that if we want to modify RFC7616 =
for SIP, we can. The question still</div><div>stands - are we ready to =
change the way current auth works today in SIP/2.0. =
There=E2=80=99s</div><div>a lot of implementations out there that will =
suddenly not be standard-following.</div><div><br =
class=3D""></div><div>I=E2=80=99m not saying it=E2=80=99s a bad thing, =
just that we have to understand the implication.<br class=3D""><blockquote=
 type=3D"cite" class=3D""><div class=3D""><div dir=3D"ltr" class=3D""><div=
 class=3D"gmail_quote"><div class=3D"gmail_quote"><br =
class=3D"gmail-Apple-interchange-newline"></div><div =
class=3D"gmail_quote"><br class=3D""></div><div =
class=3D"">&nbsp;</div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex">
I would like to run an online-SIPit when we have software that supports =
this<br class=3D"">
so we can test the behaviour, especially looking into downgrade =
attacks.<br class=3D"">
<br class=3D""></blockquote><div class=3D"">Take a look at the security =
considerations section for more information about downgrade attacks =
recommendations.</div><div class=3D""><br class=3D""></div><div =
class=3D"">&nbsp;</div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex">
And as Dave said, I don=E2=80=99t see any priority in the IANA registry. =
RFC 7616 mentions<br class=3D"">
=E2=80=9Cstrongest=E2=80=9D algorithm. "A user agent MUST choose to use =
the strongest auth-scheme it<br class=3D"">
&nbsp; &nbsp;understands and request credentials from the user based =
upon that<br class=3D"">
&nbsp; &nbsp;challenge.=E2=80=9D and then adds "When the server offers =
choices of authentication schemes using the<br class=3D"">
&nbsp; &nbsp;WWW-Authenticate header field, the strength of the =
resulting<br class=3D"">
&nbsp; &nbsp;authentication is only as good as that of the of the =
weakest of the<br class=3D"">
&nbsp; &nbsp;authentication schemes.=E2=80=9D<br class=3D"">
<br class=3D"">
I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=9D =
in RFC 7616. <br class=3D"">
<br class=3D""></blockquote><div class=3D"">See section 3.7</div><div =
class=3D""><a href=3D"https://tools.ietf.org/html/rfc7616#section-3.7" =
class=3D"">https://tools.ietf.org/html/rfc7616#section-3.7</a></div><div =
class=3D""><br class=3D""></div><div class=3D"">I will make it =
clearer.</div></div></div></div></blockquote>But that is not part of the =
registry, so what happens if I somewhere in the future add Edvina-9042 =
to</div><div>the registry? What=E2=80=99s the order then? This section =
just says what=E2=80=99s mandatory to implement but =
doesn=E2=80=99t</div><div>say anything about priority or which one that =
is the =E2=80=9Cstrongest=E2=80=9D one.</div><div><br =
class=3D""></div><div>I like the idea of a prioritized list for =
developers with some =E2=80=9Cstrength=E2=80=9D weight but fail to find =
one</div><div>in these documents. &nbsp;There has to be some advice in =
some RFC somewhere.</div><div>=E2=80=A6at this point I can=E2=80=99t =
find anything out there.</div><div><br =
class=3D""></div><div>Cheers,</div><div>/O</div><div><br =
class=3D""><blockquote type=3D"cite" class=3D""><div class=3D""><div =
dir=3D"ltr" class=3D""><div class=3D"gmail_quote"><div class=3D""><br =
class=3D""></div><div class=3D"">&nbsp;</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex">
Note that this document also suggests that UACs remember the =
=E2=80=9Cstrongest=E2=80=9D<br class=3D"">
algorithm used by a specific server/service and refuse a downgrade =
attack<br class=3D"">
- without discussing any implementation issues.<br class=3D"">
<br class=3D"">
<br class=3D"">
Good work. A small step forward!<br class=3D"">
<br class=3D"">
Cheers,<br class=3D"">
/O<br class=3D"">
<br class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sipcore mailing list<br class=3D"">
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank" =
class=3D"">sipcore@ietf.org</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore</a><br =
class=3D"">
</blockquote></div>
</div>
_______________________________________________<br class=3D"">sipcore =
mailing list<br class=3D""><a href=3D"mailto:sipcore@ietf.org" =
class=3D"">sipcore@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore<br =
class=3D""></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_95652F9B-627F-4BBF-BB19-5FDC0589D1F5--


From nobody Mon May 20 19:17:21 2019
Return-Path: <worley@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CA64C120074 for <sipcore@ietfa.amsl.com>; Mon, 20 May 2019 19:17:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.934
X-Spam-Level: 
X-Spam-Status: No, score=-1.934 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcastmailservice.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id alhD6YQpHxMV for <sipcore@ietfa.amsl.com>; Mon, 20 May 2019 19:17:18 -0700 (PDT)
Received: from resqmta-ch2-01v.sys.comcast.net (resqmta-ch2-01v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 1B7DF120021 for <sipcore@ietf.org>; Mon, 20 May 2019 19:17:17 -0700 (PDT)
Received: from resomta-ch2-14v.sys.comcast.net ([69.252.207.110]) by resqmta-ch2-01v.sys.comcast.net with ESMTP id SthyhdjIbLJtxSuL6hqaEG; Tue, 21 May 2019 02:17:16 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastmailservice.net; s=20180828_2048; t=1558405036; bh=f35Q3XKLDwUdsdPxsTpPfmfsXWfHMhbGYIEmIRuwUls=; h=Received:Received:Received:Received:From:To:Subject:Date: Message-ID; b=JARyodjRr0nG7QWWsbzbFKFb42og0I1cxYfSalSZV1ZHNZz9GFzcDn2flMijZLthZ y+FXpdU05LLPWwBVW8sWf+mpJtsClIU245IrJFtDuxEw5mBlAmm+L2gbbwklQA/wdY oCDNvwwcT5CAUDvbbNMqr6GJo7fDu2wFNeC/VDKxJcR61FL7JM6wxYDTZPCq55Gh83 xEOVVPkKiLHoAb0+N+JEDAIkFucxNU0IJCYHDqZDtVOyw6NDfh3KmKjifjxZFZ+tZJ 9F0EzC1yhYbBhDGzVEFoBW9BvpZuQ90iThm3WiFePo/ekrh04EAHah56HsqNOYdcP8 gcaYJk0bv95LA==
Received: from hobgoblin.ariadne.com ([24.91.37.100]) by resomta-ch2-14v.sys.comcast.net with ESMTPA id SuL5hwCteZrgwSuL6hpL6l; Tue, 21 May 2019 02:17:16 +0000
X-Xfinity-VAAS: gggruggvucftvghtrhhoucdtuddrgeduuddruddtledgheeiucetufdoteggodetrfdotffvucfrrhhofhhilhgvmecuvehomhgtrghsthdqtfgvshhipdfqfgfvpdfpqffurfetoffkrfenuceurghilhhouhhtmecufedttdenucdnvehorghsthgrlhculdeftddtmdenucfjughrpefhvffujghssedttddttddttddtnecuhfhrohhmpeifohhrlhgvhiesrghrihgrughnvgdrtghomhculdffrghlvgcutfdrucghohhrlhgvhidmnecukfhppedvgedrledurdefjedruddttdenucfrrghrrghmpehhvghlohephhhosghgohgslhhinhdrrghrihgrughnvgdrtghomhdpihhnvghtpedvgedrledurdefjedruddttddpmhgrihhlfhhrohhmpeifohhrlhgvhiesrghluhhmrdhmihhtrdgvughupdhrtghpthhtoheprhhifhgrrghtrdhivghtfhesghhmrghilhdrtghomhdprhgtphhtthhopehsihhptghorhgvsehivghtfhdrohhrghenucevlhhushhtvghrufhiiigvpedt
X-Xfinity-VMeta: sc=300;st=spam
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id x4L2HF5I022533; Mon, 20 May 2019 22:17:15 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id x4L2HE2o022530; Mon, 20 May 2019 22:17:14 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com (Dale R. Worley)
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: sipcore@ietf.org
In-Reply-To: <CAGL6epLxSTSXWxfNjsHjAh22c0OgvyP4Ss5rWpjjQi5D84ou4A@mail.gmail.com> (rifaat.ietf@gmail.com)
Sender: worley@ariadne.com (Dale R. Worley)
Date: Mon, 20 May 2019 22:17:14 -0400
Message-ID: <87lfz0eel1.fsf@hobgoblin.ariadne.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/oh23vAUbOyDEnIVEANjpYnmTUsI>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 02:17:20 -0000

Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> writes:
> I liked your proposed changes; I will incorporate them into the next
> version of the document.

Though I did make a mistake -- RFC 7616 only applies to HTTP, so the
statement in draft-ietf-sipcore-digest-scheme-02 section 2.3 para 2 is
not redundant, even though it appears to be repeating RFC 7616.  Therefore...

>> This suggests the wording could be improved along thse lines (changes
>> marked with "|"):
>>
>>    2.1.  Hash Algorithms
>>
>>    The Digest scheme has an 'algorithm' parameter that specifies the
>>    algorithm to be used to compute the digest of the response.  The IANA
>>  | registry named "Hash Algorithms for HTTP Digest Authentication"
>>  | specifies the algorithms
>>  | that correspond to 'algorithm' values.
>>
>>    [RFC3261] specifies only one algorithm, MD5, which is used by
>>    default.  This document extends [RFC3261] to allow use of any
>>    registered algorithm.
>>
>>  | [RFC7616] specifies the usage preference when a response
>>  | contains multiple challenges specifying different algorithms.  That
>>  | specification is not changed by this document.

The above sentence is incorrect.  I intended it to replace the current
para 3 of the section, and it would be good to replace para 3 with
something correct that clarifies the same question.  Perhaps something
like

   A UAS prioritizes which algorithm to use based on the ordering of the
   challenge headers in the response it is processing.  That process is
   specified in section 2.3 and parallels the process used in HTTP
   specified by [RFC7616].

>>    Note that [RFC7616] defines a -sess variant for each algorithm; the
>>    -sess variants are not used with SIP.

Dale


From nobody Tue May 21 05:17:35 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id B9539120041; Tue, 21 May 2019 05:17:26 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155844104667.2726.1226872379895976687@ietfa.amsl.com>
Date: Tue, 21 May 2019 05:17:26 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/jbFFnCskPiSCN10bGzuyRyJiKbg>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-rejected-08.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 12:17:27 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : A Session Initiation Protocol (SIP) Response Code for Rejected Calls
        Authors         : Eric W. Burger
                          Bhavik Nagda
	Filename        : draft-ietf-sipcore-rejected-08.txt
	Pages           : 24
	Date            : 2019-05-21

Abstract:
   This document defines the 608 (Rejected) SIP response code.  This
   response code enables calling parties to learn that an intermediary
   rejected their call attempt.  No one will deliver, and thus no one
   will answer, the call.  As a 6xx code, the caller will be aware that
   future attempts to contact the same User Agent Server will likely
   fail.  The initial use case driving the need for the 608 response
   code is when the intermediary is an analytics engine.  In this case,
   the rejection is by a machine or other process.  This contrasts with
   the 607 (Unwanted) SIP response code, which a human at the target
   User Agent Server indicated the user did not want the call.  In some
   jurisdictions this distinction is important.  This document also
   defines the use of the Call-Info header field in 608 responses to
   enable rejected callers to contact entities that blocked their calls
   in error.  This provides a remediation mechanism for legal callers
   that find their calls blocked.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-rejected/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-rejected-08
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-rejected-08

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-rejected-08


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue May 21 09:12:19 2019
Return-Path: <iesg-secretary@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 1F9CD120153; Tue, 21 May 2019 09:12:17 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: The IESG <iesg-secretary@ietf.org>
To: "IETF-Announce" <ietf-announce@ietf.org>
X-Test-IDTracker: no
X-IETF-IDTracker: 6.96.0
Auto-Submitted: auto-generated
Precedence: bulk
Sender: <iesg-secretary@ietf.org>
CC: Jean Mahoney <mahoney@nostrum.com>, adam@nostrum.com, sipcore-chairs@ietf.org, sipcore@ietf.org, draft-ietf-sipcore-rejected@ietf.org, mahoney@nostrum.com
Content-Transfer-Encoding: 7bit
Reply-To: ietf@ietf.org
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Message-ID: <155845513708.2578.7087161789557906045.idtracker@ietfa.amsl.com>
Date: Tue, 21 May 2019 09:12:17 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/RGX8H08cSnVlYwP4Z46x1vrgqmI>
Subject: [sipcore] Last Call: <draft-ietf-sipcore-rejected-08.txt> (A Session Initiation Protocol (SIP) Response Code for Rejected Calls) to Proposed Standard
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 16:12:17 -0000

The IESG has received a request from the Session Initiation Protocol Core WG
(sipcore) to consider the following document: - 'A Session Initiation
Protocol (SIP) Response Code for Rejected Calls'
  <draft-ietf-sipcore-rejected-08.txt> as Proposed Standard

The IESG plans to make a decision in the next few weeks, and solicits final
comments on this action. Please send substantive comments to the
ietf@ietf.org mailing lists by 2019-06-04. Exceptionally, comments may be
sent to iesg@ietf.org instead. In either case, please retain the beginning of
the Subject line to allow automated sorting.

Abstract


   This document defines the 608 (Rejected) SIP response code.  This
   response code enables calling parties to learn that an intermediary
   rejected their call attempt.  No one will deliver, and thus no one
   will answer, the call.  As a 6xx code, the caller will be aware that
   future attempts to contact the same User Agent Server will likely
   fail.  The initial use case driving the need for the 608 response
   code is when the intermediary is an analytics engine.  In this case,
   the rejection is by a machine or other process.  This contrasts with
   the 607 (Unwanted) SIP response code, which a human at the target
   User Agent Server indicated the user did not want the call.  In some
   jurisdictions this distinction is important.  This document also
   defines the use of the Call-Info header field in 608 responses to
   enable rejected callers to contact entities that blocked their calls
   in error.  This provides a remediation mechanism for legal callers
   that find their calls blocked.




The file can be obtained via
https://datatracker.ietf.org/doc/draft-ietf-sipcore-rejected/

IESG discussion can be tracked via
https://datatracker.ietf.org/doc/draft-ietf-sipcore-rejected/ballot/


No IPR declarations have been submitted directly on this I-D.





From nobody Tue May 21 13:57:36 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 44B4E1200D6 for <sipcore@ietfa.amsl.com>; Tue, 21 May 2019 13:57:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SPTi-Nyku4jc for <sipcore@ietfa.amsl.com>; Tue, 21 May 2019 13:57:32 -0700 (PDT)
Received: from EUR03-AM5-obe.outbound.protection.outlook.com (mail-eopbgr30085.outbound.protection.outlook.com [40.107.3.85]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 76D9F12001A for <sipcore@ietf.org>; Tue, 21 May 2019 13:57:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=HDBbnhB06ODFTP2S1X0uI+ONgZzvqseEbs1Z3X+cOU0=; b=P4ZTfwcy3y59KL16/MjCJcVMGV9lr++dHwfdZNBjyYbmNWSif9fnPHeduKm6FeDE4Y5EcMFrKeJIJ+6X3IQ6f+aUTSZmIby77UxYTL25txvN0LwdQFcdJT5XQ/fM/kW9aPHbE2hCCKFTQ7LdqU+cJZjd2Hrxw6HsUn/PDrDbjsc=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3516.eurprd07.prod.outlook.com (10.170.248.11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.7; Tue, 21 May 2019 20:57:29 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.013; Tue, 21 May 2019 20:57:29 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: "Olle E. Johansson" <oej@edvina.net>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AA==
Date: Tue, 21 May 2019 20:57:29 +0000
Message-ID: <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net>
In-Reply-To: <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [79.140.208.49]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: b41c8721-4be0-499a-279a-08d6de2ef024
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB3516; 
x-ms-traffictypediagnostic: HE1PR07MB3516:
x-microsoft-antispam-prvs: <HE1PR07MB35160CB86C5CEB7F7A9E99F493070@HE1PR07MB3516.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0044C17179
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(366004)(396003)(39860400002)(136003)(376002)(189003)(199004)(18543002)(51444003)(5660300002)(91956017)(76116006)(36756003)(66946007)(486006)(73956011)(25786009)(186003)(86362001)(6512007)(4326008)(102836004)(26005)(476003)(446003)(83716004)(11346002)(71190400001)(71200400001)(2616005)(66066001)(6436002)(3846002)(6116002)(14444005)(256004)(58126008)(110136005)(8676002)(68736007)(82746002)(33656002)(6486002)(81156014)(14454004)(81166006)(99286004)(53936002)(8936002)(66556008)(508600001)(66476007)(229853002)(6246003)(305945005)(44832011)(316002)(76176011)(6506007)(64756008)(66446008)(7736002)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3516; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: USHETi8xb5zBIDsVQxsNLQJwLNXLeEIoAhzIISKWekdGvv7zWJNuL/lnIlVbucsuHoGz7G6VC+efjPUeMBtC9fIWp3JMXv/TFr7SCi3I5+8c/vcGoordRIAS1djrgLtmt6634jAWx69e+G70F5nrMMKwbfPCFu8KU/y1A5XQhAqHQEWLph1ePAgvHUu2BzsdT+rGMZuoAe0S17wvuHKL94z72u83mzg+B4n7hvVAGzR8z0Ot/6bTWG2iqD75//AfHCivfLN/LjmSH61/2QQyyUAc4Sl/ShRr+b5w1wY7R3+M4/BVrPPfmiUQiVsrtUr6cSdSA+rUF6iEt6sOHfSvN/P3GLfIPyaGQtBQ0jwu8dP7QWmJS6mQ/yF/esJbGZ7AMQxElA9fBx9eQpHtOWZWVDftXkKqtzwstBMdS5qiun4=
Content-Type: text/plain; charset="utf-8"
Content-ID: <9BCFB4CE6664744EB6576E12EED7B0D6@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: b41c8721-4be0-499a-279a-08d6de2ef024
X-MS-Exchange-CrossTenant-originalarrivaltime: 21 May 2019 20:57:29.6378 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3516
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/bMafaQlK1YTEh45VHKF5LD44ASQ>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 21 May 2019 20:57:35 -0000
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From nobody Wed May 22 01:19:45 2019
Return-Path: <oej@edvina.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1089C1200FE for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 01:19:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.9
X-Spam-Level: 
X-Spam-Status: No, score=-1.9 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 15bZ6DnHvyvn for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 01:19:41 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 51FBA120092 for <sipcore@ietf.org>; Wed, 22 May 2019 01:19:40 -0700 (PDT)
Received: from [10.131.48.130] (got-fw3.net.multicom-ip.se [85.117.160.164]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id E16AB3202; Wed, 22 May 2019 10:19:36 +0200 (CEST)
Content-Type: text/plain; charset=utf-8
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
From: "Olle E. Johansson" <oej@edvina.net>
In-Reply-To: <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com>
Date: Wed, 22 May 2019 10:19:36 +0200
Cc: Olle E Johansson <oej@edvina.net>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, SIPCORE <sipcore@ietf.org>
Content-Transfer-Encoding: quoted-printable
Message-Id: <AAF8D5AC-9F6C-491B-8F9D-1C54CA2B9961@edvina.net>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/-SJA4-SGDFF7AGHebudpF0PK4qU>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2019 08:19:44 -0000

> On 21 May 2019, at 22:57, Christer Holmberg =
<christer.holmberg@ericsson.com> wrote:
>=20
> Hi,
>=20
> ...
> =20
>>> Section 2.1:
>>>=20
>>> "Note that [RFC7616] defines a -sess variant for each algorithm; the
>>>    -sess variants are not used with SIP.=E2=80=9D
>>>=20
>>> Is this already forbidden in 3261 or is this new proposed language? =
If so, =E2=80=9Care not=E2=80=9D should propably
>>> be something like =E2=80=9CMUST not=E2=80=9D
>>=20
>> I do not think that 3261 forbids the -sess variant, and I do not see =
the need to forbid it here either
>> So then I suggest we remove the statement that the -sess variants are =
not used with SIP.
>=20
> If -sess variant was defined in RFC 7616, it was obviously not =
mentioned in RFC 3261 __
>=20
> What is the difference between the session variant and the non-session =
variant? What is meant by "session"? RFC 7616 doesn't give any =
explanation, and I couldn't find anything by googling either.
>=20
> I do think we need to say *something*.
> =20
> ...=20
>=20
>>> Section 2.4:
>>>=20
>>> "When the UAC receives a response with multiple header fields with =
the
>>>    same realm it SHOULD use the topmost header field that it =
supports,
>>>    unless a local policy dictates otherwise.=E2=80=9D
>>>=20
>>> Why a SHOULD? I would prefer a MUST.
>>=20
>> I can do that, but the last part of this paragraph states that local =
policy can override this recommendations anyway.
>> So, does it make any difference?
>> Should we allow that? Why would local policy enforce a downgrade?
>>=20
>>> =E2=80=9CWhen the UAC receives a 401 response with multiple =
WWW-Authenticate
>>>    header fields with different realms it SHOULD retry and include =
an
>>>    Authorization header field containing credentials that match the
>>>    topmost header field of any one of the realms.=E2=80=9D
>>>=20
>>> If you are disallowing multiple Authorization headers for the same =
realm,
>>> but with different algorithms I think this should be clearly =
written. In my
>>> view, that would be a good thing.
>>=20
>> This is allowed.
> =20
> RFC 3261 does not say anything about using the topmost header, does =
it?
>=20
>>>  "8.  Servers MUST be able to properly handle "qop" parameter =
received
>>>    in an authorization header field, and clients MUST be able to
>>>    properly handle "qop" parameter received in WWW-Authenticate and
>>>    Proxy-Authenticate header fields.  Servers MUST always send a =
"qop"
>>>    parameter in WWW-Authenticate and Proxy-Authenticate header field
>>>    values, and clients MUST send the "qop" parameter in any =
resulting
>>>    authorization header field.=E2=80=9D
>>>=20
>>> This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D=
 then we
>>> add that to SIP 2.0 with no backwards options or compatibility.
>>> Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 =
it seems like you
>>> assume that clients have a choise of whether they use it. I think
>>> one has to be a bit more clear so developers understands how
>>> to modify their implementations.
>>> In addition:
>>> Are we ready to require that all SIP 2.0 compliant software support =
QOP?
>>>=20
>>> Here is a quote form RFC3261:
>>> "Use of the "qop" parameter is optional in RFC 2617 for the purposes
>>> of backwards compatibility with RFC 2069; since RFC 2543 was
>>> based on RFC 2069, the "qop" parameter must unfortunately
>>> remain optional for clients and servers to receive."
>>>=20
>>> That is no longer the case with RFC7616.
>>> Since this is a change from RFC 3261 we propably want clarify that =
for developers.=20
>>> I think that if we want to modify RFC7616 for SIP, we can. The =
question still
>>> stands - are we ready to change the way current auth works today in =
SIP/2.0. There=E2=80=99s
>>> a lot of implementations out there that will suddenly not be =
standard-following.
>>>=20
>>> I=E2=80=99m not saying it=E2=80=99s a bad thing, just that we have =
to understand the implication.
>=20
> The typical way to solve this is to say that endpoints compliant with =
this specification must do this and that, but for backward compatibility =
also needs to be able to not do it.

Which ends up being a non-statement because no developer will get any =
resources to fix this with that kind of openended statement.

/O=


From nobody Wed May 22 01:39:52 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3C08C12010C for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 01:39:51 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id H5Nim7Uv_EmB for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 01:39:48 -0700 (PDT)
Received: from EUR03-VE1-obe.outbound.protection.outlook.com (mail-ve1eur03on060e.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe09::60e]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 617C41200F5 for <sipcore@ietf.org>; Wed, 22 May 2019 01:39:48 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=GeJ203bZUA+AwT/flWdhWgPWv7G16xzvoNl+qfqUNbE=; b=I2ojpTcmwYzoQIzsPjAeBfQDOVx2ken7fBbE0DzDGyfRQvpLIDVlupqZMDFmYxE8/pNTgECC33aABx+51tR0/iHoNGnK+iSBtjiwv3egwHjTvPNoM/m4Q+yfbVMv8TNM+GJ5pTz9IsDGY9JU4gXI+z1UU/ZgReumQAFfKUCuHyU=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB1035.eurprd07.prod.outlook.com (10.162.25.146) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.7; Wed, 22 May 2019 08:39:44 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.016; Wed, 22 May 2019 08:39:44 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: "Olle E. Johansson" <oej@edvina.net>
CC: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAArdMAgAAWYQA=
Date: Wed, 22 May 2019 08:39:44 +0000
Message-ID: <469B35CC-FF3B-4720-9F12-BE971AC8ADFC@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <AAF8D5AC-9F6C-491B-8F9D-1C54CA2B9961@edvina.net>
In-Reply-To: <AAF8D5AC-9F6C-491B-8F9D-1C54CA2B9961@edvina.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [192.176.1.80]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 8ceb0916-1ca4-4ab0-7b7f-08d6de910a94
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1PR07MB1035; 
x-ms-traffictypediagnostic: HE1PR07MB1035:
x-microsoft-antispam-prvs: <HE1PR07MB10352EE505FB5BEC6ED4290C93000@HE1PR07MB1035.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0045236D47
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(396003)(346002)(136003)(39860400002)(366004)(18543002)(51444003)(189003)(199004)(81166006)(316002)(64756008)(73956011)(26005)(66446008)(82746002)(66476007)(54906003)(66556008)(6116002)(25786009)(99286004)(66946007)(76116006)(8676002)(8936002)(81156014)(256004)(3846002)(14444005)(71190400001)(53936002)(83716004)(36756003)(76176011)(5660300002)(86362001)(71200400001)(486006)(508600001)(44832011)(6916009)(6506007)(229853002)(102836004)(6246003)(6512007)(14454004)(66066001)(186003)(7736002)(33656002)(4326008)(2906002)(68736007)(58126008)(446003)(6436002)(11346002)(6486002)(2616005)(305945005)(476003); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB1035; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: EXeI3pVQw7rfoTdoX5pJ8fHFv6vGKWGKk9vHEGSJ9bhLYoJ0tHN5CFPFBV4zaVz2FQfyxTGc5ipbsd3uINuBK2G6G91Qf9xUoGPH4Dj9M5ZHp56iMTvCpuKwEtaWwXN3Lvy7L+xRmTQq3RxjVf3BppV5mfYyq6uE19JPvbEaCD9Ly68bJzyYxJeWp9kJJsDrY6TVJkl1ZLq5vgUK2t+rw8e7OCkc5cTQ5M8Q9c/1z9bt6WF77pPHh9RDrTm99asTt/SRajDZX+4OJ+P7seU/OC3BotrrehdrZb12EYpfpwKAU82Qth3R4agKjJtxeeyLGrpe801XmwpRzhBwKNmmnC3i5yNcvJisiD1Wfj8shAteGMw0vkTsmnMb21RTn+1qsv3aSkp1AOi5pUE+xepRoEzJUZtN2Z74e8cGg+ySmyU=
Content-Type: text/plain; charset="utf-8"
Content-ID: <850FA890F792BA46AA04BEF744DAAE28@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 8ceb0916-1ca4-4ab0-7b7f-08d6de910a94
X-MS-Exchange-CrossTenant-originalarrivaltime: 22 May 2019 08:39:44.6802 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB1035
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/hJzT4-jYv5vevrQbaJKHJFSCofU>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2019 08:39:51 -0000
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From nobody Wed May 22 12:39:56 2019
Return-Path: <mahoney@nostrum.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D54EC1201B5 for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 12:39:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.081
X-Spam-Level: 
X-Spam-Status: No, score=-0.081 tagged_above=-999 required=5 tests=[BAYES_20=-0.001, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, T_SPF_HELO_PERMERROR=0.01, T_SPF_PERMERROR=0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=nostrum.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o6pRGjvlhpXT for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 12:39:47 -0700 (PDT)
Received: from nostrum.com (raven-v6.nostrum.com [IPv6:2001:470:d:1130::1]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 748061202BB for <sipcore@ietf.org>; Wed, 22 May 2019 12:39:47 -0700 (PDT)
Received: from mutabilis-2.local ([47.186.39.7]) (authenticated bits=0) by nostrum.com (8.15.2/8.15.2) with ESMTPSA id x4MJdkeJ090174 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NO) for <sipcore@ietf.org>; Wed, 22 May 2019 14:39:46 -0500 (CDT) (envelope-from mahoney@nostrum.com)
DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=nostrum.com; s=default; t=1558553987; bh=ucnsLiTasoYU8vAoRDYsb+aWOjBwexxhN8qcyqbf/dI=; h=To:From:Subject:Date; b=PMjslGtkebgXbSPi6zrgwTYcINxBhLxFsqSz7TRK2z4tzG5W/aFrV/p+UDbDdio+Q yGk0TyBl4xMQzUwFP2l8YBV/8O/KuuKKa/YMepSkokAeYUuhMHloFLMWdih3YJYUhE H9MuULuN1j1A+rrbamb+bEMdVgt/2N6x6ErK0RLs=
X-Authentication-Warning: raven.nostrum.com: Host [47.186.39.7] claimed to be mutabilis-2.local
To: SIPCORE <sipcore@ietf.org>
From: "A. Jean Mahoney" <mahoney@nostrum.com>
Message-ID: <88cb2638-07fa-7be7-d3c6-242c4f5e2387@nostrum.com>
Date: Wed, 22 May 2019 14:39:52 -0500
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.12; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Q31d3_v1d4NbeNgnQ51UIQhn8Y8>
Subject: [sipcore] WG session for IETF 105?
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 22 May 2019 19:39:55 -0000

Hi all,

Does SIPCORE need a session at IETF 105? If you have a topic that you 
want to discuss at a WG session in Montreal, please respond by 
Wednesday, June 5.

Thanks!

Jean


From nobody Wed May 22 19:35:09 2019
Return-Path: <worley@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D30931200F7 for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 19:35:08 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.934
X-Spam-Level: 
X-Spam-Status: No, score=-1.934 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, HEADER_FROM_DIFFERENT_DOMAINS=0.001, RCVD_IN_DNSWL_LOW=-0.7, SPF_SOFTFAIL=0.665] autolearn=no autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcastmailservice.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id IaKA3ZxzwKap for <sipcore@ietfa.amsl.com>; Wed, 22 May 2019 19:35:07 -0700 (PDT)
Received: from resqmta-ch2-10v.sys.comcast.net (resqmta-ch2-10v.sys.comcast.net [IPv6:2001:558:fe21:29:69:252:207:42]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E1C6B12008F for <sipcore@ietf.org>; Wed, 22 May 2019 19:35:06 -0700 (PDT)
Received: from resomta-ch2-01v.sys.comcast.net ([69.252.207.97]) by resqmta-ch2-10v.sys.comcast.net with ESMTP id TcGDhU64dt5QsTdZRhkDFZ; Thu, 23 May 2019 02:35:05 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcastmailservice.net; s=20180828_2048; t=1558578905; bh=6zgNyL2kql/bIVNQBVCf7YBvYHC45xBQB4Ax060Arkk=; h=Received:Received:Received:Received:From:To:Subject:Date: Message-ID; b=hxZ+AHg4sOD3fyP/nYgfP2XEbVh+z+3cbgVhoCx/qRXDS7vM0eTsQ0zIlqnx6hNNF b8XWdZWlw12NlvnoAIsvAQxGrTzVb/ginLI1Bixo/wivISVBNyelKoGRKR4itk1Z5t 1I+akEbSAL7DheST4mXVbsTuCwTrK5lYM6nsRguEd+uGckq4wXbUCQQlyEjqntcEKx d+Dm5GSIFYirdJM29a59fCHcx3vKErvJBfUzBVi0S+P8LinylG3WeWxnZFdxcy56le wYZGhnAtMN2sRXKWoIcRVlWoSLKujKJC6TIIK9X9p2xm6xtmZdm+wvbq98MqDx5+47 0f1rapa9Raqtw==
Received: from hobgoblin.ariadne.com ([IPv6:2601:192:4603:9471:222:fbff:fe91:d396]) by resomta-ch2-01v.sys.comcast.net with ESMTPA id TdZQhF8fMsyPHTdZRhPMxZ; Thu, 23 May 2019 02:35:05 +0000
X-Xfinity-VMeta: sc=0;st=legit
Received: from hobgoblin.ariadne.com (hobgoblin.ariadne.com [127.0.0.1]) by hobgoblin.ariadne.com (8.14.7/8.14.7) with ESMTP id x4N2Z3Dc006125; Wed, 22 May 2019 22:35:03 -0400
Received: (from worley@localhost) by hobgoblin.ariadne.com (8.14.7/8.14.7/Submit) id x4N2Z3JJ006120; Wed, 22 May 2019 22:35:03 -0400
X-Authentication-Warning: hobgoblin.ariadne.com: worley set sender to worley@alum.mit.edu using -f
From: worley@ariadne.com (Dale R. Worley)
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: sipcore@ietf.org
Sender: worley@ariadne.com (Dale R. Worley)
Date: Wed, 22 May 2019 22:35:02 -0400
Message-ID: <87mujddhk9.fsf@hobgoblin.ariadne.com>
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/eXGHOJm4ST-YLSoxCy4mnAZ0h7k>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 23 May 2019 02:35:09 -0000

[resent]

Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> writes:
> I liked your proposed changes; I will incorporate them into the next
> version of the document.

Though I did make a mistake -- RFC 7616 only applies to HTTP, so the
statement in draft-ietf-sipcore-digest-scheme-02 section 2.3 para 2 is
not redundant, even though it appears to be repeating RFC 7616.  Therefore...

>> This suggests the wording could be improved along thse lines (changes
>> marked with "|"):
>>
>>    2.1.  Hash Algorithms
>>
>>    The Digest scheme has an 'algorithm' parameter that specifies the
>>    algorithm to be used to compute the digest of the response.  The IANA
>>  | registry named "Hash Algorithms for HTTP Digest Authentication"
>>  | specifies the algorithms
>>  | that correspond to 'algorithm' values.
>>
>>    [RFC3261] specifies only one algorithm, MD5, which is used by
>>    default.  This document extends [RFC3261] to allow use of any
>>    registered algorithm.
>>
>>  | [RFC7616] specifies the usage preference when a response
>>  | contains multiple challenges specifying different algorithms.  That
>>  | specification is not changed by this document.

The above sentence is incorrect.  I intended it to replace the current
para 3 of the section, and it would be good to replace para 3 with
something correct that clarifies the same question.  Perhaps something
like

   A UAS prioritizes which algorithm to use based on the ordering of the
   challenge headers in the response it is processing.  That process is
   specified in section 2.3 and parallels the process used in HTTP
   specified by [RFC7616].

>>    Note that [RFC7616] defines a -sess variant for each algorithm; the
>>    -sess variants are not used with SIP.

Dale


From nobody Thu May 23 17:10:57 2019
Return-Path: <wwwrun@rfc-editor.org>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 08C3A120178; Thu, 23 May 2019 17:10:56 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.201
X-Spam-Level: 
X-Spam-Status: No, score=-4.201 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id DO6rpDcw5ge1; Thu, 23 May 2019 17:10:54 -0700 (PDT)
Received: from rfc-editor.org (rfc-editor.org [4.31.198.49]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4828B120044; Thu, 23 May 2019 17:10:54 -0700 (PDT)
Received: by rfc-editor.org (Postfix, from userid 30) id CB581B81339; Thu, 23 May 2019 17:10:30 -0700 (PDT)
To: ietf-announce@ietf.org, rfc-dist@rfc-editor.org
X-PHP-Originating-Script: 1005:ams_util_lib.php
From: rfc-editor@rfc-editor.org
Cc: rfc-editor@rfc-editor.org, drafts-update-ref@iana.org, sipcore@ietf.org
Content-type: text/plain; charset=UTF-8
Message-Id: <20190524001030.CB581B81339@rfc-editor.org>
Date: Thu, 23 May 2019 17:10:30 -0700 (PDT)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Sfo15wueufvnhshugOQ4Gj-73uQ>
Subject: [sipcore] =?utf-8?q?RFC_8599_on_aPush_Notification_with_the_Sess?= =?utf-8?q?ion_Initiation_Protocol_=28SIP=29?=
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 May 2019 00:10:56 -0000

A new Request for Comments is now available in online RFC libraries.

        
        RFC 8599

        Title:      Push Notification with the Session 
                    Initiation Protocol (SIP) 
        Author:     C. Holmberg,
                    M. Arnold
        Status:     Standards Track
        Stream:     IETF
        Date:       May 2019
        Mailbox:    christer.holmberg@ericsson.com, 
                    michael.arnold@metaswitch.com
        Pages:      40
        Characters: 92823
        Updates/Obsoletes/SeeAlso:   None

        I-D Tag:    draft-ietf-sipcore-sip-push-29.txt

        URL:        https://www.rfc-editor.org/info/rfc8599

        DOI:        10.17487/RFC8599

This document describes how a Push Notification Service (PNS) can be
used to wake a suspended Session Initiation Protocol (SIP) User Agent
(UA) with push notifications, and it also describes how the UA can
send binding-refresh REGISTER requests and receive incoming SIP
requests in an environment in which the UA may be suspended.  The
document defines new SIP URI parameters to exchange PNS information
between the UA and the SIP entity that will then request that push
notifications be sent to the UA.  It also defines the parameters to
trigger such push notification requests.  The document also defines
new feature-capability indicators that can be used to indicate
support of this mechanism.

This document is a product of the Session Initiation Protocol Core Working Group of the IETF.

This is now a Proposed Standard.

STANDARDS TRACK: This document specifies an Internet Standards Track
protocol for the Internet community, and requests discussion and suggestions
for improvements.  Please refer to the current edition of the Official
Internet Protocol Standards (https://www.rfc-editor.org/standards) for the 
standardization state and status of this protocol.  Distribution of this 
memo is unlimited.

This announcement is sent to the IETF-Announce and rfc-dist lists.
To subscribe or unsubscribe, see
  https://www.ietf.org/mailman/listinfo/ietf-announce
  https://mailman.rfc-editor.org/mailman/listinfo/rfc-dist

For searching the RFC series, see https://www.rfc-editor.org/search
For downloading RFCs, see https://www.rfc-editor.org/retrieve/bulk

Requests for special distribution should be addressed to either the
author of the RFC in question, or to rfc-editor@rfc-editor.org.  Unless
specifically noted otherwise on the RFC itself, all RFCs are for
unlimited distribution.


The RFC Editor Team
Association Management Solutions, LLC



From nobody Fri May 24 00:35:54 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0558712025B for <sipcore@ietfa.amsl.com>; Fri, 24 May 2019 00:35:52 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id izOT0GYzczFG for <sipcore@ietfa.amsl.com>; Fri, 24 May 2019 00:35:49 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60088.outbound.protection.outlook.com [40.107.6.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id CEF3B12027C for <sipcore@ietf.org>; Fri, 24 May 2019 00:35:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Lsw7lJ2DKZXDSwQFFQ9noPPwIkT8TjhU1Qran02VW5U=; b=INzksOBB5TnUa4gl2rtgBN4sDJFYZoxuNyiUlVoSHFSb+zUF+6MFVtYYeavTSSI50TSW0ZtwiEsDDKI11LhCMQqqtnJ3ymzICCUt9CReBLQpdAf8YHUQhhR+2KCQ6p2hgdYyCxkCC5R8CfcKPFTC2QhLmPycST1tAlEK0ARQj8A=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1SPR01MB0037.eurprd07.prod.outlook.com (20.176.168.161) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.10; Fri, 24 May 2019 07:35:45 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.016; Fri, 24 May 2019 07:35:45 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: "sipcore@ietf.org" <sipcore@ietf.org>
Thread-Topic: [sipcore] RFC 8599 on aPush Notification with the Session Initiation Protocol (SIP)
Thread-Index: AQHVEcVDkENDlK5FdEmM9HItEhr536Z6FVcA
Date: Fri, 24 May 2019 07:35:45 +0000
Message-ID: <154E8011-B290-4438-9541-84BC10112F52@ericsson.com>
References: <20190524001030.CB581B81339@rfc-editor.org>
In-Reply-To: <20190524001030.CB581B81339@rfc-editor.org>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [192.176.1.83]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: cd77f5c0-a2b0-4e91-e9ad-08d6e01a6eec
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600141)(711020)(4605104)(2017052603328)(7193020); SRVR:HE1SPR01MB0037; 
x-ms-traffictypediagnostic: HE1SPR01MB0037:
x-ms-exchange-purlcount: 7
x-microsoft-antispam-prvs: <HE1SPR01MB003784ABC57D3931762C984093020@HE1SPR01MB0037.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0047BC5ADE
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(39860400002)(366004)(136003)(346002)(396003)(189003)(199004)(86362001)(6512007)(2906002)(6916009)(1730700003)(81156014)(81166006)(53936002)(6116002)(3846002)(25786009)(8676002)(5640700003)(82746002)(316002)(6306002)(58126008)(8936002)(6246003)(7736002)(99286004)(2351001)(305945005)(66066001)(6486002)(6436002)(33656002)(478600001)(14454004)(6506007)(229853002)(446003)(966005)(36756003)(14444005)(256004)(186003)(64756008)(15650500001)(83716004)(26005)(44832011)(71190400001)(71200400001)(2616005)(476003)(11346002)(66574012)(102836004)(486006)(76176011)(66946007)(73956011)(76116006)(66556008)(2501003)(66476007)(68736007)(5660300002)(66446008); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1SPR01MB0037; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: CI/Y7NNpqHknPE/gBLUgOe0mnZYndtoLvZU8jOjrODtXhn1GQtkMPAlkUEvtYPqRsPj23xyyss1tQRcDd0JXWwrbqNYqOGcG+NPjSXCl2XqvAX6JI2ag1v34hrYLiWqU9LWIl/OxsuJVvDrVuJMk1lLt8wlLQdflBJkGQDnIDuOt+kvltPOu09idITtas0b8OkBQ5PfEq0EcKcXCtpaGgrItWI1ZsqZ+CiOV4UA4KjQXu6lf1mvqiND0VPo+PGiVlGSzeofZx13y7XzxOqcQMqyY7ajOyUJ00rKY1KkokWs1TWYG+mq+i7sUvVyg8FIMdH5Ps1V0GHgw+NPNpTAYEmDcmuPkq8ZgHKtr0sJYIAGapus998716eyIWJirPyikC8nIKlCxQbwfgnUSiK4Zr6m50Ba5ETW6qMi2iq5MKS4=
Content-Type: text/plain; charset="utf-8"
Content-ID: <FE15D3F492802B4BB252891F38D4F939@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: cd77f5c0-a2b0-4e91-e9ad-08d6e01a6eec
X-MS-Exchange-CrossTenant-originalarrivaltime: 24 May 2019 07:35:45.2536 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1SPR01MB0037
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/IEv3tsXwEV_HROvCD_5A7BrjXZ8>
Subject: Re: [sipcore] RFC 8599 on aPush Notification with the Session Initiation Protocol (SIP)
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 24 May 2019 07:35:52 -0000

VGhhbmsgWW91IHRvIE1pY2tleSwgYW5kIHRvIGV2ZXJ5b25lIHdobyBwcm92aWRlZCBmZWVkYmFj
ayBhbmQgaW5wdXQgb24gdGhlIGRvY3VtZW50IQ0KDQpSZWdhcmRzLA0KDQpDaHJpc3Rlcg0KDQoN
Cu+7v09uIDI0LzA1LzIwMTksIDMuMTEsICJzaXBjb3JlIG9uIGJlaGFsZiBvZiByZmMtZWRpdG9y
QHJmYy1lZGl0b3Iub3JnIiA8c2lwY29yZS1ib3VuY2VzQGlldGYub3JnIG9uIGJlaGFsZiBvZiBy
ZmMtZWRpdG9yQHJmYy1lZGl0b3Iub3JnPiB3cm90ZToNCg0KICAgIEEgbmV3IFJlcXVlc3QgZm9y
IENvbW1lbnRzIGlzIG5vdyBhdmFpbGFibGUgaW4gb25saW5lIFJGQyBsaWJyYXJpZXMuDQogICAg
DQogICAgICAgICAgICANCiAgICAgICAgICAgIFJGQyA4NTk5DQogICAgDQogICAgICAgICAgICBU
aXRsZTogICAgICBQdXNoIE5vdGlmaWNhdGlvbiB3aXRoIHRoZSBTZXNzaW9uIA0KICAgICAgICAg
ICAgICAgICAgICAgICAgSW5pdGlhdGlvbiBQcm90b2NvbCAoU0lQKSANCiAgICAgICAgICAgIEF1
dGhvcjogICAgIEMuIEhvbG1iZXJnLA0KICAgICAgICAgICAgICAgICAgICAgICAgTS4gQXJub2xk
DQogICAgICAgICAgICBTdGF0dXM6ICAgICBTdGFuZGFyZHMgVHJhY2sNCiAgICAgICAgICAgIFN0
cmVhbTogICAgIElFVEYNCiAgICAgICAgICAgIERhdGU6ICAgICAgIE1heSAyMDE5DQogICAgICAg
ICAgICBNYWlsYm94OiAgICBjaHJpc3Rlci5ob2xtYmVyZ0Blcmljc3Nvbi5jb20sIA0KICAgICAg
ICAgICAgICAgICAgICAgICAgbWljaGFlbC5hcm5vbGRAbWV0YXN3aXRjaC5jb20NCiAgICAgICAg
ICAgIFBhZ2VzOiAgICAgIDQwDQogICAgICAgICAgICBDaGFyYWN0ZXJzOiA5MjgyMw0KICAgICAg
ICAgICAgVXBkYXRlcy9PYnNvbGV0ZXMvU2VlQWxzbzogICBOb25lDQogICAgDQogICAgICAgICAg
ICBJLUQgVGFnOiAgICBkcmFmdC1pZXRmLXNpcGNvcmUtc2lwLXB1c2gtMjkudHh0DQogICAgDQog
ICAgICAgICAgICBVUkw6ICAgICAgICBodHRwczovL3d3dy5yZmMtZWRpdG9yLm9yZy9pbmZvL3Jm
Yzg1OTkNCiAgICANCiAgICAgICAgICAgIERPSTogICAgICAgIDEwLjE3NDg3L1JGQzg1OTkNCiAg
ICANCiAgICBUaGlzIGRvY3VtZW50IGRlc2NyaWJlcyBob3cgYSBQdXNoIE5vdGlmaWNhdGlvbiBT
ZXJ2aWNlIChQTlMpIGNhbiBiZQ0KICAgIHVzZWQgdG8gd2FrZSBhIHN1c3BlbmRlZCBTZXNzaW9u
IEluaXRpYXRpb24gUHJvdG9jb2wgKFNJUCkgVXNlciBBZ2VudA0KICAgIChVQSkgd2l0aCBwdXNo
IG5vdGlmaWNhdGlvbnMsIGFuZCBpdCBhbHNvIGRlc2NyaWJlcyBob3cgdGhlIFVBIGNhbg0KICAg
IHNlbmQgYmluZGluZy1yZWZyZXNoIFJFR0lTVEVSIHJlcXVlc3RzIGFuZCByZWNlaXZlIGluY29t
aW5nIFNJUA0KICAgIHJlcXVlc3RzIGluIGFuIGVudmlyb25tZW50IGluIHdoaWNoIHRoZSBVQSBt
YXkgYmUgc3VzcGVuZGVkLiAgVGhlDQogICAgZG9jdW1lbnQgZGVmaW5lcyBuZXcgU0lQIFVSSSBw
YXJhbWV0ZXJzIHRvIGV4Y2hhbmdlIFBOUyBpbmZvcm1hdGlvbg0KICAgIGJldHdlZW4gdGhlIFVB
IGFuZCB0aGUgU0lQIGVudGl0eSB0aGF0IHdpbGwgdGhlbiByZXF1ZXN0IHRoYXQgcHVzaA0KICAg
IG5vdGlmaWNhdGlvbnMgYmUgc2VudCB0byB0aGUgVUEuICBJdCBhbHNvIGRlZmluZXMgdGhlIHBh
cmFtZXRlcnMgdG8NCiAgICB0cmlnZ2VyIHN1Y2ggcHVzaCBub3RpZmljYXRpb24gcmVxdWVzdHMu
ICBUaGUgZG9jdW1lbnQgYWxzbyBkZWZpbmVzDQogICAgbmV3IGZlYXR1cmUtY2FwYWJpbGl0eSBp
bmRpY2F0b3JzIHRoYXQgY2FuIGJlIHVzZWQgdG8gaW5kaWNhdGUNCiAgICBzdXBwb3J0IG9mIHRo
aXMgbWVjaGFuaXNtLg0KICAgIA0KICAgIFRoaXMgZG9jdW1lbnQgaXMgYSBwcm9kdWN0IG9mIHRo
ZSBTZXNzaW9uIEluaXRpYXRpb24gUHJvdG9jb2wgQ29yZSBXb3JraW5nIEdyb3VwIG9mIHRoZSBJ
RVRGLg0KICAgIA0KICAgIFRoaXMgaXMgbm93IGEgUHJvcG9zZWQgU3RhbmRhcmQuDQogICAgDQog
ICAgU1RBTkRBUkRTIFRSQUNLOiBUaGlzIGRvY3VtZW50IHNwZWNpZmllcyBhbiBJbnRlcm5ldCBT
dGFuZGFyZHMgVHJhY2sNCiAgICBwcm90b2NvbCBmb3IgdGhlIEludGVybmV0IGNvbW11bml0eSwg
YW5kIHJlcXVlc3RzIGRpc2N1c3Npb24gYW5kIHN1Z2dlc3Rpb25zDQogICAgZm9yIGltcHJvdmVt
ZW50cy4gIFBsZWFzZSByZWZlciB0byB0aGUgY3VycmVudCBlZGl0aW9uIG9mIHRoZSBPZmZpY2lh
bA0KICAgIEludGVybmV0IFByb3RvY29sIFN0YW5kYXJkcyAoaHR0cHM6Ly93d3cucmZjLWVkaXRv
ci5vcmcvc3RhbmRhcmRzKSBmb3IgdGhlIA0KICAgIHN0YW5kYXJkaXphdGlvbiBzdGF0ZSBhbmQg
c3RhdHVzIG9mIHRoaXMgcHJvdG9jb2wuICBEaXN0cmlidXRpb24gb2YgdGhpcyANCiAgICBtZW1v
IGlzIHVubGltaXRlZC4NCiAgICANCiAgICBUaGlzIGFubm91bmNlbWVudCBpcyBzZW50IHRvIHRo
ZSBJRVRGLUFubm91bmNlIGFuZCByZmMtZGlzdCBsaXN0cy4NCiAgICBUbyBzdWJzY3JpYmUgb3Ig
dW5zdWJzY3JpYmUsIHNlZQ0KICAgICAgaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0
aW5mby9pZXRmLWFubm91bmNlDQogICAgICBodHRwczovL21haWxtYW4ucmZjLWVkaXRvci5vcmcv
bWFpbG1hbi9saXN0aW5mby9yZmMtZGlzdA0KICAgIA0KICAgIEZvciBzZWFyY2hpbmcgdGhlIFJG
QyBzZXJpZXMsIHNlZSBodHRwczovL3d3dy5yZmMtZWRpdG9yLm9yZy9zZWFyY2gNCiAgICBGb3Ig
ZG93bmxvYWRpbmcgUkZDcywgc2VlIGh0dHBzOi8vd3d3LnJmYy1lZGl0b3Iub3JnL3JldHJpZXZl
L2J1bGsNCiAgICANCiAgICBSZXF1ZXN0cyBmb3Igc3BlY2lhbCBkaXN0cmlidXRpb24gc2hvdWxk
IGJlIGFkZHJlc3NlZCB0byBlaXRoZXIgdGhlDQogICAgYXV0aG9yIG9mIHRoZSBSRkMgaW4gcXVl
c3Rpb24sIG9yIHRvIHJmYy1lZGl0b3JAcmZjLWVkaXRvci5vcmcuICBVbmxlc3MNCiAgICBzcGVj
aWZpY2FsbHkgbm90ZWQgb3RoZXJ3aXNlIG9uIHRoZSBSRkMgaXRzZWxmLCBhbGwgUkZDcyBhcmUg
Zm9yDQogICAgdW5saW1pdGVkIGRpc3RyaWJ1dGlvbi4NCiAgICANCiAgICANCiAgICBUaGUgUkZD
IEVkaXRvciBUZWFtDQogICAgQXNzb2NpYXRpb24gTWFuYWdlbWVudCBTb2x1dGlvbnMsIExMQw0K
ICAgIA0KICAgIA0KICAgIF9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fDQogICAgc2lwY29yZSBtYWlsaW5nIGxpc3QNCiAgICBzaXBjb3JlQGlldGYub3JnDQog
ICAgaHR0cHM6Ly93d3cuaWV0Zi5vcmcvbWFpbG1hbi9saXN0aW5mby9zaXBjb3JlDQogICAgDQoN
Cg==


From nobody Sat May 25 03:36:06 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D6AD120098 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 03:36:05 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id JNdzuBNii8Pe for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 03:36:03 -0700 (PDT)
Received: from mail-io1-xd31.google.com (mail-io1-xd31.google.com [IPv6:2607:f8b0:4864:20::d31]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AE4A8120075 for <sipcore@ietf.org>; Sat, 25 May 2019 03:36:03 -0700 (PDT)
Received: by mail-io1-xd31.google.com with SMTP id g84so9736403ioa.1 for <sipcore@ietf.org>; Sat, 25 May 2019 03:36:03 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=T99Y3W5oZKESYGWF9pBhe1lugyxPvCYkarAeTfg4K8w=; b=JPcdGcnPFHjJs+aPgv97oCFlNwL7ivUDTwNq3I27SWccdPZrc75C5NxcKdJ6EiZucv /dYvjlck2h/ku6O1sE6BFFTmV7WQSlQXASvpFPqPWdsAagZUkDP5fVp+BABNdNqZ9tRL h8hc0pU8UUKth1aQCkTRI64fTqye/7LK0RJ2VCwvqMcjqNyv/oV8dcPfXY4Jg1UYcMHi aXoSf9yvWOMJ0WwdY8iKHZbcC+FtY8Pnf+GigEldc4ojSn9FPbbp3m8HnWdmZOJEjAdg tvMN1fE+PvJuLeG7NVB1hhOSKn8DHcfjwWtZzdQJXwcOKMb7ns3IF52d2q/lnZv1cvWK NL3w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=T99Y3W5oZKESYGWF9pBhe1lugyxPvCYkarAeTfg4K8w=; b=XKLgjKvfdwt1JNk/Qo4ZsZiyiMXP8EKbRBkHI7qkPo2kp55vJNvpYBLmmr0L/5E3XZ 87N81jQ7Um06jPua0932zwDNl4ax6UdTVXN0G6Tw+ZqZCaVGXmFX7vOXCTPv3sq/mvT2 65RDN+g48rC9hxfwSgDypFjMqU+ZhsTWd9uPqqbCDWMwGUhUYmVjYPD7Kxxz0MpNXwXW GQI3q5+j98gNWOfs6DKImit4+6yMaVm1xAvkR9aHc2A1F7lYkyOfij75WJx2O8kUvIAS 2ABQwX7fcp4mYoyu85u/cGbG/b4f7UIpjYfJ6kipXAY+a3rKd/WBMXBuvJlDRKtN7GHY x8EQ==
X-Gm-Message-State: APjAAAWQFnEBggmebW4Rs20tlrwbrlVF3CiUl621W+YnnQC+RuG6SREy rSDaREp4MT81zm0AZCyIxzWLnHEzNDLlhRnj6HZqLrwB
X-Google-Smtp-Source: APXvYqzwTPuVQouqKk4SwbDtNLJfHNJsO6+aiPOekCJGBDseZSOhnUyoF19sCDgp1sGABfO3aA7g52CrTlIrZEfCVuY=
X-Received: by 2002:a5d:8e0c:: with SMTP id e12mr16453384iod.31.1558780562938;  Sat, 25 May 2019 03:36:02 -0700 (PDT)
MIME-Version: 1.0
References: <CAGL6epLxSTSXWxfNjsHjAh22c0OgvyP4Ss5rWpjjQi5D84ou4A@mail.gmail.com> <87lfz0eel1.fsf@hobgoblin.ariadne.com>
In-Reply-To: <87lfz0eel1.fsf@hobgoblin.ariadne.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 06:35:51 -0400
Message-ID: <CAGL6ep+Ha5ymB5Grpz-kz4OG3NgCuPCMKt-+EE0QRvHNB3Pkig@mail.gmail.com>
To: "Dale R. Worley" <worley@ariadne.com>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000bca2030589b3e1fd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/KpFnmlW7KYYMclrjKKWL3z50Wbo>
Subject: Re: [sipcore] Resend: WGLC: draft-ietf-sipcore-digest-scheme
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 10:36:05 -0000

--000000000000bca2030589b3e1fd
Content-Type: text/plain; charset="UTF-8"

Thanks Dale,

I will replace the 3 paragraph of section 2.1 with your proposed text.

Regards,
 Rifaat


On Mon, May 20, 2019 at 10:17 PM Dale R. Worley <worley@ariadne.com> wrote:

> Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> writes:
> > I liked your proposed changes; I will incorporate them into the next
> > version of the document.
>
> Though I did make a mistake -- RFC 7616 only applies to HTTP, so the
> statement in draft-ietf-sipcore-digest-scheme-02 section 2.3 para 2 is
> not redundant, even though it appears to be repeating RFC 7616.
> Therefore...
>
> >> This suggests the wording could be improved along thse lines (changes
> >> marked with "|"):
> >>
> >>    2.1.  Hash Algorithms
> >>
> >>    The Digest scheme has an 'algorithm' parameter that specifies the
> >>    algorithm to be used to compute the digest of the response.  The IANA
> >>  | registry named "Hash Algorithms for HTTP Digest Authentication"
> >>  | specifies the algorithms
> >>  | that correspond to 'algorithm' values.
> >>
> >>    [RFC3261] specifies only one algorithm, MD5, which is used by
> >>    default.  This document extends [RFC3261] to allow use of any
> >>    registered algorithm.
> >>
> >>  | [RFC7616] specifies the usage preference when a response
> >>  | contains multiple challenges specifying different algorithms.  That
> >>  | specification is not changed by this document.
>
> The above sentence is incorrect.  I intended it to replace the current
> para 3 of the section, and it would be good to replace para 3 with
> something correct that clarifies the same question.  Perhaps something
> like
>
>    A UAS prioritizes which algorithm to use based on the ordering of the
>    challenge headers in the response it is processing.  That process is
>    specified in section 2.3 and parallels the process used in HTTP
>    specified by [RFC7616].
>
> >>    Note that [RFC7616] defines a -sess variant for each algorithm; the
> >>    -sess variants are not used with SIP.
>
> Dale
>

--000000000000bca2030589b3e1fd
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Thanks=C2=A0Dale,<div><br></div><div>I will replace the 3 =
paragraph of section 2.1 with your proposed text.</div><div><br></div><div>=
Regards,</div><div>=C2=A0Rifaat</div><div><br></div></div><br><div class=3D=
"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, May 20, 2019 at=
 10:17 PM Dale R. Worley &lt;<a href=3D"mailto:worley@ariadne.com">worley@a=
riadne.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
target=3D"_blank">rifaat.ietf@gmail.com</a>&gt; writes:<br>
&gt; I liked your proposed changes; I will incorporate them into the next<b=
r>
&gt; version of the document.<br>
<br>
Though I did make a mistake -- RFC 7616 only applies to HTTP, so the<br>
statement in draft-ietf-sipcore-digest-scheme-02 section 2.3 para 2 is<br>
not redundant, even though it appears to be repeating RFC 7616.=C2=A0 There=
fore...<br>
<br>
&gt;&gt; This suggests the wording could be improved along thse lines (chan=
ges<br>
&gt;&gt; marked with &quot;|&quot;):<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 =C2=A0 2.1.=C2=A0 Hash Algorithms<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 =C2=A0 The Digest scheme has an &#39;algorithm&#39; paramete=
r that specifies the<br>
&gt;&gt;=C2=A0 =C2=A0 algorithm to be used to compute the digest of the res=
ponse.=C2=A0 The IANA<br>
&gt;&gt;=C2=A0 | registry named &quot;Hash Algorithms for HTTP Digest Authe=
ntication&quot;<br>
&gt;&gt;=C2=A0 | specifies the algorithms<br>
&gt;&gt;=C2=A0 | that correspond to &#39;algorithm&#39; values.<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 =C2=A0 [RFC3261] specifies only one algorithm, MD5, which is=
 used by<br>
&gt;&gt;=C2=A0 =C2=A0 default.=C2=A0 This document extends [RFC3261] to all=
ow use of any<br>
&gt;&gt;=C2=A0 =C2=A0 registered algorithm.<br>
&gt;&gt;<br>
&gt;&gt;=C2=A0 | [RFC7616] specifies the usage preference when a response<b=
r>
&gt;&gt;=C2=A0 | contains multiple challenges specifying different algorith=
ms.=C2=A0 That<br>
&gt;&gt;=C2=A0 | specification is not changed by this document.<br>
<br>
The above sentence is incorrect.=C2=A0 I intended it to replace the current=
<br>
para 3 of the section, and it would be good to replace para 3 with<br>
something correct that clarifies the same question.=C2=A0 Perhaps something=
<br>
like<br>
<br>
=C2=A0 =C2=A0A UAS prioritizes which algorithm to use based on the ordering=
 of the<br>
=C2=A0 =C2=A0challenge headers in the response it is processing.=C2=A0 That=
 process is<br>
=C2=A0 =C2=A0specified in section 2.3 and parallels the process used in HTT=
P<br>
=C2=A0 =C2=A0specified by [RFC7616].<br>
<br>
&gt;&gt;=C2=A0 =C2=A0 Note that [RFC7616] defines a -sess variant for each =
algorithm; the<br>
&gt;&gt;=C2=A0 =C2=A0 -sess variants are not used with SIP.<br>
<br>
Dale<br>
</blockquote></div>

--000000000000bca2030589b3e1fd--


From nobody Sat May 25 04:27:45 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 2485F120099 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 04:27:38 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ifokVZjHtgHK for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 04:27:35 -0700 (PDT)
Received: from mail-it1-x12e.google.com (mail-it1-x12e.google.com [IPv6:2607:f8b0:4864:20::12e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 69F0012001A for <sipcore@ietf.org>; Sat, 25 May 2019 04:27:35 -0700 (PDT)
Received: by mail-it1-x12e.google.com with SMTP id j17so13131738itk.0 for <sipcore@ietf.org>; Sat, 25 May 2019 04:27:35 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=pePvwOfGaSAB/zif/jT0ckM+ZsXi1rwyqYeI2QrwbZY=; b=AgrjsBezN6Vj6SiSYb67XxDcGSVDvrXRWwiVcjD9xa5cvynzQXixyQiTuP9tYdcd0/ HBjMfmi66v3/LIzzB9vgROxatI5SBWbQBBMGzzuMVpw14ie0KoW4ta7fU6Vzc4oSldZ/ FatMHU9l56QJaiEdxZW04nwgPiL0xRgMMh2myWL0juD/R9fUnxJfnoDjulethfOgYTQS N7BOAecteW8b4AIQ2aZpRU4BFQziiQSgfHH9uKtIn8R/K4CEx2dywEiTWzo35oe0b4rE r1p+6HGTBtajITycY+jYPE/WNA6IlgUHQAHfwyqHG5DJEPUlLvKun3/s43f9tjn2ULZB akvg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=pePvwOfGaSAB/zif/jT0ckM+ZsXi1rwyqYeI2QrwbZY=; b=MJQVZwdPuYfo/B5Ae7k8W2AAokCFGHjkfn3a0bE7RgZCOpJw2PgpBEosrY44kIsksa 3eIZv3hyQaa/w8JGSDCsz+wdGQS0cwYxrMp7Aht7AgV7uOo9tho7aZvxjmXpqJ4qn5Xz YBXf1V3v5z2QwkmwYEzZXd53H23TRw8h+Sp4W936NE8ZyugyOt+Y4Kgw5oaz5eC49zb5 HdkpghMSKoDApHIbU3a2eamxaWsiAxoWmWd8f5a0Jrl4ACcc9+4gH78yUYJ5C/u2hk9s PyIjLkQJVrohN1sMH7TH9yZQ+Hx8MpXEreQBEbVG6qRp+0ANU4eYPVkIg7suNrweUBSs 2Zcw==
X-Gm-Message-State: APjAAAV4LCe0SEQd04NrCVxhzfrvNDB1T7fveEoIIXY1/whTkd2Bre3K FLw0GpoSE4o79ME9cn23QiFNqz4EIDgLcMZFGDoAcz5yYwM=
X-Google-Smtp-Source: APXvYqwtPK15T76FXGQGvDjtU/fQQIBPfuyx0srbazi6flWVngP/i+VlkA9J9HPDeTod6OL0umMxORiDWfXtDrJL2P4=
X-Received: by 2002:a02:660c:: with SMTP id k12mr5349152jac.25.1558783654658;  Sat, 25 May 2019 04:27:34 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net>
In-Reply-To: <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 07:27:23 -0400
Message-ID: <CAGL6epKzTmukk1U4jJUgfM45woXepaBB6bWNUoiER_Hwknzq+w@mail.gmail.com>
To: "Olle E. Johansson" <oej@edvina.net>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000485b70589b49acc"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/rPQ_azcAmXPnIE1ryfTAmxYMJz8>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 11:27:39 -0000

--0000000000000485b70589b49acc
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Inline...

On Mon, May 20, 2019 at 1:40 AM Olle E. Johansson <oej@edvina.net> wrote:

>
>
> On 18 May 2019, at 20:37, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> wrote:
>
> Thanks Olle!
>
> See my replies below.
>
> Regards,
>  Rifaat
>
>
>
>
> On Fri, May 17, 2019 at 9:38 AM Olle E. Johansson <oej@edvina.net> wrote:
>
>> Hi!
>> Sorry to be late in this discussion.
>>
>> " This document updates the Digest Access Authentication scheme used by
>>    the Session Initiation Protocol (SIP) to add support for secure
>>    digest algorithms to replace the broken MD5 algorithm.=E2=80=9D
>>
>> I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor mo=
re secure=E2=80=9D to be a bit
>> humble.
>> In XXX years, the schemes suggested here will be less secure than now.
>> The good thing is that we don=E2=80=99t have to update this document eve=
ry time
>> IANA adds a new algorithm to the registry. :-)
>>
>
> Ok
>
>
>
>>
>> section 2: "SHA- 256=E2=80=9D - remove the extra space. Also, there=E2=
=80=99s an extra
>> quotation mark at the end of the section.
>>
>> Ok
>
>
>
>> Section 2.1:
>>
>> "Note that [RFC7616
>> ] defines a -sess variant for each algorithm; the
>>    -sess variants are not used with SIP.=E2=80=9D
>>
>> Is this already forbidden in 3261 or is this new proposed language? If
>> so, =E2=80=9Care not=E2=80=9D should propably
>> be something like =E2=80=9CMUST not=E2=80=9D
>>
>> I do not think that 3261 forbids the -sess variant, and I do not see the
> need to forbid it here either
>
> So then I suggest we remove the statement that the -sess variants are not
> used with SIP.
>
>
>
>
>> Section 2.2:
>>
>> Is this an update to 7616 or just an explanation of 7616?
>>
>
> No update, just an explanation.
>
>
>>
>> Section 2.4:
>>
>> "When the UAC receives a response with multiple header fields with the
>>    same realm it SHOULD use the topmost header field that it supports,
>>    unless a local policy dictates otherwise.=E2=80=9D
>>
>> Why a SHOULD? I would prefer a MUST.
>>
>
> I can do that, but the last part of this paragraph states that local
> policy can override this recommendations anyway.
> So, does it make any difference?
>
> Should we allow that? Why would local policy enforce a downgrade?
>

This is meant to provide the client with the ability to decide on the
priority of the algorithm to use when the client supports more than one
strong algorithm.


>
>>
>> =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Authenti=
cate
>>    header fields with different realms it SHOULD retry and include an
>>    Authorization header field containing credentials that match the
>>    topmost header field of any one of the realms.=E2=80=9D
>>
>> If you are disallowing multiple Authorization headers for the same realm=
,
>> but with different algorithms I think this should be clearly written. In
>> my
>> view, that would be a good thing.
>>
>
> This is allowed.
>
>
>>
>>  "8.  Servers MUST be able to properly handle "qop" parameter received
>>    in an authorization header field, and clients MUST be able to
>>    properly handle "qop" parameter received in WWW-Authenticate and
>>    Proxy-Authenticate header fields.  Servers MUST always send a "qop"
>>    parameter in WWW-Authenticate and Proxy-Authenticate header field
>>    values, and clients MUST send the "qop" parameter in any resulting
>>    authorization header field.=E2=80=9D
>>
>> This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D=
 then we
>> add that to SIP 2.0 with no backwards options or compatibility.
>> Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it se=
ems like you
>> assume that clients have a choise of whether they use it. I think
>> one has to be a bit more clear so developers understands how
>> to modify their implementations.
>>
>> In addition:
>> Are we ready to require that all SIP 2.0 compliant software support QOP?
>>
>>
> Here is a quote form RFC3261:
>
> "Use of the "qop" parameter is optional in RFC 2617 for the purposes
> of backwards compatibility with RFC 2069; since RFC 2543 was
> based on RFC 2069, the "qop" parameter must unfortunately
> remain optional for clients and servers to receive."
>
>
> That is no longer the case with RFC7616.
>
> Since this is a change from RFC 3261 we propably want clarify that for
> developers.
> I think that if we want to modify RFC7616 for SIP, we can. The question
> still
> stands - are we ready to change the way current auth works today in
> SIP/2.0. There=E2=80=99s
> a lot of implementations out there that will suddenly not be
> standard-following.
>
> I=E2=80=99m not saying it=E2=80=99s a bad thing, just that we have to und=
erstand the
> implication.
>
>
> Here is the following part of the quote:

          remain optional for clients and servers to receive.  *However,
          servers MUST always send a "qop" parameter in WWW-Authenticate
          and Proxy-Authenticate header field values.  If a client
          receives a "qop" parameter in a challenge header field, it
          MUST send the "qop" parameter in any resulting authorization
          header field.*


RFC3261 already requires the servers to include "qop" in the challenge and
requires the client to include the "qop" in the response.
The change is that the client must now send "qop" in the Authorize header
in the initial request, not only in response to a challenge.
Are you saying that clients do not do that today?




>
>
>
>> I would like to run an online-SIPit when we have software that supports
>> this
>> so we can test the behaviour, especially looking into downgrade attacks.
>>
>> Take a look at the security considerations section for more information
> about downgrade attacks recommendations.
>
>
>
>> And as Dave said, I don=E2=80=99t see any priority in the IANA registry.=
 RFC 7616
>> mentions
>> =E2=80=9Cstrongest=E2=80=9D algorithm. "A user agent MUST choose to use =
the strongest
>> auth-scheme it
>>    understands and request credentials from the user based upon that
>>    challenge.=E2=80=9D and then adds "When the server offers choices of
>> authentication schemes using the
>>    WWW-Authenticate header field, the strength of the resulting
>>    authentication is only as good as that of the of the weakest of the
>>    authentication schemes.=E2=80=9D
>>
>> I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=
=9D in RFC 7616.
>>
>> See section 3.7
> https://tools.ietf.org/html/rfc7616#section-3.7
>
> I will make it clearer.
>
> But that is not part of the registry, so what happens if I somewhere in
> the future add Edvina-9042 to
> the registry? What=E2=80=99s the order then? This section just says what=
=E2=80=99s
> mandatory to implement but doesn=E2=80=99t
> say anything about priority or which one that is the =E2=80=9Cstrongest=
=E2=80=9D one.
>
> I like the idea of a prioritized list for developers with some =E2=80=9Cs=
trength=E2=80=9D
> weight but fail to find one
> in these documents.  There has to be some advice in some RFC somewhere.
> =E2=80=A6at this point I can=E2=80=99t find anything out there.
>
>
I do not think that we need to explicitly prioritize the algorithms,
because every time you add new algorithm the priority will change.
It is up to the server to device on the priority based on the placement of
the algorithm in the response.

Regards,
 Rifaat



> Cheers,
> /O
>
>
>
>
>> Note that this document also suggests that UACs remember the =E2=80=9Cst=
rongest=E2=80=9D
>> algorithm used by a specific server/service and refuse a downgrade attac=
k
>> - without discussing any implementation issues.
>>
>>
>> Good work. A small step forward!
>>
>> Cheers,
>> /O
>>
>>
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org
>> https://www.ietf.org/mailman/listinfo/sipcore
>>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>
>

--0000000000000485b70589b49acc
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Inline...</div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr" class=3D"gmail_attr">On Mon, May 20, 2019 at 1:40 AM =
Olle E. Johansson &lt;<a href=3D"mailto:oej@edvina.net">oej@edvina.net</a>&=
gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div =
style=3D"overflow-wrap: break-word;"><br><div><br><blockquote type=3D"cite"=
><div>On 18 May 2019, at 20:37, Rifaat Shekh-Yusef &lt;<a href=3D"mailto:ri=
faat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt; wrote:=
</div><br class=3D"gmail-m_2324944401930158423Apple-interchange-newline"><d=
iv><div dir=3D"ltr"><div dir=3D"ltr">Thanks Olle!<div><br></div><div>See my=
 replies below.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</d=
iv><div><br><div><br></div><div><br></div></div></div><br><div class=3D"gma=
il_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Fri, May 17, 2019 at 9:3=
8 AM Olle E. Johansson &lt;<a href=3D"mailto:oej@edvina.net" target=3D"_bla=
nk">oej@edvina.net</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote=
" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);=
padding-left:1ex">Hi!<br>
Sorry to be late in this discussion.<br>
<br>
&quot; This document updates the Digest Access Authentication scheme used b=
y<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for secur=
e<br>
=C2=A0 =C2=A0digest algorithms to replace the broken MD5 algorithm.=E2=80=
=9D<br>
<br>
I would suggest changing =E2=80=9Cfor secure=E2=80=9D to =E2=80=9Cfor more =
secure=E2=80=9D to be a bit humble.<br>
In XXX years, the schemes suggested here will be less secure than now.<br>
The good thing is that we don=E2=80=99t have to update this document every =
time<br>
IANA adds a new algorithm to the registry. :-)<br></blockquote><div><br></d=
iv><div>Ok</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">
<br>
section 2: &quot;SHA- 256=E2=80=9D - remove the extra space. Also, there=E2=
=80=99s an extra<br>
quotation mark at the end of the section.<br>
<br></blockquote><div>Ok</div><div><br></div><div>=C2=A0</div><blockquote c=
lass=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px soli=
d rgb(204,204,204);padding-left:1ex">
Section 2.1:<br>
<br>
&quot;Note that [RFC7616<br>
] defines a -sess variant for each algorithm; the<br>
=C2=A0 =C2=A0-sess variants are not used with SIP.=E2=80=9D<br>
<br>
Is this already forbidden in 3261 or is this new proposed language? If so, =
=E2=80=9Care not=E2=80=9D should propably<br>
be something like =E2=80=9CMUST not=E2=80=9D<br>
<br></blockquote><div>I do not think that 3261 forbids the -sess variant, a=
nd I do not see the need to forbid it here either</div></div></div></div></=
blockquote>So then I suggest we remove the statement that the -sess variant=
s are not used with SIP.</div><div><br><blockquote type=3D"cite"><div><div =
dir=3D"ltr"><div class=3D"gmail_quote"><div><br></div><div>=C2=A0</div><blo=
ckquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left=
:1px solid rgb(204,204,204);padding-left:1ex">
Section 2.2:<br>
<br>
Is this an update to 7616 or just an explanation of 7616?<br></blockquote><=
div><br></div><div>No update, just an explanation.</div><div>=C2=A0</div><b=
lockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-le=
ft:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Section 2.4:<br>
<br>
&quot;When the UAC receives a response with multiple header fields with the=
<br>
=C2=A0 =C2=A0same realm it SHOULD use the topmost header field that it supp=
orts,<br>
=C2=A0 =C2=A0unless a local policy dictates otherwise.=E2=80=9D<br>
<br>
Why a SHOULD? I would prefer a MUST.<br></blockquote><div><br></div><div>I =
can do that, but the last part of this paragraph states that local policy c=
an override this recommendations anyway.</div><div>So, does it make any dif=
ference?</div></div></div></div></blockquote>Should we allow that? Why woul=
d local policy enforce a downgrade?<br></div></div></blockquote><div><br></=
div><div>This is meant to provide the client with the ability to decide on =
the priority of the algorithm to use when the client supports more than one=
 strong algorithm.</div><div><br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padd=
ing-left:1ex"><div style=3D"overflow-wrap: break-word;"><div><blockquote ty=
pe=3D"cite"><div><div dir=3D"ltr"><div class=3D"gmail_quote"><div>=C2=A0</d=
iv><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bord=
er-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
=E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Authenticat=
e<br>
=C2=A0 =C2=A0header fields with different realms it SHOULD retry and includ=
e an<br>
=C2=A0 =C2=A0Authorization header field containing credentials that match t=
he<br>
=C2=A0 =C2=A0topmost header field of any one of the realms.=E2=80=9D<br>
<br>
If you are disallowing multiple Authorization headers for the same realm,<b=
r>
but with different algorithms I think this should be clearly written. In my=
<br>
view, that would be a good thing.<br></blockquote><div><br></div><div>This =
is allowed.</div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">
<br>
=C2=A0&quot;8.=C2=A0 Servers MUST be able to properly handle &quot;qop&quot=
; parameter received<br>
=C2=A0 =C2=A0in an authorization header field, and clients MUST be able to<=
br>
=C2=A0 =C2=A0properly handle &quot;qop&quot; parameter received in WWW-Auth=
enticate and<br>
=C2=A0 =C2=A0Proxy-Authenticate header fields.=C2=A0 Servers MUST always se=
nd a &quot;qop&quot;<br>
=C2=A0 =C2=A0parameter in WWW-Authenticate and Proxy-Authenticate header fi=
eld<br>
=C2=A0 =C2=A0values, and clients MUST send the &quot;qop&quot; parameter in=
 any resulting<br>
=C2=A0 =C2=A0authorization header field.=E2=80=9D<br>
<br>
This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=9D th=
en we<br>
add that to SIP 2.0 with no backwards options or compatibility.<br>
Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it seems=
 like you<br>
assume that clients have a choise of whether they use it. I think<br>
one has to be a bit more clear so developers understands how<br>
to modify their implementations.<br>
<br></blockquote></div><div class=3D"gmail_quote"><blockquote class=3D"gmai=
l_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,20=
4,204);padding-left:1ex">In addition:<br>
Are we ready to require that all SIP 2.0 compliant software support QOP?<br=
>
<br></blockquote><div><br></div><div class=3D"gmail_quote"><div>Here is a q=
uote form RFC3261:</div></div><blockquote style=3D"margin:0px 0px 0px 40px;=
border:none;padding:0px"><div class=3D"gmail_quote"><div>&quot;Use of the &=
quot;qop&quot; parameter is optional in RFC 2617 for the purposes</div></di=
v><div class=3D"gmail_quote">of backwards compatibility with RFC 2069; sinc=
e RFC 2543 was</div><div class=3D"gmail_quote">based on RFC 2069, the &quot=
;qop&quot; parameter must unfortunately</div><div class=3D"gmail_quote"><di=
v>remain optional for clients and servers to receive.&quot;</div></div></bl=
ockquote><div class=3D"gmail_quote"><div><br></div><div>That is no longer t=
he case with RFC7616.</div></div></div></div></div></blockquote>Since this =
is a change from RFC 3261 we propably want clarify that for developers.=C2=
=A0</div><div>I think that if we want to modify RFC7616 for SIP, we can. Th=
e question still</div><div>stands - are we ready to change the way current =
auth works today in SIP/2.0. There=E2=80=99s</div><div>a lot of implementat=
ions out there that will suddenly not be standard-following.</div><div><br>=
</div><div>I=E2=80=99m not saying it=E2=80=99s a bad thing, just that we ha=
ve to understand the implication.<br><blockquote type=3D"cite"><div><div di=
r=3D"ltr"><div class=3D"gmail_quote"><div class=3D"gmail_quote"><br class=
=3D"gmail-m_2324944401930158423gmail-Apple-interchange-newline"></div></div=
></div></div></blockquote></div></div></blockquote><div>Here is the followi=
ng part of the quote:</div><div><br></div><div><pre class=3D"gmail-newpage"=
 style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page;color:rgb(0,0,0)">          remain optional for clients and servers t=
o receive.  <b>However,
          servers MUST always send a &quot;qop&quot; parameter in WWW-Authe=
nticate
          and Proxy-Authenticate header field values.  If a client
          receives a &quot;qop&quot; parameter in a challenge header field,=
 it
          MUST send the &quot;qop&quot; parameter in any resulting authoriz=
ation
          header field.</b></pre></div><div><br></div><div>RFC3261 already =
requires the servers to include &quot;qop&quot; in the challenge and requir=
es the client to include the &quot;qop&quot; in the response.</div><div>The=
 change is that the client must now send &quot;qop&quot; in the Authorize h=
eader in the initial request, not only in response to a challenge.</div><di=
v>Are you saying that clients do not do that today?</div><div><br></div><di=
v><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex"><div style=3D"overflow-wrap: break-word;"><div><blockquote type=3D"cite=
"><div><div dir=3D"ltr"><div class=3D"gmail_quote"><div class=3D"gmail_quot=
e"></div><div class=3D"gmail_quote"><br></div><div>=C2=A0</div><blockquote =
class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px sol=
id rgb(204,204,204);padding-left:1ex">
I would like to run an online-SIPit when we have software that supports thi=
s<br>
so we can test the behaviour, especially looking into downgrade attacks.<br=
>
<br></blockquote><div>Take a look at the security considerations section fo=
r more information about downgrade attacks recommendations.</div><div><br><=
/div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
And as Dave said, I don=E2=80=99t see any priority in the IANA registry. RF=
C 7616 mentions<br>
=E2=80=9Cstrongest=E2=80=9D algorithm. &quot;A user agent MUST choose to us=
e the strongest auth-scheme it<br>
=C2=A0 =C2=A0understands and request credentials from the user based upon t=
hat<br>
=C2=A0 =C2=A0challenge.=E2=80=9D and then adds &quot;When the server offers=
 choices of authentication schemes using the<br>
=C2=A0 =C2=A0WWW-Authenticate header field, the strength of the resulting<b=
r>
=C2=A0 =C2=A0authentication is only as good as that of the of the weakest o=
f the<br>
=C2=A0 =C2=A0authentication schemes.=E2=80=9D<br>
<br>
I don=E2=80=99t find any definition of =E2=80=9Cstrong algorithm=E2=80=9D i=
n RFC 7616. <br>
<br></blockquote><div>See section 3.7</div><div><a href=3D"https://tools.ie=
tf.org/html/rfc7616#section-3.7" target=3D"_blank">https://tools.ietf.org/h=
tml/rfc7616#section-3.7</a></div><div><br></div><div>I will make it clearer=
.</div></div></div></div></blockquote>But that is not part of the registry,=
 so what happens if I somewhere in the future add Edvina-9042 to</div><div>=
the registry? What=E2=80=99s the order then? This section just says what=E2=
=80=99s mandatory to implement but doesn=E2=80=99t</div><div>say anything a=
bout priority or which one that is the =E2=80=9Cstrongest=E2=80=9D one.</di=
v><div><br></div><div>I like the idea of a prioritized list for developers =
with some =E2=80=9Cstrength=E2=80=9D weight but fail to find one</div><div>=
in these documents.=C2=A0 There has to be some advice in some RFC somewhere=
.</div><div>=E2=80=A6at this point I can=E2=80=99t find anything out there.=
</div><div><br></div></div></blockquote><div><br></div><div>I do not think =
that we need to explicitly prioritize the algorithms, because every time yo=
u add new algorithm the priority will change.</div><div>It is up to the ser=
ver to device on the priority based on the placement of the algorithm in th=
e response.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><=
div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"m=
argin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left=
:1ex"><div style=3D"overflow-wrap: break-word;"><div></div><div>Cheers,</di=
v><div>/O</div><div><br><blockquote type=3D"cite"><div><div dir=3D"ltr"><di=
v class=3D"gmail_quote"><div><br></div><div>=C2=A0</div><blockquote class=
=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rg=
b(204,204,204);padding-left:1ex">
Note that this document also suggests that UACs remember the =E2=80=9Cstron=
gest=E2=80=9D<br>
algorithm used by a specific server/service and refuse a downgrade attack<b=
r>
- without discussing any implementation issues.<br>
<br>
<br>
Good work. A small step forward!<br>
<br>
Cheers,<br>
/O<br>
<br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>
</div>
_______________________________________________<br>sipcore mailing list<br>=
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br><a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/sipcore</a><br></div></blockquote=
></div><br></div></blockquote></div></div>

--0000000000000485b70589b49acc--


From nobody Sat May 25 04:33:30 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 6558A120175 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 04:33:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ADhZGIG9YHtI for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 04:33:25 -0700 (PDT)
Received: from mail-io1-xd2c.google.com (mail-io1-xd2c.google.com [IPv6:2607:f8b0:4864:20::d2c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id DB24112013E for <sipcore@ietf.org>; Sat, 25 May 2019 04:33:23 -0700 (PDT)
Received: by mail-io1-xd2c.google.com with SMTP id x24so9779411ion.5 for <sipcore@ietf.org>; Sat, 25 May 2019 04:33:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=KhuQEeCVqLsSVuqlUoWVkqIA8ZrMzj5bbqcij1cuSew=; b=rBgT4nEjardVWN3qpMjWrNh8/gwqxi8gQEmh+65qFnscdj+ZwxmpeSOuUKH8cEtaQe 8n6tL/nGN+2sVzSOuoe/IcYK079MASJ6rFlTqTq37qYYqmjHmMSqTR7Vz8CRckqTMrml HlfWbu+7DXkfTmABN1tYS6l0PMH7qA/TBde1wpuIfCn8LAIKG/6zPHvvZd/TntCHnc1I jDMHsGUBSPGsop4uyjRWT8dMdWbfoKhW0mViMM7fGz/8kTiDa0pLNoFlUdf5HR+wtihf wKytMHwVf8NH4+wgmyNgXMgDoNrN/LJreOd5IKZE/U2+bE2pO8GOGS8R/vEqIlYx8iSW F4dg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=KhuQEeCVqLsSVuqlUoWVkqIA8ZrMzj5bbqcij1cuSew=; b=SZvNm3oz10UbPKBXu4cpYZ5nHdpHBbattlT0IWqRWzDX/R55j+uUukLbTsETpV8Gz8 wUZ+wIn7uEzv3I4WpKwaUbtdPBsYYzVr1fe+voA5JDWukZijV9cl1QZgL9nRJyyKSY5B w3nHOKF9CzY/gFk9zXeGmyK6zbVAS1vugtH8yNgowxqMMKm7HBl8SkvsJBxDr5bZMhUi F1fUbZXlB5MLSQiXhj0g0Ocdfg/KAQpCrcuVgKNT0VPD7i6/kiw/Q26JUVzBTlFLqYVZ KqcYMeNREnjXKWpo0o0KE6N+RBqRk5Ed8AwcwUTgwOBrdBxWc3MXWjfANrvQTefV49I9 zHUw==
X-Gm-Message-State: APjAAAUQyPBbgqq3qQD/eoewmfjVdluBoSd4RhuU+3JP4Ncr20bN9qUe rMZ/teZv1TyVOm2EAILGF8djVMsZZHa3GqArCWQ=
X-Google-Smtp-Source: APXvYqwp/Z0HoOoJNvaO249zbSIzp7c8R3e75seNTpD9r/4OgVEKg0Wd2HVwFXjZ8jwtmtHI3Ko9tk+sjDfbwM3dAiQ=
X-Received: by 2002:a6b:7a49:: with SMTP id k9mr2539310iop.73.1558784003166; Sat, 25 May 2019 04:33:23 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com>
In-Reply-To: <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 07:33:11 -0400
Message-ID: <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000ca57420589b4ae83"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/MZjK97VnR_3k2QD3bof_23qpf8U>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 11:33:29 -0000

--000000000000ca57420589b4ae83
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Inline...

On Tue, May 21, 2019 at 4:57 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> ...
>
> >> Section 2.1:
> >>
> >> "Note that [RFC7616] defines a -sess variant for each algorithm; the
> >>   -sess variants are not used with SIP.=E2=80=9D
> >>
> >> Is this already forbidden in 3261 or is this new proposed language? If
> so, =E2=80=9Care not=E2=80=9D should propably
> >> be something like =E2=80=9CMUST not=E2=80=9D
> >
> > I do not think that 3261 forbids the -sess variant, and I do not see th=
e
> need to forbid it here either
> > So then I suggest we remove the statement that the -sess variants are
> not used with SIP.
>
> If -sess variant was defined in RFC 7616, it was obviously not mentioned
> in RFC 3261 __
>
> What is the difference between the session variant and the non-session
> variant? What is meant by "session"? RFC 7616 doesn't give any explanatio=
n,
> and I couldn't find anything by googling either.
>
>
See RFC 7616, section 3.4.2 for more details.



> I do think we need to say *something*.
>

Any suggestion?



>
> ...
>
> >> Section 2.4:
> >>
> >> "When the UAC receives a response with multiple header fields with the
> >>   same realm it SHOULD use the topmost header field that it supports,
> >>   unless a local policy dictates otherwise.=E2=80=9D
> >>
> >> Why a SHOULD? I would prefer a MUST.
> >
> > I can do that, but the last part of this paragraph states that local
> policy can override this recommendations anyway.
> > So, does it make any difference?
> > Should we allow that? Why would local policy enforce a downgrade?
> >
> >> =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Authen=
ticate
> >>   header fields with different realms it SHOULD retry and include an
> >>   Authorization header field containing credentials that match the
> >>   topmost header field of any one of the realms.=E2=80=9D
> >>
> >> If you are disallowing multiple Authorization headers for the same
> realm,
> >> but with different algorithms I think this should be clearly written.
> In my
> >> view, that would be a good thing.
> >
> > This is allowed.
>
> RFC 3261 does not say anything about using the topmost header, does it?
>

I was referring to this document.



>
> >> "8.  Servers MUST be able to properly handle "qop" parameter received
> >>   in an authorization header field, and clients MUST be able to
> >>   properly handle "qop" parameter received in WWW-Authenticate and
> >>   Proxy-Authenticate header fields.  Servers MUST always send a "qop"
> >>   parameter in WWW-Authenticate and Proxy-Authenticate header field
> >>   values, and clients MUST send the "qop" parameter in any resulting
> >>   authorization header field.=E2=80=9D
> >>
> >> This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=80=
=9D then we
> >> add that to SIP 2.0 with no backwards options or compatibility.
> >> Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6 it =
seems like you
> >> assume that clients have a choise of whether they use it. I think
> >> one has to be a bit more clear so developers understands how
> >> to modify their implementations.
> >> In addition:
> >> Are we ready to require that all SIP 2.0 compliant software support QO=
P?
> >>
> >> Here is a quote form RFC3261:
> >> "Use of the "qop" parameter is optional in RFC 2617 for the purposes
> >> of backwards compatibility with RFC 2069; since RFC 2543 was
> >> based on RFC 2069, the "qop" parameter must unfortunately
> >> remain optional for clients and servers to receive."
> >>
> >> That is no longer the case with RFC7616.
> >> Since this is a change from RFC 3261 we propably want clarify that for
> developers.
> >> I think that if we want to modify RFC7616 for SIP, we can. The questio=
n
> still
> >> stands - are we ready to change the way current auth works today in
> SIP/2.0. There=E2=80=99s
> >> a lot of implementations out there that will suddenly not be
> standard-following.
> >>
> >> I=E2=80=99m not saying it=E2=80=99s a bad thing, just that we have to =
understand the
> implication.
>
> The typical way to solve this is to say that endpoints compliant with thi=
s
> specification must do this and that, but for backward compatibility also
> needs to be able to not do it.
>
> Regards,
>
> Christer
>
>
>

--000000000000ca57420589b4ae83
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr">Inline...</div><br><div class=3D"gmail_qu=
ote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May 21, 2019 at 4:57 PM =
Christer Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">chr=
ister.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gm=
ail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,=
204,204);padding-left:1ex">Hi,<br>
<br>
...<br>
=C2=A0<br>
&gt;&gt; Section 2.1:<br>
&gt;&gt; <br>
&gt;&gt; &quot;Note that [RFC7616] defines a -sess variant for each algorit=
hm; the<br>
&gt;&gt;=C2=A0 =C2=A0-sess variants are not used with SIP.=E2=80=9D<br>
&gt;&gt;<br>
&gt;&gt; Is this already forbidden in 3261 or is this new proposed language=
? If so, =E2=80=9Care not=E2=80=9D should propably<br>
&gt;&gt; be something like =E2=80=9CMUST not=E2=80=9D<br>
&gt;<br>
&gt; I do not think that 3261 forbids the -sess variant, and I do not see t=
he need to forbid it here either<br>
&gt; So then I suggest we remove the statement that the -sess variants are =
not used with SIP.<br>
<br>
If -sess variant was defined in RFC 7616, it was obviously not mentioned in=
 RFC 3261 __<br>
<br>
What is the difference between the session variant and the non-session vari=
ant? What is meant by &quot;session&quot;? RFC 7616 doesn&#39;t give any ex=
planation, and I couldn&#39;t find anything by googling either.<br>
<br></blockquote><div><br></div><div>See RFC 7616, section 3.4.2 for more d=
etails.</div><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quo=
te" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204=
);padding-left:1ex">
I do think we need to say *something*.<br>
</blockquote><div><br></div><div>Any suggestion?</div><div><br></div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">=C2=A0<br>
...=C2=A0<br>
<br>
&gt;&gt; Section 2.4:<br>
&gt;&gt;<br>
&gt;&gt; &quot;When the UAC receives a response with multiple header fields=
 with the<br>
&gt;&gt;=C2=A0 =C2=A0same realm it SHOULD use the topmost header field that=
 it supports,<br>
&gt;&gt;=C2=A0 =C2=A0unless a local policy dictates otherwise.=E2=80=9D<br>
&gt;&gt;<br>
&gt;&gt; Why a SHOULD? I would prefer a MUST.<br>
&gt;<br>
&gt; I can do that, but the last part of this paragraph states that local p=
olicy can override this recommendations anyway.<br>
&gt; So, does it make any difference?<br>
&gt; Should we allow that? Why would local policy enforce a downgrade?<br>
&gt;<br>
&gt;&gt; =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Au=
thenticate<br>
&gt;&gt;=C2=A0 =C2=A0header fields with different realms it SHOULD retry an=
d include an<br>
&gt;&gt;=C2=A0 =C2=A0Authorization header field containing credentials that=
 match the<br>
&gt;&gt;=C2=A0 =C2=A0topmost header field of any one of the realms.=E2=80=
=9D<br>
&gt;&gt;<br>
&gt;&gt; If you are disallowing multiple Authorization headers for the same=
 realm,<br>
&gt;&gt; but with different algorithms I think this should be clearly writt=
en. In my<br>
&gt;&gt; view, that would be a good thing.<br>
&gt;<br>
&gt; This is allowed.<br>
=C2=A0<br>
RFC 3261 does not say anything about using the topmost header, does it?<br>=
</blockquote><div><br></div><div>I was referring to this document.</div><di=
v><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"mar=
gin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1=
ex">
<br>
&gt;&gt;=C2=A0&quot;8.=C2=A0 Servers MUST be able to properly handle &quot;=
qop&quot; parameter received<br>
&gt;&gt;=C2=A0 =C2=A0in an authorization header field, and clients MUST be =
able to<br>
&gt;&gt;=C2=A0 =C2=A0properly handle &quot;qop&quot; parameter received in =
WWW-Authenticate and<br>
&gt;&gt;=C2=A0 =C2=A0Proxy-Authenticate header fields.=C2=A0 Servers MUST a=
lways send a &quot;qop&quot;<br>
&gt;&gt;=C2=A0 =C2=A0parameter in WWW-Authenticate and Proxy-Authenticate h=
eader field<br>
&gt;&gt;=C2=A0 =C2=A0values, and clients MUST send the &quot;qop&quot; para=
meter in any resulting<br>
&gt;&gt;=C2=A0 =C2=A0authorization header field.=E2=80=9D<br>
&gt;&gt;<br>
&gt;&gt; This is not clear. If the servers MUST always send =E2=80=9Cqop=E2=
=80=9D then we<br>
&gt;&gt; add that to SIP 2.0 with no backwards options or compatibility.<br=
>
&gt;&gt; Since you write =E2=80=9Cclients MUST be able to=E2=80=9D=E2=80=A6=
 it seems like you<br>
&gt;&gt; assume that clients have a choise of whether they use it. I think<=
br>
&gt;&gt; one has to be a bit more clear so developers understands how<br>
&gt;&gt; to modify their implementations.<br>
&gt;&gt; In addition:<br>
&gt;&gt; Are we ready to require that all SIP 2.0 compliant software suppor=
t QOP?<br>
&gt;&gt;<br>
&gt;&gt; Here is a quote form RFC3261:<br>
&gt;&gt; &quot;Use of the &quot;qop&quot; parameter is optional in RFC 2617=
 for the purposes<br>
&gt;&gt; of backwards compatibility with RFC 2069; since RFC 2543 was<br>
&gt;&gt; based on RFC 2069, the &quot;qop&quot; parameter must unfortunatel=
y<br>
&gt;&gt; remain optional for clients and servers to receive.&quot;<br>
&gt;&gt;<br>
&gt;&gt; That is no longer the case with RFC7616.<br>
&gt;&gt; Since this is a change from RFC 3261 we propably want clarify that=
 for developers.=C2=A0<br>
&gt;&gt; I think that if we want to modify RFC7616 for SIP, we can. The que=
stion still<br>
&gt;&gt; stands - are we ready to change the way current auth works today i=
n SIP/2.0. There=E2=80=99s<br>
&gt;&gt; a lot of implementations out there that will suddenly not be stand=
ard-following.<br>
&gt;&gt;<br>
&gt;&gt; I=E2=80=99m not saying it=E2=80=99s a bad thing, just that we have=
 to understand the implication.<br>
<br>
The typical way to solve this is to say that endpoints compliant with this =
specification must do this and that, but for backward compatibility also ne=
eds to be able to not do it.<br>
<br>
Regards,<br>
<br>
Christer<br>
<br>
<br>
</blockquote></div></div>

--000000000000ca57420589b4ae83--


From nobody Sat May 25 07:53:16 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0A3BF120006 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 07:53:14 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id fju0jiMN1YlJ for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 07:53:11 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on0619.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::619]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C37C4120044 for <sipcore@ietf.org>; Sat, 25 May 2019 07:53:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=MBL2ye8E+8a+n/MoB0uMkJpDlE8bVOol6BjxS8SaFJo=; b=o7f/W0A6dPefQ/cBWynnykbqUkNWmbro0x7mMJpKqbvIVRGSs5fnCOw/u2cOPLRYIA63lsGiQPdVQ5xL3+80icYPvTdQVkDqLMw3MuNzMvTjkl2zEv+NAHi2WrDMrSXoS0UxmYJUjBi2OoQTmWCDa0sAc2cqk6FXzXG4mHBPsyQ=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB4316.eurprd07.prod.outlook.com (20.176.167.13) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Sat, 25 May 2019 14:53:07 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.016; Sat, 25 May 2019 14:53:07 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABqJQA=
Date: Sat, 25 May 2019 14:53:07 +0000
Message-ID: <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com>
In-Reply-To: <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 14cd49b6-faa0-4461-575e-08d6e120b2e8
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB4316; 
x-ms-traffictypediagnostic: HE1PR07MB4316:
x-microsoft-antispam-prvs: <HE1PR07MB43164A81171543E25F6583AA93030@HE1PR07MB4316.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(136003)(396003)(376002)(346002)(199004)(189003)(18543002)(14454004)(476003)(14444005)(486006)(11346002)(83716004)(2616005)(71200400001)(71190400001)(446003)(6116002)(3846002)(5660300002)(478600001)(82746002)(316002)(68736007)(36756003)(6246003)(53936002)(256004)(44832011)(86362001)(4326008)(6512007)(73956011)(6506007)(229853002)(66476007)(76116006)(8676002)(66556008)(54906003)(64756008)(66446008)(66946007)(66066001)(58126008)(26005)(186003)(6486002)(6436002)(102836004)(2906002)(33656002)(6916009)(99286004)(25786009)(81166006)(81156014)(305945005)(76176011)(7736002)(8936002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB4316; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: I5fgrUsA4Ak9BR6OunQWGyT78Mtw7P5jp+hlXWe7jVjwsVSSG4yZftEflox9ZeLSGRjBIrmvtXdxf+uH0EeO/bF6HqsvwgtKZnRE6BzBV5KnNxdvecBkSrK8IuQO4NpVJ8S7FlaGdQh+Q3fANM/6YVXXsI5LHDyVRcmdJbWWQWn+KTjIrrmuoFF4AlKmPYVqBRVT40G2YJ8wKFwRw+G0V8o1WuAYbvIJV1yY5TkvKGEWUkFd9QbY5sqSSBwnfjkYJD4sTQAwtN8kbhsLrX9U/MMxU2PjRfYHaDHTpvzb2ZAROovMtAqVEgTRcGQJZLZtV2bTnzvZ90bzdVygxkfggydg7vqdnQ5k5eTHmHUvAo6FQNr/zudLDELOBuQOX4HStNVsrloehKnAFJ1Q97PC6X/0ZcGp/2gPgB5KcVAD7VE=
Content-Type: text/plain; charset="utf-8"
Content-ID: <AE98BF444A75BB44A3D328AA85027673@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 14cd49b6-faa0-4461-575e-08d6e120b2e8
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 14:53:07.4489 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4316
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/cXOw1JCt85yLHZ7H3yFgw2TLcow>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 14:53:14 -0000
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From nobody Sat May 25 08:07:00 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E7EE71200A2 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 08:06:58 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z7gaHV75yn-9 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 08:06:56 -0700 (PDT)
Received: from mail-it1-x130.google.com (mail-it1-x130.google.com [IPv6:2607:f8b0:4864:20::130]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 3B0CB120006 for <sipcore@ietf.org>; Sat, 25 May 2019 08:06:56 -0700 (PDT)
Received: by mail-it1-x130.google.com with SMTP id i63so18068741ita.3 for <sipcore@ietf.org>; Sat, 25 May 2019 08:06:56 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=3aDpEhrEew5psBQGUFAzzQsUBP5V8wu8JdYUrK8qazI=; b=HZBF9IsFcsXIrAGChXl5XC2hoX8FlKKVBw4kjFoujikMNw6A7KwBwqEgQStJunCjuH BFUJtTnZImLBTp1C9uV9+9w7Gd4IfIVhrkqr9aPMynFbY9+E4wzNpsDOOwWPZ2qgjytI PIzIiJy8jz7swQFkXzld1ddysYU4YqL1Ls1xF1x4mmZwTPnO2DaHYeqbvcDdBUkIhFTp 9Bo7ID9pO5FZ9kFB8NcFY9NQzpx9ZZpYjJWbc0sKIyawxmat42PgIzBP3wZcyvXpDdVS TwMEWqJHphiHN4rgDoyo080H11XREgUD9/m/KTFC4gTWkjYdNp3J77yDZLm3onBteYCk BZug==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=3aDpEhrEew5psBQGUFAzzQsUBP5V8wu8JdYUrK8qazI=; b=sTWwZxp8+wS4XfOKLE+UjhyDdHYFtxlrgE+QpuRX/MwyAcy+U/02XCo6dwuRhlAYyb 13jDwnS7HD8hbuNm/vth67Ac0CdHg29g5wANFdw7bm4acNFBfKTAqdO+2nmdBLdxSmfh RBYBtD5Dxx59GfcaQcBMs86viD6jllL6BqiqDFd4pULfHXp0OeENQnIQl2hWmPZ/jtC1 DTmvTk9BBYsjq3CEoqmSONjjNbPUsWWCghul3GB/1ZKV3Xd1rpanF8kKO7XzkCfuDwSX k4xxz05zUy+VMUushVcylLGJ7+CseE2OqhsSf0BT28qZhAxnomFfhCR7l3qoIHAiOWqy bxiQ==
X-Gm-Message-State: APjAAAVFhKjNFTidmbPW+a0VjxgKd1CqCYhHPFaT2K0043JJDxJLsx7B p0HxYR6xFsRLpvX4dqKeN+3DYRtFuLsg8TKKmDo=
X-Google-Smtp-Source: APXvYqwY5i+0n7RB3ZRDIaXrXuNkZc0vSZ6BWYj5kJtdxIBzl8DzJ6EaWf95RsZmOpI/UZqJBjGEgeDXyZbaUClo/U8=
X-Received: by 2002:a24:c241:: with SMTP id i62mr21019325itg.21.1558796815597;  Sat, 25 May 2019 08:06:55 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com>
In-Reply-To: <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 11:06:44 -0400
Message-ID: <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000007888200589b7aaeb"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/MjdhRGesdWw7wcNQxzbkQ9V1QVs>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 15:06:59 -0000

--0000000000007888200589b7aaeb
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sat, May 25, 2019 at 10:53 AM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> >>>> Section 2.1:
> >>>>
> >>>> "Note that [RFC7616] defines a -sess variant for each algorithm; the
> >>>>   -sess variants are not used with SIP.=E2=80=9D
> >>>>
> >>>> Is this already forbidden in 3261 or is this new proposed language?
> If so, =E2=80=9Care not=E2=80=9D should propably
> >>>> be something like =E2=80=9CMUST not=E2=80=9D
> >>>
> >>> I do not think that 3261 forbids the -sess variant, and I do not see
> the need to forbid it here either
> >>> So then I suggest we remove the statement that the -sess variants are
> not used with SIP.
> >>>
> >>> If -sess variant was defined in RFC 7616, it was obviously not
> mentioned in RFC 3261 __
> >>
> >> What is the difference between the session variant and the non-session
> variant? What is meant by "session"? RFC 7616 doesn't give any explanatio=
n,
> and I couldn't find anything by googling either.
> >
> > See RFC 7616, section 3.4.2 for more details.
> >
> >> I do think we need to say *something*.
> >
> > Any suggestion?
>
> Not at the moment. But, if allowing both adds something new to what is
> currently defined/assumed in RFC 3261 I think it would be good to point i=
t
> out.
>
>
The ABNF allows for the -see variant, but my understanding is the the -sess
variant was never implemented in SIP.
This document does not introduce any new -sess specific changes.



> ...
>
> >>> Section 2.4:
> >>>
> >>> "When the UAC receives a response with multiple header fields with th=
e
> >>>   same realm it SHOULD use the topmost header field that it supports,
> >>>   unless a local policy dictates otherwise.=E2=80=9D
> >>>
> >>> Why a SHOULD? I would prefer a MUST.
> >>
> >> I can do that, but the last part of this paragraph states that local
> policy can override this recommendations anyway.
> >> So, does it make any difference?
> >> Should we allow that? Why would local policy enforce a downgrade?
> >>
> >>> =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Authe=
nticate
> >>>   header fields with different realms it SHOULD retry and include an
> >>>   Authorization header field containing credentials that match the
> >>>   topmost header field of any one of the realms.=E2=80=9D
> >>>
> >>> If you are disallowing multiple Authorization headers for the same
> realm,
> >>> but with different algorithms I think this should be clearly written.
> In my
> >>> view, that would be a good thing.
> >>
> >> This is allowed.
> >
> > RFC 3261 does not say anything about using the topmost header, does it?
> >
> > I was referring to this document.
>
> So, the should-use-topmost is something new, defined in this document?
>
>
Yes, as per RFC7616.

Regards,
 Rifaat




> Regards,
>
> Christer
>
>

--0000000000007888200589b7aaeb
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sat, May 25, 2019 at 10:53 AM Chri=
ster Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christe=
r.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">Hi,<br>
=C2=A0<br>
&gt;&gt;&gt;&gt; Section 2.1:<br>
&gt;&gt;&gt;&gt; <br>
&gt;&gt;&gt;&gt; &quot;Note that [RFC7616] defines a -sess variant for each=
 algorithm; the<br>
&gt;&gt;&gt;&gt;=C2=A0 =C2=A0-sess variants are not used with SIP.=E2=80=9D=
<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Is this already forbidden in 3261 or is this new proposed =
language? If so, =E2=80=9Care not=E2=80=9D should propably<br>
&gt;&gt;&gt;&gt; be something like =E2=80=9CMUST not=E2=80=9D<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; I do not think that 3261 forbids the -sess variant, and I do n=
ot see the need to forbid it here either<br>
&gt;&gt;&gt; So then I suggest we remove the statement that the -sess varia=
nts are not used with SIP.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If -sess variant was defined in RFC 7616, it was obviously not=
 mentioned in RFC 3261 __<br>
&gt;&gt;<br>
&gt;&gt; What is the difference between the session variant and the non-ses=
sion variant? What is meant by &quot;session&quot;? RFC 7616 doesn&#39;t gi=
ve any explanation, and I couldn&#39;t find anything by googling either.<br=
>
&gt;<br>
&gt; See RFC 7616, section 3.4.2 for more details.<br>
&gt;<br>
&gt;&gt; I do think we need to say *something*.<br>
&gt;<br>
&gt; Any suggestion?<br>
<br>
Not at the moment. But, if allowing both adds something new to what is curr=
ently defined/assumed in RFC 3261 I think it would be good to point it out.=
<br>
=C2=A0<br></blockquote><div>The ABNF allows for the -see variant, but my un=
derstanding is the the -sess variant was never implemented in SIP.=C2=A0</d=
iv><div>This document does not introduce any new -sess specific changes.</d=
iv><div><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=
=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding=
-left:1ex">
...=C2=A0<br>
<br>
&gt;&gt;&gt; Section 2.4:<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; &quot;When the UAC receives a response with multiple header fi=
elds with the<br>
&gt;&gt;&gt;=C2=A0 =C2=A0same realm it SHOULD use the topmost header field =
that it supports,<br>
&gt;&gt;&gt;=C2=A0 =C2=A0unless a local policy dictates otherwise.=E2=80=9D=
<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Why a SHOULD? I would prefer a MUST.<br>
&gt;&gt;<br>
&gt;&gt; I can do that, but the last part of this paragraph states that loc=
al policy can override this recommendations anyway.<br>
&gt;&gt; So, does it make any difference?<br>
&gt;&gt; Should we allow that? Why would local policy enforce a downgrade?<=
br>
&gt;&gt;<br>
&gt;&gt;&gt; =E2=80=9CWhen the UAC receives a 401 response with multiple WW=
W-Authenticate<br>
&gt;&gt;&gt;=C2=A0 =C2=A0header fields with different realms it SHOULD retr=
y and include an<br>
&gt;&gt;&gt;=C2=A0 =C2=A0Authorization header field containing credentials =
that match the<br>
&gt;&gt;&gt;=C2=A0 =C2=A0topmost header field of any one of the realms.=E2=
=80=9D<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; If you are disallowing multiple Authorization headers for the =
same realm,<br>
&gt;&gt;&gt; but with different algorithms I think this should be clearly w=
ritten. In my<br>
&gt;&gt;&gt; view, that would be a good thing.<br>
&gt;&gt;<br>
&gt;&gt; This is allowed.<br>
&gt;<br>
&gt; RFC 3261 does not say anything about using the topmost header, does it=
?<br>
&gt;<br>
&gt; I was referring to this document.<br>
<br>
So, the should-use-topmost is something new, defined in this document?<br>
<br></blockquote><div><br></div><div>Yes, as per RFC7616.</div><div><br></d=
iv><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div><div><br></div>=
<div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Regards,<br>
<br>
Christer<br>
<br>
</blockquote></div></div>

--0000000000007888200589b7aaeb--


From nobody Sat May 25 08:43:47 2019
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7AEB712009E for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 08:43:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.601
X-Spam-Level: 
X-Spam-Status: No, score=-2.601 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 7rDBNPQIsmAh for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 08:43:45 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D0D5B120041 for <sipcore@ietf.org>; Sat, 25 May 2019 08:43:44 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x4PFhgqG013706 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for <sipcore@ietf.org>; Sat, 25 May 2019 11:43:43 -0400
To: sipcore@ietf.org
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <238df72e-fb9a-3849-67b5-b3c4ffa8f03e@alum.mit.edu>
Date: Sat, 25 May 2019 11:43:42 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/2mOHPK7GSGRDGGFslCODtQt70j0>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 15:43:47 -0000

On 5/25/19 7:33 AM, Rifaat Shekh-Yusef wrote:
> Inline...
> 
> On Tue, May 21, 2019 at 4:57 PM Christer Holmberg 

>     If -sess variant was defined in RFC 7616, it was obviously not
>     mentioned in RFC 3261 __
> 
>     What is the difference between the session variant and the
>     non-session variant? What is meant by "session"? RFC 7616 doesn't
>     give any explanation, and I couldn't find anything by googling either.

BTW: -sess was not introduced in 7616. It also appeared in 2617, though 
only as MD5-sess.

	Thanks,
	Paul


From nobody Sat May 25 09:24:43 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 39FA71200CE for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 09:24:42 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Mp6HwVVrLz_i for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 09:24:40 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10068.outbound.protection.outlook.com [40.107.1.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D552F12009E for <sipcore@ietf.org>; Sat, 25 May 2019 09:24:39 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2ffo8Ms+oc0lxZv+ObgEr/3B2Dfn669+7d5iCvTyEIQ=; b=QerRJiKmIdGNTQ2xFu3itcE1B6YO9Ycs5Ck09NgXDJ7S1MGH4l8R0l7lQQHWmLtNayBuqVcOQ0BW7LES5RplHabYP3pc+Yv6b2Ky5gR7gy/zwW1s0SLPAXm1Aplqi5G3A689I1GE8oyvhwKryPAiSN1CGUQBZCg77tVxHxLqWnA=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3419.eurprd07.prod.outlook.com (10.170.247.138) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.9; Sat, 25 May 2019 16:24:35 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.016; Sat, 25 May 2019 16:24:35 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>, "sipcore@ietf.org" <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABF/gCAAD23gA==
Date: Sat, 25 May 2019 16:24:35 +0000
Message-ID: <C34B4DBE-CCF6-49FD-BE86-72470490E6DF@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <238df72e-fb9a-3849-67b5-b3c4ffa8f03e@alum.mit.edu>
In-Reply-To: <238df72e-fb9a-3849-67b5-b3c4ffa8f03e@alum.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6fe1ebca-d99a-47a9-ed94-08d6e12d7a1d
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB3419; 
x-ms-traffictypediagnostic: HE1PR07MB3419:
x-microsoft-antispam-prvs: <HE1PR07MB341956290949122133D1815D93030@HE1PR07MB3419.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8273;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(39860400002)(346002)(376002)(396003)(366004)(199004)(18543002)(189003)(2171002)(76176011)(36756003)(66066001)(53936002)(68736007)(6506007)(6512007)(5660300002)(446003)(11346002)(6486002)(316002)(476003)(2616005)(58126008)(99286004)(6116002)(4744005)(6436002)(25786009)(486006)(44832011)(2906002)(14454004)(3846002)(478600001)(102836004)(71200400001)(256004)(2501003)(83716004)(6246003)(33656002)(229853002)(71190400001)(82746002)(8676002)(81156014)(81166006)(305945005)(110136005)(76116006)(186003)(26005)(8936002)(73956011)(7736002)(64756008)(86362001)(66556008)(66476007)(66446008)(66946007); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3419; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: Qji0vtfgE0R4shL8PCMTjFc4J8bsL+EYzFbNIIeo8SU6pPS87ZveKlomeldJl3yv6oPVo6ZjzPKgqw1XA/wausKhsk24KimjxEQiipgJw/IlUgSBzj2ehnFnprb6gEGgzRJpJK6LMO0flJlw5JsooFkndC/Ku6MMDbCrcdZftsn6RtBdUOpyeA+dBi/N12vaTy/zraSIEgiuzo5FB7iKTZjm/FhyrMOzGixLXSkFtFLw3L4wzPPaC6uvNPNeE+uevHzVY15MUbKdCGkYdZ2e9Pa2Zn/k+pzTJr6ye+Xe5aIdJeytO+TwsBwzO2YYTnrJ982TJRoJc1gytpm/Yvwv2F+MXTbwgFZQGkJMyoVVU1jQG1uKd2F9QQc56AOhzooRl2hWcf29BisJuoR2wTI0BMKKBfzuG3HUgm/zNcnlpKM=
Content-Type: text/plain; charset="utf-8"
Content-ID: <171988A3FB253F40B765FFC663C90C7A@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6fe1ebca-d99a-47a9-ed94-08d6e12d7a1d
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 16:24:35.6134 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3419
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/OJ8vRkd2pdw3CR_aIxtl-AkHU9I>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 16:24:42 -0000
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From nobody Sat May 25 09:31:12 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 705E61200E0 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 09:31:10 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id FB4Y9FKPP7_i for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 09:31:08 -0700 (PDT)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20041.outbound.protection.outlook.com [40.107.2.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 0EB7D1200CE for <sipcore@ietf.org>; Sat, 25 May 2019 09:31:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=ZB1lfW3AOvef85vHRvu/hTc+X/J6yupzCP3/2yApcKk=; b=eXLYF2JbC/Ww+pd/UViGjREaQk9T2OEbUgZs0NMi4Tlvly504SDtG0vvnw3cbatWDTiTM2flkpU19///nA1gG//DoIY3ku6Dy8p3xgk8UplxAJR9EFg7jx1QIf8mUG2Ddv5vSylDBx6qVVGpVljxcFmbgiVQnDxvjgoHfjYBUUs=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3130.eurprd07.prod.outlook.com (10.170.245.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.12; Sat, 25 May 2019 16:31:05 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1922.016; Sat, 25 May 2019 16:31:05 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABqJQD//9GFAIAASdoA
Date: Sat, 25 May 2019 16:31:05 +0000
Message-ID: <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com>
In-Reply-To: <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 33ae2616-6674-485e-18d7-08d6e12e6231
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB3130; 
x-ms-traffictypediagnostic: HE1PR07MB3130:
x-microsoft-antispam-prvs: <HE1PR07MB3130E4BC14BA603552A7F03B93030@HE1PR07MB3130.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(376002)(39860400002)(346002)(136003)(396003)(189003)(199004)(18543002)(8936002)(73956011)(99286004)(4326008)(76116006)(7736002)(66066001)(478600001)(305945005)(6246003)(316002)(81166006)(53936002)(58126008)(71190400001)(26005)(71200400001)(86362001)(83716004)(14454004)(76176011)(6506007)(54906003)(102836004)(66476007)(66446008)(64756008)(66556008)(66946007)(25786009)(8676002)(6916009)(81156014)(5660300002)(36756003)(3846002)(6512007)(11346002)(486006)(82746002)(2616005)(44832011)(6436002)(6486002)(476003)(446003)(229853002)(14444005)(256004)(186003)(6116002)(68736007)(33656002)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3130; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: PXSpHbQPrDNjIHjzxG4z3QB/RdIpk4igT/uVTUGUhZTr9FL7pL0eP5QQkEOv2ICNTlXsxJzSm3wJlMNN/OTGYbF/6eh5FpXlC5lf+4KE4YamB+0UlpXiX+4SellSdZY0/HacqbUMXbiAox+HGmOWs64xxcjIuoR88txTwf3gkBF8t3z7VO0BHQWHhtZerhxfoorH3L+QbTV7s3ky7VwotE8PXNwMKKumxAp7jFA4STFvHfq3tqSC4hYFAWdG0rc+vQdhq/jlpeEqhgKNr8Ab0ZSABXcJbz6rs//BJv+eUMxDI7Wl1D12y2skzhWDShVrVJUW0eV77+m+u3Tm/iA9gJQzoGj3MFRASs8S+qiiDa/rRQniVbSc94MSGMsXb0y2wsvXt8WUvHMrT9/KqY4IOXoqLbBA46IR5awSXyNtsNI=
Content-Type: text/plain; charset="utf-8"
Content-ID: <F4017B7C0CA8614ABF2E4FE88E3810B6@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 33ae2616-6674-485e-18d7-08d6e12e6231
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 16:31:05.0384 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3130
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/pvI0itnQbxIQkM2itei9K3ZTsfY>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 16:31:11 -0000

SGksDQrCoMKgDQouLi7CoA0KDQo+Pj4+PiBTZWN0aW9uIDIuNDoNCj4+Pj4+DQo+Pj4+PiAiV2hl
biB0aGUgVUFDIHJlY2VpdmVzIGEgcmVzcG9uc2Ugd2l0aCBtdWx0aXBsZSBoZWFkZXIgZmllbGRz
IHdpdGggdGhlDQo+Pj4+PsKgIMKgc2FtZSByZWFsbSBpdCBTSE9VTEQgdXNlIHRoZSB0b3Btb3N0
IGhlYWRlciBmaWVsZCB0aGF0IGl0IHN1cHBvcnRzLA0KPj4+Pj7CoCDCoHVubGVzcyBhIGxvY2Fs
IHBvbGljeSBkaWN0YXRlcyBvdGhlcndpc2Uu4oCdDQo+Pj4+Pg0KPj4+Pj4gV2h5IGEgU0hPVUxE
PyBJIHdvdWxkIHByZWZlciBhIE1VU1QuDQo+Pj4+DQo+Pj4+IEkgY2FuIGRvIHRoYXQsIGJ1dCB0
aGUgbGFzdCBwYXJ0IG9mIHRoaXMgcGFyYWdyYXBoIHN0YXRlcyB0aGF0IGxvY2FsIHBvbGljeSBj
YW4gb3ZlcnJpZGUgdGhpcyByZWNvbW1lbmRhdGlvbnMgYW55d2F5Lg0KPj4+PiBTbywgZG9lcyBp
dCBtYWtlIGFueSBkaWZmZXJlbmNlPw0KPj4+PiBTaG91bGQgd2UgYWxsb3cgdGhhdD8gV2h5IHdv
dWxkIGxvY2FsIHBvbGljeSBlbmZvcmNlIGEgZG93bmdyYWRlPw0KPj4+Pg0KPj4+Pj4g4oCcV2hl
biB0aGUgVUFDIHJlY2VpdmVzIGEgNDAxIHJlc3BvbnNlIHdpdGggbXVsdGlwbGUgV1dXLUF1dGhl
bnRpY2F0ZQ0KPj4+Pj7CoCDCoGhlYWRlciBmaWVsZHMgd2l0aCBkaWZmZXJlbnQgcmVhbG1zIGl0
IFNIT1VMRCByZXRyeSBhbmQgaW5jbHVkZSBhbg0KPj4+Pj7CoCDCoEF1dGhvcml6YXRpb24gaGVh
ZGVyIGZpZWxkIGNvbnRhaW5pbmcgY3JlZGVudGlhbHMgdGhhdCBtYXRjaCB0aGUNCj4+Pj4+wqAg
wqB0b3Btb3N0IGhlYWRlciBmaWVsZCBvZiBhbnkgb25lIG9mIHRoZSByZWFsbXMu4oCdDQo+Pj4+
Pg0KPj4+Pj4gSWYgeW91IGFyZSBkaXNhbGxvd2luZyBtdWx0aXBsZSBBdXRob3JpemF0aW9uIGhl
YWRlcnMgZm9yIHRoZSBzYW1lIHJlYWxtLA0KPj4+Pj4gYnV0IHdpdGggZGlmZmVyZW50IGFsZ29y
aXRobXMgSSB0aGluayB0aGlzIHNob3VsZCBiZSBjbGVhcmx5IHdyaXR0ZW4uIEluIG15DQo+Pj4+
PiB2aWV3LCB0aGF0IHdvdWxkIGJlIGEgZ29vZCB0aGluZy4NCj4+Pj4NCj4+Pj4gVGhpcyBpcyBh
bGxvd2VkLg0KPj4+DQo+Pj4gUkZDIDMyNjEgZG9lcyBub3Qgc2F5IGFueXRoaW5nIGFib3V0IHVz
aW5nIHRoZSB0b3Btb3N0IGhlYWRlciwgZG9lcyBpdD8NCj4+Pg0KPj4+IEkgd2FzIHJlZmVycmlu
ZyB0byB0aGlzIGRvY3VtZW50Lg0KPj4NCj4+IFNvLCB0aGUgc2hvdWxkLXVzZS10b3Btb3N0IGlz
IHNvbWV0aGluZyBuZXcsIGRlZmluZWQgaW4gdGhpcyBkb2N1bWVudD8NCj4NCj4gWWVzLCBhcyBw
ZXIgUkZDNzYxNi4NCg0KUGVyaGFwcyB0aGVuIHNheSAiQXMgZGVmaW5lZCBpbiBSRkM3NjE3LC4u
Li4iDQoNCkFuZCwgcGVyaGFwcyBtZW50aW9uIGl0IGluIHNlY3Rpb24gMiwgd2hlcmUgdGhlIGNo
YW5nZXMgYXJlIGxpc3RlZC4NCg0KQWxzbywgYXMgdGhlIHJlbW90ZSBwZWVyIG1heSBub3QgaGF2
ZSBpbXBsZW1lbnRlZCB0aGUgZHJhZnQsIEkgdGhpbmsgaXQgd291bGQgYmUgZ29vZCB0byBwb2lu
dCBvdXQgdGhhdCBvbmUgbXVzdCBub3QgYXNzdW1lIHRoYXQgdGhlIHBlZXIgd2lsbCB1c2UgdGhl
IHRvcG1vc3QgaGVhZGVyLCBldmVuIGlmIGl0IHN1cHBvcnRzIHRoZSBhbGdvcml0aG0gaW4gdGhl
IHRvcG1vc3QgaGVhZGVyLg0KDQpSZWdhcmRzLA0KDQpDaHJpc3Rlcg0KDQoNCg==


From nobody Sat May 25 09:31:30 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 98D631200E0 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 09:31:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Dv-TzSUjJDFd for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 09:31:26 -0700 (PDT)
Received: from mail-it1-x134.google.com (mail-it1-x134.google.com [IPv6:2607:f8b0:4864:20::134]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A2F271200CE for <sipcore@ietf.org>; Sat, 25 May 2019 09:31:26 -0700 (PDT)
Received: by mail-it1-x134.google.com with SMTP id m140so18301487itg.2 for <sipcore@ietf.org>; Sat, 25 May 2019 09:31:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3JxzAyhoOXKZ2kxECzjOby6LnUarifnCI6GAEfsnEF0=; b=K5IbVP5dvUZiyupALJPh1Gr+j+8Hm+kqaImFVGZt9cgqge8aVMEsSvrJDy7K/g14uh Cd3XG/5X/8dFSHYZOTaPer6+xKBtw03qEeutn0fcesCN5v/pechVM8yuhleSL0C+CDFI oQLQkO8WRW8mOnP//j5qp9oEWsBgEhFLdq/tciiq93GAssjrW+/A5cy4Y5+homAIzrZ1 53jb8quCTnhZ0FpJsy4GdTc7LwAvf1Dlz7AFaPEH0jXqG7aRvdoHeG0GmDpNYpmKHNse /pYMxiHiqAtcVsnIf+xqGJwrAKOHXouUkujqFVtbDAc/0381ET19KFmiTWqeavJB8PDD W1sA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3JxzAyhoOXKZ2kxECzjOby6LnUarifnCI6GAEfsnEF0=; b=ou7+9+7cWBK93Nb9rsAVsbQ7y+BKVEFqLU3MRDJHvGnG9qAQZTzpncB7MOsY5zlp0h zlliCDOMxGn3O6Nw9coDNq1QQ3c0v8SnPXOhY7+U29jdV4Ij4umGZTL+yD6BEbQ6zHgP lPd7kOAZty/SfGXMKQABQkT8R7AmnABEhznENemU9qj1EGJXRiABjHoGNuMTamknjuT5 fUG4Q8b2IoPfdsO06f1Bpyz6FiyesxiQGt1TDuLvi0tdG/CCwQAaPuts1TEAgRnQdmiQ EFCBYGTaeQm3yawKCKLjiz7yNoLyhk394qnJowYGrP1v0gq7Xz5xchA/eJqA0RrjVMgB 2JpQ==
X-Gm-Message-State: APjAAAU7osqPHmz3LBgO4m4XTnPeUE/w0asV3EWJuPDomAwESIxD7EH1 hdW0Jt4uko1K2BLT09P+U/lWUjLQTUDx7fWxAtY=
X-Google-Smtp-Source: APXvYqwINXL9BLZR616IjqOBTHvj7X3PuX3GM1AVgJ8pt+cMluwRrbhxNy8WZm420OcSeKk+CJlZFTxeovstqCvTFK4=
X-Received: by 2002:a24:c241:: with SMTP id i62mr21259383itg.21.1558801886023;  Sat, 25 May 2019 09:31:26 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a4f:cbc1:0:0:0:0:0 with HTTP; Sat, 25 May 2019 09:31:25 -0700 (PDT)
In-Reply-To: <C34B4DBE-CCF6-49FD-BE86-72470490E6DF@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <238df72e-fb9a-3849-67b5-b3c4ffa8f03e@alum.mit.edu> <C34B4DBE-CCF6-49FD-BE86-72470490E6DF@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 12:31:25 -0400
Message-ID: <CAGL6epLvyeaNhco3+Oy6d48OCTJCyue7fvmfjrRKBZBuJYhH=g@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: Paul Kyzivat <pkyzivat@alum.mit.edu>, "sipcore@ietf.org" <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b114c90589b8d825"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/4dlwMQjKW8X3VB7iABp1l9f11fw>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 16:31:29 -0000

--000000000000b114c90589b8d825
Content-Type: text/plain; charset="UTF-8"

I am fine with removing the note about -sess.

Regards,
 Rifaat


On Saturday, May 25, 2019, Christer Holmberg <christer.holmberg@ericsson.com>
wrote:

> Hi,
>
> >>>     If -sess variant was defined in RFC 7616, it was obviously not
> >>>     mentioned in RFC 3261 __
> >>>
> >>     What is the difference between the session variant and the
> >>     non-session variant? What is meant by "session"? RFC 7616 doesn't
> >>     give any explanation, and I couldn't find anything by googling
> either.
> >
> >    BTW: -sess was not introduced in 7616. It also appeared in 2617,
> though
> >    only as MD5-sess.
>
> If that's the case, then I assume "-sess" is already a part of SIP, and we
> don't need to say anything.
>
> Regards,
>
> Christer
>
>
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--000000000000b114c90589b8d825
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I am fine with removing the note about -sess.<div><br></div><div>Regards,</=
div><div>=C2=A0Rifaat</div><div><br><br>On Saturday, May 25, 2019, Christer=
 Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christer.ho=
lmberg@ericsson.com</a>&gt; wrote:<br><blockquote class=3D"gmail_quote" sty=
le=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">Hi,<br=
>
<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0If -sess variant was defined in RFC 7616, i=
t was obviously not<br>
&gt;&gt;&gt;=C2=A0 =C2=A0 =C2=A0mentioned in RFC 3261 __<br>
&gt;&gt;&gt; <br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0What is the difference between the session vari=
ant and the<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0non-session variant? What is meant by &quot;ses=
sion&quot;? RFC 7616 doesn&#39;t<br>
&gt;&gt;=C2=A0 =C2=A0 =C2=A0give any explanation, and I couldn&#39;t find a=
nything by googling either.<br>
&gt;=C2=A0 =C2=A0 <br>
&gt;=C2=A0 =C2=A0 BTW: -sess was not introduced in 7616. It also appeared i=
n 2617, though <br>
&gt;=C2=A0 =C2=A0 only as MD5-sess.<br>
<br>
If that&#39;s the case, then I assume &quot;-sess&quot; is already a part o=
f SIP, and we don&#39;t need to say anything.<br>
<br>
Regards,<br>
<br>
Christer<br>
<br>
<br>
<br>
______________________________<wbr>_________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org">sipcore@ietf.org</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank"=
>https://www.ietf.org/mailman/<wbr>listinfo/sipcore</a><br>
</blockquote></div>

--000000000000b114c90589b8d825--


From nobody Sat May 25 11:00:17 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 24ADF1200FC for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 11:00:15 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id atYJkcDPaO0d for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 11:00:12 -0700 (PDT)
Received: from mail-it1-x12b.google.com (mail-it1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B1E26120026 for <sipcore@ietf.org>; Sat, 25 May 2019 11:00:12 -0700 (PDT)
Received: by mail-it1-x12b.google.com with SMTP id m3so20948729itl.1 for <sipcore@ietf.org>; Sat, 25 May 2019 11:00:12 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=UQeSXbjisRSASln3JcGKiHaiLwM5O0xwKEIDTp5nhcA=; b=C33STrm7gmNgEFqVXKEZ6xsNuTTwEaCC9nWkr+TlSFgj+5gHsUp0xSfDIi0kjIjMkN 8gVKKNw8R19MyTy5DRujZtd0HylrKeUmxPUmn8kAP7oh5mmDdliUTyDowVPOkWopg5Ge BVCdeG3VmeQ24qNRA5C1X12g6lrfCeNVdFqadkO5YLW5Pz4VdFkmGHnPFdxoGYMYcSoh N6CVEou4FbZ09cV1NgYhYg2irigz+5nIJrmkWOF0V/FAkMDrwaDlQp3/rLS2RTnKBGAQ ksh8Oc14zYAU/C6u+nSTQW8SfoJeAAMQ9bYaMTTW46AYXiVhI1iU+KyMDP+BJyyL7DBQ xp4A==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=UQeSXbjisRSASln3JcGKiHaiLwM5O0xwKEIDTp5nhcA=; b=FsXmYe1Iua4uGdOepRpwKSATERYX6ypsiAltok7txndz/Dy0rROwt/3VH2mqwrUlFC ZWKhKwOvwH/RXAdRwMa/eCmgb4sEktgT9MjCiQyaZH5zeip0xvLV7DKpK3bzap+O/HCk ux+N14vL8jIP1stnokfQ0SPct2qM7WfEs5KnPVqjBHEeBDL0YFlczbDLow2tHAW5Jj7q j1NjMuMbtZXzd/OdtsymHCQdhRWfOHIXBEcrXo87qjj4QWBQMLVT5Lv+3g6VYB0kmfRN VsWWeR8KVK2OTJjIAyydkwVidGpA02J6tOZ5KQIvjcGKUluTwhXAlbl8ZClj/4ZuYOqU 7Qlg==
X-Gm-Message-State: APjAAAV+W9RWE8BIIoOzkd+zoKhLfP5clxB1+/TL17uDfFIMIHMJ/Jja b8DvILvOjsHtt+WFeyWj5Dc6Y8C7lcetAFWzE5o=
X-Google-Smtp-Source: APXvYqyUaBLosmqF2BFBGh5RiEkWWbbO4IAo7aDhW4AM4hGCCD34SkY5hNzUr8gNWrvDuXnEEk76lE6fS//djJF4IQM=
X-Received: by 2002:a02:660c:: with SMTP id k12mr6378337jac.25.1558807212073;  Sat, 25 May 2019 11:00:12 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com>
In-Reply-To: <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 14:00:00 -0400
Message-ID: <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000262a350589ba16d7"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/7l31X9gvJ-sKxkP7m5WF1CU2DEU>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 18:00:15 -0000

--000000000000262a350589ba16d7
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sat, May 25, 2019 at 12:31 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> ...
>
> >>>>> Section 2.4:
> >>>>>
> >>>>> "When the UAC receives a response with multiple header fields with
> the
> >>>>>   same realm it SHOULD use the topmost header field that it support=
s,
> >>>>>   unless a local policy dictates otherwise.=E2=80=9D
> >>>>>
> >>>>> Why a SHOULD? I would prefer a MUST.
> >>>>
> >>>> I can do that, but the last part of this paragraph states that local
> policy can override this recommendations anyway.
> >>>> So, does it make any difference?
> >>>> Should we allow that? Why would local policy enforce a downgrade?
> >>>>
> >>>>> =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Aut=
henticate
> >>>>>   header fields with different realms it SHOULD retry and include a=
n
> >>>>>   Authorization header field containing credentials that match the
> >>>>>   topmost header field of any one of the realms.=E2=80=9D
> >>>>>
> >>>>> If you are disallowing multiple Authorization headers for the same
> realm,
> >>>>> but with different algorithms I think this should be clearly
> written. In my
> >>>>> view, that would be a good thing.
> >>>>
> >>>> This is allowed.
> >>>
> >>> RFC 3261 does not say anything about using the topmost header, does i=
t?
> >>>
> >>> I was referring to this document.
> >>
> >> So, the should-use-topmost is something new, defined in this document?
> >
> > Yes, as per RFC7616.
>
> Perhaps then say "As defined in RFC7617,...."
>
> And, perhaps mention it in section 2, where the changes are listed.
>

The normative text for SIP is specified in this document, so I do not see
the need to add such a sentence.


> Also, as the remote peer may not have implemented the draft, I think it
> would be good to point out that one must not assume that the peer will us=
e
> the topmost header, even if it supports the algorithm in the topmost head=
er.
>
>
Ok. I will add a sentence to section 2.3.

Regards,
 Rifaat





> Regards,
>
> Christer
>
>
>

--000000000000262a350589ba16d7
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sat, May 25, 2019 at 12:31 PM Chri=
ster Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christe=
r.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">Hi,<br>
=C2=A0=C2=A0<br>
...=C2=A0<br>
<br>
&gt;&gt;&gt;&gt;&gt; Section 2.4:<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; &quot;When the UAC receives a response with multiple h=
eader fields with the<br>
&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0same realm it SHOULD use the topmost heade=
r field that it supports,<br>
&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0unless a local policy dictates otherwise.=
=E2=80=9D<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; Why a SHOULD? I would prefer a MUST.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I can do that, but the last part of this paragraph states =
that local policy can override this recommendations anyway.<br>
&gt;&gt;&gt;&gt; So, does it make any difference?<br>
&gt;&gt;&gt;&gt; Should we allow that? Why would local policy enforce a dow=
ngrade?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; =E2=80=9CWhen the UAC receives a 401 response with mul=
tiple WWW-Authenticate<br>
&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0header fields with different realms it SHO=
ULD retry and include an<br>
&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0Authorization header field containing cred=
entials that match the<br>
&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0topmost header field of any one of the rea=
lms.=E2=80=9D<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; If you are disallowing multiple Authorization headers =
for the same realm,<br>
&gt;&gt;&gt;&gt;&gt; but with different algorithms I think this should be c=
learly written. In my<br>
&gt;&gt;&gt;&gt;&gt; view, that would be a good thing.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; This is allowed.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; RFC 3261 does not say anything about using the topmost header,=
 does it?<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; I was referring to this document.<br>
&gt;&gt;<br>
&gt;&gt; So, the should-use-topmost is something new, defined in this docum=
ent?<br>
&gt;<br>
&gt; Yes, as per RFC7616.<br>
<br>
Perhaps then say &quot;As defined in RFC7617,....&quot;<br>
<br>
And, perhaps mention it in section 2, where the changes are listed.<br></bl=
ockquote><div><br></div><div>The normative text for SIP is specified in thi=
s document, so I do not see the need to add such a sentence.</div><div><br>=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
Also, as the remote peer may not have implemented the draft, I think it wou=
ld be good to point out that one must not assume that the peer will use the=
 topmost header, even if it supports the algorithm in the topmost header.<b=
r>
<br></blockquote><div><br></div><div>Ok. I will add a sentence to section 2=
.3.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br>=
</div><div><br></div><div><br></div><div>=C2=A0</div><blockquote class=3D"g=
mail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204=
,204,204);padding-left:1ex">
Regards,<br>
<br>
Christer<br>
<br>
<br>
</blockquote></div></div>

--000000000000262a350589ba16d7--


From nobody Sat May 25 11:17:15 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C37E1120099 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 11:17:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 83A1HaRGJjPo for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 11:17:11 -0700 (PDT)
Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-eopbgr130080.outbound.protection.outlook.com [40.107.13.80]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3A56120086 for <sipcore@ietf.org>; Sat, 25 May 2019 11:17:10 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=gc0E1RabyhaO6Wht/raReZ5ya8UxEkjC0mzVjRZVetY=; b=ZreNX/6LzIiSvgNeNc9vlcFVz/UbzTkjWqS2suDD4eMZlI8UI1VRD/Ed+C5Oi00rVQJUErwrz0GgmtxqwFS674g/0eH3wV4L1UqWM3/gc8UFl4HcedmghadlSB5XhvuEPVQfjk1qBc/arbh7YMcqrPlp76Wy5DZ/RNZjLZtc2+Q=
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com (10.175.243.17) by VI1PR07MB5310.eurprd07.prod.outlook.com (20.178.11.204) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.7; Sat, 25 May 2019 18:17:07 +0000
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61]) by VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61%5]) with mapi id 15.20.1943.007; Sat, 25 May 2019 18:17:07 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABqJQD//9GFAIAASdoA///mjwCAADcSAA==
Date: Sat, 25 May 2019 18:17:07 +0000
Message-ID: <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com>
In-Reply-To: <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 42fd4121-9d7d-416b-138c-08d6e13d329c
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:VI1PR07MB5310; 
x-ms-traffictypediagnostic: VI1PR07MB5310:
x-microsoft-antispam-prvs: <VI1PR07MB53102831994863C5578E16CE93030@VI1PR07MB5310.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(39860400002)(396003)(366004)(346002)(136003)(199004)(189003)(18543002)(6116002)(6436002)(316002)(3846002)(33656002)(6506007)(68736007)(4326008)(66946007)(478600001)(82746002)(73956011)(8936002)(7736002)(6486002)(76116006)(102836004)(64756008)(66446008)(91956017)(86362001)(66476007)(54906003)(66556008)(25786009)(76176011)(6512007)(53936002)(14454004)(26005)(476003)(5660300002)(66066001)(6246003)(14444005)(44832011)(486006)(2616005)(11346002)(446003)(229853002)(256004)(6916009)(58126008)(81156014)(81166006)(8676002)(99286004)(305945005)(2906002)(36756003)(186003)(83716004)(71190400001)(71200400001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB5310; H:VI1PR07MB3167.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: lYpBm984yl7YJtWX2xc5q+7bHyl8Wsx4fIbFUurH/igDleamQAbkoycpT/HvY9oinDLeCE3XZNhswJIJmpLsII4PxixhDi4yIub7fOuOexJyE4HIfZDqmYE8Xyji+v1GX/ycwwT71es2as8LJC+wDnj9q27LgTo/sr63ATC2Df/OV0g539zOvE9QRDB0WfJAPfBHowziZnk16LrwwQbRmxhoZ3eOu+FHNOkv7OOhS+ZgK76QxPJmSQcisNg6xnq0hvVNWfBwNj4o6H3/WGJX85D5BTR1MWis1rPzu8VTqmXLxxriNypHvS+NlOneo29WMDf/3bp8gna8bzbwJ1z18IWUEpf1HqWz/7ID8ecIfTEvsWv1vVUCDru3nNWzzp3pbK+WHPSvvAbA3GYQ+lCMrDFQCUcOSoRZSGHWCJ4hWng=
Content-Type: text/plain; charset="utf-8"
Content-ID: <11AF1676CE8FAD49921D0A50FB121B3A@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 42fd4121-9d7d-416b-138c-08d6e13d329c
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 18:17:07.6978 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB5310
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/C2rzazYy19TTI0eEIlCKG1gz5h8>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 18:17:14 -0000
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From nobody Sat May 25 11:23:49 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D202F120086 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 11:23:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id hKydQbIeAcC9 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 11:23:44 -0700 (PDT)
Received: from mail-it1-x132.google.com (mail-it1-x132.google.com [IPv6:2607:f8b0:4864:20::132]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 92282120105 for <sipcore@ietf.org>; Sat, 25 May 2019 11:23:44 -0700 (PDT)
Received: by mail-it1-x132.google.com with SMTP id u186so18555305ith.0 for <sipcore@ietf.org>; Sat, 25 May 2019 11:23:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=n1ED5afLI9FQOmB3hYGnXMDwbeyLdU7nc/m0kGgAKso=; b=Z/yjXS50Lx5ONqiQYbBSgeHgdmSEePtXF3CTZI3oTeaicxpZ/kmQ5TGr7rddwlrvWx bRG8rbfAENB+6GE1UFLrwsmxkzAmKL5L130YNFWBzYyH3zb/wvwGt0vv9P/pyPU6zmVj OcP/JjrjhncVGy3JTbw68bqB+ywRx+k4ceIVpMj3qKpYVwGUYpNT2v9zJQlxVccyc2wg LilpCh5PP9wiFdiQO2VFkA3/j8wjXTasKSoborbeDjSHLhx/KpkOPusUT2e6dM9uNXNj ecaI/ci0qL4NIISnHJeVsA6NRNq3YPFwXXP4wA+YWZ3W4xNY3I/QQTikeCm5+nL0yjLh Hmmg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=n1ED5afLI9FQOmB3hYGnXMDwbeyLdU7nc/m0kGgAKso=; b=Vxtv9SbVBq/vDD4NvfDmzzxLd2Blr26TYAVb8/UzKKQ9m5ZURSqlkUdDdPJfVZbbA8 s4cNITIWPUtYjNnms+cohpDv+frCRZN9NKl+8O2wVsWb1LBe7u8rYGPahMwDFT9bSh8l xRN+muyJvoLAmxmUrH5P4A8lMVOFwYaaD58fxQ9oRPzv+rpLwZLmtDMGPaIsMMoRzoXA gwk8sz/wubD0UxsYb+GCsy8A/KUDT4THps4pLtQuMlFOe5ID97G2Bdw/2pPphORY47ii hOphJN/szIs86y0uGaFfwuaL6gitSe7AizPSqo7KGvh2Sl3rP4UneEbE628p2xknUF4T 1dAA==
X-Gm-Message-State: APjAAAWxUiTHCzGqSwNTxgPWtDWvFYG9ktDkt3If7+QEviUVVHUXwyUb HWIKER14gJ/SOgRGNz+OK8YnCPGPl1kBiEgc1G8=
X-Google-Smtp-Source: APXvYqxDmfxaQvtoHTlSTkIWdcmhLyJA7JITbpgs2Hy5CWuETiSuGsNu8Y8F4y0DJ0dF9I5LpTbhHu67zoE7v+nU63I=
X-Received: by 2002:a24:19cd:: with SMTP id b196mr23921789itb.74.1558808623975;  Sat, 25 May 2019 11:23:43 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com> <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com>
In-Reply-To: <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 14:23:32 -0400
Message-ID: <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000004e101c0589ba6aba"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/6VX650nF4aA0yNGru3codK0UYLM>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 18:23:47 -0000

--0000000000004e101c0589ba6aba
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sat, May 25, 2019 at 2:17 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> ...
>
> >>>>>> Section 2.4:
> >>>>>>
> >>>>>> "When the UAC receives a response with multiple header fields with
> the
> >>>>>>   same realm it SHOULD use the topmost header field that it
> supports,
> >>>>>>   unless a local policy dictates otherwise.=E2=80=9D
> >>>>>>
> >>>>>> Why a SHOULD? I would prefer a MUST.
> >>>>>
> >>>>> I can do that, but the last part of this paragraph states that loca=
l
> policy can override this recommendations anyway.
> >>>>> So, does it make any difference?
> >>>>> Should we allow that? Why would local policy enforce a downgrade?
> >>>>>
> >>>>>> =E2=80=9CWhen the UAC receives a 401 response with multiple WWW-Au=
thenticate
> >>>>>>   header fields with different realms it SHOULD retry and include =
an
> >>>>>>   Authorization header field containing credentials that match the
> >>>>>>   topmost header field of any one of the realms.=E2=80=9D
> >>>>>>
> >>>>>> If you are disallowing multiple Authorization headers for the same
> realm,
> >>>>>> but with different algorithms I think this should be clearly
> written. In my
> >>>>>> view, that would be a good thing.
> >>>>>
> >>>>> This is allowed.
> >>>>
> >>>> RFC 3261 does not say anything about using the topmost header, does
> it?
> >>>>
> >>>> I was referring to this document.
> >>>
> >>> So, the should-use-topmost is something new, defined in this document=
?
> >>
> >> Yes, as per RFC7616.
> >
> > Perhaps then say "As defined in RFC7617,...."
> >
> > And, perhaps mention it in section 2, where the changes are listed.
> >
> > The normative text for SIP is specified in this document, so I do not
> see the need to add such a sentence.
>
> When we update an RFC, it is good to have an overview about what the
> updates are, so that people don't have to start reading 3261, 7617 and tr=
y
> to figure out themselves. They will obviously have to read the RFCs to
> figure out the details, but it helps if they know what the updates are
> about.
>

Section 2 is all about the changes introduced to the Digest mechanism.
If that is not sufficient, can you propose some text?


>
> Regards,
>
> Christer
>
>
>

--0000000000004e101c0589ba6aba
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sat, May 25, 2019 at 2:17 PM Chris=
ter Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christer=
.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex">Hi,<br>
<br>
...=C2=A0<br>
<br>
&gt;&gt;&gt;&gt;&gt;&gt; Section 2.4:<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; &quot;When the UAC receives a response with multip=
le header fields with the<br>
&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0same realm it SHOULD use the topmost h=
eader field that it supports,<br>
&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0unless a local policy dictates otherwi=
se.=E2=80=9D<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; Why a SHOULD? I would prefer a MUST.<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; I can do that, but the last part of this paragraph sta=
tes that local policy can override this recommendations anyway.<br>
&gt;&gt;&gt;&gt;&gt; So, does it make any difference?<br>
&gt;&gt;&gt;&gt;&gt; Should we allow that? Why would local policy enforce a=
 downgrade?<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; =E2=80=9CWhen the UAC receives a 401 response with=
 multiple WWW-Authenticate<br>
&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0header fields with different realms it=
 SHOULD retry and include an<br>
&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0Authorization header field containing =
credentials that match the<br>
&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0topmost header field of any one of the=
 realms.=E2=80=9D<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; If you are disallowing multiple Authorization head=
ers for the same realm,<br>
&gt;&gt;&gt;&gt;&gt;&gt; but with different algorithms I think this should =
be clearly written. In my<br>
&gt;&gt;&gt;&gt;&gt;&gt; view, that would be a good thing.<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; This is allowed.<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; RFC 3261 does not say anything about using the topmost hea=
der, does it?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; I was referring to this document.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; So, the should-use-topmost is something new, defined in this d=
ocument?<br>
&gt;&gt;<br>
&gt;&gt; Yes, as per RFC7616.<br>
&gt;<br>
&gt; Perhaps then say &quot;As defined in RFC7617,....&quot;<br>
&gt;<br>
&gt; And, perhaps mention it in section 2, where the changes are listed.<br=
>
&gt;<br>
&gt; The normative text for SIP is specified in this document, so I do not =
see the need to add such a sentence.<br>
<br>
When we update an RFC, it is good to have an overview about what the update=
s are, so that people don&#39;t have to start reading 3261, 7617 and try to=
 figure out themselves. They will obviously have to read the RFCs to figure=
 out the details, but it helps if they know what the updates are about.<br>=
</blockquote><div><br></div><div>Section 2 is all about the changes introdu=
ced to the Digest mechanism.<br></div><div>If that is not sufficient, can y=
ou propose some text?</div><div>=C2=A0</div><blockquote class=3D"gmail_quot=
e" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204)=
;padding-left:1ex">
<br>
Regards,<br>
<br>
Christer<br>
<br>
<br>
</blockquote></div></div>

--0000000000004e101c0589ba6aba--


From nobody Sat May 25 12:36:13 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DE0DD120096 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 12:36:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id UoIefRC1RzKU for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 12:36:08 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60043.outbound.protection.outlook.com [40.107.6.43]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DD20120021 for <sipcore@ietf.org>; Sat, 25 May 2019 12:36:07 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=rZZI0Ir3OiZwSBLQZ75eYn0EKcQtInWjl89vPIUe+wA=; b=gQRJgv9vwTLUC/bgxhp+b2In32maPYIYYGpVhIPPxpD3AQ+ZXfYPaIBcWRrConhD8f+4odfeqntpjpm2/wE8hW2ERh8nSVoLkh0esdf2onBahcXU5Ooibi2HpSckXyzOqQUPyKVx3kyOde+AO7BS1IYswI2LCEVdyVnYmiTeL+w=
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com (10.175.243.17) by VI1PR07MB5934.eurprd07.prod.outlook.com (20.178.81.148) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Sat, 25 May 2019 19:36:03 +0000
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61]) by VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61%5]) with mapi id 15.20.1943.007; Sat, 25 May 2019 19:36:03 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABqJQD//9GFAIAASdoA///mjwCAADcSAP//z4EAAAjRmAA=
Date: Sat, 25 May 2019 19:36:03 +0000
Message-ID: <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com> <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com> <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com>
In-Reply-To: <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 61eec290-d9d9-4cd8-be93-08d6e1483940
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:VI1PR07MB5934; 
x-ms-traffictypediagnostic: VI1PR07MB5934:
x-microsoft-antispam-prvs: <VI1PR07MB5934D437A1C89DE48B4DF64993030@VI1PR07MB5934.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(346002)(39860400002)(396003)(136003)(18543002)(189003)(199004)(6916009)(6116002)(3846002)(8936002)(86362001)(54906003)(82746002)(6246003)(26005)(71200400001)(71190400001)(186003)(446003)(83716004)(58126008)(14444005)(256004)(44832011)(11346002)(2616005)(476003)(486006)(33656002)(4326008)(25786009)(66066001)(68736007)(229853002)(73956011)(81156014)(6486002)(6436002)(305945005)(478600001)(7736002)(76176011)(14454004)(5660300002)(6506007)(99286004)(102836004)(6512007)(53936002)(36756003)(316002)(81166006)(76116006)(8676002)(66946007)(66446008)(64756008)(66556008)(91956017)(66476007)(2906002); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB5934; H:VI1PR07MB3167.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: qnGUgXwzvbVXWplhjKySzqAqP3E/z1Q4nejys48SZbuBKjFtuHmGG4m8dN5a6z82HX2XGyqGDAeOFglbJBQnBkyK5xvUe2zm4X5YakvD96trAWpuEfYbuvVzRu1pD7uv1M2ZOFGkGKmslFMzXtK35QLnWMUAW02QrdAos8kD+vLkjlLRbjDJSEgu3pMHTS9roggeo6/il3/+iYxORtm2Q0SItgQlWU6wQoV7Sm1Om0xUmOLB2i98DtuprzG32fvur5KydtYCOsoG03Th7FC7iT3DDnMJvS6l/ZwYgOgJS8R7dqobCrerOq12NxYOC41I8/T5yJ37dQAOjLeh26o9tocLDguLDLoUvQd5SE+GFGi4KTj2CFLLDMzslMmH7Ns7LrEsXhql/XHWybAlFxTeeAMoLYrcPP9pOatrd6pBW70=
Content-Type: text/plain; charset="utf-8"
Content-ID: <A9800F985A97724485814C22D55432C4@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 61eec290-d9d9-4cd8-be93-08d6e1483940
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 19:36:03.3633 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB5934
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/567tmapkBcYu1QA_4YNF1NCzOUE>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 19:36:12 -0000

SGksDQoNCi4uLsKgDQoNCj4+Pj4+Pj4+IFNlY3Rpb24gMi40Og0KPj4+Pj4+Pj4NCj4+Pj4+Pj4+
ICJXaGVuIHRoZSBVQUMgcmVjZWl2ZXMgYSByZXNwb25zZSB3aXRoIG11bHRpcGxlIGhlYWRlciBm
aWVsZHMgd2l0aCB0aGUNCj4+Pj4+Pj4+wqAgwqBzYW1lIHJlYWxtIGl0IFNIT1VMRCB1c2UgdGhl
IHRvcG1vc3QgaGVhZGVyIGZpZWxkIHRoYXQgaXQgc3VwcG9ydHMsDQo+Pj4+Pj4+PsKgIMKgdW5s
ZXNzIGEgbG9jYWwgcG9saWN5IGRpY3RhdGVzIG90aGVyd2lzZS7igJ0NCj4+Pj4+Pj4+DQo+Pj4+
Pj4+PiBXaHkgYSBTSE9VTEQ/IEkgd291bGQgcHJlZmVyIGEgTVVTVC4NCj4+Pj4+Pj4NCj4+Pj4+
Pj4gSSBjYW4gZG8gdGhhdCwgYnV0IHRoZSBsYXN0IHBhcnQgb2YgdGhpcyBwYXJhZ3JhcGggc3Rh
dGVzIHRoYXQgbG9jYWwgcG9saWN5IGNhbiBvdmVycmlkZSB0aGlzIHJlY29tbWVuZGF0aW9ucyBh
bnl3YXkuDQo+Pj4+Pj4+IFNvLCBkb2VzIGl0IG1ha2UgYW55IGRpZmZlcmVuY2U/DQo+Pj4+Pj4+
IFNob3VsZCB3ZSBhbGxvdyB0aGF0PyBXaHkgd291bGQgbG9jYWwgcG9saWN5IGVuZm9yY2UgYSBk
b3duZ3JhZGU/DQo+Pj4+Pj4+DQo+Pj4+Pj4+PiDigJxXaGVuIHRoZSBVQUMgcmVjZWl2ZXMgYSA0
MDEgcmVzcG9uc2Ugd2l0aCBtdWx0aXBsZSBXV1ctQXV0aGVudGljYXRlDQo+Pj4+Pj4+PsKgIMKg
aGVhZGVyIGZpZWxkcyB3aXRoIGRpZmZlcmVudCByZWFsbXMgaXQgU0hPVUxEIHJldHJ5IGFuZCBp
bmNsdWRlIGFuDQo+Pj4+Pj4+PsKgIMKgQXV0aG9yaXphdGlvbiBoZWFkZXIgZmllbGQgY29udGFp
bmluZyBjcmVkZW50aWFscyB0aGF0IG1hdGNoIHRoZQ0KPj4+Pj4+Pj7CoCDCoHRvcG1vc3QgaGVh
ZGVyIGZpZWxkIG9mIGFueSBvbmUgb2YgdGhlIHJlYWxtcy7igJ0NCj4+Pj4+Pj4+DQo+Pj4+Pj4+
PiBJZiB5b3UgYXJlIGRpc2FsbG93aW5nIG11bHRpcGxlIEF1dGhvcml6YXRpb24gaGVhZGVycyBm
b3IgdGhlIHNhbWUgcmVhbG0sDQo+Pj4+Pj4+PiBidXQgd2l0aCBkaWZmZXJlbnQgYWxnb3JpdGht
cyBJIHRoaW5rIHRoaXMgc2hvdWxkIGJlIGNsZWFybHkgd3JpdHRlbi4gSW4gbXkNCj4+Pj4+Pj4+
IHZpZXcsIHRoYXQgd291bGQgYmUgYSBnb29kIHRoaW5nLg0KPj4+Pj4+Pg0KPj4+Pj4+PiBUaGlz
IGlzIGFsbG93ZWQuDQo+Pj4+Pj4NCj4+Pj4+PiBSRkMgMzI2MSBkb2VzIG5vdCBzYXkgYW55dGhp
bmcgYWJvdXQgdXNpbmcgdGhlIHRvcG1vc3QgaGVhZGVyLCBkb2VzIGl0Pw0KPj4+Pj4+DQo+Pj4+
Pj4gSSB3YXMgcmVmZXJyaW5nIHRvIHRoaXMgZG9jdW1lbnQuDQo+Pj4+Pg0KPj4+Pj4gU28sIHRo
ZSBzaG91bGQtdXNlLXRvcG1vc3QgaXMgc29tZXRoaW5nIG5ldywgZGVmaW5lZCBpbiB0aGlzIGRv
Y3VtZW50Pw0KPj4+Pg0KPj4+PiBZZXMsIGFzIHBlciBSRkM3NjE2Lg0KPj4+DQo+Pj4gUGVyaGFw
cyB0aGVuIHNheSAiQXMgZGVmaW5lZCBpbiBSRkM3NjE3LC4uLi4iDQo+Pj4NCj4+PiBBbmQsIHBl
cmhhcHMgbWVudGlvbiBpdCBpbiBzZWN0aW9uIDIsIHdoZXJlIHRoZSBjaGFuZ2VzIGFyZSBsaXN0
ZWQuDQo+Pj4NCj4+PiBUaGUgbm9ybWF0aXZlIHRleHQgZm9yIFNJUCBpcyBzcGVjaWZpZWQgaW4g
dGhpcyBkb2N1bWVudCwgc28gSSBkbyBub3Qgc2VlIHRoZSBuZWVkIHRvIGFkZCBzdWNoIGEgc2Vu
dGVuY2UuDQo+Pg0KPj4gV2hlbiB3ZSB1cGRhdGUgYW4gUkZDLCBpdCBpcyBnb29kIHRvIGhhdmUg
YW4gb3ZlcnZpZXcgYWJvdXQgd2hhdCB0aGUgdXBkYXRlcyBhcmUsIHNvIHRoYXQgcGVvcGxlIGRv
bid0IGhhdmUgdG8gc3RhcnQgcmVhZGluZyAzMjYxLCA3NjE3IA0KPj4gYW5kIHRyeSB0byBmaWd1
cmUgb3V0IHRoZW1zZWx2ZXMuIFRoZXkgd2lsbCBvYnZpb3VzbHkgaGF2ZSB0byByZWFkIHRoZSBS
RkNzIHRvIGZpZ3VyZSBvdXQgdGhlIGRldGFpbHMsIGJ1dCBpdCBoZWxwcyBpZiB0aGV5IGtub3cg
d2hhdCB0aGUgdXBkYXRlcyANCj4+IGFyZSBhYm91dC4NCj4NCj4gU2VjdGlvbiAyIGlzIGFsbCBh
Ym91dCB0aGUgY2hhbmdlcyBpbnRyb2R1Y2VkIHRvIHRoZSBEaWdlc3QgbWVjaGFuaXNtLg0KDQpZ
ZXMsIGJ1dCB0aGF0IGRvZXNuJ3QgcmVhbGx5IHNheSBhbnl0aGluZyBhYm91dCB3aGF0IGV4YWN0
bHkgaXMgdXBkYXRlZC4NCg0KPiBJZiB0aGF0IGlzIG5vdCBzdWZmaWNpZW50LCBjYW4geW91IHBy
b3Bvc2Ugc29tZSB0ZXh0Pw0KwqANClNvbWV0aGluZyBsaWtlIHRoaXM6DQoNCiIyLiAgVXBkYXRl
cyBSRkMgMzI2MQ0KDQpUaGlzIHNlY3Rpb24gcmVwbGFjZXMgdGhlIHJlZmVyZW5jZSB0byBSRkMy
NjE3IHdpdGggYSByZWZlcmVuY2UgdG8gUkZDNzYxNyBpbiBSRkMzMjYxLCBhbmQNCmRlc2NyaWJl
cyB0aGUgbW9kaWZpY2F0aW9ucyB0byB0aGUgdXNhZ2Ugb2YgdGhlIERpZ2VzdCBtZWNoYW5pc20g
aW4gUkZDMzI2MSByZXN1bHRpbmcgZnJvbSANCnRoYXQgcmVmZXJlbmNlIHVwZGF0ZS4gSXQgYWRk
cyBzdXBwb3J0IGZvciB0aGUgU0hBLTI1NiBhbmQgU0hBLTUxMi8yNTYgYWxnb3JpdGhtcy4gSXQg
YWRkcw0KcmVxdWlyZWQgc3VwcG9ydCBmb3IgdGhlICJxb3AiIG9wdGlvbi4gSXQgcHJvdmlkZXMg
YWRkaXRpb25hbCBVQUMgYW5kIFVBUyBwcm9jZWR1cmVzIHJlZ2FyZGluZyB1c2FnZSBvZg0KbXVs
dGlwbGUgU0lQIEF1dGhvcml6YXRpb24sIFdXVy1BdXRoZW50aWNhdGUgYW5kIFByb3h5LUF1dGhl
bnRpY2F0ZSBoZWFkZXIgZmllbGRzLCBpbmNsdWRpbmcgDQppbiB3aGljaCBvcmRlciB0byBpbnNl
cnQgYW5kIHByb2Nlc3MgdGhlbS4gSXQgcHJvdmlkZXMgZ3VpZGFuY2UgcmVnYXJkaW5nIGZvcmtp
bmcuIEZpbmFsbHksIGl0DQp1cGRhdGVzIHRoZSBTSVAgcHJvdG9jb2wgQk5GIGFzIHJlcXVpcmVk
IGJ5IHRoZSB1cGRhdGVzLiINCg0KRmVlbCBmcmVlIHRvIG1vZGlmeSwgcmVtb3ZlIC0gb3IgYWRk
IGlmIEkgaGF2ZSBmb3Jnb3Qgc29tZXRoaW5nLg0KDQoNCkluIGFkZGl0aW9uLCBJIHN1Z2dlc3Qg
dG8gY2hhbmdlIHRoZSBuYW1lcyBvZiBzdWJzZWN0aW9ucyAyLjMgYW5kIDIuNC4NCg0KVGhlIGN1
cnJlbnQgbmFtZSBvZiBzdWJzZWN0aW9uIDIuMyBpcyAiVGhlIEF1dGhlbnRpY2F0ZSBSZXNwb25z
ZSBIZWFkZXIgRmllbGQiLiBCdXQsIHRoZXJlIGlzIG5vIHN1Y2ggaGVhZGVyIGZpZWxkIGRlc2Ny
aWJlZC4gVGhlIHNlY3Rpb24gdGFsa3MgYWJvdXQgb3RoZXIgaGVhZGVyIGZpZWxkcyAod2l0aCBz
aW1pbGFyIG5hbWVzKS4gQ291bGQgd2Ugc2ltcGx5IGNhbGwgaXQgIlVBUyBiZWhhdmlvciI/DQoN
ClRoZSBjdXJyZW50IG5hbWUgb2Ygc3Vic2VjdGlvbiAyLjQgaXMgIlRoZSBBdXRob3JpemF0aW9u
IFJlcXVlc3QgSGVhZGVyIEZpZWxkIi4gQnV0LCB0aGUgc2VjdGlvbiBhbHNvIHRhbGtzIGFib3V0
IHRoZSBXV1ctQXV0aGVudGljYXRlIGhlYWRlciBmaWVsZC4gQ291bGQgd2Ugc2ltcGx5IGNhbGwg
aXQgIlVBQyBiZWhhdmlvciI/DQoNClJlZ2FyZHMsDQoNCkNocmlzdGVyDQoNCg0K


From nobody Sat May 25 12:52:50 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id AC1A3120096 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 12:52:48 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NOErMzT8v6Gc for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 12:52:45 -0700 (PDT)
Received: from EUR04-DB3-obe.outbound.protection.outlook.com (mail-eopbgr60068.outbound.protection.outlook.com [40.107.6.68]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 2F4DD120021 for <sipcore@ietf.org>; Sat, 25 May 2019 12:52:44 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=v5RvM6eUB3rc8wzkpoyplYNESMx1Z7LV7vrS1HHimTI=; b=XZdDfXSB6Uih+6mxoZfUmT1dY95dVCIWew0Cm3H58hEspYvnQbPrYVUxRpfeyjpoUIm/fSsxvMzXhozeTOfjqvpw3nugXkbtke2szi5tayrtpouaRzb/kXaKB53Yoq7qVVRFyKmNIdCziuMiNSrX6r8R06W1VPKofHy1c7FasqM=
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com (10.175.243.17) by VI1PR07MB4704.eurprd07.prod.outlook.com (20.177.57.140) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.12; Sat, 25 May 2019 19:52:42 +0000
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61]) by VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61%5]) with mapi id 15.20.1943.007; Sat, 25 May 2019 19:52:42 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: SIPCORE <sipcore@ietf.org>, "Olle E. Johansson" <oej@edvina.net>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABqJQD//9GFAIAASdoA///mjwCAADcSAP//z4EAAAjRmAAAAJTdgA==
Date: Sat, 25 May 2019 19:52:42 +0000
Message-ID: <34DB2000-4E73-4876-8682-8AFEB12D160A@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com> <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com> <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com> <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
In-Reply-To: <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: ffb9e182-78bf-4832-c705-08d6e14a8c84
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:VI1PR07MB4704; 
x-ms-traffictypediagnostic: VI1PR07MB4704:
x-ms-exchange-purlcount: 1
x-microsoft-antispam-prvs: <VI1PR07MB4704E7F4B92C48E95E54916B93030@VI1PR07MB4704.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(346002)(136003)(39860400002)(396003)(376002)(18543002)(189003)(199004)(305945005)(8936002)(66066001)(99286004)(186003)(26005)(81166006)(81156014)(7736002)(11346002)(4326008)(86362001)(44832011)(486006)(476003)(6506007)(102836004)(71200400001)(2616005)(446003)(6486002)(5660300002)(14444005)(54906003)(71190400001)(229853002)(6512007)(6306002)(6436002)(83716004)(256004)(25786009)(3846002)(68736007)(66946007)(2906002)(6116002)(66556008)(64756008)(33656002)(76116006)(91956017)(66446008)(6246003)(53936002)(316002)(66476007)(58126008)(82746002)(76176011)(8676002)(14454004)(966005)(6916009)(478600001)(73956011)(36756003); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB4704; H:VI1PR07MB3167.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: pp+G2bTmKXoC2WS8mHyhb7XhWhaBfylnBVNI/8dT4Dt4i88V7hhraU37az/i8671ATmTLaDTxRdaaYXv7U40iEKsBqlm81rzEai7l1N8eii6M5JDDBdfK2FPHBnggwwPgmSmlWCYBE89brnFTj89cZm3gAfPUZYCqhmlSgMiLRmp/hfC4/8qe2f6HgEIXyXfPRESHYc8xrHnwvP7PhCQM0dub2zbq9Tq6RifQqgdPU0uqbBY/cXfpRWdQw90ClyyIOwjPO/EUP4DAy21gKytTC6rf9O2AmlIsGwaUBLsIE0PrmGc0il7nuri6hyvyCqT4oOvUouUTOCbdvqf55A7brmQ1eUitJAm0gXUkAgUgb6Ag0BaI54w8sYC1fgwA1EIj2K6iNUNSLXVoSUR95sjmGs4SZK7nC2bbjzCKomDewM=
Content-Type: text/plain; charset="utf-8"
Content-ID: <28357D017B06E74687C18ACD3DB705AB@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: ffb9e182-78bf-4832-c705-08d6e14a8c84
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 19:52:42.0425 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB4704
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/rTy0vfcjOYg3lLi1pXZ7hLIU7iA>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 19:52:49 -0000
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=


From nobody Sat May 25 13:08:31 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 376BA120103 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 13:08:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.999
X-Spam-Level: 
X-Spam-Status: No, score=-1.999 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Bqi0wjl1zQ_H for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 13:08:26 -0700 (PDT)
Received: from mail-io1-xd30.google.com (mail-io1-xd30.google.com [IPv6:2607:f8b0:4864:20::d30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F0E59120021 for <sipcore@ietf.org>; Sat, 25 May 2019 13:08:25 -0700 (PDT)
Received: by mail-io1-xd30.google.com with SMTP id b3so4985996iob.12 for <sipcore@ietf.org>; Sat, 25 May 2019 13:08:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=FNUfy36wpChFOWNPoo+lAH2e2ks7ffJwtjaxgsywJBc=; b=O7ZS3pklh5qj69up8ZXmuctRmysI3dH3IllC9/2eHzKIMdBwNEW6mEEpnPxrlvliYk 93VZjRjVGtLw+FZuE/Hfj3WICmGH3RycVx78j8rY/9ZFTrfrmG2Svoe0jjXTrJ7yMPzC 8TyPYaSqDkpESa4xCbpIikwbAO6xBl8OCM13hXlxYhVHSS2PrX1yLhLS7a0gsjqc+8+7 lyYRzjlY1FH/Y3tOg09O3FuvKXJc7iYww0SQBpLrUv4x0pK5LBpS7bYNMV5AhX/UtNps dVijowYmqqURZYK9u2z8LUgxr8RBzA42wtn51TTPKkZbe1foUbWn8prHEszio8hx/o/S aBqQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=FNUfy36wpChFOWNPoo+lAH2e2ks7ffJwtjaxgsywJBc=; b=T0V07dcWlPupE6dJQ/i6ki91yzZ6johFBksm2i4Gqnhrovv3nWrfqn+eQ9IJaM4ly7 LIOqqsfPLV33rsSgEEyma58k9NENahl+JkCrQdNEKdPycAC4/dPZMDsYWi7UNx/NNyQv 2GbxQErBdMyAJOiNN7GyrTNT8xjfiVNgC77R4zBI9UnML9B8et5rJyFdgXjciSMQv3SO kBIOvj38CjZsz2OdJMXYnZiLkM+rDfksaBnwZhhdS4WMk8sd3Jofz+pWg1phvjGD5yp5 3YGTY2m5GTDAiwiD3aCQQi9/YpUSpcGIz/D/o06EB42sAvmCQ3ocKvhUSm5o4nu8XD4F KSAg==
X-Gm-Message-State: APjAAAWV3ahkdsCinayNVxy4n8O/buJY7Hzl+89HIwkrFzT6tNqVVihd setWZQze/X3zYOQ86iXMzahUPKlko4/TBfRP41k=
X-Google-Smtp-Source: APXvYqwS5ygwa4PBCt2M42AAOqces8Z0WgWHQ+MrrJlngeDjOErdV3CYi5IrPj9ofaVs7LNbJH5yBHW/fXGsRivgFm8=
X-Received: by 2002:a5d:8e0c:: with SMTP id e12mr17871643iod.31.1558814905242;  Sat, 25 May 2019 13:08:25 -0700 (PDT)
MIME-Version: 1.0
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com> <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com> <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com> <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
In-Reply-To: <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sat, 25 May 2019 16:08:14 -0400
Message-ID: <CAGL6epLb7GTKT3kExc-vta6h2Pym=PW=20vL-JSK6B77j9VthQ@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000b29ab40589bbe0c3"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/SjdBuzmf0Vby1kdW4o46rX02PLw>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 20:08:29 -0000

--000000000000b29ab40589bbe0c3
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sat, May 25, 2019 at 3:36 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> ...
>
> >>>>>>>> Section 2.4:
> >>>>>>>>
> >>>>>>>> "When the UAC receives a response with multiple header fields
> with the
> >>>>>>>>   same realm it SHOULD use the topmost header field that it
> supports,
> >>>>>>>>   unless a local policy dictates otherwise.=E2=80=9D
> >>>>>>>>
> >>>>>>>> Why a SHOULD? I would prefer a MUST.
> >>>>>>>
> >>>>>>> I can do that, but the last part of this paragraph states that
> local policy can override this recommendations anyway.
> >>>>>>> So, does it make any difference?
> >>>>>>> Should we allow that? Why would local policy enforce a downgrade?
> >>>>>>>
> >>>>>>>> =E2=80=9CWhen the UAC receives a 401 response with multiple
> WWW-Authenticate
> >>>>>>>>   header fields with different realms it SHOULD retry and includ=
e
> an
> >>>>>>>>   Authorization header field containing credentials that match t=
he
> >>>>>>>>   topmost header field of any one of the realms.=E2=80=9D
> >>>>>>>>
> >>>>>>>> If you are disallowing multiple Authorization headers for the
> same realm,
> >>>>>>>> but with different algorithms I think this should be clearly
> written. In my
> >>>>>>>> view, that would be a good thing.
> >>>>>>>
> >>>>>>> This is allowed.
> >>>>>>
> >>>>>> RFC 3261 does not say anything about using the topmost header, doe=
s
> it?
> >>>>>>
> >>>>>> I was referring to this document.
> >>>>>
> >>>>> So, the should-use-topmost is something new, defined in this
> document?
> >>>>
> >>>> Yes, as per RFC7616.
> >>>
> >>> Perhaps then say "As defined in RFC7617,...."
> >>>
> >>> And, perhaps mention it in section 2, where the changes are listed.
> >>>
> >>> The normative text for SIP is specified in this document, so I do not
> see the need to add such a sentence.
> >>
> >> When we update an RFC, it is good to have an overview about what the
> updates are, so that people don't have to start reading 3261, 7617
> >> and try to figure out themselves. They will obviously have to read the
> RFCs to figure out the details, but it helps if they know what the update=
s
> >> are about.
> >
> > Section 2 is all about the changes introduced to the Digest mechanism.
>
> Yes, but that doesn't really say anything about what exactly is updated.
>
> > If that is not sufficient, can you propose some text?
>
> Something like this:
>
> "2.  Updates RFC 3261
>

I do not see the need for this change. The first page has "Update: 3261"
and the first sentence in section 2 explicitly states that again.


> This section replaces the reference to RFC2617 with a reference to RFC761=
7
> in RFC3261, and
> describes the modifications to the usage of the Digest mechanism in
> RFC3261 resulting from
> that reference update. It adds support for the SHA-256 and SHA-512/256
> algorithms. It adds
> required support for the "qop" option. It provides additional UAC and UAS
> procedures regarding usage of
> multiple SIP Authorization, WWW-Authenticate and Proxy-Authenticate heade=
r
> fields, including
> in which order to insert and process them. It provides guidance regarding
> forking. Finally, it
> updates the SIP protocol BNF as required by the updates."
>
> Feel free to modify, remove - or add if I have forgot something.
>
> All of this is specified later in section 2, but if this helps someone, I
do not mind adding this to section 2.


>
> In addition, I suggest to change the names of subsections 2.3 and 2.4.
>
> The current name of subsection 2.3 is "The Authenticate Response Header
> Field". But, there is no such header field described. The section talks
> about other header fields (with similar names). Could we simply call it
> "UAS behavior"?
>
> The current name of subsection 2.4 is "The Authorization Request Header
> Field". But, the section also talks about the WWW-Authenticate header
> field. Could we simply call it "UAC behavior"?
>
>
Sure. I can make these changes.

Regards,
 Rifaat




> Regards,
>
> Christer
>
>
>

--000000000000b29ab40589bbe0c3
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sat, May 25, 2019 at 3:36 PM Chris=
ter Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christer=
.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex">Hi,<br>
<br>
...=C2=A0<br>
<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Section 2.4:<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; &quot;When the UAC receives a response wit=
h multiple header fields with the<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0same realm it SHOULD use the t=
opmost header field that it supports,<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0unless a local policy dictates=
 otherwise.=E2=80=9D<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; Why a SHOULD? I would prefer a MUST.<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; I can do that, but the last part of this parag=
raph states that local policy can override this recommendations anyway.<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; So, does it make any difference?<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; Should we allow that? Why would local policy e=
nforce a downgrade?<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; =E2=80=9CWhen the UAC receives a 401 respo=
nse with multiple WWW-Authenticate<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0header fields with different r=
ealms it SHOULD retry and include an<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0Authorization header field con=
taining credentials that match the<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;=C2=A0 =C2=A0topmost header field of any on=
e of the realms.=E2=80=9D<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; If you are disallowing multiple Authorizat=
ion headers for the same realm,<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; but with different algorithms I think this=
 should be clearly written. In my<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;&gt; view, that would be a good thing.<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt;&gt; This is allowed.<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; RFC 3261 does not say anything about using the top=
most header, does it?<br>
&gt;&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt;&gt; I was referring to this document.<br>
&gt;&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt;&gt; So, the should-use-topmost is something new, defined i=
n this document?<br>
&gt;&gt;&gt;&gt;<br>
&gt;&gt;&gt;&gt; Yes, as per RFC7616.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; Perhaps then say &quot;As defined in RFC7617,....&quot;<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; And, perhaps mention it in section 2, where the changes are li=
sted.<br>
&gt;&gt;&gt;<br>
&gt;&gt;&gt; The normative text for SIP is specified in this document, so I=
 do not see the need to add such a sentence.<br>
&gt;&gt;<br>
&gt;&gt; When we update an RFC, it is good to have an overview about what t=
he updates are, so that people don&#39;t have to start reading 3261, 7617 <=
br>
&gt;&gt; and try to figure out themselves. They will obviously have to read=
 the RFCs to figure out the details, but it helps if they know what the upd=
ates <br>
&gt;&gt; are about.<br>
&gt;<br>
&gt; Section 2 is all about the changes introduced to the Digest mechanism.=
<br>
<br>
Yes, but that doesn&#39;t really say anything about what exactly is updated=
.<br>
<br>
&gt; If that is not sufficient, can you propose some text?<br>
=C2=A0<br>
Something like this:<br>
<br>
&quot;2.=C2=A0 Updates RFC 3261<br></blockquote><div><br></div><div>I do no=
t see the need for this change. The first page has &quot;Update: 3261&quot;=
 and the first sentence in section 2 explicitly states that again.</div><di=
v><br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
This section replaces the reference to RFC2617 with a reference to RFC7617 =
in RFC3261, and<br>
describes the modifications to the usage of the Digest mechanism in RFC3261=
 resulting from <br>
that reference update. It adds support for the SHA-256 and SHA-512/256 algo=
rithms. It adds<br>
required support for the &quot;qop&quot; option. It provides additional UAC=
 and UAS procedures regarding usage of<br>
multiple SIP Authorization, WWW-Authenticate and Proxy-Authenticate header =
fields, including <br>
in which order to insert and process them. It provides guidance regarding f=
orking. Finally, it<br>
updates the SIP protocol BNF as required by the updates.&quot;<br>
<br>
Feel free to modify, remove - or add if I have forgot something.<br>
<br></blockquote><div>All of this is specified later in section 2, but if t=
his helps someone, I do not mind adding this to section 2.</div><div>=C2=A0=
</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;b=
order-left:1px solid rgb(204,204,204);padding-left:1ex">
<br>
In addition, I suggest to change the names of subsections 2.3 and 2.4.<br>
<br>
The current name of subsection 2.3 is &quot;The Authenticate Response Heade=
r Field&quot;. But, there is no such header field described. The section ta=
lks about other header fields (with similar names). Could we simply call it=
 &quot;UAS behavior&quot;?<br>
<br>
The current name of subsection 2.4 is &quot;The Authorization Request Heade=
r Field&quot;. But, the section also talks about the WWW-Authenticate heade=
r field. Could we simply call it &quot;UAC behavior&quot;?<br>
<br></blockquote><div><br></div><div>Sure. I can make these changes.</div><=
div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div><div=
><br></div><div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"marg=
in:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1e=
x">
Regards,<br>
<br>
Christer<br>
<br>
<br>
</blockquote></div></div>

--000000000000b29ab40589bbe0c3--


From nobody Sat May 25 13:45:43 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 21634120025 for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 13:45:41 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id b4Vu7tD4GScF for <sipcore@ietfa.amsl.com>; Sat, 25 May 2019 13:45:38 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00046.outbound.protection.outlook.com [40.107.0.46]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9BB7612002E for <sipcore@ietf.org>; Sat, 25 May 2019 13:45:37 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=jP+puXh5DwYHQ7rAHkttSAcJT8ihEZN+VEmdF4K3Jb8=; b=ILBImIDILTG253lIQutoP/16vYgMCcpQxv1ETM3c2P2oz7hvCKU6XnEg3FzN9LaxLrUGOHHoe/ckPCQOwlSaahbzHpHLdCuRrc5KdsmXfXYgFca+I9bD+e3cSGtIv2FGDhxwDZf6b7cLoETwKRqqU7vgAPm06wPOiDMxA7S9peg=
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com (10.175.243.17) by VI1PR07MB5518.eurprd07.prod.outlook.com (20.178.14.84) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.10; Sat, 25 May 2019 20:45:32 +0000
Received: from VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61]) by VI1PR07MB3167.eurprd07.prod.outlook.com ([fe80::701a:45d2:1c1e:8c61%5]) with mapi id 15.20.1943.007; Sat, 25 May 2019 20:45:32 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: "Olle E. Johansson" <oej@edvina.net>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] draft-ietf-sipcore-digest-scheme comments
Thread-Index: AQHVDLXhQrBFZP79BUqVpCNPfRzS+KZxOB6AgAJLmwCAAqM3AIAFmuiAgABqJQD//9GFAIAASdoA///mjwCAADcSAP//z4EAAAjRmAD//9a0AIAAPLWA
Date: Sat, 25 May 2019 20:45:31 +0000
Message-ID: <7E961045-89BB-4A49-9B4E-B18F2344AC69@ericsson.com>
References: <DE595AFF-5DEA-4A32-8527-10B841D6C7C1@edvina.net> <CAGL6epLMHoneH6PNgeF5TgJhveh-xWeZSW6XQDBB2Gf5mS9eRQ@mail.gmail.com> <C1431DCD-C4DD-4BFA-9C5D-E4DFE7B0F2DA@edvina.net> <B4A08741-A092-480C-AE12-2DD25D7835D0@ericsson.com> <CAGL6epJTv+Dytk_VHNi4Sk0mimVj=cMqWR4u9uSg1q+RcUQJ_Q@mail.gmail.com> <98D9E38D-4EA3-4F55-B37D-5334FA42F362@ericsson.com> <CAGL6epL7y0jiOqBdt3UOkx31ueQofh-W8vPwjvOUZhHZsaDq3A@mail.gmail.com> <2BD32E4F-AA3F-4C61-BE9F-037353FA4083@ericsson.com> <CAGL6ep+F4Wj6uQMyLttvRaTDmROg=J8__6nwkeCNHgJTR1db_A@mail.gmail.com> <74E1C0B9-8DBE-4301-998F-66A8329CB408@ericsson.com> <CAGL6epJUBoFPWsdzYu6bKx9qVLr20btLDQ3R7DwpvxbD-CQ7dQ@mail.gmail.com> <5671B78F-88CE-4528-B2C9-3B92AA2752A1@ericsson.com> <CAGL6epLb7GTKT3kExc-vta6h2Pym=PW=20vL-JSK6B77j9VthQ@mail.gmail.com>
In-Reply-To: <CAGL6epLb7GTKT3kExc-vta6h2Pym=PW=20vL-JSK6B77j9VthQ@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [178.55.236.10]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 58d44e80-c326-4d55-6395-08d6e151edfb
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:VI1PR07MB5518; 
x-ms-traffictypediagnostic: VI1PR07MB5518:
x-microsoft-antispam-prvs: <VI1PR07MB551897ABACB3C55AB4D8D3AC93030@VI1PR07MB5518.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0048BCF4DA
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(979002)(366004)(39860400002)(346002)(376002)(136003)(396003)(18543002)(199004)(189003)(6916009)(4326008)(7736002)(186003)(66066001)(6512007)(25786009)(6506007)(36756003)(68736007)(229853002)(26005)(446003)(3846002)(11346002)(6116002)(14444005)(256004)(33656002)(99286004)(82746002)(486006)(476003)(44832011)(2616005)(71200400001)(76176011)(6246003)(53936002)(83716004)(71190400001)(6486002)(64756008)(66476007)(66556008)(66446008)(8936002)(8676002)(81156014)(81166006)(6436002)(54906003)(58126008)(14454004)(66946007)(316002)(91956017)(76116006)(73956011)(478600001)(5660300002)(102836004)(2906002)(86362001)(305945005)(969003)(989001)(999001)(1009001)(1019001); DIR:OUT; SFP:1101; SCL:1; SRVR:VI1PR07MB5518; H:VI1PR07MB3167.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: oRkhj4YF9JONJZvY9LFB0OR5bAb9yNizwV8j2WAMjUzX8U0vuLV2tgLY7PY3RIHtSEVZyhc7P9g4nlTNm8XZzIwPR6Zie6YCn+1YHLmzJxLK6Gy0dC04UYWkaMMcC8mSrDIdg9+B6S3WyBeBFgvPO1Yiv5hJSBXRQEaFRLvpBQVwMo3NQakFzxkjDfuyCHAtekswOrwkQGRxxrBe5V4ea4RQ4ru4T6TXu8VfmcGOB2ZbXhmG17YT2ArJk93has25/nBLDbercZS8kFu10vyJKoChZv7EQE5AVQw926qBKBXd/EHsaRRjjkqB4wqTK4bK4EeyAVV5BPcvAXdFZwWjdGN9BOjzkSpZSlI6dcf25ZyM3LPHVCyTQo1OWrvCepoLiuWMv0sNVBNaeLrgZdE1dTXTVrQ1lGdqyp7Z+winPIs=
Content-Type: text/plain; charset="utf-8"
Content-ID: <3D770E24FA0C0D43AB3329C1F6CFEE35@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 58d44e80-c326-4d55-6395-08d6e151edfb
X-MS-Exchange-CrossTenant-originalarrivaltime: 25 May 2019 20:45:31.9130 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI1PR07MB5518
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/U88R27utxCBgJOVkt59vRR6TGLI>
Subject: Re: [sipcore] draft-ietf-sipcore-digest-scheme comments
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 25 May 2019 20:45:41 -0000
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From nobody Sun May 26 04:35:47 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 0E84E120048; Sun, 26 May 2019 04:35:38 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155887053797.18445.6083693595030099124@ietfa.amsl.com>
Date: Sun, 26 May 2019 04:35:38 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/mtnS8INzGl0RUWSOSN-lSHGQQvM>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 11:35:38 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : The Session Initiation Protocol (SIP) Digest Authentication Scheme
        Author          : Rifaat Shekh-Yusef
	Filename        : draft-ietf-sipcore-digest-scheme-03.txt
	Pages           : 8
	Date            : 2019-05-26

Abstract:
   This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for more secure
   digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
   broken MD5 algorithm.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-03

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-03


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Sun May 26 04:42:00 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0ACBF120124; Sun, 26 May 2019 04:42:00 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id WBsBdRPctitU; Sun, 26 May 2019 04:41:58 -0700 (PDT)
Received: from mail-io1-xd2f.google.com (mail-io1-xd2f.google.com [IPv6:2607:f8b0:4864:20::d2f]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 051EC120048; Sun, 26 May 2019 04:41:58 -0700 (PDT)
Received: by mail-io1-xd2f.google.com with SMTP id r185so6261823iod.6; Sun, 26 May 2019 04:41:57 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=O0N7ZF2SvtHh4LpiyhST+IXB3U/RuBk/rgxSWaCxRqI=; b=Xos/0t+Znt3PTdnmWpnW3+/fQ8UfwHHUOH9azhILObl/oHBrpk5Zdz8DRGZIHfNVkj V7je1FIBLcl9iVdgJPpLmyjWUChAa8H3jf4x6MUiQPDQQYOab9iDcHuKzWP44CCgTeAi vlg9tsc50zvOJ0da0heGPktKecF7tV9mub/162wAmykSjCa566LPKHwvOVoil1aWSJVO vt0KTrv43lGl/KE7DPnZGF7Q1VtCHQMdpiESxQJOlqeRiIo8Y8xMSyzJKkLYnYOqCDWk bcq0bVyGcbTud3pY6CT1M1fcwC39ICCf1VsqKOqBmRRwjr31N0Lp46yurocORWtvo50f r/6w==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=O0N7ZF2SvtHh4LpiyhST+IXB3U/RuBk/rgxSWaCxRqI=; b=BRqVSP0cH60RpwcVkJvPmcTRb0egOzbwkE30fNd0uWLMNBbV8TGv+nNKpFnzptzBos a31GOXlpZmnsDVGBpVCXg1N6IdSX+fESPUnQ8qrGdAhlM6Ygi5nyC3gyXrNIeD39qzCA j1fCfgOziQTfaK5p8aLvDD6h1KwoocgoMPcp/+Evx3Q9UQBNfl4lkWJi3na+ZaDXhvfS CLFWd8SL89n7J3ebCGYVtjO0Nj1eTJS/BFaYQFFoKZ07DTKFXtv04MOipbMr/UsNQa0t JS911uxQBYou8Enp6b3K7Qfpns3BlOMONR8h6oO/cORnq2+oPulayLEPY//YPhFs+Npw IE8g==
X-Gm-Message-State: APjAAAWgtAPoe+qv2Oj6yXe735u3Qrp9JbFvPWi8lOUxhV/f8PZuo2PS QG4EUudzvT/Pbbcjqm4+UFNm0YtI4rDwLdBx2gr5eQ==
X-Google-Smtp-Source: APXvYqw1ep7C6WJM6HhKgAvpD677AZ+yW9k24UiEbRoRVBSO87+DO+de0pEBvlNcKcmmAKWTmVHlkJRTvbiTboXVtXQ=
X-Received: by 2002:a6b:9306:: with SMTP id v6mr44265431iod.278.1558870917012;  Sun, 26 May 2019 04:41:57 -0700 (PDT)
MIME-Version: 1.0
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com>
In-Reply-To: <155887053797.18445.6083693595030099124@ietfa.amsl.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 26 May 2019 07:41:46 -0400
Message-ID: <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com>
To: SIPCORE <sipcore@ietf.org>
Cc: i-d-announce@ietf.org
Content-Type: multipart/alternative; boundary="00000000000042656b0589c8ebfd"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/TPt2wQT6lf2lSRUUfq0P2ZV2CtU>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 11:42:00 -0000

--00000000000042656b0589c8ebfd
Content-Type: text/plain; charset="UTF-8"

Hi,

I appreciate all the feedback and comments.

I believe that with this version of the document I have addressed all the
comments provided so far.
Please, take a look and let me know if I missed anything or if you have any
further comments.

Regards,
 Rifaat


On Sun, May 26, 2019 at 7:36 AM <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : The Session Initiation Protocol (SIP) Digest
> Authentication Scheme
>         Author          : Rifaat Shekh-Yusef
>         Filename        : draft-ietf-sipcore-digest-scheme-03.txt
>         Pages           : 8
>         Date            : 2019-05-26
>
> Abstract:
>    This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for more secure
>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>    broken MD5 algorithm.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-03
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-03
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--00000000000042656b0589c8ebfd
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">Hi,<div><br></div><div>I appreciate all the feedback and c=
omments.</div><div><br></div><div>I believe that with this version of the d=
ocument I have addressed all the comments provided so far.</div><div>Please=
, take=C2=A0a look and let me know if I missed anything or if you have any =
further comments.</div><div><br></div><div>Regards,</div><div>=C2=A0Rifaat<=
/div><div><br></div></div><br><div class=3D"gmail_quote"><div dir=3D"ltr" c=
lass=3D"gmail_attr">On Sun, May 26, 2019 at 7:36 AM &lt;<a href=3D"mailto:i=
nternet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt; wrote:<br></div><=
blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-l=
eft:1px solid rgb(204,204,204);padding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-scheme-03.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-26<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-sipcore-digest-scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-iet=
f-sipcore-digest-scheme-03</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-03" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/html/draft-ietf-sipcore-digest-scheme-03</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-03" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?=
url2=3Ddraft-ietf-sipcore-digest-scheme-03</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>

--00000000000042656b0589c8ebfd--


From nobody Sun May 26 09:49:37 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 81B071200B8; Sun, 26 May 2019 09:49:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, RCVD_IN_MSPIKE_H2=-0.001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id dOPPN4XqzBZq; Sun, 26 May 2019 09:49:32 -0700 (PDT)
Received: from EUR01-DB5-obe.outbound.protection.outlook.com (mail-eopbgr150081.outbound.protection.outlook.com [40.107.15.81]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id EFE51120019; Sun, 26 May 2019 09:49:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=nbUgi6GF0Oh0Yt1tMzNOqxRuFL1XUhzt9KTagZMPy34=; b=ZyqJufoQ+szONjDbS/Eg5WKspQInaCeTrVG5YMACKnLN6/3590n5OE9MQeStXHhX0EHbbiUFq19tb05rjs+IyPyhaa9Pv12dpy45mIR9lq1fY5exTUOYwu9BK+OnYB0Nrjd7jPDayrKDLrjV3qGDq5JKwxhUZM0Gt/iCyXdtQcs=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB4154.eurprd07.prod.outlook.com (20.176.166.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.14; Sun, 26 May 2019 16:49:28 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.007; Sun, 26 May 2019 16:49:28 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, SIPCORE <sipcore@ietf.org>
CC: "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
Thread-Index: AQHVE7dImJkfUMsPQ0+K+QEMPiW/TaZ9SI8AgACIQQA=
Date: Sun, 26 May 2019 16:49:28 +0000
Message-ID: <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com>
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com>
In-Reply-To: <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [176.93.104.5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 6788d0c7-38b5-489c-6606-08d6e1fa1e67
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB4154; 
x-ms-traffictypediagnostic: HE1PR07MB4154:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <HE1PR07MB41547DCFEB96411E5E8DB553931C0@HE1PR07MB4154.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:7691;
x-forefront-prvs: 0049B3F387
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(396003)(366004)(136003)(376002)(346002)(39860400002)(18543002)(199004)(189003)(6436002)(36756003)(6486002)(6512007)(316002)(58126008)(236005)(606006)(54896002)(83716004)(110136005)(71200400001)(256004)(6306002)(446003)(71190400001)(53546011)(14444005)(102836004)(99286004)(11346002)(73956011)(76116006)(5660300002)(6506007)(66946007)(186003)(66066001)(25786009)(66446008)(64756008)(66556008)(66476007)(86362001)(76176011)(26005)(229853002)(68736007)(82746002)(33656002)(44832011)(966005)(3846002)(6116002)(4326008)(14454004)(478600001)(2906002)(8676002)(476003)(53936002)(66574012)(486006)(81166006)(2616005)(81156014)(8936002)(53386004)(6246003)(7736002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB4154; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: U0c1zYgQLFDRuX6eU170d2qfyI29v+WdlGIfODDpB7al6NrFfcFQ92syfQTpPZfSROqh/0kUFNmIT6rqZXAPWI4OvwbRUfdDKtxXiwrsL1ewsWIikuLwnd+j1LxWEDhmPqTVbeu97/LvmzbTNQjGN6zEOg8iq3fxG4fDh3+YUh6tQKSsKA6RzmaXfVLVsYZH4I9LuDSHp5hRcWqCAi4K2s9e7t7wlLyuFWlEDEx85U3/i9oHNn+gGmZic2vVhzVpCOUk1iWbKbDAaQA0oOU82j2NMQQMwkMB7JepEjQosBuTklp63b6A/k8AzEu5gITYeA+kLdUs8NOhaoNH0a7PxPnkjB8pBfo/5aCHsSD+sHTnx4GK5KeDvz07oxP1kT0wBnLeDu+kbcodFzWbhB+5c7SCeCCjcj7uS0sEAAQh4b4=
Content-Type: multipart/alternative; boundary="_000_8462F405E6EC4ABF8C8D89A2BBE58E86ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 6788d0c7-38b5-489c-6606-08d6e1fa1e67
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 May 2019 16:49:28.5871 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB4154
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/gtKPE-aXr5CsqTSXKy61h3hCewU>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 16:49:36 -0000

--_000_8462F405E6EC4ABF8C8D89A2BBE58E86ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_8462F405E6EC4ABF8C8D89A2BBE58E86ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <5B12845692754145B9FE248879F6CB97@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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==

--_000_8462F405E6EC4ABF8C8D89A2BBE58E86ericssoncom_--


From nobody Sun May 26 11:51:29 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 525271200E6; Sun, 26 May 2019 11:51:28 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OJLrCoBdniH9; Sun, 26 May 2019 11:51:25 -0700 (PDT)
Received: from mail-io1-xd33.google.com (mail-io1-xd33.google.com [IPv6:2607:f8b0:4864:20::d33]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id AF8971200B2; Sun, 26 May 2019 11:51:25 -0700 (PDT)
Received: by mail-io1-xd33.google.com with SMTP id e5so2608380iok.4; Sun, 26 May 2019 11:51:25 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=aNyRqzRhXlkfQEIoWYUI6VhjMeMdJh5oQSRPNs61r6U=; b=qP2Ik5ZkMDyNoJAHOf0Ox7G91i4RpWHTqYbF3NwaMf2RY2Y1krn1daIkmhuZrEKgZz HVZRxR88xZB0Oqw1dT/0ZskodDQBGSRcTeMBwM8ofZmWy1Ycp6wpQf+DU06nF/kE3KxL 2OGo1llPTShk+tjlm+XRT0IJo13mPpX/0xfYdKufR/cNfCydG4uJJWXtaErZuckB2GNO g6mQJMz81Wa1OdNtfamyPeWEguttiRXmsjhsT1s6G4azrV9nBYo56fr1FvhtqVizWLdf yReUdGW2QFPh1wnd8ITtfCHmq09O6TMBbyWxLW97WCjsx5QlACHKyG/SGN4geB9Gk0kZ /imw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=aNyRqzRhXlkfQEIoWYUI6VhjMeMdJh5oQSRPNs61r6U=; b=a9VF/pqTbCvsdJuk2PCxzL7+JBxoYM2/HryBywIEZA2U9H8FyNeiYFCzBXKzaytqL1 Wy+BpZx+LLE4ffQ2W8IQq/+3p0wXH5lkMLwn66WXShr4cW8nI5TyibqhlVNwlYmLGc4y dPhnbI3CwHE8c2mh3R2uc0WtyrwQjtE94piv3KZYVwFfvLewR3ZKWelgqwFNjKZ2j4QJ xWaxpZSlHTg83LH4xQHIQ3My14ADVv/vWHGI0Qw0XHhdzSsZKmvGvIx1BCwZEzqP7M8P hF+EJ/dhL7Q+BY1bMIwfLMYLpKYNrAbKHViijaQcBb9TvEoZH+6vBOQbxAR9QnjSCLb+ cVbQ==
X-Gm-Message-State: APjAAAX3RB/pfoj2TEyo3uVOJNULJZJ0GhmMfko2eGxX8F108khG/gqo vvLgJwVRPYdhrlS+K4I2HoOvZWvjdrDY/gvu1hs=
X-Google-Smtp-Source: APXvYqyWWF9iWVxYi1oe/RNXqFO9L+XtWr5gphMXBpge3d/p0rMF/wVpw1hZesuejBcUlHqx+wE6uJMCxgKuV71MbZM=
X-Received: by 2002:a5d:8e0c:: with SMTP id e12mr20713569iod.31.1558896685051;  Sun, 26 May 2019 11:51:25 -0700 (PDT)
MIME-Version: 1.0
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com>
In-Reply-To: <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 26 May 2019 14:51:13 -0400
Message-ID: <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: SIPCORE <sipcore@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000027717c0589ceeba9"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/AMdUxiS0lI3hLjw2XkwHMYpsKLk>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 18:51:28 -0000

--00000000000027717c0589ceeba9
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sun, May 26, 2019 at 12:49 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
>
>
> Technically it looks good, but I still have some comments (mostly
> editorial).
>
>
>
> Q1:
>
>
>
> Section 2.3 says:
>
>
>
> =E2=80=9CWhen a UAS receives a request from a UAC, and an acceptable Auth=
orization
> header field is not sent,=E2=80=A6=E2=80=9D
>
>
>
> s/sent/received
>
>
>
Ok


>
>
> Q2:
>
>
>
> In section 2.3, the text says both =E2=80=9Cadd header fields=E2=80=9D an=
d =E2=80=9Cinclude header
> fields=E2=80=9D. Please use consistent terminology.
>
>
>
> (This comment may apply to other sections too, so please double check).
>
> Ok


>
>
>
>
> Q3:
>
>
>
> Section 2.4 says:
>
>
>
> =E2=80=9CWhen the UAC receives a response with multiple header fields=E2=
=80=A6=E2=80=9D
>
>
>
> Please add the name of the header fields you are referring to.
>
> Ok


>
>
>
>
> Q4:
>
>
>
> Section 2.4 says:
>
>
>
> =E2=80=9CIf the UAC cannot respond to any of the challenges in the respon=
se,
>
> then it should abandon attempts to send the request; e.g., if the UAC
>
> does not have credentials for any of the realms.=E2=80=9D
>
>
>
> What if it is a mid-dialog request, e.g., a BYE? If the actions taken by
> the UAC are based on local policy, it would be good to say so.
>
>
Is this a real use case?
If the UAC was able to establish a call then it must already have the
needed credentials and should be able to terminate the call.



>
>
> Why =E2=80=9Cshould=E2=80=9D with small letters?
>
>
>
I will change to SHOULD.



>
>
> Q5:
>
>
>
> I suggest a =E2=80=9C2.X Reference Update=E2=80=9D section, that explicit=
ly says that the
> reference to RFC2617 is replaced to a a reference to RFC7617.
>
>
>
> I know it is mentioned in Section 2, but the subsections define the actua=
l
> updates.
>
>
>

Is this really necessary?

Regards,
 Rifaat



>
>
> Regards,
>
>
>
> Christer
>
>
>
>
>
>
>
>
>
>
>
> *From: *sipcore <sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Sunday, 26 May 2019 at 14.42
> *To: *"sipcore@ietf.org" <sipcore@ietf.org>
> *Cc: *"i-d-announce@ietf.org" <i-d-announce@ietf.org>
> *Subject: *Re: [sipcore] I-D Action:
> draft-ietf-sipcore-digest-scheme-03.txt
>
>
>
> Hi,
>
>
>
> I appreciate all the feedback and comments.
>
>
>
> I believe that with this version of the document I have addressed all the
> comments provided so far.
>
> Please, take a look and let me know if I missed anything or if you have
> any further comments.
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
> On Sun, May 26, 2019 at 7:36 AM <internet-drafts@ietf.org> wrote:
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : The Session Initiation Protocol (SIP) Digest
> Authentication Scheme
>         Author          : Rifaat Shekh-Yusef
>         Filename        : draft-ietf-sipcore-digest-scheme-03.txt
>         Pages           : 8
>         Date            : 2019-05-26
>
> Abstract:
>    This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for more secure
>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>    broken MD5 algorithm.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-03
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-03
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>

--00000000000027717c0589ceeba9
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sun, May 26, 2019 at 12:49 PM Chri=
ster Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christe=
r.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex">





<div lang=3D"FI">
<div class=3D"gmail-m_7063048041581662793WordSection1">
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Technically it looks good, but =
I still have some comments (mostly editorial).<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Q1:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Section 2.3 says:<u></u><u></u>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=E2=80=9CWhen a UAS receives a =
request from a UAC, and an acceptable Authorization header field is not sen=
t,=E2=80=A6=E2=80=9D<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">s/sent/received<u></u><u></u></=
span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0</span></p></div><=
/div></blockquote><div>Ok</div><div>=C2=A0</div><blockquote class=3D"gmail_=
quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,=
204);padding-left:1ex"><div lang=3D"FI"><div class=3D"gmail-m_7063048041581=
662793WordSection1"><p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Q2:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">In section 2.3, the text says b=
oth =E2=80=9Cadd header fields=E2=80=9D and =E2=80=9Cinclude header fields=
=E2=80=9D. Please use consistent terminology.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">(This comment may apply to othe=
r sections too, so please double check).<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u></span></p></div></div><=
/blockquote><div>Ok</div><div>=C2=A0</div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex"><div lang=3D"FI"><div class=3D"gmail-m_7063048041581662793=
WordSection1"><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Q3:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Section 2.4 says:<u></u><u></u>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=E2=80=9CWhen the UAC receives =
a response with multiple header fields=E2=80=A6=E2=80=9D<u></u><u></u></spa=
n></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Please add the name of the head=
er fields you are referring to.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u></span></p></div></div><=
/blockquote><div>Ok</div><div>=C2=A0</div><blockquote class=3D"gmail_quote"=
 style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);p=
adding-left:1ex"><div lang=3D"FI"><div class=3D"gmail-m_7063048041581662793=
WordSection1"><p class=3D"MsoNormal"><span lang=3D"EN-US">=C2=A0<u></u></sp=
an></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Q4:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Section 2.4 says:<u></u><u></u>=
</span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">=E2=80=9CIf the UAC cannot resp=
ond to any of the challenges in the response,<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">then it should abandon attempts=
 to send the request; e.g., if the UAC<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">does not have credentials for a=
ny of the realms.=E2=80=9D<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">What if it is a mid-dialog requ=
est, e.g., a BYE? If the actions taken by the UAC are based on local policy=
, it would be good to say so.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u></span></p></div></div><=
/blockquote><div><br></div><div>Is this a real use case?</div><div>If the U=
AC was able to establish a call then it must already have the needed creden=
tials and should be able to terminate the call.</div><div><br></div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div lang=3D"=
FI"><div class=3D"gmail-m_7063048041581662793WordSection1"><p class=3D"MsoN=
ormal"><span lang=3D"EN-US">=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Why =E2=80=9Cshould=E2=80=9D wi=
th small letters?<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0</span></p></div><=
/div></blockquote><div>I will change to SHOULD.</div><div><br></div><div>=
=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div lang=3D"=
FI"><div class=3D"gmail-m_7063048041581662793WordSection1"><p class=3D"MsoN=
ormal"><span lang=3D"EN-US"><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Q5:<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I suggest a =E2=80=9C2.X Refere=
nce Update=E2=80=9D section, that explicitly says that the reference to RFC=
2617 is replaced to a a reference to RFC7617.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">I know it is mentioned in Secti=
on 2, but the subsections define the actual updates.<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0</span></p></div><=
/div></blockquote><div><br></div><div>Is this really necessary?</div><div><=
br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div><div>=C2=
=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8e=
x;border-left:1px solid rgb(204,204,204);padding-left:1ex"><div lang=3D"FI"=
><div class=3D"gmail-m_7063048041581662793WordSection1"><p class=3D"MsoNorm=
al"><span lang=3D"EN-US"><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Regards,<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">Christer<u></u><u></u></span></=
p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From: =
</span></b><span style=3D"font-size:12pt;color:black">sipcore &lt;<a href=
=3D"mailto:sipcore-bounces@ietf.org" target=3D"_blank">sipcore-bounces@ietf=
.org</a>&gt; on behalf of Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.i=
etf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Date: </b>Sunday, 26 May 2019 at 14.42<br>
<b>To: </b>&quot;<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipc=
ore@ietf.org</a>&quot; &lt;<a href=3D"mailto:sipcore@ietf.org" target=3D"_b=
lank">sipcore@ietf.org</a>&gt;<br>
<b>Cc: </b>&quot;<a href=3D"mailto:i-d-announce@ietf.org" target=3D"_blank"=
>i-d-announce@ietf.org</a>&quot; &lt;<a href=3D"mailto:i-d-announce@ietf.or=
g" target=3D"_blank">i-d-announce@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-=
03.txt<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Hi, <u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I appreciate all the feedback and comments.<u></u><u=
></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">I believe that with this version of the document I h=
ave addressed all the comments provided so far.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Please, take=C2=A0a look and let me know if I missed=
 anything or if you have any further comments.<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">Regards,<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal">=C2=A0Rifaat<u></u><u></u></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Sun, May 26, 2019 at 7:36 AM &lt;<a href=3D"mailt=
o:internet-drafts@ietf.org" target=3D"_blank">internet-drafts@ietf.org</a>&=
gt; wrote:<u></u><u></u></p>
</div>
<blockquote style=3D"border-top:none;border-right:none;border-bottom:none;b=
order-left:1pt solid rgb(204,204,204);padding:0cm 0cm 0cm 6pt;margin-left:4=
.8pt;margin-right:0cm">
<p class=3D"MsoNormal"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-scheme-03.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-26<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sipcore-d=
igest-scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03"=
 target=3D"_blank">https://tools.ietf.org/html/draft-ietf-sipcore-digest-sc=
heme-03</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-03" target=3D"_blank">https://datatracker.ietf.org/doc/html/draft-ie=
tf-sipcore-digest-scheme-03</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-03" target=3D"_blank">https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-s=
ipcore-digest-scheme-03</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" target=3D"_blank">
tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank"=
>https://www.ietf.org/mailman/listinfo/sipcore</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>

</blockquote></div></div>

--00000000000027717c0589ceeba9--


From nobody Sun May 26 12:08:28 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 68516120112; Sun, 26 May 2019 12:08:26 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tQlEURAZwpJe; Sun, 26 May 2019 12:08:23 -0700 (PDT)
Received: from EUR04-HE1-obe.outbound.protection.outlook.com (mail-eopbgr70054.outbound.protection.outlook.com [40.107.7.54]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 81066120104; Sun, 26 May 2019 12:08:23 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=Y/yDJkEPL7W1T2H2oaBA7dHt64Qk6QXeb9QrKWwoNNQ=; b=paPhQO6d3qp8n9TiW2xB9D0PXYB0an84Ku56nM4FqHdkQKQGROHneCQ0u7bAsD56VqzVTMntnOt/AWcIA3JnljNWBxCNBlkpHQpeX0E3UUNVCoCjOZtzcK4QSw3UgbHJgj9V2u/M25v5w3ittT0fCOR2za+r27gCN71pX+IVtYw=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3180.eurprd07.prod.outlook.com (10.170.245.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1922.13; Sun, 26 May 2019 19:08:18 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.007; Sun, 26 May 2019 19:08:18 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: SIPCORE <sipcore@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
Thread-Index: AQHVE7dImJkfUMsPQ0+K+QEMPiW/TaZ9SI8AgACIQQD//++8gIAANw+A
Date: Sun, 26 May 2019 19:08:18 +0000
Message-ID: <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com>
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com> <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com>
In-Reply-To: <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [176.93.104.5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2c6154ff-f0c8-4874-99e4-08d6e20d8352
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB3180; 
x-ms-traffictypediagnostic: HE1PR07MB3180:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <HE1PR07MB31804730008FFD0FA1E972B6931C0@HE1PR07MB3180.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0049B3F387
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(39860400002)(396003)(366004)(136003)(18543002)(189003)(199004)(316002)(71190400001)(66066001)(33656002)(229853002)(54906003)(36756003)(58126008)(14454004)(66574012)(256004)(966005)(6436002)(14444005)(476003)(6486002)(4326008)(25786009)(478600001)(26005)(6916009)(8936002)(102836004)(81166006)(81156014)(99286004)(83716004)(446003)(66446008)(66476007)(73956011)(64756008)(66556008)(3846002)(6116002)(2906002)(44832011)(68736007)(486006)(76116006)(5660300002)(6512007)(53936002)(8676002)(71200400001)(6306002)(11346002)(2616005)(305945005)(7736002)(53546011)(86362001)(76176011)(66946007)(82746002)(6246003)(186003)(6506007); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3180; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 6U9055bJsxMFjMzV2T8rO8svlqxrqTET2lyA5/DTd/g+MvbM7YhBMG1lRhVsUiOo39FK8WiJapuTNh5xbtj9WuD+MrdvXa055hYcCsZpC2IZ/N/SkT5G5k9t50tMbY0TCqn4ggoxj8nmh6FGoMjsK+cXYmVCavh7z9FYN6U0vJ4wykTaYzXpP6Bytd6MROU+ft+FZ9wAh8SGr4Z9PWviJJ6qRh5BT9l1GxtQNkcMCLE6YuGO+FTxIOyMMcTKTGndGhN5GuJEsqWKidLg//5+Fzr7Db11nvr/wf9Yr0KSzFSgCfYex0orVJr7aiK6MBMXrYRG92o8jpTynr/PD5snhWQhRHdy/E5zFSOzJnlLRaSTbTzrWW0yWEfFNrvpFmb19T/CuBLqltt+QJRPuujE9WK7xH4ssqlVEmXpTuZsDvw=
Content-Type: text/plain; charset="utf-8"
Content-ID: <B73ECD9E5D30A94A889FA9568F75ACF4@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2c6154ff-f0c8-4874-99e4-08d6e20d8352
X-MS-Exchange-CrossTenant-originalarrivaltime: 26 May 2019 19:08:18.3915 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3180
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/CGzcw9ps4wi9PwbIHwBanvJwVjQ>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 19:08:27 -0000
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From nobody Sun May 26 13:08:48 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0201C120116; Sun, 26 May 2019 13:08:46 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id qWkDqH0S44vW; Sun, 26 May 2019 13:08:43 -0700 (PDT)
Received: from mail-io1-xd30.google.com (mail-io1-xd30.google.com [IPv6:2607:f8b0:4864:20::d30]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id F3D251200B6; Sun, 26 May 2019 13:08:42 -0700 (PDT)
Received: by mail-io1-xd30.google.com with SMTP id n5so5523006ioc.7; Sun, 26 May 2019 13:08:42 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=uNW16myFf+P9ZlpzmF9oqYUJVss40VuATgrtzDPHGks=; b=HA1D61WXh67+BamqcGLSlcx6nQum43gcUt6EH6fbJ4yJn9q6uoJYTE+tCbHpMyM/6k ztGt/ajM7hVl117QHflc0gSTAYic1hzS68lGX+9+R2UVZUo7c2wwZAt/Q/AZNDLCnldN 5OIZom8fhWwno7BJKz+FQrSlCWI7LCIszPuoNqtyQwzNnp3YtNEaI2h/N874eozyIbyg c98HVEV5qyk8f4fddw+5a+dvuMxPyDTqWRVa2CP8lNQM+4QEj66nyCIIXJxnv3zLTR0s kcxGqaL2Fdul2SVQyLCbpF14bhVeIoSbDWEtY0Pnxf+ecMERu5yBt1mGE/a96uKG9MaT 7Kig==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=uNW16myFf+P9ZlpzmF9oqYUJVss40VuATgrtzDPHGks=; b=TSIA+WAZqnoF8+rzDyWsopeJpB7QZqUtetvpBA2bZJXWn/OgkshrZ8trN5Op48BorR sFqgnlf1pJLPePemJUH9Iy5AU7pfTa4b/2Q8Yqc1Dr/YEM6qnX1UhU+eo5THkJSidGHj 0rJt91SE1YiP8OsYy+Nb7l1Kq7rGByDB+SyGbiRiE3JeNI7kJAJ1gbeB+ndLwZS+JexP t/3wk3RS9wytyMF1mfg8Bdw+YY1HnJBoz3wPnsbUIN96AKkmF88f5PFhfFETlNp+XFKn gRUjpBk5cqp2laoKMZavIPOGb6F1gfjaUjk6wQO34OUeOSVUUiwLpZ0iulPVSxXjQuVq paAA==
X-Gm-Message-State: APjAAAXl4Wt4rXNNtcV8GE6W/hOLfSiVxkNC1JVVI8aXehtEELMFdt/N S/+UWgt0qXQjaZUqcrzcsSNfhzeGbLhZtC9ky2c=
X-Google-Smtp-Source: APXvYqyQB7YTjMmPoFxeAwxGOvFDj3N7GQ0OaN3Ooy6PszU069h3XaGx+ZQwyW+Ur/bnkLAx1cF4Lbzaf949OZtz52g=
X-Received: by 2002:a6b:9257:: with SMTP id u84mr408776iod.278.1558901322175;  Sun, 26 May 2019 13:08:42 -0700 (PDT)
MIME-Version: 1.0
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com> <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com> <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com>
In-Reply-To: <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 26 May 2019 16:08:30 -0400
Message-ID: <CAGL6epLOOOoKBZwk893dZ585_V20ZR+F3FM3PAjegpAHuAhmaQ@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: SIPCORE <sipcore@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008c57de0589cfff8b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/9bLIIzHMdIHVwrclAvnMs1uQCP4>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 20:08:46 -0000

--0000000000008c57de0589cfff8b
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sun, May 26, 2019 at 3:08 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
> ...
>
> Q4:
>
> >> Section 2.4 says:
> >>
> >> =E2=80=9CIf the UAC cannot respond to any of the challenges in the res=
ponse,
> >> then it should abandon attempts to send the request; e.g., if the UAC
> >> does not have credentials for any of the realms.=E2=80=9D
> >>
> >> What if it is a mid-dialog request, e.g., a BYE? If the actions taken
> by the UAC are based on local policy, it would be good to say so.
> >
> > Is this a real use case?
> > If the UAC was able to establish a call then it must already have the
> needed credentials and should be able to terminate the call.
>
> It is allowed to challenge a mid-dialog request. Whether it's allowed to
> require new credentials mid-dialog I don't know. Does 3261 define any
> restrictions?
>
> If the spec allows things to take place people may define test cases for
> it, and then there needs to be SOME guidance on what to do.
>

I do not see the use case, but I will add the following at the end of the
above sentence: "unless a local policy dictates otherwise".


> >Why =E2=80=9Cshould=E2=80=9D with small letters?
> >
> >I will change to SHOULD.
>
> Which would mean that it is allowed to send the request in certain
> situations.
>
> ---
>
> Q5:
>
> >> I suggest a =E2=80=9C2.X Reference Update=E2=80=9D section, that expli=
citly says that
> the reference to RFC2617 is replaced to a a reference to RFC7617.
> >>
> >>I know it is mentioned in Section 2, but the subsections define the
> actual updates.
> >
> > Is this really necessary?
>
> I was thinking quite a bit about it. I think it needs to be clear - but I
> guess there can be different opinions on how to make it clear enough.
>
>
I do not think that a sub-section is needed in this case.
But I do not have a strong opinion and can go either way.
Do others have an opinion on this?

Regards,
 Rifaat




> Regards,
>
> Christer
>
>
>
>
>
>
>
>
>
> From: sipcore <mailto:sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <mailto:rifaat.ietf@gmail.com>
> Date: Sunday, 26 May 2019 at 14.42
> To: "mailto:sipcore@ietf.org" <mailto:sipcore@ietf.org>
> Cc: "mailto:i-d-announce@ietf.org" <mailto:i-d-announce@ietf.org>
> Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.tx=
t
>
> Hi,
>
> I appreciate all the feedback and comments.
>
> I believe that with this version of the document I have addressed all the
> comments provided so far.
> Please, take a look and let me know if I missed anything or if you have
> any further comments.
>
> Regards,
>  Rifaat
>
>
> On Sun, May 26, 2019 at 7:36 AM <mailto:internet-drafts@ietf.org> wrote:
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : The Session Initiation Protocol (SIP) Digest
> Authentication Scheme
>         Author          : Rifaat Shekh-Yusef
>         Filename        : draft-ietf-sipcore-digest-scheme-03.txt
>         Pages           : 8
>         Date            : 2019-05-26
>
> Abstract:
>    This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for more secure
>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>    broken MD5 algorithm.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-03
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-03
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at http://tools.ietf.or=
g
> .
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> mailto:sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>

--0000000000008c57de0589cfff8b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sun, May 26, 2019 at 3:08 PM Chris=
ter Holmberg &lt;<a href=3D"mailto:christer.holmberg@ericsson.com">christer=
.holmberg@ericsson.com</a>&gt; wrote:<br></div><blockquote class=3D"gmail_q=
uote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,2=
04);padding-left:1ex">Hi,<br>
<br>
...=C2=A0<br>
=C2=A0<br>
Q4:<br>
=C2=A0<br>
&gt;&gt; Section 2.4 says:<br>
&gt;&gt;=C2=A0<br>
&gt;&gt; =E2=80=9CIf the UAC cannot respond to any of the challenges in the=
 response,<br>
&gt;&gt; then it should abandon attempts to send the request; e.g., if the =
UAC<br>
&gt;&gt; does not have credentials for any of the realms.=E2=80=9D<br>
&gt;&gt;=C2=A0<br>
&gt;&gt; What if it is a mid-dialog request, e.g., a BYE? If the actions ta=
ken by the UAC are based on local policy, it would be good to say so.<br>
&gt;<br>
&gt; Is this a real use case?<br>
&gt; If the UAC was able to establish a call then it must already have the =
needed credentials and should be able to terminate the call.<br>
<br>
It is allowed to challenge a mid-dialog request. Whether it&#39;s allowed t=
o require new credentials mid-dialog I don&#39;t know. Does 3261 define any=
 restrictions?<br>
<br>
If the spec allows things to take place people may define test cases for it=
, and then there needs to be SOME guidance on what to do.<br></blockquote><=
div><br></div><div>I do not see the use case, but I will add the following =
at the end of the above sentence: &quot;unless a local policy dictates othe=
rwise&quot;.=C2=A0</div><div><br></div><blockquote class=3D"gmail_quote" st=
yle=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padd=
ing-left:1ex">
=C2=A0<br>
&gt;Why =E2=80=9Cshould=E2=80=9D with small letters?<br>
&gt;=C2=A0<br>
&gt;I will change to SHOULD.<br>
<br>
Which would mean that it is allowed to send the request in certain situatio=
ns.<br>
<br>
---<br>
<br>
Q5:<br>
=C2=A0<br>
&gt;&gt; I suggest a =E2=80=9C2.X Reference Update=E2=80=9D section, that e=
xplicitly says that the reference to RFC2617 is replaced to a a reference t=
o RFC7617.<br>
&gt;&gt;=C2=A0<br>
&gt;&gt;I know it is mentioned in Section 2, but the subsections define the=
 actual updates.<br>
&gt;=C2=A0<br>
&gt; Is this really necessary?<br>
<br>
I was thinking quite a bit about it. I think it needs to be clear - but I g=
uess there can be different opinions on how to make it clear enough.<br>
<br></blockquote><div><br></div><div>I do not think that a sub-section is n=
eeded in this case.</div><div>But I do not have a strong opinion and can go=
 either way.</div><div>Do others have an opinion on this?</div><div><br></d=
iv><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div><div><br></div>=
<div>=C2=A0</div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px =
0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">
Regards,<br>
<br>
Christer<br>
<br>
<br>
<br>
<br>
=C2=A0<br>
=C2=A0<br>
=C2=A0<br>
=C2=A0<br>
=C2=A0<br>
From: sipcore &lt;mailto:<a href=3D"mailto:sipcore-bounces@ietf.org" target=
=3D"_blank">sipcore-bounces@ietf.org</a>&gt; on behalf of Rifaat Shekh-Yuse=
f &lt;mailto:<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rif=
aat.ietf@gmail.com</a>&gt;<br>
Date: Sunday, 26 May 2019 at 14.42<br>
To: &quot;mailto:<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipc=
ore@ietf.org</a>&quot; &lt;mailto:<a href=3D"mailto:sipcore@ietf.org" targe=
t=3D"_blank">sipcore@ietf.org</a>&gt;<br>
Cc: &quot;mailto:<a href=3D"mailto:i-d-announce@ietf.org" target=3D"_blank"=
>i-d-announce@ietf.org</a>&quot; &lt;mailto:<a href=3D"mailto:i-d-announce@=
ietf.org" target=3D"_blank">i-d-announce@ietf.org</a>&gt;<br>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt<=
br>
=C2=A0<br>
Hi, <br>
=C2=A0<br>
I appreciate all the feedback and comments.<br>
=C2=A0<br>
I believe that with this version of the document I have addressed all the c=
omments provided so far.<br>
Please, take=C2=A0a look and let me know if I missed anything or if you hav=
e any further comments.<br>
=C2=A0<br>
Regards,<br>
=C2=A0Rifaat<br>
=C2=A0<br>
=C2=A0<br>
On Sun, May 26, 2019 at 7:36 AM &lt;mailto:<a href=3D"mailto:internet-draft=
s@ietf.org" target=3D"_blank">internet-drafts@ietf.org</a>&gt; wrote:<br>
<br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-scheme-03.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-26<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-sipcore-digest-scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-iet=
f-sipcore-digest-scheme-03</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-03" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/html/draft-ietf-sipcore-digest-scheme-03</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-03" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?=
url2=3Ddraft-ietf-sipcore-digest-scheme-03</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">http://tools.ietf.org</a>.=
<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
mailto:<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.o=
rg</a><br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
<br>
</blockquote></div></div>

--0000000000008c57de0589cfff8b--


From nobody Sun May 26 15:16:41 2019
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5005D12015C for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 15:16:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.699
X-Spam-Level: 
X-Spam-Status: No, score=-0.699 tagged_above=-999 required=5 tests=[RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id uPVwefv_tBuS for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 15:16:38 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6459A12008F for <sipcore@ietf.org>; Sun, 26 May 2019 15:16:37 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x4QMGZm1022556 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for <sipcore@ietf.org>; Sun, 26 May 2019 18:16:36 -0400
To: sipcore@ietf.org
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com> <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com> <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <53601599-c9ca-288c-ac39-50df72a52b7a@alum.mit.edu>
Date: Sun, 26 May 2019 18:16:35 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/pa7B2mBAm9ZHyHoRnYbvfW-dPRE>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 22:16:40 -0000

On 5/26/19 3:08 PM, Christer Holmberg wrote:
> Hi,
> 
> ...
>   
> Q4:
>   
>>> Section 2.4 says:
>>>   
>>> “If the UAC cannot respond to any of the challenges in the response,
>>> then it should abandon attempts to send the request; e.g., if the UAC
>>> does not have credentials for any of the realms.”
>>>   
>>> What if it is a mid-dialog request, e.g., a BYE? If the actions taken by the UAC are based on local policy, it would be good to say so.
>>
>> Is this a real use case?
>> If the UAC was able to establish a call then it must already have the needed credentials and should be able to terminate the call.
> 
> It is allowed to challenge a mid-dialog request. Whether it's allowed to require new credentials mid-dialog I don't know.

Certainly credentials can expire mid-dialog. I see no reason why they 
can't also change mid-dialog, resulting in failure of the cached 
credentials and a new challenge.

> Does 3261 define any restrictions?

I don't believe so.

	Thanks,
	Paul

> If the spec allows things to take place people may define test cases for it, and then there needs to be SOME guidance on what to do.
>   
>> Why “should” with small letters?
>>   
>> I will change to SHOULD.
> 
> Which would mean that it is allowed to send the request in certain situations.
> 
> ---
> 
> Q5:
>   
>>> I suggest a “2.X Reference Update” section, that explicitly says that the reference to RFC2617 is replaced to a a reference to RFC7617.
>>>   
>>> I know it is mentioned in Section 2, but the subsections define the actual updates.
>>   
>> Is this really necessary?
> 
> I was thinking quite a bit about it. I think it needs to be clear - but I guess there can be different opinions on how to make it clear enough.
> 
> Regards,
> 
> Christer
> 
> 
> 
> 
>   
>   
>   
>   
>   
> From: sipcore <mailto:sipcore-bounces@ietf.org> on behalf of Rifaat Shekh-Yusef <mailto:rifaat.ietf@gmail.com>
> Date: Sunday, 26 May 2019 at 14.42
> To: "mailto:sipcore@ietf.org" <mailto:sipcore@ietf.org>
> Cc: "mailto:i-d-announce@ietf.org" <mailto:i-d-announce@ietf.org>
> Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
>   
> Hi,
>   
> I appreciate all the feedback and comments.
>   
> I believe that with this version of the document I have addressed all the comments provided so far.
> Please, take a look and let me know if I missed anything or if you have any further comments.
>   
> Regards,
>   Rifaat
>   
>   
> On Sun, May 26, 2019 at 7:36 AM <mailto:internet-drafts@ietf.org> wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Session Initiation Protocol Core WG of the IETF.
> 
>          Title           : The Session Initiation Protocol (SIP) Digest Authentication Scheme
>          Author          : Rifaat Shekh-Yusef
>          Filename        : draft-ietf-sipcore-digest-scheme-03.txt
>          Pages           : 8
>          Date            : 2019-05-26
> 
> Abstract:
>     This document updates the Digest Access Authentication scheme used by
>     the Session Initiation Protocol (SIP) to add support for more secure
>     digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>     broken MD5 algorithm.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-03
> 
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-03
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at http://tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> sipcore mailing list
> mailto:sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
> 
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
> 


From nobody Sun May 26 16:33:46 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1FEEA1201EE for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 16:33:43 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -0.097
X-Spam-Level: 
X-Spam-Status: No, score=-0.097 tagged_above=-999 required=5 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id eawiD7uvaBuz for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 16:33:40 -0700 (PDT)
Received: from mail-it1-x12c.google.com (mail-it1-x12c.google.com [IPv6:2607:f8b0:4864:20::12c]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id B8E081201E0 for <sipcore@ietf.org>; Sun, 26 May 2019 16:33:40 -0700 (PDT)
Received: by mail-it1-x12c.google.com with SMTP id t184so6913580itf.2 for <sipcore@ietf.org>; Sun, 26 May 2019 16:33:40 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=zs1GFERWjEhY4dgbFNxxhDtl7zIRl270MR6ZeVT0d/U=; b=sOzExEjVSblJ60NhVpSIfFFegpqdg1fCsKv0uUZ9JoKCar97sG5a8jXl6HDrx0fjZn 7bsBiS3XWEHKcCnoNpiz2S9+bFjtxRpnPHGozdspQnFSFTptT80YqiQwvGYMn9z8tnXR rRowrpnQEiDnzfBpsKtv1PW/noLmuGkU49caNhJf/3LIk1CwSCoGuvFwzqxSULMQZBmH q+Z1Ynamw5sy/9xHd1R5Ib/TsL6qb/ZvCIi+jv3Ma6QWOTYzgKzMlPwMt4C6dG+hjPu6 7zB3dzki2rKYH6N6Y1FGQdTSexODol4CiielD2FCIdk/EDv8SIEeZfRGf4roHfBcregK worQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=zs1GFERWjEhY4dgbFNxxhDtl7zIRl270MR6ZeVT0d/U=; b=iQ9dNNAWSWwgvPrkM8rfKsUMXjvqbvksW/kdUnjViMjxAhFVNyTxU3zffTD14PVgaa Ch9aip9TIvPaKs1TWRKoDV68JUGJ+etZUlLzBj1ODxPYacVaXFi8/h/+lyUjcymVoodh wSgaUlQSiMG5C7gfLhLZe9I0bvu6eMuLhikQMglQcJwJ/wJEfi+07SNFSbAQy9M23xiU k326CbuWvOD9NPUEtqUDtRFvfwXZLoIJnV3pzu9sjbzXro1aZOasbuQ4ix+4Ot3IzdV6 ctaGnyXagINC766IwmPxVg1KixglRblptJUzVjCYWvgRx6UbaHl+qvE0cOmsvTfZjKGl e2cg==
X-Gm-Message-State: APjAAAWPjkiXB/0sSAGztpY0a3cSma4qdmeUUzH4RpYOpkki8mOnE7LZ MH1EsrpW2FZ/N7mEHoOBGhIXJkPO8Ip+jYOnHV675g==
X-Google-Smtp-Source: APXvYqxJP60JO/R8SzJDcNUol3ZF/909FNcVmpkYaz6wEnrvZ1pYiYBsq+vbHuuiT4Q29eLvDqsQKOEhWqtwKTc7rJ8=
X-Received: by 2002:a02:84e6:: with SMTP id f93mr134036jai.73.1558913619951; Sun, 26 May 2019 16:33:39 -0700 (PDT)
MIME-Version: 1.0
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com> <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com> <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com> <53601599-c9ca-288c-ac39-50df72a52b7a@alum.mit.edu>
In-Reply-To: <53601599-c9ca-288c-ac39-50df72a52b7a@alum.mit.edu>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 26 May 2019 19:33:28 -0400
Message-ID: <CAGL6epKM3Ho8m78EHhytdezrjZiAQOCMc2=5biorwhbsMtOvvg@mail.gmail.com>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000008d87ff0589d2dc74"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/ZyzEJocziy5bzOridkwFiKIqKMk>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sun, 26 May 2019 23:33:43 -0000

--0000000000008d87ff0589d2dc74
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

On Sun, May 26, 2019 at 6:16 PM Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:

> On 5/26/19 3:08 PM, Christer Holmberg wrote:
> > Hi,
> >
> > ...
> >
> > Q4:
> >
> >>> Section 2.4 says:
> >>>
> >>> =E2=80=9CIf the UAC cannot respond to any of the challenges in the re=
sponse,
> >>> then it should abandon attempts to send the request; e.g., if the UAC
> >>> does not have credentials for any of the realms.=E2=80=9D
> >>>
> >>> What if it is a mid-dialog request, e.g., a BYE? If the actions taken
> by the UAC are based on local policy, it would be good to say so.
> >>
> >> Is this a real use case?
> >> If the UAC was able to establish a call then it must already have the
> needed credentials and should be able to terminate the call.
> >
> > It is allowed to challenge a mid-dialog request. Whether it's allowed t=
o
> require new credentials mid-dialog I don't know.
>
> Certainly credentials can expire mid-dialog.


Why would a proxy challenge a mid-dialog request when the proxy knows that
the UAC's credentials has expired?


I see no reason why they
> can't also change mid-dialog, resulting in failure of the cached
> credentials and a new challenge.
>
> This could happen today with the existing digest mechanism. Is there an
existing recommendations for how to deal with such a use case?
I guess one way to deal with this is for the proxy to accept the old
credentials for mid-dialog requests, but require the new credentials for
any new dialog initiating requests.

Regards,
 Rifaat




> > Does 3261 define any restrictions?
>
> I don't believe so.
>
>         Thanks,
>         Paul
>
> > If the spec allows things to take place people may define test cases fo=
r
> it, and then there needs to be SOME guidance on what to do.
> >
> >> Why =E2=80=9Cshould=E2=80=9D with small letters?
> >>
> >> I will change to SHOULD.
> >
> > Which would mean that it is allowed to send the request in certain
> situations.
> >
> > ---
> >
> > Q5:
> >
> >>> I suggest a =E2=80=9C2.X Reference Update=E2=80=9D section, that expl=
icitly says that
> the reference to RFC2617 is replaced to a a reference to RFC7617.
> >>>
> >>> I know it is mentioned in Section 2, but the subsections define the
> actual updates.
> >>
> >> Is this really necessary?
> >
> > I was thinking quite a bit about it. I think it needs to be clear - but
> I guess there can be different opinions on how to make it clear enough.
> >
> > Regards,
> >
> > Christer
> >
> >
> >
> >
> >
> >
> >
> >
> >
> > From: sipcore <mailto:sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <mailto:rifaat.ietf@gmail.com>
> > Date: Sunday, 26 May 2019 at 14.42
> > To: "mailto:sipcore@ietf.org" <mailto:sipcore@ietf.org>
> > Cc: "mailto:i-d-announce@ietf.org" <mailto:i-d-announce@ietf.org>
> > Subject: Re: [sipcore] I-D Action:
> draft-ietf-sipcore-digest-scheme-03.txt
> >
> > Hi,
> >
> > I appreciate all the feedback and comments.
> >
> > I believe that with this version of the document I have addressed all
> the comments provided so far.
> > Please, take a look and let me know if I missed anything or if you have
> any further comments.
> >
> > Regards,
> >   Rifaat
> >
> >
> > On Sun, May 26, 2019 at 7:36 AM <mailto:internet-drafts@ietf.org> wrote=
:
> >
> > A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> > This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
> >
> >          Title           : The Session Initiation Protocol (SIP) Digest
> Authentication Scheme
> >          Author          : Rifaat Shekh-Yusef
> >          Filename        : draft-ietf-sipcore-digest-scheme-03.txt
> >          Pages           : 8
> >          Date            : 2019-05-26
> >
> > Abstract:
> >     This document updates the Digest Access Authentication scheme used =
by
> >     the Session Initiation Protocol (SIP) to add support for more secur=
e
> >     digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
> >     broken MD5 algorithm.
> >
> >
> > The IETF datatracker status page for this draft is:
> > https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
> >
> > There are also htmlized versions available at:
> > https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-03
> >
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-03
> >
> > A diff from the previous version is available at:
> > https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-03
> >
> >
> > Please note that it may take a couple of minutes from the time of
> submission
> > until the htmlized version and diff are available at
> http://tools.ietf.org.
> >
> > Internet-Drafts are also available by anonymous FTP at:
> > ftp://ftp.ietf.org/internet-drafts/
> >
> > _______________________________________________
> > sipcore mailing list
> > mailto:sipcore@ietf.org
> > https://www.ietf.org/mailman/listinfo/sipcore
> >
> > _______________________________________________
> > sipcore mailing list
> > sipcore@ietf.org
> > https://www.ietf.org/mailman/listinfo/sipcore
> >
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--0000000000008d87ff0589d2dc74
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div dir=3D"ltr"><br></div><br><div class=3D"gmail_quote">=
<div dir=3D"ltr" class=3D"gmail_attr">On Sun, May 26, 2019 at 6:16 PM Paul =
Kyzivat &lt;<a href=3D"mailto:pkyzivat@alum.mit.edu">pkyzivat@alum.mit.edu<=
/a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0=
px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">O=
n 5/26/19 3:08 PM, Christer Holmberg wrote:<br>
&gt; Hi,<br>
&gt; <br>
&gt; ...<br>
&gt;=C2=A0 =C2=A0<br>
&gt; Q4:<br>
&gt;=C2=A0 =C2=A0<br>
&gt;&gt;&gt; Section 2.4 says:<br>
&gt;&gt;&gt;=C2=A0 =C2=A0<br>
&gt;&gt;&gt; =E2=80=9CIf the UAC cannot respond to any of the challenges in=
 the response,<br>
&gt;&gt;&gt; then it should abandon attempts to send the request; e.g., if =
the UAC<br>
&gt;&gt;&gt; does not have credentials for any of the realms.=E2=80=9D<br>
&gt;&gt;&gt;=C2=A0 =C2=A0<br>
&gt;&gt;&gt; What if it is a mid-dialog request, e.g., a BYE? If the action=
s taken by the UAC are based on local policy, it would be good to say so.<b=
r>
&gt;&gt;<br>
&gt;&gt; Is this a real use case?<br>
&gt;&gt; If the UAC was able to establish a call then it must already have =
the needed credentials and should be able to terminate the call.<br>
&gt; <br>
&gt; It is allowed to challenge a mid-dialog request. Whether it&#39;s allo=
wed to require new credentials mid-dialog I don&#39;t know.<br>
<br>
Certainly credentials can expire mid-dialog. </blockquote><div><br></div><d=
iv>Why would a proxy challenge a mid-dialog request when the proxy knows th=
at the UAC&#39;s credentials has expired?</div><div>=C2=A0</div><div><br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">I see no reason why t=
hey <br>
can&#39;t also change mid-dialog, resulting in failure of the cached <br>
credentials and a new challenge.<br>
<br></blockquote><div>This could happen today with the existing digest mech=
anism. Is there an existing recommendations for how to deal with such a use=
 case?</div><div>I guess one way to deal with this is for the proxy to acce=
pt the old credentials for mid-dialog requests, but require the new credent=
ials for any new dialog initiating requests.</div><div><br></div><div>Regar=
ds,</div><div>=C2=A0Rifaat</div><div><br></div><div><br></div><div>=C2=A0</=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex">
&gt; Does 3261 define any restrictions?<br>
<br>
I don&#39;t believe so.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Thanks,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Paul<br>
<br>
&gt; If the spec allows things to take place people may define test cases f=
or it, and then there needs to be SOME guidance on what to do.<br>
&gt;=C2=A0 =C2=A0<br>
&gt;&gt; Why =E2=80=9Cshould=E2=80=9D with small letters?<br>
&gt;&gt;=C2=A0 =C2=A0<br>
&gt;&gt; I will change to SHOULD.<br>
&gt; <br>
&gt; Which would mean that it is allowed to send the request in certain sit=
uations.<br>
&gt; <br>
&gt; ---<br>
&gt; <br>
&gt; Q5:<br>
&gt;=C2=A0 =C2=A0<br>
&gt;&gt;&gt; I suggest a =E2=80=9C2.X Reference Update=E2=80=9D section, th=
at explicitly says that the reference to RFC2617 is replaced to a a referen=
ce to RFC7617.<br>
&gt;&gt;&gt;=C2=A0 =C2=A0<br>
&gt;&gt;&gt; I know it is mentioned in Section 2, but the subsections defin=
e the actual updates.<br>
&gt;&gt;=C2=A0 =C2=A0<br>
&gt;&gt; Is this really necessary?<br>
&gt; <br>
&gt; I was thinking quite a bit about it. I think it needs to be clear - bu=
t I guess there can be different opinions on how to make it clear enough.<b=
r>
&gt; <br>
&gt; Regards,<br>
&gt; <br>
&gt; Christer<br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt; <br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0<br>
&gt; From: sipcore &lt;mailto:<a href=3D"mailto:sipcore-bounces@ietf.org" t=
arget=3D"_blank">sipcore-bounces@ietf.org</a>&gt; on behalf of Rifaat Shekh=
-Yusef &lt;mailto:<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank=
">rifaat.ietf@gmail.com</a>&gt;<br>
&gt; Date: Sunday, 26 May 2019 at 14.42<br>
&gt; To: &quot;mailto:<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank"=
>sipcore@ietf.org</a>&quot; &lt;mailto:<a href=3D"mailto:sipcore@ietf.org" =
target=3D"_blank">sipcore@ietf.org</a>&gt;<br>
&gt; Cc: &quot;mailto:<a href=3D"mailto:i-d-announce@ietf.org" target=3D"_b=
lank">i-d-announce@ietf.org</a>&quot; &lt;mailto:<a href=3D"mailto:i-d-anno=
unce@ietf.org" target=3D"_blank">i-d-announce@ietf.org</a>&gt;<br>
&gt; Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03=
.txt<br>
&gt;=C2=A0 =C2=A0<br>
&gt; Hi,<br>
&gt;=C2=A0 =C2=A0<br>
&gt; I appreciate all the feedback and comments.<br>
&gt;=C2=A0 =C2=A0<br>
&gt; I believe that with this version of the document I have addressed all =
the comments provided so far.<br>
&gt; Please, take=C2=A0a look and let me know if I missed anything or if yo=
u have any further comments.<br>
&gt;=C2=A0 =C2=A0<br>
&gt; Regards,<br>
&gt;=C2=A0 =C2=A0Rifaat<br>
&gt;=C2=A0 =C2=A0<br>
&gt;=C2=A0 =C2=A0<br>
&gt; On Sun, May 26, 2019 at 7:36 AM &lt;mailto:<a href=3D"mailto:internet-=
drafts@ietf.org" target=3D"_blank">internet-drafts@ietf.org</a>&gt; wrote:<=
br>
&gt; <br>
&gt; A New Internet-Draft is available from the on-line Internet-Drafts dir=
ectories.<br>
&gt; This draft is a work item of the Session Initiation Protocol Core WG o=
f the IETF.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0: The Session Initiation Protocol (SIP) Digest Authentication Sch=
eme<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =
=C2=A0 : Rifaat Shekh-Yusef<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 =
: draft-ietf-sipcore-digest-scheme-03.txt<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0: 8<br>
&gt;=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 : 2019-05-26<br>
&gt; <br>
&gt; Abstract:<br>
&gt;=C2=A0 =C2=A0 =C2=A0This document updates the Digest Access Authenticat=
ion scheme used by<br>
&gt;=C2=A0 =C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add suppor=
t for more secure<br>
&gt;=C2=A0 =C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-2=
56, to replace the<br>
&gt;=C2=A0 =C2=A0 =C2=A0broken MD5 algorithm.<br>
&gt; <br>
&gt; <br>
&gt; The IETF datatracker status page for this draft is:<br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-=
scheme/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/=
doc/draft-ietf-sipcore-digest-scheme/</a><br>
&gt; <br>
&gt; There are also htmlized versions available at:<br>
&gt; <a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-schem=
e-03" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draf=
t-ietf-sipcore-digest-scheme-03</a><br>
&gt; <a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-di=
gest-scheme-03" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ie=
tf.org/doc/html/draft-ietf-sipcore-digest-scheme-03</a><br>
&gt; <br>
&gt; A diff from the previous version is available at:<br>
&gt; <a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-dige=
st-scheme-03" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfc=
diff?url2=3Ddraft-ietf-sipcore-digest-scheme-03</a><br>
&gt; <br>
&gt; <br>
&gt; Please note that it may take a couple of minutes from the time of subm=
ission<br>
&gt; until the htmlized version and diff are available at <a href=3D"http:/=
/tools.ietf.org" rel=3D"noreferrer" target=3D"_blank">http://tools.ietf.org=
</a>.<br>
&gt; <br>
&gt; Internet-Drafts are also available by anonymous FTP at:<br>
&gt; <a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" tar=
get=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; sipcore mailing list<br>
&gt; mailto:<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@i=
etf.org</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noref=
errer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><=
br>
&gt; <br>
&gt; _______________________________________________<br>
&gt; sipcore mailing list<br>
&gt; <a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org=
</a><br>
&gt; <a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noref=
errer" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><=
br>
&gt; <br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div></div>

--0000000000008d87ff0589d2dc74--


From nobody Sun May 26 18:57:32 2019
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 4840A120222 for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 18:57:30 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.6
X-Spam-Level: 
X-Spam-Status: No, score=-2.6 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_LOW=-0.7, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2OwYa1SL6Q0b for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 18:57:28 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 9714E1201E9 for <sipcore@ietf.org>; Sun, 26 May 2019 18:57:28 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x4R1vPqf003242 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Sun, 26 May 2019 21:57:26 -0400
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Cc: SIPCORE <sipcore@ietf.org>
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com> <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com> <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com> <53601599-c9ca-288c-ac39-50df72a52b7a@alum.mit.edu> <CAGL6epKM3Ho8m78EHhytdezrjZiAQOCMc2=5biorwhbsMtOvvg@mail.gmail.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <5eb31888-81eb-0c6c-5a06-c43854e174af@alum.mit.edu>
Date: Sun, 26 May 2019 21:57:25 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.6.1
MIME-Version: 1.0
In-Reply-To: <CAGL6epKM3Ho8m78EHhytdezrjZiAQOCMc2=5biorwhbsMtOvvg@mail.gmail.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 8bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/7F4E9Lwvgh6v84BXHBL59voILTc>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 01:57:30 -0000

On 5/26/19 7:33 PM, Rifaat Shekh-Yusef wrote:
> 
> 
> On Sun, May 26, 2019 at 6:16 PM Paul Kyzivat <pkyzivat@alum.mit.edu 
> <mailto:pkyzivat@alum.mit.edu>> wrote:
> 
>     On 5/26/19 3:08 PM, Christer Holmberg wrote:
>      > Hi,
>      >
>      > ...
>      >
>      > Q4:
>      >
>      >>> Section 2.4 says:
>      >>>
>      >>> “If the UAC cannot respond to any of the challenges in the
>     response,
>      >>> then it should abandon attempts to send the request; e.g., if
>     the UAC
>      >>> does not have credentials for any of the realms.”
>      >>>
>      >>> What if it is a mid-dialog request, e.g., a BYE? If the actions
>     taken by the UAC are based on local policy, it would be good to say so.
>      >>
>      >> Is this a real use case?
>      >> If the UAC was able to establish a call then it must already
>     have the needed credentials and should be able to terminate the call.
>      >
>      > It is allowed to challenge a mid-dialog request. Whether it's
>     allowed to require new credentials mid-dialog I don't know.
> 
>     Certainly credentials can expire mid-dialog. 
> 
> 
> Why would a proxy challenge a mid-dialog request when the proxy knows 
> that the UAC's credentials has expired?

I was thinking of the credentials at the UAS expiring. But I suppose it 
could happen for Proxy-Authenticate as well.

It *is* unusual for a non-registrar UAS requiring credentials, but it is 
possible.

>     I see no reason why they
>     can't also change mid-dialog, resulting in failure of the cached
>     credentials and a new challenge.
> 
> This could happen today with the existing digest mechanism. Is there an 
> existing recommendations for how to deal with such a use case?
> I guess one way to deal with this is for the proxy to accept the old 
> credentials for mid-dialog requests, but require the new credentials for 
> any new dialog initiating requests.

I'm not aware of any recommendations in this regard. I think it falls 
into the realm of policy.

Again, I don't know why you are bringing up proxies.

But these are all somewhat obscure cases based on current practice.

	Thanks,
	Paul


From nobody Sun May 26 19:11:19 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0424B1200B6 for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 19:11:18 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id bjA44loojavj for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 19:11:14 -0700 (PDT)
Received: from mail-it1-x129.google.com (mail-it1-x129.google.com [IPv6:2607:f8b0:4864:20::129]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 73EDE120220 for <sipcore@ietf.org>; Sun, 26 May 2019 19:11:14 -0700 (PDT)
Received: by mail-it1-x129.google.com with SMTP id g23so16093474iti.1 for <sipcore@ietf.org>; Sun, 26 May 2019 19:11:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=dUAmOft7UPG0YpFtPA88Mgd3noGzs8PCpViFeh52jf8=; b=Hb2nl1hCdpZ6qfhBGBRCahFt+SKdesZoIWFgWWVSeFRSM0pvalgod/dtMX0TS7lw8r 0zu60HkuWGMk5v7lPT18ZJd9hwTSYkqQtONIunwc82ouk0PrESvnWYejdMMsmLVPLqBB IYWNg3rARLxF4ToeFML2pGKTyTnWp3/27n1voeCvpa4BkmZ0wjPWwbRLXOAHOv6fa2Ps C8ItUHI2K3MiMr/X5VullPj1veCZnTih/scVhpkXHL976BZHC+KnTSdsHnqm+XGp8Z7j qyBt4rNOuWkDJlqwyS5lmUsoGkJpc6C2ej0Rm8lIYKVy7lclQDygSFRUbRtv6KZ5vwa9 NRiA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=dUAmOft7UPG0YpFtPA88Mgd3noGzs8PCpViFeh52jf8=; b=kyNIzO6lFP2iwu+LGFzKANy7ZkNDr+cglm4E4qZJn9O3mXtfjm3hHgTlh2lseX6sBc MiLB9WsUniyWcydi1GbEu8My4evrKdCJ/1SpdJpUqhrTrFVHijlrcVXLUCVIBkgBRA4o MEIOAX0bFoarxXwd0j4fPZOPCig1wo25YQQqp+3oylYiZpecB2MdgSCojP+YFxtFavEa 6gTu7sCP0nmkf1jcgAohoi8+ChALmADMamSrX787e7mkZsUyLmxDobrAltwbnkSJOSMq AYCwXyzahBOhx6g8WRhTFr6ml77ApKh/WWYu+mljIr/ilL1Lxdg/OAekvh/qzv2plQLg Qlfw==
X-Gm-Message-State: APjAAAU2bF2mCpEARlteZH+C1mx8lqLPkme//BJi/q0tF+vnw59O68Ij w1EPiAmdhPai+ifBuLug4ykEAWlMOzYzXSq/gSs=
X-Google-Smtp-Source: APXvYqwxvzLoBMHy+Ww3slTwKSt4Kw8S9TV2kwJlIg8ZTeGmvKaLSA09uQpiuhFPt69vhdDNjw6f9oOHUdeImNLW1Es=
X-Received: by 2002:a24:c241:: with SMTP id i62mr25436746itg.21.1558923073763;  Sun, 26 May 2019 19:11:13 -0700 (PDT)
MIME-Version: 1.0
References: <155887053797.18445.6083693595030099124@ietfa.amsl.com> <CAGL6epJoFzv5t4r67_-jQhRw3Q9aiz2NeedCqAMk00AkPLc_uA@mail.gmail.com> <8462F405-E6EC-4ABF-8C8D-89A2BBE58E86@ericsson.com> <CAGL6epL_0SGdFjifOQEConae83NkOpQ1DjkGH44XZY_h6un6Rw@mail.gmail.com> <9EC1AB7E-C8F0-43C9-A701-DB60163F4723@ericsson.com> <53601599-c9ca-288c-ac39-50df72a52b7a@alum.mit.edu> <CAGL6epKM3Ho8m78EHhytdezrjZiAQOCMc2=5biorwhbsMtOvvg@mail.gmail.com> <5eb31888-81eb-0c6c-5a06-c43854e174af@alum.mit.edu>
In-Reply-To: <5eb31888-81eb-0c6c-5a06-c43854e174af@alum.mit.edu>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Sun, 26 May 2019 22:11:02 -0400
Message-ID: <CAGL6epK0ZVfeC+nXBiL1gGCuVFE17knjmLw=S74C77y1D_xirQ@mail.gmail.com>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="0000000000000b40d70589d51050"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/pBLzql-_dKWSGJ5ynSgoRAjXYVE>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 02:11:18 -0000

--0000000000000b40d70589d51050
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

When I said "proxy" I was thinking of both registrar and proxy.
But I agree with you that these are obscure use cases that better left for
a local policy to deal with.

Regards,
 Rifaat

On Sun, May 26, 2019 at 9:57 PM Paul Kyzivat <pkyzivat@alum.mit.edu> wrote:

> On 5/26/19 7:33 PM, Rifaat Shekh-Yusef wrote:
> >
> >
> > On Sun, May 26, 2019 at 6:16 PM Paul Kyzivat <pkyzivat@alum.mit.edu
> > <mailto:pkyzivat@alum.mit.edu>> wrote:
> >
> >     On 5/26/19 3:08 PM, Christer Holmberg wrote:
> >      > Hi,
> >      >
> >      > ...
> >      >
> >      > Q4:
> >      >
> >      >>> Section 2.4 says:
> >      >>>
> >      >>> =E2=80=9CIf the UAC cannot respond to any of the challenges in=
 the
> >     response,
> >      >>> then it should abandon attempts to send the request; e.g., if
> >     the UAC
> >      >>> does not have credentials for any of the realms.=E2=80=9D
> >      >>>
> >      >>> What if it is a mid-dialog request, e.g., a BYE? If the action=
s
> >     taken by the UAC are based on local policy, it would be good to say
> so.
> >      >>
> >      >> Is this a real use case?
> >      >> If the UAC was able to establish a call then it must already
> >     have the needed credentials and should be able to terminate the cal=
l.
> >      >
> >      > It is allowed to challenge a mid-dialog request. Whether it's
> >     allowed to require new credentials mid-dialog I don't know.
> >
> >     Certainly credentials can expire mid-dialog.
> >
> >
> > Why would a proxy challenge a mid-dialog request when the proxy knows
> > that the UAC's credentials has expired?
>
> I was thinking of the credentials at the UAS expiring. But I suppose it
> could happen for Proxy-Authenticate as well.
>
> It *is* unusual for a non-registrar UAS requiring credentials, but it is
> possible.
>
> >     I see no reason why they
> >     can't also change mid-dialog, resulting in failure of the cached
> >     credentials and a new challenge.
> >
> > This could happen today with the existing digest mechanism. Is there an
> > existing recommendations for how to deal with such a use case?
> > I guess one way to deal with this is for the proxy to accept the old
> > credentials for mid-dialog requests, but require the new credentials fo=
r
> > any new dialog initiating requests.
>
> I'm not aware of any recommendations in this regard. I think it falls
> into the realm of policy.
>
> Again, I don't know why you are bringing up proxies.
>
> But these are all somewhat obscure cases based on current practice.
>
>         Thanks,
>         Paul
>

--0000000000000b40d70589d51050
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">When I said &quot;proxy&quot; I was thinking of both regis=
trar and proxy.<div>But I agree with you that these are obscure use cases t=
hat better left for a local policy to deal with.</div><div><br></div><div>R=
egards,</div><div>=C2=A0Rifaat</div></div><br><div class=3D"gmail_quote"><d=
iv dir=3D"ltr" class=3D"gmail_attr">On Sun, May 26, 2019 at 9:57 PM Paul Ky=
zivat &lt;<a href=3D"mailto:pkyzivat@alum.mit.edu">pkyzivat@alum.mit.edu</a=
>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex">On =
5/26/19 7:33 PM, Rifaat Shekh-Yusef wrote:<br>
&gt; <br>
&gt; <br>
&gt; On Sun, May 26, 2019 at 6:16 PM Paul Kyzivat &lt;<a href=3D"mailto:pky=
zivat@alum.mit.edu" target=3D"_blank">pkyzivat@alum.mit.edu</a> <br>
&gt; &lt;mailto:<a href=3D"mailto:pkyzivat@alum.mit.edu" target=3D"_blank">=
pkyzivat@alum.mit.edu</a>&gt;&gt; wrote:<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0On 5/26/19 3:08 PM, Christer Holmberg wrote:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt; Hi,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt; ...<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt; Q4:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt; Section 2.4 says:<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt; =E2=80=9CIf the UAC cannot respond to=
 any of the challenges in the<br>
&gt;=C2=A0 =C2=A0 =C2=A0response,<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt; then it should abandon attempts to se=
nd the request; e.g., if<br>
&gt;=C2=A0 =C2=A0 =C2=A0the UAC<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt; does not have credentials for any of =
the realms.=E2=80=9D<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;&gt; What if it is a mid-dialog request, e=
.g., a BYE? If the actions<br>
&gt;=C2=A0 =C2=A0 =C2=A0taken by the UAC are based on local policy, it woul=
d be good to say so.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt; Is this a real use case?<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;&gt; If the UAC was able to establish a call t=
hen it must already<br>
&gt;=C2=A0 =C2=A0 =C2=A0have the needed credentials and should be able to t=
erminate the call.<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt;<br>
&gt;=C2=A0 =C2=A0 =C2=A0 &gt; It is allowed to challenge a mid-dialog reque=
st. Whether it&#39;s<br>
&gt;=C2=A0 =C2=A0 =C2=A0allowed to require new credentials mid-dialog I don=
&#39;t know.<br>
&gt; <br>
&gt;=C2=A0 =C2=A0 =C2=A0Certainly credentials can expire mid-dialog. <br>
&gt; <br>
&gt; <br>
&gt; Why would a proxy challenge a mid-dialog request when the proxy knows =
<br>
&gt; that the UAC&#39;s credentials has expired?<br>
<br>
I was thinking of the credentials at the UAS expiring. But I suppose it <br=
>
could happen for Proxy-Authenticate as well.<br>
<br>
It *is* unusual for a non-registrar UAS requiring credentials, but it is <b=
r>
possible.<br>
<br>
&gt;=C2=A0 =C2=A0 =C2=A0I see no reason why they<br>
&gt;=C2=A0 =C2=A0 =C2=A0can&#39;t also change mid-dialog, resulting in fail=
ure of the cached<br>
&gt;=C2=A0 =C2=A0 =C2=A0credentials and a new challenge.<br>
&gt; <br>
&gt; This could happen today with the existing digest mechanism. Is there a=
n <br>
&gt; existing recommendations for how to deal with such a use case?<br>
&gt; I guess one way to deal with this is for the proxy to accept the old <=
br>
&gt; credentials for mid-dialog requests, but require the new credentials f=
or <br>
&gt; any new dialog initiating requests.<br>
<br>
I&#39;m not aware of any recommendations in this regard. I think it falls <=
br>
into the realm of policy.<br>
<br>
Again, I don&#39;t know why you are bringing up proxies.<br>
<br>
But these are all somewhat obscure cases based on current practice.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Thanks,<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Paul<br>
</blockquote></div>

--0000000000000b40d70589d51050--


From nobody Sun May 26 23:32:25 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F4981200CC; Sun, 26 May 2019 23:32:24 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id o79ySV-xpz2K; Sun, 26 May 2019 23:32:21 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00045.outbound.protection.outlook.com [40.107.0.45]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5CF7212006D; Sun, 26 May 2019 23:32:21 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=xHko8ZCHTfcnjb4JN0MD/79BqQeUd40RzFABCwMZrYA=; b=DvKjiqfPIfTXkdV1BR1filiT84ynMuoFtaSoQqrlM9mIOsIARA2uPu9MzUhjMcAVQ6snwcIM318pFilPdKKSv7Op2YnKKtTVFlGpHMzfSEpGS/VE3p32R6h/eOYZXhzzK0iV6ikXU4PmlA4OputR/VIEPITmKC+dirC+K/do1Qo=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3257.eurprd07.prod.outlook.com (10.170.246.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Mon, 27 May 2019 06:32:18 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.007; Mon, 27 May 2019 06:32:18 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: SIPCORE <sipcore@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt - the reference update issue
Thread-Index: AQHVFFXtMn5VMeX1iUywT0r64Ealgg==
Date: Mon, 27 May 2019 06:32:17 +0000
Message-ID: <9143FEA3-F280-4F6C-BB87-EA724BF79212@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 64f72705-ea05-4c93-69ce-08d6e26d10de
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB3257; 
x-ms-traffictypediagnostic: HE1PR07MB3257:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <HE1PR07MB32572567AFA67B0E47DB0541931D0@HE1PR07MB3257.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0050CEFE70
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(396003)(136003)(366004)(376002)(39860400002)(189003)(199004)(18543002)(478600001)(53936002)(83716004)(6436002)(6506007)(66574012)(14454004)(6512007)(14444005)(99286004)(64756008)(2906002)(53546011)(86362001)(25786009)(66446008)(66476007)(66556008)(36756003)(256004)(6486002)(6306002)(966005)(71190400001)(71200400001)(76116006)(73956011)(66946007)(229853002)(4326008)(486006)(26005)(476003)(2616005)(6246003)(316002)(33656002)(82746002)(7110500001)(186003)(58126008)(54906003)(6916009)(8936002)(8676002)(44832011)(3846002)(6116002)(81156014)(68736007)(81166006)(15650500001)(2420400007)(7736002)(102836004)(66066001)(305945005)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3257; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: /Z3bVa8wbgwkMslsHsdI7fun6x/JlRSOgucmFPuXY7oC7ywgXXgtMNvXkSDhzD+f74XOmEyxxe2GkJ/ljgwc+XOVg6kGKnCx/PDi3uXYE1km8hQ1XXPVPhy90Hhoh3GESp8FWdroAoAoXp7fOAvvP8E1xmM78IAYzluD/BFivX+3urgJGeiE4pipprncrEjrBR3FRdxAGflWJxCdbHlU3Ql6IVEZcBp+Sk1S5ayGgwOjOalvKyr2gpHANnIvpGjUgNQWt6p3bGWJDsHs/EWC4+SaCVU7/yqrrp4RbwA1Eo2eu8GJjgpyD5GYds8x+/zndCkWXNSNiMRqDsTvL0lurv66OyT4PWZGTw6zX2iwqku3jIxxlgksqkAj8hXPvf3fktpPj/Y7HG3rE6cTl0X0bx83Pmz/nGj8n8rtQHNPpaw=
Content-Type: text/plain; charset="utf-8"
Content-ID: <3AC622A6E8DA5B49ADA0AC82B71E3DA6@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 64f72705-ea05-4c93-69ce-08d6e26d10de
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 May 2019 06:32:18.0458 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3257
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/mwaBPiqg5qXSe_0CsGMpLhJwOAU>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt - the reference update issue
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 06:32:24 -0000
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From nobody Sun May 26 23:35:23 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E354B1200CC for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 23:35:21 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.01
X-Spam-Level: 
X-Spam-Status: No, score=-2.01 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 2bNRbdYm5V_T for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 23:35:19 -0700 (PDT)
Received: from EUR02-AM5-obe.outbound.protection.outlook.com (mail-eopbgr00041.outbound.protection.outlook.com [40.107.0.41]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id C52C812006D for <sipcore@ietf.org>; Sun, 26 May 2019 23:35:18 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=lRU1gJ0XS2ZSj4kjtkdLrXmEBnmE+f2wCH5UtaoHYlg=; b=WjGHz4Hu/fbApoCe/Wh74JcrRdXAahJ1Eixblu/GM+AFWU8b5eYLVwCErHsW1Z35fAfXK1xUWF8CCkdKCsoPeM0Ff4Fi4Jl2IssOtDAiy3ODel1NHiODgVkkMPM47JQ3ezcsi6CokKso5nVsvNq3Cj38A7zc8qHDio7+c0YBWw0=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3257.eurprd07.prod.outlook.com (10.170.246.24) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Mon, 27 May 2019 06:35:16 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.007; Mon, 27 May 2019 06:35:16 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, Paul Kyzivat <pkyzivat@alum.mit.edu>
CC: SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt - the challenge failure issue
Thread-Index: AQHVFFZYadtofMOiMEKYmWdw5LbQng==
Date: Mon, 27 May 2019 06:35:15 +0000
Message-ID: <85E3FC18-351F-445F-AAB6-414AF2B9B060@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 2ac6cd29-3ab3-4155-4567-08d6e26d7ae1
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB3257; 
x-ms-traffictypediagnostic: HE1PR07MB3257:
x-microsoft-antispam-prvs: <HE1PR07MB325720F57A932B1958CA4607931D0@HE1PR07MB3257.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 0050CEFE70
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(396003)(136003)(366004)(376002)(39860400002)(189003)(199004)(18543002)(478600001)(53936002)(83716004)(6436002)(6506007)(14454004)(6512007)(14444005)(99286004)(64756008)(2906002)(53546011)(86362001)(25786009)(66446008)(66476007)(66556008)(236005)(54896002)(36756003)(256004)(6486002)(6306002)(71190400001)(71200400001)(76116006)(73956011)(66946007)(229853002)(4326008)(486006)(26005)(476003)(2616005)(6246003)(316002)(110136005)(33656002)(82746002)(186003)(58126008)(2171002)(8936002)(8676002)(44832011)(3846002)(6116002)(81156014)(68736007)(81166006)(7736002)(102836004)(66066001)(5660300002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3257; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: UZ4fcKbKe1qdkg5A1vw7h7pVrjY8Inkz4xa9KtX4Fk4EGhOOjDhmPsuX/uafssER+fXRnMRYi9kGggyQLz9Ns9DhP0ELhzVSrZSSpxZtIM6MPkLUutH5+fuT7xHGcuCg2YINucPgDZifr0wsGUZYJtfkZbkLXtxTp94DGfXIbaTV8Vh+UPSjGVd5YBcPmkA4mTZ6GxnCfU6BIxt70o9lkXHXQrfs50XSW71/LG3nttP3TXe+Hx8t5dzKlnxmPMi8UOL3MkPd+9X2HiqL06PPg+8gJBVm+FIODkQ7TiIhyLCvxzOTUYB3X7POkizH68eHBzlqJyXeuswgK2Z+7CUNJqzw1wEbpjTzkphz1Bt36IRnAe1XBzNaG8l5WhE9wUnNFN9c0VpZRi67W4u1ACrjwPmb9cwCc08wsUgkScoEiTQ=
Content-Type: multipart/alternative; boundary="_000_85E3FC18351F445FAAB6414AF2B9B060ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 2ac6cd29-3ab3-4155-4567-08d6e26d7ae1
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 May 2019 06:35:15.8971 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3257
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/8H32ovPVdE33Ihy0SeewAu1nwu4>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt - the challenge failure issue
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 06:35:22 -0000

--_000_85E3FC18351F445FAAB6414AF2B9B060ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_85E3FC18351F445FAAB6414AF2B9B060ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <E605C14A65F7B54FBD398025E0CFE2E4@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64

PGh0bWwgeG1sbnM6bz0idXJuOnNjaGVtYXMtbWljcm9zb2Z0LWNvbTpvZmZpY2U6b2ZmaWNlIiB4
bWxuczp3PSJ1cm46c2NoZW1hcy1taWNyb3NvZnQtY29tOm9mZmljZTp3b3JkIiB4bWxuczptPSJo
dHRwOi8vc2NoZW1hcy5taWNyb3NvZnQuY29tL29mZmljZS8yMDA0LzEyL29tbWwiIHhtbG5zPSJo
dHRwOi8vd3d3LnczLm9yZy9UUi9SRUMtaHRtbDQwIj4NCjxoZWFkPg0KPG1ldGEgaHR0cC1lcXVp
dj0iQ29udGVudC1UeXBlIiBjb250ZW50PSJ0ZXh0L2h0bWw7IGNoYXJzZXQ9dXRmLTgiPg0KPG1l
dGEgbmFtZT0iR2VuZXJhdG9yIiBjb250ZW50PSJNaWNyb3NvZnQgV29yZCAxNSAoZmlsdGVyZWQg
bWVkaXVtKSI+DQo8c3R5bGU+PCEtLQ0KLyogRm9udCBEZWZpbml0aW9ucyAqLw0KQGZvbnQtZmFj
ZQ0KCXtmb250LWZhbWlseToiQ2FtYnJpYSBNYXRoIjsNCglwYW5vc2UtMToyIDQgNSAzIDUgNCA2
IDMgMiA0O30NCkBmb250LWZhY2UNCgl7Zm9udC1mYW1pbHk6Q2FsaWJyaTsNCglwYW5vc2UtMToy
IDE1IDUgMiAyIDIgNCAzIDIgNDt9DQovKiBTdHlsZSBEZWZpbml0aW9ucyAqLw0KcC5Nc29Ob3Jt
YWwsIGxpLk1zb05vcm1hbCwgZGl2Lk1zb05vcm1hbA0KCXttYXJnaW46MGNtOw0KCW1hcmdpbi1i
b3R0b206LjAwMDFwdDsNCglmb250LXNpemU6MTEuMHB0Ow0KCWZvbnQtZmFtaWx5OiJDYWxpYnJp
IixzYW5zLXNlcmlmO30NCmE6bGluaywgc3Bhbi5Nc29IeXBlcmxpbmsNCgl7bXNvLXN0eWxlLXBy
aW9yaXR5Ojk5Ow0KCWNvbG9yOmJsdWU7DQoJdGV4dC1kZWNvcmF0aW9uOnVuZGVybGluZTt9DQph
OnZpc2l0ZWQsIHNwYW4uTXNvSHlwZXJsaW5rRm9sbG93ZWQNCgl7bXNvLXN0eWxlLXByaW9yaXR5
Ojk5Ow0KCWNvbG9yOnB1cnBsZTsNCgl0ZXh0LWRlY29yYXRpb246dW5kZXJsaW5lO30NCnAubXNv
bm9ybWFsMCwgbGkubXNvbm9ybWFsMCwgZGl2Lm1zb25vcm1hbDANCgl7bXNvLXN0eWxlLW5hbWU6
bXNvbm9ybWFsOw0KCW1zby1tYXJnaW4tdG9wLWFsdDphdXRvOw0KCW1hcmdpbi1yaWdodDowY207
DQoJbXNvLW1hcmdpbi1ib3R0b20tYWx0OmF1dG87DQoJbWFyZ2luLWxlZnQ6MGNtOw0KCWZvbnQt
c2l6ZToxMS4wcHQ7DQoJZm9udC1mYW1pbHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7fQ0Kc3Bhbi5F
bWFpbFN0eWxlMTgNCgl7bXNvLXN0eWxlLXR5cGU6cGVyc29uYWwtcmVwbHk7DQoJZm9udC1mYW1p
bHk6IkNhbGlicmkiLHNhbnMtc2VyaWY7DQoJY29sb3I6d2luZG93dGV4dDt9DQouTXNvQ2hwRGVm
YXVsdA0KCXttc28tc3R5bGUtdHlwZTpleHBvcnQtb25seTsNCglmb250LXNpemU6MTAuMHB0O30N
CkBwYWdlIFdvcmRTZWN0aW9uMQ0KCXtzaXplOjYxMi4wcHQgNzkyLjBwdDsNCgltYXJnaW46NzAu
ODVwdCAyLjBjbSA3MC44NXB0IDIuMGNtO30NCmRpdi5Xb3JkU2VjdGlvbjENCgl7cGFnZTpXb3Jk
U2VjdGlvbjE7fQ0KLS0+PC9zdHlsZT4NCjwvaGVhZD4NCjxib2R5IGxhbmc9IkZJIiBsaW5rPSJi
bHVlIiB2bGluaz0icHVycGxlIj4NCjxkaXYgY2xhc3M9IldvcmRTZWN0aW9uMSI+DQo8cCBjbGFz
cz0iTXNvTm9ybWFsIj5IaSw8bzpwPjwvbzpwPjwvcD4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9y
bWFsIj48Yj48c3BhbiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+PG86cD4mbmJzcDs8L286cD48
L3NwYW4+PC9iPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxiPjxzcGFuIGxhbmc9IkVOLVVT
IiBzdHlsZT0iZm9udC1zaXplOjEyLjBwdCI+Jmd0Ozwvc3Bhbj48L2I+PHNwYW4gbGFuZz0iRU4t
VVMiPldoZW4gSSBzYWlkICZxdW90O3Byb3h5JnF1b3Q7IEkgd2FzIHRoaW5raW5nIG9mIGJvdGgg
cmVnaXN0cmFyIGFuZCBwcm94eS4NCjxvOnA+PC9vOnA+PC9zcGFuPjwvcD4NCjxkaXY+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+Jmd0O0J1dCBJIGFncmVlIHdpdGgg
eW91IHRoYXQgdGhlc2UgYXJlIG9ic2N1cmUgdXNlIGNhc2VzIHRoYXQgYmV0dGVyIGxlZnQgZm9y
IGEgbG9jYWwgcG9saWN5IHRvIGRlYWwgd2l0aC48bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBj
bGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1VUyI+PG86cD4mbmJzcDs8L286cD48L3Nw
YW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPkkgYWdyZWUu
PG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0i
RU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwi
PjxzcGFuIGxhbmc9IkVOLVVTIj5CdXQsIEkgd2FudCB0byBtb3JlIGNsZWFybHkgcG9pbnQgb3V0
IHRoYXQgaXQgY2FuIGhhcHBlbiwgd2hhdCB0aGUgcG9zc2libGUgaW1wbGljYXRpb25zIGFyZSwg
YW5kIHRoYXQgdGhlIGFjdGlvbnMgdGFrZW4gYXJlIGJhc2VkIHRvIGxvY2FsIHBvbGljeS48bzpw
PjwvbzpwPjwvc3Bhbj48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJFTi1V
UyI+PG86cD4mbmJzcDs8L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9Ik1zb05vcm1hbCI+PHNw
YW4gbGFuZz0iRU4tVVMiPlJlZ2FyZHMsPG86cD48L286cD48L3NwYW4+PC9wPg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PHNwYW4gbGFuZz0iRU4tVVMiPjxvOnA+Jm5ic3A7PC9vOnA+PC9zcGFuPjwv
cD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVTIj5DaHJpc3RlcjxvOnA+
PC9vOnA+PC9zcGFuPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxzcGFuIGxhbmc9IkVOLVVT
Ij48bzpwPiZuYnNwOzwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjwvZGl2Pg0KPHAgY2xhc3M9
Ik1zb05vcm1hbCI+PG86cD4mbmJzcDs8L286cD48L3A+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48
bzpwPiZuYnNwOzwvbzpwPjwvcD4NCjxwIGNsYXNzPSJNc29Ob3JtYWwiPjxvOnA+Jm5ic3A7PC9v
OnA+PC9wPg0KPGRpdj4NCjxkaXY+DQo8cCBjbGFzcz0iTXNvTm9ybWFsIj48c3BhbiBsYW5nPSJF
Ti1VUyI+T24gU3VuLCBNYXkgMjYsIDIwMTkgYXQgOTo1NyBQTSBQYXVsIEt5eml2YXQgJmx0Ozwv
c3Bhbj48YSBocmVmPSJtYWlsdG86cGt5eml2YXRAYWx1bS5taXQuZWR1Ij48c3BhbiBsYW5nPSJF
Ti1VUyI+cGt5eml2YXRAYWx1bS5taXQuZWR1PC9zcGFuPjwvYT48c3BhbiBsYW5nPSJFTi1VUyI+
Jmd0OyB3cm90ZTo8bzpwPjwvbzpwPjwvc3Bhbj48L3A+DQo8L2Rpdj4NCjxibG9ja3F1b3RlIHN0
eWxlPSJib3JkZXI6bm9uZTtib3JkZXItbGVmdDpzb2xpZCAjQ0NDQ0NDIDEuMHB0O3BhZGRpbmc6
MGNtIDBjbSAwY20gNi4wcHQ7bWFyZ2luLWxlZnQ6NC44cHQ7bWFyZ2luLXJpZ2h0OjBjbSI+DQo8
cCBjbGFzcz0iTXNvTm9ybWFsIj5PbiA1LzI2LzE5IDc6MzMgUE0sIFJpZmFhdCBTaGVraC1ZdXNl
ZiB3cm90ZTo8YnI+DQomZ3Q7IDxicj4NCiZndDsgPGJyPg0KJmd0OyBPbiBTdW4sIE1heSAyNiwg
MjAxOSBhdCA2OjE2IFBNIFBhdWwgS3l6aXZhdCAmbHQ7PGEgaHJlZj0ibWFpbHRvOnBreXppdmF0
QGFsdW0ubWl0LmVkdSIgdGFyZ2V0PSJfYmxhbmsiPnBreXppdmF0QGFsdW0ubWl0LmVkdTwvYT4N
Cjxicj4NCiZndDsgJmx0O21haWx0bzo8YSBocmVmPSJtYWlsdG86cGt5eml2YXRAYWx1bS5taXQu
ZWR1IiB0YXJnZXQ9Il9ibGFuayI+cGt5eml2YXRAYWx1bS5taXQuZWR1PC9hPiZndDsmZ3Q7IHdy
b3RlOjxicj4NCiZndDsgPGJyPg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7T24gNS8yNi8xOSAz
OjA4IFBNLCBDaHJpc3RlciBIb2xtYmVyZyB3cm90ZTo8YnI+DQomZ3Q7Jm5ic3A7ICZuYnNwOyAm
bmJzcDsgJmd0OyBIaSw8YnI+DQomZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsgJmd0Ozxicj4NCiZn
dDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7IC4uLjxicj4NCiZndDsmbmJzcDsgJm5ic3A7ICZu
YnNwOyAmZ3Q7PGJyPg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsgUTQ6PGJyPg0KJmd0
OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDs8YnI+DQomZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDsg
Jmd0OyZndDsmZ3Q7IFNlY3Rpb24gMi40IHNheXM6PGJyPg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5i
c3A7ICZndDsmZ3Q7Jmd0Ozxicj4NCiZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7Jmd0OyZn
dDsg4oCcSWYgdGhlIFVBQyBjYW5ub3QgcmVzcG9uZCB0byBhbnkgb2YgdGhlIGNoYWxsZW5nZXMg
aW4gdGhlPGJyPg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7cmVzcG9uc2UsPGJyPg0KJmd0OyZu
YnNwOyAmbmJzcDsgJm5ic3A7ICZndDsmZ3Q7Jmd0OyB0aGVuIGl0IHNob3VsZCBhYmFuZG9uIGF0
dGVtcHRzIHRvIHNlbmQgdGhlIHJlcXVlc3Q7IGUuZy4sIGlmPGJyPg0KJmd0OyZuYnNwOyAmbmJz
cDsgJm5ic3A7dGhlIFVBQzxicj4NCiZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7Jmd0OyZn
dDsgZG9lcyBub3QgaGF2ZSBjcmVkZW50aWFscyBmb3IgYW55IG9mIHRoZSByZWFsbXMu4oCdPGJy
Pg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsmZ3Q7Jmd0Ozxicj4NCiZndDsmbmJzcDsg
Jm5ic3A7ICZuYnNwOyAmZ3Q7Jmd0OyZndDsgV2hhdCBpZiBpdCBpcyBhIG1pZC1kaWFsb2cgcmVx
dWVzdCwgZS4uZy4sIGEgQllFPyBJZiB0aGUgYWN0aW9uczxicj4NCiZndDsmbmJzcDsgJm5ic3A7
ICZuYnNwO3Rha2VuIGJ5IHRoZSBVQUMgYXJlIGJhc2VkIG9uIGxvY2FsIHBvbGljeSwgaXQgd291
bGQgYmUgZ29vZCB0byBzYXkgc28uPGJyPg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsm
Z3Q7PGJyPg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7ICZndDsmZ3Q7IElzIHRoaXMgYSByZWFs
IHVzZSBjYXNlPzxicj4NCiZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7Jmd0OyBJZiB0aGUg
VUFDIHdhcyBhYmxlIHRvIGVzdGFibGlzaCBhIGNhbGwgdGhlbiBpdCBtdXN0IGFscmVhZHk8YnI+
DQomZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDtoYXZlIHRoZSBuZWVkZWQgY3JlZGVudGlhbHMgYW5k
IHNob3VsZCBiZSBhYmxlIHRvIHRlcm1pbmF0ZSB0aGUgY2FsbC48YnI+DQomZ3Q7Jm5ic3A7ICZu
YnNwOyAmbmJzcDsgJmd0Ozxicj4NCiZndDsmbmJzcDsgJm5ic3A7ICZuYnNwOyAmZ3Q7IEl0IGlz
IGFsbG93ZWQgdG8gY2hhbGxlbmdlIGEgbWlkLWRpYWxvZyByZXF1ZXN0LiBXaGV0aGVyIGl0J3M8
YnI+DQomZ3Q7Jm5ic3A7ICZuYnNwOyAmbmJzcDthbGxvd2VkIHRvIHJlcXVpcmUgbmV3IGNyZWRl
bnRpYWxzIG1pZC1kaWFsb2cgSSBkb24ndCBrbm93Ljxicj4NCiZndDsgPGJyPg0KJmd0OyZuYnNw
OyAmbmJzcDsgJm5ic3A7Q2VydGFpbmx5IGNyZWRlbnRpYWxzIGNhbiBleHBpcmUgbWlkLWRpYWxv
Zy4gPGJyPg0KJmd0OyA8YnI+DQomZ3Q7IDxicj4NCiZndDsgV2h5IHdvdWxkIGEgcHJveHkgY2hh
bGxlbmdlIGEgbWlkLWRpYWxvZyByZXF1ZXN0IHdoZW4gdGhlIHByb3h5IGtub3dzIDxicj4NCiZn
dDsgdGhhdCB0aGUgVUFDJ3MgY3JlZGVudGlhbHMgaGFzIGV4cGlyZWQ/PGJyPg0KPGJyPg0KSSB3
YXMgdGhpbmtpbmcgb2YgdGhlIGNyZWRlbnRpYWxzIGF0IHRoZSBVQVMgZXhwaXJpbmcuIEJ1dCBJ
IHN1cHBvc2UgaXQgPGJyPg0KY291bGQgaGFwcGVuIGZvciBQcm94eS1BdXRoZW50aWNhdGUgYXMg
d2VsbC48YnI+DQo8YnI+DQpJdCAqaXMqIHVudXN1YWwgZm9yIGEgbm9uLXJlZ2lzdHJhciBVQVMg
cmVxdWlyaW5nIGNyZWRlbnRpYWxzLCBidXQgaXQgaXMgPGJyPg0KcG9zc2libGUuPGJyPg0KPGJy
Pg0KJmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7SSBzZWUgbm8gcmVhc29uIHdoeSB0aGV5PGJyPg0K
Jmd0OyZuYnNwOyAmbmJzcDsgJm5ic3A7Y2FuJ3QgYWxzbyBjaGFuZ2UgbWlkLWRpYWxvZywgcmVz
dWx0aW5nIGluIGZhaWx1cmUgb2YgdGhlIGNhY2hlZDxicj4NCiZndDsmbmJzcDsgJm5ic3A7ICZu
YnNwO2NyZWRlbnRpYWxzIGFuZCBhIG5ldyBjaGFsbGVuZ2UuPGJyPg0KJmd0OyA8YnI+DQomZ3Q7
IFRoaXMgY291bGQgaGFwcGVuIHRvZGF5IHdpdGggdGhlIGV4aXN0aW5nIGRpZ2VzdCBtZWNoYW5p
c20uIElzIHRoZXJlIGFuIDxicj4NCiZndDsgZXhpc3RpbmcgcmVjb21tZW5kYXRpb25zIGZvciBo
b3cgdG8gZGVhbCB3aXRoIHN1Y2ggYSB1c2UgY2FzZT88YnI+DQomZ3Q7IEkgZ3Vlc3Mgb25lIHdh
eSB0byBkZWFsIHdpdGggdGhpcyBpcyBmb3IgdGhlIHByb3h5IHRvIGFjY2VwdCB0aGUgb2xkIDxi
cj4NCiZndDsgY3JlZGVudGlhbHMgZm9yIG1pZC1kaWFsb2cgcmVxdWVzdHMsIGJ1dCByZXF1aXJl
IHRoZSBuZXcgY3JlZGVudGlhbHMgZm9yIDxicj4NCiZndDsgYW55IG5ldyBkaWFsb2cgaW5pdGlh
dGluZyByZXF1ZXN0cy48YnI+DQo8YnI+DQpJJ20gbm90IGF3YXJlIG9mIGFueSByZWNvbW1lbmRh
dGlvbnMgaW4gdGhpcyByZWdhcmQuIEkgdGhpbmsgaXQgZmFsbHMgPGJyPg0KaW50byB0aGUgcmVh
bG0gb2YgcG9saWN5Ljxicj4NCjxicj4NCkFnYWluLCBJIGRvbid0IGtub3cgd2h5IHlvdSBhcmUg
YnJpbmdpbmcgdXAgcHJveGllcy48YnI+DQo8YnI+DQpCdXQgdGhlc2UgYXJlIGFsbCBzb21ld2hh
dCBvYnNjdXJlIGNhc2VzIGJhc2VkIG9uIGN1cnJlbnQgcHJhY3RpY2UuPGJyPg0KPGJyPg0KJm5i
c3A7ICZuYnNwOyAmbmJzcDsgJm5ic3A7IFRoYW5rcyw8YnI+DQombmJzcDsgJm5ic3A7ICZuYnNw
OyAmbmJzcDsgUGF1bDxvOnA+PC9vOnA+PC9wPg0KPC9ibG9ja3F1b3RlPg0KPC9kaXY+DQo8L2Rp
dj4NCjwvYm9keT4NCjwvaHRtbD4NCg==

--_000_85E3FC18351F445FAAB6414AF2B9B060ericssoncom_--


From nobody Sun May 26 23:46:33 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C215D1200CC for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 23:46:29 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 6o3e17pQfy50 for <sipcore@ietfa.amsl.com>; Sun, 26 May 2019 23:46:27 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-eopbgr80057.outbound.protection.outlook.com [40.107.8.57]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5DEC412006D for <sipcore@ietf.org>; Sun, 26 May 2019 23:46:26 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=uYIwOEomRXr8dppArnMD5RV/GTNNKcwfGQurQMYHFJs=; b=d8K+xqGHAR+5aThV0Epq096x9dkyG0oWEganFd1OFXKDviuyhYb4P4Hvds6byVwBqf07eRoZrcIuts1OjmSKSvQULkIfFKcqvUqZ1EkwP61zBcXplXN+ZWJ6cIfcRDxwSd/DpFXX3Q3DRnR6Ms8ypaWmwAqpof7SozQwrolCWDg=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3275.eurprd07.prod.outlook.com (10.170.246.30) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Mon, 27 May 2019 06:46:24 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.007; Mon, 27 May 2019 06:46:24 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: "sipcore@ietf.org" <sipcore@ietf.org>
CC: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt - the qop issue
Thread-Index: AQHVFFfm3aLaJeutg0Sq97m6mcA5TA==
Date: Mon, 27 May 2019 06:46:24 +0000
Message-ID: <E17E7165-D7B6-4CBB-9E82-3B33B2D91636@ericsson.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 3b6903a5-8f7b-408a-6616-08d6e26f0969
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(5600148)(711020)(4605104)(1401327)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(2017052603328)(7193020); SRVR:HE1PR07MB3275; 
x-ms-traffictypediagnostic: HE1PR07MB3275:
x-microsoft-antispam-prvs: <HE1PR07MB3275AA37CEF25B63A330180C931D0@HE1PR07MB3275.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 0050CEFE70
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(366004)(136003)(396003)(376002)(346002)(18543002)(199004)(189003)(83716004)(71190400001)(71200400001)(2351001)(6436002)(478600001)(6506007)(6486002)(33656002)(229853002)(8936002)(5660300002)(58126008)(4744005)(81156014)(36756003)(66066001)(5640700003)(81166006)(14454004)(476003)(486006)(316002)(1730700003)(2501003)(8676002)(2616005)(68736007)(44832011)(256004)(73956011)(66946007)(66476007)(66556008)(64756008)(66446008)(76116006)(6916009)(6246003)(26005)(102836004)(86362001)(99286004)(186003)(6512007)(82746002)(14444005)(2906002)(7736002)(305945005)(25786009)(3846002)(6116002)(4326008)(53936002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3275; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: YzAf6y35T6SbDpsZnhbbSOMMmJmYDU6awZkpbSRoymnTjM5Vi5Aqegk/d7FZq9N1Pgqhk7jf0VbOsmv5a4Be+8FLKOpHPe0MVHPQp8K6dOu2WPbnFBTFyUJHJNk5ZkouWVDfelUy4ygT098Q6qv1vKi4ARsw7kXqDrJk+JYYHy0eM6+Ct9GB/2NoQhtFNV4VBcGeoZiGsf5x+TmIHVm/tzEJu7dL8/X42i+uxMFq/0VesEDrDn1+YTc+5+i00w2NO8f/oqW7IazirUXGEmTm4XRO6OYHFIHBJWolRorfOsw8e4uC/fWksF/wnAKyCOTT0w8yEPeLwIe1EIgIRJ4LRDx3IXY13hiJcJlI+diFKSUprnMZXaIKRWskpLhny4Q1c/ZJY43QVXtg44mPh9GVgTvoKbOUGV81wgCT/Dnzjas=
Content-Type: text/plain; charset="utf-8"
Content-ID: <A30642323BD50249BB8F950EA0136A42@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 3b6903a5-8f7b-408a-6616-08d6e26f0969
X-MS-Exchange-CrossTenant-originalarrivaltime: 27 May 2019 06:46:24.5394 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3275
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/L6Wsk9-CyVHsHKLe4hMCsJNM81g>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-03.txt - the qop issue
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Mon, 27 May 2019 06:46:30 -0000
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From nobody Tue May 28 06:23:49 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id 03A92120189; Tue, 28 May 2019 06:23:41 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155904982094.25633.5531308529328394499@ietfa.amsl.com>
Date: Tue, 28 May 2019 06:23:41 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/3k__dpyNAemVU9wJSFndVKA6sOU>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 13:23:41 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : The Session Initiation Protocol (SIP) Digest Authentication Scheme
        Author          : Rifaat Shekh-Yusef
	Filename        : draft-ietf-sipcore-digest-scheme-04.txt
	Pages           : 8
	Date            : 2019-05-28

Abstract:
   This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for more secure
   digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
   broken MD5 algorithm.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-04

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-04


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue May 28 06:28:50 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32C1E1201C9; Tue, 28 May 2019 06:28:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vCeqVKs87xtJ; Tue, 28 May 2019 06:28:47 -0700 (PDT)
Received: from mail-it1-x12e.google.com (mail-it1-x12e.google.com [IPv6:2607:f8b0:4864:20::12e]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8621912013D; Tue, 28 May 2019 06:28:47 -0700 (PDT)
Received: by mail-it1-x12e.google.com with SMTP id m3so4328343itl.1; Tue, 28 May 2019 06:28:47 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=lsS8iSuwqKPoqgAaf8MNkR5mWUEgWFwNKmSbUgY+jUg=; b=CsxCUoc3zH37hqvgkxiHPDETITrySUyq5Jr1g138GWoRB7IwV6odftrbRLL5KSwMSZ tzdDloBFjrhd+zTuBaCpkEQt5n6mTntMy41AhJOp2jeNWSvZ9ectrGCwwe6m+q5si6o3 tdZb3kRhfnrZ8v+bAh3J1oevqMLSp71tZdc1mD/1APLLSQbklRV6zU1D8zQtBunFbTNN yWWuCC2RV5vTwGTNC054EEgDMAT6HSJEdYBb/8nSlh0PIzBjnJutx38AXGS2dZOu90fn m0P/gg1E1mIFuhTUTaznYA3+qJIWVrKH+wbdodHOh7ehty7X+z58qH5kYI3pqL8XxP3c APuQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=lsS8iSuwqKPoqgAaf8MNkR5mWUEgWFwNKmSbUgY+jUg=; b=iXDwNJ3Qx0p/3B9koiEcuyfzeIZYakaYgSWEWHoKu45l6dGXVsv6Wd3fBPy6yBfC1P 2LvHA7lJ3IBP4gQgygf+Ff5/r6WJSYuoA3WRc3BAB/gIF6vEB94cOqXH4VK7aAtKgr7q H9j+fRAHesKA0ZHODGZjEuOOFJMFUiv8bdOXjLNOJQYNNkpplIUUddoDxEyeaV/bmPYx bGW7U79nHjQP/e9Y/ojuG9Oua/dgZiS5i3Gr2gxRXAa3wc6OwSKYsV/t4UpB8UtaCOWB WEylb6a+hoa5zQWj4WSLpqoTPa63BDsjFZogvs0DpGrabpZ4R228rlMMegDECTSqngfO hnTg==
X-Gm-Message-State: APjAAAXmbxbX+6eRzzs987mxV9lUFHKs1+05XMkfjZjZcjlHqPLrXf8d p+9zizKkdMT7FC9a7HL5Ty6cx32zcW4NYDGEYJqTCbwO
X-Google-Smtp-Source: APXvYqx7gfbXpxiruCCzcGVJkzTh4xTiRCUk3oZsRjjyZs6Co8OGarse5JXkPT7lwx4nBzFR/HlU4saaLWq737ScFMo=
X-Received: by 2002:a24:7fcf:: with SMTP id r198mr116882itc.145.1559050126208;  Tue, 28 May 2019 06:28:46 -0700 (PDT)
MIME-Version: 1.0
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com>
In-Reply-To: <155904982094.25633.5531308529328394499@ietfa.amsl.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 28 May 2019 09:28:32 -0400
Message-ID: <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com>
To: SIPCORE <sipcore@ietf.org>
Cc: i-d-announce@ietf.org
Content-Type: multipart/alternative; boundary="000000000000f5b57b0589f2a440"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/m9C1rK-BBUSxo_oDRlRFEEuOiOw>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 13:28:49 -0000

--000000000000f5b57b0589f2a440
Content-Type: text/plain; charset="UTF-8"

All,

I believe that I have addresses all the recent comments on v3.
Please, take a look and let me know if you have any further comments.

Regards,
 Rifaat


On Tue, May 28, 2019 at 9:25 AM <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : The Session Initiation Protocol (SIP) Digest
> Authentication Scheme
>         Author          : Rifaat Shekh-Yusef
>         Filename        : draft-ietf-sipcore-digest-scheme-04.txt
>         Pages           : 8
>         Date            : 2019-05-28
>
> Abstract:
>    This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for more secure
>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>    broken MD5 algorithm.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-04
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-04
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--000000000000f5b57b0589f2a440
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">All,<div><br></div><div>I believe that I have addresses al=
l the recent comments on v3.</div><div>Please, take a=C2=A0look and let me =
know if you have any further comments.</div><div><br></div><div>Regards,</d=
iv><div>=C2=A0Rifaat</div><div><br></div></div><br><div class=3D"gmail_quot=
e"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May 28, 2019 at 9:25 AM &l=
t;<a href=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&=
gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0=
px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-scheme-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-28<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-sipcore-digest-scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-iet=
f-sipcore-digest-scheme-04</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-04" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/html/draft-ietf-sipcore-digest-scheme-04</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-04" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?=
url2=3Ddraft-ietf-sipcore-digest-scheme-04</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>

--000000000000f5b57b0589f2a440--


From nobody Tue May 28 08:06:36 2019
Return-Path: <oej@edvina.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E30E01201F3; Tue, 28 May 2019 08:06:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.898
X-Spam-Level: 
X-Spam-Status: No, score=-1.898 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id W2gvjzX7NhKG; Tue, 28 May 2019 08:06:30 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 7E829120229; Tue, 28 May 2019 08:06:29 -0700 (PDT)
Received: from haworthia-20.webway.org (h-205-16.A165.corp.bahnhof.se [176.10.205.16]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id 0764D2480; Tue, 28 May 2019 17:06:26 +0200 (CEST)
From: "Olle E. Johansson" <oej@edvina.net>
Message-Id: <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_87B786AF-78BC-4537-B748-D2935A8E3921"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Tue, 28 May 2019 17:06:25 +0200
In-Reply-To: <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com>
Cc: Olle E Johansson <oej@edvina.net>, SIPCORE <sipcore@ietf.org>, i-d-announce@ietf.org
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com> <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/YadMgQEEziWeQJVLKJoPTjcyXrE>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 15:06:34 -0000

--Apple-Mail=_87B786AF-78BC-4537-B748-D2935A8E3921
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8

Thanks!
Many improvements, but :-)


Section 2.1:
" The Digest scheme has an 'algorithm' parameter that specifies the
   algorithm to be used to compute the digest of the response.  The IANA
   registry named "HTTP Digest Hash Algorithms" specifies the algorithms
   that correspond to 'algorithm' values, and specifies a priority for
   each algorithm.=E2=80=9D

I think many of us pointed out the lack of a priority in the registry.
Did I miss a discussion about it? Curious if there is indeed a priority =
somewhere.



/O
> On 28 May 2019, at 15:28, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> =
wrote:
>=20
> All,
>=20
> I believe that I have addresses all the recent comments on v3.
> Please, take a look and let me know if you have any further comments.
>=20
> Regards,
>  Rifaat
>=20
>=20
> On Tue, May 28, 2019 at 9:25 AM <internet-drafts@ietf.org =
<mailto:internet-drafts@ietf.org>> wrote:
>=20
> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
> This draft is a work item of the Session Initiation Protocol Core WG =
of the IETF.
>=20
>         Title           : The Session Initiation Protocol (SIP) Digest =
Authentication Scheme
>         Author          : Rifaat Shekh-Yusef
>         Filename        : draft-ietf-sipcore-digest-scheme-04.txt
>         Pages           : 8
>         Date            : 2019-05-28
>=20
> Abstract:
>    This document updates the Digest Access Authentication scheme used =
by
>    the Session Initiation Protocol (SIP) to add support for more =
secure
>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>    broken MD5 algorithm.
>=20
>=20
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/ =
<https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/>
>=20
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04 =
<https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04>
> =
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-04 =
<https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-04=
>
>=20
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-04 =
<https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-04>
>=20
>=20
> Please note that it may take a couple of minutes from the time of =
submission
> until the htmlized version and diff are available at tools.ietf.org =
<http://tools.ietf.org/>.
>=20
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/ =
<ftp://ftp.ietf.org/internet-drafts/>
>=20
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org <mailto:sipcore@ietf.org>
> https://www.ietf.org/mailman/listinfo/sipcore =
<https://www.ietf.org/mailman/listinfo/sipcore>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore


--Apple-Mail=_87B786AF-78BC-4537-B748-D2935A8E3921
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><div =
class=3D"">Thanks!</div><div class=3D"">Many improvements, but =
:-)</div><div class=3D""><br class=3D""></div><div class=3D""><br =
class=3D""></div>Section 2.1:<div class=3D"">"<span style=3D"font-size: =
13.333333015441895px;" class=3D""> The Digest scheme has an 'algorithm' =
parameter that specifies the</span><pre class=3D"newpage" =
style=3D"font-size: 13.333333015441895px; margin-top: 0px; =
margin-bottom: 0px; break-before: page;">   algorithm to be used to =
compute the digest of the response.  The IANA
   registry named "HTTP Digest Hash Algorithms" specifies the algorithms
   that correspond to 'algorithm' values, and specifies a priority for
   each algorithm.=E2=80=9D</pre><pre class=3D"newpage" =
style=3D"font-size: 13.333333015441895px; margin-top: 0px; =
margin-bottom: 0px; break-before: page;"><br class=3D""></pre><pre =
class=3D"newpage" style=3D"font-size: 13.333333015441895px; margin-top: =
0px; margin-bottom: 0px; break-before: page;">I think many of us pointed =
out the lack of a priority in the registry.</pre><pre class=3D"newpage" =
style=3D"font-size: 13.333333015441895px; margin-top: 0px; =
margin-bottom: 0px; break-before: page;">Did I miss a discussion about =
it? Curious if there is indeed a priority somewhere.</pre><pre =
class=3D"newpage" style=3D"font-size: 13.333333015441895px; margin-top: =
0px; margin-bottom: 0px; break-before: page;"><br class=3D""></pre><pre =
class=3D"newpage" style=3D"font-size: 13.333333015441895px; margin-top: =
0px; margin-bottom: 0px; break-before: page;"><br class=3D""></pre><pre =
class=3D"newpage" style=3D"font-size: 13.333333015441895px; margin-top: =
0px; margin-bottom: 0px; break-before: page;"><br class=3D""></pre><pre =
class=3D"newpage" style=3D"font-size: 13.333333015441895px; margin-top: =
0px; margin-bottom: 0px; break-before: page;">/O</pre><div><blockquote =
type=3D"cite" class=3D""><div class=3D"">On 28 May 2019, at 15:28, =
Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.ietf@gmail.com" =
class=3D"">rifaat.ietf@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"ltr" =
class=3D"">All,<div class=3D""><br class=3D""></div><div class=3D"">I =
believe that I have addresses all the recent comments on v3.</div><div =
class=3D"">Please, take a&nbsp;look and let me know if you have any =
further comments.</div><div class=3D""><br class=3D""></div><div =
class=3D"">Regards,</div><div class=3D"">&nbsp;Rifaat</div><div =
class=3D""><br class=3D""></div></div><br class=3D""><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May =
28, 2019 at 9:25 AM &lt;<a href=3D"mailto:internet-drafts@ietf.org" =
class=3D"">internet-drafts@ietf.org</a>&gt; wrote:<br =
class=3D""></div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex"><br class=3D"">
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br class=3D"">
This draft is a work item of the Session Initiation Protocol Core WG of =
the IETF.<br class=3D"">
<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;: The Session Initiation Protocol (SIP) Digest Authentication =
Scheme<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Author&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : =
Rifaat Shekh-Yusef<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Filename&nbsp; &nbsp; &nbsp; &nbsp; : =
draft-ietf-sipcore-digest-scheme-04.txt<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;: 8<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; : 2019-05-28<br class=3D"">
<br class=3D"">
Abstract:<br class=3D"">
&nbsp; &nbsp;This document updates the Digest Access Authentication =
scheme used by<br class=3D"">
&nbsp; &nbsp;the Session Initiation Protocol (SIP) to add support for =
more secure<br class=3D"">
&nbsp; &nbsp;digest algorithms, e.g.&nbsp; SHA-256 and SHA-512-256, to =
replace the<br class=3D"">
&nbsp; &nbsp;broken MD5 algorithm.<br class=3D"">
<br class=3D"">
<br class=3D"">
The IETF datatracker status page for this draft is:<br class=3D"">
<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/=
" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-sche=
me/</a><br class=3D"">
<br class=3D"">
There are also htmlized versions available at:<br class=3D"">
<a =
href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04=
</a><br class=3D"">
<a =
href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-sc=
heme-04" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest=
-scheme-04</a><br class=3D"">
<br class=3D"">
A diff from the previous version is available at:<br class=3D"">
<a =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sche=
me-04" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-s=
cheme-04</a><br class=3D"">
<br class=3D"">
<br class=3D"">
Please note that it may take a couple of minutes from the time of =
submission<br class=3D"">
until the htmlized version and diff are available at <a =
href=3D"http://tools.ietf.org/" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">tools.ietf.org</a>.<br class=3D"">
<br class=3D"">
Internet-Drafts are also available by anonymous FTP at:<br class=3D"">
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" =
target=3D"_blank" class=3D"">ftp://ftp.ietf.org/internet-drafts/</a><br =
class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sipcore mailing list<br class=3D"">
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank" =
class=3D"">sipcore@ietf.org</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore</a><br =
class=3D"">
</blockquote></div>
_______________________________________________<br class=3D"">sipcore =
mailing list<br class=3D""><a href=3D"mailto:sipcore@ietf.org" =
class=3D"">sipcore@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore<br =
class=3D""></div></blockquote></div><br class=3D""></div></body></html>=

--Apple-Mail=_87B786AF-78BC-4537-B748-D2935A8E3921--


From nobody Tue May 28 08:31:25 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id CB16F12020A; Tue, 28 May 2019 08:31:23 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155905748376.25697.10287747269016979905@ietfa.amsl.com>
Date: Tue, 28 May 2019 08:31:23 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/olCrxQUf0agJYMBQSKWVSsNaY1Y>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 15:31:24 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : Third-Party Token-based Authentication and Authorization for Session Initiation Protocol (SIP)
        Authors         : Rifaat Shekh-Yusef
                          Christer Holmberg
                          Victor Pascual
	Filename        : draft-ietf-sipcore-sip-token-authnz-00.txt
	Pages           : 8
	Date            : 2019-05-28

Abstract:
   This document defines a mechanism for SIP, that is based on the OAuth
   2.0 and OpenID Connect Core 1.0 specifications, to enable the
   delegation of the user authentication and SIP registration
   authorization to a dedicated third-party entity that is separate from
   the SIP network elements that provide the SIP service.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-authnz/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-sip-token-authnz-00
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-sip-token-authnz-00


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Tue May 28 09:59:15 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA049120198; Tue, 28 May 2019 09:59:13 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id KlMe0ftH8K9o; Tue, 28 May 2019 09:59:11 -0700 (PDT)
Received: from mail-it1-x133.google.com (mail-it1-x133.google.com [IPv6:2607:f8b0:4864:20::133]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A7BC71201E5; Tue, 28 May 2019 09:59:11 -0700 (PDT)
Received: by mail-it1-x133.google.com with SMTP id g24so5542168iti.5; Tue, 28 May 2019 09:59:11 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=Y7gqEQyEGM12FzU7QUGTfo68CzshpczaM63j5Lmh5sw=; b=A9fuMBllmiymqtJ7Urfz6aw3Pm7cU3maCqRtP07qD3G5pdrhV4jbVNl1h8kPrxAAYU J/q37YzrScoyg79+U6F+KmaqWmlvIWyORRlnBRFqClehH1WmZA+axRDADpVOQoa8Vt3K ryXIO2Tnb4efR+CSmwynYQxvWgz+OmBqkQSaDN6TKHdsU+ao1i49p7QsnQ1mKzdd9Ygw 7Jq3dsqKDTddESEbMGKrwM5I0mBJjomVwGASrb91qkVNFzyVWxIV2ut9FhEYOc+6EskL S1yqkKBvbqginoIUVq7gBUFbDwWUAPTqa3Bl3Md+JUUGe8pfAWQLk7jRX0d6LYM7Aa/n i7CA==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=Y7gqEQyEGM12FzU7QUGTfo68CzshpczaM63j5Lmh5sw=; b=ZdiMIApDIqzSVJJ+/8sLQQO9B8R6ZLj9/wcG7YHC3309csOjSaVWzsrMsRb7ZYPYGz 13P79B9zHwPxB6XTwU7fECdGf2qzlmjPWE6qxK/VY8Am6P7VBArdjKKPJLzqq8SxMUfp wCgKh+gm+A1g9qqJnwi4mUTX5AYkyEm9yXEq7sjt1xhYeZ5JywOe6e6751kZASsqGx7o sdPlb0F0Kwc3AVGoXh0ACMSDn/LXOsxfi+JnzqyxYSpb5elFxHAky5fHZ35vXpxrOBt8 RvNG68nMy1JCRfjX9uLR0lc6zdtjQr3Ax/XwBpIqMq31w6/KEX0UCt4G7wpyXVMhYBtD +iww==
X-Gm-Message-State: APjAAAWhTmtz1IVwdaSmShWV8Suo3SKjMIaPQIje32uLmGaV9txCCDOS Bphr+4+s9XJ+HRRt/TdpuTNEhvsA3l37ACVJMZHjUj6tuFc=
X-Google-Smtp-Source: APXvYqw45azlxU2Us/x/R1QlTIrCl3F/PbSSC9KPagF+dq8SgwN76c2Un9HuoeTm6q688VsSefn4YZujQ0WZRpb8jwg=
X-Received: by 2002:a24:19cd:: with SMTP id b196mr4169717itb.74.1559062750865;  Tue, 28 May 2019 09:59:10 -0700 (PDT)
MIME-Version: 1.0
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com> <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com> <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net>
In-Reply-To: <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 28 May 2019 12:58:59 -0400
Message-ID: <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com>
To: "Olle E. Johansson" <oej@edvina.net>
Cc: SIPCORE <sipcore@ietf.org>, i-d-announce@ietf.org
Content-Type: multipart/alternative; boundary="00000000000072afea0589f59553"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Zkl8dhLRfxIQ0kZspKe_8rHf7Us>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 16:59:14 -0000

--00000000000072afea0589f59553
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

I believe that I have answered this question before, but here it is again:

I do not think that we need to explicitly prioritize the algorithms,
because every time you add new algorithm the priority will change.
It is up to the server to decide on the priority based on the
placement of the algorithm in the response.

Regards,
 Rifaat


On Tue, May 28, 2019 at 11:06 AM Olle E. Johansson <oej@edvina.net> wrote:

> Thanks!
> Many improvements, but :-)
>
>
> Section 2.1:
> " The Digest scheme has an 'algorithm' parameter that specifies the
>
>    algorithm to be used to compute the digest of the response.  The IANA
>    registry named "HTTP Digest Hash Algorithms" specifies the algorithms
>    that correspond to 'algorithm' values, and specifies a priority for
>    each algorithm.=E2=80=9D
>
>
> I think many of us pointed out the lack of a priority in the registry.
>
> Did I miss a discussion about it? Curious if there is indeed a priority s=
omewhere.
>
>
>
>
> /O
>
> On 28 May 2019, at 15:28, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> wrote:
>
> All,
>
> I believe that I have addresses all the recent comments on v3.
> Please, take a look and let me know if you have any further comments.
>
> Regards,
>  Rifaat
>
>
> On Tue, May 28, 2019 at 9:25 AM <internet-drafts@ietf.org> wrote:
>
>>
>> A New Internet-Draft is available from the on-line Internet-Drafts
>> directories.
>> This draft is a work item of the Session Initiation Protocol Core WG of
>> the IETF.
>>
>>         Title           : The Session Initiation Protocol (SIP) Digest
>> Authentication Scheme
>>         Author          : Rifaat Shekh-Yusef
>>         Filename        : draft-ietf-sipcore-digest-scheme-04.txt
>>         Pages           : 8
>>         Date            : 2019-05-28
>>
>> Abstract:
>>    This document updates the Digest Access Authentication scheme used by
>>    the Session Initiation Protocol (SIP) to add support for more secure
>>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>>    broken MD5 algorithm.
>>
>>
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>>
>> There are also htmlized versions available at:
>> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04
>> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-0=
4
>>
>> A diff from the previous version is available at:
>> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-04
>>
>>
>> Please note that it may take a couple of minutes from the time of
>> submission
>> until the htmlized version and diff are available at tools.ietf.org.
>>
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/
>>
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org
>> https://www.ietf.org/mailman/listinfo/sipcore
>>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>
>

--00000000000072afea0589f59553
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">I believe that I have answered this=C2=A0question before, =
but here it is=C2=A0again:<div><font face=3D"arial, sans-serif"><br></font>=
</div><div><pre class=3D"gmail-wordwrap" style=3D"box-sizing:border-box;fon=
t-size:12.25px;margin-top:0px;margin-bottom:1rem;overflow:auto;color:rgb(33=
,37,41);white-space:pre-wrap;word-break:normal;padding:0px"><font face=3D"a=
rial, sans-serif">I do not think that we need to explicitly prioritize the =
algorithms, because every time you add new algorithm the priority will chan=
ge.
It is up to the server to decide on the priority based on the placement of =
the algorithm in the response.

Regards,
 Rifaat</font></pre></div></div><br><div class=3D"gmail_quote"><div dir=3D"=
ltr" class=3D"gmail_attr">On Tue, May 28, 2019 at 11:06 AM Olle E. Johansso=
n &lt;<a href=3D"mailto:oej@edvina.net">oej@edvina.net</a>&gt; wrote:<br></=
div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;bor=
der-left:1px solid rgb(204,204,204);padding-left:1ex"><div style=3D"overflo=
w-wrap: break-word;"><div>Thanks!</div><div>Many improvements, but :-)</div=
><div><br></div><div><br></div>Section 2.1:<div>&quot;<span style=3D"font-s=
ize:13.3333px"> The Digest scheme has an &#39;algorithm&#39; parameter that=
 specifies the</span><pre class=3D"gmail-m_-7343570338145030797newpage" sty=
le=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before:pag=
e">   algorithm to be used to compute the digest of the response.  The IANA
   registry named &quot;HTTP Digest Hash Algorithms&quot; specifies the alg=
orithms
   that correspond to &#39;algorithm&#39; values, and specifies a priority =
for
   each algorithm.=E2=80=9D</pre><pre class=3D"gmail-m_-7343570338145030797=
newpage" style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;brea=
k-before:page"><br></pre><pre class=3D"gmail-m_-7343570338145030797newpage"=
 style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page">I think many of us pointed out the lack of a priority in the registr=
y.</pre><pre class=3D"gmail-m_-7343570338145030797newpage" style=3D"font-si=
ze:13.3333px;margin-top:0px;margin-bottom:0px;break-before:page">Did I miss=
 a discussion about it? Curious if there is indeed a priority somewhere.</p=
re><pre class=3D"gmail-m_-7343570338145030797newpage" style=3D"font-size:13=
.3333px;margin-top:0px;margin-bottom:0px;break-before:page"><br></pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" style=3D"font-size:13.3333px;=
margin-top:0px;margin-bottom:0px;break-before:page"><br></pre><pre class=3D=
"gmail-m_-7343570338145030797newpage" style=3D"font-size:13.3333px;margin-t=
op:0px;margin-bottom:0px;break-before:page"><br></pre><pre class=3D"gmail-m=
_-7343570338145030797newpage" style=3D"font-size:13.3333px;margin-top:0px;m=
argin-bottom:0px;break-before:page">/O</pre><div><blockquote type=3D"cite">=
<div>On 28 May 2019, at 15:28, Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rif=
aat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt; wrote:<=
/div><br class=3D"gmail-m_-7343570338145030797Apple-interchange-newline"><d=
iv><div dir=3D"ltr">All,<div><br></div><div>I believe that I have addresses=
 all the recent comments on v3.</div><div>Please, take a=C2=A0look and let =
me know if you have any further comments.</div><div><br></div><div>Regards,=
</div><div>=C2=A0Rifaat</div><div><br></div></div><br><div class=3D"gmail_q=
uote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May 28, 2019 at 9:25 AM=
 &lt;<a href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank">internet=
-drafts@ietf.org</a>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);pa=
dding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-scheme-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-28<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-sipcore-digest-scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-iet=
f-sipcore-digest-scheme-04</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-04" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/html/draft-ietf-sipcore-digest-scheme-04</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-04" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?=
url2=3Ddraft-ietf-sipcore-digest-scheme-04</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org/" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>
_______________________________________________<br>sipcore mailing list<br>=
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br><a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_bla=
nk">https://www.ietf.org/mailman/listinfo/sipcore</a><br></div></blockquote=
></div><br></div></div></blockquote></div>

--00000000000072afea0589f59553--


From nobody Tue May 28 10:04:06 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3729120188 for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 10:04:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id AbW5hwGdkD-o for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 10:04:02 -0700 (PDT)
Received: from mail-it1-x136.google.com (mail-it1-x136.google.com [IPv6:2607:f8b0:4864:20::136]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 8E55312013D for <sipcore@ietf.org>; Tue, 28 May 2019 10:04:02 -0700 (PDT)
Received: by mail-it1-x136.google.com with SMTP id m3so5603886itl.1 for <sipcore@ietf.org>; Tue, 28 May 2019 10:04:02 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=PPHqPdtzchnUEggWwtj/2lKBjg2w4tIgkDEvU69ExoQ=; b=BB0E2yzj/GPN68CM0NU1FAMHyx7LGykYMXaR8j7OrrrXkuZgaz6Z/X+uPS0zfJbCLe lEZs2UNBhISVjEVKC4u4+jHojmtiG1O6iJck2Ku+B+EKm4ZFfHsg0o0a0s0qpqs3571d r1dQKlnq4ekhCV5J2TXn1EHEyTWuuSXmkMoXXEXsNg8R8cRIYywkXW1FgYmwX3wAAPQL ZYPacUK/REcPqlBfpvSu5cLqEavpxeuSnvNC5aoTUGvbMJ8rKj1DKmOfUMP32CCRwxDw l3nEmzewXPkhde9eUd3g5W00WgGoLhVtbK0xLHry+j5JC4+FAR88rn+b0R0UYMwHABhA KUWg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=PPHqPdtzchnUEggWwtj/2lKBjg2w4tIgkDEvU69ExoQ=; b=lw0iLHHVbl4WvgiJ42+0p4H9AnM2PODSOtUFCfMean2VmXhC1XB97+Dp4MTBteiVjo qKYKcS5hZPRcXWPQJXzQCquRd7/bFHJRdGbcKZp8stxqFYAco3z2y4MUKMzy+RSwRc7w +U6TmMjRdrKpnC2IdglYQEN6t2ApepDmecLWEm0sZvXw+RllTxPpaVj3o3uCWFOwNggZ Cho97alRZoD7PhnkPx3tsIuF6b6fccfRl+3FOQHDky0WsKqw6HfoJTObyXo8DpGqSmMM TSnZ2c2mCaMwWYoN/K2ALFioWcHSsZg4J27mBtmRm59vcwrWefRSw23kP9P13/jJxkpU A5Ow==
X-Gm-Message-State: APjAAAWp+kXvFrFUOOfxZYjlFOrQNJMRSBU8D3WF7XHcganjiTpcptCZ XaeNUEgk6c3aXY34qOFc5menrYi1y/05tTlhvGnmuW0F3UQ=
X-Google-Smtp-Source: APXvYqxTzHILzPEQSP4RlcxjBAtemOH49uuCd88eWJTUwTx0DiOv4Vt7jdIhw9BUaIuKnE2Gn8JP0B2MbkmAj+JrcXw=
X-Received: by 2002:a24:c241:: with SMTP id i62mr3744710itg.21.1559063041714;  Tue, 28 May 2019 10:04:01 -0700 (PDT)
MIME-Version: 1.0
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com>
In-Reply-To: <155905748376.25697.10287747269016979905@ietfa.amsl.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 28 May 2019 13:03:50 -0400
Message-ID: <CAGL6epKcPW55GDZ0f65okQoaoQbT8XWVAfXUMU2PUCY4fKqCTg@mail.gmail.com>
To: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c8aeba0589f5a631"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/JkeB4aTIPyrballA5CG9E3tpQGk>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 17:04:05 -0000

--000000000000c8aeba0589f5a631
Content-Type: text/plain; charset="UTF-8"

All,

We have just submitted this draft as one of the drafts that will replace
the draft-ietf-sipcore-sip-authn draft.
This is based on the discussion of separating the existing draft into two
new drafts that address the different use cases in the original draft.

Please, take a look and let us know what you think.

Regards,
 Rifaat


On Tue, May 28, 2019 at 11:31 AM <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : Third-Party Token-based Authentication and
> Authorization for Session Initiation Protocol (SIP)
>         Authors         : Rifaat Shekh-Yusef
>                           Christer Holmberg
>                           Victor Pascual
>         Filename        : draft-ietf-sipcore-sip-token-authnz-00.txt
>         Pages           : 8
>         Date            : 2019-05-28
>
> Abstract:
>    This document defines a mechanism for SIP, that is based on the OAuth
>    2.0 and OpenID Connect Core 1.0 specifications, to enable the
>    delegation of the user authentication and SIP registration
>    authorization to a dedicated third-party entity that is separate from
>    the SIP network elements that provide the SIP service.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-authnz/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-sip-token-authnz-00
>
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-sip-token-authnz-00
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--000000000000c8aeba0589f5a631
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">All,<div><br></div><div><div style=3D"color:rgb(0,0,0)">We=
 have just submitted this draft=C2=A0as one of the drafts that will replace=
 the=C2=A0draft-ietf-sipcore-sip-authn draft.</div><div style=3D"color:rgb(=
0,0,0)">This is based on the discussion of separating the existing draft in=
to two new drafts that address the different use cases in the original draf=
t.</div><div style=3D"color:rgb(0,0,0)"><br></div><div style=3D"color:rgb(0=
,0,0)">Please, take a look and=C2=A0let us know what you think.</div><div s=
tyle=3D"color:rgb(0,0,0)"><br></div><div style=3D"color:rgb(0,0,0)">Regards=
,</div><div style=3D"color:rgb(0,0,0)">=C2=A0Rifaat</div></div><div style=
=3D"color:rgb(0,0,0)"><br></div></div><br><div class=3D"gmail_quote"><div d=
ir=3D"ltr" class=3D"gmail_attr">On Tue, May 28, 2019 at 11:31 AM &lt;<a hre=
f=3D"mailto:internet-drafts@ietf.org">internet-drafts@ietf.org</a>&gt; wrot=
e:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0=
.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 Third-Party Token-based Authentication and Authorization for Session Initi=
ation Protocol (SIP)<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Authors=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Christer Holmberg<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Victor Pascual<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-sip-token-authnz-00.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-28<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document defines a mechanism for SIP, that is based on th=
e OAuth<br>
=C2=A0 =C2=A02.0 and OpenID Connect Core 1.0 specifications, to enable the<=
br>
=C2=A0 =C2=A0delegation of the user authentication and SIP registration<br>
=C2=A0 =C2=A0authorization to a dedicated third-party entity that is separa=
te from<br>
=C2=A0 =C2=A0the SIP network elements that provide the SIP service.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-au=
thnz/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/do=
c/draft-ietf-sipcore-sip-token-authnz/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-sip-token-authnz-=
00" rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-=
ietf-sipcore-sip-token-authnz-00</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-sip-tok=
en-authnz-00" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf=
.org/doc/html/draft-ietf-sipcore-sip-token-authnz-00</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>

--000000000000c8aeba0589f5a631--


From nobody Tue May 28 10:21:25 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 0D1BC1201E5; Tue, 28 May 2019 10:21:23 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id VihMpabDwRZW; Tue, 28 May 2019 10:21:20 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-eopbgr10074.outbound.protection.outlook.com [40.107.1.74]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 764F8120198; Tue, 28 May 2019 10:21:19 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=EML9f55n92DRIgr6DtGHbW8w3U0SWFuSEb2fuUiiHOU=; b=mw483fC+U7mGYbSqOC5K8wwQVpEsDS3TyAqkRUgzUPVXACbxksB3kxcd5cZys95meYaaSnQLl1vCdTh+FXkPOReYp/JlaZXitVUpJmtGTndSWPxScbQv0Xoagxg354yoy52QUplCv3dR7A7nbesdRsF5sxlGBIl+eA+6rZXP0Q8=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3481.eurprd07.prod.outlook.com (10.170.247.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.8; Tue, 28 May 2019 17:21:16 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.016; Tue, 28 May 2019 17:21:16 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, "Olle E. Johansson" <oej@edvina.net>
CC: SIPCORE <sipcore@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
Thread-Index: AQHVFVlSaTmSakHPYEGlsmWJ7Bzx+aaAoyOAgAAfc4CAADiDgA==
Date: Tue, 28 May 2019 17:21:16 +0000
Message-ID: <CE31190F-7E16-4623-9F3C-9FFE42558A19@ericsson.com>
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com> <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com> <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net> <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com>
In-Reply-To: <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [176.93.104.5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: efce852b-7883-457e-a0b3-08d6e390e44a
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3481; 
x-ms-traffictypediagnostic: HE1PR07MB3481:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <HE1PR07MB34816FD221DB0465E660FB79931E0@HE1PR07MB3481.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 00514A2FE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(346002)(376002)(39860400002)(396003)(136003)(366004)(189003)(199004)(18543002)(58126008)(76116006)(73956011)(83716004)(6306002)(316002)(54896002)(54906003)(6512007)(256004)(6486002)(14444005)(4326008)(102836004)(606006)(99286004)(966005)(71190400001)(110136005)(71200400001)(86362001)(76176011)(36756003)(508600001)(236005)(68736007)(6436002)(14454004)(26005)(66946007)(186003)(8936002)(81156014)(11346002)(446003)(81166006)(486006)(8676002)(476003)(44832011)(2616005)(7736002)(6116002)(5660300002)(53546011)(6506007)(6246003)(3846002)(25786009)(2906002)(66574012)(33656002)(82746002)(64756008)(66556008)(66476007)(66066001)(53936002)(66446008)(229853002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3481; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: V97cBWewhC+giIGAYVY3hNucwJwMqZGQuSx+sYrLXksXU9RjC08MutApBKuqkNwUHJJClsctsXbgfMUtKz/oxFVk3EcjRoLSNgnIzZmIPcA9i2bxU/QlH3KdPWNDSPBG/pFkDDmhE9BgtR9p2kQDqinQtS9JZwj7IUkQd5k8SMzdmc/kffJxco2i72oRgozOaqm4k6xkte03Z6UxTHuXAzt81OpicZ+xzeKO/wtSZUipWE5mJFkotJ9lS6iZl9E5Iemq3/JFOPdARxOMidR/4nzgDCe/fDkbbSWM6mqdNvF1rjVVC3CdRNp9tguHxk7P6gjY1QUTqG6VPwJs9VkF6n/WcqqKJZzCnxkbfy9XATmw/qfz79au3ArPHvAVFeBAnDvkLvQVKbYwNrIOxDRbFzhEfWGvXZ06MQVbXZBxa7I=
Content-Type: multipart/alternative; boundary="_000_CE31190F7E1646239F3C9FFE42558A19ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: efce852b-7883-457e-a0b3-08d6e390e44a
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2019 17:21:16.2696 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3481
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/NmqEeVY7PPVP-YfbsnPtLylAO7E>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 17:21:23 -0000

--_000_CE31190F7E1646239F3C9FFE42558A19ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64

SGksDQoNCkkgYWdyZWUgd2l0aCBSaWZhYXQuDQoNCkFsc28sIHdvdWxkIGl0IHJlYWxseSBiZSB3
aXRoaW4gdGhlIHNjb3BlIG9mIFNJUENPUkUgdG8gcHJpb3JpdGl6ZSB0aGUgYWxnb3JpdGhtcz8N
Cg0KUmVnYXJkcywNCg0KQ2hyaXN0ZXINCg0KRnJvbTogc2lwY29yZSA8c2lwY29yZS1ib3VuY2Vz
QGlldGYub3JnPiBvbiBiZWhhbGYgb2YgUmlmYWF0IFNoZWtoLVl1c2VmIDxyaWZhYXQuaWV0ZkBn
bWFpbC5jb20+DQpEYXRlOiBUdWVzZGF5LCAyOCBNYXkgMjAxOSBhdCAxOS41OQ0KVG86IE9sbGUg
Sm9oYW5zc29uIDxvZWpAZWR2aW5hLm5ldD4NCkNjOiAic2lwY29yZUBpZXRmLm9yZyIgPHNpcGNv
cmVAaWV0Zi5vcmc+LCAiaS1kLWFubm91bmNlQGlldGYub3JnIiA8aS1kLWFubm91bmNlQGlldGYu
b3JnPg0KU3ViamVjdDogUmU6IFtzaXBjb3JlXSBJLUQgQWN0aW9uOiBkcmFmdC1pZXRmLXNpcGNv
cmUtZGlnZXN0LXNjaGVtZS0wNC50eHQNCg0KSSBiZWxpZXZlIHRoYXQgSSBoYXZlIGFuc3dlcmVk
IHRoaXMgcXVlc3Rpb24gYmVmb3JlLCBidXQgaGVyZSBpdCBpcyBhZ2FpbjoNCg0KDQpJIGRvIG5v
dCB0aGluayB0aGF0IHdlIG5lZWQgdG8gZXhwbGljaXRseSBwcmlvcml0aXplIHRoZSBhbGdvcml0
aG1zLCBiZWNhdXNlIGV2ZXJ5IHRpbWUgeW91IGFkZCBuZXcgYWxnb3JpdGhtIHRoZSBwcmlvcml0
eSB3aWxsIGNoYW5nZS4NCg0KSXQgaXMgdXAgdG8gdGhlIHNlcnZlciB0byBkZWNpZGUgb24gdGhl
IHByaW9yaXR5IGJhc2VkIG9uIHRoZSBwbGFjZW1lbnQgb2YgdGhlIGFsZ29yaXRobSBpbiB0aGUg
cmVzcG9uc2UuDQoNCg0KDQpSZWdhcmRzLA0KDQogUmlmYWF0DQoNCk9uIFR1ZSwgTWF5IDI4LCAy
MDE5IGF0IDExOjA2IEFNIE9sbGUgRS4gSm9oYW5zc29uIDxvZWpAZWR2aW5hLm5ldDxtYWlsdG86
b2VqQGVkdmluYS5uZXQ+PiB3cm90ZToNClRoYW5rcyENCk1hbnkgaW1wcm92ZW1lbnRzLCBidXQg
Oi0pDQoNCg0KU2VjdGlvbiAyLjE6DQoiIFRoZSBEaWdlc3Qgc2NoZW1lIGhhcyBhbiAnYWxnb3Jp
dGhtJyBwYXJhbWV0ZXIgdGhhdCBzcGVjaWZpZXMgdGhlDQoNCiAgIGFsZ29yaXRobSB0byBiZSB1
c2VkIHRvIGNvbXB1dGUgdGhlIGRpZ2VzdCBvZiB0aGUgcmVzcG9uc2UuICBUaGUgSUFOQQ0KDQog
ICByZWdpc3RyeSBuYW1lZCAiSFRUUCBEaWdlc3QgSGFzaCBBbGdvcml0aG1zIiBzcGVjaWZpZXMg
dGhlIGFsZ29yaXRobXMNCg0KICAgdGhhdCBjb3JyZXNwb25kIHRvICdhbGdvcml0aG0nIHZhbHVl
cywgYW5kIHNwZWNpZmllcyBhIHByaW9yaXR5IGZvcg0KDQogICBlYWNoIGFsZ29yaXRobS7igJ0N
Cg0KDQoNCkkgdGhpbmsgbWFueSBvZiB1cyBwb2ludGVkIG91dCB0aGUgbGFjayBvZiBhIHByaW9y
aXR5IGluIHRoZSByZWdpc3RyeS4NCg0KRGlkIEkgbWlzcyBhIGRpc2N1c3Npb24gYWJvdXQgaXQ/
IEN1cmlvdXMgaWYgdGhlcmUgaXMgaW5kZWVkIGEgcHJpb3JpdHkgc29tZXdoZXJlLg0KDQoNCg0K
DQoNCg0KDQovTw0KT24gMjggTWF5IDIwMTksIGF0IDE1OjI4LCBSaWZhYXQgU2hla2gtWXVzZWYg
PHJpZmFhdC5pZXRmQGdtYWlsLmNvbTxtYWlsdG86cmlmYWF0LmlldGZAZ21haWwuY29tPj4gd3Jv
dGU6DQoNCkFsbCwNCg0KSSBiZWxpZXZlIHRoYXQgSSBoYXZlIGFkZHJlc3NlcyBhbGwgdGhlIHJl
Y2VudCBjb21tZW50cyBvbiB2My4NClBsZWFzZSwgdGFrZSBhIGxvb2sgYW5kIGxldCBtZSBrbm93
IGlmIHlvdSBoYXZlIGFueSBmdXJ0aGVyIGNvbW1lbnRzLg0KDQpSZWdhcmRzLA0KIFJpZmFhdA0K
DQoNCk9uIFR1ZSwgTWF5IDI4LCAyMDE5IGF0IDk6MjUgQU0gPGludGVybmV0LWRyYWZ0c0BpZXRm
Lm9yZzxtYWlsdG86aW50ZXJuZXQtZHJhZnRzQGlldGYub3JnPj4gd3JvdGU6DQoNCkEgTmV3IElu
dGVybmV0LURyYWZ0IGlzIGF2YWlsYWJsZSBmcm9tIHRoZSBvbi1saW5lIEludGVybmV0LURyYWZ0
cyBkaXJlY3Rvcmllcy4NClRoaXMgZHJhZnQgaXMgYSB3b3JrIGl0ZW0gb2YgdGhlIFNlc3Npb24g
SW5pdGlhdGlvbiBQcm90b2NvbCBDb3JlIFdHIG9mIHRoZSBJRVRGLg0KDQogICAgICAgIFRpdGxl
ICAgICAgICAgICA6IFRoZSBTZXNzaW9uIEluaXRpYXRpb24gUHJvdG9jb2wgKFNJUCkgRGlnZXN0
IEF1dGhlbnRpY2F0aW9uIFNjaGVtZQ0KICAgICAgICBBdXRob3IgICAgICAgICAgOiBSaWZhYXQg
U2hla2gtWXVzZWYNCiAgICAgICAgRmlsZW5hbWUgICAgICAgIDogZHJhZnQtaWV0Zi1zaXBjb3Jl
LWRpZ2VzdC1zY2hlbWUtMDQudHh0DQogICAgICAgIFBhZ2VzICAgICAgICAgICA6IDgNCiAgICAg
ICAgRGF0ZSAgICAgICAgICAgIDogMjAxOS0wNS0yOA0KDQpBYnN0cmFjdDoNCiAgIFRoaXMgZG9j
dW1lbnQgdXBkYXRlcyB0aGUgRGlnZXN0IEFjY2VzcyBBdXRoZW50aWNhdGlvbiBzY2hlbWUgdXNl
ZCBieQ0KICAgdGhlIFNlc3Npb24gSW5pdGlhdGlvbiBQcm90b2NvbCAoU0lQKSB0byBhZGQgc3Vw
cG9ydCBmb3IgbW9yZSBzZWN1cmUNCiAgIGRpZ2VzdCBhbGdvcml0aG1zLCBlLmcuICBTSEEtMjU2
IGFuZCBTSEEtNTEyLTI1NiwgdG8gcmVwbGFjZSB0aGUNCiAgIGJyb2tlbiBNRDUgYWxnb3JpdGht
Lg0KDQoNClRoZSBJRVRGIGRhdGF0cmFja2VyIHN0YXR1cyBwYWdlIGZvciB0aGlzIGRyYWZ0IGlz
Og0KaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvZHJhZnQtaWV0Zi1zaXBjb3JlLWRp
Z2VzdC1zY2hlbWUvDQoNClRoZXJlIGFyZSBhbHNvIGh0bWxpemVkIHZlcnNpb25zIGF2YWlsYWJs
ZSBhdDoNCmh0dHBzOi8vdG9vbHMuaWV0Zi5vcmcvaHRtbC9kcmFmdC1pZXRmLXNpcGNvcmUtZGln
ZXN0LXNjaGVtZS0wNA0KaHR0cHM6Ly9kYXRhdHJhY2tlci5pZXRmLm9yZy9kb2MvaHRtbC9kcmFm
dC1pZXRmLXNpcGNvcmUtZGlnZXN0LXNjaGVtZS0wNA0KDQpBIGRpZmYgZnJvbSB0aGUgcHJldmlv
dXMgdmVyc2lvbiBpcyBhdmFpbGFibGUgYXQ6DQpodHRwczovL3d3dy5pZXRmLm9yZy9yZmNkaWZm
P3VybDI9ZHJhZnQtaWV0Zi1zaXBjb3JlLWRpZ2VzdC1zY2hlbWUtMDQNCg0KDQpQbGVhc2Ugbm90
ZSB0aGF0IGl0IG1heSB0YWtlIGEgY291cGxlIG9mIG1pbnV0ZXMgZnJvbSB0aGUgdGltZSBvZiBz
dWJtaXNzaW9uDQp1bnRpbCB0aGUgaHRtbGl6ZWQgdmVyc2lvbiBhbmQgZGlmZiBhcmUgYXZhaWxh
YmxlIGF0IHRvb2xzLmlldGYub3JnPGh0dHA6Ly90b29scy5pZXRmLm9yZy8+Lg0KDQpJbnRlcm5l
dC1EcmFmdHMgYXJlIGFsc28gYXZhaWxhYmxlIGJ5IGFub255bW91cyBGVFAgYXQ6DQpmdHA6Ly9m
dHAuaWV0Zi5vcmcvaW50ZXJuZXQtZHJhZnRzLw0KDQpfX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fX19fX19fX19fXw0Kc2lwY29yZSBtYWlsaW5nIGxpc3QNCnNpcGNvcmVAaWV0
Zi5vcmc8bWFpbHRvOnNpcGNvcmVAaWV0Zi5vcmc+DQpodHRwczovL3d3dy5pZXRmLm9yZy9tYWls
bWFuL2xpc3RpbmZvL3NpcGNvcmUNCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f
X19fX19fX19fX19fDQpzaXBjb3JlIG1haWxpbmcgbGlzdA0Kc2lwY29yZUBpZXRmLm9yZzxtYWls
dG86c2lwY29yZUBpZXRmLm9yZz4NCmh0dHBzOi8vd3d3LmlldGYub3JnL21haWxtYW4vbGlzdGlu
Zm8vc2lwY29yZQ0KDQo=

--_000_CE31190F7E1646239F3C9FFE42558A19ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <591C3A9A6253674CA94F3AFD25498A3A@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_CE31190F7E1646239F3C9FFE42558A19ericssoncom_--


From nobody Tue May 28 10:26:35 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id ECBC6120104 for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 10:26:33 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kjAJl_oUEUWO for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 10:26:31 -0700 (PDT)
Received: from EUR02-HE1-obe.outbound.protection.outlook.com (mail-he1eur02on0601.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe05::601]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 4903C1200FA for <sipcore@ietf.org>; Tue, 28 May 2019 10:26:31 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hkQIIRUwWrRBaxwy2IeiIZqmyV+fXhO4mqfbRnfOK/I=; b=HNoSRbOubmDBd5Cc3GYBVpeT9p1oBY2klux8f1dmQqXnBiCc2cg7QA7p23Id9BJj8Glhs+JrKS5Q3IL8luLJ7SCRU65SlyrpT3qxoThY+VSVZ+5HF645xLQ9QaiP/iGnhgbwKgs/DiEDhYDhehLhsjyXpYN+/6yXqj19C9AVUeA=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3481.eurprd07.prod.outlook.com (10.170.247.152) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.8; Tue, 28 May 2019 17:26:26 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.016; Tue, 28 May 2019 17:26:26 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>, SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
Thread-Index: AQHVFWp0gg1fmQ2EoUCoIrqqxeWP1qaAw88AgAA4moA=
Date: Tue, 28 May 2019 17:26:26 +0000
Message-ID: <7FE4D8D8-A62E-4322-B87C-973CF77C1141@ericsson.com>
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <CAGL6epKcPW55GDZ0f65okQoaoQbT8XWVAfXUMU2PUCY4fKqCTg@mail.gmail.com>
In-Reply-To: <CAGL6epKcPW55GDZ0f65okQoaoQbT8XWVAfXUMU2PUCY4fKqCTg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [176.93.104.5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 831ecd11-6591-4e66-59dd-08d6e3919d07
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3481; 
x-ms-traffictypediagnostic: HE1PR07MB3481:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <HE1PR07MB348113BFF20DBF51EB9DAD78931E0@HE1PR07MB3481.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 00514A2FE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(366004)(136003)(396003)(39860400002)(376002)(346002)(189003)(199004)(81166006)(81156014)(8936002)(486006)(446003)(11346002)(2616005)(44832011)(476003)(8676002)(26005)(66946007)(53386004)(186003)(33656002)(82746002)(66574012)(229853002)(66476007)(66066001)(64756008)(66556008)(66446008)(53936002)(2906002)(6116002)(790700001)(7736002)(5660300002)(25786009)(3846002)(6506007)(53546011)(6246003)(6486002)(256004)(102836004)(606006)(73956011)(76116006)(58126008)(54896002)(316002)(6512007)(83716004)(6306002)(236005)(508600001)(36756003)(76176011)(14454004)(6436002)(68736007)(110136005)(71200400001)(71190400001)(966005)(99286004)(86362001); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3481; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 67jLXuS8gWsFFHmw5iRzD0o1G/ixwl71bq5pB/jM8Ua2K8Ap11sxyElDNf7sjgNRNFjNtuvGBm6rXvcsxTMZRbx+ICx/60k5+1RwP5fVsMgs4fgP/Wu7EqtTf4L887WBF8TEpN4NyK4FWDH2z2Ae70W9N16Z1PAijWIqHxEXzc6+r/j86VEWgSxRyaOKIiddGAEwII3EiIQ6mVWxW91ALGozWRcDFDUHzQKeaVJoXJ8DoW9pcShCFvixvi7asNm4gQLhj4EqtzMPy/bs9nyYXQ18mLGwZYCK48jTUO5J/wHVOTqci6PwDXJRY8Y3cmhXTFJyR726MITdB0bv3zOaWUtlnrD7OJNFxfkJfemVO0Gpa3m26JngCyWXubwrYGK49/nXrHPy8Cg5The1XFgn+9exKTCeQF4pIqfDX7RMbKo=
Content-Type: multipart/alternative; boundary="_000_7FE4D8D8A62E4322B87C973CF77C1141ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 831ecd11-6591-4e66-59dd-08d6e3919d07
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2019 17:26:26.1612 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3481
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/kjFQRJHBQJO1leSPiwb9EYWWokE>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 17:26:34 -0000

--_000_7FE4D8D8A62E4322B87C973CF77C1141ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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--_000_7FE4D8D8A62E4322B87C973CF77C1141ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <97F73CDDA83AE84F84759DA6943B905C@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_7FE4D8D8A62E4322B87C973CF77C1141ericssoncom_--


From nobody Tue May 28 10:39:21 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 47B30120048 for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 10:39:19 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id ISS9UoqrDIRq for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 10:39:16 -0700 (PDT)
Received: from mail-it1-x12b.google.com (mail-it1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 26B251200FA for <sipcore@ietf.org>; Tue, 28 May 2019 10:39:16 -0700 (PDT)
Received: by mail-it1-x12b.google.com with SMTP id t184so5766725itf.2 for <sipcore@ietf.org>; Tue, 28 May 2019 10:39:16 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=m9mE3AVYPvtYNNFM+KRyu/6Qz9vgLo7N7qGs31rEPIc=; b=NaK1S+R6mfI6DTLlD8VOHXXxpsjtQE2iGvx+uIriRGGx4nPFQilY1RruOnXhzRfD1j PCr+j4kxSgk2U+/caTd/Lvnt9Gl3dnCCgWIF5p88qEyuDwx7aSdt8P8KHRiRvgtpg6YF qwzHMwxeFMb57+o/nzk1MCq4v1JMe2xaNhutFEZNyD18/8WFogDmlvxpmYJ3ZINoo7TO 4HxrPbgAtleii6/cF74u5aiNWf86NjJCYeICF2THSN2HjseyHNYXLZuSjI4TPYzXZULk gYFdlnMj++anavxSZfmVs5JQZTM2YwbSySFmTxA3Z9ip9kW06tq7hK/YK7ZQIyup7oJD 2UYw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=m9mE3AVYPvtYNNFM+KRyu/6Qz9vgLo7N7qGs31rEPIc=; b=hAiAiSMZE0OFBll4q1rT9wYFK74q9Hw8cXzP5nObzhHE2YylmNMTcaIsFkgZk4oO9s KELLTHMvJ6sxMA5K4Lf9efdKOK54vHhCHwXhLILdiY/5TrNtAXXhwDqEIAT8JJP3BxCw PlrNN15xl9bDdfsg/eeLA2SgRd+wg4kZLGqmBmShZU8JD/GCfIWmZ2+SObN3j+TgYS/e IothSWl+dkZ/iR0OKNwPmZiE1JdS/9g5cvLrgNblAEmI0p+7G11kkXzW2+dk2z/8oCb/ C0enkhV/0DjlUrFD0z7FK52b63bFtaoEMy8+eOjDQsO1jieN1zBSGebqgdbOe/uA7//3 cOCQ==
X-Gm-Message-State: APjAAAWFBkRuIejPYXI4SGRDsHKBbedscWbTQzv8aqT2Q2T3cQZnGZcm KHSDwfxX2jPFIHtv2T/CA4T4wvG3g1rbm+D1Kdo=
X-Google-Smtp-Source: APXvYqx2C7tqIkLdG8dtT42r/jb6DDLUFCu6G1vwNFGERZyH1yEx83YphIp/jDwM571D/FJkpIVCyNfcGG1/W87XG0g=
X-Received: by 2002:a02:84e6:: with SMTP id f93mr7205126jai.73.1559065155283;  Tue, 28 May 2019 10:39:15 -0700 (PDT)
MIME-Version: 1.0
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <CAGL6epKcPW55GDZ0f65okQoaoQbT8XWVAfXUMU2PUCY4fKqCTg@mail.gmail.com> <7FE4D8D8-A62E-4322-B87C-973CF77C1141@ericsson.com>
In-Reply-To: <7FE4D8D8-A62E-4322-B87C-973CF77C1141@ericsson.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Tue, 28 May 2019 13:39:04 -0400
Message-ID: <CAGL6epJx4xYaZx1dtBuytRzBNgnWWxAMUGme7Re+n1Mi2KQsvg@mail.gmail.com>
To: Christer Holmberg <christer.holmberg@ericsson.com>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000c3302b0589f62445"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/Pn4hRlj2TSotvI0RP8FH-prwc2U>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 17:39:19 -0000

--000000000000c3302b0589f62445
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

There is some technical addition related to the type of token being issued
(JWT).
Also, the security section is still empty.
I would like to first hear from the WG about their view of the details of
the draft.

So, I do not think the draft is ready to go WGLC at this point.

Regards,
 Rifaat



On Tue, May 28, 2019 at 1:26 PM Christer Holmberg <
christer.holmberg@ericsson.com> wrote:

> Hi,
>
>
>
> As far as I know, there should not be anything technically new in this
> draft: it contains the stuff we agreed to move from draft-ietf-sipcore-si=
p-authn
> into a separate draft.
>
>
>
> So, my suggestion would be to give interested people a couple of weeks to
> refresh their minds what it=E2=80=99s all about, and if nothing major com=
es up then
> go for WGLC.
>
>
>
> Regards,
>
>
>
> Christer
>
>
>
> *From: *sipcore <sipcore-bounces@ietf.org> on behalf of Rifaat
> Shekh-Yusef <rifaat.ietf@gmail.com>
> *Date: *Tuesday, 28 May 2019 at 20.04
> *To: *"sipcore@ietf.org" <sipcore@ietf.org>
> *Subject: *Re: [sipcore] I-D Action:
> draft-ietf-sipcore-sip-token-authnz-00.txt
>
>
>
> All,
>
>
>
> We have just submitted this draft as one of the drafts that will replace
> the draft-ietf-sipcore-sip-authn draft.
>
> This is based on the discussion of separating the existing draft into two
> new drafts that address the different use cases in the original draft.
>
>
>
> Please, take a look and let us know what you think.
>
>
>
> Regards,
>
>  Rifaat
>
>
>
>
>
> On Tue, May 28, 2019 at 11:31 AM <internet-drafts@ietf.org> wrote:
>
>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : Third-Party Token-based Authentication and
> Authorization for Session Initiation Protocol (SIP)
>         Authors         : Rifaat Shekh-Yusef
>                           Christer Holmberg
>                           Victor Pascual
>         Filename        : draft-ietf-sipcore-sip-token-authnz-00.txt
>         Pages           : 8
>         Date            : 2019-05-28
>
> Abstract:
>    This document defines a mechanism for SIP, that is based on the OAuth
>    2.0 and OpenID Connect Core 1.0 specifications, to enable the
>    delegation of the user authentication and SIP registration
>    authorization to a dedicated third-party entity that is separate from
>    the SIP network elements that provide the SIP service.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-authnz/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-sip-token-authnz-00
>
> https://datatracker.ietf..org/doc/html/draft-ietf-sipcore-sip-token-authn=
z-00
> <https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-sip-token-authn=
z-00>
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>

--000000000000c3302b0589f62445
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr"><div>There is some technical addition related to the type =
of token being issued (JWT).</div><div>Also, the security section is still =
empty.</div><div>I would like to first hear from the WG about their view of=
 the details of the draft.</div><div><br></div><div>So, I do not think the =
draft is ready to go WGLC at this=C2=A0point.<div><br></div><div>Regards,</=
div><div>=C2=A0Rifaat</div><div><br><div><br></div></div></div></div><br><d=
iv class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May =
28, 2019 at 1:26 PM Christer Holmberg &lt;<a href=3D"mailto:christer.holmbe=
rg@ericsson.com">christer.holmberg@ericsson.com</a>&gt; wrote:<br></div><bl=
ockquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-lef=
t:1px solid rgb(204,204,204);padding-left:1ex">





<div lang=3D"FI">
<div class=3D"gmail-m_-4357202784474489964WordSection1">
<p class=3D"MsoNormal">Hi,<u></u><u></u></p>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US">As far as I know, there should =
not be anything technically new in this draft: it contains the stuff we agr=
eed to move from
</span><span lang=3D"EN-US" style=3D"color:black">draft-ietf-sipcore-sip-au=
thn into a separate draft.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black"><u></u>=
=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">So, my su=
ggestion would be to give interested people a couple of weeks to refresh th=
eir minds what it=E2=80=99s all about, and if nothing major comes up then g=
o for WGLC.<u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black"><u></u>=
=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">Regards,<=
u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black"><u></u>=
=C2=A0<u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US" style=3D"color:black">Christer<=
/span><span lang=3D"EN-US"><u></u><u></u></span></p>
<p class=3D"MsoNormal"><span lang=3D"EN-US"><u></u>=C2=A0<u></u></span></p>
<div style=3D"border-right:none;border-bottom:none;border-left:none;border-=
top:1pt solid rgb(181,196,223);padding:3pt 0cm 0cm">
<p class=3D"MsoNormal"><b><span style=3D"font-size:12pt;color:black">From: =
</span></b><span style=3D"font-size:12pt;color:black">sipcore &lt;<a href=
=3D"mailto:sipcore-bounces@ietf.org" target=3D"_blank">sipcore-bounces@ietf=
.org</a>&gt; on behalf of Rifaat Shekh-Yusef &lt;<a href=3D"mailto:rifaat.i=
etf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</a>&gt;<br>
<b>Date: </b>Tuesday, 28 May 2019 at 20.04<br>
<b>To: </b>&quot;<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipc=
ore@ietf.org</a>&quot; &lt;<a href=3D"mailto:sipcore@ietf.org" target=3D"_b=
lank">sipcore@ietf.org</a>&gt;<br>
<b>Subject: </b>Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-auth=
nz-00.txt<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<p class=3D"MsoNormal">All, <u></u><u></u></p>
<div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
</div>
<div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">We have just submitted t=
his draft=C2=A0as one of the drafts that will replace the=C2=A0draft-ietf-s=
ipcore-sip-authn draft.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">This is based on the dis=
cussion of separating the existing draft into two new drafts that address t=
he different use cases in the original draft.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><u></u>=C2=A0<u></u></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">Please, take a look and=
=C2=A0let us know what you think.<u></u><u></u></span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><u></u>=C2=A0<u></u></sp=
an></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">Regards,<u></u><u></u></=
span></p>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black">=C2=A0Rifaat<u></u><u></=
u></span></p>
</div>
</div>
<div>
<p class=3D"MsoNormal"><span style=3D"color:black"><u></u>=C2=A0<u></u></sp=
an></p>
</div>
</div>
<p class=3D"MsoNormal"><u></u>=C2=A0<u></u></p>
<div>
<div>
<p class=3D"MsoNormal">On Tue, May 28, 2019 at 11:31 AM &lt;<a href=3D"mail=
to:internet-drafts@ietf.org" target=3D"_blank">internet-drafts@ietf.org</a>=
&gt; wrote:<u></u><u></u></p>
</div>
<blockquote>
<p class=3D"MsoNormal"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 Third-Party Token-based Authentication and Authorization for Session Initi=
ation Protocol (SIP)<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Authors=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0: Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Christer Holmberg<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=
=A0 =C2=A0 =C2=A0 Victor Pascual<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-sip-token-authnz-00.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-28<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document defines a mechanism for SIP, that is based on th=
e OAuth<br>
=C2=A0 =C2=A02.0 and OpenID Connect Core 1.0 specifications, to enable the<=
br>
=C2=A0 =C2=A0delegation of the user authentication and SIP registration<br>
=C2=A0 =C2=A0authorization to a dedicated third-party entity that is separa=
te from<br>
=C2=A0 =C2=A0the SIP network elements that provide the SIP service.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-au=
thnz/" target=3D"_blank">https://datatracker.ietf.org/doc/draft-ietf-sipcor=
e-sip-token-authnz/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-sip-token-authnz-=
00" target=3D"_blank">https://tools.ietf.org/html/draft-ietf-sipcore-sip-to=
ken-authnz-00</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-sip-tok=
en-authnz-00" target=3D"_blank">https://datatracker.ietf..org/doc/html/draf=
t-ietf-sipcore-sip-token-authnz-00</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" target=3D"_blank">
tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" target=3D"_blank">ftp://ftp=
.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank"=
>https://www.ietf.org/mailman/listinfo/sipcore</a><u></u><u></u></p>
</blockquote>
</div>
</div>
</div>

</blockquote></div>

--000000000000c3302b0589f62445--


From nobody Tue May 28 11:42:33 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 054DA120121 for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 11:42:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.009
X-Spam-Level: 
X-Spam-Status: No, score=-2.009 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id s9fcPLhTtSxx for <sipcore@ietfa.amsl.com>; Tue, 28 May 2019 11:42:29 -0700 (PDT)
Received: from EUR02-VE1-obe.outbound.protection.outlook.com (mail-eopbgr20088.outbound.protection.outlook.com [40.107.2.88]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D7FD0120020 for <sipcore@ietf.org>; Tue, 28 May 2019 11:42:28 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=hJ0fCnhvmdYbsQsfazDAN9zCr15DrCPtpOLjF9hks4w=; b=E4tqQ/7Ku9Fp5RYZHHx/uZTkmZv0PUUBbgGejnMG4wdBk1jS+dxOrSq0CNlIZG8cs2PN5lFBJRCMAq/hm172E9lhBpR3mwCBnsPYmS5yYmM7IRGiYz9PtHO9T8fMDCH4osxtLSB+BiGF9RqpdkaM432x5FRv9IXNVTZTLYJLxaA=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3499.eurprd07.prod.outlook.com (10.170.247.158) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.10; Tue, 28 May 2019 18:42:25 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.016; Tue, 28 May 2019 18:42:25 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: SIPCORE <sipcore@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
Thread-Index: AQHVFWp0gg1fmQ2EoUCoIrqqxeWP1qaAw88AgAA4moD//9E+AIAAQ/6A
Date: Tue, 28 May 2019 18:42:25 +0000
Message-ID: <57658322-1400-4A23-AF47-2D2F32C1F4C4@ericsson.com>
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <CAGL6epKcPW55GDZ0f65okQoaoQbT8XWVAfXUMU2PUCY4fKqCTg@mail.gmail.com> <7FE4D8D8-A62E-4322-B87C-973CF77C1141@ericsson.com> <CAGL6epJx4xYaZx1dtBuytRzBNgnWWxAMUGme7Re+n1Mi2KQsvg@mail.gmail.com>
In-Reply-To: <CAGL6epJx4xYaZx1dtBuytRzBNgnWWxAMUGme7Re+n1Mi2KQsvg@mail.gmail.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [79.134.118.162]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 38992fc7-903e-4c5f-baeb-08d6e39c3aac
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3499; 
x-ms-traffictypediagnostic: HE1PR07MB3499:
x-ms-exchange-purlcount: 5
x-microsoft-antispam-prvs: <HE1PR07MB3499738829A8E86E8025D121931E0@HE1PR07MB3499.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:8882;
x-forefront-prvs: 00514A2FE6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(366004)(136003)(396003)(39860400002)(346002)(189003)(199004)(66066001)(6916009)(83716004)(14444005)(256004)(99286004)(3846002)(71200400001)(81166006)(7736002)(81156014)(8676002)(2906002)(71190400001)(68736007)(8936002)(58126008)(86362001)(25786009)(5660300002)(82746002)(2616005)(11346002)(486006)(508600001)(4326008)(446003)(53936002)(186003)(6486002)(53386004)(66946007)(66556008)(229853002)(6436002)(6246003)(76116006)(66476007)(66446008)(64756008)(33656002)(6116002)(76176011)(36756003)(606006)(53546011)(6506007)(102836004)(66574012)(44832011)(316002)(6512007)(54896002)(6306002)(26005)(236005)(14454004)(73956011)(476003)(966005); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3499; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; MX:1; A:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: xcAGipo4br+FuqkiQzHhZsI6tSQD7VDAOkVEXR/bKi1DQ3jfDP+hSDt4IXvH3xjjCjDs6+p18KklDCG/G7Qwli3xYemTxNvB4yNFw05DzuPvYXjm2dfOftvxWF2uYOgEFd/nLwgk1skfc6yJJ0/AhI6iAJY1BCCzK3rO30ajk6kZHImv+V0LWojI6Zct7NEYdeYl1ZLl7XDh+47CltI3EoZQbVvG9I15crqJNXbKh9NeRfDsQRH2/3zrojvkhml0TaJjIxN1Y8Ew7Rosm07RWWd6zoSEx5Rsr6M5E07MRfamlX2AG/FjnBkajieIKiy/6ra3patnEq38EueT4T+d6XGEtXc6xhr8+wJ0OlUI6oW8XFwuWdeF8JQVHcI3csq0xEbNxlhH3H1ZX4YCP9YjsDRKpKBEdv4NCuPQgX3LctA=
Content-Type: multipart/alternative; boundary="_000_5765832214004A23AF472D2F32C1F4C4ericssoncom_"
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 38992fc7-903e-4c5f-baeb-08d6e39c3aac
X-MS-Exchange-CrossTenant-originalarrivaltime: 28 May 2019 18:42:25.6876 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3499
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/2Am6qo6WJJy4N68ox4QOAcWnCf4>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 28 May 2019 18:42:32 -0000

--_000_5765832214004A23AF472D2F32C1F4C4ericssoncom_
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: base64
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==

--_000_5765832214004A23AF472D2F32C1F4C4ericssoncom_
Content-Type: text/html; charset="utf-8"
Content-ID: <4B61F50FEE8DCE4E84515787B2C7F55B@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
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--_000_5765832214004A23AF472D2F32C1F4C4ericssoncom_--


From nobody Tue May 28 23:39:41 2019
Return-Path: <oej@edvina.net>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id E0E4612008B; Tue, 28 May 2019 23:39:39 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.899
X-Spam-Level: 
X-Spam-Status: No, score=-1.899 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id pQN9opshI2F4; Tue, 28 May 2019 23:39:37 -0700 (PDT)
Received: from smtp7.webway.se (smtp7.webway.se [212.3.14.205]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A574212002E; Tue, 28 May 2019 23:39:35 -0700 (PDT)
Received: from [10.63.253.33] (194-161-218-6.ip.assaabloy.com [194.161.218.6]) (using TLSv1.2 with cipher DHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp7.webway.se (Postfix) with ESMTPSA id C73042480; Wed, 29 May 2019 08:39:29 +0200 (CEST)
From: "Olle E. Johansson" <oej@edvina.net>
Message-Id: <AED4BAB5-F55B-4F50-8D9F-22DC22AF1541@edvina.net>
Content-Type: multipart/alternative; boundary="Apple-Mail=_3B081649-BC38-4E6C-8FFD-4044E7BF540E"
Mime-Version: 1.0 (Mac OS X Mail 12.4 \(3445.104.11\))
Date: Wed, 29 May 2019 08:39:28 +0200
In-Reply-To: <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com>
Cc: Olle E Johansson <oej@edvina.net>, SIPCORE <sipcore@ietf.org>, i-d-announce@ietf.org
To: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com> <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com> <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net> <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com>
X-Mailer: Apple Mail (2.3445.104.11)
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/4khPm8vyaCPRC_K5OWBhnLLFtNY>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 06:39:40 -0000

--Apple-Mail=_3B081649-BC38-4E6C-8FFD-4044E7BF540E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/plain;
	charset=utf-8



> On 28 May 2019, at 18:58, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com> =
wrote:
>=20
> I believe that I have answered this question before, but here it is =
again:
>=20
> I do not think that we need to explicitly prioritize the algorithms, =
because every time you add new algorithm the priority will change.
> It is up to the server to decide on the priority based on the =
placement of the algorithm in the response.

Yes, I noticed that answer :-)
But the draft text still claims that the IANA registry =E2=80=9Cspecifies =
a priority=E2=80=9D

I suggest that we remove ", and specifies a priority for each =
algorithm=E2=80=9D from section 2.1.

/O
>=20
> Regards,
>  Rifaat
>=20
> On Tue, May 28, 2019 at 11:06 AM Olle E. Johansson <oej@edvina.net =
<mailto:oej@edvina.net>> wrote:
> Thanks!
> Many improvements, but :-)
>=20
>=20
> Section 2.1:
> " The Digest scheme has an 'algorithm' parameter that specifies the
>    algorithm to be used to compute the digest of the response.  The =
IANA
>    registry named "HTTP Digest Hash Algorithms" specifies the =
algorithms
>    that correspond to 'algorithm' values, and specifies a priority for
>    each algorithm.=E2=80=9D
>=20
> I think many of us pointed out the lack of a priority in the registry.
> Did I miss a discussion about it? Curious if there is indeed a =
priority somewhere.
>=20
>=20
>=20
> /O
>> On 28 May 2019, at 15:28, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com =
<mailto:rifaat.ietf@gmail.com>> wrote:
>>=20
>> All,
>>=20
>> I believe that I have addresses all the recent comments on v3.
>> Please, take a look and let me know if you have any further comments.
>>=20
>> Regards,
>>  Rifaat
>>=20
>>=20
>> On Tue, May 28, 2019 at 9:25 AM <internet-drafts@ietf.org =
<mailto:internet-drafts@ietf.org>> wrote:
>>=20
>> A New Internet-Draft is available from the on-line Internet-Drafts =
directories.
>> This draft is a work item of the Session Initiation Protocol Core WG =
of the IETF.
>>=20
>>         Title           : The Session Initiation Protocol (SIP) =
Digest Authentication Scheme
>>         Author          : Rifaat Shekh-Yusef
>>         Filename        : draft-ietf-sipcore-digest-scheme-04.txt
>>         Pages           : 8
>>         Date            : 2019-05-28
>>=20
>> Abstract:
>>    This document updates the Digest Access Authentication scheme used =
by
>>    the Session Initiation Protocol (SIP) to add support for more =
secure
>>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>>    broken MD5 algorithm.
>>=20
>>=20
>> The IETF datatracker status page for this draft is:
>> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/ =
<https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/>
>>=20
>> There are also htmlized versions available at:
>> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04 =
<https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04>
>> =
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-04 =
<https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-04=
>
>>=20
>> A diff from the previous version is available at:
>> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-04=
 <https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-04>=

>>=20
>>=20
>> Please note that it may take a couple of minutes from the time of =
submission
>> until the htmlized version and diff are available at tools.ietf.org =
<http://tools.ietf.org/>.
>>=20
>> Internet-Drafts are also available by anonymous FTP at:
>> ftp://ftp.ietf.org/internet-drafts/ =
<ftp://ftp.ietf.org/internet-drafts/>
>>=20
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org <mailto:sipcore@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sipcore =
<https://www.ietf.org/mailman/listinfo/sipcore>
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org <mailto:sipcore@ietf.org>
>> https://www.ietf.org/mailman/listinfo/sipcore =
<https://www.ietf.org/mailman/listinfo/sipcore>
>=20
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore


--Apple-Mail=_3B081649-BC38-4E6C-8FFD-4044E7BF540E
Content-Transfer-Encoding: quoted-printable
Content-Type: text/html;
	charset=utf-8

<html><head><meta http-equiv=3D"Content-Type" content=3D"text/html; =
charset=3Dutf-8"></head><body style=3D"word-wrap: break-word; =
-webkit-nbsp-mode: space; line-break: after-white-space;" class=3D""><br =
class=3D""><div><br class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On 28 May 2019, at 18:58, Rifaat Shekh-Yusef &lt;<a =
href=3D"mailto:rifaat.ietf@gmail.com" =
class=3D"">rifaat.ietf@gmail.com</a>&gt; wrote:</div><br =
class=3D"Apple-interchange-newline"><div class=3D""><div dir=3D"ltr" =
class=3D"">I believe that I have answered this&nbsp;question before, but =
here it is&nbsp;again:<div class=3D""><font face=3D"arial, sans-serif" =
class=3D""><br class=3D""></font></div><div class=3D""><pre =
class=3D"gmail-wordwrap" =
style=3D"box-sizing:border-box;font-size:12.25px;margin-top:0px;margin-bot=
tom:1rem;overflow:auto;color:rgb(33,37,41);white-space:pre-wrap;word-break=
:normal;padding:0px"><font face=3D"arial, sans-serif" class=3D"">I do =
not think that we need to explicitly prioritize the algorithms, because =
every time you add new algorithm the priority will change.
It is up to the server to decide on the priority based on the placement =
of the algorithm in the response.
</font></pre></div></div></div></blockquote><div><br class=3D""></div>Yes,=
 I noticed that answer :-)</div><div>But the draft text still claims =
that the IANA registry =E2=80=9Cspecifies a priority=E2=80=9D</div><div><b=
r class=3D""></div><div>I suggest that we remove "<span =
style=3D"font-size: 13.3333px;" class=3D"">, and specifies a priority =
for&nbsp;</span><font size=3D"2" class=3D"">each algorithm=E2=80=9D from =
section 2.1.</font></div><div class=3D""><br =
class=3D""></div><div>/O</div><div><blockquote type=3D"cite" =
class=3D""><div class=3D""><div dir=3D"ltr" class=3D""><div =
class=3D""><pre class=3D"gmail-wordwrap" =
style=3D"box-sizing:border-box;font-size:12.25px;margin-top:0px;margin-bot=
tom:1rem;overflow:auto;color:rgb(33,37,41);white-space:pre-wrap;word-break=
:normal;padding:0px"><font face=3D"arial, sans-serif" class=3D"">
Regards,
 Rifaat</font></pre></div></div><br class=3D""><div =
class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue, May =
28, 2019 at 11:06 AM Olle E. Johansson &lt;<a =
href=3D"mailto:oej@edvina.net" class=3D"">oej@edvina.net</a>&gt; =
wrote:<br class=3D""></div><blockquote class=3D"gmail_quote" =
style=3D"margin:0px 0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex"><div style=3D"overflow-wrap: =
break-word;" class=3D""><div class=3D"">Thanks!</div><div class=3D"">Many =
improvements, but :-)</div><div class=3D""><br class=3D""></div><div =
class=3D""><br class=3D""></div>Section 2.1:<div class=3D"">"<span =
style=3D"font-size:13.3333px" class=3D""> The Digest scheme has an =
'algorithm' parameter that specifies the</span><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page">   algorithm to be used to compute the digest of the response.  =
The IANA
   registry named "HTTP Digest Hash Algorithms" specifies the algorithms
   that correspond to 'algorithm' values, and specifies a priority for
   each algorithm.=E2=80=9D</pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page"><br class=3D""></pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page">I think many of us pointed out the lack of a priority in the =
registry.</pre><pre class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page">Did I miss a discussion about it? Curious if there is indeed a =
priority somewhere.</pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13..3333px;margin-top:0px;margin-bottom:0px;break-befor=
e:page"><br class=3D""></pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page"><br class=3D""></pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page"><br class=3D""></pre><pre =
class=3D"gmail-m_-7343570338145030797newpage" =
style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px;break-before=
:page">/O</pre><div class=3D""><blockquote type=3D"cite" class=3D""><div =
class=3D"">On 28 May 2019, at 15:28, Rifaat Shekh-Yusef &lt;<a =
href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank" =
class=3D"">rifaat.ietf@gmail.com</a>&gt; wrote:</div><br =
class=3D"gmail-m_-7343570338145030797Apple-interchange-newline"><div =
class=3D""><div dir=3D"ltr" class=3D"">All,<div class=3D""><br =
class=3D""></div><div class=3D"">I believe that I have addresses all the =
recent comments on v3.</div><div class=3D"">Please, take a&nbsp;look and =
let me know if you have any further comments.</div><div class=3D""><br =
class=3D""></div><div class=3D"">Regards,</div><div =
class=3D"">&nbsp;Rifaat</div><div class=3D""><br =
class=3D""></div></div><br class=3D""><div class=3D"gmail_quote"><div =
dir=3D"ltr" class=3D"gmail_attr">On Tue, May 28, 2019 at 9:25 AM &lt;<a =
href=3D"mailto:internet-drafts@ietf.org" target=3D"_blank" =
class=3D"">internet-drafts@ietf.org</a>&gt; wrote:<br =
class=3D""></div><blockquote class=3D"gmail_quote" style=3D"margin:0px =
0px 0px 0.8ex;border-left:1px solid =
rgb(204,204,204);padding-left:1ex"><br class=3D"">
A New Internet-Draft is available from the on-line Internet-Drafts =
directories.<br class=3D"">
This draft is a work item of the Session Initiation Protocol Core WG of =
the IETF.<br class=3D"">
<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Title&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;: The Session Initiation Protocol (SIP) Digest Authentication =
Scheme<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Author&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; : =
Rifaat Shekh-Yusef<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Filename&nbsp; &nbsp; &nbsp; &nbsp; : =
draft-ietf-sipcore-digest-scheme-04.txt<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Pages&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp;: 8<br class=3D"">
&nbsp; &nbsp; &nbsp; &nbsp; Date&nbsp; &nbsp; &nbsp; &nbsp; &nbsp; =
&nbsp; : 2019-05-28<br class=3D"">
<br class=3D"">
Abstract:<br class=3D"">
&nbsp; &nbsp;This document updates the Digest Access Authentication =
scheme used by<br class=3D"">
&nbsp; &nbsp;the Session Initiation Protocol (SIP) to add support for =
more secure<br class=3D"">
&nbsp; &nbsp;digest algorithms, e.g.&nbsp; SHA-256 and SHA-512-256, to =
replace the<br class=3D"">
&nbsp; &nbsp;broken MD5 algorithm.<br class=3D"">
<br class=3D"">
<br class=3D"">
The IETF datatracker status page for this draft is:<br class=3D"">
<a =
href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/=
" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-sche=
me/</a><br class=3D"">
<br class=3D"">
There are also htmlized versions available at:<br class=3D"">
<a =
href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04=
</a><br class=3D"">
<a =
href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-sc=
heme-04" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest=
-scheme-04</a><br class=3D"">
<br class=3D"">
A diff from the previous version is available at:<br class=3D"">
<a =
href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sche=
me-04" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-s=
cheme-04</a><br class=3D"">
<br class=3D"">
<br class=3D"">
Please note that it may take a couple of minutes from the time of =
submission<br class=3D"">
until the htmlized version and diff are available at <a =
href=3D"http://tools.ietf.org/" rel=3D"noreferrer" target=3D"_blank" =
class=3D"">tools.ietf.org</a>.<br class=3D"">
<br class=3D"">
Internet-Drafts are also available by anonymous FTP at:<br class=3D"">
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" =
target=3D"_blank" class=3D"">ftp://ftp.ietf.org/internet-drafts/</a><br =
class=3D"">
<br class=3D"">
_______________________________________________<br class=3D"">
sipcore mailing list<br class=3D"">
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank" =
class=3D"">sipcore@ietf.org</a><br class=3D"">
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" =
rel=3D"noreferrer" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore</a><br =
class=3D"">
</blockquote></div>
_______________________________________________<br class=3D"">sipcore =
mailing list<br class=3D""><a href=3D"mailto:sipcore@ietf.org" =
target=3D"_blank" class=3D"">sipcore@ietf.org</a><br class=3D""><a =
href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D"_blank" =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore</a><br =
class=3D""></div></blockquote></div><br =
class=3D""></div></div></blockquote></div>
_______________________________________________<br class=3D"">sipcore =
mailing list<br class=3D""><a href=3D"mailto:sipcore@ietf.org" =
class=3D"">sipcore@ietf.org</a><br =
class=3D"">https://www.ietf.org/mailman/listinfo/sipcore<br =
class=3D""></div></blockquote></div><br class=3D""></body></html>=

--Apple-Mail=_3B081649-BC38-4E6C-8FFD-4044E7BF540E--


From nobody Wed May 29 00:19:38 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1D91D120105; Wed, 29 May 2019 00:19:37 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id kK74Bk-T8IbJ; Wed, 29 May 2019 00:19:34 -0700 (PDT)
Received: from EUR04-VI1-obe.outbound.protection.outlook.com (mail-vi1eur04on0602.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe0e::602]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E2CFE120044; Wed, 29 May 2019 00:19:33 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=+izJKWwSQCBBuvU+TeljB9tFhAShPiyAtHdKadBOtLY=; b=l7j+Pdc7XOVyuWY85zO4i+jenki6gBvy3ildKla2YpvEVyDNuMEd+DaBVnXtXuMY/5um8g9F/B2h4JJ9rTfrxRmrrTw5mflj+BZ1zOj8pECAFNZBOtTW2ejWMgZUQXxnUpT2CMyeCicWGIKe6QFmSVz9kYsRGy5dU/HQLetKs7w=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3483.eurprd07.prod.outlook.com (10.170.247.154) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.14; Wed, 29 May 2019 07:19:22 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.016; Wed, 29 May 2019 07:19:21 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: "Olle E. Johansson" <oej@edvina.net>, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
CC: SIPCORE <sipcore@ietf.org>, "i-d-announce@ietf.org" <i-d-announce@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
Thread-Index: AQHVFVlSaTmSakHPYEGlsmWJ7Bzx+aaAoyOAgAAfc4CAAOU+AIAAPW+A
Date: Wed, 29 May 2019 07:19:21 +0000
Message-ID: <FC9A9E71-7D3F-4F4D-9899-E1C700A37EDD@ericsson.com>
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com> <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com> <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net> <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com> <AED4BAB5-F55B-4F50-8D9F-22DC22AF1541@edvina.net>
In-Reply-To: <AED4BAB5-F55B-4F50-8D9F-22DC22AF1541@edvina.net>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 4a06d6fe-fcac-4f3f-23cc-08d6e405f8d2
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3483; 
x-ms-traffictypediagnostic: HE1PR07MB3483:
x-ms-exchange-purlcount: 6
x-microsoft-antispam-prvs: <HE1PR07MB3483FCAB7230326B3B5814C2931F0@HE1PR07MB3483.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:9508;
x-forefront-prvs: 0052308DC6
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(376002)(346002)(39860400002)(366004)(136003)(396003)(18543002)(199004)(189003)(476003)(6436002)(5660300002)(8936002)(11346002)(2616005)(66574012)(71190400001)(33656002)(6116002)(3846002)(81166006)(81156014)(86362001)(229853002)(102836004)(36756003)(6506007)(83716004)(71200400001)(82746002)(508600001)(966005)(486006)(44832011)(6486002)(8676002)(2906002)(6306002)(446003)(6246003)(66946007)(4326008)(66476007)(25786009)(73956011)(6512007)(66446008)(76176011)(256004)(14444005)(76116006)(53546011)(26005)(186003)(58126008)(305945005)(14454004)(7736002)(68736007)(66066001)(64756008)(316002)(53936002)(110136005)(54906003)(66556008)(99286004); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3483; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 1cNUeKUZ39QAOz6NO4GpRyeCmzSdNUJT4C9p7qH3IEOLCIwnr7ifgto5+b8lRXioEQm8UVm7zn4fiKykL7PiKR10ph7Am526ULlj/H5N2CCnijK+Cs9ByXmxN+5w9hliwYW/VS/n9eHn3qHp5/qxeAFMOcVlPb5o1U7HWG1cclrDFDGOvtCADRZFHLrpsSLDMyTb3lDcvd+xbdEayEH3AkkrKB54mzsmcCG+0NS3pVKjv25mJs32hWwFAqfndDTC7/BMQE8IWG+0TGm81Zd9ZNphOaw+NJdg3//qNAJ/mpintLghlY1hpv0RbE0eYdr3jCzrLzv3b2XiEEukOy7095ZoxDf4dVmpsmk2HH+Qz08KZYgLOihQ+bP3E8X0hJ1O070wA9K3GBSqpMYpE+UOSs+MMFy/nUkZjQZDn+amC1U=
Content-Type: text/plain; charset="utf-8"
Content-ID: <FD533A2FA4CC3941ABDEEA9C9218A466@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 4a06d6fe-fcac-4f3f-23cc-08d6e405f8d2
X-MS-Exchange-CrossTenant-originalarrivaltime: 29 May 2019 07:19:21.8265 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3483
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/dVUXmhFwEXuD0y_hr_KwHt2-Jbk>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 07:19:37 -0000
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From nobody Wed May 29 03:53:58 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id CC0DF120072 for <sipcore@ietfa.amsl.com>; Wed, 29 May 2019 03:53:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.998
X-Spam-Level: 
X-Spam-Status: No, score=-1.998 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id OBuT0_Ev1Jvk for <sipcore@ietfa.amsl.com>; Wed, 29 May 2019 03:53:53 -0700 (PDT)
Received: from mail-it1-x134.google.com (mail-it1-x134.google.com [IPv6:2607:f8b0:4864:20::134]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5F9AA120092 for <sipcore@ietf.org>; Wed, 29 May 2019 03:53:53 -0700 (PDT)
Received: by mail-it1-x134.google.com with SMTP id t184so2954799itf.2 for <sipcore@ietf.org>; Wed, 29 May 2019 03:53:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=3Gik1IQRnIkrP4+IrNFHbpKNG90p+e4jB0HiUZAdC4I=; b=o9fMB90/+H8IEanHMQZU1c7y3BEZhnjsa5bZxXZVIHJ32QD7c49Rb8MB1klx2jvlUP AaZMy8w97+EGzEUD/rbb3JhOC8gaUN/DG2GBCmw7W6WuDXC0Wrm2A9/rMAJSbb9fxTNo WA+1Kbr7JNI4oTPgfszu2LUOvLcnEbL1Ls3Pyb2MhOWTJU+brODos2oumq/i9YPvHPlt 8wms0igQ0ztXQf6T/l3WGcyXn1fX+DSaBOIj2yNWIsBhMo/RB7Y4MSYw6g0ij4cUsJRr JKJaI1K8MjVaInz36zUMk/aQD7GMnPdEJZuM/0QB7UJLfV4MG6vDE6fI6nHAZX7ZL0wt XXxg==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=3Gik1IQRnIkrP4+IrNFHbpKNG90p+e4jB0HiUZAdC4I=; b=GRMl+r3aOWI4ibHJSVlFWFzwHOUpczfjyj2mwkmkk1mVkB5byVxmMpdlqbJVXgRQ7r xbEDmVOisOTatbkiXVV2coydNtPLcD+5VwQrpBbC53101o1dB3olx5b3CMlZpr0NPEHq 9rXFby5BggWtmDdNNTM41Mz+U8Q6XYSP5tVZOkchr8P5T3DynHC1ueAS51W5aKNeONg3 3BZFSev49Id+xP4VLQ6k//qpaFXuOnML3pOmnImgbONy/KR+X6FJ7YwhPxGoBcXgUZGD Lcqr9zetBav/oiscEe/V7yUodxiTyLa8RjtR0pW/Vjdgmu4dXUQN81s8/XNX4nJyTpV7 ofdA==
X-Gm-Message-State: APjAAAW1T5s2DPwqZlfrOCMGTRHGgWsOf0os78t628qsOho5pgRpOBOl IVYSlEc2hfmF6O8GlLv97NPAhZyhTY8JcT4hX7x+73E6
X-Google-Smtp-Source: APXvYqyKA5+H+mX9IN5fNieDZGSRk7NYbJCQqBgsVTRCXLNgaAk4qC8gJixjbGnO4v91HmD34bbvWFCPN+BH+ONY6tA=
X-Received: by 2002:a24:c241:: with SMTP id i62mr6399813itg.21.1559127232612;  Wed, 29 May 2019 03:53:52 -0700 (PDT)
MIME-Version: 1.0
Received: by 2002:a4f:cbc1:0:0:0:0:0 with HTTP; Wed, 29 May 2019 03:53:51 -0700 (PDT)
In-Reply-To: <AED4BAB5-F55B-4F50-8D9F-22DC22AF1541@edvina.net>
References: <155904982094.25633.5531308529328394499@ietfa.amsl.com> <CAGL6epLdVb95W5p+wx3cCk0EBkQ3hdXzJy=SNtO9MjSbRQDGvQ@mail.gmail.com> <B8CDE562-F154-42FC-A908-0D8F9A33E0D1@edvina.net> <CAGL6epKzuKOed=6V4K2rwM4_r1aNPHoRJmeE0x_J+Eh5u+2Vpw@mail.gmail.com> <AED4BAB5-F55B-4F50-8D9F-22DC22AF1541@edvina.net>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Wed, 29 May 2019 06:53:51 -0400
Message-ID: <CAGL6epJ_AMB8XtfAogSrf16krVo+JaHtu2G+kkAWc-iwk4i2gg@mail.gmail.com>
To: "Olle E. Johansson" <oej@edvina.net>
Cc: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="000000000000dc1079058a049824"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/sdfCQBVn_oknBIL6ToW5gZI5WcE>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-04.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 29 May 2019 10:53:56 -0000

--000000000000dc1079058a049824
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Ah, I missed that one. I will fix it. Thanks!


On Wednesday, May 29, 2019, Olle E. Johansson <oej@edvina.net> wrote:

>
>
> On 28 May 2019, at 18:58, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
> wrote:
>
> I believe that I have answered this question before, but here it is again=
:
>
> I do not think that we need to explicitly prioritize the algorithms, beca=
use every time you add new algorithm the priority will change.
> It is up to the server to decide on the priority based on the placement o=
f the algorithm in the response.
>
>
> Yes, I noticed that answer :-)
> But the draft text still claims that the IANA registry =E2=80=9Cspecifies=
 a
> priority=E2=80=9D
>
> I suggest that we remove ", and specifies a priority for each algorithm=
=E2=80=9D
> from section 2.1.
>
> /O
>
>
> Regards,
>  Rifaat
>
>
> On Tue, May 28, 2019 at 11:06 AM Olle E. Johansson <oej@edvina.net> wrote=
:
>
>> Thanks!
>> Many improvements, but :-)
>>
>>
>> Section 2.1:
>> " The Digest scheme has an 'algorithm' parameter that specifies the
>>
>>    algorithm to be used to compute the digest of the response.  The IANA
>>    registry named "HTTP Digest Hash Algorithms" specifies the algorithms
>>    that correspond to 'algorithm' values, and specifies a priority for
>>    each algorithm.=E2=80=9D
>>
>>
>> I think many of us pointed out the lack of a priority in the registry.
>>
>> Did I miss a discussion about it? Curious if there is indeed a priority =
somewhere.
>>
>>
>>
>>
>> /O
>>
>> On 28 May 2019, at 15:28, Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
>> wrote:
>>
>> All,
>>
>> I believe that I have addresses all the recent comments on v3.
>> Please, take a look and let me know if you have any further comments.
>>
>> Regards,
>>  Rifaat
>>
>>
>> On Tue, May 28, 2019 at 9:25 AM <internet-drafts@ietf.org> wrote:
>>
>>>
>>> A New Internet-Draft is available from the on-line Internet-Drafts
>>> directories.
>>> This draft is a work item of the Session Initiation Protocol Core WG of
>>> the IETF.
>>>
>>>         Title           : The Session Initiation Protocol (SIP) Digest
>>> Authentication Scheme
>>>         Author          : Rifaat Shekh-Yusef
>>>         Filename        : draft-ietf-sipcore-digest-scheme-04.txt
>>>         Pages           : 8
>>>         Date            : 2019-05-28
>>>
>>> Abstract:
>>>    This document updates the Digest Access Authentication scheme used b=
y
>>>    the Session Initiation Protocol (SIP) to add support for more secure
>>>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>>>    broken MD5 algorithm.
>>>
>>>
>>> The IETF datatracker status page for this draft is:
>>> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>>>
>>> There are also htmlized versions available at:
>>> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04
>>> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-
>>> digest-scheme-04
>>>
>>> A diff from the previous version is available at:
>>> https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-scheme-04
>>>
>>>
>>> Please note that it may take a couple of minutes from the time of
>>> submission
>>> until the htmlized version and diff are available at tools.ietf.org.
>>>
>>> Internet-Drafts are also available by anonymous FTP at:
>>> ftp://ftp.ietf.org/internet-drafts/
>>>
>>> _______________________________________________
>>> sipcore mailing list
>>> sipcore@ietf.org
>>> https://www.ietf.org/mailman/listinfo/sipcore
>>>
>> _______________________________________________
>> sipcore mailing list
>> sipcore@ietf.org
>> https://www.ietf.org/mailman/listinfo/sipcore
>>
>>
>> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>
>
>

--000000000000dc1079058a049824
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

Ah, I missed that one. I will fix it. Thanks!<div><br><div><div><br>On Wedn=
esday, May 29, 2019, Olle E. Johansson &lt;<a href=3D"mailto:oej@edvina.net=
">oej@edvina.net</a>&gt; wrote:<br><blockquote class=3D"gmail_quote" style=
=3D"margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex"><div sty=
le=3D"word-wrap:break-word;line-break:after-white-space"><br><div><br><bloc=
kquote type=3D"cite"><div>On 28 May 2019, at 18:58, Rifaat Shekh-Yusef &lt;=
<a href=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmai=
l.com</a>&gt; wrote:</div><br><div><div dir=3D"ltr">I believe that I have a=
nswered this=C2=A0question before, but here it is=C2=A0again:<div><font fac=
e=3D"arial, sans-serif"><br></font></div><div><pre style=3D"font-size:12.25=
px;margin-top:0px;margin-bottom:1rem;overflow:auto;color:rgb(33,37,41);whit=
e-space:pre-wrap;word-break:normal;padding:0px"><font face=3D"arial, sans-s=
erif">I do not think that we need to explicitly prioritize the algorithms, =
because every time you add new algorithm the priority will change.
It is up to the server to decide on the priority based on the placement of =
the algorithm in the response.
</font></pre></div></div></div></blockquote><div><br></div>Yes, I noticed t=
hat answer :-)</div><div>But the draft text still claims that the IANA regi=
stry =E2=80=9Cspecifies a priority=E2=80=9D</div><div><br></div><div>I sugg=
est that we remove &quot;<span style=3D"font-size:13.3333px">, and specifie=
s a priority for=C2=A0</span><font size=3D"2">each algorithm=E2=80=9D from =
section 2.1.</font></div><div><br></div><div>/O</div><div><blockquote type=
=3D"cite"><div><div dir=3D"ltr"><div><pre style=3D"font-size:12.25px;margin=
-top:0px;margin-bottom:1rem;overflow:auto;color:rgb(33,37,41);white-space:p=
re-wrap;word-break:normal;padding:0px"><font face=3D"arial, sans-serif">
Regards,
 Rifaat</font></pre></div></div><br><div class=3D"gmail_quote"><div dir=3D"=
ltr" class=3D"gmail_attr">On Tue, May 28, 2019 at 11:06 AM Olle E. Johansso=
n &lt;<a href=3D"mailto:oej@edvina.net" target=3D"_blank">oej@edvina.net</a=
>&gt; wrote:<br></div><blockquote class=3D"gmail_quote" style=3D"margin:0px=
 0px 0px 0.8ex;border-left:1px solid rgb(204,204,204);padding-left:1ex"><di=
v><div>Thanks!</div><div>Many improvements, but :-)</div><div><br></div><di=
v><br></div>Section 2.1:<div>&quot;<span style=3D"font-size:13.3333px"> The=
 Digest scheme has an &#39;algorithm&#39; parameter that specifies the</spa=
n><pre style=3D"font-size:13.3333px;margin-top:0px;margin-bottom:0px">   al=
gorithm to be used to compute the digest of the response.  The IANA
   registry named &quot;HTTP Digest Hash Algorithms&quot; specifies the alg=
orithms
   that correspond to &#39;algorithm&#39; values, and specifies a priority =
for
   each algorithm.=E2=80=9D</pre><pre style=3D"font-size:13.3333px;margin-t=
op:0px;margin-bottom:0px"><br></pre><pre style=3D"font-size:13.3333px;margi=
n-top:0px;margin-bottom:0px">I think many of us pointed out the lack of a p=
riority in the registry.</pre><pre style=3D"font-size:13.3333px;margin-top:=
0px;margin-bottom:0px">Did I miss a discussion about it? Curious if there i=
s indeed a priority somewhere.</pre><pre><br></pre><pre style=3D"font-size:=
13.3333px;margin-top:0px;margin-bottom:0px"><br></pre><pre style=3D"font-si=
ze:13.3333px;margin-top:0px;margin-bottom:0px"><br></pre><pre style=3D"font=
-size:13.3333px;margin-top:0px;margin-bottom:0px">/O</pre><div><blockquote =
type=3D"cite"><div>On 28 May 2019, at 15:28, Rifaat Shekh-Yusef &lt;<a href=
=3D"mailto:rifaat.ietf@gmail.com" target=3D"_blank">rifaat.ietf@gmail.com</=
a>&gt; wrote:</div><br><div><div dir=3D"ltr">All,<div><br></div><div>I beli=
eve that I have addresses all the recent comments on v3.</div><div>Please, =
take a=C2=A0look and let me know if you have any further comments.</div><di=
v><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div></div>=
<br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On Tue=
, May 28, 2019 at 9:25 AM &lt;<a href=3D"mailto:internet-drafts@ietf.org" t=
arget=3D"_blank">internet-drafts@ietf.org</a>&gt; wrote:<br></div><blockquo=
te class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:1px =
solid rgb(204,204,204);padding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-<wbr>scheme-04.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-28<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/<wbr>=
doc/draft-ietf-sipcore-digest-<wbr>scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-04"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/<wbr>draf=
t-ietf-sipcore-digest-<wbr>scheme-04</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-04" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/<wbr>doc/html/draft-ietf-sipcore-<wbr>digest-scheme-04</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-04" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?=
<wbr>url2=3Ddraft-ietf-sipcore-<wbr>digest-scheme-04</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org/" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-<wbr>drafts/</a><br>
<br>
______________________________<wbr>_________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/<wbr>listinfo/sipcore</a><=
br>
</blockquote></div>
______________________________<wbr>_________________<br>sipcore mailing lis=
t<br><a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org=
</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D=
"_blank">https://www.ietf.org/mailman/<wbr>listinfo/sipcore</a><br></div></=
blockquote></div><br></div></div></blockquote></div>
______________________________<wbr>_________________<br>sipcore mailing lis=
t<br><a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org=
</a><br><a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" target=3D=
"_blank">https://www.ietf.org/mailman/<wbr>listinfo/sipcore</a><br></div></=
blockquote></div><br></div></blockquote></div></div></div>

--000000000000dc1079058a049824--


From nobody Thu May 30 07:49:51 2019
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 7DA01120179 for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 07:49:49 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.199
X-Spam-Level: 
X-Spam-Status: No, score=-4.199 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 0zDpM8p1EKIW for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 07:49:47 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 6D2CA12011B for <sipcore@ietf.org>; Thu, 30 May 2019 07:49:47 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x4UEnjIG012585 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT) for <sipcore@ietf.org>; Thu, 30 May 2019 10:49:46 -0400
To: sipcore@ietf.org
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <655d9406-377f-ec0b-628a-67525abaf838@alum.mit.edu>
Date: Thu, 30 May 2019 10:49:45 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <155905748376.25697.10287747269016979905@ietfa.amsl.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/XzSoU2rCptXnfhRmJKEw7NYEWWo>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 14:49:50 -0000

What is the intent of this draft? Given the number of TODOs I gather it 
is sort of an indication of intent. It needs a lot more meat.

The overview assumes that the UA knows in advance, without being 
challenged, that the registrar uses this sort of authentication and that 
credentials should be obtained and presented in the first registration 
attempt.

That isn't the way authentication normally works in SIP. Rather, the UA 
would typically attempt to register first, be challenged (with 
WwW-Authenticate), then obtain needed credentials, and finally retry the 
registration with the credentials. It might be that the challenge would 
include *both* a Digest challenge and a Bearer challenge, allowing the 
UA and the user to choose.

So I would expect that to be the case here. It would change the call 
flow in the example, and would use a challenge carrying the new scheme.

The Syntax (section 3) shows a new definition of the Authorization 
header field with the proposed new scheme *instead* of the existing 
Digest scheme. Instead, I would expect to see you defining new values 
for 'auth-scheme' and 'auth-param'. (The mechanism for doing this needs 
discussion. I think it probably calls for a registry of schemes rather 
than changing the syntax.)

Section 4 says it describes syntax of a body, but it only gives an example.

	Thanks,
	Paul

On 5/28/19 11:31 AM, internet-drafts@ietf.org wrote:
> 
> A New Internet-Draft is available from the on-line Internet-Drafts directories.
> This draft is a work item of the Session Initiation Protocol Core WG of the IETF.
> 
>          Title           : Third-Party Token-based Authentication and Authorization for Session Initiation Protocol (SIP)
>          Authors         : Rifaat Shekh-Yusef
>                            Christer Holmberg
>                            Victor Pascual
> 	Filename        : draft-ietf-sipcore-sip-token-authnz-00.txt
> 	Pages           : 8
> 	Date            : 2019-05-28
> 
> Abstract:
>     This document defines a mechanism for SIP, that is based on the OAuth
>     2.0 and OpenID Connect Core 1.0 specifications, to enable the
>     delegation of the user authentication and SIP registration
>     authorization to a dedicated third-party entity that is separate from
>     the SIP network elements that provide the SIP service.
> 
> 
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-sip-token-authnz/
> 
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-sip-token-authnz-00
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-sip-token-authnz-00
> 
> 
> Please note that it may take a couple of minutes from the time of submission
> until the htmlized version and diff are available at tools.ietf.org.
> 
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
> 
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
> 


From nobody Thu May 30 11:18:54 2019
Return-Path: <internet-drafts@ietf.org>
X-Original-To: sipcore@ietf.org
Delivered-To: sipcore@ietfa.amsl.com
Received: from ietfa.amsl.com (localhost [IPv6:::1]) by ietfa.amsl.com (Postfix) with ESMTP id ED0F9120046; Thu, 30 May 2019 11:18:52 -0700 (PDT)
MIME-Version: 1.0
Content-Type: text/plain; charset="utf-8"
Content-Transfer-Encoding: 7bit
From: internet-drafts@ietf.org
To: <i-d-announce@ietf.org>
Cc: sipcore@ietf.org
X-Test-IDTracker: no
X-IETF-IDTracker: 6.97.0
Auto-Submitted: auto-generated
Precedence: bulk
Reply-To: sipcore@ietf.org
Message-ID: <155924033292.13480.5913919595872997776@ietfa.amsl.com>
Date: Thu, 30 May 2019 11:18:52 -0700
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/4EUC94tlj3SBTjd2p3Ac69hCGFk>
Subject: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-05.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 18:18:53 -0000

A New Internet-Draft is available from the on-line Internet-Drafts directories.
This draft is a work item of the Session Initiation Protocol Core WG of the IETF.

        Title           : The Session Initiation Protocol (SIP) Digest Authentication Scheme
        Author          : Rifaat Shekh-Yusef
	Filename        : draft-ietf-sipcore-digest-scheme-05.txt
	Pages           : 8
	Date            : 2019-05-30

Abstract:
   This document updates the Digest Access Authentication scheme used by
   the Session Initiation Protocol (SIP) to add support for more secure
   digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
   broken MD5 algorithm.


The IETF datatracker status page for this draft is:
https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/

There are also htmlized versions available at:
https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-05
https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-05

A diff from the previous version is available at:
https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-05


Please note that it may take a couple of minutes from the time of submission
until the htmlized version and diff are available at tools.ietf.org.

Internet-Drafts are also available by anonymous FTP at:
ftp://ftp.ietf.org/internet-drafts/


From nobody Thu May 30 11:20:57 2019
Return-Path: <rifaat.ietf@gmail.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id D927A12016D for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 11:20:55 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.997
X-Spam-Level: 
X-Spam-Status: No, score=-1.997 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_NONE=-0.0001, SPF_HELO_NONE=0.001, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=gmail.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id tP-_KH7npkfq for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 11:20:54 -0700 (PDT)
Received: from mail-it1-x12a.google.com (mail-it1-x12a.google.com [IPv6:2607:f8b0:4864:20::12a]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id E6B561200FD for <sipcore@ietf.org>; Thu, 30 May 2019 11:20:53 -0700 (PDT)
Received: by mail-it1-x12a.google.com with SMTP id a186so11545767itg.0 for <sipcore@ietf.org>; Thu, 30 May 2019 11:20:53 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;  h=mime-version:references:in-reply-to:from:date:message-id:subject:to;  bh=dnsbyLDeLRpyXQKCoYUkshI6zrzGM2qcSBlhUNMa8H0=; b=bj5dqKltYpJAOiGYT3qEaNRrVgmpTXJ7WRhqBPSLkES5KQVV4NTdbKB3PfGKpObFc7 vYM/u5RS19BpOkTJxpJRexE88C2EWsKD0ypO+62eKlgii5Fqo3REtE9YXkoPsWSV7xkH +WzYCBpJO3fn8wjc1Byte1S8Qy1j+d/Ndo03eTLtXQMcY2zSs+d5ol247v/ylah8LhBm +pXUSLkGuVI2LQIEzMzDyVc6kjyX//xccs3TRVSXZqT9t8WO1pMG512gGfb/7pNNEy1n xGTCfcJOJvoasPfbtdDDJ61APFyD+Vl4oyDGAFa3vptlTHAJKBNm3s8Gwwaw5Bl77KpA 4XaQ==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to; bh=dnsbyLDeLRpyXQKCoYUkshI6zrzGM2qcSBlhUNMa8H0=; b=GtSfVyJBRKmYQ8fkMfQefrwSOHvkCYyBu14uDIzyBFR8n/V2K5SO3Ch7kAqT8V3R0a JdswNjgph+7qhyaQ0QlQ8gVH+LkzyA4tQD3kh8Qrbj2dwTMILRc7qKGUfSNrYrVQUWMo zXMkGK3KavgCXDz0sT3F4bdreLWvsebuOesB648NzKq8Ph/QCqfmfMIPN0utwv+oklwY qz3CaNzwcjX8MsaNXMIjpcJzT5wcibe/GuGgFPbvzR7T1Tygvw/pK4Vr0+zSwj1rQree MNuVjPd1C9QBskOjc3FBFvBPpv2z1ehamxzULGnThp2hQjYt0pkrYeXfIhFqrhnEFeQ+ q+Bw==
X-Gm-Message-State: APjAAAW1hoGUz/BCNeRPXGeHkgSwW2D0tucZdp2NnGrCZCLnjCGcsMGX eppkwBIB+knygu9C1NKz2M/SObpSi2qipR7tGmDiy9+R
X-Google-Smtp-Source: APXvYqyhy2lgKQpIM3XdOvc6kwNxGrvX3+KQ36GLANkXyilREpyVC7TSUJcAJStFt2H+tnQiQ4hNWFzMoxAM9wzG6pY=
X-Received: by 2002:a02:5489:: with SMTP id t131mr1208557jaa.70.1559240452926;  Thu, 30 May 2019 11:20:52 -0700 (PDT)
MIME-Version: 1.0
References: <155924033292.13480.5913919595872997776@ietfa.amsl.com>
In-Reply-To: <155924033292.13480.5913919595872997776@ietfa.amsl.com>
From: Rifaat Shekh-Yusef <rifaat.ietf@gmail.com>
Date: Thu, 30 May 2019 14:20:42 -0400
Message-ID: <CAGL6epJGCkqRbZV1zkgEfW8S0=1X3uHUxOGG-EU0D5dwUp_h2A@mail.gmail.com>
To: SIPCORE <sipcore@ietf.org>
Content-Type: multipart/alternative; boundary="00000000000050eecb058a1ef51b"
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/jjuJtwAyhs_9gs1A2sF0NHLSK-I>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-digest-scheme-05.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 18:20:56 -0000

--00000000000050eecb058a1ef51b
Content-Type: text/plain; charset="UTF-8"

This new version addresses the last comment from Olle.
Please, take a look and let me know if you have any further comments.

Regards,
 Rifaat


On Thu, May 30, 2019 at 2:19 PM <internet-drafts@ietf.org> wrote:

>
> A New Internet-Draft is available from the on-line Internet-Drafts
> directories.
> This draft is a work item of the Session Initiation Protocol Core WG of
> the IETF.
>
>         Title           : The Session Initiation Protocol (SIP) Digest
> Authentication Scheme
>         Author          : Rifaat Shekh-Yusef
>         Filename        : draft-ietf-sipcore-digest-scheme-05.txt
>         Pages           : 8
>         Date            : 2019-05-30
>
> Abstract:
>    This document updates the Digest Access Authentication scheme used by
>    the Session Initiation Protocol (SIP) to add support for more secure
>    digest algorithms, e.g.  SHA-256 and SHA-512-256, to replace the
>    broken MD5 algorithm.
>
>
> The IETF datatracker status page for this draft is:
> https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-scheme/
>
> There are also htmlized versions available at:
> https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-05
> https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-scheme-05
>
> A diff from the previous version is available at:
> https://www.ietf.org/rfcdiff?url2=draft-ietf-sipcore-digest-scheme-05
>
>
> Please note that it may take a couple of minutes from the time of
> submission
> until the htmlized version and diff are available at tools.ietf.org.
>
> Internet-Drafts are also available by anonymous FTP at:
> ftp://ftp.ietf.org/internet-drafts/
>
> _______________________________________________
> sipcore mailing list
> sipcore@ietf.org
> https://www.ietf.org/mailman/listinfo/sipcore
>

--00000000000050eecb058a1ef51b
Content-Type: text/html; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable

<div dir=3D"ltr">This new version addresses the last comment from Olle.<div=
>Please, take a look and let me know if you have any further comments.</div=
><div><br></div><div>Regards,</div><div>=C2=A0Rifaat</div><div><br></div></=
div><br><div class=3D"gmail_quote"><div dir=3D"ltr" class=3D"gmail_attr">On=
 Thu, May 30, 2019 at 2:19 PM &lt;<a href=3D"mailto:internet-drafts@ietf.or=
g" target=3D"_blank">internet-drafts@ietf.org</a>&gt; wrote:<br></div><bloc=
kquote class=3D"gmail_quote" style=3D"margin:0px 0px 0px 0.8ex;border-left:=
1px solid rgb(204,204,204);padding-left:1ex"><br>
A New Internet-Draft is available from the on-line Internet-Drafts director=
ies.<br>
This draft is a work item of the Session Initiation Protocol Core WG of the=
 IETF.<br>
<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Title=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 The Session Initiation Protocol (SIP) Digest Authentication Scheme<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Author=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 : Rifa=
at Shekh-Yusef<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Filename=C2=A0 =C2=A0 =C2=A0 =C2=A0 : draft-iet=
f-sipcore-digest-scheme-05.txt<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Pages=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0:=
 8<br>
=C2=A0 =C2=A0 =C2=A0 =C2=A0 Date=C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 =C2=A0 :=
 2019-05-30<br>
<br>
Abstract:<br>
=C2=A0 =C2=A0This document updates the Digest Access Authentication scheme =
used by<br>
=C2=A0 =C2=A0the Session Initiation Protocol (SIP) to add support for more =
secure<br>
=C2=A0 =C2=A0digest algorithms, e.g.=C2=A0 SHA-256 and SHA-512-256, to repl=
ace the<br>
=C2=A0 =C2=A0broken MD5 algorithm.<br>
<br>
<br>
The IETF datatracker status page for this draft is:<br>
<a href=3D"https://datatracker.ietf.org/doc/draft-ietf-sipcore-digest-schem=
e/" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.org/doc/d=
raft-ietf-sipcore-digest-scheme/</a><br>
<br>
There are also htmlized versions available at:<br>
<a href=3D"https://tools.ietf.org/html/draft-ietf-sipcore-digest-scheme-05"=
 rel=3D"noreferrer" target=3D"_blank">https://tools.ietf.org/html/draft-iet=
f-sipcore-digest-scheme-05</a><br>
<a href=3D"https://datatracker.ietf.org/doc/html/draft-ietf-sipcore-digest-=
scheme-05" rel=3D"noreferrer" target=3D"_blank">https://datatracker.ietf.or=
g/doc/html/draft-ietf-sipcore-digest-scheme-05</a><br>
<br>
A diff from the previous version is available at:<br>
<a href=3D"https://www.ietf.org/rfcdiff?url2=3Ddraft-ietf-sipcore-digest-sc=
heme-05" rel=3D"noreferrer" target=3D"_blank">https://www.ietf.org/rfcdiff?=
url2=3Ddraft-ietf-sipcore-digest-scheme-05</a><br>
<br>
<br>
Please note that it may take a couple of minutes from the time of submissio=
n<br>
until the htmlized version and diff are available at <a href=3D"http://tool=
s.ietf.org" rel=3D"noreferrer" target=3D"_blank">tools.ietf.org</a>.<br>
<br>
Internet-Drafts are also available by anonymous FTP at:<br>
<a href=3D"ftp://ftp.ietf.org/internet-drafts/" rel=3D"noreferrer" target=
=3D"_blank">ftp://ftp.ietf.org/internet-drafts/</a><br>
<br>
_______________________________________________<br>
sipcore mailing list<br>
<a href=3D"mailto:sipcore@ietf.org" target=3D"_blank">sipcore@ietf.org</a><=
br>
<a href=3D"https://www.ietf.org/mailman/listinfo/sipcore" rel=3D"noreferrer=
" target=3D"_blank">https://www.ietf.org/mailman/listinfo/sipcore</a><br>
</blockquote></div>

--00000000000050eecb058a1ef51b--


From nobody Thu May 30 11:58:35 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 8CAD8120155 for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 11:58:32 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id CTIv-HhNFYSq for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 11:58:30 -0700 (PDT)
Received: from EUR01-VE1-obe.outbound.protection.outlook.com (mail-ve1eur01on0615.outbound.protection.outlook.com [IPv6:2a01:111:f400:fe1f::615]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id A380E120233 for <sipcore@ietf.org>; Thu, 30 May 2019 11:58:24 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=d+EkHpzUCNNzWFBhcj//RpbVnibbIymWQCE1eFz4jD8=; b=YFH6ISpooykNY/+7GVScasMa7qDs4dFiXpZZK8KIuDJlIQyDt/wbZqKDTNJqWBSRDHMuzSuEE/64MnO+NwFV5EhjCoY9fQaV0QPeope80ccnfOpTc5hlyawmsnFf7EPp/8OExNblyROWXiK09gs9ldMYsxqRBnsUQhMON6YEZ94=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3083.eurprd07.prod.outlook.com (10.170.244.157) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1943.13; Thu, 30 May 2019 18:58:22 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.016; Thu, 30 May 2019 18:58:21 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>, "sipcore@ietf.org" <sipcore@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
Thread-Index: AQHVFvbrgg1fmQ2EoUCoIrqqxeWP1qaEAYrg
Date: Thu, 30 May 2019 18:58:21 +0000
Message-ID: <HE1PR07MB316121B8CD8286E4A19DC6D193180@HE1PR07MB3161.eurprd07.prod.outlook.com>
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <655d9406-377f-ec0b-628a-67525abaf838@alum.mit.edu>
In-Reply-To: <655d9406-377f-ec0b-628a-67525abaf838@alum.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [176.93.104.5]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: fd9c2e70-a6d9-4909-5286-08d6e530c96b
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3083; 
x-ms-traffictypediagnostic: HE1PR07MB3083:
x-microsoft-antispam-prvs: <HE1PR07MB3083D83D9CE25D2BDDBE27A393180@HE1PR07MB3083.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00531FAC2C
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(136003)(376002)(346002)(396003)(39860400002)(366004)(199004)(189003)(9686003)(3846002)(2906002)(76116006)(66946007)(6116002)(73956011)(256004)(14444005)(81166006)(81156014)(8676002)(8936002)(446003)(11346002)(44832011)(6506007)(99286004)(5660300002)(68736007)(7696005)(486006)(76176011)(476003)(86362001)(6246003)(229853002)(102836004)(26005)(186003)(110136005)(25786009)(52536014)(74316002)(66066001)(55016002)(508600001)(66476007)(2501003)(6436002)(66556008)(316002)(14454004)(2171002)(64756008)(53936002)(66446008)(305945005)(7736002)(71200400001)(71190400001)(33656002); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3083; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: AMXAKxsIrVc65dZKYWqRiC1d7KUFJns3goj6l5x383F+Rsvq0uwa45Gis40jexAUDcNLOPRIqfEJ1rKByAG2NLciQ9lMIDWkMFd+IUuKFOLjkD+3CS0o5gPVar5zJvCt6nW+uvRg9JVFAAbx2poahwjSdCBIpB6KVJi1EnKW1wX433BQxA2GZrVVrFKB6EMoOxZbxDZwThnYu3Qa2VR3v2AQM+rBz4J+UJjJ+5W0YYICItc/rh6XQgi7RssTQXqmJ/+9cdevjH8mDrzRCNvhe3uGRAcXUbxNmwzs5uqXwmNYlwM969AHbL1t7SavLtr3c49rXh4T6OTUJXrxOJR0F8t+9yEJsGaO6KxU7Dw49I62UdrThmOjXUiafUWG8emRZGckKltMOC73UTsQCTOe6Q5BY09LLeZ2IPsy7j/Wk/Y=
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: quoted-printable
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: fd9c2e70-a6d9-4909-5286-08d6e530c96b
X-MS-Exchange-CrossTenant-originalarrivaltime: 30 May 2019 18:58:21.8809 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3083
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/a40gF-ltso2omopi8IrNwnsQ5NM>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 18:58:33 -0000

Hi Paul,

First, to give some background: As I mentioned earlier, note that is not so=
mething new. The solution was already documented in draft-ietf-sipcore-sip-=
authn, that has been around for years. That draft also contained some other=
 stuff, that people had issues with, so we decided to move non-issue parts =
into a separate draft. Section 4 is new stuff, though.

> What is the intent of this draft? Given the number of TODOs I gather it i=
s sort of an indication of intent. It needs a lot more meat.
>
> The overview assumes that the UA knows in advance, without being challeng=
ed, that the registrar uses this sort of authentication=20
> and that credentials should be obtained and presented in the first regist=
ration attempt.
>
>That isn't the way authentication normally works in SIP. Rather, the UA wo=
uld typically attempt to register first, be challenged (with WwW->Authentic=
ate), then obtain needed credentials, and finally retry the registration wi=
th the credentials. It might be that the challenge would include >*both* a =
Digest challenge and a Bearer challenge, allowing the UA and the user to ch=
oose.
>
>So I would expect that to be the case here. It would change the call flow =
in the example, and would use a challenge carrying the new scheme.

In some cases the UA WILL know (e.g., by means of configuration or specific=
ation) that the registrar supports it.

But, I agree that we can add some more text about the case when the UA does=
 not know.

>The Syntax (section 3) shows a new definition of the Authorization header =
field with the proposed new scheme *instead* of the existing Digest scheme.=
 >Instead, I would expect to see you defining new values for 'auth-scheme' =
and 'auth-param'. (The mechanism for doing this needs discussion. I think i=
t >probably calls for a registry of schemes rather than changing the syntax=
.)

The new scheme was used in draft-ietf-sipcore-sip-authn, and there are depl=
oyments based on that, so I would not like to change it at this point.

>Section 4 says it describes syntax of a body, but it only gives an example=
.

I agree. It also needs to specific (or at least reference) the MIME type.

Regards,

Christer



From nobody Thu May 30 13:43:06 2019
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 3F698120048 for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 13:43:04 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id INzHv-liGDZ3 for <sipcore@ietfa.amsl.com>; Thu, 30 May 2019 13:43:02 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D3DA2120153 for <sipcore@ietf.org>; Thu, 30 May 2019 13:43:01 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x4UKguA1006280 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Thu, 30 May 2019 16:42:57 -0400
To: Christer Holmberg <christer.holmberg@ericsson.com>, "sipcore@ietf.org" <sipcore@ietf.org>
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <655d9406-377f-ec0b-628a-67525abaf838@alum.mit.edu> <HE1PR07MB316121B8CD8286E4A19DC6D193180@HE1PR07MB3161.eurprd07.prod.outlook.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <2e6c6000-33ef-2225-7ae8-59a500e0e85a@alum.mit.edu>
Date: Thu, 30 May 2019 16:42:56 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <HE1PR07MB316121B8CD8286E4A19DC6D193180@HE1PR07MB3161.eurprd07.prod.outlook.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/g145obIwmU5v5Jkc8UNSo9f-_iU>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Thu, 30 May 2019 20:43:04 -0000

On 5/30/19 2:58 PM, Christer Holmberg wrote:
> Hi Paul,
> 
> First, to give some background: As I mentioned earlier, note that is not something new. The solution was already documented in draft-ietf-sipcore-sip-authn, that has been around for years.

Yes, I remember.

> That draft also contained some other stuff, that people had issues with, so we decided to move non-issue parts into a separate draft. Section 4 is new stuff, though.
> 
>> What is the intent of this draft? Given the number of TODOs I gather it is sort of an indication of intent. It needs a lot more meat.
>>
>> The overview assumes that the UA knows in advance, without being challenged, that the registrar uses this sort of authentication
>> and that credentials should be obtained and presented in the first registration attempt.
>>
>> That isn't the way authentication normally works in SIP. Rather, the UA would typically attempt to register first, be challenged (with WwW->Authenticate), then obtain needed credentials, and finally retry the registration with the credentials. It might be that the challenge would include >*both* a Digest challenge and a Bearer challenge, allowing the UA and the user to choose.
>>
>> So I would expect that to be the case here. It would change the call flow in the example, and would use a challenge carrying the new scheme.
> 
> In some cases the UA WILL know (e.g., by means of configuration or specification) that the registrar supports it.

Yes, but that is a degenerate form of the general case. Its true in 
Digest as well, but only for cached credentials, since with Digest you 
need the challenge to generate credentials. For this new form I guess 
that isn't true, but you *will* need to know whether the registrar uses 
the new form.

Also note that the draft currently doesn't define a way for a 
*challenge* to specify "Bearer". That is needed.

> But, I agree that we can add some more text about the case when the UA does not know.
> 
>> The Syntax (section 3) shows a new definition of the Authorization header field with the proposed new scheme *instead* of the existing Digest scheme. >Instead, I would expect to see you defining new values for 'auth-scheme' and 'auth-param'. (The mechanism for doing this needs discussion. I think it >probably calls for a registry of schemes rather than changing the syntax.)
> 
> The new scheme was used in draft-ietf-sipcore-sip-authn, and there are deployments based on that, so I would not like to change it at this point.

What is shown has ABNF of:

        Authorization = "Authorization" HCOLON "Bearer" LWS
                        "access_token" EQUAL access_token COMMA
                        "token_type" EQUAL token_type *(COMMA auth-param)

Note: "=", not "=/", so it can't be directly merged into the SDP ABNF. 
Minimum fix is to change to "=/". But since the existing SDP syntax has 
an extension point defined it is better to hook into that than to go 
around it. There is a need to ensure that the new syntax is backward 
compatible, so it must also match the existing extension syntax. I think 
the above does that, but still it is better to hook into what is there.

This won't change what usages match the syntax so there should be no 
compatibility issue.

Also note that the draft currentl

>> Section 4 says it describes syntax of a body, but it only gives an example.
> 
> I agree. It also needs to specific (or at least reference) the MIME type.

Good.

	Thanks,
	Paul


From nobody Fri May 31 00:13:37 2019
Return-Path: <christer.holmberg@ericsson.com>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id C3C3E12001B for <sipcore@ietfa.amsl.com>; Fri, 31 May 2019 00:13:35 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.011
X-Spam-Level: 
X-Spam-Status: No, score=-2.011 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RCVD_IN_DNSWL_NONE=-0.0001, SPF_PASS=-0.001, T_DKIMWL_WL_HIGH=-0.01] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (1024-bit key) header.d=ericsson.com
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id Z7uz4bqE0o17 for <sipcore@ietfa.amsl.com>; Fri, 31 May 2019 00:13:33 -0700 (PDT)
Received: from EUR03-DB5-obe.outbound.protection.outlook.com (mail-eopbgr40066.outbound.protection.outlook.com [40.107.4.66]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id D5609120048 for <sipcore@ietf.org>; Fri, 31 May 2019 00:13:32 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=ericsson.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=fSAKhDxisNnaTQbC/Uj1Pd1/AksTx5CtNFld5GQlRqQ=; b=Kv/F6096ZPlzIVMwafsDanZ9s3S3Kg/oadYKDe4JE+N6MMWTxG/Ckz1tS0ax2/V/03XWnNt//trhZtZ0LWi8Pxy4KCQfpQ6hlA7X00flnfNXXFqgZM26OUTXreGHnBZBxoFISbZ2ZCM67LAgcGsR87Cv3TYBjAYrLqd0C1uVPlU=
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com (10.170.245.23) by HE1PR07MB3356.eurprd07.prod.outlook.com (10.170.247.19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.1965.4; Fri, 31 May 2019 07:13:29 +0000
Received: from HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321]) by HE1PR07MB3161.eurprd07.prod.outlook.com ([fe80::c999:f848:9abc:d321%6]) with mapi id 15.20.1943.016; Fri, 31 May 2019 07:13:29 +0000
From: Christer Holmberg <christer.holmberg@ericsson.com>
To: Paul Kyzivat <pkyzivat@alum.mit.edu>, "sipcore@ietf.org" <sipcore@ietf.org>
Thread-Topic: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
Thread-Index: AQHVFvbrgg1fmQ2EoUCoIrqqxeWP1qaEAYrggAAhDQCAAOJ0gA==
Date: Fri, 31 May 2019 07:13:29 +0000
Message-ID: <A47719F2-FAD5-4A53-9D31-67726477AC0F@ericsson.com>
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <655d9406-377f-ec0b-628a-67525abaf838@alum.mit.edu> <HE1PR07MB316121B8CD8286E4A19DC6D193180@HE1PR07MB3161.eurprd07.prod.outlook.com> <2e6c6000-33ef-2225-7ae8-59a500e0e85a@alum.mit.edu>
In-Reply-To: <2e6c6000-33ef-2225-7ae8-59a500e0e85a@alum.mit.edu>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: 
X-MS-TNEF-Correlator: 
user-agent: Microsoft-MacOutlook/10.19.0.190512
authentication-results: spf=none (sender IP is ) smtp.mailfrom=christer.holmberg@ericsson.com; 
x-originating-ip: [89.166.49.243]
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 5bc29c44-77a3-443b-f641-08d6e5977ba1
x-microsoft-antispam: BCL:0; PCL:0; RULEID:(2390118)(7020095)(4652040)(8989299)(4534185)(4627221)(201703031133081)(201702281549075)(8990200)(5600148)(711020)(4605104)(1401327)(2017052603328)(7193020); SRVR:HE1PR07MB3356; 
x-ms-traffictypediagnostic: HE1PR07MB3356:
x-microsoft-antispam-prvs: <HE1PR07MB335617F077E0482CD7769D5693190@HE1PR07MB3356.eurprd07.prod.outlook.com>
x-ms-oob-tlc-oobclassifiers: OLM:10000;
x-forefront-prvs: 00540983E2
x-forefront-antispam-report: SFV:NSPM; SFS:(10009020)(39860400002)(136003)(346002)(376002)(366004)(396003)(199004)(189003)(73956011)(486006)(76116006)(2501003)(64756008)(66446008)(66556008)(66946007)(82746002)(186003)(26005)(2616005)(66066001)(476003)(6116002)(3846002)(66476007)(7736002)(11346002)(305945005)(446003)(256004)(14444005)(76176011)(6506007)(316002)(2906002)(6512007)(58126008)(110136005)(68736007)(6486002)(102836004)(99286004)(25786009)(6436002)(5660300002)(14454004)(229853002)(53936002)(71200400001)(71190400001)(36756003)(8676002)(2171002)(6246003)(83716004)(33656002)(86362001)(44832011)(508600001)(8936002)(81156014)(81166006); DIR:OUT; SFP:1101; SCL:1; SRVR:HE1PR07MB3356; H:HE1PR07MB3161.eurprd07.prod.outlook.com; FPR:; SPF:None; LANG:en; PTR:InfoNoRecords; A:1; MX:1; 
received-spf: None (protection.outlook.com: ericsson.com does not designate permitted sender hosts)
x-ms-exchange-senderadcheck: 1
x-microsoft-antispam-message-info: 1+cKzyvgV81SpFDlC2eSHcgXwN0BQgDvNN9mGETQALoLq6OvzYSaVq/e+irs4NHtExyxoe2rZ5FH+a+lmqzkhc5QswD/ist2F7cAkZfHBIGduvugPzlN5oJkhC4jswnumHvr9jVIeHng32T240sLYU88JK9Xo9WENPh2EgkHAUvN3OELPRfdIDPe5YDFX1DXZtEMZceyewv4iJhbYckymJIRJeFyOFcEb+AnJs+/gy2R0LF39ip/QAQupl/sHywpNUD08Z56OooiBinxujXx9QHXaRwb+cqNHD658f8cafuv/6POfWuQhjBQgwWiaDL9pUJ1ATmE1+4/I5mNgPkT29K1Yq1G3xoMrwK3k23vIyt+YJs3gptCZKAj+4TreZCI2/7Tq9w33Do2WA4EitUNAFPJokUPvjNcOqLUdX7XuFI=
Content-Type: text/plain; charset="utf-8"
Content-ID: <704E47AE59D8474EADC8970A7EA70902@eurprd07.prod.outlook.com>
Content-Transfer-Encoding: base64
MIME-Version: 1.0
X-OriginatorOrg: ericsson.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 5bc29c44-77a3-443b-f641-08d6e5977ba1
X-MS-Exchange-CrossTenant-originalarrivaltime: 31 May 2019 07:13:29.5298 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: 92e84ceb-fbfd-47ab-be52-080c6b87953f
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: christer.holmberg@ericsson.com
X-MS-Exchange-Transport-CrossTenantHeadersStamped: HE1PR07MB3356
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/m_vqEKCHiUhT27lxep4k47Y47QU>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 May 2019 07:13:36 -0000
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From nobody Fri May 31 08:22:36 2019
Return-Path: <pkyzivat@alum.mit.edu>
X-Original-To: sipcore@ietfa.amsl.com
Delivered-To: sipcore@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 1500812015B for <sipcore@ietfa.amsl.com>; Fri, 31 May 2019 08:22:34 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -4.2
X-Spam-Level: 
X-Spam-Status: No, score=-4.2 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, RCVD_IN_DNSWL_MED=-2.3, SPF_HELO_NONE=0.001, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id NlF8a4u1WzXC for <sipcore@ietfa.amsl.com>; Fri, 31 May 2019 08:22:32 -0700 (PDT)
Received: from outgoing-alum.mit.edu (outgoing-alum.mit.edu [18.7.68.33]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 428BB120194 for <sipcore@ietf.org>; Fri, 31 May 2019 08:22:31 -0700 (PDT)
Received: from PaulKyzivatsMBP.localdomain (c-24-62-227-142.hsd1.ma.comcast.net [24.62.227.142]) (authenticated bits=0) (User authenticated as pkyzivat@ALUM.MIT.EDU) by outgoing-alum.mit.edu (8.14.7/8.12.4) with ESMTP id x4VFMQCn012675 (version=TLSv1/SSLv3 cipher=AES128-SHA bits=128 verify=NOT); Fri, 31 May 2019 11:22:27 -0400
To: Christer Holmberg <christer.holmberg@ericsson.com>, "sipcore@ietf.org" <sipcore@ietf.org>
References: <155905748376.25697.10287747269016979905@ietfa.amsl.com> <655d9406-377f-ec0b-628a-67525abaf838@alum.mit.edu> <HE1PR07MB316121B8CD8286E4A19DC6D193180@HE1PR07MB3161.eurprd07.prod.outlook.com> <2e6c6000-33ef-2225-7ae8-59a500e0e85a@alum.mit.edu> <A47719F2-FAD5-4A53-9D31-67726477AC0F@ericsson.com>
From: Paul Kyzivat <pkyzivat@alum.mit.edu>
Message-ID: <822ab5ab-8d3e-2973-3b61-1c7cbc14b028@alum.mit.edu>
Date: Fri, 31 May 2019 11:22:26 -0400
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.10; rv:60.0) Gecko/20100101 Thunderbird/60.7.0
MIME-Version: 1.0
In-Reply-To: <A47719F2-FAD5-4A53-9D31-67726477AC0F@ericsson.com>
Content-Type: text/plain; charset=utf-8; format=flowed
Content-Language: en-US
Content-Transfer-Encoding: 7bit
Archived-At: <https://mailarchive.ietf.org/arch/msg/sipcore/-Dq7qHX43JovYJ3sJUldPW3eGkQ>
Subject: Re: [sipcore] I-D Action: draft-ietf-sipcore-sip-token-authnz-00.txt
X-BeenThere: sipcore@ietf.org
X-Mailman-Version: 2.1.29
Precedence: list
List-Id: SIP Core Working Group  <sipcore.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/sipcore>, <mailto:sipcore-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/sipcore/>
List-Post: <mailto:sipcore@ietf.org>
List-Help: <mailto:sipcore-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/sipcore>, <mailto:sipcore-request@ietf.org?subject=subscribe>
X-List-Received-Date: Fri, 31 May 2019 15:22:34 -0000

On 5/31/19 3:13 AM, Christer Holmberg wrote:
> Hi,
> 
> ...
>      
>>>>> The overview assumes that the UA knows in advance, without being challenged, that the registrar uses this sort of authentication
>>>>> and that credentials should be obtained and presented in the first registration attempt.
>>>>>
>>>>> That isn't the way authentication normally works in SIP. Rather, the UA would typically attempt to register first, be challenged (with WwW->Authenticate),
>>>>> then obtain needed credentials, and finally retry the registration with the credentials. It might be that the challenge would include >*both* a Digest challenge
>>>>> and a Bearer challenge, allowing the UA and the user to choose.
>>>>
>>>> So I would expect that to be the case here. It would change the call flow in the example, and would use a challenge carrying the new scheme.
> 
> I missed a part of this. There will not be a SIP challenge associated with the scheme. Any challenge will be between the UA and the Authorization Server, and that interface will typically be HTTPS.

I don't understand. If the registrar needs Bearer credentials, and a 
REGISTER is received that doesn't contain one, then surely it must 
challenge, indicating that what it wants are Bearer credentials.

Also, I would expect that there would be more to the challenge - that it 
would indicate what authority/authorities it will accept credentials 
from. E.g., Facebook, Google, ...

Following this, if the challenge indicated "Bearer", I would expect the 
UA to then ask its user to go though the handshake with the 
authentication server to get the credentials. Or, for Digest, to request 
a userid/password from the user.

(On the web, many places that require authentication present the user 
with both alternatives. I would expect the same here.)

> Once the UA gets the token from the Authorization Sever , it will include it in the SIP REGISTER request, and the "proxy" will check it with the Authorization Server. But, the "proxy" will not challenge the UA.

What if the credentials are invalid.

(I would not talk about the "proxy" here, as this gets entangled with 
Proxy-Authenticate. I would talk about the *registrar* challenging.)

> Of course, it should still be possible to reject a REGISTER request that does not carry a token to begin with - or a token that cannot be verified by the "proxy" - but I assume there are generic SIP procedures for that.

Yes there are - the registrar can challenge again 401. That is *the* way.

>>> In some cases the UA WILL know (e.g., by means of configuration or specification) that the registrar supports it.
>>     
>>     Yes, but that is a degenerate form of the general case. Its true in
>>     Digest as well, but only for cached credentials, since with Digest you
>>     need the challenge to generate credentials. For this new form I guess
>>     that isn't true, but you *will* need to know whether the registrar uses
>>     the new form.
>    
> Sure. But, even if the UA does not know, it can still try. It may be the only authentication mechanism the UA supports (in case of "web clients" etc).

Yes. If the UA has previously obtained credentials, perhaps for access 
to another target, it can preemptively try those for new targets. There 
is little to lose in doing so, as long as the server will challenge if 
they are wrong.

But if the UA doesn't have any credentials, then getting them will 
generally require a user interaction. So the UA isn't likely to want go 
through the process of getting a credential without knowing that doing 
so will be useful. And that it is getting them from the proper server.

>>     Also note that the draft currently doesn't define a way for a
>>     *challenge* to specify "Bearer". That is needed.
> 
> See my comment earlier.

And mine.

>>> But, I agree that we can add some more text about the case when the UA does not know.
>>>
>>>> The Syntax (section 3) shows a new definition of the Authorization header field with the proposed new scheme *instead* of the existing Digest scheme.
>>>> Instead, I would expect to see you defining new values for 'auth-scheme' and 'auth-param'. (The mechanism for doing this needs discussion. I think it
>>>> probably calls for a registry of schemes rather than changing the syntax.)
>>>
>>> The new scheme was used in draft-ietf-sipcore-sip-authn, and there are deployments based on that, so I would not like to change it at this point.
>>     
>>     What is shown has ABNF of:
>>     
>>             Authorization = "Authorization" HCOLON "Bearer" LWS
>>                             "access_token" EQUAL access_token COMMA
>>                             "token_type" EQUAL token_type *(COMMA auth-param)
>>     
>>     Note: "=", not "=/", so it can't be directly merged into the SDP ABNF.
>>     Minimum fix is to change to "=/". But since the existing SDP syntax has
>>     an extension point defined it is better to hook into that than to go
>>     around it. There is a need to ensure that the new syntax is backward
>>     compatible, so it must also match the existing extension syntax. I think
>>     the above does that, but still it is better to hook into what is there.
> 
> I assume you mean SIP, not SDP?

Yea, sorry. (I've been discussing SDP a lot recently.)

> The syntax of the extension hook ("other-response") is:
> 
> Authorization            =  "Authorization" HCOLON credentials
> credentials                 =  ("Digest" LWS digest-response) / other-response
> 
> other-response         =  auth-scheme LWS auth-param *(COMMA auth-param)
> auth-param               =  auth-param-name EQUAL ( token / quoted-string )
> auth-param-name   =  token
> 
> ...so, the "Bearer" syntax fits into that.

Yes. But the "=" is still totally wrong. And even with this changed to 
"=/" consider what it will look like when merged into the SIP syntax:

        Authorization =  "Authorization" HCOLON credentials
        credentials  =  ("Digest" LWS digest-response) / other-response

        other-response =  auth-scheme LWS auth-param *(COMMA auth-param)
        auth-param =  auth-param-name EQUAL ( token / quoted-string )
        auth-param-name   =  token

        Authorization =/ "Authorization" HCOLON "Bearer" LWS
                         "access_token" EQUAL access_token COMMA
                         "token_type" EQUAL token_type
                         *(COMMA auth-param)
        access_token = quoted-string
        token_type = quoted-string

Would you write it that way? There is a lot of duplication of common 
syntax, which is confusing.

Instead, I would be write (for the addition):

        credentials  =/ ("Bearer" LWS bearer-response)
        bearer-response = bearer-token COMMA bearer-token-type
        bearer-token = "access_token" EQUAL quoted-string
        bearer-token-type = "token_type" = quoted-string

(I've changed rule names to be less generic, more specific to this case. 
I also would prefer to change "access_token" and "token_type" to 
eliminate use of underscore and make them more specific to this case. 
Perhaps to the same names as I have used for the rules.)

In addition, there is need to extend 'challenge':

        challenge =/  ("Bearer" LWS bearer-cln *(COMMA bearer-cln))
        bearer-cln = realm

Here I am speculating a bit. At least you need the challenge to specify 
"Bearer". And then, as I noted above, I think you need to indicate which 
Authorization Server(s) are supported. I don't know how those should be 
identified. Here I'm just guessing by reusing "realm". It might instead 
be "domain", or something else.

>> Also note that the draft currentl

I forget. Ignore it.

	Thanks,
	Paul

