Dean Willis wrote:
Hisham Khartabil wrote:
This is somehow tied with Jonathan's thread related to retargetting
and downgrading from sips to sip (or upgrading). If we agree to
disallow both, then we are also disallowing what is being discussed in
this thread.

Not really.

Upgrading and Downgrading, in the context of Johnathan's argument, occur when a proxy which was presented a URI of one scheme changes it to the other scheme.

What the current text describes is that registration of a SIPS contact implicitly registers the equivalent SIP contact. This doesn't mean that any proxy can translate SIPS to SIP or SIP to SIPS. Instead, it means that a user who has registered just SIPS can receive both sorts of requests. If the request originates with SIP it will be delivered, just as it would if it originated SIPS.

So you could put both SIP and SIPS on your business card, and a caller could just pick one.

What I was worried about is what happens when a user who is given only a SIPS URI translates it to SIP and uses that to make a request. It may well be that the user was given only a SIPS URI because the called party really wants their incoming traffic secured. There's no way to COMPLETELY fix this, although it can be fixed from the serving proxy to UAS by either 1) use of outbound over TLS, or 2) going to a per-scheme registration as you propose.

So what I asked for is just additional guidance to the user to reinforce the idea that they should not make this mistake. Not that users are really governed by RFCs, but some of them will make fewer mistakes if this sort of guidance is given.

I don't think so. For one thing, its quite likely that there is no business card. The caller may well just guess the sip/sips address from an email address. And even if given a sips address, they might not understand what that is and mistype it as sip, or they might use sip because the client they are using doesn't support sips.

I don't see what harm is being done to the callee in this case. In normal cases he can detect that the call was placed via sip and simply refuse to answer. If there was any important info in the request that might have been observed, it is info of the *caller*, who knew he was making an insecure call.

        Paul

If a UAS wants to be contactable with over UDP or TCP/TLS, then it can
register with 2 contact headers.

Personally, I liked per-scheme registration. The WG didn't.

The reason I like it is that it removes the incentive to assume that a URI of a different scheme than the one you were given to use is likely to work. This makes mistakes less likely to happen.

--
Dean

_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to