<?xml version="1.0" encoding="iso-8859-1"?>
<!-- comment -->
<!DOCTYPE rfc SYSTEM "rfc2629.dtd"[]>
<?rfc toc="yes" ?>
<?rfc compact="yes" ?>
<?rfc sortrefs="no" ?>
<rfc ipr="trust200902" category="std" docName="draft-holmberg-dispatch-received-realm-04.txt" submissionType="IETF" xml:lang="en">
	<front>
		<title abbrev="received realm">
			Via header field parameter to indicate received realm
		</title>
		<author initials="C.H." surname="Holmberg" fullname="Christer Holmberg">
			<organization>Ericsson</organization>
			<address>
				<postal>
					<street>Hirsalantie 11</street>
					<code>02420</code>
					<city>Jorvas</city>
					<country>Finland</country>
				</postal>
				<email>christer.holmberg@ericsson.com</email>
			</address>
		</author>
		<author initials="J.Y." surname="Jiang" fullname="Yi Jiang ">
			<organization>China Mobile</organization>
			<address>
				<postal>
					<street> No.32 Xuanwumen West Street </street>
					<code> Xicheng District 100053</code>
					<city>Beijing</city>
					<country>P.R. China</country>
				</postal>
				<email>jiangyi@chinamobile.com</email>
			</address>
		</author>
		<date year="2016" />
		<area>Transport</area>
		<workgroup>SIPCORE Working Group</workgroup>
		<keyword>SIP</keyword>
		<keyword>Via</keyword>
		<keyword>transit</keyword>
		<keyword>realm</keyword>
		<abstract>
			<t>
				This specification defines a new Session Initiation Protocol (SIP)
				Via header field parameter, "received-realm", which allows a SIP entity acting
				as an entry point to a transit network to indicate from which adjacent upstream
				network a SIP request is received, using a network realm value associated
				with the adjacent network.
			</t>
		</abstract>
	</front>
	<middle>
		<section title="Introduction" toc="default">
			<section title="General" toc="default">
				<t>
					When SIP sessions are established between networks belonging to different
					operators, or between interconnected networks belonging to the same operator
					(or enterprise), the SIP requests might traverse transit network.
				</t>
				<t>
					Such transit networks might provide different kind of services. In order
					to do that, a transit network often needs to know to which operator
					(or enterprise) the adjacent upstream network, from which the SIP session
					initiation request is received, belongs.
				</t>
				<t>
					This specification defines a new Session Initiation Protocol (SIP)
					Via header field parameter, "received-realm", which allows a SIP entity acting
					as an entry point to a transit network to indicate from which adjacent upstream
					network a SIP request is received, using a network realm value associated
					with the adjacent network.
				</t>
				<t>
					NOTE: As the adjacent network can be an enterprise network, an Inter Operator
					Identifier (IOI) cannot be used to identity the network, as IOIs are not
					defined for enterprise networks.
				</t>
				<t>
					The following sections describe use-case where the information is needed.
				</t>
			</section>
			<section title="Use-Case: Transit Network Application Services" toc="default">
				<t>
					The 3rd Generation Partnership Project (3GPP) TS 23.228 specifies how an IP Multimedia Subsystem (IMS)
					network can be used to provide transit functionality. An operator can use its IMS
					network to provide transit functionality e.g. to non-IMS customers, to enterprise
					networks, and to other network operators.
				</t>
				<t>
					The transit network operator can provide application services to the networks
					for which it is providing transit functionality. Transit application services are
					typically not provided per user basis, as the transit network does not have access
					to the user profiles of the networks for which the application services are provided.
					Instead, the application services are provided per served network.
				</t>
				<t>
					When a SIP entity that provides application services (e.g. an Application Server)
					within a transit network receives a SIP request, in order to apply the correct
					services it needs to know the adjacent upstream network from which the SIP request
					is received.
				</t>
			</section>
			<section title="Use-Case: Transit Network Routing" toc="default">
				<t>
					A transit network operator normally interconnects to many diferent
   					operators, including other transit network operators, and provides
   					transit routing of SIP requests received from one operator network
   					towards the destination. The destination can be within an operator network
   					to which the transit network operator has a direct interconnect, or
					within an operator network that only can be reached via one or more
   					interconnected transit operators.
				</t>
				<t>
   					For each customer, i.e. interconnected network operator for which,
   					the transit network operator routes SIP requests towards the
   					requested destination a set of transit routing polices are defined.
   					These policies are used to determine how a SIP request shall be routed
   					towards the requested destination to meet the agreement the transit
   					network operator has with its customer.
				</t>
				<t>
   					When a SIP entity that performs the transit routing functionality
   					receives a SIP request, in order to apply the correct set of transit
   					routing policies, it needs to know from which of its
   					customers, i.e. adjacent upstream network, the SIP request is
   					received.
				</t>
			</section>
		</section>

		<section title="Applicability" toc="default">
			<t>
				The mechanism defined in this specification MUST only be used by SIP entities that
				are able to verify from which adjacent upstream network a SIP request is received.
			</t>
			<t>
				The mechanism for verifying from which adjacent upstream network a SIP request is
				received is outside the scope of this specification.
			</t>
		</section>

		<section title="Conventions" toc="default">
			<t>
				The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT", "SHOULD", "SHOULD NOT",
				"RECOMMENDED", "MAY", and "OPTIONAL" in this document are to be interpreted as described in
				BCP 14, RFC 2119 <xref target="RFC2119" pageno="false" format="default" />.
			</t>
		</section>

		<section title="Definitions" toc="default">
			<t>
				SIP entity: SIP User Agent (UA), or SIP proxy, as defined in RFC 3261.
			</t>
			<t>
				Adjacent upstream SIP network: The adjacent SIP network in the direction
				from which a SIP request is received.
			</t>
			<t>
				Network entry point: A SIP entity on the border of network, which receives SIP requests
				from adjacent upstream networks.
			</t>
			<t>
				Inter Operator Identifier (IOI): A globally unique identifier to correlate billing
				information generated within the IP Multimedia Subsystem (IMS).
			</t>
			<t>
				JWS: JSON Web Signature, as defined in RFC 7515.
			</t>
		</section>

		<section title="Vie 'received-realm' header field parameter" anchor="sec-via" toc="default">
			<section title="General" anchor="sec-via-gen">
        <t>
						The Via 'received-realm' header field parameter value is represented as a
						combination of an operator identyfier, which value represents the adjacent
						network, and a serialized JSON Web Signature (JWS) <xref target="RFC7515" pageno="false" format="default"/>.
						The JWS Payload consists of the operator identifier and other SIP information element values.
				</t>
				<t>
						The procedures for encoding the JWS and calculating the signature are defined in
						<xref target="RFC7515" pageno="false" format="default"/>. As the JWS Payload
						information is found in other SIP information elements the JWS payload is not included
						in the serialized JWS conveyed in the header field parameter, as described in Appendix F of
						<xref target="RFC7515" pageno="false" format="default"/>. The operator identifier and
						the serialized JWS are separated using a comma character.
				</t>
			</section>
			<section title="Operator Identifier" anchor="sec-via-ope">
        <t>
					The Operator Identifier is a token value that represents the adjacent operator. The
					scope of the value is only within the network that inserts the value.
        </t>
			</section>
			<section title="JWS Header" anchor="sec-via-header">
					<t>The following header parameters MUST be included in the JWS.
							<list style="symbols">
									<t>The "typ" parameter MUST have a "JWT" value.</t>
									<t>The "alg" parameter MUST have the value of the algorithm used to calculate the JWS.</t>
							</list>
					</t>
					<t>
						NOTE: Operators need to agree on the set of supported algorithms for calculating the JWT signature.
					</t>
					<figure>
			    <artwork align="left" alt="" height="" name="" type="" width="" xml:space="preserve"><![CDATA[

Example:

{
	"typ":"JWT",
	"alg":"HS256"
}

			    ]]></artwork>
	        </figure>
				</section>
				<section title="JWS Payload" anchor="sec-via-payload">
					<t>The followoing claims MUST be included in the JWS Payload.
						<list style="symbols">
						<t> The "sip_from_tag" claim has the value of the From 'tag' header field parameter of the SIP message.</t>
						<t> The "sip_date" claim has the value of the Date header field in the SIP message,
							quoted and encoded in JSON NumbericData format <xref target="RFC7519" pageno="false" format="default"/>.</t>
						<t> The "sip_callid" claim has have value of the Call-ID header field in the SIP message.</t>
						<t> The "sip_cseq_num" claim has the numeric value of the CSeq header field in the SIP message.</t>
						<t> the "sip_via_branch" claim has value of the Via branch header field parameter of the Via header
					  field, in the SIP message, to which the received-realm header field parameter is attached.</t>
					  </list>
					</t>
					<t>
            All claims MUST be encoded using lower case characters.
					</t>
					<t>
						All claims except "sip_date" MUST be encoded as StringOrURI JSON string value
						<xref target="RFC7519" pageno="false" format="default"/>.
					</t>
					<t>
						The sip_date claim MUST be encoded as a JSON NumericData value
						<xref target="RFC7519" pageno="false" format="default"/>
					</t>
					<figure>
			    <artwork align="left" alt="" height="" name="" type="" width="" xml:space="preserve"><![CDATA[

Example:

{
	"sip_from_tag":"1928301774",
	"sip_date":"1472815523",
	"sip_callid":"a84b4c76e66710@pc33.atlanta.com",
	"sip_cseq_num":"314159",
	"sip_via_branch":"z9hG4bK776asdhds"
}

			    ]]></artwork>
	        </figure>
			</section>
			<section title="Syntax" anchor="sec-syntax" toc="default">
				<section title="General" anchor="sec-syntax-gen" toc="default">
					<t>
						This section describes the syntax extensions to the ABNF syntax defined in
						<xref target="RFC3261" pageno="false" format="default"/>, by defining a
						new Via header field parameter, "received-realm".  The ABNF defined in this
						specification is conformant to RFC 5234 <xref target="RFC5234" pageno="false"
						format="default"/>. "EQUAL", "LDQUOT", "RDQUOT" and "ALPHA" are defined in
						<xref target="RFC3261" pageno="false" format="default"/>. "DIGIT" is defined in
						<xref target="RFC5234" pageno="false" format="default"/>.
					</t>
				</section>
				<section title="ABNF" anchor="sec-syntax-abnf" toc="default">
					<figure>
						<preamble></preamble>
						<artwork><![CDATA[
	via-params     =/ received-realm
	received-realm = "received-realm" EQUAL LDQUOT op-id COLON jws RDQUOT
	op-id          = token
	jws            = header "." "." signature
	header         = *base64-char
	signature      = *base64-char
	base64-char    = ALPHA / DIGIT / "/" / "+"

  EQUAL, COLON, token, LDQUOT, RDQUOT, ALPHA and DIGIT
	as defined in RFC 3261.

						]]></artwork>
					</figure>
				</section>
			</section>
			<section title="Example" anchor="sec-example" toc="default">
				<figure>
					<preamble></preamble>
					<artwork><![CDATA[

  Via: SIP/2.0/UDP pc33.atlanta.com;branch=z9hG4bK776;
  received-realm=myoperator:"eyJ0eXAiOiJKV1QiLA0KICJhbGciOiJIUzI1N..
	dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW1gFWFOEjXk"

  NOTE: Line breaks for display purpose only

					]]></artwork>
				</figure>
			</section>
		</section>

		<section title="User Agent and Proxy behavior" anchor="sec-sipent" toc="default">
			<section title="General" anchor="sec-sipent-gen" toc="default">
				<t>
					This section describes how a SIP entity, acting as an entry point to
					a network, uses the "received-realm" Via header field parameter.
				</t>
			</section>

			<section title="Behavior of a SIP entity acting as a network entry point" anchor="sec-sipent-recv" toc="default">
				<t>
					When a SIP entity, acting as a network entry point, forwards a SIP request, or initiates a SIP request
					on its own (e.g. a PSTN gateway), the SIP entity adds a Via header field to the SIP request, according
					to the procedures in RFC 3261 <xref target="RFC3261" pageno="false" format="default" />. In addition, if
					the SIP entity is able to assert the adjacent upstream network, and if the SIP entity is aware of a network
					realm value defined for that network, the SIP entity can add a "received-realm" Via header field parameter,
					conveying the network realm value, to the Via header field added to the SIP request.
				</t>
				<t>
					When the SIP entity adds a "received-realm" Via header field parameter to a SIP request, it MUST also calculate
					a Hash-based message authentication code (HMAC) <xref target="RFC2104" pageno="false" format="default"/> value
					from the parameter value, using a secret key which is shared between the SIP entity and any SIP entity which
					will use the parameter value. The HMAC is then added to the parameter.
				</t>
				<t>
					When the receiver decodes the JWT, it MUST compare the JWT claims with the corresponding SIP header field information. If there is a mismatch, the receiver MUST discard the received-realm header field parameter.
        </t>
			</section>
			<section title="Behavior of a SIP entity consuming the received-network value" anchor="sec-sipent-cons" toc="default">
				<t>
					When a SIP entity receives a Via 'received-network' header field parameter, and intends to perform actions
					based on the header field parameter value, it MUST first re-calculate the JWS and check whether the result
					matches the JWS received. If there is not a match the SIP entity MUST discard the received 'received-network'
					header field parameter. The SIP entity MAY take also take additional actions (e.g. rejecting the SIP request)
					based on local policy.
				</t>
			</section>
		</section>

    	<section title="Example" toc="default">
			<figure>
				<preamble></preamble>
				<artwork><![CDATA[

Operator 1    T_EP                                 T_AS

- INVITE ------>
  Via: SIP/2.0/UDP IP_UA
                -- INVITE ---------------------------->
                   Via: SIP/2.0/UDP IP_TEP;branch=z9hG4bK776;
                    received-realm=myoperator:"eyJ0eXAiOiJKV1QiLA0KICJh
                    bGciOiJIUzI1N..dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW
                    1gFWFOEjXk"
                   Via: SIP/2.0/UDP IP_UA; received=IP_UA

                <- 200 OK ----------------------------
                   Via: SIP/2.0/UDP IP_TEP;branch=z9hG4bK776;
                    received-realm=myoperator:"eyJ0eXAiOiJKV1QiLA0KICJh
                    bGciOiJIUzI1N..dBjftJeZ4CVP-mB92K27uhbUJU1p1r_wW
                    1gFWFOEjXk"
                   Via: SIP/2.0/UDP IP_UA; received=IP_UA

<- 200 OK------
   Via: SIP/2.0/UDP IP_UA; received=IP_UA

				]]></artwork>
			</figure>
		</section>

		<section title="IANA Considerations" anchor="iana" toc="default">
			<section title="'received-realm' Via header field parameter" anchor="iana-param" toc="default">
				<t>
					This specification defines a new Via header field parameter
					called received-realm in the "Header Field Parameters and Parameter Values"
					sub-registry as per the registry created by <xref target="RFC3968"
					pageno="false" format="default"/>. The syntax is defined in
					<xref target="sec-syntax"/>. The required information is:
				</t>
				<figure>
					<preamble></preamble>
					<artwork><![CDATA[
                                               Predefined
Header Field            Parameter Name         Values      Reference
----------------------  ---------------------  ----------  ---------
Via                     received-realm         No          RFCXXXX

					]]></artwork>
				</figure>
			</section>
			<section title="JSON Web Token Claims Registration" anchor="iana-claims" toc="default">
				<t>
					This specification defines new JSON Web Token claims in
					the "JSON Web Token Claims" sub-registry as per the registry
					created by <xref target="RFC7519" pageno="false" format="default"/>.
					<list>
					 <t> Claim Name: "sip_from_tag"</t>
					 <t> Claim : SIP From tag header field parameter value</t>
					 <t> Change Controller: IESG</t>
					 <t> Specification Document(s): RFC XXXX, RFC 3261</t>
					 <t> Claim Name: "sip_date"</t>
					 <t> Claim Description: SIP Date header field value</t>
					 <t> Change Controller: IESG</t>
					 <t> Specification Document(s): RFC XXXX, RFC 3261</t>
					 <t> Claim Name: "sip_callid"</t>
					 <t> Claim Description: SIP Call-Id header field value</t>
					 <t> Change Controller: IESG</t>
					 <t> Specification Document(s): RFC XXXX, RFC 3261</t>
					 <t> Claim Name: "sip_cseq_num"</t>
					 <t> Claim Description: SIP CSeq numeric header field parameter value</t>
					 <t> Change Controller: IESG</t>
					 <t> Specification Document(s): RFC XXXX, RFC 3261</t>
					 <t> Claim Name: "sip_via_branch"</t>
					 <t> Claim Description: SIP Via branch header field parameter value</t>
					 <t> Change Controller: IESG</t>
					 <t> Specification Document(s): RFC XXXX, RFC 3261</t>
					</list>
				</t>
			</section>
  </section>

  <section title="Security Considerations" anchor="sec-security" toc="default">
			<t>
				As the received-realm Via header field parameter can be used
				to trigger applications, it is important to ensure that the parameter
				has not been added to the SIP message by an unauthorized SIP entity.
			</t>
			<t>
				The operator MUST change the key on a frequent basis.
				The operator also needs to take great care in ensuring that the key used
				to calculate the JWS signature value is only known by the network entry
				point adding the received-realm Via header field parameter to a SIP message
				and the entities that use the parameter value.
			</t>
			<t>
				A SIP entity MUST NOT use the adjacent network information if
				there is a mismatch between the JWS value received in the SIP header
				field and the JWS calculated by the receiving entity.
			</t>
			<t>
				A SIP entity MUST use different key values for each parameter value
				that it recognizes and use to trigger actions.
			</t>
			<t>
				Generic security considerations for JWS are defined in
				<xref target="RFC7515" pageno="false" format="default"/>.
			</t>
	</section>

	<section title="Acknowledgements" anchor="sec-acks" toc="default">
			<t>
				Thanks to Adam Roach and Richard Barnes for providing comments and
				feedback on the document.
			</t>
	</section>

	<section title="Change Log">
			<t>[RFC EDITOR NOTE: Please remove this section when publishing]</t>
			<t>
				Changes from draft-holmberg-dispatch-received-realm-03
				<list style="symbols">
					<t>ABNF correction.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-dispatch-received-realm-02
				<list style="symbols">
					<t>JWT replaced with JWS.</t>
					<t>Appendix F of RFC 7515 applied.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-dispatch-received-realm-01
				<list style="symbols">
					<t>Define received-realm parameter value as a JSON Web Token (JWT).</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-dispatch-received-realm-00
				<list style="symbols">
					<t>New version due to expiration of previous version.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-received-realm-04
				<list style="symbols">
					<t>Changed IETF WG from sipcore do dispatch.</t>
					<t>HMAC value added to the parameter.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-received-realm-03
				<list style="symbols">
					<t>New version due to expiration.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-received-realm-02
				<list style="symbols">
					<t>New version due to expiration.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-received-realm-01
				<list style="symbols">
					<t>New version due to expiration.</t>
				</list>
			</t>
			<t>
				Changes from draft-holmberg-received-realm-00
				<list style="symbols">
					<t>New version due to expiration.</t>
				</list>
			</t>
	</section>
	</middle>
	<back>
		<references title="Normative References">
			<?rfc include="reference.RFC.2119"?>
			<?rfc include="reference.RFC.3261"?>
			<?rfc include="reference.RFC.5234"?>
			<?rfc include="reference.RFC.7515"?>
			<?rfc include="reference.RFC.7519"?>
		</references>
		<references title="Informative References">
			<?rfc include="reference.RFC.2104"?>
			<?rfc include="reference.RFC.3968"?>
		</references>
	</back>
</rfc>
