Sip Session Timer Too Small | Sip Session Timers : Who Is Refreshing The Session? 15641 투표 이 답변

당신은 주제를 찾고 있습니까 “sip session timer too small – SIP Session Timers : Who is refreshing the session?“? 다음 카테고리의 웹사이트 https://ppa.charoenmotorcycles.com 에서 귀하의 모든 질문에 답변해 드립니다: ppa.charoenmotorcycles.com/blog. 바로 아래에서 답을 찾을 수 있습니다. 작성자 VoipEngineerTraining.com 이(가) 작성한 기사에는 조회수 7,255회 및 좋아요 70개 개의 좋아요가 있습니다.

Table of Contents

sip session timer too small 주제에 대한 동영상 보기

여기에서 이 주제에 대한 비디오를 시청하십시오. 주의 깊게 살펴보고 읽고 있는 내용에 대한 피드백을 제공하세요!

d여기에서 SIP Session Timers : Who is refreshing the session? – sip session timer too small 주제에 대한 세부정보를 참조하세요

A student of the course had a question about SIP session timers and determining who is refreshing the session. Is it the UAS, is it the UAC? Watch the video to learn more.
Check out the course on Udemy : https://www.udemy.com/learn-sip/?couponCode=SESSIONTIMER

sip session timer too small 주제에 대한 자세한 내용은 여기를 참조하세요.

Session Timer Too Small – ITSP – Cisco UC

CUCM has a min session timer of 1800. By default the CUBE will accept any negotiated size for the session timer. Hence we need to ensure the …

+ 여기에 자세히 보기

Source: benmorgan.com.au

Date Published: 5/17/2021

View: 2912

SIP Invite gets Rejected with 422 Session Interval Too Small

To modify session-expires timer from 1800 to 3600. Initial invite comes in with Session-Expires: 1800 : INVITE sip:@:;transport= …

+ 여기에 더 보기

Source: support.oracle.com

Date Published: 8/2/2021

View: 3303

RFC 4028: Session Timers in the Session Initiation Protocol …

Since the primary purpose of the session timer is to prove a means to time out state in SIP elements, very small values won’t generally be needed.

+ 여기에 더 보기

Source: www.rfc-editor.org

Date Published: 2/29/2022

View: 3996

SIP call failed 422 Session Interval Too Small – Avaya Support

the calls are not connecting to agent. SBC with Min-SE —> 600/1200. CM SIP trunk Min-SE (display trunk-group X / Preferred Minimum Session Refresh Interval …

+ 여기에 더 보기

Source: support.avaya.com

Date Published: 2/19/2021

View: 2690

Session Timers in the Session Initiation Protocol (SIP) RFC 4028

Since the primary purpose of the session timer is to prove a means to time out state in SIP elements, very small values won’t generally be needed.

+ 자세한 내용은 여기를 클릭하십시오

Source: datatracker.ietf.org

Date Published: 7/23/2022

View: 1779

Session Timers in the Session Initiation Protocol (SIP)

If the response to a session refresh request is a 422 (Session Interval Too Small) response message, then the UAC MAY retry the request. The procedures for …

+ 여기에 표시

Source: www.cs.columbia.edu

Date Published: 7/27/2022

View: 8235

주제와 관련된 이미지 sip session timer too small

주제와 관련된 더 많은 사진을 참조하십시오 SIP Session Timers : Who is refreshing the session?. 댓글에서 더 많은 관련 이미지를 보거나 필요한 경우 더 많은 관련 기사를 볼 수 있습니다.

SIP Session Timers : Who is refreshing the session?
SIP Session Timers : Who is refreshing the session?

주제에 대한 기사 평가 sip session timer too small

  • Author: VoipEngineerTraining.com
  • Views: 조회수 7,255회
  • Likes: 좋아요 70개
  • Date Published: 2017. 4. 26.
  • Video Url link: https://www.youtube.com/watch?v=bX2UPGlZlgE

What is SIP session timer?

The SIP Session Timer is a keep alive mechanism for SIP sessions that allow User Agents (UA) or proxies to determine the status of a session and to release it if it is not active, even if a BYE has not been received.

What is the recommended Session expires value in seconds from RFC 4028?

RFC 4028 defines how the two parties on a dialog can negotiate the session interval, but it must always be at least 90 seconds. A session refresh request is any re-INVITE or UPDATE sent on the dialog.

What is Min Se in SIP?

The min-se command sets the minimum timer, and it is conveyed in the Min-SE header in the initial INVITE request. When making a call, the presence of the Min-SE header informs the UAS and any proxies of the minimum value that the UAC accepts for the session timer duration, in seconds.

What is SIP update used for?

A SIP UPDATE enables a client to modify the parameters of a session (such as the media streams and codecs) in early dialogs. An UPDATE is similar to a RE-INVITE request, but unlike a RE-INVITE, it can be sent before the initial INVITE is answered.

What is the value of T4 timer?

T4 Time (ms)

The T4 timer, which is defined in milliseconds, denotes the amount of time the network will take to clear messages between client and server transactions. The default value is set to 5000ms (as specified by rfc3261).

What is a SIP re-invite?

A Re-INVITE, it comes after a session has been established. This means that it will apply to an existing INVITE after a final response has been received and an ACK has been sent. You send an UPDATE message prior to session establishment, but that’s an article for another day.

What are SIP headers?

What is a SIP Header? A SIP Header is a component of a SIP message that is used to convey information about the SIP message. Including the correct SIP Header and correctly formatting these SIP Headers is critical to ensure that requests are successfully routed to the right recipients.

Session Timer too small

Receiving a Session Timer too small from the ITSP (SIP/2.0 422 Session Timer too small)?

INVITE FROM ITSP

SENT TRYING

SENT INVITE TO CUCM

RECEIVED TRYING

RECEIVED SESSION TIMER TOO SMALL

CALL FAILED

CUCM has a min session timer of 1800. By default the CUBE will accept any negotiated size for the session timer. Hence we need to ensure the session timer is negotiated correctly with the ITSP before handing onto CUCM.

*** Required Changes on the CUBE ***

Router(config)# voice service voip

Router(conf-voi-serv)# sip

Router(conf-serv-sip)# min-se time

*** After the above change ***

INVITE FROM ITSP

SENT TRYING to ITSP

SENT SESSION TIMER TOO SMALL to ITSP

RECEIVED INVITE (with session timer of 1800) from ITSP

SENT TRYING to ITSP

SENT INVITE TO CUCM

RECEIVED TRYING FROM CUCM

RECEIVED CALL IN PROGRESS (Ringing) from CUCM.

Call succeeded.

Session Border Controller : SIP Invite gets Rejected with 422 Session Interval Too Small

Session Border Controller : SIP Invite gets Rejected with 422 Session Interval Too Small (Doc ID 2374274.1)

Last updated on MAY 02, 2022

Applies to:

Symptoms

The far end endpoint is expecting session-expires to be at least 3600 seconds but the invite is coming with only 1800s so this invite is rejected with 422 error.

To modify session-expires timer from 1800 to 3600.

Initial invite comes in with Session-Expires: 1800 :

INVITE sip:@:;transport=tcp SIP/2.0

Via: SIP/2.0/TCP :;branch=z9hG4bKl5s2ht300o30apo02090.2

From: “@:>;tag=+1+2c7eff8+f20f4606

To: @:>

CSeq: 30326 INVITE

Expires: 60

Supported: 100rel

Content-Length: 237

Call-Info: :;method=”NOTIFY;Event=telephone-event;Duration=2000″

Contact: :;transport=tcp>

Content-Type: application/sdp

Call-ID: 408b5f7566e29c11afcbc4e42a8bf522@

Max-Forwards: 24

Session-Expires: 1800

Accept: application/sdp, application/dtmf-relay

The endpoint is rejecting it with 422:

SIP/2.0 422 Session Interval Too Small

From: “@>;tag=+1+2c7eff8+f20f4606

To: @example.com>;tag=066928aee30e81ad825ab8995900

Call-ID: 408b5f7566e29c11afcbc4e42a8bf522@

CSeq: 30326 INVITE

Via: SIP/2.0/TCP :;branch=z9hG4bKl5s2ht300o30apo02090.2

Server:

Min-SE: 3600

Content-Length: 0

Changes

Cause

Sign In To view full details, sign in with your My Oracle Support account. Register Don’t have a My Oracle Support account? Click to get started!

SIP Session Timer Overview

SIP Session Timer Overview

The 2020 IMG supports SIP Session Timers which is an extension of SIP RFC 2543 that allows a periodic refreshing of a SIP session using the RE-INVITE message. The refreshing allows both the user agent and proxy to determine if the SIP session is still active. The SIP Session Timer is a keep alive mechanism for SIP sessions that allow User Agents (UA) or proxies to determine the status of a session and to release it if it is not active, even if a BYE has not been received.

When a UAC (User Agent Client) sends an INVITE, it includes a supported header field with the option tag ‘timer’. This indicates support for this extension. The request passes through proxies, any one of which may have an interest in establishing a session timer. Each proxy can insert a Session-Expires header field and a Min-SE header field into the request (if none is already there) or alter the value of existing Session-Expires and Min-SE header fields.

If the Session-Expires interval is too low for a proxy (lower than the value of Min-SE that the proxy would wish to assert), the proxy rejects the request with a 422 response. That response contains a Min-SE header field identifying the minimum session interval it is willing to support. The UAC will try again, this time including the Min-SE header field in the request. The header field contains the largest Min-SE header field it observed in all 422 responses previously received. This way, the minimum timer meets the constraints of all proxies along the path.

After several INVITE/422 iterations, the request eventually arrives at the UAS. The UAS can adjust the value of the session interval as if it were a proxy; when done, it places the final session interval into the Session-Expires header field in a 2xx response. The Session-Expires header field also contains a ‘refresher’ parameter, which indicates who is doing the refreshing — the UA that is currently the UAC, or the UA that is currently the UAS. As the 2xx response travels back through the proxy chain, each proxy can observe the final session interval but can’t change it.

From the Session-Expires header field in the response, both UA’s know that a session timer is active, when it will expire, and who is refreshing. At some point before the expiration, the currently active refresher generates a session refresh request, which is a re-INVITE or UPDATE request. If the refresher never gets a response to that session refresh request, it sends a BYE to terminate the session. Similarly, if the other side never gets the session refresh request before the session expires, it sends a BYE.

The refresh requests sent once the session is established are processed identically to the initial requests, as described above. This means that a successful session refresh request will extend the session, as desired.

RFC 4028 Session Timers in the Session Initiation Protocol (SIP)

Call Flows

Refer to SIP Session Timer Call Flows topic.

Configuration

The procedure below explains how to configure the 2020 IMG for SIP Session Timer Feature. Before configuring the SIP Session Timer feature, the 2020 IMG must have an initial configuration created on it. Follow the Basic Configurations procedure before proceeding onto configuring the SIP Session Timer feature.

Create a Signaling Gateway Profile (SGP) for SIP Session Timer Feature

Right Click on the Profiles object and select New SIP SGP. In the SGP object enter a name in the SIP Profile Name field to identify this object. Since a profile other than the default SGP Profile will be used, modify the SIP Profile ID to something other than ID:0 to allow other fields in this object to be modified. For more information on the SIP SGP pane see SIP SGP. Right Click on the SIP SGP object created and select New Session Timer. A Session Timer pane gets created. Refer to SIP Session Timer for more information on configuring. Right Click on 2020 IMG Name and select New Signaling. The Signaling Object is created to allow multiple signaling objects below it. No configuration is needed in this object. See Signaling for information on this object Right Click on Signaling Object just created and select New SIP. Select the SIP Gateway Profile just created from drop down menu in the Remote 2020 IMG’s SIP Profile. See screen capture below. See SIP Signaling for more information on this object.

Create SIP Channel Groups:

Right Click on 2020 IMG EMS and select New Routing Configuration. See Routing Configuration for more information. Right Click on Routing Configuration and select New Channel Groups. This is a container object and no configuration is needed. Below the Channel Groups object, the Channel Group object can be created. Refer to Channel Groups topic for more information. Right Click on Channel Groups object and select New Channel Group. Enter a name to identify this channel group and change the Signaling Type to SIP using the drop down menu. Refer to SIP Channel Group for more information on configuring a SIP channel group.

Create an external network element:

The SIP Channel group needs to communicate withe an external SIP entity. Create an external network element and then an external gateway that the SIP channel group will transmit messages to.

Right Click on 2020 IMG EMS and select New External Network Elements. The External Network Elements object is a container object and no configuration is needed in this object. Refer to External Network Elements for more information. Right Click on External Network Elements object and select New External Gateways. The External Gateways object is also a container object. Under the External Gateways object, multiple individual gateways can be created under it. Refer to External Gateways for more information. Right Click on External Gateways object and select New External Gateway. Enter a name in the Name field to identify the gateway being created. Select SIP from drop down menu in the Gateway Signaling Type field and select the SIP SGP profile from SIP Profile field drop down menu. Refer to External Gateway for more information.

Enter a Name into the Name field.

Select SIP from drop down menu in the Gateway Signaling Protocol field.

Enter IP address for this gateway

Select the SIP Gateway Profile (SGP) created earlier from drop down menu in the SIP Profile field.

Insert SIP External Network Element into SIP Channel Group:

Right Click on the SIP Channel group created and select New IP Network Element . Within the IP Network Element field, select from drop down menu, the gateway created. See screen capture below.

Additional Information

SIP Resource Adaptor 2.5.0 :: SIP Resource Adaptor Guide :: Session Timers

Session timers are disabled by default. An application that wants to use session timers must request them when creating dialog activities.

The session timer for a new dialog is configured using a SessionTimerOptions value. This value contains the mandatory session interval parameter, which is the time in seconds after which the dialog (session) is considered to have expired, if there were no session refresh requests sent or received in that time. RFC 4028 defines how the two parties on a dialog can negotiate the session interval, but it must always be at least 90 seconds.

A session refresh request is any re-INVITE or UPDATE sent on the dialog. If a session refresh request is successful, this means that both parties on the dialog are still alive, so the session timer is reset and the dialog can continue. If a session refresh request times out, or fails with 481 (dialog does not exist), then the application should terminate the dialog.

During dialog setup, one party on the dialog is selected to be the refresher, who must send a session refresh request periodically. An application can indicate its preferred refresher in its SessionTimerOptions , but this may not be applied, for example if the other party does not support session timers.

RFC 4028 is designed so that session timers can still be used even if only one party on the dialog supports them.

If a dialog activity in the SIP RA was selected to be the refresher, then periodically the SIP RA will fire a SessionRefreshRequiredEvent on the dialog, which tells the application that it should initiate a session refresh request. If this request fails with a timeout or 481 response then the application should terminate the dialog with a BYE.

Dialogs are deliberately not terminated automatically by the RA when a session refresh fails or a session expires. This is so the application has full control of how it cleans up its resources.

Regardless of who is selected to be the refresher, any successful re-INVITE or UPDATE on the dialog is implicitly a session refresh request, and resets the session timer automatically so the dialog may continue.

RFC 4028: Session Timers in the Session Initiation Protocol (SIP)

PROPOSED STANDARD

Errata Exist

Network Working Group S. Donovan Request for Comments: 4028 J. Rosenberg Category: Standards Track Cisco Systems April 2005 Session Timers in the Session Initiation Protocol (SIP) Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the “Internet Official Protocol Standards” (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2005). Abstract This document defines an extension to the Session Initiation Protocol (SIP). This extension allows for a periodic refresh of SIP sessions through a re-INVITE or UPDATE request. The refresh allows both user agents and proxies to determine whether the SIP session is still active. The extension defines two new header fields: Session-Expires, which conveys the lifetime of the session, and Min-SE, which conveys the minimum allowed value for the session timer. Donovan & Rosenberg Standards Track [Page 1]

RFC 4028 Session Timer April 2005 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Overview of Operation . . . . . . . . . . . . . . . . . . . 4 4. Session-Expires Header Field Definition . . . . . . . . . . 6 5. Min-SE Header Field Definition . . . . . . . . . . . . . . . 8 6. 422 Response Code Definition . . . . . . . . . . . . . . . . 8 7. UAC Behavior . . . . . . . . . . . . . . . . . . . . . . . . 9 7.1. Generating an Initial Session Refresh Request . . . . 9 7.2. Processing a 2xx Response . . . . . . . . . . . . . . 9 7.3. Processing a 422 Response . . . . . . . . . . . . . . 11 7.4. Generating Subsequent Session Refresh Requests . . . . 11 8. Proxy Behavior . . . . . . . . . . . . . . . . . . . . . . . 12 8.1. Processing of Requests . . . . . . . . . . . . . . . . 13 8.2. Processing of Responses . . . . . . . . . . . . . . . 14 8.3. Session Expiration . . . . . . . . . . . . . . . . . . 15 9. UAS Behavior . . . . . . . . . . . . . . . . . . . . . . . . 15 10. Performing Refreshes . . . . . . . . . . . . . . . . . . . . 17 11. Security Considerations . . . . . . . . . . . . . . . . . . 18 11.1. Inside Attacks . . . . . . . . . . . . . . . . . . . . 18 11.2. Outside Attacks . . . . . . . . . . . . . . . . . . . 19 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . 19 12.1. IANA Registration of Min-SE and Session-Expires Header Fields . . . . . . . . . . . . . . . . . . . . 19 12.2. IANA Registration of the 422 (Session Interval Too Small) Response Code . . . . . . . . . . . . . . . . . 20 12.3. IANA Registration of the ‘timer’ Option Tag . . . . . 20 13. Example Call Flow . . . . . . . . . . . . . . . . . . . . . 20 14. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 25 15. References . . . . . . . . . . . . . . . . . . . . . . . . . 25 15.1. Normative References . . . . . . . . . . . . . . . . . 25 15.2. Informative References . . . . . . . . . . . . . . . . 26 Authors’ Addresses. . . . . . . . . . . . . . . . . . . . . . . . 26 Full Copyright Statement. . . . . . . . . . . . . . . . . . . . . 27 1 . Introduction 2] does not define a keepalive mechanism for the sessions it establishes. Although the user agents may be able to determine whether the session has timed out by using session specific mechanisms, proxies will not be able to do so. The result is that call stateful proxies will not always be able to determine whether a session is still active. For instance, when a user agent fails to send a BYE message at the end of a session, or when the BYE message gets lost due to network problems, a call stateful proxy will not know when the session has ended. In this situation, the call stateful proxy will retain state for the call and Donovan & Rosenberg Standards Track [Page 2]

RFC 4028 Session Timer April 2005 3] requests (referred to as session refresh requests) to keep the session alive. The interval for the session refresh requests is determined through a negotiation mechanism defined here. If a session refresh request is not received before the interval passes, the session is considered terminated. Both UAs are supposed to send a BYE, and call stateful proxies can remove any state for the call. This refresh mechanism has additional applications. A user agent would like to determine whether the session is still active for the same reasons a call stateful proxy server would. This determination can be made at a user agent without the use of SIP level mechanisms; for audio sessions, periodic RTCP packets serve as an indication of liveness [5]. However, it is desirable to separate indications of SIP session liveness from the details of the particular session. Another application of the session timer is in the construction of a SIP Network Address Translator (NAT) Application Level Gateway (ALG) [6]. The ALG embedded in a NAT will need to maintain state for the duration of a call. This state must eventually be removed. Relying on a BYE to trigger the removal of state, besides being unreliable, introduces a potential denial of service attack. This document provides an extension to SIP that defines a session expiration mechanism. Periodic refreshes, through re-INVITEs or UPDATEs, are used to keep the session active. The extension is sufficiently backward compatible with SIP that it works as long as either one of the two participants in a dialog understands the extension. Two new header fields (Session-Expires and Min-SE) and a new response code (422) are defined. Session-Expires conveys the duration of the session, and Min-SE conveys the minimum allowed value for the session expiration. The 422 response code indicates that the session timer duration was too small. 2 . Terminology RFC 2119 [1] and indicate requirement levels for compliant SIP implementations. Donovan & Rosenberg Standards Track [Page 3]

RFC 4028 Session Timer April 2005 2], which is a request that can update the remote target of a dialog. Initial Session Refresh Request: The first session refresh request sent with a particular Call-ID value. Subsequent Session Refresh Request: Any session refresh request sent with a particular Call-ID after the initial session refresh request. Refresh: Same as a session refresh request. 3 . Overview of Operation Donovan & Rosenberg Standards Track [Page 4]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 5]

RFC 4028 Session Timer April 2005 3] request. If the refresher never gets a response to that session refresh request, it sends a BYE to terminate the session. Similarly, if the other side never gets the session refresh request before the session expires, it sends a BYE. The refresh requests sent once the session is established are processed identically to the initial requests, as described above. This means that a successful session refresh request will extend the session, as desired. The extension introduces additional complications beyond this basic flow to support cases where only one of the UAs supports it. One such complication is that a proxy may need to insert the Session-Expires header field into the response, in the event that the UAS doesn’t support the extension. The negotiation of the role of refresher is also affected by this capability; it takes into consideration which participants support the extension. Note that the session timer refreshes the session, not the dialog used to establish the session. Of course, the two are related. If the session expires, a BYE is sent, which terminates the session and, generally, the dialog. 4 . Session-Expires Header Field Definition Donovan & Rosenberg Standards Track [Page 6]

RFC 4028 Session Timer April 2005 Section 25 of RFC 3261 [2]. Table 1 is an extension of Tables 2 and 3 in [2] for the Session-Expires and Min-SE header fields. The column ‘PRA’ is for the PRACK method [7], ‘UPD’ is for the UPDATE method [3], ‘SUB’ is for the SUBSCRIBE method [8], and ‘NOT’ is for the NOTIFY method [8]. Donovan & Rosenberg Standards Track [Page 7]

RFC 4028 Session Timer April 2005 5 . Min-SE Header Field Definition 6 . 422 Response Code Definition Donovan & Rosenberg Standards Track [Page 8]

RFC 4028 Session Timer April 2005 7 . UAC Behavior 7.1 . Generating an Initial Session Refresh Request 2]. It MUST do so even if the UAC is not requesting usage of the session timer for this session. The UAC MAY include a Require header field in the request with the value ‘timer’ to indicate that the UAS must support the session timer to participate in the session. This does not mean that the UAC is requiring the UAS to perform the refreshes, only that it is requiring the UAS to support the extension. In addition, the UAC MAY include a Proxy-Require header field in the request with the value ‘timer’ to indicate that proxies must support the session timer in order to correctly process the request. However, usage of either Require or Proxy-Require by the UAC is NOT RECOMMENDED. They are not needed, since the extension works even when only the UAC supports the extension. The Supported header field containing ‘timer’ MUST still be included, even if the Require or Proxy-Require header fields are present containing ‘timer’. A UAC MAY include the Min-SE header field in the initial INVITE request. A UAC MAY include a Session-Expires header field in an initial session refresh request if it wants a session timer applied to the session. The value of this header field indicates the session interval desired by the UAC. If a Min-SE header is included in the initial session refresh request, the value of the Session-Expires MUST be greater than or equal to the value in Min-SE. The UAC MAY include the refresher parameter with value ‘uac’ if it wants to perform the refreshes. However, it is RECOMMENDED that the parameter be omitted so that it can be selected by the negotiation mechanisms described below. 7.2 . Processing a 2xx Response Donovan & Rosenberg Standards Track [Page 9]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 10]

RFC 4028 Session Timer April 2005 Section 10. Similarly, a re-INVITE or UPDATE request sent within a dialog for purposes other than session refreshes will also have the effect of refreshing the session, and its processing will follow the procedures defined in this specification. 7.3 . Processing a 422 Response Section 7.4. This new request constitutes a new transaction and SHOULD have the same value as the Call-ID, To, and From of the previous request, but the CSeq should contain a new sequence number that is one higher than the previous. 7.4 . Generating Subsequent Session Refresh Requests Donovan & Rosenberg Standards Track [Page 11]

RFC 4028 Session Timer April 2005 Section 11. As such, a UA should only ignore the SHOULD in unusual and singular cases where it is desirable to change the session interval mid-dialog. If the session refresh request is not the initial one, it is RECOMMENDED that the refresher parameter be set to ‘uac’ if the element sending the request is currently performing refreshes, and to ‘uas’ if its peer is performing the refreshes. This way, the role of refresher does not change on each refresh. However, if it wishes to explicitly change the roles, it MAY use a value of ‘uas’ if it knows that the other side supports the session timer. It could know this by having received a request from its peer with a Supported header field containing the value ‘timer’. If it seeks to reselect the roles, it MAY omit the parameter. A re-INVITE generated to refresh the session is a normal re-INVITE, and an UPDATE generated to refresh a session is a normal UPDATE. If a UAC knows that its peer supports the UPDATE method, it is RECOMMENDED that UPDATE be used instead of a re-INVITE. A UA can make this determination if it has seen an Allow header field from its peer with the value ‘UPDATE’, or through a mid-dialog OPTIONS request. It is RECOMMENDED that the UPDATE request not contain an offer [4], but a re-INVITE SHOULD contain one, even if the details of the session have not changed. In that case, the offer MUST indicate that it has not changed. In the case of SDP, this is accomplished by including the same value for the origin field as did previous SDP messages to its peer. The same is true for an answer exchanged as a result of a session refresh request; if it has not changed, that MUST be indicated. 8 . Proxy Behavior Donovan & Rosenberg Standards Track [Page 12]

RFC 4028 Session Timer April 2005 8.1 . Processing of Requests Donovan & Rosenberg Standards Track [Page 13]

RFC 4028 Session Timer April 2005 Section 11. Assuming that the proxy has requested a session timer (and thus has possibly inserted the Session-Expires header field or reduced it), the proxy MUST remember that it is using a session timer, and also remember the value of the Session-Expires header field from the proxied request. This MUST be remembered for the duration of the transaction. The proxy MUST remember, for the duration of the transaction, whether the request contained the Supported header field with the value ‘timer’. If the request did not contain a Supported header field with the value ‘timer’, the proxy MAY insert a Require header field with the value ‘timer’ into the request. However, this is NOT RECOMMENDED. This allows the proxy to insist on a session timer for the session. This header field is not needed if a Supported header field was in the request; in this case, the proxy would already be sure the session timer can be used for the session. 8.2 . Processing of Responses Donovan & Rosenberg Standards Track [Page 14]

RFC 4028 Session Timer April 2005 8.3 . Session Expiration 9 . UAS Behavior Donovan & Rosenberg Standards Track [Page 15]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 16]

RFC 4028 Session Timer April 2005 Section 10. 10 . Performing Refreshes Section 7. Note that only a 2xx response to a session refresh request extends the session expiration. This means that a UA could attempt a refresh and receive a 422 response with a Min-SE header field that contains a value much larger than the current session interval. The UA will still have to send a session refresh request before the session expiration (which has not changed), even though this request will contain a value of the Session-Expires that is much larger than the current session interval. If the session refresh request transaction times out or generates a 408 or 481 response, then the UAC sends a BYE request as per Section 12.2.1.2 of RFC 3261 [2]. If the session refresh request does not generate a 2xx response (and, as a result, the session is not refreshed), and a response other than 408 or 481 is received, the UAC Donovan & Rosenberg Standards Track [Page 17]

RFC 4028 Session Timer April 2005 11 . Security Considerations 11.1 . Inside Attacks Donovan & Rosenberg Standards Track [Page 18]

RFC 4028 Session Timer April 2005 Section 7.4 requires that the UAC copy the current session interval into the Session-Expires header field in the request. This enables the proxies to see the current value. The proxies will reject this request and provide a Min-SE with a higher minimum, which the UAC will then use. Note, that if the proxies did not reject the request, but rather proxied the request with a Min-SE header field, an attack would still be possible. The UAS could discard this header field in a 2xx response and force the UAC to continue to generate rapid requests. In a similar fashion, a rogue proxy cannot force either the UAC or UAS to generate refreshes unless the proxy remains on the signaling path and sees every request and response. 11.2 . Outside Attacks 12 . IANA Considerations 2] defines IANA procedures for registering these. 12.1 . IANA Registration of Min-SE and Session-Expires Header Fields RFC 4028 Header Name: Min-SE Compact Form: none Donovan & Rosenberg Standards Track [Page 19]

RFC 4028 Session Timer April 2005 RFC 4028 Header Name: Session-Expires Compact Form: x 12.2 . IANA Registration of the 422 (Session Interval Too Small) Response Code The following is the registration for the 422 (Session Interval Too Small) response code: Response Code: 422 Default Reason Phrase: Session Interval Too Small RFC Number: RFC 4028 12.3 . IANA Registration of the ‘timer’ Option Tag 13 . Example Call Flow Donovan & Rosenberg Standards Track [Page 20]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 21]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 22]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 23]

RFC 4028 Session Timer April 2005 Donovan & Rosenberg Standards Track [Page 24]

SIP call failed 422 Session Interval Too Small

Communication Manager – SIP call failed 422 Session Interval Too Small

I) POM nail up calls are failed. the calls are not connecting to agent.

SBC with Min-SE —> 600/1200

CM SIP trunk Min-SE (display trunk-group X / Preferred Minimum Session Refresh Interval(sec) —–> 900/1800

Call starts at SBC with a Min-SE of 1200. It reaches sends the call out its designated SIP trunk towards the Session Manager. Session Manager sees that based on the dial pattern, this call is going to CM. It forward’s the INVITE to CM without changing it. It reaches the CM and it responds to the invite.The Min-SE configured in the CM Trunk Group is 900. It would present a 422 stating “I want to use 1800 instead”.

CM will send the 422 Session Interval Too Short event to SIP SBC via SM and CM will expect the re-invite message from SIP SBC (via SM) to re-negotiate it.

The POM need to have proposed a Min-SE that is equal or greater than the Min-SE sent by our CM “422 Session Interval Too Small” message through a re-INVITE message for the negotiation.

In our scenario CM sends the 422 Session Interval Too Short event to POM but CM didn’t received the re-invite from POM for the negotiation.

ii) Call are working fine, but in traces we see lot of “422 Session Interval Too Small ” events.

Session Timers in the Session Initiation Protocol (SIP)

RFC 4028

Network Working Group S. Donovan Request for Comments: 4028 J. Rosenberg Category: Standards Track Cisco Systems April 2005 Session Timers in the Session Initiation Protocol (SIP) Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the “Internet Official Protocol Standards” (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Copyright Notice Copyright (C) The Internet Society (2005). Abstract This document defines an extension to the Session Initiation Protocol (SIP). This extension allows for a periodic refresh of SIP sessions through a re-INVITE or UPDATE request. The refresh allows both user agents and proxies to determine whether the SIP session is still active. The extension defines two new header fields: Session-Expires, which conveys the lifetime of the session, and Min-SE, which conveys the minimum allowed value for the session timer. Donovan & Rosenberg Standards Track [Page 1] RFC 4028 Session Timer April 2005 Table of Contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2 2. Terminology . . . . . . . . . . . . . . . . . . . . . . . . 3 3. Overview of Operation . . . . . . . . . . . . . . . . . . . 4 4. Session-Expires Header Field Definition . . . . . . . . . . 6 5. Min-SE Header Field Definition . . . . . . . . . . . . . . . 8 6. 422 Response Code Definition . . . . . . . . . . . . . . . . 8 7. UAC Behavior . . . . . . . . . . . . . . . . . . . . . . . . 9 7.1. Generating an Initial Session Refresh Request . . . . 9 7.2. Processing a 2xx Response . . . . . . . . . . . . . . 9 7.3. Processing a 422 Response . . . . . . . . . . . . . . 11 7.4. Generating Subsequent Session Refresh Requests . . . . 11 8. Proxy Behavior . . . . . . . . . . . . . . . . . . . . . . . 12 8.1. Processing of Requests . . . . . . . . . . . . . . . . 13 8.2. Processing of Responses . . . . . . . . . . . . . . . 14 8.3. Session Expiration . . . . . . . . . . . . . . . . . . 15 9. UAS Behavior . . . . . . . . . . . . . . . . . . . . . . . . 15 10. Performing Refreshes . . . . . . . . . . . . . . . . . . . . 17 11. Security Considerations . . . . . . . . . . . . . . . . . . 18 11.1. Inside Attacks . . . . . . . . . . . . . . . . . . . . 18 11.2. Outside Attacks . . . . . . . . . . . . . . . . . . . 19 12. IANA Considerations . . . . . . . . . . . . . . . . . . . . 19 12.1. IANA Registration of Min-SE and Session-Expires Header Fields . . . . . . . . . . . . . . . . . . . . 19 12.2. IANA Registration of the 422 (Session Interval Too Small) Response Code . . . . . . . . . . . . . . . . . 20 12.3. IANA Registration of the ‘timer’ Option Tag . . . . . 20 13. Example Call Flow . . . . . . . . . . . . . . . . . . . . . 20 14. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 25 15. References . . . . . . . . . . . . . . . . . . . . . . . . . 25 15.1. Normative References . . . . . . . . . . . . . . . . . 25 15.2. Informative References . . . . . . . . . . . . . . . . 26 Authors’ Addresses. . . . . . . . . . . . . . . . . . . . . . . . 26 Full Copyright Statement. . . . . . . . . . . . . . . . . . . . . 27 1. Introduction The Session Initiation Protocol (SIP) [2] does not define a keepalive mechanism for the sessions it establishes. Although the user agents may be able to determine whether the session has timed out by using session specific mechanisms, proxies will not be able to do so. The result is that call stateful proxies will not always be able to determine whether a session is still active. For instance, when a user agent fails to send a BYE message at the end of a session, or when the BYE message gets lost due to network problems, a call stateful proxy will not know when the session has ended. In this situation, the call stateful proxy will retain state for the call and Donovan & Rosenberg Standards Track [Page 2] RFC 4028 Session Timer April 2005 has no method to determine when the call state information no longer applies. To resolve this problem, this extension defines a keepalive mechanism for SIP sessions. UAs send periodic re-INVITE or UPDATE [3] requests (referred to as session refresh requests) to keep the session alive. The interval for the session refresh requests is determined through a negotiation mechanism defined here. If a session refresh request is not received before the interval passes, the session is considered terminated. Both UAs are supposed to send a BYE, and call stateful proxies can remove any state for the call. This refresh mechanism has additional applications. A user agent would like to determine whether the session is still active for the same reasons a call stateful proxy server would. This determination can be made at a user agent without the use of SIP level mechanisms; for audio sessions, periodic RTCP packets serve as an indication of liveness [5]. However, it is desirable to separate indications of SIP session liveness from the details of the particular session. Another application of the session timer is in the construction of a SIP Network Address Translator (NAT) Application Level Gateway (ALG) [6]. The ALG embedded in a NAT will need to maintain state for the duration of a call. This state must eventually be removed. Relying on a BYE to trigger the removal of state, besides being unreliable, introduces a potential denial of service attack. This document provides an extension to SIP that defines a session expiration mechanism. Periodic refreshes, through re-INVITEs or UPDATEs, are used to keep the session active. The extension is sufficiently backward compatible with SIP that it works as long as either one of the two participants in a dialog understands the extension. Two new header fields (Session-Expires and Min-SE) and a new response code (422) are defined. Session-Expires conveys the duration of the session, and Min-SE conveys the minimum allowed value for the session expiration. The 422 response code indicates that the session timer duration was too small. 2. Terminology In this document, the key words ‘MUST’, ‘MUST NOT’, ‘REQUIRED’, ‘SHALL’, ‘SHALL NOT’, ‘SHOULD’, ‘SHOULD NOT’, ‘RECOMMENDED’, ‘MAY’, and ‘OPTIONAL’ are to be interpreted as described in RFC 2119 [1] and indicate requirement levels for compliant SIP implementations. Donovan & Rosenberg Standards Track [Page 3] RFC 4028 Session Timer April 2005 Additionally, we define the following terms: Session Interval: The maximum amount of time that can occur between session refresh requests in a dialog before the session will be considered timed out. The session interval is conveyed in the Session-Expires header field, which is defined here. The UAS obtains this value from the Session-Expires header field in a 2xx response to a session refresh request that it sends. Proxies and UACs determine this value from the Session-Expires header field in a 2xx response to a session refresh request that they receive. Minimum Timer: Because of the processing load of mid-dialog requests, all elements (proxy, UAC, UAS) can have a configured minimum value for the session interval that they are willing to accept. This value is called the minimum timer. Session Expiration: The time at which an element will consider the session timed out, if no successful session refresh transaction occurs beforehand. Session Refresh Request: An INVITE or UPDATE request processed according to the rules of this specification. If the request generates a 2xx response, the session expiration is increased to the current time plus the session interval obtained from the response. A session refresh request is not to be confused with a target refresh request, defined in Section 6 of [2], which is a request that can update the remote target of a dialog. Initial Session Refresh Request: The first session refresh request sent with a particular Call-ID value. Subsequent Session Refresh Request: Any session refresh request sent with a particular Call-ID after the initial session refresh request. Refresh: Same as a session refresh request. 3. Overview of Operation This section provides a brief overview of the operation of the extension. It is tutorial in nature and should not be considered normative. This extension has the property that it works even when only one UA in a dialog supports it. The processing steps differ for handling each of the four cases (the UAC does or doesn’t support it, and the UAS does or doesn’t support it). For simplicity’s sake, this section Donovan & Rosenberg Standards Track [Page 4] RFC 4028 Session Timer April 2005 will describe basic operation in the case where both sides support the extension. A UAC starts by sending an INVITE. This includes a Supported header field with the option tag ‘timer’, indicating support for this extension. This request passes through proxies, any one of which may have an interest in establishing a session timer. Each proxy can insert a Session-Expires header field and a Min-SE header field into the request (if none is already there) or alter the value of existing Session-Expires and Min-SE header fields as described below. The Min-SE header field establishes the lower bound for the session refresh interval; i.e., the fastest rate any proxy servicing this request will be allowed to require. The purpose of this header field is to prevent hostile proxies from setting arbitrarily short refresh intervals so that their neighbors are overloaded. Each proxy processing the request can raise this lower bound (increase the period between refreshes) but is not allowed to lower it. The Session-Expires header field establishes the upper bound for the session refresh interval; i.e., the time period after processing a request for which any session-stateful proxy must retain its state for this session. Any proxy servicing this request can lower this value, but it is not allowed to decrease it below the value specified in the Min-SE header field. If the Session-Expires interval is too low for a proxy (i.e., lower than the value of Min-SE that the proxy would wish to assert), the proxy rejects the request with a 422 response. That response contains a Min-SE header field identifying the minimum session interval it is willing to support. The UAC will try again, this time including the Min-SE header field in the request. The header field contains the largest Min-SE header field it observed in all 422 responses previously received. This way, the minimum timer meets the constraints of all proxies along the path. After several INVITE/422 iterations, the request eventually arrives at the UAS. The UAS can adjust the value of the session interval as if it were a proxy; when done, it places the final session interval into the Session-Expires header field in a 2xx response. The Session-Expires header field also contains a ‘refresher’ parameter, which indicates who is doing the refreshing — the UA that is currently the UAC, or the UA that is currently the UAS. As the 2xx response travels back through the proxy chain, each proxy can observe the final session interval but can’t change it. Donovan & Rosenberg Standards Track [Page 5] RFC 4028 Session Timer April 2005 From the Session-Expires header field in the response, both UAs know that a session timer is active, when it will expire, and who is refreshing. At some point before the expiration, the currently active refresher generates a session refresh request, which is a re-INVITE or UPDATE [3] request. If the refresher never gets a response to that session refresh request, it sends a BYE to terminate the session. Similarly, if the other side never gets the session refresh request before the session expires, it sends a BYE. The refresh requests sent once the session is established are processed identically to the initial requests, as described above. This means that a successful session refresh request will extend the session, as desired. The extension introduces additional complications beyond this basic flow to support cases where only one of the UAs supports it. One such complication is that a proxy may need to insert the Session-Expires header field into the response, in the event that the UAS doesn’t support the extension. The negotiation of the role of refresher is also affected by this capability; it takes into consideration which participants support the extension. Note that the session timer refreshes the session, not the dialog used to establish the session. Of course, the two are related. If the session expires, a BYE is sent, which terminates the session and, generally, the dialog. 4. Session-Expires Header Field Definition The Session-Expires header field conveys the session interval for a SIP session. It is placed only in INVITE or UPDATE requests, as well as in any 2xx response to an INVITE or UPDATE. Like the SIP Expires header field, it contains a delta-time. The absolute minimum for the Session-Expires header field is 90 seconds. This value represents a bit more than twice the duration that a SIP transaction can take in the event of a timeout. This allows sufficient time for a UA to attempt a refresh at the halfpoint of the session interval, and for that transaction to complete normally before the session expires. However, 1800 seconds (30 minutes) is RECOMMENDED as the value for the Session-Expires header field. In other words, SIP entities MUST be prepared to handle Session-Expires header field values of any duration greater than 90 seconds, but entities that insert the Session-Expires header field SHOULD NOT choose values of less than 30 minutes. Donovan & Rosenberg Standards Track [Page 6] RFC 4028 Session Timer April 2005 Small session intervals can be destructive to the network. They cause excessive messaging traffic that affects both user agents and proxy servers. They increase the possibility of ‘glare’ that can occur when both user agents send a re-INVITE or UPDATE at the same time. Since the primary purpose of the session timer is to provide a means to time out state in SIP elements, very small values won’t generally be needed. 30 minutes was chosen because 95% of phone calls are shorter than this duration. However, the 30 minute minimum is listed as a SHOULD, and not as a MUST, since the exact value for this number is dependent on many network factors, including network bandwidths and latencies, computing power, memory availability, network topology, and, of course, the application scenario. After all, SIP can set up any kind of session, not just a phone call. At the time of publication of this document, 30 minutes seems appropriate. Advances in technologies may result in the number being excessively large five years in the future. The default value of the Session-Expires header field is undefined. This means that the absence of the Session-Expires header field implies no expiration of the session, using the mechanism defined in this specification. Note that other mechanisms not defined in this specification, such as locally configured timers, may apply. The syntax of the Session-Expires header field is as follows: Session-Expires = (“Session-Expires” / “x”) HCOLON delta-seconds *(SEMI se-params) se-params = refresher-param / generic-param refresher-param = “refresher” EQUAL (“uas” / “uac”) Note that a compact form, the letter x, has been reserved for Session-Expires. The BNF for delta-seconds and generic-param is defined in Section 25 of RFC 3261 [2]. Table 1 is an extension of Tables 2 and 3 in [2] for the Session-Expires and Min-SE header fields. The column ‘PRA’ is for the PRACK method [7], ‘UPD’ is for the UPDATE method [3], ‘SUB’ is for the SUBSCRIBE method [8], and ‘NOT’ is for the NOTIFY method [8]. Donovan & Rosenberg Standards Track [Page 7] RFC 4028 Session Timer April 2005 +—————+—–+—–+—+—+—+—+—+—+—+—+—+—+ | Header |where|proxy|ACK|BYE|CAN|INV|OPT|REG|PRA|UPD|SUB|NOT| +—————+—–+—–+—+—+—+—+—+—+—+—+—+—+ |Session-Expires| R | amr | – | – | – | o | – | – | – | o | – | – | | | | | | | | | | | | | | | |Session-Expires| 2xx | ar | – | – | – | o | – | – | – | o | – | – | | | | | | | | | | | | | | | |Min-SE | R | amr | – | – | – | o | – | – | – | o | – | – | | | | | | | | | | | | | | | |Min-SE | 422 | | – | – | – | m | – | – | – | m | – | – | +—————+—–+—–+—+—+—+—+—+—+—+—+—+—+ Table 1: Session-Expires and Min-SE Header Fields 5. Min-SE Header Field Definition The Min-SE header field indicates the minimum value for the session interval, in units of delta-seconds. When used in an INVITE or UPDATE request, it indicates the smallest value of the session interval that can be used for that session. When present in a request or response, its value MUST NOT be less than 90 seconds. When the header field is not present, its default value for is 90 seconds. The Min-SE header field MUST NOT be used in responses except for those with a 422 response code. It indicates the minimum value of the session interval that the server is willing to accept. The syntax of the Min-SE header field is as follows: Min-SE = “Min-SE” HCOLON delta-seconds *(SEMI generic-param) 6. 422 Response Code Definition This extension introduces the 422 (Session Interval Too Small) response code. It is generated by a UAS or proxy when a request contains a Session-Expires header field with a duration below the minimum timer for the server. The 422 response MUST contain a Min-SE header field with the minimum timer for that server. Donovan & Rosenberg Standards Track [Page 8] RFC 4028 Session Timer April 2005 7. UAC Behavior 7.1. Generating an Initial Session Refresh Request A UAC that supports the session timer extension defined here MUST include a Supported header field in each request (except ACK), listing the option tag ‘timer’ [2]. It MUST do so even if the UAC is not requesting usage of the session timer for this session. The UAC MAY include a Require header field in the request with the value ‘timer’ to indicate that the UAS must support the session timer to participate in the session. This does not mean that the UAC is requiring the UAS to perform the refreshes, only that it is requiring the UAS to support the extension. In addition, the UAC MAY include a Proxy-Require header field in the request with the value ‘timer’ to indicate that proxies must support the session timer in order to correctly process the request. However, usage of either Require or Proxy-Require by the UAC is NOT RECOMMENDED. They are not needed, since the extension works even when only the UAC supports the extension. The Supported header field containing ‘timer’ MUST still be included, even if the Require or Proxy-Require header fields are present containing ‘timer’. A UAC MAY include the Min-SE header field in the initial INVITE request. A UAC MAY include a Session-Expires header field in an initial session refresh request if it wants a session timer applied to the session. The value of this header field indicates the session interval desired by the UAC. If a Min-SE header is included in the initial session refresh request, the value of the Session-Expires MUST be greater than or equal to the value in Min-SE. The UAC MAY include the refresher parameter with value ‘uac’ if it wants to perform the refreshes. However, it is RECOMMENDED that the parameter be omitted so that it can be selected by the negotiation mechanisms described below. 7.2. Processing a 2xx Response The session timer requires a UA to create and maintain state. This state includes the session interval, the session expiration, and the identity of the refresher. This state is associated with the dialog on which the session has been negotiated. Donovan & Rosenberg Standards Track [Page 9] RFC 4028 Session Timer April 2005 When a 2xx response to a session refresh request arrives, it may or may not contain a Require header field with the value ‘timer’. If it does, the UAC MUST look for the Session-Expires header field to process the response. If there was a Require header field in the response with the value ‘timer’, the Session-Expires header field will always be present. UACs MUST be prepared to receive a Session-Expires header field in a response, even if none were present in the request. The ‘refresher’ parameter will be present in the Session-Expires header field, indicating who will perform the refreshes. The UAC MUST set the identity of the refresher to the value of this parameter. If the parameter contains the value ‘uac’, the UAC will perform them. It is possible that the UAC requested the session timer (and thus included a Session-Expires header field in the request) and that there was no Require or Session-Expires header field in the 2xx response. This will happen when the UAS doesn’t support the session timer extension and only the UAC has asked for a session timer (no proxies have requested it). In this case, if the UAC still wishes to use the session timer (which is purely for its benefit alone), it has to perform them. To do this, the UAC follows the procedures defined in this specification as if the Session-Expires header field were in the 2xx response, and its value was the same as that in the request, but with a refresher parameter of ‘uac’. If the 2xx response did not contain a Session-Expires header field, there is no session expiration. In this case, no refreshes need to be sent. A 2xx without a Session-Expires can come for both initial and subsequent session refresh requests. This means that the session timer can be ‘turned-off’ in mid dialog by receiving a response without a Session-Expires header field. The UAC remembers the session interval for a session as the value of the delta-time from the Session-Expires header field in the most recent 2xx response to a session refresh request on a dialog. It is explicitly allowed for there to be differing session intervals (or none at all) on differing dialogs established as a result of a single INVITE. The UAC also remembers whether it or its peer is the refresher on for the session. If the UAC must perform the refreshes, it computes the session expiration for that session. The session expiration is the time of reception of the last 2xx response to a session refresh request on that dialog plus the session interval for that session. If the UA seeks to continue with the session beyond the session expiration, it MUST generate a refresh before the session expiration. It is Donovan & Rosenberg Standards Track [Page 10] RFC 4028 Session Timer April 2005 RECOMMENDED that this refresh be sent once half the session interval has elapsed. Additional procedures for this refresh are described in Section 10. Similarly, a re-INVITE or UPDATE request sent within a dialog for purposes other than session refreshes will also have the effect of refreshing the session, and its processing will follow the procedures defined in this specification. 7.3. Processing a 422 Response If the response to a session refresh request is a 422 (Session Interval Too Small) response message, then the UAC MAY retry the request. The procedures for retrying are described in Section 7.4. This new request constitutes a new transaction and SHOULD have the same value as the Call-ID, To, and From of the previous request, but the CSeq should contain a new sequence number that is one higher than the previous. 7.4. Generating Subsequent Session Refresh Requests The values of Supported, Require, and Proxy-Require used in the initial Session refresh request MUST be used. The UAC MUST insert the Min-SE header field into a session refresh request for a particular dialog if it has ever received a 422 response to a previous session refresh request on the same dialog, or if it has received a session refresh request on that dialog that contained a Min-SE header field. Similarly, if no dialog has been established yet, a UAC MUST insert the Min-SE header field into an INVITE request if it has ever received a 422 response to a previous INVITE request with the same Call-ID. The value of the Min-SE header field present in a session refresh request MUST be the largest value among all Min-SE header field values returned in all 422 responses or received in session refresh requests, on the same dialog, if a dialog has been established. If no dialog has been established, the Min-SE header field value is set to the largest value among all Min-SE header field values returned in all 422 responses for an INVITE request with the same Call-ID. A result of this rule is that the maximum value of the Min-SE is effectively ‘cleared’ once the dialog is established, and from that point on, only the values from proxies known to be on the proxy path will end up being used. The UAC may have its own opinions about the minimum session interval. In that case, if the value above is too small, the UAC MAY increase it. Donovan & Rosenberg Standards Track [Page 11] RFC 4028 Session Timer April 2005 In a session refresh request sent within a dialog with an active session timer, the Session-Expires header field SHOULD be present. When present, it SHOULD be equal to the maximum of the Min-SE header field (recall that its default value when not present is 90 seconds) and the current session interval. Inclusion of the Session-Expires header field with this value avoids certain denial-of-service attacks, as documented in Section 11. As such, a UA should only ignore the SHOULD in unusual and singular cases where it is desirable to change the session interval mid-dialog. If the session refresh request is not the initial one, it is RECOMMENDED that the refresher parameter be set to ‘uac’ if the element sending the request is currently performing refreshes, and to ‘uas’ if its peer is performing the refreshes. This way, the role of refresher does not change on each refresh. However, if it wishes to explicitly change the roles, it MAY use a value of ‘uas’ if it knows that the other side supports the session timer. It could know this by having received a request from its peer with a Supported header field containing the value ‘timer’. If it seeks to reselect the roles, it MAY omit the parameter. A re-INVITE generated to refresh the session is a normal re-INVITE, and an UPDATE generated to refresh a session is a normal UPDATE. If a UAC knows that its peer supports the UPDATE method, it is RECOMMENDED that UPDATE be used instead of a re-INVITE. A UA can make this determination if it has seen an Allow header field from its peer with the value ‘UPDATE’, or through a mid-dialog OPTIONS request. It is RECOMMENDED that the UPDATE request not contain an offer [4], but a re-INVITE SHOULD contain one, even if the details of the session have not changed. In that case, the offer MUST indicate that it has not changed. In the case of SDP, this is accomplished by including the same value for the origin field as did previous SDP messages to its peer. The same is true for an answer exchanged as a result of a session refresh request; if it has not changed, that MUST be indicated. 8. Proxy Behavior Session timers are mostly of interest to call stateful proxy servers (that is, to servers that maintain the state of calls and dialogs established through them). However, a stateful proxy server (that is, a server which is aware of transaction state but does not retain call or dialog state) MAY also follow the rules described here. Stateless proxies MUST NOT attempt to request session timers. Proxies that ask for session timers SHOULD record-route, as they won’t receive refreshes if they don’t. Donovan & Rosenberg Standards Track [Page 12] RFC 4028 Session Timer April 2005 The proxy processing rules require the proxy to remember information between the request and response, ruling out stateless proxies. 8.1. Processing of Requests Processing of requests is identical for all session refresh requests. To request a session timer for a session, a proxy makes sure that a Session-Expires header field is present in a session refresh request for that session. A proxy MAY insert a Session-Expires header field in the request before forwarding it if none was present in the request. This Session-Expires header field may contain any desired expiration time the proxy would like, but not with a duration lower than the value in the Min-SE header field in the request, if it is present. The proxy MUST NOT include a refresher parameter in the header field value. If the request already had a Session-Expires header field, the proxy MAY reduce its value but MUST NOT set it to a duration lower than the value in the Min-SE header field in the request, if it is present. If the value of the Session-Expires header field is greater than or equal to the value in the Min-SE header field (recall that the default is 90 seconds when the Min-SE header field is not present), the proxy MUST NOT increase the value of the Session-Expires header field. If the value of the Session-Expires header field is lower than the value of the Min-SE header field (possibly because the proxy increased the value of the Min-SE header field, as described below), the proxy MUST increase the value of the Session-Expires header field to make it equal to Min-SE header field value. The proxy MUST NOT insert or modify the value of the ‘refresher’ parameter in the Session-Expires header field. If the request contains a Supported header field with a value ‘timer’, the proxy MAY reject the INVITE request with a 422 (Session Interval Too Small) response if the session interval in the Session-Expires header field is smaller than the minimum interval defined by the proxy’s local policy. When sending the 422 response, the proxy MUST include a Min-SE header field with the value of its minimum interval. That minimum MUST NOT be lower than 90 seconds. If the request doesn’t indicate support for the session timer but contains a session interval that is too small, the proxy cannot usefully reject the request, as this would result in a call failure. Rather, the proxy SHOULD insert a Min-SE header field containing its minimum interval. If a Min-SE header field is already present, the proxy SHOULD increase (but MUST NOT decrease) the value to its minimum interval. The proxy MUST then increase the Session-Expires Donovan & Rosenberg Standards Track [Page 13] RFC 4028 Session Timer April 2005 header field value to be equal to the value in the Min-SE header field, as described above. A proxy MUST NOT insert a Min-SE header field or modify the value of an existing header field in a proxied request if that request contains a Supported header field with the value ‘timer’. This is needed to protect against certain denial of service attacks, described in Section 11. Assuming that the proxy has requested a session timer (and thus has possibly inserted the Session-Expires header field or reduced it), the proxy MUST remember that it is using a session timer, and also remember the value of the Session-Expires header field from the proxied request. This MUST be remembered for the duration of the transaction. The proxy MUST remember, for the duration of the transaction, whether the request contained the Supported header field with the value ‘timer’. If the request did not contain a Supported header field with the value ‘timer’, the proxy MAY insert a Require header field with the value ‘timer’ into the request. However, this is NOT RECOMMENDED. This allows the proxy to insist on a session timer for the session. This header field is not needed if a Supported header field was in the request; in this case, the proxy would already be sure the session timer can be used for the session. 8.2. Processing of Responses When the final response to the request arrives, it is examined by the proxy. If the response does not contain a Session-Expires header field but the proxy remembers that it requested a session timer in the request (by inserting, modifying, or examining and accepting the Session-Expires header field in the proxied request), this means that the UAS did not support the session timer. If the proxy remembers that the UAC did not support the session timer either, the proxy forwards the response upstream normally. There is no session expiration for this session. If, however, the proxy remembers that the UAC did support the session timer, additional processing is needed. Because there is no Session-Expires or Require header field in the response, the proxy knows that it is the first session-timer-aware proxy to receive the response. This proxy MUST insert a Session-Expires header field into the response with the value it remembered from the forwarded request. It MUST set the value of the ‘refresher’ parameter to ‘uac’. The proxy MUST add the ‘timer’ Donovan & Rosenberg Standards Track [Page 14] RFC 4028 Session Timer April 2005 option tag to any Require header field in the response, and if none was present, add the Require header field with that value before forwarding it upstream. If the received response contains a Session-Expires header field, no modification of the response is needed. In all cases, if the 2xx response forwarded upstream by the proxy contains a Session-Expires header field, its value represents the session interval for the session associated with that response. The proxy computes the session expiration as the time when the 2xx response is forwarded upstream, plus the session interval. This session expiration MUST update any existing session expiration for the session. The refresher parameter in the Session-Expires header field in the 2xx response forwarded upstream will be present, and it indicates which UA is performing the refreshes. There can be multiple 2xx responses to a single INVITE, each representing a different dialog, resulting in multiple session expirations, one for each session associated with each dialog. The proxy MUST NOT modify the value of the Session-Expires header field received in the response (assuming one was present) before forwarding it upstream. 8.3. Session Expiration When the current time equals or passes the session expiration for a session, the proxy MAY remove associated call state, and MAY free any resources associated with the call. Unlike the UA, it MUST NOT send a BYE. 9. UAS Behavior The UAS must respond to a request for a session timer by the UAC or a proxy in the path of the request, or it may request that a session timer be used itself. If an incoming request contains a Supported header field with a value ‘timer’ and a Session Expires header field, the UAS MAY reject the INVITE request with a 422 (Session Interval Too Small) response if the session interval in the Session-Expires header field is smaller than the minimum interval defined by the UAS’ local policy. When sending the 422 response, the UAS MUST include a Min-SE header field with the value of its minimum interval. This minimum interval MUST NOT be lower than 90 seconds. If the UAS wishes to accept the request, it copies the value of the Session-Expires header field from the request into the 2xx response. Donovan & Rosenberg Standards Track [Page 15] RFC 4028 Session Timer April 2005 The UAS response MAY reduce its value but MUST NOT set it to a duration lower than the value in the Min-SE header field in the request, if it is present; otherwise the UAS MAY reduce its value but MUST NOT set it to a duration lower than 90 seconds. The UAS MUST NOT increase the value of the Session-Expires header field. If the incoming request contains a Supported header field with a value ‘timer’ but does not contain a Session-Expires header, it means that the UAS is indicating support for timers but is not requesting one. The UAS may request a session timer in the 2XX response by including a Session-Expires header field. The value MUST NOT be set to a duration lower than the value in the Min-SE header field in the request, if it is present. The UAS MUST set the value of the refresher parameter in the Session-Expires header field in the 2xx response. This value specifies who will perform refreshes for the dialog. The value is based on the value of this parameter in the request, and on whether the UAC supports the session timer extension. The UAC supports the extension if the ‘timer’ option tag was present in a Supported header field in the request. Table 2 defines how the value in the response is set. A value of ‘none’ in the 2nd column means that there was no refresher parameter in the request. A value of ‘NA’ in the third column means that this particular combination shouldn’t happen, as it is disallowed by the protocol. UAC supports? refresher parameter refresher parameter in request in response ——————————————————- N none uas N uac NA N uas NA Y none uas or uac Y uac uac Y uas uas Table 2: UAS Behavior The fourth row of Table 2 describes a case where both the UAC and UAS support the session timer extension, and where the UAC did not select who will perform refreshes. This allows the UAS to decide whether it or the UAC will perform the refreshes. However, as the table indicates, the UAS cannot override the UAC’s choice of refresher, if it made one. If the refresher parameter in the Session-Expires header field in the 2xx response has a value of ‘uac’, the UAS MUST place a Require header field into the response with the value ‘timer’. This is Donovan & Rosenberg Standards Track [Page 16] RFC 4028 Session Timer April 2005 because the uac is performing refreshes and the response has to be processed for the UAC to know this. If the refresher parameter in the 2xx response has a value of ‘uas’ and the Supported header field in the request contained the value ‘timer’, the UAS SHOULD place a Require header field into the response with the value ‘timer’. In this case, the UAC is not refreshing, but it is supposed to send a BYE if it never receives a refresh. Since the call will still succeed without the UAC sending a BYE, insertion of the Require is a SHOULD here, and not a MUST. Just like the UAC, the UAS stores state for the session timer. This state includes the session interval, the session expiration, and the identity of the refresher. This state is bound to the dialog used to set up the session. The session interval is set to the value of the delta-time from the Session-Expires header field in the most recent 2xx response to a session refresh request on that dialog. It also remembers whether it or its peer is the refresher on the dialog, based on the value of the refresher parameter from the most recent 2xx response to a session refresh request on that dialog. If the most recent 2xx response had no Session-Expires header field, there is no session expiration, and no refreshes have to be performed. If the UAS must refresh the session, it computes the session expiration. The session expiration is the time of transmission of the last 2xx response to a session refresh request on that dialog plus the session interval. If UA wishes to continue with the session beyond the session expiration, it MUST generate a refresh before the session expiration. It is RECOMMENDED that this refresh be sent once half the session interval has elapsed. Additional procedures for this refresh are described in Section 10. 10. Performing Refreshes The side generating a refresh does so according to the UAC procedures defined in Section 7. Note that only a 2xx response to a session refresh request extends the session expiration. This means that a UA could attempt a refresh and receive a 422 response with a Min-SE header field that contains a value much larger than the current session interval. The UA will still have to send a session refresh request before the session expiration (which has not changed), even though this request will contain a value of the Session-Expires that is much larger than the current session interval. If the session refresh request transaction times out or generates a 408 or 481 response, then the UAC sends a BYE request as per Section 12.2.1.2 of RFC 3261 [2]. If the session refresh request does not generate a 2xx response (and, as a result, the session is not refreshed), and a response other than 408 or 481 is received, the UAC Donovan & Rosenberg Standards Track [Page 17] RFC 4028 Session Timer April 2005 SHOULD follow the rules specific to that response code and retry if possible. For example, if the response is a 401, the UAC would retry the request with new credentials. However, the UAC SHOULD NOT continuously retry the request if the server indicates the same error response. Similarly, if the side not performing refreshes does not receive a session refresh request before the session expiration, it SHOULD send a BYE to terminate the session, slightly before the session expiration. The minimum of 32 seconds and one third of the session interval is RECOMMENDED. Firewalls and NAT ALGs may be very unforgiving about allowing SIP traffic to pass after the expiration time of the session. This is why the BYE should be sent before the expiration. 11. Security Considerations The session timer introduces the capability of a proxy or UA element to force compliant UAs to send refreshes at a rate of the element’s choosing. This introduces the possibility of denial-of-service attacks with significant amplification properties. These attacks can be launched from ‘outsiders’ (elements that attempt to modify messages in transit) or by ‘insiders’ (elements that are legitimately in the request path but are intent on doing harm). Fortunately, both cases are adequately handled by this specification. 11.1. Inside Attacks This introduces the possibility of rogue proxies or UAs introducing denial-of-service attacks. However, the mechanisms in this specification prevent that from happening. First, consider the case of a rogue UAC that wishes to force a UAS to generate refreshes at a rapid rate. To do so, it inserts a Session-Expires header field into an INVITE with a low duration and a refresher parameter equal to uas. Assume it places a Supported header field into the request. The UAS or any proxy that objects to this low timer will reject the request with a 422, thereby preventing the attack. If no Supported header field was present, the proxies will insert a Min-SE header field into the request before forwarding it. As a result, the UAS will not choose a session timer lower than the minimum allowed by all elements on the path. This too prevents the attack. Next, consider the case of a rogue UAS that wishes to force a UAC to generate refreshes at a rapid rate. In that case, the UAC has to support session timer. The initial INVITE arrives at the rogue UAS, Donovan & Rosenberg Standards Track [Page 18] RFC 4028 Session Timer April 2005 which returns a 2xx with a very small session interval. The UAC uses this timer and quickly sends a refresh. Section 7.4 requires that the UAC copy the current session interval into the Session-Expires header field in the request. This enables the proxies to see the current value. The proxies will reject this request and provide a Min-SE with a higher minimum, which the UAC will then use. Note, that if the proxies did not reject the request, but rather proxied the request with a Min-SE header field, an attack would still be possible. The UAS could discard this header field in a 2xx response and force the UAC to continue to generate rapid requests. In a similar fashion, a rogue proxy cannot force either the UAC or UAS to generate refreshes unless the proxy remains on the signaling path and sees every request and response. 11.2. Outside Attacks An element that can observe and modify a request or response in transit can force rapid session refreshes. To prevent this, requests and responses have to be protected by message integrity. Since the session timer header fields are not end-to-end and are manipulated by proxies, the SIP S/MIME capabilities are not suitable for this task. Rather, integrity has to be protected by using hop-by-hop mechanisms. As a result, it is RECOMMENDED that an element send a request with a Session-Expires header field or a Supported header field with the value ‘timer’ by using TLS. As adequate protection is obtained only if security is applied on each hop, it is RECOMMENDED that the SIPS URI scheme be used in conjunction with this extension. This means that proxies that record-route and request session timer SHOULD record-route with a SIPS URI. A UA that inserts a Session-Expires header into a request or response SHOULD include a Contact URI that is a SIPS URI. 12. IANA Considerations This extension defines two new header fields, a new response code, and a new option tag. SIP [2] defines IANA procedures for registering these. 12.1. IANA Registration of Min-SE and Session-Expires Header Fields The following is the registration for the Min-SE header field: RFC Number: RFC 4028 Header Name: Min-SE Compact Form: none Donovan & Rosenberg Standards Track [Page 19] RFC 4028 Session Timer April 2005 The following is the registration for the Session-Expires header field: RFC Number: RFC 4028 Header Name: Session-Expires Compact Form: x 12.2. IANA Registration of the 422 (Session Interval Too Small) Response Code The following is the registration for the 422 (Session Interval Too Small) response code: Response Code: 422 Default Reason Phrase: Session Interval Too Small RFC Number: RFC 4028 12.3. IANA Registration of the ‘timer’ Option Tag The following is the registration for the ‘timer’ option tag: Name: timer Description: This option tag is for support of the session timer extension. Inclusion in a Supported header field in a request or response indicates that the UA can perform refreshes according to that specification. Inclusion in a Require header in a request means that the UAS must understand the session timer extension to process the request. Inclusion in a Require header field in a response indicates that the UAC must look for the Session-Expires header field in the response and process it accordingly. 13. Example Call Flow Example Session Timer Flow Alice Proxy P1 Proxy P2 Bob |(1) INVITE | | | |SE: 50 | | | |———–>| | | |(2) 422 | | | |MSE: 3600 | | | |<-----------| | | |(3) ACK | | | |----------->| | | |(4) INVITE | | | |SE:3600 | | | |MSE:3600 | | | |———–>| | | Donovan & Rosenberg Standards Track [Page 20] RFC 4028 Session Timer April 2005 | |(5) INVITE | | | |SE:3600 | | | |MSE:3600 | | | |———–>| | | |(6) 422 | | | |MSE:4000 | | | |<-----------| | | |(7) ACK | | | |----------->| | |(8) 422 | | | |MSE:4000 | | | |<-----------| | | |(9) ACK | | | |----------->| | | |(10) INVITE | | | |SE:4000 | | | |MSE:4000 | | | |———–>| | | | |(11) INVITE | | | |SE:4000 | | | |MSE:4000 | | | |———–>| | | | |(12) INVITE | | | |SE:4000 | | | |MSE:4000 | | | |———–>| | | |(13) 200 OK | | | |SE:4000 | | | |<-----------| | |(14) 200 OK | | | |SE:4000 | | | |<-----------| | |(15) 200 OK | | | |SE:4000 | | | |<-----------| | | |(16) ACK | | | |----------->| | | | |(17) ACK | | | |————————>| |(18) UPDATE | | | |SE:4000 | | | |———–>| | | | |(19) UPDATE | | | |SE:4000 | | | |————————>| | |(20) 200 OK | | | |SE:4000 | | | |<------------------------| Donovan & Rosenberg Standards Track [Page 21] RFC 4028 Session Timer April 2005 |(21) 200 OK | | | |SE:4000 | | | |<-----------| | | | |(22) BYE | | | |<------------------------| |(23) BYE | | | |<-----------| | | | |(24) 408 | | | |------------------------>| Figure 1: Example Session Timer Flow Figure 1 gives an example of a call flow that makes use of the session timer. In this example, both the UAC and UAS support the session timer extension. The initial INVITE request generated by the UAC, Alice (message 1), might look like this: INVITE sips:[email protected] SIP/2.0 Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds8 Supported: timer Session-Expires: 50 Max-Forwards: 70 To: Bob From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314159 INVITE Contact: Content-Type: application/sdp Content-Length: 142 (Alice’s SDP not shown) This request indicates that Alice supports the session timer, and is requesting session refreshes every 50 seconds. This arrives at the first proxy, P1. This session interval is below the minimum allowed value of 3600. So P1 rejects the request with a 422 (message 2): SIP/2.0 422 Session Interval Too Small Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds8 ;received=192.0.2.1 Min-SE: 3600 To: Bob ;tag=9a8kz From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314159 INVITE Donovan & Rosenberg Standards Track [Page 22] RFC 4028 Session Timer April 2005 This response contains a Min-SE header field with the value 3600. Alice then retries the request. This time, the request contains a Min-SE header, as Alice has received a 422 for other INVITE requests with the same Call-ID. The new request (message 4) might look like this: INVITE sips:[email protected] SIP/2.0 Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds9 Supported: timer Session-Expires: 3600 Min-SE: 3600 Max-Forwards: 70 To: Bob From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314160 INVITE Contact: Content-Type: application/sdp Content-Length: 142 (Alice’s SDP not shown) Proxy P1 record-routes. Since the session interval is now acceptable to it, it forwards the request to P2 (message 5). However, the session interval is below its minimum configured amount of 4000. So it rejects the request with a 422 response code (message 6) and includes a Min-SE header field with the value of 4000. Once more, Alice retries the INVITE. This time, the Min-SE header field in her INVITE is the maximum of all Min-SE she has received (3600 and 4000). Message 10 might look like this: INVITE sips:[email protected] SIP/2.0 Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds10 Supported: timer Session-Expires: 4000 Min-SE: 4000 Max-Forwards: 70 To: Bob From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314161 INVITE Contact: Content-Type: application/sdp Content-Length: 142 (Alice’s SDP not shown) Donovan & Rosenberg Standards Track [Page 23] RFC 4028 Session Timer April 2005 P1 record-routes once again, but P2 does not (this wouldn’t normally happen; presumably, if it asked for session timer, it would record-route the subsequent request). The UAS receives the request. It copies the Session-Expires header from the request to the response and adds a refresher parameter with value ‘uac’. This 200 OK is forwarded back to Alice. The response she receives (message 15) might look like this: SIP/2.0 200 OK Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds10 ;received=192.0.2.1 Require: timer Supported: timer Record-Route: sips:p1.atlanta.example.com;lr Session-Expires: 4000;refresher=uac To: Bob ;tag=9as888nd From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314161 INVITE Contact: Content-Type: application/sdp Content-Length: 142 (Bob’s SDP not shown) Alice generates an ACK (message 16), which is routed through P1 and then to Bob. Since Alice is the refresher, around 2000 seconds later Alice sends an UPDATE request to refresh the session. Because this request is part of an established dialog and Alice has not received any 422 responses or requests on that dialog, there is no Min-SE header field in her request (message 18): UPDATE sips:[email protected] SIP/2.0 Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds12 Route: sips:p1.atlanta.example.com;lr Supported: timer Session-Expires: 4000;refresher=uac Max-Forwards: 70 To: Bob ;tag=9as888nd From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314162 UPDATE Contact: Donovan & Rosenberg Standards Track [Page 24] RFC 4028 Session Timer April 2005 This is forwarded through P1 to Bob. Bob generates a 200 OK, copying the Session-Expires header field into the response. This is forwarded through P1 and arrives at Alice. The response she receives (message 21) might look like this: SIP/2.0 200 OK Via: SIP/2.0/TLS pc33.atlanta.example.com;branch=z9hG4bKnashds12 ;received=192.0.2.1 Require: timer Session-Expires: 4000;refresher=uac To: Bob ;tag=9as888nd From: Alice ;tag=1928301774 Call-ID: a84b4c76e66710 CSeq: 314162 UPDATE Contact: Shortly afterward, Alice’s UA crashes. As a result, she never sends a session refresh request. 3968 seconds later, Bob times out and sends a BYE request (message 22). This is sent to P1. P1 attempts to deliver it but fails (because Alice’s UA has crashed). P1 then returns a 408 (Request Timeout) to Bob. 14. Acknowledgements The authors wish to thank Brett Tate for his contributions to this work. Brian Rosen completed the editing of the document. 15. References 15.1. Normative References [1] Bradner, S., “Key words for use in RFCs to Indicate Requirement Levels”, BCP 14, RFC 2119, March 1997. [2] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., and E. Schooler, “SIP: Session Initiation Protocol”, RFC 3261, June 2002. [3] Rosenberg, J., “The Session Initiation Protocol (SIP) UPDATE Method”, RFC 3311, October 2002. [4] Rosenberg, J. and H. Schulzrinne, “An Offer/Answer Model with Session Description Protocol (SDP)”, RFC 3264, June 2002. Donovan & Rosenberg Standards Track [Page 25] RFC 4028 Session Timer April 2005 15.2. Informative References [5] Schulzrinne, H., Casner, S., Frederick, R., and V. Jacobson, “RTP: A Transport Protocol for Real-Time Applications”, STD 64, RFC 3550, July 2003. [6] Srisuresh, P. and M. Holdrege, “IP Network Address Translator (NAT) Terminology and Considerations”, RFC 2663, August 1999. [7] Rosenberg, J. and H. Schulzrinne, “Reliability of Provisional Responses in Session Initiation Protocol (SIP)”, RFC 3262, June 2002. [8] Roach, A., “Session Initiation Protocol (SIP)-Specific Event Notification”, RFC 3265, June 2002. Authors’ Addresses Steve Donovan Cisco Systems, Inc. 2200 E. President George Bush Turnpike Richardson, Texas 75082 US EMail: [email protected] Jonathan Rosenberg Cisco Systems, Inc. 600 Lanidex Plaza Parsippany, NJ 07054 US EMail: [email protected] Donovan & Rosenberg Standards Track [Page 26] RFC 4028 Session Timer April 2005 Full Copyright Statement Copyright (C) The Internet Society (2005). This document is subject to the rights, licenses and restrictions contained in BCP 78, and except as set forth therein, the authors retain all their rights. This document and the information contained herein are provided on an “AS IS” basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Intellectual Property The IETF takes no position regarding the validity or scope of any Intellectual Property Rights or other rights that might be claimed to pertain to the implementation or use of the technology described in this document or the extent to which any license under such rights might or might not be available; nor does it represent that it has made any independent effort to identify any such rights. Information on the procedures with respect to rights in RFC documents can be found in BCP 78 and BCP 79. Copies of IPR disclosures made to the IETF Secretariat and any assurances of licenses to be made available, or the result of an attempt made to obtain a general license or permission for the use of such proprietary rights by implementers or users of this specification can be obtained from the IETF on-line IPR repository at http://www.ietf.org/ipr. The IETF invites any interested party to bring to its attention any copyrights, patents or patent applications, or other proprietary rights that may cover technology that may be required to implement this standard. Please address the information to the IETF at ietf- [email protected]. Acknowledgement Funding for the RFC Editor function is currently provided by the Internet Society. Donovan & Rosenberg Standards Track [Page 27]

키워드에 대한 정보 sip session timer too small

다음은 Bing에서 sip session timer too small 주제에 대한 검색 결과입니다. 필요한 경우 더 읽을 수 있습니다.

이 기사는 인터넷의 다양한 출처에서 편집되었습니다. 이 기사가 유용했기를 바랍니다. 이 기사가 유용하다고 생각되면 공유하십시오. 매우 감사합니다!

사람들이 주제에 대해 자주 검색하는 키워드 SIP Session Timers : Who is refreshing the session?

  • SIP
  • VOIP
  • Session-timers
  • session initiation protocol
  • hosted voip
  • network
  • voip engineer
  • voice engineer

SIP #Session #Timers #: #Who #is #refreshing #the #session?


YouTube에서 sip session timer too small 주제의 다른 동영상 보기

주제에 대한 기사를 시청해 주셔서 감사합니다 SIP Session Timers : Who is refreshing the session? | sip session timer too small, 이 기사가 유용하다고 생각되면 공유하십시오, 매우 감사합니다.

See also  Taxi Podlasie Biała Podlaska Numer | Bramki | Wisłoka Dębica - Podlasie Biała Podlaska | 17.08.2022 25988 명이 이 답변을 좋아했습니다

Leave a Comment