[SR-Users] Fwd: [RAI] SIPit 28 summary

Klaus Darilion klaus.mailinglists at pernau.at
Fri Apr 15 18:46:43 CEST 2011



-------- Original-Nachricht --------
Betreff: [RAI] SIPit 28 summary
Datum: Fri, 15 Apr 2011 10:47:08 -0500
Von: Robert Sparks <rjsparks at nostrum.com>
An: rai at ietf.org

Also available at <https://www.sipit.net/SIPit28_summary>

RjS

--------

SIPit 28 was hosted by Digium in Huntsville, Alabama, USA
the week of Arpil 11-15, 2010.

There were 54 attendees from 19 companies visiting from 10 countries.
We had 40 distinct implementations.

The roles represented (some implementations act in more than one role)
 34 endpoints
  6 proxy/registrars/b2bua/sbcs
  1 dedicated event server

Implementations using each transport for SIP messages:
   UDP   98%
   TCP   95%
   TLS   68% server-auth, 50% mutual-auth
   SCTP  10%
   DTLS   0%

68% of the implementations present supported IPv6.

There was one RFC4474 Identity implementation present.

For DNS we had support for:
   Full RFC3263		: 53%
   SRV only		: 33%
   A records only	: 15%
   no DNS support	: 0%

Support for various items in the endpoints:
  76% replaces
  38% 5389stun
  26% turn
  24% 3489stun
  24% ice
  21% sip/stun multiplexing
  21% outbound
  21% gruu
  18% path
  18% join
  18% diversion
   6% history-info (there were no implementations of 4244bis)
   3% service-route
   3% sigcomp

Support for various items in the proxy/registrars:
  50% path
  50% outbound
  33% sip/stun multiplexing
  20% diversion
  18% gruu
  17% history-info
  17% service-route

The endpoints and B2BUAs implemented these methods:
 100% INVITE, CANCEL, ACK, BYE
  94% REGISTER
  91% OPTIONS
  91% REFER
  82% NOTIFY
  82% INFO
  79% UPDATE
  71% SUBSCRIBE
  68% PRACK
  47% PUBLISH
  29% MESSAGE

94% of the implementations sent RTP from the port advertised for
reception (symmetric-rtp).
One of the implementations required the other party to use symmetric-rtp.

88% of the UAs present both sent RTCP and paid attention to RTCP they
received.

56% of the endpoints present supported SRTP using sdes.
There was one dtls-srtp implementations at this SIPit.

67% of the endpoints supported multipart/MIME.
There were no implementations present with S/MIME support.

48% of the implementations present followed RFC6026 (corrections to the
INVITE transaction)
68% followed RFC4320 (corrections to the non-INVITE transaction)

There were 5 SIP Event Server implementations (not counting endpoints
that support events only for refer).
There were 9 SIP Event Client implementations (not counting endpoints
that support events only for refer).

These event packages were supported:
  Server   Client
    2        3        presence
    1        0        presence.winfo
    1        6        message-summary
    2        5        dialog
    0        2        reg
    2        1        conference
    1        0        xcap-diff
    0        1        kpml

These packages were supported with the eventlist extension:
  Server   Client
    1        0        presence

Five of the proxies present still rely only on max-forwards.
There was one implementation of fork-loop-fix, but no implementations of
max-breadth.

Multiparty tests

(Thanks to Eoin McLeod for contributing notes for several tests)

The Forking test was very well attended. We had the majority of the
participants
at the multiparty table. Many teams took away good new information from
watching
their implementation react to multiple merges and to Via stacks with
transports
switching between IPv4 and IPv6. Forcing multiple 200 Oks was more
difficult than
usual given the network equipment at hand. We've created a set of
standing automated
tests that will allow endpoints and proxies to test that scenario at
their leisure.

The TLS multiparty leveraged DNS to reduce configuration churn. We
ensured a full
mesh of connections between participating elements. There were some
issues uncovered
with the values used in Route/Record-Route not matching the configured
certificates
at an element. We brainstormed a configuration for the next event that
will efficiently
expose whether elements are correctly opening a new connection (rather
than reusing an
existing connection) when a new request with a resource belonging to an
authority not
matching what had been authenticated on the existing connection arrived.

The SRTP tests showed a high level of interoperability (all with SDES
keying),
including hold/resume and transfer scenarios. There was a successful
test of a
call with media running long enough to increment the ROC, followed by a
hold/resume. Several participants were trying variants of
"best-effort/opportunistic" encryption with lower levels of success.  These
elements tested providing offers with both RTP/AVP and RTP/SAVP media-lines
describing the same logical media channel, and with multiple RTP/AVP media
lines decorated with different crypto attributes.

The STUN/TURN/ICE tests had very high levels of interoperability. The test
scenario involved elements in two natted networks sharing the same
address space
and elements in the public address space (including a separate TURN
server for each
of the private network islands). We had a mix of elements that supported
relay
allocation and elements that presented only host/reflexive candidates.
A few elements assumed that all of the m-lines in an offer had to
present ICE
candidates. SDP with a mix of ICE enabled m-lines and m-lines without
candidates
caused ICE failures.

The Outbound test showed several successful flows being created and
maintained.
A mesh of edge-proxies and proxy/registrars were set up and endpoints
established
flows through several combinations. There was good UA support for the
Flow-Timer,
but there were implementations present that didn't randomize the
keepalive value.
There was not much testing of recovery from failed flows at this event -
we'll
focus on that at SIPit 29.

We held a long multiparty session focusing on exchanging video with
constrained
bandwidth or impaired (latent or lossy) networks. There was a high level of
basic interoperability and reasonable reaction to mid-call shifts in network
conditions, but all parties involved came away with changes they wanted
to make
in their implementations.

The Spiral test presented requests to the participating UAs containing a
mix of
UDP, TCP, and TLS over IPv4 and IPv6 values in large Via and
Record-Route stacks.
Correct operation of subsequent in-dialog requests in both directions
was tested,
discovering a few implementation problems, and some invalid assumptions
about how
dialog-stateful proxies might need to behave, but most scenarios worked
well. We
followed the usual Spiral test with a "fuzz-ball" test utilizing DNS SRV
to randomly
distribute the propagation of messages through all of the proxies
present, hopping
off to the UAs with a low probability, resulting in an easy-to-configure
test that
exercised a full-mesh of connections between proxies and presented the
UAs with
very diverse (and large) Via and Record-Route header field values.

We exercised the RFC5393 proxy-doom scenario, again leveraging the SRV
load-leveling
capabilities to simplify configuration. We had messages popping out to
the UAs from
each level of the tree, giving them a very large-scale merge test.



_______________________________________________
RAI mailing list
RAI at ietf.org
https://www.ietf.org/mailman/listinfo/rai



More information about the sr-users mailing list