Internet Engineering Task Force (IETF) R. Jesske Request for Comments: 6432 L. Liess Category: Standards Track Deutsche Telekom ISSN: 2070-1721 November 2011
Carrying Q.850 Codes in Reason Header Fields in SIP (Session Initiation Protocol) Responses
Although the use of the SIP (Session Initiation Protocol) Reason header field in responses is considered in general in RFC 3326, its use is not specified for any particular response code. Nonetheless, existing deployments have been using Reason header fields to carry failure-related Q.850 cause codes in SIP responses to INVITE requests that have been gatewayed to Public Switched Telephone Network (PSTN) systems. This document normatively describes the use of the Reason header field in carrying Q.850 cause codes in SIP responses.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Further information on Internet Standards is available in Section 2 of RFC 5741.
Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
Jesske & Liess Standards Track [Page 1]
RFC 6432 Reason Header Field November 2011
This document may contain material from IETF Documents or IETF Contributions published or made publicly available before November 10, 2008. The person(s) controlling the copyright in some of this material may not have granted the IETF Trust the right to allow modifications of such material outside the IETF Standards Process. Without obtaining an adequate license from the person(s) controlling the copyright in such materials, this document may not be modified outside the IETF Standards Process, and derivative works of it may not be created outside the IETF Standards Process, except to format it for publication as an RFC or to translate it into languages other than English.
Although the use of the SIP (Session Initiation Protocol) Reason header field in responses is considered in general in RFC 3326 [RFC3326], its use is not specified for any particular response code. Nonetheless, existing deployments have been using Reason header fields to carry failure-related Q.850 [Q.850] cause codes in SIP responses to INVITE requests that have been gatewayed to PSTN systems. This document normatively describes the use of the Reason header field in SIP responses to carry Q.850 [Q.850] cause codes.
This document allows SIP responses to carry Reason header fields as follows:
Any SIP Response message, with the exception of a 100 (Trying), MAY contain a Reason header field with a Q.850 [Q.850] cause code.
The Reason header field is not needed in the 100 (Trying) responses, since they are transmitted hop by hop, not end to end. SIP responses with Reason header fields carrying values other than Q.850 [Q.850] cause codes are outside of the scope of this document.
This specification allows the presence of the Reason header field containing Q.850 [Q.850] cause codes in responses. The presence of the Reason header field in a response does not affect the treatment of the response. Nevertheless, there could be situations where a wrong Q.850 [Q.850] cause code could, for example, cause an announcement system to play the wrong information. To avoid such situations, it is RECOMMENDED that this header field be protected by a suitable integrity mechanism. The use of transport- or network- layer hop-by-hop security mechanisms, such as Transport Layer Security (TLS) or IPsec with appropriate cipher suites, can satisfy this requirement.