datatracker.ietf.org
Sign in
Version 5.6.3, 2014-09-19
Report a bug

Loop Detection Mechanisms for Session Initiation Protocol (SIP) Back-to-Back User Agents (B2BUAs)
draft-kaplan-straw-b2bua-loop-detection-01

Document type: Expired Internet-Draft (individual)
Document stream: No stream defined
Last updated: 2013-08-29 (latest revision 2013-02-25)
Intended RFC status: Unknown
Other versions: (expired, archived): plain text, pdf, html

Stream State:No stream defined
Document shepherd: No shepherd assigned

IESG State: Expired
Responsible AD: (None)
Send notices to: No addresses provided

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found here:
http://www.ietf.org/archive/id/draft-kaplan-straw-b2bua-loop-detection-01.txt

Abstract

SIP Back-to-Back User Agents (B2BUAs) can cause unending SIP request routing loops because, as User Agent Clients, they can generate SIP requests with new Max-Forwards values. This document discusses the difficulties associated with loop detection for B2BUAs, and requirements for them to prevent infinite loops.

Authors

Hadriel Kaplan <hkaplan@acmepacket.com>
Victor Pascual <vpascual@acmepacket.com>

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid)