Skip to main content

Session Initiation Protocol (SIP) Torture Test Messages
draft-ietf-sipping-torture-tests-09

Revision differences

Document history

Date Rev. By Action
2012-08-22
09 (System) post-migration administrative database adjustment to the No Objection position for Russ Housley
2006-05-18
09 Russ Housley Shepherding AD has been changed to Jon Peterson from Allison Mankin
2005-11-22
09 Amy Vezza State Changes to RFC Ed Queue from Approved-announcement sent by Amy Vezza
2005-11-16
09 Amy Vezza IESG state changed to Approved-announcement sent
2005-11-16
09 Amy Vezza IESG has approved the document
2005-11-16
09 Amy Vezza Closed "Approve" ballot
2005-11-16
09 Allison Mankin State Changes to Approved-announcement to be sent from IESG Evaluation::AD Followup by Allison Mankin
2005-11-16
09 Allison Mankin State Change Notice email list have been change to gonzalo.camarillo@ericsson.com, dean.willis@softarmor.comrohan@ekabal.com, rsparks@nostrum.com from gonzalo.camarillo@ericsson.com, dean.willis@softarmor.comrohan@ekabal.com
2005-11-15
09 (System) New version available: draft-ietf-sipping-torture-tests-09.txt
2005-11-14
09 Russ Housley [Ballot Position Update] Position for Russ Housley has been changed to No Objection from Discuss by Russ Housley
2005-11-14
09 Allison Mankin Copied Russ's discuss on the S/MIME example so the fixes can be checked when it shows up
2005-11-14
09 Allison Mankin S/MIME example moved to be only in sec-flows rather than making this normative on that
2005-11-14
09 Allison Mankin Note field has been cleared by Allison Mankin
2005-10-26
09 (System) Sub state has been changed to AD Follow up from New Id Needed
2005-10-26
08 (System) New version available: draft-ietf-sipping-torture-tests-08.txt
2005-10-05
09 Allison Mankin [Note]: 'Waiting for update to signature example' added by Allison Mankin
2005-10-05
09 Allison Mankin
Mail from Robert Sparks 9/16 noting that the Editor Cullen just had a baby so that will delay
the rev, but:

addressing Russ' concerns with …
Mail from Robert Sparks 9/16 noting that the Editor Cullen just had a baby so that will delay
the rev, but:

addressing Russ' concerns with the torture test draft:

- Cullen and Eric have looked at openssl and Eric thinks the required
  changes to that library are doable. If this hasn't been done already, it will
  be the first time Cullen and Eric have a few minutes to sit together. The path to
  getting a correctede xample message has been charted and looks manageable.

[Eric  = Eric Rescorla]

[We're tracking the delay - it's not a black hole, but a lot of delay.  The benefit is
that there's a tarball on the document, so this isn't  just going to result in
a cosmetic example, the signature does get used in testing]
2005-10-05
09 Allison Mankin [Note]: 'Document was not released till there were five full peer reviews.  Tests used in interops.
' added by Allison Mankin
2005-06-24
09 Amy Vezza State Changes to IESG Evaluation::Revised ID Needed from IESG Evaluation by Amy Vezza
2005-06-24
09 Amy Vezza State Changes to IESG Evaluation from Approved-announcement to be sent by Amy Vezza
2005-06-24
09 Amy Vezza State Changes to Approved-announcement to be sent from IESG Evaluation by Amy Vezza
2005-06-24
09 Amy Vezza [Note]: 'Document was not released till there were five full peer reviews.  Tests used in interops.
' added by Amy Vezza
2005-06-24
09 (System) Removed from agenda for telechat - 2005-06-23
2005-06-23
09 Mark Townsley [Ballot Position Update] New position, No Objection, has been recorded for Mark Townsley by Mark Townsley
2005-06-22
09 David Kessens [Ballot Position Update] New position, No Objection, has been recorded for David Kessens by David Kessens
2005-06-22
09 Russ Housley
[Ballot discuss]
I decoded the CMS SignedData structure in section 3.1.1.11, and it
  contains a few things that surprised me.

    - The …
[Ballot discuss]
I decoded the CMS SignedData structure in section 3.1.1.11, and it
  contains a few things that surprised me.

    - The encoding of the SHA-1 algorithm identifier is valid, but
      it is not the preferred form.  The preferred form omits the
      NULL parameters as is clearly stated in RFC 3370 in section 2.1,
      which says: "Implementations SHOULD generate SHA-1
      AlgorithmIdentifiers with absent parameters."

    - The S/MIME Capabilities advertise support for Triple-DES-CBC,
      RC2-128-CBC, RC2-64-CBC, RC2-40-CBC, and DES-CBC.  The last two
      algorithms are clearly deprecated.  I would like to see AES in
      this list.  RFC 3853 requires SIP support for AES.

  This signature cannot be properly validated without the trust anchor
  for the certificate issuer (OU=Sipit Test Certificate Authority,
  O=sipit, L=San Jose, ST=California, C=US).  The RSA public key is
  needed to validate the signature on the certificate.
2005-06-22
09 Michelle Cotton IANA Comments:
We understand this document to have NO IANA Actions.
2005-06-22
09 Ted Hardie [Ballot Position Update] New position, No Objection, has been recorded for Ted Hardie by Ted Hardie
2005-06-22
09 Russ Housley
[Ballot discuss]
I decoded the CMS SignedData structure in section 3.1.1.11, and it
  contains a few things that surprised me.

    - The …
[Ballot discuss]
I decoded the CMS SignedData structure in section 3.1.1.11, and it
  contains a few things that surprised me.

    - The encoding of the SHA-1 algorithm identifier is valid, but
      it is not the preferred form.  The preferred form omits the
      NULL parameters as is clearly stated in RFC 3370 in section 2.1,
      which says: "Implementations SHOULD generate SHA-1
      AlgorithmIdentifiers with absent parameters."

    - The S/MIME Capabilities advertise support for Triple-DES-CBC,
      RC2-128-CBC, RC2-64-CBC, RC2-40-CBC, and DES-CBC.  The last two
      algorithms are clearly deprecated.  I would like to see AES in
      this list.  RFC 3853 requires SIP support for AES.

    - The validity period in fluffy's certificate has not begun yet.
      The certificate will not be valid until 12/04/2005 17:19:38 GMT.

  This signature cannot be properly validated without the trust anchor
  for the certificate issuer (OU=Sipit Test Certificate Authority,
  O=sipit, L=San Jose, ST=California, C=US).  The RSA public key is
  needed to validate the signature on the certificate.
2005-06-22
09 Russ Housley
[Ballot discuss]
This signature cannot be properly validated without the trust anchor
  for the certificate issuer (OU=Sipit Test Certificate Authority,
  O=sipit, L=San Jose, …
[Ballot discuss]
This signature cannot be properly validated without the trust anchor
  for the certificate issuer (OU=Sipit Test Certificate Authority,
  O=sipit, L=San Jose, ST=California, C=US).  The RSA public key is
  needed to validate the signature on the certificate.

  I decoded the CMS SignedData structure in section 3.1.1.11, and it
  contains a few things that surprised me.

    - The encoding of the SHA-1 algorithm identifier is valid, but
      it is not the preferred form.  The preferred form omits the
      NULL parameters as is clearly stated in RFC 3370 in section 2.1,
      which says: "Implementations SHOULD generate SHA-1
      AlgorithmIdentifiers with absent parameters."

    - The S/MIME Capabilities advertise support for Triple-DES-CBC,
      RC2-128-CBC, RC2-64-CBC, RC2-40-CBC, and DES-CBC.  The last two
      algorithms are clearly deprecated.  I would like to see AES in
      this list.  RFC 3853 requires SIP support for AES.

    - The validity period in fluffy's certificate has not begun yet.
      The certificate will not be valid until 12/04/2005 17:19:38 GMT.
2005-06-22
09 Russ Housley [Ballot Position Update] New position, Discuss, has been recorded for Russ Housley by Russ Housley
2005-06-20
09 Brian Carpenter
[Ballot comment]
No tests related to IPv6 addresses, as far as I can
see. Since IPv6 address contain colons and there are colons
in SIP …
[Ballot comment]
No tests related to IPv6 addresses, as far as I can
see. Since IPv6 address contain colons and there are colons
in SIP syntax, it might be as well to torture implementations
in this area too.
2005-06-20
09 Brian Carpenter [Ballot Position Update] New position, No Objection, has been recorded for Brian Carpenter by Brian Carpenter
2005-06-16
09 Allison Mankin [Note]: 'Document was not released till there were five full peer reviews.  Tests used in interops.
' added by Allison Mankin
2005-06-16
09 Allison Mankin [Note]: 'Document was not released till there were five full peer reviews.  Tests used in interops.' added by Allison Mankin
2005-06-16
09 Allison Mankin [Ballot Position Update] New position, Yes, has been recorded for Allison Mankin
2005-06-16
09 Allison Mankin Ballot has been issued by Allison Mankin
2005-06-16
09 Allison Mankin Created "Approve" ballot
2005-06-16
09 (System) Last call text was added
2005-06-16
09 (System) Ballot approval text was added
2005-06-16
09 Allison Mankin Placed on agenda for telechat - 2005-06-23 by Allison Mankin
2005-06-16
09 Allison Mankin State Changes to IESG Evaluation from Publication Requested by Allison Mankin
2005-06-16
09 Allison Mankin
Reviewed (but forgot to put into AD Evaluation state).  The working group did a lot of
review of this, with explicit review tokens assigned.  I …
Reviewed (but forgot to put into AD Evaluation state).  The working group did a lot of
review of this, with explicit review tokens assigned.  I think it is carefully done.
2005-05-31
09 Dinara Suleymanova Draft Added by Dinara Suleymanova in state Publication Requested
2005-05-24
07 (System) New version available: draft-ietf-sipping-torture-tests-07.txt
2005-04-14
06 (System) New version available: draft-ietf-sipping-torture-tests-06.txt
2005-03-18
05 (System) New version available: draft-ietf-sipping-torture-tests-05.txt
2004-07-15
04 (System) New version available: draft-ietf-sipping-torture-tests-04.txt
2004-01-22
03 (System) New version available: draft-ietf-sipping-torture-tests-03.txt
2003-11-21
02 (System) New version available: draft-ietf-sipping-torture-tests-02.txt
2003-10-24
01 (System) New version available: draft-ietf-sipping-torture-tests-01.txt
2002-08-27
00 (System) New version available: draft-ietf-sipping-torture-tests-00.txt