Skip to main content

Session Initiation Protocol (SIP) Recording Call Flows
draft-ietf-siprec-callflows-08

Yes

(Alissa Cooper)

No Objection

(Alia Atlas)
(Alvaro Retana)
(Ben Campbell)
(Deborah Brungard)
(Mirja Kühlewind)
(Terry Manderson)

Note: This ballot was opened for revision 07 and is now closed.

Alissa Cooper Former IESG member
Yes
Yes (for -07) Unknown

                            
Alia Atlas Former IESG member
No Objection
No Objection (for -07) Unknown

                            
Alvaro Retana Former IESG member
No Objection
No Objection (for -07) Unknown

                            
Ben Campbell Former IESG member
No Objection
No Objection (for -07) Unknown

                            
Benoît Claise Former IESG member
No Objection
No Objection (2016-12-01 for -07) Unknown
The authors agreed to include Carlos Pignataro's OPS DIR feedback in the next version.
Deborah Brungard Former IESG member
No Objection
No Objection (for -07) Unknown

                            
Jari Arkko Former IESG member
No Objection
No Objection (2016-12-01 for -07) Unknown
Dan Romascanu's Gen-ART review brought up editorial suggestions that are worth looking at.
Kathleen Moriarty Former IESG member
No Objection
No Objection (2016-11-30 for -07) Unknown
I had the smae question about privacy considerations that the SecDir reviewer noted:
https://www.ietf.org/mail-archive/web/secdir/current/msg06953.html

But see it is covered in the referenced drafts.  As such, could you note in the security considerations section the references are for both security and privacy considerations?  Just add "and privacy".
Mirja Kühlewind Former IESG member
No Objection
No Objection (for -07) Unknown

                            
Stephen Farrell Former IESG member
No Objection
No Objection (2016-12-01 for -07) Unknown
One of the SIPREC security issues we had to deal with was
getting agreement that commensurate security mechanisms need
to be used for calls and related recording sessions. It's a
pity that none of the flows included here demonstrate that
aspect. In particular, a set of calls that do not have
commensurate security settings might otherwise map to 1 RS,
which I think (not 100% sure) could affect the flows shown
in 3.4.
Suresh Krishnan Former IESG member
No Objection
No Objection (2016-11-29 for -07) Unknown
* Section 3.1

Can you please clarify what a "Turret flow" is (and hopefully add a reference)? It is not immediately clear why this is special.
Terry Manderson Former IESG member
No Objection
No Objection (for -07) Unknown