Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies
RFC 5393
Yes
(Cullen Jennings)
(Jari Arkko)
No Objection
(Chris Newman)
(Dan Romascanu)
(David Ward)
(Lisa Dusseault)
(Magnus Westerlund)
(Mark Townsley)
(Pasi Eronen)
(Ron Bonica)
(Ross Callon)
(Russ Housley)
(Tim Polk)
Note: This ballot was opened for revision 08 and is now closed.
Cullen Jennings Former IESG member
Yes
Yes
()
Jari Arkko Former IESG member
Yes
Yes
()
Chris Newman Former IESG member
No Objection
No Objection
()
Dan Romascanu Former IESG member
No Objection
No Objection
()
David Ward Former IESG member
No Objection
No Objection
()
Lisa Dusseault Former IESG member
No Objection
No Objection
()
Magnus Westerlund Former IESG member
No Objection
No Objection
()
Mark Townsley Former IESG member
No Objection
No Objection
()
Pasi Eronen Former IESG member
(was Discuss)
No Objection
No Objection
()
Ron Bonica Former IESG member
No Objection
No Objection
()
Ross Callon Former IESG member
No Objection
No Objection
()
Russ Housley Former IESG member
No Objection
No Objection
()
Tim Polk Former IESG member
(was No Record, Discuss)
No Objection
No Objection
(2008-10-22)
I was a little confused by the compliance language in section 4.2.1 and 4.2.2 of this specification. Specifically: In 4.2.1, the paragraph beginning with "Proxies required to perform loop-detection ..." contains the following conformance requirement: "Such proxies SHOULD create a branch value separable into two parts ..." implying that they can perform this loop detection even if they don't generate two part branch values. In 4.2.2, the Loop Detection Check is defined based on the presence of the second part. This implies the statement above needs to be MUST. I may be missing something, but I would suggest the authors review 4.2.1 and 4.2.2 to ensure that the conformance requirements are consistent.