TOC |
|
This Internet-Draft is submitted to IETF in full conformance with the provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering Task Force (IETF), its areas, and its working groups. Note that other groups may also distribute working documents as Internet-Drafts.
Internet-Drafts are draft documents valid for a maximum of six months and may be updated, replaced, or obsoleted by other documents at any time. It is inappropriate to use Internet-Drafts as reference material or to cite them other than as “work in progress.”
The list of current Internet-Drafts can be accessed at http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at http://www.ietf.org/shadow.html.
This Internet-Draft will expire on August 19, 2009.
Copyright (c) 2009 IETF Trust and the persons identified as the document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents in effect on the date of publication of this document (http://trustee.ietf.org/license-info). Please review these documents carefully, as they describe your rights and restrictions with respect to this document.
This document registers the IAX Enumservice using the URI scheme 'iax:' as per the IANA registration process defined in the ENUM specification RFC3761.
1.
Introduction
2.
Enumservice Registration - IAX
3.
Examples
3.1.
Simple IAX Registration
3.2.
Registration with Multiple Priorities
3.3.
Registration with an IAX context
3.4.
IPv6 Registration
4.
Security Considerations
5.
IANA Considerations
6.
Acknowledgments
7.
Draft Changes
7.1.
Changes since draft-ietf-enum-iax-04
7.2.
Changes since draft-ietf-enum-iax-03
7.3.
Changes since draft-ietf-enum-iax-02
7.4.
Changes since draft-ietf-enum-iax-01
7.5.
Changes since draft-guy-iaxenum-00
8.
References
8.1.
Normative References
8.2.
Informative References
§
Author's Address
TOC |
The E.164 to Uniform Resource Identifiers (URI) [RFC3986] (Berners-Lee, T., Fielding, R., and L. Masinter, “Uniform Resource Identifier (URI): Generic Syntax,” January 2005.)
Dynamic Delegation Discovery System (DDDS) Application (ENUM)
[RFC3761] (Faltstrom, P. and M. Mealling, “The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM),” April 2004.) transforms E.164 [E164] (ITU-T, “The International Public Telecommunication Number Plan,” May 1997.) numbers into
DNS names. Then, using DNS services like delegation through NS records and
NAPTR records, one can look up what services are
available for a specific domain name.
IAX (Inter-Asterisk eXchange) [ID‑IAX] (Spencer, M., Capouch, B., Guy, E., Ed., Miller, F., and K. Shumard, “IAX: Inter-Asterisk eXchange Version 2,” February 2009.) is an "all in one" protocol for handling multimedia in IP networks. It combines both control and media services in the same protocol.
In addition, IAX uses a single UDP data stream on a static port greatly simplifying Network Address Translation (NAT) gateway traversal,
eliminating the need for other protocols to work around NAT, and simplifying network and firewall
management. IAX employs a compact encoding
which decreases bandwidth usage and is well suited for Internet telephony service. In addition, its open nature permits new payload
types additions needed to support additional services.
This document registers the IAX Enumservice according to the guidelines
given in RFC3761 [RFC3761] (Faltstrom, P. and M. Mealling, “The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM),” April 2004.). The IAX Enumservice is
used in provisioning the services field of a NAPTR resource record.
This field indicates what class of functionality a
given end point offers.
TOC |
Enumservice Name: "IAX"
Enumservice Type: "iax"
URI Scheme: "iax"
Functional Specification:
The IAX Enumservice indicates that the resource identified by the associated URI scheme http://www.iana.org/assignments/uri-schemes/prov/iax is capable of being contacted using the IAX protocol to provide a communication session.
A client selecting this NAPTR needs to be able to support call origination utilizing the IAX protocol [ID‑IAX] (Spencer, M., Capouch, B., Guy, E., Ed., Miller, F., and K. Shumard, “IAX: Inter-Asterisk eXchange Version 2,” February 2009.).
Security Considerations:
There are no specific security issues with this Enumservice. However, the general considerations of Section 4 (Security Considerations) apply.
Intended Usage: COMMON
Author: Ed Guy <edguy@emcsw.com>
Any other information the author deems interesting: None.
TOC |
TOC |
The following is an example of the use of the Enumservice registered by this document in a NAPTR resource record.
$ORIGIN 8.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. @ IN NAPTR 10 100 "u" "E2U+iax" \ "!^.*$!iax:example.com/chas!" .
This contact information indicates that service identified by the "+442079460148" E.164 number can be accessed using the IAX protocol to domain 'example.com.' The called party, service, or program on that domain is identified by 'chas'.
TOC |
The next example demonstrates that service identified by the "+441632960083" E.164 number
is
preferably accessed by IAX, secondly via SIP [RFC3764] (Peterson, J., “enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record,” April 2004.) , and then H.323 [RFC3762] (Levin, O., “Telephone Number Mapping (ENUM) Service Registration for H.323,” April 2004.) for
voice and general commmunication, and
lastly by SMTP for messaging.
Note that the tokens "iax", "sip", "h323", and "email"
are types registered with IANA, and they have no implicit
connection with the protocols or URI schemes with the same names.
In each case, the next step in the resolution process is to use the
resolution mechanism appropriate to each of the protocols, (specified by the URI
schemes iax, sip, and h323).
$ORIGIN 3.8.0.0.6.9.2.3.6.1.4.4.e164.arpa. @ IN NAPTR 10 100 "u" "E2U+iax" \ "!^.*$!iax:example.com/mccarthy!" . @ IN NAPTR 10 101 "u" "E2U+SIP" \ "!^.*$!sip:mccarthy@example.com!" . @ IN NAPTR 10 102 "u" "E2U+H323" \ "!^.*$!h323:mccarthy@example.com!" . @ IN NAPTR 10 103 "u" "E2U+email:mailto" \ "!^.*$!mailto:mccarthy@example.com!" .
TOC |
The following is an example of the use of the Enumservice registered by this document in a NAPTR resource record that contains a destination 'context'.
$ORIGIN 9.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. @ IN NAPTR 10 100 "u" "E2U+iax" \ "!^.*$!iax:example.com/joe?developers!"
This contact information indicates that the domain 9.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. may be contacted by using the IAX protocol at domain 'example.com' with the called party 'joe' in the context (or user partition) 'developers'. See Section Section 2 of [ID‑IAX] (Spencer, M., Capouch, B., Guy, E., Ed., Miller, F., and K. Shumard, “IAX: Inter-Asterisk eXchange Version 2,” February 2009.).
TOC |
The following is an example of the use of the Enumservice registered by this document in a NAPTR resource record that contains an IPV6 destination address.
$ORIGIN 9.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. @ IN NAPTR 10 100 "u" "E2U+iax" \ "!^.*$!iax:[2001:db8::1]:4569/alice?friends!" .
This contact information indicates that the domain 9.4.1.0.6.4.9.7.0.2.4.4.e164.arpa. may be contacted by using the IAX protocol at IPv6 address [2001:db8::1], port 4569 with the called party 'alice' in the context (or user partition) 'friends'.
TOC |
The IAX Enumservice does not introduce any new security issues beyond
any already present in the ENUM, DNS and IAX protocols except that this
Enumservice provides another fact, visible to anyone
anonymously, that may be harvested and possibly
exploited. The primary result of these exploits is unwanted communications.
These issues are discussed in further detail in RFC 4035 [RFC4035] (Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “Protocol Modifications for the DNS Security Extensions,” March 2005.)
and RFC 3822 [RFC3833] (Atkins, D. and R. Austein, “Threat Analysis of the Domain Name System (DNS),” August 2004.).
The use of DNSSEC [RFC4035] (Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “Protocol Modifications for the DNS Security Extensions,” March 2005.) is recommended to improve operational
security.
TOC |
This document requests registration of the "iax" Enumservice with the 'iax' sub-type according to the guidelines and specifications in RFC 3761 [RFC3761] (Faltstrom, P. and M. Mealling, “The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM),” April 2004.) and the definitions in Section 2 (Enumservice Registration - IAX) in this document.
TOC |
This work was supported by Internet Foundation Austria. In addition, thanks to Michael Haberler and Richard Stastny for their support and guidance in writing this document.
TOC |
[Note to Editor: This section is to be removed before publishing. Xml source is available upon request.]
TOC |
* Removed the 'iax2' subtype per AD request.
* Change from standards track to informational track.
* Added citation to second paragraph.
TOC |
* Removed version number '2' from scheme name.
* IDNITS: removed terminology section.
* Various rewordings per Alex Mayrhofer and idnits review.
* Added E2U+email:mailto example to match text,
TOC |
* Clarifications suggested by Peter Koch.
TOC |
* Add reference to provisionally registered URI scheme.
* Separate normative and informative references.
* Minor grammatical edits.
* Added the IPv6 Example.
* Updated References.
TOC |
* Minor grammatical edits.
* Added the 'iax2' subtype at WG request.
* The Examples section was split into subsections for each example.
* Context example added.
TOC |
TOC |
[ID-IAX] | Spencer, M., Capouch, B., Guy, E., Ed., Miller, F., and K. Shumard, “IAX: Inter-Asterisk eXchange Version 2,” draft-guy-iax-05 Work In Progress, February 2009. |
[RFC3761] | Faltstrom, P. and M. Mealling, “The E.164 to Uniform Resource Identifiers (URI) Dynamic Delegation Discovery System (DDDS) Application (ENUM),” RFC 3761, April 2004 (TXT). |
[RFC3986] | Berners-Lee, T., Fielding, R., and L. Masinter, “Uniform Resource Identifier (URI): Generic Syntax,” STD 66, RFC 3986, January 2005 (TXT, HTML, XML). |
TOC |
[E164] | ITU-T, “The International Public Telecommunication Number Plan,” Recommendation E.164, May 1997. |
[RFC3762] | Levin, O., “Telephone Number Mapping (ENUM) Service Registration for H.323,” RFC 3762, April 2004 (TXT). |
[RFC3764] | Peterson, J., “enumservice registration for Session Initiation Protocol (SIP) Addresses-of-Record,” RFC 3764, April 2004 (TXT). |
[RFC3833] | Atkins, D. and R. Austein, “Threat Analysis of the Domain Name System (DNS),” RFC 3833, August 2004 (TXT). |
[RFC4035] | Arends, R., Austein, R., Larson, M., Massey, D., and S. Rose, “Protocol Modifications for the DNS Security Extensions,” RFC 4035, March 2005 (TXT). |
TOC |
Ed Guy | |
Truphone | |
12 Williams Rd | |
Chatham, NJ 07928 | |
US | |
Phone: | +1 973 437 4519 |
Email: | edguy@emcsw.com |
URI: | http://www.TruPhone.com/ |