Internet Engineering Task Force (IETF) G. Salgueiro
Request for Comments: 6873 Cisco Systems
Category: Standards Track V. Gurbani
ISSN: 2070-1721 Bell Labs, Alcatel-Lucent
A. B. Roach
Mozilla
February 2013
Format for the Session Initiation Protocol (SIP)
Common Log Format (CLF)
Abstract
The SIPCLF working group has defined a Common Log Format (CLF)
framework for Session Initiation Protocol (SIP) servers. This CLF
mimics the successful event logging format found in well-known web
servers like Apache and web proxies like Squid. This document
proposes an indexed text encoding format for the SIP CLF that retains
the key advantages of a text-based format while significantly
increasing processing performance over a purely text-based
implementation. This file format adheres to the SIP CLF information
model and provides an effective encoding scheme for all mandatory and
optional fields that appear in a SIP CLF record.
Status of This Memo
This is an Internet Standards Track document.
This document is a product of the Internet Engineering Task Force
(IETF). It represents the consensus of the IETF community. It has
received public review and has been approved for publication by the
Internet Engineering Steering Group (IESG). Further information on
Internet Standards is available in Section 2 of RFC 5741.
Information about the current status of this document, any errata,
and how to provide feedback on it may be obtained at
http://www.rfc-editor.org/info/rfc6873.
Salgueiro, et al. Standards Track [Page 1]
RFC 6873 Format for SIP CLF February 2013
Copyright Notice
Copyright (c) 2013 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents
(http://trustee.ietf.org/license-info) in effect on the date of
publication of this document. Please review these documents
carefully, as they describe your rights and restrictions with respect
to this document. Code Components extracted from this document must
include Simplified BSD License text as described in Section 4.e of
the Trust Legal Provisions and are provided without warranty as
described in the Simplified BSD License.
Table of Contents
1. Introduction ....................................................3
2. Terminology .....................................................3
3. Document Conventions ............................................4
4. Format ..........................................................5
4.1. Index Pointers .............................................8
4.2. Mandatory Fields ..........................................10
4.3. SIP CLF Encoding and Character Escaping Requirements ......13
4.4. Optional Fields ...........................................14
5. Example SIP CLF Record .........................................22
6. Text Tool Considerations .......................................24
7. Security Considerations ........................................24
8. Operational Guidance ...........................................25
9. IANA Considerations ............................................25
9.1. SIP CLF Version ...........................................25
9.2. SIP CLF Transport Flag ....................................26
10. Acknowledgments ...............................................26
11. References ....................................................27
11.1. Normative References .....................................27
11.2. Informative References ...................................27
Salgueiro, et al. Standards Track [Page 2]
RFC 6873 Format for SIP CLF February 2013
1. Introduction
The extensive list of benefits and the widespread adoption of the
Apache Common Log Format (CLF) has prompted the development of an
analogous event logging mechanism for the Session Initiation Protocol
(SIP) [RFC3261]. Implementing a logging scheme for SIP is a
considerable challenge. In part, this is due to the fact that the
behavior of a SIP entity is more complex as compared to an HTTP
entity. Additionally, there are shortcomings to the purely text-
based HTTP CLF that need to be addressed in order to allow for real-
time inspection of SIP log files [RFC6872]. Experience with Apache
CLF has shown that dealing with large quantities of log data can be
very processor intensive, as doing so necessarily requires reading
and parsing every byte in the log file(s) of interest.
An implementation-independent framework for the SIP CLF has been
defined in [RFC6872]. This memo describes an indexed text file
format for logging SIP messages received and sent by SIP clients,
servers, and proxies that adheres to the information model presented
in Section 8 of [RFC6872]. This document defines a format that is no
more difficult to generate by logging entities than standard (i.e.,
non-indexed) text log formats, while being radically faster to
process. In particular, the format is optimized for both rapidly
scanning through log records and quickly locating commonly accessed
data fields.
Further, the format proposed by this document retains the key
advantage of being human readable and able to be processed using the
various Unix text processing tools, such as sed, awk, perl, cut, and
grep.
2. Terminology
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in [RFC2119].
"SHOULD", "SHOULD NOT", "RECOMMENDED", and "NOT RECOMMENDED" are
appropriate when valid exceptions to a general requirement are known
to exist or appear to exist, and it is infeasible or impractical to
enumerate all of them. However, they should not be interpreted as
permitting implementers to fail to implement the general requirement
when such failure would result in interoperability failure.
Salgueiro, et al. Standards Track [Page 3]
RFC 6873 Format for SIP CLF February 2013
[RFC3261] defines additional terms used in this document that are
specific to the SIP domain such as "proxy"; "registrar"; "redirect
server"; "user agent server" or "UAS"; "user agent client" or "UAC";
"back-to-back user agent" or "B2BUA"; "dialog"; "transaction";
"server transaction".
This document uses the term "SIP Server" that is defined to include
the following SIP entities: user agent server, registrar, redirect
server, a SIP proxy in the role of user agent server, and a B2BUA in
the role of a user agent server.
The reader is expected to be familiar with the terminology and
concepts defined in [RFC6872].
3. Document Conventions
This document defines the logging syntax for the SIP CLF. This
syntax is demonstrated through the use of various examples. The
formatting described here does not permit these examples to be
unambiguously rendered due to the constraints imposed by the
formatting rules for RFCs. To avoid ambiguity and to meet the RFC
layout requirements, this document uses the markup
convention established in [RFC4475].
For the sake of clarity and completeness, the entire text defining
this markup convention from Section 2.1 of [RFC4475] is quoted below:
Several of these examples contain unfolded lines longer than 72
characters. These are captured between tags. The
single unfolded line is reconstructed by directly concatenating
all lines appearing between the tags (discarding any line feeds or
carriage returns). There will be no whitespace at the end of
lines. Any whitespace appearing at a fold-point will appear at
the beginning of a line.
The following represent the same string of bits:
Header-name: first value, reallylongsecondvalue, third value
Header-name: first value,
reallylongsecondvalue
, third value
Salgueiro, et al. Standards Track [Page 4]
RFC 6873 Format for SIP CLF February 2013
Header-name: first value,
reallylong
second
value,
third value
Note that this is NOT SIP header-line folding, where different
strings of bits have equivalent meaning.
The IP addresses used in the examples in this document correspond to
the documentation address block 192.0.2.0/24 (TEST-NET-1) as
described in [RFC5737].
4. Format
The CLF for the Session Initiation Protocol [RFC6872] defines an
information model to which this logging format adheres, and Section
8.1 of that document defines all the mandatory information model
elements.
This document defines the format of SIP CLF records as follows:
0 7 8 15 16 23 24 31
+-----------+-----------+-----------+-----------+
| Version | Record Length | 0 - 3
+-----------+-----------+-----------+-----------+
| Record Length (cont) | 0x2C | 4 - 7
+-----------+-----------+-----------+-----------+
| CSeq Pointer (Hex) | 8 - 11
+-----------+-----------+-----------+-----------+
| Response Status-Code Pointer (Hex) | 12 - 15
+-----------+-----------+-----------+-----------+
| R-URI Pointer (Hex) | 16 - 19
+-----------+-----------+-----------+-----------+
| Destination IP address:port Pointer (Hex) | 20 - 23
+-----------+-----------+-----------+-----------+
| Source IP address:port Pointer (Hex) | 24 - 27
+-----------+-----------+-----------+-----------+
| To URI Pointer (Hex) | 28 - 31
+-----------+-----------+-----------+-----------+
| To Tag Pointer (Hex) | 32 - 35
+-----------+-----------+-----------+-----------+
| From URI Pointer (Hex) | 36 - 39
+-----------+-----------+-----------+-----------+
| From Tag Pointer (Hex) | 40 - 43
+-----------+-----------+-----------+-----------+
Salgueiro, et al. Standards Track [Page 5]
RFC 6873 Format for SIP CLF February 2013
| Call-Id Pointer (Hex) | 44 - 47
+-----------+-----------+-----------+-----------+
| Server-Txn Pointer (Hex) | 48 - 51
+-----------+-----------+-----------+-----------+
| Client-Txn Pointer (Hex) | 52 - 55
+-----------+-----------+-----------+-----------+
| Optional Fields Start Pointer (Hex) | 56 - 59
+-----------+-----------+-----------+-----------+
| 0x0A | | 60 - 63
+-----------+ +
| Timestamp | 64 - 67
+ +-----------+
| | 0x2E | 68 - 71
+-----------+-----------+-----------+-----------+
| Fractional Seconds | 0x09 | 72 - 75
+-----------+-----------+-----------+-----------+
| Flags Field | 76 - 79
+-----------+-----------+-----------+-----------+
|Flag (cont)| 0x09 | | 80 - 83
|-----------+-----------+ |
| |
| |
| Mandatory Fields (variable length) |
| |
| |
+-----------+-----------+-----------+-----------+
| 0x09 | Tag | 0x40 |\
+-----------+-----------+-----------+-----------+ \
| Vendor-ID | \
+-----------+-----------+-----------+-----------+ \
| Vendor-ID (cont) | \ Repeated
+-----------+-----------+-----------+-----------+ \ as many
| 0x2C | Length (Hex) | > times as
+-----------+-----------+-----------+-----------+ / necessary
| Len (cont)| 0x2C | BEB | 0x2C | /
+-----------+-----------+-----------------------| /
| | /
| Value (variable length) | /
| |/
+-----------+-----------+-----------+-----------+
| 0x0A |
+-----------+
Figure 1: SIP Common Log Format
The format presented in Figure 1 is for a single SIP CLF log entry.
While there is no actual subdivision in practice, this format can be
logically subdivided into the following three distinct components:
Salgueiro, et al. Standards Track [Page 6]
RFC 6873 Format for SIP CLF February 2013
1. Index Pointers: The first 60 bytes of this format. This portion
is metadata, primarily composed of a list of pointers that
indicate the beginning of both the variable-length mandatory and
optional fields that are logged as part of this record. These
pointers are implemented as a mechanism to improve processing of
these records and to allow a reader to expeditiously skip
directly to the desired field without unnecessarily going through
the entire record. This logical subdivision within the SIP CLF
format will be referenced in this document with the
tag. A 0x0A (LF character) delimits
from the next logical grouping.
2. Mandatory Fields: The next logical grouping in this format is a
Tab-delimited (0x09) listing of the mandatory fields as described
in Section 8.1 of [RFC6872] and in the order listed in
. This logical subdivision within the SIP CLF
format will be referenced in this document with the
tag.
3. Optional Fields: The last logical component MAY be present as it
is an OPTIONAL extension to the SIP CLF format. Its purpose is
to provide flexibility to the developer of this SIP CLF to log
any desired fields not included in . This
includes SIP bodies and any vendor-specific extensions. This
logical subdivision within the SIP CLF format will be referenced
in this document with the tag.
This logical structure of the SIP CLF record format can be
graphically represented as shown in Figure 2 below:
Figure 2: Logical Structure of the SIP CLF Record
Note that Figures 1 and 2 plus the terminating line-feed (0x0A) at
the end of the SIP CLF record are different representations of the
same format but are functionally equivalent. The representation of
this format is a two-line record where the metadata
is on one line and the actual data like and
(if present) is on another.
In the following sections note that indications of "hexadecimal
encoded" indicate values that are always unsigned and are to be
written out in human-readable base-16 numbers using the UTF-8
characters 0x30 through 0x39 ('0' through '9') and 0x41 through 0x46
('A' through 'F'). Similarly, indications of "decimal encoded"
Salgueiro, et al. Standards Track [Page 7]
RFC 6873 Format for SIP CLF February 2013
indicate that the value is to be written out in human-readable
base-10 numbers using the UTF-8 characters 0x30 through 0x39 ('0'
through '9'). In both encodings, numbers always take up the number
of bytes indicated and are padded on the left with UTF-8 '0' (zero)
characters to fill the entire space.
4.1. Index Pointers
The portion of the SIP CLF record (shown in Figure 3)
is a 60-byte header that indicates metadata about the record.
0 7 8 15 16 23 24 31
+-----------+-----------+-----------+-----------+
| Version | Record Length | 0 - 3
+-----------+-----------+-----------+-----------+
| Record Length (cont) | 0x2C | 4 - 7
+-----------+-----------+-----------+-----------+
| CSeq Pointer (Hex) | 8 - 11
+-----------+-----------+-----------+-----------+
| Response Status-Code Pointer (Hex) | 12 - 15
+-----------+-----------+-----------+-----------+
| R-URI Pointer (Hex) | 16 - 19
+-----------+-----------+-----------+-----------+
| Destination IP address:port Pointer (Hex) | 20 - 23
+-----------+-----------+-----------+-----------+
| Source IP address:port Pointer (Hex) | 24 - 27
+-----------+-----------+-----------+-----------+
| To URI Pointer (Hex) | 28 - 31
+-----------+-----------+-----------+-----------+
| To Tag Pointer (Hex) | 32 - 35
+-----------+-----------+-----------+-----------+
| From URI Pointer (Hex) | 36 - 39
+-----------+-----------+-----------+-----------+
| From Tag Pointer (Hex) | 40 - 43
+-----------+-----------+-----------+-----------+
| Call-Id Pointer (Hex) | 44 - 47
+-----------+-----------+-----------+-----------+
| Server-Txn Pointer (Hex) | 48 - 51
+-----------+-----------+-----------+-----------+
| Client-Txn Pointer (Hex) | 52 - 55
+-----------+-----------+-----------+-----------+
| Optional Fields Start Pointer (Hex) | 56 - 59
+-----------+-----------+-----------+-----------+
Figure 3: Index Pointers
Salgueiro, et al. Standards Track [Page 8]
RFC 6873 Format for SIP CLF February 2013
The fields that make up are described below:
Version (1 byte): UTF-8 encoded version for the SIP CLF record.
Range of valid values for the Version is from 'A' (0x41) to 'Z'
(0x5A). This document uses a Version value of "0x41" ('A').
The value of the SIP CLF Version MUST be incremented for any new
SIP CLF specification that changes any part of the SIP CLF record
format. The SIP CLF Version values are IANA-assigned
(Section 9.1) via the Standards Action method described in
[RFC5226].
Since the version is specified per record, it is possible that a
SIP CLF log file could contain records with different versions.
Under normal operating conditions, this is an unlikely occurrence
and SHOULD be avoided if possible.
Record Length (6 bytes): Hexadecimal encoded total length of this
log record, beginning with the "Version" octet and ending with the
terminating line-feed.
Bytes 8 through 55 contain hexadecimal encoded pointers that point to
the starting location of each of the variable-length mandatory
fields. Bytes 56 through 59 contain a hexadecimal encoded pointer
that points to the starting location of the optional fields portion
of the SIP CLF record. Note that there are no delimiters between
these pointer values -- they are packed together as a single, 52-
character hexadecimal encoded string. The "Pointer" fields indicate
absolute byte values within the record, and are therefore >=82. They
point to the start of the corresponding value within the
portion. A description of each of the mandatory
fields that these pointer values point to can be found in
Section 4.2.
Optional Fields Start Pointer: This final pointer indicates the
location within the SIP CLF record where the OPTIONAL group of
begin, if present. The "Optional Fields Start
Pointer" points to the UTF-8 Tab (0x09) character for the first
entry in the portion. If the OPTIONAL group of
are not implemented, then the "Optional Fields
Start Pointer" field MUST point to the terminating line-feed
(0x0A) at the end of the SIP CLF record.
Salgueiro, et al. Standards Track [Page 9]
RFC 6873 Format for SIP CLF February 2013
4.2. Mandatory Fields
The portion of the SIP CLF record is shown below:
0 7 8 15 16 23 24 31
+-----------+-----------+-----------+-----------+
| 0x0A | | 60 - 63
+-----------+ +
| Timestamp | 64 - 67
+ +-----------+
| | 0x2E | 68 - 71
+-----------+-----------+-----------+-----------+
| Fractional Seconds | 0x09 | 72 - 75
+-----------+-----------+-----------+-----------+
| Flags Field | 76 - 79
+-----------+-----------+-----------+-----------+
|Flag (cont)| 0x09 | | 80 - 83
|-----------+-----------+ |
| |
| |
| Mandatory Fields (variable length) |
| |
| |
+-----------+-----------+-----------+-----------+
Figure 4: Mandatory Fields
Following the pointers in , two fixed-length fields
are encoded to specify the exact time of the log entry. As before,
all fields are completely filled, pre-pending values with '0'
characters as necessary.
Timestamp (10 bytes): Decimal encoded date and time of the request
or response represented as the number of seconds since the Unix
epoch (i.e., seconds since midnight, January 1st, 1970, GMT).
Fractional Seconds (3 bytes): Decimal encoded fractional seconds
portion of the Timestamp field to millisecond accuracy.
The combined Timestamp and Fractional Seconds fields are
represented in the log file as a UTF-8 encoded string representing
the date and time of the request or response represented as the
number of seconds and milliseconds since the Unix epoch. The
number of milliseconds is separated by a "." (UTF-8 character
0x2E) from the number of seconds.
Salgueiro, et al. Standards Track [Page 10]
RFC 6873 Format for SIP CLF February 2013
Flags Field (5 bytes):
byte 1 - Request/Response Flag
R = Request
r = Response
byte 2 - Retransmission Flag
O = Original transmission
D = Duplicate transmission
S = Server is stateless [i.e., retransmissions are not
detected]
byte 3 - Sent/Received Flag
S = Sent message
R = Received message
byte 4 - Transport Flag
The Transport Flag values are IANA-assigned (Section 9.2) via
the IETF Review method described in [RFC5226]. Currently,
registered values are:
U = UDP
T = TCP
S = SCTP
byte 5 - Encryption Flag
E = Encrypted message (TLS, DTLS, etc.)
U = Unencrypted message
After the "Timestamp", "Fractional Seconds", and the "Flags" fields
are the values for the mandatory fields specified in Section 8.1 of
[RFC6872], which are described below:
CSeq: The Command Sequence header field, including the CSeq number
and method name.
Response Status-Code: Set to the value of the SIP response status
code for responses. Set to a single UTF-8 dash (0x2D) for
requests.
R-URI: The Request-URI in the start line (mandatory in request),
including any URI parameters.
Salgueiro, et al. Standards Track [Page 11]
RFC 6873 Format for SIP CLF February 2013
Destination IP address:port: The IP address of the downstream server
and the port number, separated by a single ':'. IPv4 addresses
are represented in "dotted decimal" notation as per [RFC1166].
IPv6 addresses are represented using the hexadecimal notation
detailed in Section 4 of [RFC5952] (or the special-case mixed
hexadecimal and decimal notation detailed in Section 5 of
[RFC5952]) and enclosed in square brackets ('[' and ']').
Source IP address:port: The IP address of the upstream client and
the port number over which the SIP message was received, separated
by a single ':'. IPv4 addresses are represented in "dotted
decimal" notation as per [RFC1166]. IPv6 addresses are
represented using the hexadecimal notation detailed in Section 4
of [RFC5952] (or the special-case mixed hexadecimal and decimal
notation detailed in Section 5 of [RFC5952]) and enclosed in
square brackets ('[' and ']').
To URI: Value of the URI in the To header field.
To Tag: Value of the tag parameter (if present) in the To header
field.
From URI: Value of the URI in the From header field.
From Tag: Value of the tag parameter (if present) in the From header
field.
Call-Id: The value of the Call-ID header field.
Server transaction identification code (Server-Txn): The transaction
identifier associated with the server transaction.
Implementations can reuse the server transaction identifier (the
topmost branch-id of the incoming request, with or without the
magic cookie), or they could generate a unique identification
string for a server transaction (this identifier needs to be
locally unique to the server only). This identifier is used to
correlate ACKs and CANCELs to an INVITE transaction; it is also
used to aid in tracking forking. (See Section 9 of [RFC6872] for
usage.)
Client transaction identification code (Client-Txn): This field is
used to associate client transactions with a server transaction
for forking proxies or B2BUAs. Upon forking, implementations can
reuse the value they inserted into the topmost Via header's branch
parameter, or they can generate a unique identification string for
the client transaction. (See Section 9 of [RFC6872] for usage.)
Salgueiro, et al. Standards Track [Page 12]
RFC 6873 Format for SIP CLF February 2013
Note: The definitions of the Server-Txn and Client-Txn are taken
directly from [RFC6872] and are provided here only as a
convenience to the implementer. The definitions specified in
[RFC6872] should be considered authoritative in the event of a
conflict.
This data MUST appear in the order listed in , and
each field MUST be present. Fields are subject the maximum SIP CLF
field size of 4096 bytes as detailed in Section 8 of [RFC6872].
4.3. SIP CLF Encoding and Character Escaping Requirements
The mandatory fields in a SIP CLF record are separated by a single
UTF-8 Tab character (0x09). Any Tab characters present in the data
to be written will be replaced by a UTF-8 space character (0x20)
prior to being logged.
The decision to replace tabs with spaces was based on there being no
standardized use of tabs in SIP headers to convey any other meaning
than whitespace. Tabs may appear in message bodies, and in the event
that the bodies are logged, the conversion to space may cause
problems when reconstructing the body from the corresponding log
entry. Two consequences of the decision to replace Tab with a space
character are: (a) it will become impossible to reconstruct a
signature over the logged field that matches the signature over
fields in the original SIP message, and (b) any future SIP header
fields that include tabs with a different semantic meaning than
simply signifying whitespace will lose this meaning when logged.
Finally, the tabs-to-spaces substitution MUST occur when logging
mandatory fields and optional SIP Header Field or Reason-Phrase
(Tag=00); it MUST also occur when optionally logging either the
entire message (Tag=02) or simply a SIP body (Tag=01) as described in
Section 4.4.
An element will not always have an appropriate value to provide for
one of these fields, even when the field is required to appear in the
SIP CLF record. In such circumstances, when a given mandatory field
from Section 4.2 and specified in Section 8.1 of [RFC6872]) is not
present, then that empty field MUST be encoded as a single horizontal
dash ("-"). In the event that a field failed to parse, it MUST be
encoded as a single question mark ("?"). If these characters are
part of a sequence of other characters, then there is no ambiguity.
If the field being logged contains only one character, and that
character is the literal "-", the implementation SHOULD insert an
escaped %2D for that field in the SIP CLF record. Similarly, if the
field contains only one character, and that character is the literal
"?", the implementation SHOULD insert an escaped %3F for that field
in the SIP CLF record.
Salgueiro, et al. Standards Track [Page 13]
RFC 6873 Format for SIP CLF February 2013
The terminating carriage return line feed (CRLF) after a given header
field value MUST NOT be logged. Since a bare CRLF sequence is not
permitted within a SIP header field value, mandatory fields MUST NOT
contain a CRLF when logged and consequently no escaping mechanism is
required for it.
Clearly, a SIP parser could not possibly successfully parse a SIP CLF
record in its entirety given the SIP CLF format described in this
document. It is possible to parse individual fields in the SIP CLF
record if they are extracted and given to a SIP parser that would
normally parse those sequence of strings. It should be noted that
any field value that is modified by the escaping mechanisms defined
in this document before logging ('-','?', and CRLF) is likely no
longer well-formed SIP and will fail when given to such a parser.
The intent of logging using SIP CLF is not to faithfully recreate the
bit-exact SIP message being logged. In fact, the formatting rules,
encoding, and character escaping requirements preclude this and may
introduce information loss relative to the original SIP message. A
log reader should never unescape anything in the SIP CLF record since
they are intended to be machine processed using text tools such as
grep and awk. The human user behind the log reader may be required
to infer more semantics about any differences between the original
SIP message and its SIP CLF representation.
4.4. Optional Fields
The portion of the SIP CLF record is shown below:
0 7 8 15 16 23 24 31
+-----------+-----------+-----------+-----------+
| 0x09 | Tag | 0x40 |\
+-----------+-----------+-----------+-----------+ \
| Vendor-ID | \
+-----------+-----------+-----------+-----------+ \
| Vendor-ID (cont) | \ Repeated
+-----------+-----------+-----------+-----------+ \ as many
| 0x2C | Length (Hex) | > times as
+-----------+-----------+-----------+-----------+ / necessary
| Len (cont)| 0x2C | BEB | 0x2C | /
+-----------+-----------+-----------------------| /
| | /
| Value (variable length) | /
| |/
+-----------+-----------+-----------+-----------+
Figure 5: Optional Fields
Salgueiro, et al. Standards Track [Page 14]
RFC 6873 Format for SIP CLF February 2013
Optional fields are those SIP message elements that are not a part of
the mandatory fields list detailed in Section 8.1 of [RFC6872].
After the section, there is an OPTIONAL
group (shown in Figure 5) that MAY appear zero or
more times. This group provides extensibility to
the SIP CLF. It allows SIP CLF implementers the flexibility to
extend the logging capability of this indexed text representation
beyond just the mandatory log elements described in Section 8.1 of
[RFC6872].
Logging any optional SIP elements MUST be done according to the
format shown in Figure 5. The location of the start of
within the SIP CLF record is indicated by the
"Optional Fields Start Pointer" field in . After the
initial Tab delimiter byte (0x09) shown in Figure 5, the optional
field being logged is generally represented by the notation:
Tag@Vendor-ID,Length,BEB,Value
The optional field identifier (Tag@Vendor-ID) is composed of a two-
byte Tag and an eight-byte Vendor-ID (both decimal encoded) separated
by an "@" character (0x40). This uniquely identifies the optional
field being logged. The format for this identifier is loosely
modeled after the private use option used by the syslog protocol
[RFC5424] (Note: this is the second format detailed in Section 6.3.2
of [RFC5424]). It makes use of the Private Enterprise Number (PEN),
which provides an identifier through a globally unique name space
[PEN]. This syntax provides the necessary extensibility to SIP CLF
to allow logging of any SIP header, body, as well as any vendor-
specified SIP element.
The Base64 Encoded Byte (BEB) is a boolean that is used to indicate
whether or not the optional element being logged is Base64 encoded.
The Value field for the optional element being logged MUST be Base64
encoded if it has any characters that are 'unprintable'. For the
purposes of this document, we define 'unprintable' to mean a string
of octets that: (a) contains an octet with a value in the range of 0
to 31, inclusive; (b) contains an octet with a value of 127; or (c)
contains any series of octets greater than or equal to 128 that do
not form a valid UTF-8 sequence, as specified by [UNICODE]. If the
optional element being logged is Base64 encoded, then BEB=0x01; if it
is not Base64 encoded, then BEB=0x00.
Salgueiro, et al. Standards Track [Page 15]
RFC 6873 Format for SIP CLF February 2013
Optional fields are logged according to the following two syntax
rules:
(1) Vendor-ID = 00000000
A Vendor-ID of zero is used to log the entire SIP message, message
body, Reason-Phrase, or any SIP header fields that are not a part
of the mandatory fields list detailed in Section 8.1 of [RFC6872].
The following Tag values are used to identify which of these
optional elements are being logged:
Tag = 00 - Log SIP Header Field or Reason-Phrase
When logging a SIP Header Field (Tag=00), the associated
"Value" field MUST be populated by the entire header field
being logged. That is, the field-name, the associated colon
(":"), and the field-value. This mechanism provides the
capability to optionally log any SIP header field by
identifying the field being logged within the "Value" field.
Because the Reason-Phrase in a response is part of the Status-
Line and is not identified with a field-name, it is a special
case. In this instance, the associated "Value" field MUST be
populated by the name "Reason-Phrase" followed by a colon (":")
and a single space (SP) between the colon and the logged
Reason-Phrase value.
The corresponding "Length" field includes the length of the
entire "Value" field. This includes the field-name, the colon,
and any linear whitespace (LWS) separator. For Tag=00, the BEB
is set according to whether the SIP Header Field value contains
any 'unprintable' characters. If it does not, the BEB=00; if
it does, the BEB=01. If BEB=01, then only the field-value MUST
be Base64 encoded; the field-name, the associated colon, and
any LWS separator MUST retain their original encoding.
If an optional field occurs more than once in a SIP message
(e.g., Contact, Route, Record-Route, etc.), then each
occurrence MUST be logged with the same Tag value (i.e.,
Tag=00) as a distinct optional field entry in the SIP CLF
record. These repeated optionally logged header fields MUST
preserve the ordinal position of the repeated header fields in
the SIP header. For example, a SIP header containing two Via
header fields with the following ordinal positions within the
SIP header: V1,V2. If optionally logging these header fields,
they would occur as the following entries in the SIP CLF
Salgueiro, et al. Standards Track [Page 16]
RFC 6873 Format for SIP CLF February 2013
record. (Note: For the sake of brevity, this example only
shows how these optional header fields would be logged and
omits the remainder of the SIP CLF record):
00@00000000,len_V1,00,Via: V1 00@00000000,len_V2,00,Via: V2
The terminating carriage return line feed (CRLF) after a given
header field value MUST NOT be logged. Since a bare CRLF
sequence is not permitted within a SIP header field value,
optional SIP header fields logged with Tag=00 MUST NOT contain
a CRLF when logged and consequently no escaping mechanism is
required for it.
Tag = 01 - Log message body
SIP message bodies of all types can be optionally logged using
Tag=01. If the message body is logged it MUST adhere to the
maximum size limitation of 4096 bytes for a SIP CLF field, as
detailed in Section 8 of [RFC6872]. Unlike with Tag=00, there
can only be a single entry in the SIP CLF record with Tag=01.
When optionally logging the message body, if the maximum SIP
CLF field size of 4096 bytes is exceeded, the message body
being logged MUST be truncated to meet these size limitations.
When logging a message body (Tag=01), the associated "Value"
field is populated with the Content-Type itself plus the SIP
message body separated with a space. In this manner,
everything about the SIP message body is self-described using a
single tag as compared to enumerating a separate tag for each
body type. Additionally, the corresponding "Length" field
includes the SIP message body, the length of the embedded
Content-Type, and the space separator between the MIME type and
the body content.
For an optionally logged message body (Tag=01), the BEB is set
according to whether the message body contains any
'unprintable' characters. If it does not, the BEB=00; if it
does, the BEB=01. If BEB=01, then the message body that
follows is entirely Base64 encoded except the prepended
Content-Type as described in the previous paragraph.
If an optionally logged SIP message body contains any CRLFs,
they MUST be escaped by using the URI encoded equivalent value
of "%0D%0A". This escaping mechanism applies to all body
types. So we don't make any distinction in treatment between
the various possible body types. If a logged message body has
BEB=01, then it MUST be Base64 encoded prior to any character
escaping. Thus, if a binary body (like an image) is logged, it
Salgueiro, et al. Standards Track [Page 17]
RFC 6873 Format for SIP CLF February 2013
will be Base64 encoded first and that Base64 character stream
could never include the CRLF escape sequence of "%0D%0A"
because "%" is not a valid Base64 character.
Tag = 02 - Log entire SIP message
The entire SIP message (i.e., SIP header and message body) can
be optionally logged using a Tag=02. Logging the entire SIP
message MUST conform to the maximum size limitation of 4096
bytes for a SIP CLF field, as detailed in Section 8 of
[RFC6872]. Unlike with Tag=00, there can only be a single
entry in the SIP CLF record with Tag=02. When optionally
logging the entire SIP message if the maximum SIP CLF field
size of 4096 bytes is exceeded the entire SIP message being
logged MUST be truncated to meet these size limitations.
When optionally logging an entire SIP message (Tag=02), the BEB
is set according to whether the message body portion contains
any 'unprintable' characters. If it does not, the BEB=00; if
it does, the BEB=01. If BEB=01, then the entire SIP message is
Base64 encoded (not just the message body). Note that unlike
the case of Tag=01, when logging an entire SIP message (Tag=02)
with 'unprintable' characters (BEB=01), the Content-Type would
not be known prior to decode.
All instances of CRLFs, whether they appear in the SIP headers
or the SIP message body, MUST be escaped by using the URI
encoded equivalent value of "%0D%0A". If a logged SIP message
has BEB=01 then it MUST be Base64 encoded prior to any
character escaping.
(2) Vendor-ID = PEN
A Vendor-ID set to a vendor's own private enterprise number from
the complete current list of private enterprise numbers maintained
by IANA [PEN] is used to log any other vendor-specified optional
element of a SIP header or body. The value of the Tag is set at
the discretion of the implementer:
Tag = Vendor-specified tag
The definition of the various values of the optional field identifier
(Tag@Vendor-ID) are the basis of how optional elements are logged in
the SIP CLF. For the sake of completeness, the remaining fields in
the format shown in Figure 5 are also defined below:
Length Field (4 bytes): Indicates the length of only the "Value"
field of this optionally logged element (as shown in Figure 5),
Salgueiro, et al. Standards Track [Page 18]
RFC 6873 Format for SIP CLF February 2013
hexadecimal encoded. This length corresponds to the length of the
"Value" field only and MUST NOT include any of the other elements
shown in Figure 5.
Base64 Encoded Byte (BEB) Field (1 byte): Indicates whether or not
the subsequent Value Field of the optionally logged element is
Base64 encoded. The Value field for the optional element being
logged MUST be Base64 encoded if it contains any character that is
deemed 'unprintable' according to the definition given previously
in this section. If the optional element being logged is Base64
encoded, then BEB=0x01; if it is not Base64 encoded, then
BEB=0x00.
Value Field (0 to 4096 bytes): Contains the actual value of this
optional field. As with the mandatory fields, UTF-8 Tab
characters (0x09) are replaced with UTF-8 space characters (0x20).
The following are examples of optionally logged SIP elements using
the syntax described in this section. All these examples only show
the portion of the SIP CLF record. The mandatory
and portions of the SIP CLF are
intentionally omitted for the sake of brevity. Note that all of
these examples of optionally logged fields begin with a leading Tab
delimiter byte (0x09) that is not apparent here.
(1) Contact header field logged as an optional field:
Consider the SIP response:
SIP/2.0 180 Ringing
Via: SIP/2.0/UDP host.example.com;
branch=z9hG4bKnashds8;received=192.0.2.1
To: Bob ;tag=a6c85cf
From: Alice ;tag=1928301774
Call-ID: a84b4c76e66710
Contact:
CSeq: 314159 INVITE
Content-Length: 0
The Contact header field would be logged as an optional field in the
following manner:
00@00000000,001C,00,Contact:
Salgueiro, et al. Standards Track [Page 19]
RFC 6873 Format for SIP CLF February 2013
(2) Reason-Phrase logged as an optional field:
For the same SIP response the Reason-Phrase would be logged as
an optional field in the following manner:
00@00000000,0016,00,Reason-Phrase: Ringing
(3) SDP body to be logged as an optional field:
v=0
o=alice 2890844526 2890844526 IN IP4 host.example.com
s=-
c=IN IP4 host.example.com
t=0 0
m=audio 49170 RTP/AVP 0 8 97
This body has a Content-Type of application/sdp and has a length of
123 bytes including all the line-feeds. When logging this body the
"Value" field is composed of the Content-Type and the body separated
by a space, which gives it a combined length of 139 (0x008B) bytes.
This SIP body would be logged as an optional field in the following
manner:
01@00000000,008B,00,application/sdp v=0%0D%0Ao=alice 2890844526
2890844526 IN IP4 host.example.com%0D%0As=-%0D%0A
c=IN IP4 host.example.com%0D%0At=0 0%0D%0A
m=audio 49170 RTP/AVP 0 8 97%0D%0A
Note that the body is actually logged on a single line and is thus
captured between tags. The line-feeds are escaped
using %0D%0A to delimit the various lines in the message body.
(4) binary body to be logged as an optional field:
The second body part of the multipart/mime SIP message shown in
Section 3.1.1.11 of RFC 4475 is a binary encoded body
(represented in hex) and if logged would have BEB=01 and would
require Base64 encoding. That binary body would produce six
lines of output after being Base64 encoded. Subsequent escaping
of the CRLF characters would produce an optionally logged body
that would look like the following:
Salgueiro, et al. Standards Track [Page 20]
RFC 6873 Format for SIP CLF February 2013
01@00000000,0216,01,multipart/mixed;boundary=7a9cbec02ceef655 MI
IBUgYJKoZIhvcNAQcCoIIBQzCCAT8CAQExCTAHBgUrDgMCGjALBgkqhkiG9w0BBw
ExggEgMIIB%0D%0AHAIBATB8MHAxCzAJBgNVBAYTAlVTMRMwEQYDVQQIEwpDYWxp
Zm9ybmlhMREwDwYDVQQHEwhTYW4g%0D%0ASm9zZTEOMAwGA1UEChMFc2lwaXQxKT
AnBgNVBAsTIFNpcGl0IFRlc3QgQ2VydGlmaWNhdGUgQXV0%0D%0AaG9yaXR5AggB
lQBxAjMBEzAHBgUrDgMCGjANBgkqhkiG9w0BAQEFAASBgI70ZvlI8FIt0uWXjp2V
%0D%0Aquny/hWgZllxYpLo2iqo2DUKaM7/rjy9K/8Wdd3VZI5ZPdZHKPJiIPfpQX
SeMw2aFe2r25PRDEIQ%0D%0ALntyidKcwMmuLvvHwM/5Fy87An5PwCfhVG3ktqo6
uz5mzMtd1sZLg4MUnLjm/xgtlE/le2W8mdAF%0D%0A
Note that the body is actually logged on a single line and is thus
captured between tags. The line-feeds are escaped
using %0D%0A to delimit the various lines in the Base64 encoded
binary body.
(5) Codec information from the SDP body logged as an optional field:
Consider the SIP message:
INVITE sip:bob@example.com SIP/2.0
Via: SIP/2.0/UDP host.example.com;branch=z9hG4bKnashds8
To: Bob
From: Alice ;tag=1928301774
Call-ID: a84b4c76e66710
CSeq: 314159 INVITE
Max-Forwards: 70
Date: Thu, 21 Feb 2002 13:02:03 GMT
Contact:
Content-Type: application/sdp
Content-Length: 147
v=0
o=UserA 2890844526 2890844526 IN IP4 example.com
s=Session SDP
c=IN IP4 host.example.com
t=0 0
m=audio 49172 RTP/AVP 0
a=rtpmap:0 PCMU/8000
A vendor may choose to log a SIP message element such as the codec
information from the SDP body. This vendor-specified SIP element
would be logged as an optional field in the following manner:
03@00032473,0014,00,a=rtpmap:0 PCMU/8000
Salgueiro, et al. Standards Track [Page 21]
RFC 6873 Format for SIP CLF February 2013
(6) N-th message received from a particular peer logged as an
optional field:
Perhaps a vendor wants to log that this message is the n-th
message received from a peering partner. To do so for the SIP
message shown above, the vendor would log this information as:
07@00032473,0016,00,1877 example.com
Which would signify that this is the 1,877th message from the peering
partner example.com. Note that the previous two examples showing an
optionally logged vendor-specified SIP element use a Vendor-ID with a
Private Enterprise Number of 32473. This value has been reserved by
IANA to be used as an example PEN in documentation according to
[RFC5612].
5. Example SIP CLF Record
The following SIP message is an INVITE request sent by a SIP client:
INVITE sip:192.0.2.10 SIP/2.0
To:
Call-ID: DL70dff590c1-1079051554@example.com
From: "Alice" ;
tag=DL88360fa5fc;epid=0x34619b0
CSeq: 1 INVITE
Max-Forwards: 70
Date: Thu, 21 Feb 2012 15:02:03 GMT
Via: SIP/2.0/TCP 192.0.2.200:5060;
branch=z9hG4bK-1f6be070c4-DL
Contact: "1001"
Content-Type: application/sdp
Content-Length: 418
v=0
o=1001 1456139204 0 IN IP4 192.0.2.200
s=Session SDP
c=IN IP4 192.0.2.200
b=AS:2048
t=0 0
m=audio 13756 RTP/AVP 0 101
a=rtpmap:0 PCMU/8000
Salgueiro, et al. Standards Track [Page 22]
RFC 6873 Format for SIP CLF February 2013
Shown below is approximately how this message would appear as a
single record in a SIP CLF logging file if encoded according to the
syntax described in this document. Due to RFC conventions, this log
entry has been split into five lines, instead of the two lines that
actually appear in a log file; and the Tab characters have been
padded out using spaces to simulate their appearance in a text
terminal.
A000100,0053005C005E006D007D008F009E00A000BA00C700EB00F70100
1328821153.010 RORUU 1 INVITE - sip:192.0.2.10
192.0.2.10:5060 192.0.2.200:56485 sip:192.0.2.10 -
sip:1001@example.com:5060 DL88360fa5fc
DL70dff590c1-1079051554@example.com S1781761-88 C67651-11
A bit-exact version of the actual log entry is provided here, Base64
encoded.
begin-base64 644 clf_record
QTAwMDEwMCwwMDUzMDA1QzAwNUUwMDZEMDA3RDAwOEYwMDlFMDBBMDAwQkEwMEM3MDBF
QjAwRjcwMTAwCjEzMjg4MjExNTMuMDEwCVJPUlVVCTEgSU5WSVRFCS0Jc2lwOjE5Mi4w
LjIuMTAJMTkyLjAuMi4xMDo1MDYwCTE5Mi4wLjIuMjAwOjU2NDg1CXNpcDoxOTIuMC4y
LjEwCS0Jc2lwOjEwMDFAZXhhbXBsZS5jb206NTA2MAlETDg4MzYwZmE1ZmMJREw3MGRm
ZjU5MGMxLTEwNzkwNTE1NTRAZXhhbXBsZS5jb20JUzE3ODE3NjEtODgJQzY3NjUxLTEx
Cg==
====
To recover the unencoded file, the Base64 text above may be passed as
input to the following perl script (the output should be redirected
to a file).
Salgueiro, et al. Standards Track [Page 23]
RFC 6873 Format for SIP CLF February 2013
#!/usr/bin/perl
use strict;
my $bdata = "";
use MIME::Base64;
while(<>)
{
if (/begin-base64 644 clf_record/ .. /-- ==== --/)
{
if ( m/^\s*[^\s]+\s*$/)
{
$bdata = $bdata . $_;
}
}
}
print decode_base64($bdata);
6. Text Tool Considerations
This format has been designed to allow text tools to easily process
logs without needing to understand the indexing format. Index lines
may be rapidly discarded by checking the first character of the line:
index lines will always start with an alphabetical character, while
field lines will start with a numerical character.
Within a field line, script tools can quickly split fields at the Tab
characters. The first 12 fields are positional, and the meaning of
any subsequent fields can be determined by checking the first four
characters of the field. Alternately, these non-positional fields
can be located using a regular expression. For example, the "Contact
value" in a request can be found by searching for the perl regex
/\t0000,....,([^\t]*)/.
7. Security Considerations
This document does not introduce any new security considerations
beyond those discussed in [RFC6872].
In the interest of protecting the sensitive information contained in
a SIP CLF file, [RFC6872] notes that values might need to be
obfuscated for privacy reasons when SIP CLF files are exchanged
between domains. If a Base64 encoded string contains the non-
obfuscated value, then that would also need to be obfuscated before
Base64 encoding.
Salgueiro, et al. Standards Track [Page 24]
RFC 6873 Format for SIP CLF February 2013
8. Operational Guidance
SIP CLF log files will take up a substantive amount of disk space
depending on traffic volume at a processing entity and the amount of
information being logged. As such, any enterprise using SIP CLF
should establish operational procedures for file rollovers as
appropriate to the needs of the organization.
Listing such operational guidelines in this document is out of scope
for this work.
9. IANA Considerations
This specification establishes a new "Session Initiation Protocol
(SIP) Common Log Format (CLF) Parameters" registry, which contains
two new sub-registries: "SIP CLF Version Values" and "SIP CLF
Transport Flag Values". Initial entries are defined by this
specification for both sub-registries. Addition of any new sub-
registry to the "Session Initiation Protocol (SIP) Common Log Format
(CLF) Parameters" registry is to be done using the IETF Review
registration policy detailed in [RFC5226].
9.1. SIP CLF Version
This document defines the SIP CLF "Version" field in Section 4.1.
IANA has created a registry of Version values entitled "SIP CLF
Version Values". Version numbers MUST be incremented for any new SIP
CLF protocol specification that changes any part of the SIP CLF
record format. Changes include addition or removal of fields or a
change of syntax or semantics of existing fields.
Version numbers must be registered via the Standards Action method
described in [RFC5226]. IANA has registered the Versions shown in
Table 1 below.
+------------+----------------------+-----------+
| Version | FORMAT | Reference |
+------------+----------------------+-----------+
| 0x41 ('A') | Defined in [RFC6873] | [RFC6873] |
+------------+----------------------+-----------+
Table 1: IANA-Registered SIP CLF Version Values
Salgueiro, et al. Standards Track [Page 25]
RFC 6873 Format for SIP CLF February 2013
9.2. SIP CLF Transport Flag
This document defines the SIP CLF "Transport Flag" as fourth byte in
the Flags field of the SIP CLF record. The format and values of the
Transport Flag are described in Section 4.2. IANA has created a
registry of SIP CLF Transport Flag values titled "SIP CLF Transport
Flag Values".
SIP CLF Transport Flag values must be registered via the IETF Review
method described in [RFC5226]. IANA has registered the Transport
Flag values shown in Table 2 below.
+-------+--------------------+-----------+
| Value | Transport Protocol | Reference |
+-------+--------------------+-----------+
| U | UDP | [RFC6873] |
| T | TCP | [RFC6873] |
| S | SCTP | [RFC6873] |
+-------+--------------------+-----------+
Table 2: IANA-Registered SIP CLF Transport Flag
10. Acknowledgments
The authors of this document would like to acknowledge and thank
Peter Musgrave (the chair of the SIPCLF working group) and Robert
Sparks (the assigned Area Director) for their support, guidance, and
continued invaluable feedback.
This work benefited from the discussions and invaluable input by the
various members of the SIPCLF working group. These include Brian
Trammell, Eric Burger, Cullen Jennings, Benoit Claise, Saverio
Niccolini, and Dan Burnett. Special thanks to Hadriel Kaplan, Chris
Lonvick, Paul E. Jones, John Elwell, Claudio Allocchio, and Joe
Clarke for their constructive comments, suggestions, and reviews that
were critical to the formulation and refinement of this document.
Thanks to Anders Nygren for his early implementation, insight, and
reviews of the SIP CLF format.
Salgueiro, et al. Standards Track [Page 26]
RFC 6873 Format for SIP CLF February 2013
11. References
11.1. Normative References
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
[RFC3261] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston,
A., Peterson, J., Sparks, R., Handley, M., and E.
Schooler, "SIP: Session Initiation Protocol", RFC 3261,
June 2002.
[RFC6872] Gurbani, V., Burger, E., Anjali, T., Abdelnur, H., and O.
Festor, "The Common Log Format (CLF) for the Session
Initiation Protocol (SIP): Framework and Information
Model", RFC 6872, February 2013.
11.2. Informative References
[PEN] IANA, "Private Enterprise Numbers", 2009,
.
[RFC1166] Kirkpatrick, S., Stahl, M., and M. Recker, "Internet
numbers", RFC 1166, July 1990.
[RFC4475] Sparks, R., Hawrylyshen, A., Johnston, A., Rosenberg, J.,
and H. Schulzrinne, "Session Initiation Protocol (SIP)
Torture Test Messages", RFC 4475, May 2006.
[RFC5226] Narten, T. and H. Alvestrand, "Guidelines for Writing an
IANA Considerations Section in RFCs", BCP 26, RFC 5226,
May 2008.
[RFC5424] Gerhards, R., "The Syslog Protocol", RFC 5424, March 2009.
[RFC5612] Eronen, P. and D. Harrington, "Enterprise Number for
Documentation Use", RFC 5612, August 2009.
[RFC5737] Arkko, J., Cotton, M., and L. Vegoda, "IPv4 Address Blocks
Reserved for Documentation", RFC 5737, January 2010.
[RFC5952] Kawamura, S. and M. Kawashima, "A Recommendation for IPv6
Address Text Representation", RFC 5952, August 2010.
[UNICODE] The Unicode Consortium, "The Unicode Standard, Version
6.2.0", (Mountain View, CA: ISBN 978-1-936213-07-8), 2012,
.
Salgueiro, et al. Standards Track [Page 27]
RFC 6873 Format for SIP CLF February 2013
Authors' Addresses
Gonzalo Salgueiro
Cisco Systems
7200-12 Kit Creek Road
Research Triangle Park, NC 27709
US
EMail: gsalguei@cisco.com
Vijay Gurbani
Bell Labs, Alcatel-Lucent
1960 Lucent Lane
Rm 9C-533
Naperville, IL 60563
US
EMail: vkg@bell-labs.com
Adam Roach
Mozilla
Dallas, TX
US
EMail: adam@nostrum.com
Salgueiro, et al. Standards Track [Page 28]