Response Authentication in Session Initiation Protocol
draft-cao-sip-response-auth-01
Document | Type |
Expired Internet-Draft
(individual)
Expired & archived
|
|
---|---|---|---|
Author | Dr. Feng Cao | ||
Last updated | 2006-01-10 | ||
RFC stream | (None) | ||
Intended RFC status | (None) | ||
Formats | |||
Stream | Stream state | (No stream defined) | |
Consensus boilerplate | Unknown | ||
RFC Editor Note | (None) | ||
IESG | IESG state | Expired | |
Telechat date | (None) | ||
Responsible AD | (None) | ||
Send notices to | (None) |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
This draft describes some extensions for enhancing SIP response authentication. In the real-world SIP deployment, TLS may be not available on some hops. Due to the lack of other response authentication mechanisms in SIP, several kinds of security attacks could be conducted on those hops through SIP response. This draft suggests some approaches for complementary enhancement on SIP response authentication. With the new per-hop response authentication proposed in this draft, the security gaps on the hops without TLS can be bridged.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)