End-to-middle Security in the Session Initiation Protocol (SIP)
draft-ietf-sip-e2m-sec-06
Document | Type |
Expired Internet-Draft
(sip WG)
- resurrect requested by Cullen Jennings
Expired & archived
|
|
---|---|---|---|
Authors | Kumiko Ono , Shinya Tachimoto | ||
Last updated | 2015-10-14 (Latest revision 2007-07-11) | ||
RFC stream | Internet Engineering Task Force (IETF) | ||
Intended RFC status | Proposed Standard | ||
Formats | |||
Reviews | |||
Additional resources | Mailing list discussion | ||
Stream | WG state | WG Document | |
Document shepherd | (None) | ||
IESG | IESG state | Expired (IESG: Dead) | |
Action Holders |
(None)
|
||
Consensus boilerplate | Unknown | ||
Telechat date | (None) | ||
Responsible AD | Cullen Fluffy Jennings | ||
IESG note | |||
Send notices to | fluffy@cisco.com, rohan.mahy@plantronics.com |
This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:
Abstract
Some services provided by intermediaries depend on their ability to inspect a message body in the Session Initiation Protocol (SIP). When sensitive information is included in the message body, a SIP User Agent (UA) needs to protect it from other intermediaries than those that the UA agreed to disclose it to. This document proposes a mechanism for securing information passed between an end user and intermediaries using S/MIME. It also proposes mechanisms for a UA to discover intermediaries which need to inspect an S/MIME-secured message body, or to receive the message body with data integrity This specification is approved at the proposed standards level due to the IANA registration requirements. Is is of sufficient quality for that level, however, the use of this mechanism in this specification are considered experimental.
Authors
(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)