Skip to main content

End-to-middle Security in the Session Initiation Protocol (SIP)
draft-ietf-sip-e2m-sec-06

Document Type Expired Internet-Draft (sip WG) - resurrect requested by Cullen Jennings
Expired & archived
Authors Kumiko Ono , Shinya Tachimoto
Last updated 2015-10-14 (Latest revision 2007-07-11)
RFC stream Internet Engineering Task Force (IETF)
Intended RFC status Proposed Standard
Formats
Reviews
Additional resources Mailing list discussion
Stream WG state WG Document
Document shepherd (None)
IESG IESG state Expired (IESG: Dead)
Action Holders
(None)
Consensus boilerplate Unknown
Telechat date (None)
Responsible AD Cullen Fluffy Jennings
IESG note
Send notices to fluffy@cisco.com, rohan.mahy@plantronics.com

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Some services provided by intermediaries depend on their ability to inspect a message body in the Session Initiation Protocol (SIP). When sensitive information is included in the message body, a SIP User Agent (UA) needs to protect it from other intermediaries than those that the UA agreed to disclose it to. This document proposes a mechanism for securing information passed between an end user and intermediaries using S/MIME. It also proposes mechanisms for a UA to discover intermediaries which need to inspect an S/MIME-secured message body, or to receive the message body with data integrity This specification is approved at the proposed standards level due to the IANA registration requirements. Is is of sufficient quality for that level, however, the use of this mechanism in this specification are considered experimental.

Authors

Kumiko Ono
Shinya Tachimoto

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)