Best Practices for Securing RTP Media Signaled with SIP
draft-ietf-sipbrandy-rtpsec-02

Document Type Expired Internet-Draft (sipbrandy WG)
Last updated 2017-09-14 (latest revision 2017-03-13)
Replaces draft-peterson-sipbrandy-rtpsec
Stream IETF
Intended RFC status (None)
Formats
Expired & archived
plain text pdf html bibtex
Stream WG state WG Document
Document shepherd No shepherd assigned
IESG IESG state Expired
Consensus Boilerplate Unknown
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-ietf-sipbrandy-rtpsec-02.txt

Abstract

Although the Session Initiation Protocol (SIP) includes a suite of security services that has been expanded by numerous specifications over the years, there is no single place that explains how to use SIP to establish confidential media sessions. Additionally, existing mechanisms have some feature gaps that need to be identified and resolved in order for them to address the pervasive monitoring threat model. This specification describes best practices for negotiating confidential media with SIP, including both comprehensive protection solutions which bind the media to SIP-layer identities as well as opportunistic security solutions.

Authors

Jon Peterson (jon.peterson@neustar.biz)
Eric Rescorla (ekr@rtfm.com)
Richard Barnes (rlb@ipv.sx)
Russ Housley (housley@vigilsec.com)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)