Skip to main content

TLS sessions in SIP using DNS-based Authentication of Named Entities (DANE) TLSA records
draft-johansson-dispatch-dane-sip-01

Document Type Replaced Internet-Draft (individual)
Expired & archived
Author Olle E. Johansson
Last updated 2014-10-06 (Latest revision 2014-01-09)
Replaces draft-johansson-dane-sip
Replaced by draft-johansson-sipcore-dane-sip
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-johansson-sipcore-dane-sip
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

Use of TLS in the SIP protocol is defined in multiple documents, starting with RFC 3261. The actual verification that happens when setting up a SIP TLS connection to a SIP server based on a SIP URI is described in detail in RFC 5922 - SIP Domain Certificates. In this document, an alternative method is defined, using DNS-Based Authentication of Named Entities (DANE). By looking up TLSA DNS records and using DNSsec protection of the required queries, including lookups for NAPTR and SRV records, a SIP Client can verify the identity of the TLS SIP server in a different way, matching on the SRV host name in the X.509 PKIX certificate instead of the SIP domain. This provides more scalability in hosting solutions and make it easier to use standard CA certificates (if needed at all).

Authors

Olle E. Johansson

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)