Skip to main content

Authentication between the Inbound Proxy and the UAS for Protecting SPIT in the Session Initiation Protocol (SIP)
draft-jung-sipping-authentication-spit-00

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Souhwan Jung
Last updated 2006-10-17
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This memo proposes to add a digest message authentication scheme between the inbound proxy and the UAS for protecting SPIT. Spammers can directly send SIP calls (such as call spam and IM spam) to the UAS using P2P call signaling. For rejecting the SPIT, the UAS should be able to verify that the SIP messages are forwarded by the proxy server, not directly from spammers. By applying the message digest scheme similar to the HTTP digest, the UAS processes the request after assuring that the INVITE message comes through the inbound proxy server. The main advantage of this scheme is to protect SPIT by adding a very simple message authentication scheme between the proxy server and the UAS.

Authors

Souhwan Jung

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)