Skip to main content

Best Practices for Securing RTP Media Signaled with SIP

Document Type Replaced Internet-Draft (individual)
Expired & archived
Authors Jon Peterson , Eric Rescorla , Richard Barnes , Russ Housley
Last updated 2016-09-22 (Latest revision 2016-03-21)
Replaced by draft-peterson-sipbrandy-rtpsec
RFC stream (None)
Intended RFC status (None)
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Replaced by draft-peterson-sipbrandy-rtpsec
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:


Although the Session Initital Protocol (SIP) includes a suite of security services that has been expanded by numerous specifications over the years, there is no single place that explains how to use SIP to establish confidential media sessions. Additionally, existing mechanisms have some feature gaps that need to be identified and resolved in order for them to address the pervasive monitoring threat model. This specification describes practices for negotiating confidential media with SIP, including both comprehensive security solutions which bind the media to SIP-layer identities as well as opportunistic security solutions.


Jon Peterson
Eric Rescorla
Richard Barnes
Russ Housley

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)