RFC 4189

Requirements for End-to-Middle Security for the Session Initiation Protocol (SIP), October 2005

Canonical URL:
File formats:
Plain TextPDF
K. Ono
S. Tachimoto
sipping (rai)

Cite this RFC: TXT  |  XML

DOI:  10.17487/RFC4189

Discuss this RFC: Send questions or comments to sipping@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF


A Session Initiation Protocol (SIP) User Agent (UA) does not always trust all intermediaries in its request path to inspect its message bodies and/or headers contained in its message. The UA might want to protect the message bodies and/or headers from intermediaries, except those that provide services based on its content. This situation requires a mechanism called "end-to-middle security" to secure the information passed between the UA and intermediaries, which does not interfere with end-to-end security. This document defines a set of requirements for a mechanism to achieve end-to-middle security. This memo provides information for the Internet community.

For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.

Download PDF Reader

Search RFCs
Advanced Search