RFC 4189

Requirements for End-to-Middle Security for the Session Initiation Protocol (SIP), October 2005

Canonical URL:
https://www.rfc-editor.org/rfc/rfc4189.txt
File formats:
Plain TextPDF
Status:
INFORMATIONAL
Authors:
K. Ono
S. Tachimoto
Stream:
IETF
Source:
sipping (rai)

Cite this RFC: TXT  |  XML

DOI:  10.17487/RFC4189

Discuss this RFC: Send questions or comments to sipping@ietf.org

Other actions: Submit Errata  |  Find IPR Disclosures from the IETF


Abstract

A Session Initiation Protocol (SIP) User Agent (UA) does not always trust all intermediaries in its request path to inspect its message bodies and/or headers contained in its message. The UA might want to protect the message bodies and/or headers from intermediaries, except those that provide services based on its content. This situation requires a mechanism called "end-to-middle security" to secure the information passed between the UA and intermediaries, which does not interfere with end-to-end security. This document defines a set of requirements for a mechanism to achieve end-to-middle security. This memo provides information for the Internet community.


For the definition of Status, see RFC 2026.

For the definition of Stream, see RFC 4844.


Download PDF Reader