{"draft":"draft-ietf-sipping-e2m-sec-reqs-06","doc_id":"RFC4189","title":"Requirements for End-to-Middle Security for the Session Initiation Protocol (SIP)","authors":["K. Ono","S. Tachimoto"],"format":["ASCII","HTML"],"page_count":"12","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Session Initiation Proposal Investigation","abstract":"A Session Initiation Protocol (SIP) User Agent (UA) does not always\r\ntrust all intermediaries in its request path to inspect its message\r\nbodies and\/or headers contained in its message. The UA might want to\r\nprotect the message bodies and\/or headers from intermediaries, except\r\nthose that provide services based on its content. This situation\r\nrequires a mechanism called \"end-to-middle security\" to secure the\r\ninformation passed between the UA and intermediaries, which does not\r\ninterfere with end-to-end security. This document defines a set of\r\nrequirements for a mechanism to achieve end-to-middle security. This memo provides information for the Internet community.","pub_date":"September 2005","keywords":["user agent","ua","intermediaries"],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4189","errata_url":null}