RFC 3325 (rfc3325) - Page 2 of 18
Private Extensions to the Session Initiation Protocol (SIP) for Asserted Identity within Trusted Networks
Alternative Format: Original Text Document
RFC 3325 SIP Asserted Identity November 2002
10. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 9
10.1 Network Asserted Identity passed to trusted gateway . . 9
10.2 Network Asserted Identity Withheld . . . . . . . . . . 11
11. Example of Spec(T) . . . . . . . . . . . . . . . . . . . . . 13
12. Security Considerations . . . . . . . . . . . . . . . . . . 14
13. IANA Considerations . . . . . . . . . . . . . . . . . . . . 14
13.1 Registration of new SIP header fields . . . . . . . . . 14
13.2 Registration of "id" privacy type for SIP Privacy header 15
14. Acknowledgements . . . . . . . . . . . . . . . . . . . . . . 15
Normative References . . . . . . . . . . . . . . . . . . . . 15
Informational References . . . . . . . . . . . . . . . . . . 16
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 17
Full Copyright Statement . . . . . . . . . . . . . . . . . . 18
1. Applicability Statement
This document describes private extensions to SIP [1] that enable a
network of trusted SIP servers to assert the identity of end users or
end systems, and to convey indications of end-user requested privacy.
The use of these extensions is only applicable inside a 'Trust
Domain' as defined in Short term requirements for Network Asserted
Identity [5]. Nodes in such a Trust Domain are explicitly trusted by
its users and end-systems to publicly assert the identity of each
party, and to be responsible for withholding that identity outside of
the Trust Domain when privacy is requested. The means by which the
network determines the identity to assert is outside the scope of
this document (though it commonly entails some form of
authentication).
A key requirement of [5] is that the behavior of all nodes within a
given Trust Domain 'T' is known to comply to a certain set of
specifications known as 'Spec(T)'. Spec(T) MUST specify behavior for
the following:
1. The manner in which users are authenticated
2. The mechanisms used to secure the communication among nodes within
the Trust Domain
3. The mechanisms used to secure the communication between UAs and
nodes within the Trust Domain
Jennings, et. al. Informational