Internet DRAFT - draft-rosenberg-sip-identity-privacy
draft-rosenberg-sip-identity-privacy
SIP J. Rosenberg
Internet-Draft Cisco Systems
Expires: January 12, 2006 C. Jennings
Cisco
J. Peterson
Neustar
July 11, 2005
Identity Privacy in the Session Initiation Protocol (SIP)
draft-rosenberg-sip-identity-privacy-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on January 12, 2006.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
RFC3323 defines procedures for privacy in the Session Initiation
Protocol (SIP). These mechanisms make use of a privacy service that
resides in the network, which can remove identifying information from
messages. Its approach to privacy was compatible with the identity
mechanisms in RFC 3325, which defined the P-Asserted-ID header field.
Rosenberg, et al. Expires January 12, 2006 [Page 1]
Internet-Draft Identity Privacy July 2005
However, its approach does not work well with the new cryptographic-
based mechanisms in draft-ietf-sip-identity. As such, this document
proposes a new framework for user privacy in SIP.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 3
2. Overview of Operation . . . . . . . . . . . . . . . . . . . 5
3. UAC Behavior . . . . . . . . . . . . . . . . . . . . . . . . 7
3.1 Determining the Level of Anonymity . . . . . . . . . . . . 7
3.2 Minting an Anonymous AOR . . . . . . . . . . . . . . . . . 8
3.3 Obtaining an Anonymous IP Address . . . . . . . . . . . . 9
4. Registrar Behavior . . . . . . . . . . . . . . . . . . . . . 10
5. Proxy Behavior . . . . . . . . . . . . . . . . . . . . . . . 11
6. Anonymity Providers . . . . . . . . . . . . . . . . . . . . 11
7. Grammar . . . . . . . . . . . . . . . . . . . . . . . . . . 13
8. Examples . . . . . . . . . . . . . . . . . . . . . . . . . . 13
9. Security Considerations . . . . . . . . . . . . . . . . . . 13
10. IANA Considerations . . . . . . . . . . . . . . . . . . . . 13
11. References . . . . . . . . . . . . . . . . . . . . . . . . . 13
11.1 Normative References . . . . . . . . . . . . . . . . . . 13
11.2 Informative References . . . . . . . . . . . . . . . . . 14
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 15
Intellectual Property and Copyright Statements . . . . . . . 16
Rosenberg, et al. Expires January 12, 2006 [Page 2]
Internet-Draft Identity Privacy July 2005
1. Introduction
RFC 3323 [2] defines procedures for privacy in the Session Initiation
Protocol (SIP). It provides guidelines for a UA to follow in the
construction of its messages, so that identifying information is not
placed into the message in the first place. However, it also defines
a network-based privacy service that can be invoked by the client
through the insertion of the Privacy header field. This privacy
service typically runs within the user's default outbound proxy, and
is responsible for removal of additional information from the
messages. Two levels of privacy can be provided by this service -
"header" privacy, which obfuscates identifying information from the
SIP messages, and "session" level privacy, which includes the IP
addresses used for exchange of media.
RFC 3325 [9], which defined the P-Asserted-ID header field, has seen
widespread usage as the means for network authenticated identity in
SIP. It defines another privacy service, the "id" service. This
service causes elements in the network to strip the P-Asserted-ID
header field when a request traverses a trust boundary.
RFC3325's form of identity has numerous drawbacks. Of these, the
most significant is that the trustworthiness of the asserted identity
is equal to the trustworthiness of the least trustworthy provider
within the network of providers that constitute the trust domain.
This works well in single provider environments, but in larger scale
interconnects it eventually breaks apart. Unfortunately, the
trustworthiness of an identity is a key property needed for nearly
all of the VoIP anti-spam techniques [13]. For this reason, amongst
others, [3] was developed. It provides strong cryptographic
assurances of identity. It does so by providing a signature over the
From header field in the request, and including in that signature
information that provides referential integrity of the signature.
This allows for recipients of the request to validate that the
asserting domain has truly asserted the requestor's identity for that
request. Since the mechanism is fundamentally domain-based, it also
allows validating entites to apply policies regarding the
trustworthiness of the asserting provider. This fundamentally avoids
the "weakest link" property of RFC 3325.
There are numerous issues in the direct applicability of RFC 3323 to
draft-ietf-sip-identity, many of which are pointed out in Section 13
of [3] (herein referred to as the "SIP identity specification" or the
"SIP identity mechanism"). These problems are:
Rosenberg, et al. Expires January 12, 2006 [Page 3]
Internet-Draft Identity Privacy July 2005
Intra-Domain Privacy: Because the SIP identity mechanism relies on
the domain of the From header field as a key for obtaining
certificates used to validate the identity in the From header
field, anonymity is restricted to being within a domain. It is no
longer possible, as described in RFC 3323, to populate the From
header field with "anonymous.invalid" as the domain. As a
consequence, a recipient of the request will be able to determine
the domain of the originator of the request, though they will not
be able to determine which user within that domain sent the
request. This limitation is not very troubling for domains with
extremely large numbers of users. However, for small domains,
such as enterprises or home networks, it can be equally revealing
as the identity of the requestor themselves.
Contact Privacy lost: Because the SIP identity mechanism relies on a
signature over the Contact header field for referential integrity,
a privacy service that provides header privacy cannot actually
modify the Contact value. This will reveal the IP address of the
requestor to the recipient of the request, which can often provide
substantial information about the requestor.
Session Privacy lost: Session privacy is accomplished through a back-
to-back user agent (b2bua) that rewrites the SDP to relay session
media through an intermediary. This no longer works at all with
the SIP identity mechanism, as it relies on a signature over the
body of the request (which contains the SDP) to provide
referential integrity.
Subscriber Identity Lost within Originating Domain: One of the
benefits of the P-Asserted-ID header field when used in
conjunction with the "id" level of privacy is that elements within
the domain of the originator of the request will still be able to
determine the identity of the originator. This is necessary for
providing features for the requestor, accounting for their usage,
and so on. With the SIP identity mechanism, if privacy is needed,
the From header field contains an anonymous URI. As a result, the
request has no information that can identity the user within their
own domain, unless the SIP identity mechanism is used in
conjunction with RFC3325, which is redundant.
These problems are in addition to the problems inherent in RFC 3323
to begin with:
Sensitivity to Boundary Configuration: Although RFC3323 argues
strongly in favor of placing the privacy service very near the
originator of the request, this goal is at odds with RFC 3325,
which requires the privacy service to be on the egress edge of the
trust domain. As a result, privacy is actually provided only if
Rosenberg, et al. Expires January 12, 2006 [Page 4]
Internet-Draft Identity Privacy July 2005
every egress proxy is properly configured to take positive action
and remove the P-Asserted-ID header field. Because positive
action from the network is required to provide privacy, this
mechanism is sensitive to misconfiguration of network elements,
particularly in large interconnected trust domains.
Complicated Call Trace: In many networks, there is a requirement to
provide a call trace feature that allows for malicious callers to
be traced back to their source so that legal action can be taken.
The utility of such features in a global SIP network aside, RFC
3323 makes such a feature difficult to provide since the identity
of the requestor is literally removed from the request. This
complicates the tracking procedures needed to identify the
originator later on.
Limited Flexibility The degrees of privacy that RFC 3323 could
provide were coded into the tokens valid in the Privacy header
field. More complicated combinations - anonymity for certain
media streams but not others, for example - were not possible.
This specification provides an alternate formulation for user privacy
that works well in conjunction with [3]. This mechanism resolves
nearly all of the limitations described above by moving more
intelligence to the client, and having it act in cooperation with
network services that provide atomic anonymity functions - IP address
privacy via Traversal Using Relay NAT (TURN) [5] and URI privacy via
an anonymous URI minting process.
2. Overview of Operation
When a user wishes to make an anonymous request, the user agent
determines the set of identifying information that is to be
obfuscated. This identifying information includes IP addresses, such
as those in the Session Description Protocol (SDP) [6] and Via header
fields, and URIs, such as those in the From header field and Contact
header field of the request. User agents can anonymize any subset of
this information in the request.
To anonymize IP addresses, the client contacts a TURN server [5], and
obtains an IP address and port on the server which route to it.
Ideally, this is done with a TURN server that is specifically
dedicated to anonymous services, and thus can provide a higher degree
of anonymity by obtaining anonymized IP address from a separate
provider (see Section 6) than a normal one. The client uses the
TURN-derived addresses in those fields of the message where the UA
wishes to anonymize an IP address.
To anonymize URIs, and in particular the URI in the From header
Rosenberg, et al. Expires January 12, 2006 [Page 5]
Internet-Draft Identity Privacy July 2005
field, the client needs to obtain a URI from its domain that
possesses both the AOR property and the anonymity property (see [4]
for a discussion of URI properties). To do that, it generates a
special REGISTER request that effectively asks the provider to create
a new URI for the user, and at the same time, register it. The
network will construct this URI such that other network elements
within the domain can use it to identify the requestor, but those
outside cannot. This is readily done by creating the URI by
encrypting the actual identity of the requestor combined with a large
random number. Any element that shares the decryption key can know
the identity of the user, but others cannot. In addition, the URI
will have the "user" URI parameter present, and set to the value of
"anonymous". This signals to all elements that the requestor is
asking for anonymity. This is needed to prevent downstream elements
within the domain from inserting additional identifying information,
and also for properly rendering the fact that the caller was
anonmyous.
The UAC then places this URI in the From header field of the request.
It populates the Contact header field value with a Globally Routable
User Agent URI (GRUU) [4] that was obtained through the registration
which yielded the minted From URI. Beyond that, the other procedures
of RFC 3323 around display names, Call-ID and other fields are
followed.
This request is then sent into the network. There is no Privacy
header field or other network involvement needed in order to further
anonymize the request. Within the domain of the originator, proxy
servers that see that the From header field contains an anonymous URI
can decrypt it to obtain the identity of the requestor. Of course,
elements outside of the domain will not possess the key, and
therefore will not know the identity of the requestor. Because
positive action is required in the network to obtain their identity
(namely, acquisition of the decryption key and decryption of the
URI), the mechanism is privacy-safe. Network misconfiguration can,
in the worst case, result in a proxy not determining the identity of
the requestor.
Furthermore, since the From field URI is carried all the way to the
recipient of the request, it is possible to "call them back", even
though the request was anonymous. Of course, the originating domain
can decide to reject such requests, but this becomes a matter of
local policy. The fact that the identity of the requestor, suitably
encrypted, is carried all the way to the recipient of the request
also facilitates services like malicious call trace. A network
provider can contact the domain administrator of the domain on the
right hand side of the at-sign, and request decryption of the user
part in order to identify the malicious caller. Since these requests
Rosenberg, et al. Expires January 12, 2006 [Page 6]
Internet-Draft Identity Privacy July 2005
are handled off-line and not in real time, they can be suitably
authorized.
3. UAC Behavior
3.1 Determining the Level of Anonymity
When a user wishes to send a request, whether it is an INVITE to
initiate a session, or a SUBSCRIBE [10], MESSAGE [11] or any other
method, the UA makes a determination about the level of anonymity
that is desired. Typically, this would be based on user input or on
local configuration or policy. The precise means for making this
determination is outside of the scope of this specification.
Ultimately, however, the level of anonymity is expressed as a
function of which types of identifying information (IP address,
hostname, URI or display name) are to be anonymized, and in which
fields of the SIP message. The following fields typically contain
identifying information about the user:
From: This field contains the identity of the requestor, and will be
signed by an identity service within the domain of the requestor.
As such, clients desiring anonymity SHOULD populate this with a
URI obtained through the procedures of Section 3.2. The display
name also contains identifying information. It is RECOMMENDED
that this be omitted when the requestor requires anonymity. This
is a change from RFC 3323, which recommended a value of
"Anonymous". Rather than relying on a display name to indicate an
anonymous call, which is language-specific and not meant for
consumption by an automata, the "user" URI parameter of the From
header field indicates that the request was anonymous.
Contact: This field contains a URI used to reach the UA for mid-
dialog requests and possibly out-of-band requests, such as REFER
[12]. It is RECOMMENDED that this field be populated with the
GRUU obtained through the minting procedures of Section 3.2. The
display name also contains identifying information. It is
RECOMMENDED that this be omitted when the requestor requires
anonymity.
Reply-To: This field contains a URI that can be used to reach the
user on subsequent call-backs. Clients desiring anonymity SHOULD
populate this with a URI obtained through the procedures of
Section 3.2. The display name also contains identifying
information. It is RECOMMENDED that this be omitted when the
requestor requires anonymity.
Rosenberg, et al. Expires January 12, 2006 [Page 7]
Internet-Draft Identity Privacy July 2005
Via: This field contains an IP address and port that is used to reach
the user agent for responses. It is RECOMMENDED that this field
be populated with an IP address and port learned through a TURN
server Section 3.3.
Call-Info: This field contains additional information about the
requestor. It is RECOMMENDED that this field be omitted from
requests.
Call-Info: This field contains additional information about the
requestor's user agent. It is RECOMMENDED that this field be
omitted from requests.
Organization: This field contains additional information about the
requestor. It is RECOMMENDED that this field be omitted from
requests.
Subject: This field contains freeform text about the subject of the
call. Since it is not possible to know what content a user has
inadvertently placed into such a header field, it is RECOMMENDED
that this field be omitted from requests.
Call-ID: User agents SHOULD substitute for the IP address or hostname
that is frequently appended to the Call-ID value a suitably long
random value (the value used as the 'tag' for the From header of
the request might even be reused).
SDP c/m lines: The c and m lines in the SDP body convey an IP address
and port for receiving media. It is RECOMMENDED that this field
be populated with an IP address and port learned through a TURN
server Section 3.3.
SDP o line: The username SHOULD be set to "-". The IP address in
this field SHOULD be populated with an IP address and port learned
through a TURN server Section 3.3.
SDP s line: The session name SHOULD be set to "-".
SDP i,u,e,p lines: These lines SHOULD be omitted from the SDP.
3.2 Minting an Anonymous AOR
A key aspect of this specification is the ability of a UA to obtain
an anonymous URI for placement into the From and Reply-To header
fields, along with a GRUU that can be placed into the Contact header
field. It is RECOMMENDED that the UA obtain a new anonymous URI for
each new request outside of an existing dialog that it generates.
Rosenberg, et al. Expires January 12, 2006 [Page 8]
Internet-Draft Identity Privacy July 2005
To obtain a new URI that is suitable for placement into the From
header field of a new request, a UA constructs a query REGISTER
request according to the procedures of RFC 3261. This request is not
anonymous; a UA MUST correctly populate the To, From and other header
fields of the request. This request MUST utilize the GRUU mechanism,
and thus include the Supported header field with the value "gruu"
[4]. The Contact header fields, however, are omitted as this is a
query registration. However, the UA MUST include the Require header
field with the option tag "anonymous". This instructs the registrar
to view this request as a special query; one that provides the UA
with a brand new set of anonyous URIs that represent aliases for the
user's AOR and registered contacts.
The REGISTER response will contain the set of currently registered
Contacts against the AOR in the To header field. In addition, the
response will contain the Anonymous-To header field. This header
field will contain a URI that has both the AOR and anonymous
properties, and which represents an alias of sorts for the user's
actual AOR. Its not a pure alias, in that requests sent to that URI
don't get equivalent treatment to requests sent to the AOR. Domain
policy may result in different treatment for requests made to that
URI. This specification provides no automated means for the user to
request specific policies. The URI from the Anonymous-To header
field can be placed into the From and Reply-To header fields of an
outgoing request. Note that each and every REGISTER transaction sent
by the client with the "anonymous" option tag in the Require header
field will mint a new anonymous URI in the Anonymous-To header field.
In addition, because the client had indicated support for the GRUU
mechanism, the REGISTER response will also contain a GRUU for each
registered contact. However, these GRUU will also be freshly minted,
and have the anonymous property as well as the GRUU property. Like
Anonymous-To, each REGISTER transaction produces a new set of GRUU in
the Contact header field of the REGISTER response. The client then
uses the GRUU for its own instance in the Contact header field of a
request.
3.3 Obtaining an Anonymous IP Address
To obtain an anonymous IP address and port for usage in the SDP, Via
header field and other parts of the SIP message, a client contacts a
configured TURN server [5]. It uses normal TURN processing to
allocate those addresses. Local policy in the TURN server will
produce IP addresses and ports with poor correlation properties, as
discussed below.
Rosenberg, et al. Expires January 12, 2006 [Page 9]
Internet-Draft Identity Privacy July 2005
4. Registrar Behavior
A registrar compliant to this specification MUST support the GRUU
specification in addition to this one.
When the registrar receives a REGISTER request, it checks for the
presence of the Require header field. If present, and if it includes
the option tag "anonymous", processing follows as described in this
section.
If the REGISTER request contains any Contact header fields, the
registrar MUST reject the request with a 403. REGISTER requests that
mint anonymous URIs have to be query registrations. As such, the
registrar follows normal RFC3261 and GRUU processing for constructing
the response.
Next, the registrar generates an anonymous URI that has the AOR and
anonymous properties. This URI can be within the domain of the
provider, however, ideally it is within a domain or set of domains
set aside explicitly for anonymous URI. See Section 6. This
specificaiton makes no normative recommendations on how such a URI is
constructed. However, it MUST have the following properties:
o The user part has at least 256 bits of randomness.
o There is no correlation possible between two URIs given to the
same user.
o Network elements within the domain of the user, to whom explicit
keying material has been granted, can extract the actual AOR of
the user from the URI.
o The URI MUST include the URI "user" parameter with the value
"anonymous".
One simple way to obtain a URI with these properties is to form the
user part of the URI by encrypting the AOR of the subsciber
concatenated with 256 bits of random salt.
Once done, the registrar places this URI in the Anonymous-To header
field of the REGISTER response. Furthermore, it takes each GRUU
present in the Contact header fields of the REGISTER response, and
replaces them with an anonymous URI that has the following
properties:
o The user part has at least 256 bits of randomness.
Rosenberg, et al. Expires January 12, 2006 [Page 10]
Internet-Draft Identity Privacy July 2005
o There is no correlation possible between two URIs given to the
same user.
o Network elements within the domain of the user, to whom explicit
keying material has been granted, can extract the actual GRUU of
the user from the URI.
o The URI MUST include the URI "user" parameter with the value
"anonymous".
A domain MAY confer other properties upon the Anonymous-To and GRUU
URI. In particular, it is expected that the service treatment
property would be applied, though the services invoked for incoming
requests to that URI would likely be different. It is expected that
services like special call logs, or time-based call blocking, would
be applied.
5. Proxy Behavior
A proxy that receives a request whose From header field has a URI
whose user parameter has the value "anonymous", but needs to know the
identity of the requestor for processing, SHOULD attempt to extract
the AOR from the URI in the From header field based on domain-
specific procedures. [[OPEN ISSUE: for multi-vendor SIP networks
within a single domain, do we require these algorithms to be
standardized?]]
When a proxy compliant to this specification sees a request whose
From header field has a URI whose user parameter has the value
"anonymous", it MUST NOT insert additional information into the
request that identifies the originator of the request, if the
originator is known to the proxy. Besides the header fields listed
in Section 3.1, the Path [7], Service-Route [8] and Record-Route
header fields are inserted by proxies and often contain identifying
information.
6. Anonymity Providers
Note - this section is likely to be highly contentious and it is also
highly speculative. It is readily extracted from the rest of the
specification and it provides the mechanisms necessary for the
highest levels of anonymity.
Since the mechanism defined in this specification is meant to be
compatible with [3], it relies on domain-based signatures. As such,
identity is always within the scope of a domain that will be known to
the recipient of the request. Similarly, IP addresses obtained from
TURN servers will be within the IP address space of the provider of
Rosenberg, et al. Expires January 12, 2006 [Page 11]
Internet-Draft Identity Privacy July 2005
the server. Unfortunately, the allocations of IP addresses to
providers is a well-known property, and thus the provider can often
be determined from examination of the IP address. As discussed
above, simply knowing the provider of the user sending the request
can reveal substantial information about the requestor.
To deal with this, this specification recommends the creation of
special providers called "anonymity providers". These are large
providers (indeed, ideally there is a single one for the Internet),
whose sole responsibility is to obtain and delegate names and
addresses to actual providers using randomized allocation procedures.
Actual SIP providers would contract with the anonymity provider under
some form of agreement.
An anonymity provider would obtain a relatively large block of IP
addresses from IP address blocks throughout the Internet. When a SIP
provider is asked by one of its own customers to allocate an IP
address and port for the purposes of anonymous calling, the TURN
server that has received the request will obtain an IP address from
the anonymity provider. This can be done in many ways. The simplest
way is to have the SIP providers TURN server send a TURN request to
the anonymity provider's TURN server, which then chooses one of its
large number of addresses randomly. This approach has the drawback
of funneling traffic through the anonymity provider. A more
interesting approach is to have the SIP providers, on a daily or
hourly basis, literally lease a block of addresses from the anonymity
provider, and then inject BGP routes into the Internet for that
address block. In this case, the anonymity provider serves the role
of coordinator, making sure it is clear which SIP provider owns that
particular block of IP addresses at any point in time. That avoids
injection of the prefix into BGP from duplicate providers.
Similarly, the anonymity provider would ideally own a TLD
(.anonymous, for example), act as a root CA, and be capable of
creating sub-domains within this TLD. On a daily or hourly basis,
each SIP provider would be given a new sub-domain whose value was
newly minted and randomized (for example, h77asff-
dg98asdkjkasdpapiasdddd.anonymous), along with certificates that
would allow a SIP provider to sign requests with that domain. All
SIP endpoints would possess the root CA certificate for the anonymity
provider (which is why there can't be too many of them).
For this approach to work, automated protocols need to be put in
place for the assignment of IP address blocks, subdomains in the
anonymous TLD, and domain certificates within those subdomains.
Future work is needed to define the protocols appropriate for such
procedures.
Rosenberg, et al. Expires January 12, 2006 [Page 12]
Internet-Draft Identity Privacy July 2005
Presumably, such an anonymity provider would be required to maintain
the strictest standards of process and security, in order to provide
high levels of anonymity in concert with the necessary levels of
audit and tracing when government authorities require it. For this
reason, it would seem likely that these anonymity providers would be
country specific, though it need not be the case.
It should be further noted that such an anonymity provider is
providing services that aren't specific to SIP, and could be utilized
by any application provider that wishes to provide anonymous services
to its own customers. It would allow, for example, anonymous email
or anonymous instant messaging services, or anonymous web browsing.
7. Grammar
This specification defines a new header field, Anonymous-To, a SIP
option tag, anonymous, and a new value of the user parameter of the
SIP URI:
Anonymous-To = "Anonymous-To" HCOLON ( name-addr / addr-spec )
*( SEMI generic-param )
anonymous-tag = "anonymous"
user-param = "user=" ( "phone" / "ip" / "anonymous" /
other-user)
8. Examples
TODO.
9. Security Considerations
This specification is intimately concerned with issues of security.
A nice summary needs to go here.
10. IANA Considerations
This specification registers a new SIP option tag, a new SIP header
field, and a new value of an existing URI parameter. Those
registrations will go here.
11. References
11.1 Normative References
[1] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
Rosenberg, et al. Expires January 12, 2006 [Page 13]
Internet-Draft Identity Privacy July 2005
Session Initiation Protocol", RFC 3261, June 2002.
[2] Peterson, J., "A Privacy Mechanism for the Session Initiation
Protocol (SIP)", RFC 3323, November 2002.
[3] Peterson, J. and C. Jennings, "Enhancements for Authenticated
Identity Management in the Session Initiation Protocol (SIP)",
draft-ietf-sip-identity-05 (work in progress), May 2005.
[4] Rosenberg, J., "Obtaining and Using Globally Routable User Agent
(UA) URIs (GRUU) in the Session Initiation Protocol (SIP)",
draft-ietf-sip-gruu-03 (work in progress), February 2005.
[5] Rosenberg, J., "Traversal Using Relay NAT (TURN)",
draft-rosenberg-midcom-turn-07 (work in progress),
February 2005.
[6] Handley, M. and V. Jacobson, "SDP: Session Description
Protocol", RFC 2327, April 1998.
[7] Willis, D. and B. Hoeneisen, "Session Initiation Protocol (SIP)
Extension Header Field for Registering Non-Adjacent Contacts",
RFC 3327, December 2002.
[8] Willis, D. and B. Hoeneisen, "Session Initiation Protocol (SIP)
Extension Header Field for Service Route Discovery During
Registration", RFC 3608, October 2003.
11.2 Informative References
[9] Jennings, C., Peterson, J., and M. Watson, "Private Extensions
to the Session Initiation Protocol (SIP) for Asserted Identity
within Trusted Networks", RFC 3325, November 2002.
[10] Roach, A., "Session Initiation Protocol (SIP)-Specific Event
Notification", RFC 3265, June 2002.
[11] Campbell, B., Rosenberg, J., Schulzrinne, H., Huitema, C., and
D. Gurle, "Session Initiation Protocol (SIP) Extension for
Instant Messaging", RFC 3428, December 2002.
[12] Sparks, R., "The Session Initiation Protocol (SIP) Refer
Method", RFC 3515, April 2003.
[13] Rosenberg, J., "The Session Initiation Protocol (SIP) and
Spam", draft-ietf-sipping-spam-00 (work in progress),
February 2005.
Rosenberg, et al. Expires January 12, 2006 [Page 14]
Internet-Draft Identity Privacy July 2005
Authors' Addresses
Jonathan Rosenberg
Cisco Systems
600 Lanidex Plaza
Parsippany, NJ 07054
US
Phone: +1 973 952-5000
Email: jdrosen@cisco.com
URI: http://www.jdrosen.net
Cullen Jennings
Cisco
170 West Tasman Dr.
San Jose, CA 95134
US
Phone: +1 408 527-9132
Email: fluffy@cisco.com
Jon Peterson
Neustar
1800 Sutter Street
Suite 570
Concord, CA 94520
US
Phone: +1 925 363-8720
Email: jon.peterson@neustar.biz
URI: http://www.neustar.biz
Rosenberg, et al. Expires January 12, 2006 [Page 15]
Internet-Draft Identity Privacy July 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Rosenberg, et al. Expires January 12, 2006 [Page 16]