{"draft":"draft-ietf-nsis-threats-06","doc_id":"RFC4081","title":"Security Threats for Next Steps in Signaling (NSIS)","authors":["H. Tschofenig","D. Kroeselberg"],"format":["ASCII","HTML"],"page_count":"28","pub_status":"INFORMATIONAL","status":"INFORMATIONAL","source":"Next Steps in Signaling","abstract":"This threats document provides a detailed analysis of the security threats relevant to the Next Steps in Signaling (NSIS) protocol suite.\r\nIt calls attention to, and helps with the understanding of, various security considerations in the NSIS Requirements, Framework, and\r\nProtocol proposals. This document does not describe vulnerabilities of specific parts of the NSIS protocol suite. This memo provides information for the Internet community.","pub_date":"May 2005","keywords":[],"obsoletes":[],"obsoleted_by":[],"updates":[],"updated_by":[],"see_also":[],"doi":"10.17487\/RFC4081","errata_url":null}