addressing the forking amplification vulnerability
play

Addressing the Forking Amplification Vulnerability - PowerPoint PPT Presentation

Addressing the Forking Amplification Vulnerability draft-ietf-sip-fork-loop-fix-02 Robert Sparks Since -01 Demonstrated the attack with one resource and one attacker Reintroduced some of the motivational text in the security


  1. Addressing the Forking Amplification Vulnerability draft-ietf-sip-fork-loop-fix-02 Robert Sparks

  2. Since -01 • Demonstrated the attack with one resource and one attacker • Reintroduced some of the motivational text in the security consideration section (based on conversations with Cullen) • Updated the 3261 text on loop detection – Identified open issues • Added notes to implementers pointing to common interop problems at earlier SIPits

  3. Open Issues In the computed hash, 1. Why include all the route values? 2. Why Call-ID, To-tag, From-tag? 3. Why Proxy-Require, Proxy- Authorization?

Recommend


More recommend