Addressing the Forking Amplification Vulnerability - - PowerPoint PPT Presentation

addressing the forking amplification vulnerability
SMART_READER_LITE
LIVE PREVIEW

Addressing the Forking Amplification Vulnerability - - PowerPoint PPT Presentation

Addressing the Forking Amplification Vulnerability draft-ietf-sip-fork-loop-fix-02 Robert Sparks Since -01 Demonstrated the attack with one resource and one attacker Reintroduced some of the motivational text in the security


slide-1
SLIDE 1

Addressing the Forking Amplification Vulnerability

draft-ietf-sip-fork-loop-fix-02 Robert Sparks

slide-2
SLIDE 2

Since -01

  • Demonstrated the attack with one resource

and one attacker

  • Reintroduced some of the motivational text in

the security consideration section (based on conversations with Cullen)

  • Updated the 3261 text on loop detection

– Identified open issues

  • Added notes to implementers pointing to

common interop problems at earlier SIPits

slide-3
SLIDE 3

Open Issues

In the computed hash,

  • 1. Why include all the route values?
  • 2. Why Call-ID, To-tag, From-tag?
  • 3. Why Proxy-Require, Proxy-

Authorization?