addressing the forking amplification vulnerability
play

Addressing the Forking Amplification Vulnerability - PowerPoint PPT Presentation

Addressing the Forking Amplification Vulnerability draft-ietf-sip-fork-loop-fix-02 Robert Sparks Since -01 Demonstrated the attack with one resource and one attacker Reintroduced some of the motivational text in the security


  1. Addressing the Forking Amplification Vulnerability draft-ietf-sip-fork-loop-fix-02 Robert Sparks

  2. Since -01 • Demonstrated the attack with one resource and one attacker • Reintroduced some of the motivational text in the security consideration section (based on conversations with Cullen) • Updated the 3261 text on loop detection – Identified open issues • Added notes to implementers pointing to common interop problems at earlier SIPits

  3. Open Issues In the computed hash, 1. Why include all the route values? 2. Why Call-ID, To-tag, From-tag? 3. Why Proxy-Require, Proxy- Authorization?

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend