IETF RFC 5393 PDF

IETF RFC 5393 PDF

Name:
IETF RFC 5393 PDF

Published Date:
12/01/2008

Status:
[ Active ]

Description:

Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies

Publisher:
Internet Engineering Task Force

Document status:
Active

Format:
Electronic (PDF)

Delivery time:
10 minutes

Delivery time (for Russian version):
200 business days

SKU:

Choose Document Language:
$10.8
Need Help?

This document normatively updates RFC 3261, the Session Initiation Protocol (SIP), to address a security vulnerability identified in SIP proxy behavior. This vulnerability enables an attack against SIP networks where a small number of legitimate, even authorized, SIP requests can stimulate massive amounts of proxy-to-proxy traffic.

This document strengthens loop-detection requirements on SIP proxies when they fork requests (that is, forward a request to more than one destination). It also corrects and clarifies the description of the loop-detection algorithm such proxies are required to implement. Additionally, this document defines a Max-Breadth mechanism for limiting the number of concurrent branches pursued for any given request.


Edition : 08
File Size : 1 file , 30 KB
Number of Pages : 20
Published : 12/01/2008

History


Related products

IETF RFC 4706
Published Date: 11/01/2006
Definitions of Managed Objects for Asymmetric Digital Subscriber Line 2 (ADSL2)
$23.1
IETF RFC 8075
Published Date: 02/01/2017
Guidelines for Mapping Implementations: HTTP to the Constrained Application Protocol (CoAP)
$13.5
IETF RFC 9001
Published Date: 05/01/2021
Using TLS to Secure QUIC
$15
IETF RFC 6176
Published Date: 03/01/2011
Prohibiting Secure Sockets Layer (SSL) Version 2.0
$9

Best-Selling Products