El Viernes, 31 de Octubre de 2008, Dean Willis escribió:

> Now, from a security perspective: Who's done the analysis on whether
> DERIVE introduces new attack opportunities?
>
> For example, is there a DOS opportunity in using the home proxy as a
> message-exploder for source-forged SUBSCRIBE requests? Seems like thre
> might be a problem there . . .

Do you mean something as:

  attacker              alice                 bob (victim)
  INVITE (From: bob) ----->
                        SUBSCRIBE ------------->
  INVITE (From: bob) ----->
                        SUBSCRIBE ------------->
  INVITE (From: bob) ----->
                        SUBSCRIBE ------------->
  INVITE (From: bob) ----->
                        SUBSCRIBE ------------->

?


-- 
Iñaki Baz Castillo
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to