Nils, >If the UA of the victim runs on a public IP without any "protection" >it might accept SIP requests from anywhere, although >I would call this a very bad UA implementation.
This is correct. Why cannot the UA have adequate protection at the application layer, such as authenticating the caller? Making a massive DOS attack on one single UAs does not seem a "productive" technique for spammers. And if one individual is a valuable target, such individuals have other communication means besides a sole SIP UA. Henry On 2/20/09 3:46 AM, "Nils Ohlmeier" <[email protected]> wrote: If the UA of the victim runs on a public IP without any "protection" it might accept SIP requests from anywhere, although I would call this a very bad UA implementation.
_______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [email protected] for questions on current sip Use [email protected] for new developments on the application of sip
