Nils,

>If the UA of the victim runs on a public IP without any "protection"
>it might accept SIP requests from anywhere, although
>I would call this a very bad UA implementation.

This is correct.

Why cannot the UA have adequate protection at the application layer, such as 
authenticating the caller?

Making a massive DOS attack on one single UAs does not seem a "productive" 
technique for spammers.
And if one individual is a valuable target, such individuals have other 
communication means besides a sole SIP UA.

Henry


On 2/20/09 3:46 AM, "Nils Ohlmeier" <[email protected]> wrote:

If the UA of the victim
runs on a public IP without any "protection" it might accept SIP
requests from anywhere, although I would call this a very bad UA
implementation.
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip

Reply via email to