Dan Wing wrote:
Dan Wing wrote:
Thanks for publishing that attack. It has similarities
with the attack described by Hadriel in
http://tools.ietf.org/html/draft-kaplan-sip-baiting-attack.
Yes, it also modifies part of the request which are not signed by the
authentication/signature algorithm. I should mention this draft in a
later version.
However, the goal is not the same. Hadriel's draft is focused on
impersonation, whereby the other draft is focused on breaking the
authentication done at the proxy.
By breaking the authentication the attacker can impersonate
another user. For example, that proxy might create an RFC4474
signature.
Another interresting application indeed! As it looks like, a lot of
people on the list have very good ideas that we will have to document in
version 01 (if it is the will of the WG, of course!).
Regards
Raphael.
The second difference is that it works right now with any
publicly reachable SIP provider.
Yes, I agree that makes it much more interesting.
-d
_______________________________________________
Sip mailing list https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [email protected] for questions on current sip
Use [email protected] for new developments on the application of sip