Experiments on SPIT in the Commercial VoIP Services
draft-choi-sipping-experiments-spit-01

Document Type Expired Internet-Draft (individual)
Author Jaeduck Choi 
Last updated 2007-11-16
Stream (None)
Intended RFC status (None)
Formats
Expired & archived
plain text pdf htmlized bibtex
Stream Stream state (No stream defined)
Consensus Boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft can be found at
https://www.ietf.org/archive/id/draft-choi-sipping-experiments-spit-01.txt

Abstract

This document shows some experimental results on SPIT on commercial VoIP services, in which a SIP UA has not been secured by SIP security protocol such as TLS. Although many service providers have been applying the HTTP digest scheme to authenticate a SIP UA, they often do not apply SIP signaling protection against potential threats between the SIP UA and the SIP proxy. This cause vulnerabilities to the VoIP services like SPIT. The aim of this memo is to inform the service providers of SPIT threats by showing some experimental results of SPIT on current VoIP networks.

Authors

Jaeduck Choi (cjduck@cns.ssu.ac.kr)

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)