Skip to main content

Experiments on SPIT in the Commercial VoIP Services
draft-choi-sipping-experiments-spit-01

Document Type Expired Internet-Draft (individual)
Expired & archived
Author Jaeduck Choi
Last updated 2007-11-16
RFC stream (None)
Intended RFC status (None)
Formats
Stream Stream state (No stream defined)
Consensus boilerplate Unknown
RFC Editor Note (None)
IESG IESG state Expired
Telechat date (None)
Responsible AD (None)
Send notices to (None)

This Internet-Draft is no longer active. A copy of the expired Internet-Draft is available in these formats:

Abstract

This document shows some experimental results on SPIT on commercial VoIP services, in which a SIP UA has not been secured by SIP security protocol such as TLS. Although many service providers have been applying the HTTP digest scheme to authenticate a SIP UA, they often do not apply SIP signaling protection against potential threats between the SIP UA and the SIP proxy. This cause vulnerabilities to the VoIP services like SPIT. The aim of this memo is to inform the service providers of SPIT threats by showing some experimental results of SPIT on current VoIP networks.

Authors

Jaeduck Choi

(Note: The e-mail addresses provided for the authors of this Internet-Draft may no longer be valid.)