Protecting SIPProtecting SIP
The BrainYard - Where collaborative minds congregate.
1 Min Read
The SIP working group within the ITEF has just published an Internet Draft describing SIP's vulnerability to relay attack and some possible mitigations. The attack method is via a "man-in-the-middle" approach whereby the attacker inserts himself in between the victim and their outbound proxy server, and initiates a session with the victim.
Given SIP's role as the common protocol within a unified communications architecture, it's important to be aware of security threats, especially as organizations widen their adoption of SIP-to-SIP extranet connectivity and SIP trunking for PSTN access.
About the Author
Never Miss a Beat: Get a snapshot of the issues affecting the IT industry straight to your inbox.
You May Also Like
More Insights