RFC 5393
Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies, December 2008
- File formats:
- Status:
- PROPOSED STANDARD
- Updates:
- RFC 3261
- Authors:
- R. Sparks, Ed.
S. Lawrence
A. Hawrylyshen
B. Campen - Stream:
- IETF
- Source:
- sip (rai)
Cite this RFC: TXT | XML | BibTeX
DOI: https://doi.org/10.17487/RFC5393
Discuss this RFC: Send questions or comments to the mailing list sipcore@ietf.org
Other actions: Submit Errata | Find IPR Disclosures from the IETF | View History of RFC 5393
Abstract
This document normatively updates RFC 3261, the Session Initiation Protocol (SIP), to address a security vulnerability identified in SIP proxy behavior. This vulnerability enables an attack against SIP networks where a small number of legitimate, even authorized, SIP requests can stimulate massive amounts of proxy-to-proxy traffic.
This document strengthens loop-detection requirements on SIP proxies when they fork requests (that is, forward a request to more than one destination). It also corrects and clarifies the description of the loop-detection algorithm such proxies are required to implement. Additionally, this document defines a Max-Breadth mechanism for limiting the number of concurrent branches pursued for any given request. [STANDARDS-TRACK]
For the definition of Status, see RFC 2026.
For the definition of Stream, see RFC 8729.