The base SHAKEN specification provides replay-detection mechanisms to identify cases where a malicious entity attempts to masquerade as another user by replaying parts of a legitimate INVITE request. However, these mechanisms don’t cover cases where the INVITE is replayed within the short Date freshness window. This technical report describes how the mechanisms defined by [draft-ietf-stir-passport-divert] can be integrated within the SHAKEN framework to close this replay attack window.
- Published:
- 02/01/2019
- Number of Pages:
- 27
- File Size:
- 1 file , 800 KB
- Note:
- This product is unavailable in Ukraine, Russia, Belarus
Reviews
There are no reviews yet.