The base SHAKEN specification provides replay-detection mechanisms to identify cases where a malicious entity attempts to masquerade as another user by replaying parts of a legitimate INVITE request. However, these mechanisms don’t cover cases where the INVITE is replayed within the short time freshness window. This technical report describes how the mechanisms defined by draft-ietf-stir-passport-divert [Ref 4] can be integrated within the SHAKEN framework to close this replay attack window.
- Published:
- 09/01/2020
- Number of Pages:
- 29
- File Size:
- 1 file , 2.5 MB
- Note:
- This product is unavailable in Ukraine, Russia, Belarus
Reviews
There are no reviews yet.