RFC3261: SIP:26.1 攻击和威胁模型

本文详细描述了SIP系统常见的网络威胁,如数据包篡改、服务盗窃和通信监听,强调了在公共互联网环境下保护SIP安全的重要性,以及这些威胁所对应需防范的安全服务。
摘要由CSDN通过智能技术生成
26.1 Attacks and Threat Models
26.1 攻击和威胁模型

   This section details some threats that should be common to most deployments of SIP.  These threats have been chosen specifically to illustrate each of the security services that SIP requires.

本节详细介绍了大多数SIP部署中常见的一些威胁。选择这些威胁是为了说明SIP所需的每种安全服务。

   The following examples by no means provide an exhaustive list of the threats against SIP; rather, these are "classic" threats that demonstrate the need for particular security services that can potentially prevent whole categories of threats.

以下示例决不能提供针对SIP的威胁的详尽列表;相反,这些是“经典”威胁,表明需要特定的安全服务,可以潜在地防止所有类别的威胁。

   These attacks assume an environment in which attackers can potentially read any packet on the network - it is anticipated that SIP will frequently be used on the public Internet.  Attackers on the network may be able to modify packets (perhaps at some compromised intermediary).  Attackers may wish to steal services, eavesdrop on communications, or disrupt sessions.

这些攻击假设攻击者可以在一个环境中读取网络上的任何数据包——预计SIP将在公共互联网上频繁使用。网络上的攻击者可能能够修改数据包(可能在某个受损的中间层)。攻击者可能希望窃取服务、窃听通信或中断会话。

评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值