26.1 Attacks and Threat Models 26.1 攻击和威胁模型 This section details some threats that should be common to most deployments of SIP. These threats have been chosen specifically to illustrate each of the security services that SIP requires. 本节详细介绍了大多数SIP部署中常见的一些威胁。选择这些威胁是为了说明SIP所需的每种安全服务。 The following examples by no means provide an exhaustive list of the threats against SIP; rather, these are "classic" threats that demonstrate the need for particular security services that can potentially prevent whole categories of threats. 以下示例决不能提供针对SIP的威胁的详尽列表;相反,这些是“经典”威胁,表明需要特定的安全服务,可以潜在地防止所有类别的威胁。 These attacks assume an environment in which attackers can potentially read any packet on the network - it is anticipated that SIP will frequently be used on the public Internet. Attackers on the network may be able to modify packets (perhaps at some compromised intermediary). Attackers may wish to steal services, eavesdrop on communications, or disrupt sessions.
这些攻击假设攻击者可以在一个环境中读取网络上的任何数据包——预计SIP将在公共互联网上频繁使用。网络上的攻击者可能能够修改数据包(可能在某个受损的中间层)。攻击者可能希望窃取服务、窃听通信或中断会话。