[VOIPSEC] Security of SIP over UDP

Christopher A. Martin chris at sip1.com
Fri Feb 18 21:20:50 CST 2005


If you have a SIP client directly connected to the public Internet then you
may experience DoS symptoms merely due to simple port scanning...I recommend
at least placing the clients behind a firewall and using a service provider
or owning a SIP aware consumer firewall, Intertex has some very nice
affordable consumer models, and even wifi enabled.

________________________________

Christopher A. Martin
P.O. Box 1264
Cedar Hill, Texas 75106
 
Domains.SIP1.com
http://domains.sip1.com 
Low cost domain name registration & other Internet services.
 
Sign up for your PayPal merchant account today and start selling your
products on line today!
https://www.paypal.com/us/mrb/pal=Q622ZEE3CUWM8
 
-----Original Message-----
From: Voipsec-bounces at voipsa.org [mailto:Voipsec-bounces at voipsa.org] On
Behalf Of dirk.pollet at belgacom.be
Sent: Friday, February 18, 2005 11:09 AM
To: Voipsec at voipsa.org
Subject: [VOIPSEC] Security of SIP over UDP


Looking at VoIP services for consumers, we're wondering about the risk
of SIP over UDP.

How easy is the spoofing of SIP messages, and has anyone already
experienced problems such as DOS attacks, call interruptions, call
manipulations, etc. ? Has anyone knowledge of the existence of hacking
tools to send spoofed SIP messages over UDP ?

Secondly, should someone attack a SIP server using spoofed SIP messages
over UDP, we assume that it is very difficult to react / protect against
it. Any ideas/suggestions ?

Are there commercial SIP implementations that accept only SIP over TCP ?
Any known important inconveniences of using only SIP over TCP ?

Regards
Dirk
dirk.pollet at belgacom.be




**** DISCLAIMER ****
http://www.belgacom.be/maildisclaimer
_______________________________________________
Voipsec mailing list
Voipsec at voipsa.org
http://voipsa.org/mailman/listinfo/voipsec_voipsa.org





More information about the Voipsec mailing list