RFC 5393: Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies (Q47459636)
request for comments publication
Language:
(P31) (Q212971)
(P50) (Q113093676)
(P123) (Q217082)
(P144) (Q47483792)
(P407) (Q1860)
(P577) Monday, December 1, 2008
(P921) (Q191018)
(P953) https://tools.ietf.org/html/rfc5393
https://tools.ietf.org/rfc/rfc5393.txt
https://www.rfc-editor.org/rfc/rfc5393.txt
https://www.rfc-editor.org/pdfrfc/rfc5393.txt.pdf
(P1104) 20
(P1476) "Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies" (language: en)
(P2093) S. Lawrence
A. Hawrylyshen
B. Campen
other details
aliases RFC5393
Addressing an Amplification Vulnerability in Session Initiation Protocol (SIP) Forking Proxies
description request for comments publication

External Links