Future



SIP has earned its place as the protocol that justified VoIP. All new user and enterprise
products are expected to support SIP, and any existing products will now be a tough
sell unless a migration path to SIP is offered. SIP is widely expected to deliver far more
than VoIP capabilities, including the ability to transmit video, music, and any type of
real-time multimedia. While its use as a ubiquitous general-purpose media transport
mechanism seems  doubtful, SIP is unarguably poised to deliver  the majority of new
voice applications for the next few years.

Security considerations

SIP uses a challenge/response system to authenticate users. An initial INVITE is sent to
the proxy with which the end device wishes to communicate. The proxy then sends
back a  407  Proxy Authorization Request  message,  which  contains  a  random  set  of
characters referred to as a nonce. This nonce is used along with the password to generate
an MD5 hash, which is then sent back in the subsequent INVITE. Assuming the MD5
hash matches the one that the proxy generated, the client is then authenticated.
Denial of Service (DoS) attacks are probably the most common type of attack on VoIP
communications. A DoS attack can occur when a large number of invalid INVITE re-
quests are sent to a proxy server in an attempt to overwhelm the system. These attacks
are  relatively  simple  to  implement,  and  their  effects  on the users  of  the  system  are
immediate. SIP has several methods of minimizing the effects of DoS attacks, but ulti-
mately they are impossible to prevent.
SIP implements a scheme to guarantee that a secure, encrypted transport mechanism
(namely Transport Layer Security, or TLS) is used to establish communication between
the caller and the domain of the callee. Beyond that, the request is sent securely to the
end device, based upon the  local security policies of the  network. Note that the en-
cryption of the media (that is, the RTP stream) is beyond the scope of SIP itself  and
must be dealt with separately.
More information regarding SIP security considerations, including registration hijack-
ing, server impersonation, and session teardown, can be found in Section 26 of SIP RFC
3261.