The base SHAKEN specification provides replay-detection mechanisms to identify cases where a malicious entity
attempts to masquerade as another user by replaying parts of a legitimate INVITE request. However, these
mechanisms don’t cover cases where the INVITE is replayed within the short time freshness window. This technical
report describes how the mechanisms defined by draft-ietf-stir-passport-divert [Ref 4] can be integrated within the
SHAKEN framework to close this replay attack window. Published 2020-10-02.