> -----Original Message-----
> From: Deepak Mohan [mailto:[EMAIL PROTECTED]]
> Sent: Friday, February 09, 2001 2:15 AM
> To: [EMAIL PROTECTED]
> Subject: [Sip-implementors] Unclarified doubts..
>
>
> 1. Regarding Proxy behaviour, on Pg. 36 of the
> draft-ietf-sip-rfc2543bis-02, it says "Proxies MUST NOT alter
> any fields that are authenticated (see Section 13.2), but MAY
> add copies of fields that were authenticated by the UA if
> indicated in the table.".
>
> Can someone explain the "add copies of fields" part?
An example is Require. The UAC might put a Require in the request, beneath
the Authorization header. If, for some reason, the proxy inserts a Require
header, it would add that header above the Authorization line.
>
>
> 3. Regarding Tag. Can multiple instances of a user (with same
> SIP URL) be present on the same end-point (host), each
> instance having different session capabilities? These
> instances could be differentiated using tag. However,
> registration would be only done once.
No. How would you know, based on an incoming initial INVITE, for which one
the request was targeted? Use separate URLs on the same host.
-Jonathan R.
---
Jonathan D. Rosenberg 72 Eagle Rock Ave.
Chief Scientist First Floor
dynamicsoft East Hanover, NJ 07936
[EMAIL PROTECTED] FAX: (973) 952-5050
http://www.cs.columbia.edu/~jdrosen PHONE: (973) 952-5000
http://www.dynamicsoft.com
_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors