> -----Original Message-----
> From: Deepak Mohan [mailto:[EMAIL PROTECTED]]
> Sent: Friday, February 09, 2001 2:15 AM
> To: [EMAIL PROTECTED]
> Subject: [Sip-implementors] Unclarified doubts..
> 
> 
> 1. Regarding Proxy behaviour, on Pg. 36 of the 
> draft-ietf-sip-rfc2543bis-02, it says "Proxies MUST NOT alter 
> any fields that are authenticated (see Section 13.2), but MAY 
> add copies of fields that were authenticated by the UA if 
> indicated in the table.".
> 
>  Can someone explain the "add copies of fields" part?

An example is Require. The UAC might put a Require in the request, beneath
the Authorization header. If, for some reason, the proxy inserts a Require
header, it would add that header above the Authorization line.


> 
> 
> 3. Regarding Tag. Can multiple instances of a user (with same 
> SIP URL) be present on the same end-point (host), each 
> instance having different session capabilities? These 
> instances could be differentiated using tag. However, 
> registration would be only done once.

No. How would you know, based on an incoming initial INVITE, for which one
the request was targeted? Use separate URLs on the same host.

-Jonathan R.

---
Jonathan D. Rosenberg                       72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
[EMAIL PROTECTED]                     FAX:   (973) 952-5050
http://www.cs.columbia.edu/~jdrosen         PHONE: (973) 952-5000
http://www.dynamicsoft.com

_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors

Reply via email to