It means, for example, that a proxy could add a Require header above the
Authorization header, even if there was one below it.

So, if a proxy receives:

INVITE
Call-ID: asdasd
Authorization: ---------
Require: foo

it can forward the request as:

INVITE
Call-ID: asdasd
Require: bar
Authorization: ---------
Require: foo

-Jonathan R.
---
Jonathan D. Rosenberg                       72 Eagle Rock Ave.
Chief Scientist                             First Floor
dynamicsoft                                 East Hanover, NJ 07936
[EMAIL PROTECTED]                     FAX:   (973) 952-5050
http://www.cs.columbia.edu/~jdrosen         PHONE: (973) 952-5000
http://www.dynamicsoft.com
 

> -----Original Message-----
> From: Deepak Mohan [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, January 18, 2001 9:38 AM
> To: [EMAIL PROTECTED]
> Subject: [Sip-implementors] Proxys and authenticated fileds
> 
> 
> Can somebody explain the sentence "Proxies MUST NOT alter any 
> fields that are authenticated (see Section 13.2), but MAY add 
> copies of fields that were authenticated by the UA if 
> indicated in the table." in draft-ietf-sip-rfc2543bis-02.
> 
> Thanks,
> Deepak
> 
> _____________________________________________________
> Chat with your friends as soon as they come online. Get Rediff Bol at
> http://bol.rediff.com
> 
> 
> 
> 
> _______________________________________________
> Sip-implementors mailing list
> [EMAIL PROTECTED]
> http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors
> 
_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors

Reply via email to