It means, for example, that a proxy could add a Require header above the
Authorization header, even if there was one below it.
So, if a proxy receives:
INVITE
Call-ID: asdasd
Authorization: ---------
Require: foo
it can forward the request as:
INVITE
Call-ID: asdasd
Require: bar
Authorization: ---------
Require: foo
-Jonathan R.
---
Jonathan D. Rosenberg 72 Eagle Rock Ave.
Chief Scientist First Floor
dynamicsoft East Hanover, NJ 07936
[EMAIL PROTECTED] FAX: (973) 952-5050
http://www.cs.columbia.edu/~jdrosen PHONE: (973) 952-5000
http://www.dynamicsoft.com
> -----Original Message-----
> From: Deepak Mohan [mailto:[EMAIL PROTECTED]]
> Sent: Thursday, January 18, 2001 9:38 AM
> To: [EMAIL PROTECTED]
> Subject: [Sip-implementors] Proxys and authenticated fileds
>
>
> Can somebody explain the sentence "Proxies MUST NOT alter any
> fields that are authenticated (see Section 13.2), but MAY add
> copies of fields that were authenticated by the UA if
> indicated in the table." in draft-ietf-sip-rfc2543bis-02.
>
> Thanks,
> Deepak
>
> _____________________________________________________
> Chat with your friends as soon as they come online. Get Rediff Bol at
> http://bol.rediff.com
>
>
>
>
> _______________________________________________
> Sip-implementors mailing list
> [EMAIL PROTECTED]
> http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors
>
_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors