Hello Everybody,
     
        I would be grateful if any body can clarify the 
following question regarding branch parameter calculation.

Why should we include the Proxy-Authorization field in calculating the loop detection 
part of the branch parameter( which is actually a cryptographic hash)?


Thanking You

Chetan M N




-------------------------------------------------
Sify Mail - now with Anti-virus protection powered by Trend Micro, USA.
Know more at http://mail.sify.com

Take the shortest route to success! 
Click here to know how http://education.sify.com
_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors

Reply via email to