Chetan M N wrote:
>
> Hello Everybody,
>
> I would be grateful if any body can clarify
> the following question:
>
> Why do we need to include the Proxy- Authorization field
> while calculating the loop detection part(which is a cyptographic hash
> ) of the branch parameter? This is
> according to the latest draft (draft-ietf-sip-rfc2543bis-09)
You need to include anything in the hash which would be used as input to
determine how to process the request. One of those things is
proxy-authorization. If you don't do that, a request which spirals, and
is authenticated by the first instance, won't be able to be processed by
the second instance.
Of course, the easier thing is not to bother with loop detection.
-Jonathan R.
--
Jonathan D. Rosenberg, Ph.D. 72 Eagle Rock Avenue
Chief Scientist First Floor
dynamicsoft East Hanover, NJ 07936
[EMAIL PROTECTED] FAX: (973) 952-5050
http://www.jdrosen.net PH: (973) 952-5000
http://www.dynamicsoft.com
_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors