> From: Iñaki Baz Castillo [[email protected]] > > Currently I don't consider the case of a loop between two > proxies, I expect it to be too much error prune and difficult to > design. In my experience most of the loops occur within a single proxy > when they receive a request for a domain pointing to it without the > proxy being aware of it For now I avoid just it.
It is easy to detect multi-proxy loops by comparing the calculated token with all of the Via values. It is relatively uncommon to accidentally have a loop of more than one proxy. But I expect that a malicious system could arrange it easily. Dale _______________________________________________ Sip-implementors mailing list [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
