> From: Iñaki Baz Castillo [[email protected]]
> 
> Currently I don't consider the case of a loop between two
> proxies, I expect it to be too much error prune and difficult to
> design. In my experience most of the loops occur within a single proxy
> when they receive a request for a domain pointing to it without the
> proxy being aware of it For now I avoid just it.

It is easy to detect multi-proxy loops by comparing the calculated
token with all of the Via values.  It is relatively uncommon to
accidentally have a loop of more than one proxy.  But I expect that a
malicious system could arrange it easily.

Dale

_______________________________________________
Sip-implementors mailing list
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to