2015-05-20 23:13 GMT+02:00 Roman Shpount <ro...@telurix.com>:
> I think RFC 7118 example 8.2 is missing that language that WSS is used based
> on the local client policy. This would make the entire example correct and
> compliant with RFC 3621. From my point of view this is more of an editorial
> nit, then the actual specification issue, but this can be discussed in more
> details in sipcore.

Let's clarify that in all the examples the client is connecting to an
Outbound proxy, so it makes LOT of sense that it wants to keep and
reuse the single connection it opened with the Outbound proxy for any
future request (initial or in-dialog). That's seems "implicit local
policy" IMHO, but yes, it should be specified somewhere.

And IMHO the issue is in
http://tools.ietf.org/html/rfc5630#section-3.1.3. Let continue with
it:

--------------------------------------
   If one wants to use "best-effort TLS" for SIP, one just needs to use
   a SIP URI, and send the request over TLS.

   Using SIP over TLS is very simple.  A UA opens a TLS connection and
   uses SIP URIs instead of SIPS URIs for all the header fields in a SIP
   message (From, To, Request-URI, Contact header field, Route, etc.).
   When TLS is used, the Via header field indicates TLS.
---------------------------------------

There is the "problem". Given that initial "sip" INVITE sent over TLS,
how is supposed the proxy to indicate the client that it should send
ACK and any in-dialog request over the same connection? There is no
way for the proxy to indicate that, and there is the problem IMHO.



-- 
Iñaki Baz Castillo
<i...@aliax.net>
_______________________________________________
Sip-implementors mailing list
Sip-implementors@lists.cs.columbia.edu
https://lists.cs.columbia.edu/mailman/listinfo/sip-implementors

Reply via email to