Francois said:

Actually, now that I think of it, it may not be as bad as I tought.

If UAs are using sip-outbound with their proxies, it would handle the
vast majority of the links.

Between proxies, you would use DNS or static configuration normally.

Furthermore, between proxies, re-using of existing TCP/TLS may also be
done.

So maybe you are right

Dean Said:
It always tries TLS first, and if that doesn't work it either
1) falls back to something else or 2) gives up. The choice
between 1
and 2 is made based on local policy.

I think many of the assumptions we've been making seem to indicate that if you just don't know, the only reasonable thing to do is try TLS first. If there's nobody listening on the TLS port (but somebody at the IP address), you should get an ICMP response pretty quickly anyhow, then be able to decide on fallback.

If we hold the opposite true, and we try plain SIP/UDP first and only move to TLS when plain SIP fails, we're going to be in for a world of delay-hurt (waiting for that plain SIP/UDP transaction to time out) and never opportunistically using TLS anyhow.

Of course, it's better if you "know" up front, which is part of what the argument in favor of transport=tls is asking for. But given that we have ways for knowing in many of the other cases, this may not be critical.

Of course, if we'd started with a plain connection, discovered TLS capability in a greeting message (aka EHELO) and then done an upgrade to that connection using something like STARTTLS, we wouldn't be having this discussion. It would have just worked. Boy do I feel dumb.

--
Dean





_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to