> > And finally, forking a non-INVITE request at a proxy should still 
> > result in one 2xx, or a best non-2xx being returned to the UAC.  So 
> > user agents can inherit much of the current transaction-related 
> > behavior for CONNECT and augment it with the certificate and tunnel 
> > behavior.
> 
> There's no real reason you couldn't for a CONNECT. The UA is 
> still going to have to decide which endpoint it upgrades to 
> TLS. Although in the absence of a PKI, the connected-surprise 
> problem could become an issue. This is a somewhat more 
> tractable problem if 302 is issued, as the UA would only 
> exercise contacts in the 302 which it expects to be able to validate.

I agree with Dean.

In fact, that's what I tought we were talking about.


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to