> > And finally, forking a non-INVITE request at a proxy should still > > result in one 2xx, or a best non-2xx being returned to the UAC. So > > user agents can inherit much of the current transaction-related > > behavior for CONNECT and augment it with the certificate and tunnel > > behavior. > > There's no real reason you couldn't for a CONNECT. The UA is > still going to have to decide which endpoint it upgrades to > TLS. Although in the absence of a PKI, the connected-surprise > problem could become an issue. This is a somewhat more > tractable problem if 302 is issued, as the UA would only > exercise contacts in the 302 which it expects to be able to validate.
I agree with Dean. In fact, that's what I tought we were talking about. _______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
