From: Janet P Gunn <[EMAIL PROTECTED]>

   Your suggested behavior would seem to violate this.

That's true.  But I think the RFC-compliant behavior doesn't take into
account how the incoming request validates that it is authorized to
use the priority it has claimed.  The practical result is that
whenever a request crosses a trust boundary, the network operator of
the network being entered is going to remove any priority request.

I expect that the rules of the RFC will be followed by any elements
inside a *network*.  But I expect network ingress/egress elements to
violate it by default.

Dale


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to