From: Janet P Gunn <[EMAIL PROTECTED]> Your suggested behavior would seem to violate this.
That's true. But I think the RFC-compliant behavior doesn't take into account how the incoming request validates that it is authorized to use the priority it has claimed. The practical result is that whenever a request crosses a trust boundary, the network operator of the network being entered is going to remove any priority request. I expect that the rules of the RFC will be followed by any elements inside a *network*. But I expect network ingress/egress elements to violate it by default. Dale _______________________________________________ Sip mailing list https://www1.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
