> On Jul 31, 2008, at 11:22 AM, Jonathan Rosenberg wrote: > > > Is this an ATTACK though? I don't think it is. > > If the end user can't tell the difference between a malicious > application of the technique and a beneficial application of the > technique, then the technique itself is an attack vector and should > be eliminated from the protocol.
Agreed. -d _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip