> On Jul 31, 2008, at 11:22 AM, Jonathan Rosenberg wrote:
> 
> > Is this an ATTACK though? I don't think it is.
> 
> If the end user can't tell the difference between a malicious  
> application of the technique and a beneficial application of the  
> technique, then the technique itself is  an attack vector and should  
> be eliminated from the protocol.

Agreed.

-d

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to