I have been grappling with the issue of transaction identification and loop detection (minus the ugly via hiding issues) and am not very clear. I would appreciate if somebody can answer my queries. (a) How will the cryptographic hash of ACK request ( without the To header tag) be equal to cryptographic hash of corresponding INVITE, since INVITE Request-URI need not be equivalent to ACK request-uri ? In other words, what logic should be used to identify the transaction control block corresponding to an ACK ? ( simply user@host from req-uri ?? ) (b) Not including To tag in the hash computation causes problems in distinguishing 2 or more PRACK requests, since they only differ in to tag. Thanks, Shail _______________________________________________ Sip-implementors mailing list [EMAIL PROTECTED] http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors
