I have been grappling with the issue of 
transaction identification and loop 
detection (minus the ugly via hiding issues)
and am not very clear. I would appreciate
if somebody can answer my queries.

(a) How will the cryptographic hash of ACK
request ( without the To header tag) be equal
to cryptographic hash of corresponding INVITE,
since INVITE Request-URI need not be equivalent
to ACK request-uri ? 
In other words, what logic should be used to
identify the transaction control block corresponding
to an ACK ? ( simply user@host from req-uri ?? )

(b) Not including To tag in the hash computation
causes problems in distinguishing 2 or more PRACK
requests, since they only differ in to tag. 

Thanks,
Shail
_______________________________________________
Sip-implementors mailing list
[EMAIL PROTECTED]
http://lists.cs.columbia.edu/mailman/listinfo/sip-implementors

Reply via email to