Cullen Jennings wrote:
The other thing that I think is important is considering sipsec is why is the proxy in the path in the first place? If the proxy does not need to see or change any of the headers why is the message traversing the proxy at all?

A couple of reasons: (a) routing across the normal SIP proxy mesh to
reach the recipient (UAC may not know the specific network identifiers
of the UAS), and (b) UAS may be behind a NAT/FW and not able to
establish a direct communication with the UAC without a proxy.

In private emails, Frank Miller has proposed an optimization
to the proxy-routed sipsec model whereby the endpoints obtain a
globally visible IP address (thru STUN or similar means) and
then exchange signaling directly between them.  We are currently
debating this optimization among us before presenting it to
a larger audience.

Thanks,

- vijay
--
Vijay K. Gurbani, Bell Laboratories, Alcatel-Lucent
2701 Lucent Lane, Rm. 9F-546, Lisle, Illinois 60532 (USA)
Email: [EMAIL PROTECTED],bell-labs.com,acm.org}
WWW:   http://www.alcatel-lucent.com/bell-labs


_______________________________________________
Sip mailing list  https://www1.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to