Mike,

On Jul 8, 2008, at 3:29 PM, Michael Thomas wrote:

Indeed, DKIM has the same constraint as well.  What I'm not entirely
getting is why 4474 isn't sufficient for the overall goal.

See:

http://tools.ietf.org/rfcmarkup?doc=draft-elwell-sip-e2e-identity-important-00
http://tools.ietf.org/id/draft-kaplan-sip-uris-change-00.txt

They explain where RFC 4474 breaks in actual implementations. (The key point being that devices in the network like SBCs change headers that are part of the 4474 Identity signature, thus invalidating the 4474 identity.)

Regards,
Dan

--
Dan York, CISSP, Director of Emerging Communication Technology
Office of the CTO    Voxeo Corporation     [EMAIL PROTECTED]
Phone: +1-407-455-5859  Skype: danyork  http://www.voxeo.com
Blogs: http://blogs.voxeo.com  http://www.disruptivetelephony.com

Build voice applications based on open standards.
Find out how at http://www.voxeo.com/free





_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to