On Jul 31, 2008, at 11:22 AM, Jonathan Rosenberg wrote:

Is this an ATTACK though? I don't think it is.

If the end user can't tell the difference between a malicious application of the technique and a beneficial application of the technique, then the technique itself is an attack vector and should be eliminated from the protocol.

--
Dean

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to