On 7/31/08 2:56 PM, Dan Wing wrote:

Sorry, I was a bit unclear. When I talk about this "chain of custody," I mean everything that has performed an action that would invalidate a 4474 signature; everything that has had to re-sign something. Those are the actions that require a level of trust. As long as the ITSP you mention doesn't change 4474-protected fields, I don't care who they are.

Oh, so something like:  "The original list of codecs was G.729,G.711" and to
convey it in such a way that I could re-insert G.729 and validate the original
4474 signature?  And something like "The original m/c line was 1.2.3.4/5678"?

Yes, that has the right property -- enough information to reconstruct which changes were made, and by whom.

/a
_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to