Hi Eric,

Eric Rescorla wrote:
2. Bob thinks he's talking to Eve. She is.
Not really. Bob thinks he is talking to Alice. The identity, fingerprint and certificate of his peer in the signaling exchange belong to Alice. He is encrypting all the outgoing media for Alice.

I don't think what you're describing works the way you're suggesting
it does, because there is a *handshake* between the peers. Any
asymmetry between the Alice->Bob and Bob->Alice flows is detected
in the handshake.

That sounds great.

Cheers
Suresh

_______________________________________________
Sip mailing list  https://www.ietf.org/mailman/listinfo/sip
This list is for NEW development of the core SIP Protocol
Use [EMAIL PROTECTED] for questions on current sip
Use [EMAIL PROTECTED] for new developments on the application of sip

Reply via email to