I'm just wondering, if folks could help to explain me this: apparently when I asked if people in the WG feel safe about IETF's mechanisms deployable to prevent spoofed From, nobody spoke up. At the same time, there were some who felt that we don't have a problem statement. I would be thankful if representatives of the latter group could share with me what is the missing piece here to state a problem.
Thank you very much indeed, -jiri p.s. the other aspects such as B2BUA traversal is IMO very orthogonal and is to be ellaborated on in a seprate document. _______________________________________________ Sip mailing list https://www.ietf.org/mailman/listinfo/sip This list is for NEW development of the core SIP Protocol Use [EMAIL PROTECTED] for questions on current sip Use [EMAIL PROTECTED] for new developments on the application of sip
