On Thu, Mar 26, 2009 at 4:19 PM, SIP <[email protected]> wrote: > The first approach is the current approach: build software with little > thought to how it will be secured, opting for all the work of securing
What about SIP itself? Does it provide enough crypto to be solid? Or is that handled only by the layer above it? /r _______________________________________________ -- Bandwidth and Colocation Provided by http://www.api-digital.com -- asterisk-users mailing list To UNSUBSCRIBE or update options visit: http://lists.digium.com/mailman/listinfo/asterisk-users
