I'd say the proper way to look at this problem is the common-sense
one.  A B2BUA should strive to make sure that the UA on each side has
most recently seen Allow* headers that reflect the capabilities that
the UA can access.  But a UA can't depend on that, and so while it is
reasonable for it to plan its protocol actions based on the latest
Allow* headers it has received, it must be prepared to recover
gracefully from the failure of an action that it predicts should
succeed.

Dale

_______________________________________________
Sip-implementors mailing list
[email protected]
https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors

Reply via email to