I'd say the proper way to look at this problem is the common-sense one. A B2BUA should strive to make sure that the UA on each side has most recently seen Allow* headers that reflect the capabilities that the UA can access. But a UA can't depend on that, and so while it is reasonable for it to plan its protocol actions based on the latest Allow* headers it has received, it must be prepared to recover gracefully from the failure of an action that it predicts should succeed.
Dale _______________________________________________ Sip-implementors mailing list [email protected] https://lists.cs.columbia.edu/cucslists/listinfo/sip-implementors
