Cesc Santasusana writes:
For example, Kphone can resend an INV if challenged which contains the auth-data. On the other hand, if a kphone is the receiver of the INV, and it hangs up, kphone generates a BYE message which does NOT contain auth-data. Thus, ser will challlenge the kphone back, kphone will reply with a CANCEL and resend the BYE without (again) the auth-data, entering an endless loop. Ain't it funny?
bye is not initial request, but in-dialog request. it doesn't make sense to authenticate them, because you may not even know if the sender of bye is your local user or not.
for initial requests you always know this and thus can authenticate them.
-- juha