At 11.50 -0400 2000-04-10, Dick St.Peters wrote:
What is the fundamental difference between choosing the best path and
choosing the best source? Arguments that the latter breaks the IP
model are simply arguments that the IP model is broken for today's
Internet and will be even more broken for tomorrow's. The IETF can
fix the model ... or leave that to someone else.
The difference between what you describe and a random transparent
proxy is that in your case it is the service provider which is
building a service with whatever technology he chooses. It is not a
random ISP in the middle which intercepts and changes IP-packages
without neither of client nor service provider knowing anything about
it. If the service provider knows about it, he can choose software
(or whatever) which can stand the intercept.
Yes, it is the same technology which is used, but not in the same
ways in both cases.
I.e. for me it is a question _who_ is managing the interception.