ietf
[Top] [All Lists]

Re: The utilitiy of IP is at stake here

2003-05-29 20:09:01
On Thu, 29 May 2003, David Morris wrote:

Having built in source identification will at least allow for aggregation
of data requests in warrants for access to one ISP for many documented
infractions.

We already have that in the form of the client numeric IP address in the
message headers inserted by open and closed relays.

Only open proxies complicate the issue, and require access to logs.

It also won't be necessary to force folks to retain logs for some period
of time or force open relays to have logs or deal with the issues where
the open relay is offshore.

Open relays don't need logs. They put the IP address of the sender in the
message. This can't be altered by the sender.

This is a common misconception, promoted by anti-open-relay zealots, even
though they now this to be false. Relays that don't put in the numeric IP
addres of the sender are called "anonymous relays" to distinguish lack of
authentication from lack of identification.

The noise you've heard about open relays being anonyous (and thus
promoting spam) is false, and willfully misleading.

                --Dean




<Prev in Thread] Current Thread [Next in Thread>