On Tue, 27 May 2003, Eric A. Hall wrote: > > on 5/27/2003 6:59 PM Tony Hain wrote: > > > protocol design. We as the IETF need to step up and provide an alternate > > design if we want the system to change. Some components of a new design > > need to be a viable trust model, and irrefutable traceability. we don't presently have any problems with traceability. We have no problems finding the person responsible for bomb threats or other issues that warrant law enforcement requests. We have a slight issues with open proxies, but only because the abuser has crossed an organizational boundery, and the organization that knows the previous hop or the identity, won't reveal it without a subpoena. This is a legal issue, not a technical issue. --Dean