Re: The utilitiy of IP is at stake here

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




On Tue, 27 May 2003, Eric A. Hall wrote:

>
> on 5/27/2003 6:59 PM Tony Hain wrote:
>
> > protocol design. We as the IETF need to step up and provide an alternate
> > design if we want the system to change. Some components of a new design
> > need to be a viable trust model, and irrefutable traceability.

we don't presently have any problems with traceability.  We have no
problems finding the person responsible for bomb threats or other issues
that warrant law enforcement requests.  We have a slight issues with open
proxies, but only because the abuser has crossed an organizational
boundery, and the organization that knows the previous hop or the
identity, won't reveal it without a subpoena.

This is a legal issue, not a technical issue.

		--Dean



[Index of Archives]     [IETF Annoucements]     [IETF]     [IP Storage]     [Yosemite News]     [Linux SCTP]     [Linux Newbies]     [Fedora Users]