On Thu, 29 May 2003, David Morris wrote: > Having built in source identification will at least allow for aggregation > of data requests in warrants for access to one ISP for many documented > infractions. We already have that in the form of the client numeric IP address in the message headers inserted by open and closed relays. Only open proxies complicate the issue, and require access to logs. > It also won't be necessary to force folks to retain logs for some period > of time or force open relays to have logs or deal with the issues where > the open relay is offshore. Open relays don't need logs. They put the IP address of the sender in the message. This can't be altered by the sender. This is a common misconception, promoted by anti-open-relay zealots, even though they now this to be false. Relays that don't put in the numeric IP addres of the sender are called "anonymous relays" to distinguish lack of authentication from lack of identification. The noise you've heard about open relays being anonyous (and thus promoting spam) is false, and willfully misleading. --Dean