I don't think it necessarily requires registration - usually a traceroute toward the leaked route will give a good indication where it is coming from.
This assumes that the only type of leaking that you are concerned about is route leaking.
It would also be good, in many cases, to be able to understand who owns an address that is leaked by other means (i.e. network management protocols). Margaret -------------------------------------------------------------------- IETF IPng Working Group Mailing List IPng Home Page: http://playground.sun.com/ipng FTP archive: ftp://playground.sun.com/pub/ipng Direct all administrative requests to [EMAIL PROTECTED] --------------------------------------------------------------------
