I don't think it necessarily requires registration - usually a
traceroute toward the leaked route will give a good indication where it
is coming from.
This assumes that the only type of leaking that you are concerned
about is route leaking.

It would also be good, in many cases, to be able to understand who
owns an address that is leaked by other means (i.e. network management
protocols).

Margaret


--------------------------------------------------------------------
IETF IPng Working Group Mailing List
IPng Home Page:                      http://playground.sun.com/ipng
FTP archive:                      ftp://playground.sun.com/pub/ipng
Direct all administrative requests to [EMAIL PROTECTED]
--------------------------------------------------------------------

Reply via email to