On Mon, 2007-01-29 at 14:10 -0700, Philip Prindeville wrote:
> But that's exactly the point, isn't it?
> 
> That I'm pointing out to the ISP conclusively that the message
> came to me, via them... in the logs showing that the connection's
> remote end-point was X.X.X.X.  They are saying "That's not
> enough, we need headers [and/or the complete message]."
> 
> If they want to know where it originated, then they will have to
> go through *their* logs and follow the bread-crumb trail
> back to the point of origin.
> 
> Having to present all of the headers (or, really, just the Received:
> headers) isn't reliable for the very reason that you point out:
> they can be forged.
> 
> Logs can't.

Why can't logs be forged?

Attachment: signature.asc
Description: This is a digitally signed message part

_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to