On Monday, February 17, 2003, at 01:17 AM, Ron Risley wrote:
At 7:36 +0100 2/13/2003, Frode Skarstein opined:
Does anyone else have any other ideas on how SMTP traffic could be
intercepted as described earlier?
I agree with the other posters, though, that the technical feasibility
of it is irrelevant. If this guy's paranoid, no amount of rational
argument is going to change his beliefs. If he's just lying, he's just
going to keep on lying.
Well, i am not arguing with him at all. His domain is being transferred
as we speak. I'm trying to figure out, legally, what his case for
claiming that I have tampered with his outgoing mail is. But i guess
the situation is that I can show emails (and logs of his activity to do
so) he's sent to me and others (on the same matter), and he has deleted
his outgoing email. That is bad in his direction. He claims i have
tampered with his emails. He has nothing to document this claim. I
guess if anything, he'll fall, alternatively they'll just drop the case
or something.
I get a GPG signature on my log files once a week, then have the
signature timestamped by an independent third party:
http://www.itconsult.co.uk/stamper.htm
I then burn the logs, signature, and timestamp to a CD. It gives you a
way to prove that the logs haven't been altered. It might be too late
for you now, but then again it couldn't hurt
That is very good. i'll definately think of something like that.
Frode
#############################################################
This message is sent to you because you are subscribed to
the mailing list <[EMAIL PROTECTED]>.
To unsubscribe, E-mail to: <[EMAIL PROTECTED]>
To switch to the DIGEST mode, E-mail to <[EMAIL PROTECTED]>
To switch to the INDEX mode, E-mail to <[EMAIL PROTECTED]>
Send administrative queries to <[EMAIL PROTECTED]>