Hi,

Tom Taylor just sent a mail to behave on logging that piqued my interest.

The MAP based solutions set is stateless.

And therefore it has an elegant solution for those interested in
attribution, specifically in the context of law enforcement.

Can someone explain where I can find a pointer on how the stateless mapping
holds up to spoofing from the MAP domain? Could a malicious user send bad
packets where this attribution model attributes the bad packets to a 3rd
party.

If Alice and Bob are communicating, could Dec send a packets through the BR
appearing to be from Alice where destination is Bob.

Stateless is great. But there is no chance that the MAP BR is not the new
open DNS resolver, right ?

If this is already covered, a simple pointer is all I need.

Will this type of attribution be sufficient for courts ? Or is it
circumstantial ?

CB.
_______________________________________________
Softwires mailing list
[email protected]
https://www.ietf.org/mailman/listinfo/softwires

Reply via email to