Hi, Tom Taylor just sent a mail to behave on logging that piqued my interest.
The MAP based solutions set is stateless. And therefore it has an elegant solution for those interested in attribution, specifically in the context of law enforcement. Can someone explain where I can find a pointer on how the stateless mapping holds up to spoofing from the MAP domain? Could a malicious user send bad packets where this attribution model attributes the bad packets to a 3rd party. If Alice and Bob are communicating, could Dec send a packets through the BR appearing to be from Alice where destination is Bob. Stateless is great. But there is no chance that the MAP BR is not the new open DNS resolver, right ? If this is already covered, a simple pointer is all I need. Will this type of attribution be sufficient for courts ? Or is it circumstantial ? CB.
_______________________________________________ Softwires mailing list [email protected] https://www.ietf.org/mailman/listinfo/softwires
