Darren Reed wrote:
>
> In some email I received from [EMAIL PROTECTED], sie wrote:
> [...]
> > Which is why I suggested propogating the originator's timestamp in the log
> > message. This solves the problem without exceeding our scope. Whether you
> > want to include intermediate hop timestamps as well is a topic for
> > discussion.
>
> What purpose would intermediate hop timestamps serve ?
All part of that audit trail, how message got from machine A to D, unless
both A and D can authenicate either source or destination. This would be an
issue in the traditional firewall evironment using syslog as a proxy of
it's self.
Gavin.
--
Gavin Longmuir
RSA PGP fingerprint: 6E 68 B6 D7 37 46 BA 3C 04 D7 44 B6 EB 15 3D BA
Did you know that the ARPANet/Internet is truely over 30?
The facts http://www.isoc.org/guest/zakon/Internet/History/HIT.html