Darren Reed wrote:
 > 
 > In some email I received from [EMAIL PROTECTED], sie wrote:
 > [...]
 > > Which is why I suggested propogating the originator's timestamp in the log
 > > message. This solves the problem without exceeding our scope. Whether you
 > > want to include intermediate hop timestamps as well is a topic for
 > > discussion.
 > 
 > What purpose would intermediate hop timestamps serve ?

All part of that audit trail, how message got from machine A to D, unless
both A and D can authenicate either source or destination. This would be an
issue in the traditional firewall evironment using syslog as a proxy of
it's self.

Gavin.

--
Gavin Longmuir
RSA PGP fingerprint: 6E 68 B6 D7 37 46 BA 3C  04 D7 44 B6 EB 15 3D BA
Did you know that the ARPANet/Internet is truely over 30?
The facts http://www.isoc.org/guest/zakon/Internet/History/HIT.html

Reply via email to