>Jacob Palme <[EMAIL PROTECTED]> wrote:
>
>> But would not better logg production in routers be an aid
>> in finding the villain behind computer crimes?
>
>What type of logging do you propose?  It seems that the types 
>of logging
>that are already done enable people to trace the origins of suspicious
>traffic.
>
>--gregbo

True, but only the origin of packets are determined. What is needed is
a code of ethics between ISPs , to share information.
i.e once a packet leaves isp1 cloud and travels across isp2 cloud,
very rarely would isp1 be willing to disclose to isp2,...
which (user) is leased that specific dynamic ip address.

btw, this info would be required on the fly... so that net admin/sec
would be in a better position to pinpoint the perpetrator's habits/ 
physiological profile etc..

/pd

Reply via email to