Ray, On 2012-03-31 02:04, Ray Hunter wrote: ... > The idea being that authorized persons e.g. law enforcement and network > managers SHOULD be able to correlate activity at a later date (for legal > compliance, logging, fault finding etc.) whilst an attacker or > unauthorized person SHOULD NOT.
If you were a blogger sitting in an Internet cafe in a country governed by a repressive regime, you would probably hold a different view. Brian -------------------------------------------------------------------- IETF IPv6 working group mailing list ipv6@ietf.org Administrative Requests: https://www.ietf.org/mailman/listinfo/ipv6 --------------------------------------------------------------------