"Tony Hain" <alh-i...@tndh.net> wrote:

> Actually nat does something for security, it decimates it. Any 'real'
> security system (physical, technology, ...) includes some form of audit
> trail. NAT explicitly breaks any form of audit trail, unless you are the one
> operating the header mangling device. Given that there is no limit to the
> number of nat devices along a path, there can be no limit to the number of
> people operating them. This means there is no audit trail, and therefore NO
> SECURITY. 

So an audit trail implies security?  I don't agree.  It may make post-mortem
analysis easier, thou.

Does end-to-end crypto break security?  Which security?  The security of
the endpoints or the security of someone else who cannot now audit the
communication in question fully?

> Tony

--Johnny

Reply via email to