From: gtoal@an-teallach.com (Graham Toal)
To: cypherpunks@toad.com
Message Hash: e96fcff0d2bf4a023f3bf722412d781726241eb6f759a64ef7f56828260889e3
Message ID: <5028@an-teallach.com>
Reply To: N/A
UTC Datetime: 1993-08-13 18:58:27 UTC
Raw Date: Fri, 13 Aug 93 11:58:27 PDT
From: gtoal@an-teallach.com (Graham Toal)
Date: Fri, 13 Aug 93 11:58:27 PDT
To: cypherpunks@toad.com
Subject: how does it work
Message-ID: <5028@an-teallach.com>
MIME-Version: 1.0
Content-Type: text/plain
In article <Pine.3.05.9308091300.A5374-b100000@ra.cs.umb.edu> pbreton@cs.umb.edu writes:
> 1) Aren't telnets logged, at least at the site you telnet to? If I "telnet
> xxxx smtp", doesn't the site I telnet to have it in a log? I can't control
> that, and that could identify me.
*All* connections to any port can be logged. And if your site isn't entirely
under your own control, your site can collude with the called site using
the ident protocol to tell the other site the name of the user that the
tcp/ip connection belongs to. If the other end has a smart SMTP, it
can put this info in the received: headers.
I do stuff like this myself using the LOG_TCP wrappers.
G
===
Personal mail to gtoal@gtoal.com (I read it in the evenings)
Business mail to gtoal@an-teallach.com (Be careful with the spelling!)
Faxes to An Teallach Limited: +44 31 662 4678 Voice: +44 31 668 1550 x212
Return to August 1993
Return to “gtoal@an-teallach.com (Graham Toal)”
1993-08-13 (Fri, 13 Aug 93 11:58:27 PDT) - how does it work - gtoal@an-teallach.com (Graham Toal)