[AusNOG] metadata conference on SkyNews

Tom Berryman tom at connectivityit.com.au
Fri Aug 8 22:07:18 EST 2014


>> Telephone numbers might be somewhat accurate analogues for individuals, as there is one phone number per device, and they're not NATted by the carrier or the end-user. The same cannot be said about Internet protocol identifiers.

PABX? Surely an office phone system is the analogue NAT?
Though all but dead now.. yet I can't really think of any that stored for 2 years the mapping of when what internal user made what external phone call for how long...

Tom


-----Original Message-----
From: AusNOG [mailto:ausnog-bounces at lists.ausnog.net] On Behalf Of Mark ZZZ Smith
Sent: Friday, 8 August 2014 10:00 PM
To: Phil Pierotti; ausnog at lists.ausnog.net
Subject: Re: [AusNOG] metadata conference on SkyNews






>________________________________
> From: Phil Pierotti <Phil.Pierotti at day3.com.au>
>To: ausnog at lists.ausnog.net 
>Sent: Friday, 8 August 2014 3:01 PM
>Subject: Re: [AusNOG] metadata conference on SkyNews
> 
>
>
>Clearly if you need source and destination of every packet then sFlow just doesn’t cut the mustard.
> 

No network identifier 'cuts the mustard'. They identify a host, or an application the host is using, but not the person behind the device. And in the case of IPv6, they can change periodically, as they have been on Windows boxes every 8 to 12 hours or so.

Telephone numbers might be somewhat accurate analogues for individuals, as there is one phone number per device, and they're not NATted by the carrier or the end-user. The same cannot be said about Internet protocol identifiers.

For cases of copyright violation, US courts have determined that IP addresses is not a person, so why does the crime of terrorism make that any less false?



>Also as clear (to us, if not them) if you’re NOT collecting said ‘meta data’ on every single packet then why bother capturing any?
> 
>Or are you hoping to capture every N-th terrorist plot, kiddie-porn-ographer or other bogey-man of the moment?
> 
>Phil Pierotti
>Senior Network Engineer
>day3 Solutions
>
>
>DISCLAIMER: 
>This e-mail and any files transmitted with it may be privileged and confidential, and are intended only for the use of the intended recipient. If you are not the intended recipient or responsible for delivering this e-mail to the intended recipient, any use, dissemination, forwarding, printing or copying of this e-mail and any attachments is strictly prohibited. 
>If you have received this e-mail in error, please REPLY TO the SENDER to advise the error AND then DELETE the e-mail from your system.
>Any views expressed in this e-mail and any files transmitted with it are those of the individual sender, except where the sender specifically states them to be the views of our organisation.
>Our organisation does not represent or warrant that the attached files are free from computer viruses or other defects. 
>The user assumes all responsibility for any loss or damage resulting directly or indirectly from the use of the attached files. In any event, the liability to our organisation is limited to either the resupply of the attached files or the cost of having the attached files resupplied.
>
>
>
>
>_______________________________________________
>AusNOG mailing list
>AusNOG at lists.ausnog.net
>http://lists.ausnog.net/mailman/listinfo/ausnog
>
>
>
_______________________________________________
AusNOG mailing list
AusNOG at lists.ausnog.net
http://lists.ausnog.net/mailman/listinfo/ausnog


More information about the AusNOG mailing list