I've been lurking here for quite some time.. and at least in my mind, this
issue is quite simple.. I am the firewall admin for my organization which
actually spans several states.. and I actively use nmap/nessus/etc to scan
_OUR_ network both inside and outside for potential security problems. I
would never even consider scanning another person/organizaion without a
complete set of legal documents describing what/why/when etc.
We know that folks out on the net have all the same security tools that we
have. We must legally be allowed to posess/create/use the same tools to
ensure our own security, however there is no point in us turning these
tools on eachother unless our goal is to expose/exploit any weakness we find.
Just my 2c.
Tony
On Fri, Feb 18, 2000 at 01:27:34PM -0500, Michael E. Cummins wrote:
> > -----Original Message-----
> > From: EXT-Springer, Aaron C [mailto:[EMAIL PROTECTED]]
> > Sent: Friday, February 18, 2000 1:08 PM
> > To: '[EMAIL PROTECTED]'; '[EMAIL PROTECTED]'
> > Subject: RE: Someone is scanning me
> >
> >
> > I can understand your position and I would not try to tell you
> > how to react.
> >
> > I think that a scan is just a scan, I would hate to have it come
> > to the point where doing a scan on somebody gets your ISP account
> > revoked. This country is turning into a police state as it is.
> > I can see a future where any kind of probing is deemed illegal by
> > the Gestapo. In the UK if you don't give up your crypto keys
> > when the Gov. asks, you go to jail. The day may come when having
> > strobe or nmap on your machine is illegal..
> >
> > If they do more than a scan then, hey give it to `em...
> >
> >
> > acs
>
>
> The more I think about it, the more I am questioning my initial zeal in
> spanking this fellow. I think that you have a valid point, but I am still
> uncomfortable with what appears to me to be a script kiddy scanning a broad
> number of addresses looking quite specifically for Trojan infected machines.
>
> I myself have a fear of the way some of our legislators are looking at
> "cyber crime", "cryptology" and various other internet related issues.
> Keeping the discussion list-specific, as an operator of numerous
> firewalls...
>
> What is our responsibility to this?
>
> Do we wait for the attacker to "breach" before reacting? Or do we try to
> determine on a case by case basis what the intent of the anomaly was? I
> have always favored preventive action over corrective, but I am trying to
> find a happy balance here between ethics, logistics and behavioral
> precedents that I will pass on to my employees.
>
> Some of us cannot deal with the number of probes received per day, it would
> be a logistic impossibility. (Luckily, I am not one of these. Currently, I
> co-locate servers and pay for the services.) Thus, I can understand a
> policy based on "Well, what did they actually get away with?"
>
> Or is that too lax?
>
> If we find ourselves with the time and the resources, do we have the
> obligation to swat the flies? Am I correct in perceiving that the majority
> of intrusions today are from people that actually have little knowledge of
> the principles their downloaded tools are based upon - and a bit too much
> time on their hands?
>
> In my case, I just shared my logfiles with the German ISP that we assumed
> the port scanning originated from. I stressed that no damage was done, and
> no successful breach took place. I just alerted them that the event took
> place, as a courtesy to them. At least, that truly is the spirit I sent it
> in after thinking about everything a few times.
>
> How many people agree or disagree with that action, and why? I am curious.
>
> Thanks.
>
> ,_,
> (O,O)
> ( )
> -"-"---------------------------------------------------------------
> | From the Desk of Michael E. Cummins |
> |
> |
> | WEBSITE: http://www.i-magery.com |
> | E-MAIL: mailto:[EMAIL PROTECTED] |
> |
> |
> | "The main thing is to keep the main thing, the main thing" |
> | - Albert Einstein
> |
> |
> |
> | "Si hoc legere scis numium eruditionis habes" |
> -------------------------------------------------------------------
>
>
> ====================================================
> And for you automated email spammers out there,
> here are the email addresses of the current board of
> the Federal Communications Commission:
> Chairman William Kennard: [EMAIL PROTECTED]
> Commissioner Susan Ness: [EMAIL PROTECTED]
> Commissioner Harold Furchtgott-Roth: [EMAIL PROTECTED]
> Commissioner Michael Powell: [EMAIL PROTECTED]
> Commissioner Gloria Tristani: [EMAIL PROTECTED]
> And let's help you send some spam to the USPS, too:
> [EMAIL PROTECTED]
> ====================================================
>
>
>
>
>
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
--
Tony Nelson
www.gnupg.org keyid 136C5B87
- Standard Disclaimers Apply -
Boycott Amazon! - http://www.gnu.org/philosophy/amazon.html
PGP signature