From: Skywise on
Bit Twister <BitTwister(a)mouse-potato.com> wrote in
news:slrnhlghc9.56v.BitTwister(a)wb.home.test:

> Several states in the USA have gotten tired of your excuse being used
> by hackers. Any unauthorized access is criminal trespass.
> That means a ping is trespassing.

Well, then they better star pressing charges. I hope they have the
court resources to prosecute a couple billion people.

Brian
--
http://www.skywise711.com - Lasers, Seismology, Astronomy, Skepticism
Seismic FAQ: http://www.skywise711.com/SeismicFAQ/SeismicFAQ.html
Quake "predictions": http://www.skywise711.com/quakes/EQDB/index.html
Sed quis custodiet ipsos Custodes?
From: Ansgar -59cobalt- Wiechers on
D. Stussy <spam+newsgroups(a)bde-arc.ampr.org> wrote:
> "Ansgar -59cobalt- Wiechers" <usenet-2010(a)planetcobalt.net> wrote:
>> D. Stussy <spam+newsgroups(a)bde-arc.ampr.org> wrote:
>>> There are laws against spamming. There are laws against
>>> unauthorized access.
>>
>> I'm debating the "unauthorized" part when it comes to hosts on public
>> networks. I already explained in another post why requiring explicit
>> permission would ultimately break the Internet, so I'll simply refer
>> you to that post.
>
> Using a specific, well-known service that is meant for public access
> isn't going to fit with "unauthorized" (at least at first glance).

On second glance: even if the port is well-known, it still doesn't say
anything at all about whether the owner of the server made that service
accessible on purpose. Back to square one. Unless we can assume implicit
consent of the owner (he willingly put the server on a public network
after all). In which case I fail to see why this shouldn't apply to all
ports.

> Scanning a site for nonstandard features and those not meant for
> public consumption is, especially when followed with an exploit
> attack.

I'm talking about accessing/using a service. Attacking someone is
already covered by other (criminal) laws. It's the same difference as
talking to a random person and beating that random person up.

>>>>>> A portscan is not necessarily the prelude to an attack. And a
>>>>>> portscan most certainly isn't an attack in itself.
>>>>>
>>>>> More often than not, it is.
>>>>
>>>> You have some figures to support that opinion, I suppose?
>>
>> Apparently not. I thought so.
>
> I don't see where I have the burden of proof. You went first, so you
> need to demonstrate your assertion.

cobalt(a)iridium:~ $ nmap -sT -P0 74.125.43.103

Starting Nmap 4.62 ( http://nmap.org ) at 2010-01-22 09:16 CET
Interesting ports on bw-in-f103.1e100.net (74.125.43.103):
Not shown: 1712 filtered ports
PORT STATE SERVICE
80/tcp open http
113/tcp closed auth
443/tcp open https

Nmap done: 1 IP address (1 host up) scanned in 14.084 seconds
cobalt(a)iridium:~ $ _

No exploit/attack intended. Your turn.

[...]
>>>>>>> Some places have laws against such action.
>>>> ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
>>>>>> Fortunately most places have legislators with at least half a
>>>>>> brain and don't.
>>>>>
>>>>> ...And don't what?
>>>>
>>>> Read again.
>>>
>>> Answer the question. You have a hanging auxillary verb.
>>
>> You lack reading comprehension. The answer to your question lies in
>> the part I underlined.
>
> If by that you meant that "don't have laws", the CORRECT English would
> be:
>
> "...half a brain; some don't."

Ummm... no. I wrote "... half a brain and don't [have laws against such
action]", leaving out the part in square brackets as a figure of speech
(this is called "ellipsis"; look it up).

> Learn to write PROPERLY before accusing your reader(s) of
> misunderstanding.

English isn't my first language, so I'm prone to make a mistake every
once in a while (although in this case I don't believe I did). What's
your excuse?

cu
59cobalt
--
"If a software developer ever believes a rootkit is a necessary part of
their architecture they should go back and re-architect their solution."
--Mark Russinovich