[32953] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

RE: Port scanning legal

daemon@ATHENA.MIT.EDU (Roeland Meyer)
Tue Dec 19 15:15:31 2000

Message-ID: <9DC8BBAD4FF100408FC7D18D1F0922869B7A@condor.mhsc.com>
From: Roeland Meyer <rmeyer@mhsc.com>
To: 'Dan Hollis' <goemon@sasami.anime.net>,
	Shawn McMahon <smcmahon@eiv.com>
Cc: "'nanog@merit.edu'" <nanog@merit.edu>
Date: Tue, 19 Dec 2000 12:08:41 -0800
MIME-Version: 1.0
Content-Type: text/plain;
	charset="iso-8859-1"
Errors-To: owner-nanog-outgoing@merit.edu


I've pinged IP addrs that I later found out were MIL addrs. Nothing
happened. Duh!

There are a LOT of IP addrs that aren't in the DNS. How is one to know? I
don't know about you, but I flunked telepathy in High School and did worse
in clarvoyance. In fact, psionics wasn't wasn't something I was generally
good at. That's why I went into engineering.

Could it be, that is why ping and traceroute were invented?

The argument against port-scanning applies equally well to just about every
diagnostic tool we use. Be careful what you wish for, we might all get stuck
with it. Then, where would we be?

> -----Original Message-----
> From: Dan Hollis [mailto:goemon@sasami.anime.net]
> Sent: Tuesday, December 19, 2000 11:46 AM
> To: Shawn McMahon
> Cc: 'nanog@merit.edu'
> Subject: Re: Port scanning legal
> 
> 
> 
> On Tue, 19 Dec 2000, Shawn McMahon wrote:
> > Better lock me up; I can't count the number of times I've nmap-ed
> > somebody just to find out what OS they were using, either 
> for personal
> > curiosity, or as part of an argument.
> 
> Cool. Since you're obviously in the right, how about scanning some
> U.S. military networks and letting us all know what OS they are using?
> 
> If you like, I'll start an argument with you so you have the 
> justification
> you need to portscan.
> 
> -Dan
> 
> 


home help back first fref pref prev next nref lref last post