[32981] in North American Network Operators' Group
Re: Port scanning legal
daemon@ATHENA.MIT.EDU (L. Sassaman)
Tue Dec 19 21:52:58 2000
Date: Tue, 19 Dec 2000 18:46:32 -0800 (PST)
From: "L. Sassaman" <rabbi@quickie.net>
To: Dan Hollis <goemon@sasami.anime.net>
Cc: Shawn McMahon <smcmahon@eiv.com>,
"'nanog@merit.edu'" <nanog@merit.edu>
In-Reply-To: <Pine.LNX.4.30.0012191143480.15434-100000@anime.net>
Message-ID: <Pine.LNX.4.30.QNWS.0012191843120.1407-100000@thetis.deor.org>
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Errors-To: owner-nanog-outgoing@merit.edu
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tue, 19 Dec 2000, Dan Hollis wrote:
>
> On Tue, 19 Dec 2000, Shawn McMahon wrote:
> > Better lock me up; I can't count the number of times I've nmap-ed
> > somebody just to find out what OS they were using, either for personal
> > curiosity, or as part of an argument.
>
> Cool. Since you're obviously in the right, how about scanning some
> U.S. military networks and letting us all know what OS they are using?
I have tcpwrappers set to trigger a portscan after certain actions... and
I have inadvertently scanned a section of the navy.mil network because of
this. (They're running raptor... what a surprise.)
I was not approached by any men in black after this happened. I suspect
the US Military is well accustomed to having its networks scanned.
- --Len.
__
L. Sassaman
Security Architect | "The world's gone crazy,
Technology Consultant | and it makes no sense..."
|
http://sion.quickie.net | --Sting
-----BEGIN PGP SIGNATURE-----
Comment: OpenPGP Encrypted Email Preferred.
iD8DBQE6QB2QPYrxsgmsCmoRAlGNAKC+UfoTVzbYIPps4FqLORbendxPiwCgtmb9
dLMYIcGlJHUvfq3iGepfKbQ=
=GeE9
-----END PGP SIGNATURE-----