[37826] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Stealth Blocking

daemon@ATHENA.MIT.EDU (Valdis.Kletnieks@vt.edu)
Thu May 24 18:36:32 2001

Message-Id: <200105242035.f4OKZbP03559@foo-bar-baz.cc.vt.edu>
To: nanog@merit.edu
From: Valdis.Kletnieks@vt.edu
Mime-Version: 1.0
Content-Type: multipart/signed; boundary="==_Exmh_-681910080P";
	 micalg=pgp-sha1; protocol="application/pgp-signature"
Content-Transfer-Encoding: 7bit
Date: Thu, 24 May 2001 16:35:37 -0400
Errors-To: owner-nanog-outgoing@merit.edu


--==_Exmh_-681910080P
Content-Type: text/plain; charset=us-ascii

On 00 Jan 00 00:00:00, Valdis.Kletnieks@vt.edu said:

> Be careful, it's not as clear-cut as it may seem.  At least in one US District
> Court, portscanning was held to be legal (or more precisely, that you couldn't
> count the cost of investigating one against damages)...

s/was held to be legal/was not in and of itself held to be illegal/.

Just a slightly different meaning there.. ;)

I'll let the lawyers argue how to define "damages" as stated in
18 USC 1030(a)(5) - I wouldn't be surprised if a lawer attempted to
claim that merely *FINDING* a vulnerability, but not exploiting it,
causes "damage" the same way that driving past somebody's house and
yelling "you have termites" causes damage if you investigate and
finding that you do, in fact, have a termite problem.

Of course, IANAL, and if anybody wants to cite case law please do so. ;)
-- 
				Valdis Kletnieks
				Operating Systems Analyst
				Virginia Tech


--==_Exmh_-681910080P
Content-Type: application/pgp-signature

-----BEGIN PGP SIGNATURE-----
Version: PGP 6.5.8
Comment: Exmh version 2.2 06/16/2000

iQA/AwUBOw1wmXAt5Vm009ewEQI3WwCcDGyNp008KT2eGPU1Eoglt/v8YwYAniSf
H5S+RSD7o5RuCnWYdvnFgWSp
=h6RP
-----END PGP SIGNATURE-----

--==_Exmh_-681910080P--


home help back first fref pref prev next nref lref last post