[47936] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: "portscans" (was Re: Arbor Networks DoS defense product)

daemon@ATHENA.MIT.EDU (Scott Gifford)
Sat May 18 21:44:09 2002

X-Delivered-To: nanog@merit.edu
To: Scott Francis <darkuncle@darkuncle.net>
Cc: nanog@merit.edu
From: Scott Gifford <sgifford@suspectclass.com>
Date: 18 May 2002 21:43:16 -0400
In-Reply-To: Scott Francis's message of "Sat, 18 May 2002 16:03:11 -0700"
Message-ID: <lyg00onc97.fsf@gfn.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Errors-To: owner-nanog-outgoing@merit.edu


Scott Francis <darkuncle@darkuncle.net> writes:

[...]

> And why, pray tell, would some unknown and unaffiliated person be scanning my
> network to gather information or run recon if they were not planning on
> attacking? I'm not saying that you're not right, I'm just saying that so far
> I have heard no valid non-attack reasons for portscans (other than those run
> by network admins against their own networks).

Before choosing an onling bank, I portscanned the networks of the
banks I was considering.  It was the only way I could find to get a
rough assessment of their network security, which was important to me
as a customer for obvious reasons.

I'm not sure if I would have been impressed or annoyed if they had
stopped accepting packets from my machine during the scan.  :-)

-----ScottG.

home help back first fref pref prev next nref lref last post