[47942] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: "portscans" (was Re: Arbor Networks DoS defense product)

daemon@ATHENA.MIT.EDU (Greg A. Woods)
Sat May 18 23:06:32 2002

MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit
From: woods@weird.com (Greg A. Woods)
To: Scott Francis <darkuncle@darkuncle.net>
Cc: nanog@merit.edu
In-Reply-To: <20020518230311.GA68386@darkuncle.net>
Reply-To: woods@weird.com (Greg A. Woods)
Message-Id: <20020519030534.4C874AC@proven.weird.com>
Date: Sat, 18 May 2002 23:05:34 -0400 (EDT)
Errors-To: owner-nanog-outgoing@merit.edu


[ On Saturday, May 18, 2002 at 16:03:11 (-0700), Scott Francis wrote: ]
> Subject: Re: "portscans" (was Re: Arbor Networks DoS defense product)
>
> And why, pray tell, would some unknown and unaffiliated person be scanning my
> network to gather information or run recon if they were not planning on
> attacking? I'm not saying that you're not right, I'm just saying that so far
> I have heard no valid non-attack reasons for portscans (other than those run
> by network admins against their own networks).

I scan networks and hosts very regularly for legitimate diagnostic
purposes as well as occasionally for curiosity's sake.  I've never
attacked any host or network that I was not directly responsible for.
If you don't want the public portions of your network mapped then you
should withdraw them from public view.

BTW, please be one heck of a lot more careful with your replies.  My
original reply to you was not copied to the list and I did not give you
permission to post a response quoting my words back to the list.

-- 
								Greg A. Woods

+1 416 218-0098;  <gwoods@acm.org>;  <g.a.woods@ieee.org>;  <woods@robohack.ca>
Planix, Inc. <woods@planix.com>; VE3TCP; Secrets of the Weird <woods@weird.com>

home help back first fref pref prev next nref lref last post