[56220] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: anti-spam vs network abuse

daemon@ATHENA.MIT.EDU (Len Rose)
Fri Feb 28 17:09:33 2003

Date: Fri, 28 Feb 2003 17:05:50 -0500
From: Len Rose <len@netsys.com>
To: nanog@merit.edu
In-Reply-To: <Pine.BSF.4.44.0302281625580.30448-100000@thunder.xecu.net>
Errors-To: owner-nanog-outgoing@merit.edu



Scanning is always a precursor to an attack, or to determine if any obvious 
methodology can be used to attack. At least that's how it has been 
historically viewed.

In my opinion there is no legitimate reason to scan a remote host or network
without the permission of the owners. Otherwise it is in fact excessive 
behaviour.



Andy Dills wrote:

[alot of interesting points deleted]

> You don't have to. This is why I never understood why people care so much
> about probing. If you do a good job with your network, probing will have
> zero affect on you. All the person probing can do (regardless of their
> intent) is say "Gee, I guess there aren't any vulnerabilities with this
> network."
> Andy
> Andy Dills                              301-682-9972
> Xecunet, LLC                            www.xecu.net


home help back first fref pref prev next nref lref last post