[73028] in North American Network Operators' Group
Re: Research - Valid Data Gathering vs. Annoying Other
daemon@ATHENA.MIT.EDU (Tony Rall)
Fri Aug 6 16:28:41 2004
In-Reply-To: <200408062005.i76K5wtq000971@host122.r-bonomi.com>
To: nanog@merit.edu
From: Tony Rall <trall@almaden.ibm.com>
Date: Fri, 6 Aug 2004 13:28:03 -0700
Errors-To: owner-nanog-outgoing@merit.edu
On Friday, 2004-08-06 at 15:05 EST, Robert Bonomi
<bonomi@mail.r-bonomi.com> wrote:
> Executive summary:
> Method of choice: "Get Permission. *FIRST*."
> If that fails, try: "Buy Access."
> If =that= fails, then "Don't Do it!"
So, I have to get permission before trying to communicate with any host on
the Internet? Shouldn't this be extended to all forms of communication?
You must have permission before mailing, phoning, or talking to anyone?
I wonder how to even go about that, because to get their permission I
likely would need to communicate with them.
I guess that's one way to squelch the usefulness and rampant growth of the
network.
Tony Rall