[73030] in North American Network Operators' Group
Re: Research - Valid Data Gathering vs. Annoying Other
daemon@ATHENA.MIT.EDU (Roland Perry)
Fri Aug 6 16:49:32 2004
Date: Fri, 6 Aug 2004 21:47:24 +0100
To: nanog@merit.edu
From: Roland Perry <lists@internetpolicyagency.com>
In-Reply-To: <200408062005.i76K5wtq000971@host122.r-bonomi.com>
Errors-To: owner-nanog-outgoing@merit.edu
In article <200408062005.i76K5wtq000971@host122.r-bonomi.com>, Robert
Bonomi <bonomi@mail.r-bonomi.com> writes
>Because the -only- 'authorized use is those things whiich I expressly
>let past my firewall. Ergo, if the firewall blocks it, it _IS_ an
>'unauthorized access' attempt.
Do you publish the firewall rules, so that people can make sure they
don't accidentally make unauthorised attempts? Or are they supposed to
guess what you allow through? Which would seem a little harsh if the
penalty for guessing wrong is goinging straight to jail.
--
Roland Perry