Security Basics mailing list archives
What is property and thus why are some things illegal.
From: "Craig Wright" <cwright () bdosyd com au>
Date: Wed, 5 Apr 2006 15:24:12 +1000
Hello, (Caveat) First I am neither Marxist nor Anarchist nor do I live in a country that is. Each of these philosophies has a different view on property rights, but neither is one that I care about. Property (as defined in legal terms) as is associated with servers, routers and information systems in general is known in the law as consisting of "chattels". Servers are chattels. The data are Intellectual Property. There are a standard bundle of rights associated with property: 1 The right to control use of the property , 2 The right to receive benefit from the property, 3 The right to assign, transfer or sell the property , 4 and the right to exclude others from the property. In the case of port scans we are looking at point 4, the right to exclude and point 1, the right to control. Rights as defined and used in this email are based on the Anglo-Saxon idea of exclusive right. This right is equivalent to the Civil law (Roman) idea of Dominus (see. Dominus enim dicit for those who like Latin). The dominus is more restrictive than common law property rights and Civil law (or codified law) rights of property are absolute rather than distributable as in the English common law. For this reason I shall confine this to the common law view of rights as much as possible. This view is one that is more commonly held in the "West" and Civil codified laws are more restrictive and more likely to enforce the rights of a property holder. The rights we need to look at as was noted are the right of control and the right of exclusion. The "right of control" is the right to determine how the property is used. "Uses" were originally the equitable or beneficial interests in the property. The right of control allows the system owner to determine how the system is to operate according to law. The system owner has the right to state that they do not allow ping (or any ICMP for example). To enforce this they could filter any ICMP traffic. If in this example the system owner had determined that they would stop all ICMP traffic to/from the server, they could state this and than any access via ICMP would be a violation of the property rights. If the system owner had not taken steps to notify the public through some means (eg a terms notice on the primary web site) than the rights still exist but are not enforceable in law. This means that the act of trying to ping this server is illegal but there is not way to enforce this right. To enforce the right the system owner has to do something to bring the right of control to the notice of the person who seeks to violate this right. An example here is a banner on a telnet login. The action is still illegal as stated, but there is not an action to enforce the right without the notification. The notification does not need to be ongoing. It just needs to occur. It does not even need to be particularly verbose or even grammatically correct. The notification does not even need to be sent using the same protocol. Sending an email off to the attacker would satisfy the requirement. A simple manner of transmitting intent is to have ICMP responses allowed. By allowing this traffic and using ingress and egress filters, and sending ICMP type 3 replies. In particular type 3/13 replies could be sent (Communication Administratively Prohibited). Upon receiving this response, the person scanning has effectively received notification (eg like a banner). There is no legal requirement that they take notice of the packet, just that it is delivered. Other ICMP types that would effect this include; 3/9 The destination network is administratively prohibited 3/10 The destination host is administratively prohibited. 3/11 The network is unreachable for Type Of Service. 3/12 The host is unreachable for Type Of Service. Sending ICMP 3/9 is the most effective solution. (This is easy to configure on Cisco routers, other routers may or may not be able to achieve this). On receipt of the first packet, the person scanning is effectively notified. If they than "scan" or "test" any port on the network, they are effectively breaching the conditions as they have been notified to (similar to trespass on real property when you have asked the trespasser to leave and you have rights to the land). If the person ports scans the site and ingress filters are configured to send ICMP 3/9 replies as soon as a packet is received to any port on any server other than the validly allowed ports, there is a breach. In this case, continued scanning becomes a breach of rights with an attached enforceable action. In this case you have the ability to litigate the person scanning the site civilly for a port scan and nothing more (i.e. no real damage). Why do some people wait till you see a banner and log till than? When you see the banner this becomes a course of action. If you keep scanning after seeing the banner, than you have an action in criminal terms and you do not need to have damage to be able to seek action. The right of exclusion is the right to dictate what others can do. This means that the property owner has the right to exercise control and to dictate what level of access (if any) another has to the property. In respect to the Internet, access from your gateway to another server is completed under an effect of easement. There are both public and private easements. A public easement is one that grants the right to a large group of individuals or to the public in general. This in the terms of the Internet is analogous to the backbone routers. A DOS or DDoS attack against DNS or the backbone routers is in effect the same as blocking access to someone who has an easement. It is a trespass upon the right of easement and creates a cause of action for civil suit. In most jurisdictions this is also not codified or in statute as a criminal offence. It is still illegal as a civil breach when not directly excluded. Exclusion allows the property owner (in our case the system owner) to designate what actions are acceptable. They only need to state that an action is against the policy of the site for this to become an enforceable action, further, where the system is a state owned system (take US Federal government for example) all access is considered to be expressly controls unless access is expressly allowed. What does this mean? A port scan, if the system owner does not welcome them is a violation of the property rights of the system owner. They breach the rights of exclusivity. The whether we see the system and its data as a "choses in possession" or a "choses in action" the act has to be one that is acceptable to the system owner. If we look to the Civil law, we have an analogous system with respect to movable property or movables. Breach of an owner or possessors rights is a transgression in the nature of property law. There are actions for recovery or tort, but these require that there generally has been damage. None the less, a transgression of either the right to control or the right to exclude is still a violation of the fundamental rights of the owner of the property. A property law violation is not (generally) a criminal act without damage. This does not stop it from being illegal. It is illegal in that it also can act to void a contract. If for example party A contracts party B to scan the systems of party C using a port scanner, party A could after receiving the report decide not to pay B for the services as the action is considered illegal and an illegal contract is not enforceable. There would be no punitive effect from this, but this does not change the action into a legal act. Clear as mud? Well I hope that this has created a little more understanding of the law, rights and why they apply. To complicate this we could also look at equitable rights, but this would only lose more readers. Damage the property or actually get access to the system and than we get into a who new area. This is where the criminal offences come to play. Regards, Craig Further reading "Ancient Law" by Henry Maine Chapter 8 (The Early History of Property) Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. DISCLAIMER The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy. Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO. BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access. --------------------------------------------------------------------------- EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The Norwich University program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Tailor your education to your own professional goals with degree customizations including Emergency Management, Business Continuity Planning, Computer Emergency Response Teams, and Digital Investigations. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- What is property and thus why are some things illegal. Craig Wright (Apr 05)
- RE: What is property and thus why are some things illegal. David Gillett (Apr 06)
- <Possible follow-ups>
- What is property and thus why are some things illegal. Craig Wright (Apr 06)