nanog mailing list archives
Re: Research - Valid Data Gathering vs. Annoying Other
From: Roland Perry <lists () internetpolicyagency com>
Date: Fri, 6 Aug 2004 21:47:24 +0100
In article <200408062005.i76K5wtq000971 () host122 r-bonomi com>, Robert Bonomi <bonomi () mail r-bonomi com> writes
Because the -only- 'authorized use is those things whiich I expressly let past my firewall. Ergo, if the firewall blocks it, it _IS_ an 'unauthorized access' attempt.
Do you publish the firewall rules, so that people can make sure they don't accidentally make unauthorised attempts? Or are they supposed to guess what you allow through? Which would seem a little harsh if the penalty for guessing wrong is goinging straight to jail.
-- Roland Perry
Current thread:
- Research - Valid Data Gathering vs. Annoying Other Robert Bonomi (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Randy Bush (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Bill Owens (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Tony Rall (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Matt Hess (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Roland Perry (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Daniel Reed (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Randy Bush (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Jon Lewis (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Steve Atkins (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Randy Bush (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other james edwards (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Scott Weeks (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Daniel Golding (Aug 06)
- Re: Research - Valid Data Gathering vs. Annoying Other Stephen J. Wilcox (Aug 07)
- <Possible follow-ups>
- RE: Research - Valid Data Gathering vs. Annoying Other Michel Py (Aug 06)