


Law Review Article Says Port Scanning Illegal 373
Anonymous Coward writes: "The Journal of Technology Law and Policy has a good article on computer security and privacy. If you ignore the more metaphorical crap at the beginning of the article, the author marches through some laws that apply to the Internet and shows how they apply and why his way of deciding what kind of access to a computer breaks the law and what kinds don't is better. (Its based on property and expectations of privacy.) It's interesting to see the computer security from a lawyer's point of view. Especially interesting are his claims that using nmap is illegal, despite the VC3 v. Moulton case. I'm not sure I agree with him, but he definitely makes a pretty sobering case." Actually, I think the metaphors throughout this piece (not just at the beginning) are what make it interesting, and a big component of law is dealing with metaphors. This piece also collects in one place a lot of the cases dealing with computer law.
Re:Questions..... (Score:2)
What are the IP addresses of the machines you admin? I'd like to see if you patch them.
- A.P. (I have no sympathy for admins who don't patch their machines and people who don't make backups.)
--
Forget Napster. Why not really break the law?
Re:Questions..... (Score:2)
Poor analogy. What is nmap stealing when it performs connection attempts? What is it smashing?
- A.P.
--
Forget Napster. Why not really break the law?
Re:Technical measures (Score:2)
This is a big change from how things work now.
I have no problem with companies' own servers being very forcefully protected, or with extreme limits being placed on what I can do to or with THEIR computers- if the SAME LIMITS apply to what they can do with mine! This has often been a concern of mine. I see my hard disks as private property, and just because I run a program does not mean my expectation is to allow the software to run completely amok and cause problems while 'protecting' itself. That would be like saying if you let someone into your house, they are allowed to steal or wreck everything you own. Hey, you let 'em in!
The real world is more complicated than that. And I'm delighted to see the real world beginning to enter into software issues too.
Re:Boon for bad admins ? (Score:2)
Do you want to be able to say "Trust me" to the RIAA, MPAA etc ad nauseam when they want to get permission to log onto your computer and scan it for copyrighted material? Do you want an ironclad legal defense stating that they have no business snooping around your property? Do you want to be able to run software they might be involved with, and not risk the possibility that they will use it as a trojan to hunt down copyrighted material and delete it or report you to the police?
Do you want to be able to say "Trust me" and be certain that if they then try to spy on you, infiltrate your system, or destroy your data, that THEY will be the criminals in that case?
Or would you like them to be able to do all this and then turn you over to the authorities if they find anything they think is incriminating?
Our 'cyberspace property rights' are way weaker than physical property rights. Having this change is not necessarily a bad thing.
Re:This is a GOOD article (Score:2)
The justice system of the United States Of America already disagrees with you on the last bit. Just because said system also permits appeals doesn't change that. And selling bare machines is _strongly_ discouraged- by Microsoft. You may not want to know what they can do to you if you persist in doing so.
I knew perfectly well I was pushing it with my first example, hence the 'or more plausibly'. It's pretty unlikely that they will ever not be allowed to cease supporting stuff. It is, however, possible that they will not be allowed to gratituously break stuff that used to work- and this is precisely what they are in the process of doing.
Astroturf much? ;)
Re:Boon for bad admins ? (Score:2)
It's a bit of a red flag for me simply that you use the term 'the free market' twice. Sounds like a libertarian perspective, and you're not necessarily going to see it backed by the courts. It's pretty well accepted that limitations on this consumer ability to examine are expected- that the legal system tries to strike a balance between the wish of a seller to con the buyer, and the wish of a buyer to 'make a rational choice' (HA!).
By the same token, it's pretty well accepted that 'consumers' can't even voluntarily waive their rights completely- if you say "here's three cents off, and if it kills you we're not liable!" it won't stand up in court if the thing does kill somebody, because people don't go around making rational decisions all the time. For this reason, post-sale control of goods and services has an uphill battle if it wants to get to where the copyright lobby wants it- and in fact book publishers have already lost this battle, which is why there's case law on first sale rights.
The only thing that _can_ affect corporate entities is law and terrorism. But law _does_ affect corporate entities. You're personalising them and that's a mistake. If law says they've gotta do something, they may weasel but it's really not in the interests of the shareholders for them to try to overthrow the law itself- bad PR, poor chances, not a win. It's the legacy of Microsoft that's confused you about this, because Microsoft is an insane corporation and would _much_ rather overthrow law and justice than please the stockholders. MS has control issues. You can't generalise that to all corporations.
This is a GOOD article (Score:5)
This is a _good_ article. Law and justice that doesn't have two sides is no law at all... this article goes a long way towards presenting a concept of digital property rights that is _local_.
There is a lot of money and power behind content creators, copyright holders etc. saying "we own this, it is OUR property, therefore we get to scan your computer, send back information to the mothership, and if you are a criminal we get to delete stolen goods off your hard drive, you pirate you! You miscreant!"
The thing is, _law_ sees this and comes back with "If you're saying that is property, wouldn't the person's hard disk be property too? As in 'not yours', as in 'you are a guest but they bought it and own it and live in it'?"
That's the beauty of law and justice- it balances, in time. The inevitable result of pushing for extensive 'property' law regarding copyright etc. is to also cast light on the subject of what kind of property a person's datasphere is.
I even wrote an essay on this in November 1998: it's at http://www.airwindows.com/fiction/essays/Hotel.htm l [airwindows.com]. When you operate a computer it is like you are moving your stuff around on virtual property: you put something somewhere. Does a company have a right to move it to somewhere else? To pile stuff next to it obscuring it? To paint it a different color, or dust it off? To remove, discard it, set it on fire, impound it as evidence?
The fact that all of this seems totally permissible only shows that law hasn't begun thinking about these issues yet.
You can't have it both ways- if I am forbidden even to portscan a company, then the company is forbidden to go over _my_ computer either. It's analogous. If we're tightening the protections for company-owned 'cyberspace' we're also laying a precedent for tighter protections on privately owned cyberspace.
In the future it may be ILLEGAL for Microsoft to shut off the mp3 encoding in its software and force people to migrate to WMA- or more plausibly, it may be ILLEGAL for them to take a WMA file that was once functional and render it nonfunctional arbitrarily if you don't cough up a license fee. It may also be illegal for them to place restrictions on OEM desktops- on the basis that they make the building materials, the OEM builds the house, the customer buys it and moves in. There is no compelling argument that they must be able to prohibit the OEM from decorating the 'house' as they see fit.
Very interesting stuff in this article, and grounds for hope :)
Re:Why portscanning must be legal. (Score:2)
If I ask to see their security, chances are the bank will be more than willing to do so. If I suggest testing their security for weak points, they may also be willing to work with me if I'm worth a really filthy amount.
If however I do so by attempting to break in to all the banks in town to see which ones have weak security, witout asking first.
Would it come as any surprise to end up in jail?
I understand your point, but you need to ask permission. If permission isn't granted, then maybe you should move on to the next provider, until you actually find one who will let you.
Re:this is true (Score:3)
It's the damn bullets!
Re:Huh? (Score:2)
Re:I view port scanning as analogous to door knock (Score:2)
Shame people don't believe in locks to spoil it for those of us who like to visit those who wish to open up communication ports to be friendly.
Re:this is true (Score:2)
Portscanning can also be used for searching sites that haven't been shamelessly advertised through marketing. Such rare gems are often found to be representative of local communities. I prefer folks who take the initiative to put up something personal, but haven't spammed their links everywhere. You'd be surprised at what you can find through portscanning httpd, finger, ntalk, etc...
Re:Why portscanning must be legal. (Score:5)
Re:Port scan is checking doors/windows/air ducts/. (Score:2)
I like the door knocking ananlogy... on the scale of 1024 doors
Steve
Re:Questions..... (Score:2)
In a single FTP session, you can end up using any free port on the machine to do the file transfer.
But that conversation is part of the FTP session, and is (or can be) logged as such. You wouldn't connect to a random port without requesting a file transfer from ann FTP server, assuming I even have an FTP server running on my computer, which I don't.
The list the guy mentions isn't meant to be an exhaustive list of services which are considered "public". Replace the list with the phrase "commonly provided services". And interpret the names of the services, instead of the ports for the names. If you want to run your telnet port on 23000 instead of 23 to avoid a firewall somewhere, more power to you. And no company would provide a service without also providing a direct way to the service, unless they intend for that service to remain undetected, in which case it's probably not a service that should be running anyway (like the telnet port at 23000 to avoid the firewall).
This space for rent. Call 1-800-STEAK4U
Definition for the thought-encumbered (Score:2)
A port scan can be defined as any exploration, brute-force or directed, of the available services on a computer not belonging to you with the intent of utilizing those services is a manner not intended by the provider of those services.
Does that make sense?
This space for rent. Call 1-800-STEAK4U
problem here is... (Score:2)
the "expectation of privacy" doesn't mean shit. There is nothing that actually PROTECTS our privacy. We just assume that laws should... Tough shit for us I suppose.
Re:Why portscanning must be legal. (Score:2)
Re:Why portscanning must be legal. (Score:2)
Re:Why portscanning must be illegal. (Score:2)
Re:The Physical Property Metaphor (Score:2)
Yep. But your ports aren't property. They aren't even corporeal.
Interesting. Please point me to the legal agreement I signed which states that - you ought to have no difficulty if your assertion is true.
It has nothing to do with a legal agreement. The Internet is a public internetwork by definition. It's like standing on a public highway.
My system is my system, for use by me and those whom I authorise to use it, and NO-ONE ELSE.
I suggest you disconnect your machine from the Internet. Or buy a good firewall, if you want to be more reasonable about things.
If you portscan my system, I wanna know WHY, and you better have a bloody good reason for it.
Red herring. We're talking about a law that forbids port scanning of *any system*, NOT YOUR SYSTEM. And, believe it or not, there are legitimate reasons to check the security of ports on other hosts. Like checking up on your ISPs security claims. Or checking your OWN systems. And if you don't think that would be illegal too, you don't know the government very well. ;-)
Re:Search Engines ? (Score:2)
I don't know about google but there are commercial companies out there that do portscanning as part of their businessmodel.
Here is one:
May 15 03:32:39 209.211.205.56:37301 -> xxx.xx.65.88:80 SYN ******S*
2 C3AF4F2snlbxq'|dc
May 15 03:32:39 209.211.205.56:37278 -> xxx.xx.65.65:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37285 -> xxx.xx.65.72:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37286 -> xxx.xx.65.73:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37287 -> xxx.xx.65.74:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37291 -> xxx.xx.65.78:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37293 -> xxx.xx.65.80:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37294 -> xxx.xx.65.81:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37298 -> xxx.xx.65.85:80 SYN ******S*
May 15 03:32:39 209.211.205.56:37302 -> xxx.xx.65.89:80 SYN ******S*
--
echo '[q]sa[ln0=aln80~Psnlbx]16isb15CB32EF3AF9C0E5D727
Search Engines ? (Score:5)
Does this mean that Google and company can now be found guilty when searching for open port 80 on networks ?
How about search engines that look for open 21(ftp) port ? , How about gopher ? CIFS (Common Internet filesystem) ? Hmmmm Interesting ..2 C3AF4F2snlbxq'|dc
--
echo '[q]sa[ln0=aln80~Psnlbx]16isb15CB32EF3AF9C0E5D727
case law (Score:3)
I don't want a lot, I just want it all!
Flame away, I have a hose!
Re:The nature of law (Score:2)
Caution: Now approaching the (technological) singularity.
When I Scan (Score:2)
Analogies:
The third bullet is definitely questionable as far as this lawyer's analysis goes, but nmap is most certainly not illegal, witness bullet points one, two, and four. Five is just stupid.
Re:Search Engines ? (Score:2)
--
Re:Guh? (Score:3)
- 1st paragraph, 2nd sentence: Laws made to protect computer security? How do you protect security? Or does he mean computer security is applied unpredictably? What?
- 2nd para., 2nd sent. Either the word 'in' or the phrase 'partially on' need to be deleted.
- 2nd para, 3rd sent. With property rights, computer owners will not be willing to connect to the Internet if their computers can be abused without legal remedy. So what's his point?
/me gives up in disgust and then notices byline, at the very beginning:
Ethan Preston expects to receive his J.D. from the Georgetown University Law Center in 2001.
Right... and I expect to be made emperor in 2001. I'll never hire a Georgetown alumnus if Ethan makes the grade.
port scanning, Illegality, and idiots (Score:2)
The people that insist that port scanning should be legal miss the fact that it should be legal ONLY for the sysadmins of that particular network, not for every idiot that thinks he/she should have the 'freedom' to scan a network that doesn't belong to him/her.
A stated law that makes it clear that port scanning is illegal for those outside of that networks system administrators gives people the tool to go after those who scan networks for holes that they can exploit. For instance, on my dialup connection I regularly get scanned for SubSeven and NetBus. These people are looking specifically for those ports, and the only reason they are scanning those ports is to find a machine that has been compromised that they can get into. Those that advocate being able to run port scans on networks that they don't admin could also use the same argument that it's ok to attempt a robbery as long as the attempt isn't successfull.
But, I do expect the whole concept here to fall on deaf ears (or blind eye's as it were), since it seems that Slashdot has become a haven for the script kiddie crowd.
Re:Guh? (Score:4)
It's kinda like showing a proof of Godel's Incompleteness Theory to someone not versed in math. Each step of the process is simple and straightforward, but as a whole it's tough for an untrained mind to grasp and follow along.
--
Guh? (Score:5)
--
Re:Questions..... (Score:2)
A netboot machine? Windos with nthe "network neighborhood"? Most connections require a userspace program to request a connection. Contrary to Micros~1 propaganda, a web browser isn't really a standard operating system component.
Or were you referring to nmap not using the OS routines to attempt the connect? If so, then you're just wrong since it does use the OS routines.
Secondly, blah blah blah
It's usually considered bad form to change definitions in the middle of a debate.
So you're telling me you've never done an HTTP GET just to determine if the webserver is running? Oh no, port scan! Anyway, next time I portscan you i'll just be sure to send a GET request and you'll consider it not-a-port-scan.
This is similar in attitude to the "admins that dont patch their systems deserve to get cr/hacked", and almost as ridiculous
Go Straw Man! I'll just ignore this comment.
or implicitely (eg. setting up a website)
"I was just checking to see if that's what you had done!". Or is that a portscan, because i didn't magically know the instant you did so?
The sad fact is that many people don't seem to really understand the Internet. That's why we have parents expecting that the internet should fit their morality even though anyone can publish, governments thinking they can legislate it, and people like you thinking "no! don't even look at me!" is a basic right.
-----
Re:I view port scanning as analogous to door knock (Score:2)
Re:I view port scanning as analogous to door knock (Score:2)
Go around your neighborhood. Knock on all the doors. When someone answers, politely say "Oh! I'm sorry, I didn't expect you to be home. I'll come back later." Within minutes someone's going to call the cops on you.
Re:Search Engines ? (Score:2)
If I want to read the news, should I click on a link from Netscape's Netcenter (The only page I could assume exists, because they give it to me by default) and try to find a link to a website that might be affiliated with CNN?
Or should I just guess at the URL and try www.cnn.com?
When I was looking up a motherboard for a friend I tried www.gigabyte.com. What if that hadn't been for the company I was looking for? Would I be a lawbreaker?
Get over it.
If someone tries to connect to standard services, that's legit. These services don't announce themselves. It's like trying to find a hotdog vendor at a sporting event, but one where they didn't dress differently than anyone else, didn't advertise, or even carry hotdogs.
But, I assume, in your world, that it'd be illegal to go around asking if people sold hot-dogs, or if they could point you to someone who did.
Re:Why portscanning must be legal. (Score:3)
In the bank analogy, how do you know if they have a door or a window? Photons from the sun bounce off of it and hit your eye in a recognizable pattern.
How would you do this on a cloudy night? A flashlight perhaps?
There's no way (asside from sending out continual broadcast messages from everyone) for a server to broadcast that it is serving something. You simply have to ask. Portscanning is how you do that. You ask if they are serving files. How about web pages? How about
Now, you could make up some convoluted scenario where the bank had photo-cells in the windows to detect if it was night, and your flashlight, unlawfully shined into their windows, blah blah blah...
This would be like if you were scanning for someone sharing files, you check FTP, HTTP, Windows networking, etc... Now maybe someone has a misconfigured program that instead of saying 'No', crashes when asked.
But that's not your fault, you were just asking a question.
If you exploited this, by asking over and over, it'd be akin to harassment. An otherwise legal action would be forbidden by context.
Similarly, portscanning should be legal. It's the way the network works. But malicious use of portscanning, or portscanning connected to a crime, wouldn't be legal.
trite (Score:2)
Re:Why portscanning must be legal. (Score:2)
Re:Why portscanning must be legal. (Score:2)
Re:M$ Influence in this article: (Score:2)
TIMOTHY PARKER, TEACH YOURSELF TCP/IP IN 14 DAYS Page 1-50 (2nd ed. 1996); Jason Yanowitz, Under the hood of the Internet
An overview of the TCP/IP Protocol Suite at http://info.acm.org/crossroads/xrds1-1/tcpjpy.htm
Though I would rather he read the Stevens book as opposed to some "teach yourself something in 14 days" the fact remains that he is right. Though separating the process of communications into layers is an academic exercise and not a technical one. The TCP/IP model and the DOD model both have 4 layers. The OSI model has 7 layers, much like that burrito from taco bell.
Check out this link [dalantech.com] for differences between the three.
Re:Why portscanning must be illegal. (Score:2)
Re:Why portscanning must be illegal. (Score:2)
Usernames and Passwords are used when a specific subset of the *public* need to connect to publicly accessable computers. Connecting to a public network and expecting *not* to get portscanned or *not* to get connected to is just stupid.
-- iCEBaLM
Re:Why portscanning must be illegal. (Score:2)
-- iCEBaLM
Re:Why portscanning must be illegal. (Score:2)
Okay, suppose someone passes such a law. How the hell is the law going to be enforced?
On the defensive side, you really have no idea whether the host you're being scanned from is really where the packets are coming from, so you could end up throwing your lawyers at host A whilst on host B the "real" scanner is laughing at your expense and looking for someone else to spoof.
On the offensive side, you could outlaw tools like nmap, to prevent people from scanning in the first place. If the lesson from DeCSS means anything, making nmap illegal will not hinder anyone's access to it, except people who have a legitimate need to use such tools.
You could license use of scanning tools, e.g. to "Certified Systems Administrators," but that won't slow down the black hats any (see above), and just make the life of a sysadmin more difficult.
Laws against portscanning would be unenforcable; time better spent securing systems so they don't get cracked in the first place, and leveraging existing laws against the people who *do* break into systems.
Bad analogy (Score:3)
The first could be used in the sense of "casing the joint," but it could also be a case of looking at the architecture of the houses on the block without the owners' permission. It may make some people uncomfortable, but it's hardly illegal. A port scan is the closest thing to a look-but-don't -touch on the Net today.
If port scanning is found to be illegal, would a bare ping to see if a site is up and running be made illegal in the future as well? Beware the slippery-slope. We need to make sure that there is a difference in law between commiting a crime and having the potential to commit a crime.
If a script kiddie starts trying known exploits against your box, THAT should be seen as a crime. They are totally trying the vents to see if it's loose so that they can gain access. This is a clear, distinct, and unambiguous step beyond a port scan.
Circumvention of Public Policy (Score:2)
The RIAA and MPAA were tremendously well-protected under the Copyright Act, without more. But that was not enough. Dissatisfied with the existing provisions of the Act, carefully negotiated by careful balancing of public policies, they went for the raw power-grab, and obtained rights in gross through the MPAA, making it a crime and actionable to circumvent copyright protection technology, even when the technology circumvention does not give rise to an infringement.
Likewise with trademarks, the AntiCybersquatting Act and trademark dilution.
Likewise here, with the proposed "don't peek" provisions. Again, the Congress carefully drafted (well, its a mess, but its what they gave us) the Computer Fraud and Abuse Act and the Electronic Communications Protection Act, with all its powers and limitations, to prevent certain kinds, but not all kinds, of hackery. Congress expressly limited de minimus impositions costing less than $5,000 per year, such as pings, from the CFAA, precisely to protect overreaching machine-owners and, if you will, "to permit the spice to flow" as internet technologies develop.
But the powers that be are always seeking yet another way. We no longer need the CFAA, with all of its policy-balancing limitations and exceptions. Instead, let's just make it illegal to ping, if I'm powerful enough to sue your patents off, and watch you squirm under the power of my legal sledgehammer.
This is, simply put, the wrong thing to do. If we are going to empower people to protect legitimate interests, we must carefully carve out the abuse of that power to protect other interests; and make it cost the nasty plaintiffs when they lose.
I do not condone computer crime, and portscanning is a blight upon mine eyes. But we shouldn't make it criminal or actionable when it doesn't rise to the level of meaningful denial of service, and we should wait until a computer crime is actually committed before we go after someone for a computer crime.
Otherwise, we simply empower the powerful to prey upon the weak. That will always happen, of course as a force of nature -- but we needn't write it into the law.
It is time to STOP changing the law to circumvent public policy, just to appease the few powerful enough to lobby the Congress. Yes, this sounds good, and the argument of the article, while not persuasive, cannot be ignored without reasoned comment. But it is bad for the net, and it is bad for America. We don't need to arrest woeful pingers, just because it would facilitate catching a few real bad guys who are otherwise slipping through the cracks.
That's too much and not enough good law.
Re:Prop. "Ammendment XXVIII to the U.S. Constituti (Score:3)
----
Re:Why portscanning must be illegal. (Score:2)
You have got to be kidding me. Every hack starts with a portscan. When you say "looking" what you really mean is "casing the joint". You are walking around my house and trying to figure out how best to break in. What possible legitemate reason do YOU have for portscanning? If you want to know if I have FTP services for you ask me, better yet presume that it's not there becuase I did not tell you about it. If I wanted you to access my computer via FTP I would have let you know.
Also It's one thing wonder about wheather or not I have an FTP server and it's another to scan every single port on my machine. What is your justification for that?
I tell people to use portsentry. That way they can immediately blackhole anybody who does a portscan. Anybody who does a portscan is doing it because they want to hack your system. There is no other reason to do one.
Re:Why portscanning must be illegal. (Score:2)
Re:Why portscanning must be illegal. (Score:2)
Be honest. People running portscans are doing it because they want to hack your machine.
Re:Why portscanning must be illegal. (Score:2)
Re:Why portscanning must be legal. (Score:2)
Here is a novel idea.
Presume that there is no public services unless you have been told about them by the people who own the server. They are not obligated to provide you with anything. If a service is not advertised or nobody told you about it why are you looking for it?
Re:Bad analogy (Score:2)
BTW if you are in some neighborhood and are going around houses and taking pictures (you are logging your portscan right?) and such people will call the police. The police might take you downtown and have a talk with you. If you are able convince them that you are simply studying architecture then they'll probably let you go. If they don't buy it they will tell you to move along and file a report.
I just want the same right. If I see you portscan me I want to be able to call the police.
Re:Port scan is checking doors/windows/air ducts/. (Score:2)
Nevertheless this could get you arrested. If you actually walk in then it's breaking and entering. Trying the door is actually trespassing because at that moment you are in my property. It could be argued that the minute you leave the sidewalk you are tresspassing in my property. The analog of that might be that the minute you probe a port without an advertised service you are a criminal.
Re:Search Engines ? (Score:2)
Re:Search Engines ? (Score:2)
the only persons who have a good reason to scan are me and ony persons that I give specific permission to. Everybody else is doing it because they are trying to see if they can hack into my system.
Re:Technical measures (Score:2)
The problem is that even though you may be relatively responsible person there are bound to be security hacks that you don't know about. The burden should not be on me. IT should be on the person doing the breaking and entering. You can't just say but you should have changed your lock, it was known for three days that this skeleton key was in circulation.
Re:Why portscanning must be illegal. (Score:2)
Portsentry listens on ports you tell it to and when it detects a scan it can immediately run an ipchains rule to blakhole your ip address.
Re:Why portscanning must be illegal. (Score:2)
"And what about the suggestion that portscans should be used to verify the security claims of ISPs before subscribing."
Simple. Call up the ISP and ask for permission to do a portscan. If they don't let you move, on to another one.
Re:Why portscanning must be illegal. (Score:2)
Just as internal employees are punished severely if caught so should the portscanners and the hackers.
Oh BTW are you seriously suggesting that crackers don't start with a nmap first thing? They just let loose with an attack on a random port without first checking to see if that port is available?
Re:Why portscanning must be illegal. (Score:2)
Hackers will attack your system via exploits that may not be known to you or even to the general public. There is always some delay between a hack being discovered and being published and fixed. So that "necessary" port may be sitting duck for a buffer exploit and you don't even know it yet. Also any hacker anywhere in the world can DOS you with off the shelf kits and there is nothing you can do about it.
I will restate. Anybody who is doing a portscan of your system is most probably looking to crack it. Maybe one or two percent of portscans are accidents or legitamate but the vast majority of them are people who are looking to take over your machine and commit crimes. If you detect a portscan you can be 99% sure the person who just portscanned you was looking to see they could break in. They have criminal intent.
Re:Why portscanning must be legal. (Score:2)
The days of leaving your server open to mail relay, rpc etc are long gone and will never come back thanks to the legion of script kiddies who have nothing to do but crack other machines and launch DDOS attacks against anybody they want to.
So no you may NOT presume that I am giving you something. You may NOT presume that any service I have on my machine is for you. Do not try to connect to my machine unless you know there is a service there AND have been told so via advertising, links, email, phone or otherwise that you are welcome it.
It's my machine and you keep your hands off it.
You have no reason to port scan me. NONE. If you are port scanning me it can only mean you mean to crack it.
Re:Bad analogy (Score:2)
BTW apparantly you are not able to grasp the difference between the INTENT of a DHCP server or client (set up by me) to probe a specific port and the INTENT of a script kiddie to scan every port on every system on your network.
Yes I agree though it's all in the INTENT.
Re:Bad analogy (Score:2)
You just want to commit crimes without the police getting in your face about it, so you whine about abuse of power. The real abuse of power is some script kiddie running a DDOS just because they can, or cracking into some system just because it's fun. Some people have no conscience and others are able to justify any destructive act they may have committed with pseudo political rants. We just put one of those guys in the grave today (McVeigh in case you never leave your computer) and I hope we put all the script kiddies in their place too. Behind bars.
Re:Search Engines ? (Score:2)
Re:Search Engines ? (Score:2)
Re:Why portscanning must be illegal. (Score:2)
First of all a tool that is used 99% of the time in criminal activity and 1% of the time in non criminal activity will be either illegal or highly regulated. All kinds of chemicals and drugs fall under this classification. You can't go into a drug store and buy heroin but a doctor can prescribe it for you. They are not illegal to have but require licensing, registration etc. In the real world it's not all or nothing.
There is no reason why something like that can not be set up to prevent hackers from portscanning your machine.
Re:Why portscanning must be legal. (Score:2)
Re:Bad analogy (Score:2)
If people portscanned you and then moved it's because they saw nothing interesting. If you had a vulnaribility they would have stopped and rooted you. Good job. Just hope that one day some snot nosed kid isn't going to find out about some vulnaribility before you do.
Re:Bad analogy (Score:2)
Re:Why portscanning must be illegal. (Score:2)
Re:Bad analogy (Score:2)
Is that so hard to understand? Why do you feel like you should be able to do whatever you want to my machine? What other property gives you this kind of a right?
Re:Why portscanning must be illegal. (Score:2)
Re:Why portscanning must be illegal. (Score:2)
Port scaning is tresspassing pure and simple. It matters not what your intention is or weather I have IPchains rules to stop you. BTW even if I do have firewall rules you are still eating up my bandwidth and my CPU cyles and my hard drive space by port scanning me.
In america property rights are very vigorously defended. Using other peoples property without permission is illegal in most cases and will one day be illegal in this case too. It's just a matter of time for technology to catch up so it can be enforced. Hopefully IPv6 will take us a huge step in that direction and I can't wait.
Re:Why portscanning must be illegal. (Score:2)
Even intangible things like ideas, concepts, songs, plans, etc are considered property and have legal status of ownership. Furthermore the port exists only because a machine exists. That machine is mine, the post is on the machine and therefore the port is mine.
Even if you don't do "damage" I can argue that your portscan cost me money. It cost me money because you used my bandwidth, it cost me money becuase you used my CPU cycles, it cost me money because you used my hard drive space and it cost me money because I had to analyze that log to try and see it you were up to no good. It cost me tangible money and tangible time. Even if each portscan cost me five or ten dollars it adds up ove the lifespan of the machine. I suppose I could ignore my logs but that too would cost me even more money in the long run.
Re:Why portscanning must be illegal. (Score:2)
I really don't think you can actually try and argue that a port does not exist. If it does not exist why are you scanning it? what are you scanning? Even in the one in a billion chance that a judge actually bought that argument you can not argue that the bandwidth you took up didn't exist, that my CPU didn't exist, my hard drive didn't exist or that my time didn't exists. In other words the damage you caused was real no matter how ethereal or "unreal" the port was.
Re:Why portscanning must be legal. (Score:2)
Without portscanning, how do you find out what services a host provides to the public? A website is not the answer, because there's no obligation for a host to set up an HTTP server just because they want to offer IRC. See purple.com [purple.com] for an example of this.
------
Re:Why portscanning must be legal. (Score:2)
There's no reason why I should have to phone 30 WSPs prior to scanning a public interface.
------
Re:Why portscanning must be legal. (Score:2)
------
Re:Why portscanning must be legal. (Score:2)
------
Re:Why portscanning must be legal. (Score:2)
------
Re:Why portscanning must be legal. (Score:2)
------
Why portscanning must be legal. (Score:5)
Should you be deprived of the right to examine the quality of a service before buying it, especially when it wouldn't fall under "theft of services"? I think not.
------
The Physical Property Metaphor (Score:3)
Re:The nature of law (Score:3)
And if law were more like open source, it would be better?! Don't get me wrong... open source is fine for open source but not necessarily for law.
Imagine a system of law in which each person could set up their own government, a system of rules to which nobody else had to conform or comply. Imagine the few most popular standards were only useable by the legislators and legal pundits for twenty or thirty years while the bugs were worked out. The general public wouldn't have the understanding to try any of the several governing distributions by themselves, so they'd have to rely on more experienced people to set up their systems. Over the years, hot contentions would organize blocs of specialists who fought for only one or two standards, even though the underlying system was still supposedly a free-to-be-an-individual system.
Hm, the more I look at it, the US government resembles open source, too.
Huh? (Score:3)
Re:Search Engines ? (Score:3)
Eliza Jones, her daughter was distraught when we attempted to contact her. `She's such a sweet old lady, Why would anyone want to hurt her?'
When asked what she was doing on the neighbor's house, she only said she did not know. "She is very old, and her memory's not as good as before. She could have just wandered into the wrong house."
Further queries as to why Malcontent could not recognise his own neighbor was asked. "I don't know - the fellow keeps to himself, his house and windows all locked all the time. He's very secretive. I remember a year ago, when little Annie from down the street ran to his house, after having falled down a tree and getting cut. She asked him for a bandaid, and he growled something about not presuming to offer bandaids. He is a very sullen and nasty fellow."
Who is this Malcontent, and why did he commity this atricious act? Rumor as it that as POlice dragged him away, he was shouting something about a trespassing upon a private driveway. But that is an unconfirmed rumor, and as yet, we have idea of why exactly was going on through the mind of this unprovoked killing.
A law journal article on Slashdot? (Score:4)
Only the article doesn't actually say that. (Score:4)
I view port scanning as analogous to door knocking (Score:3)
After reading through much of the article, I still fail to see how scanning a host's ports is any different from knocking on that host's various doors and windows, seeing if anybody's home, or giving that host's various telephone lines a ring. If you don't want people coming through a doorway, lock the door.
If the right to portscan is overturned, how will a potential customer be able to discover whether or not the owner of a given host has given permission to connect via HTTP, FTP, SMTP, etc.?
Technical measures (Score:3)
2 problems:
(1)Lack of security is an excuse to break in. If someone leaves the root password unset on a machine, or leaves off the security on their web server, the above would say it is legal to access whatever you want on that system - whether it is meant to be private or even if one is explicitly told it is private.
Imagine the prosecutor letting someone who robbed you go free because you "didn't take precautions" (e.g. left personal belongs for a second, etc).
(2) It legitimizes making technical measures have the force of law. If I (as an private citizen) have the technical ability to stop you from entering a public park, should you get arrested for going there anywhere? Heck no. In fact, I wouldn't be allowed to even use technical measures to stop you. That is why the DMCA is so bad. Copyright is limited by fair use - fair use activities are not trespass, they are more like entering a public easement on a property where such is allowed by law. If I as a property owner in the real world block access to an easement (try to build a wall on a road crossing my property), not only do people not get arrested for breaking down/circumventing/destroying the wall, I'll get arrested for building it.
The DMCA turns that common sense notion upside down - the wall builder is ALWAYS right, the others are ALWAYS criminal.
That article seems to feed that thinking.
I am not a lawyer, but I understand common sense - which puts me above most of Congress.
Wow (Score:4)
Tell me what makes you so afraid
Of all those people you say you hate
Re:Why portscanning must be illegal. (Score:3)
Or, to put it another way, since you're going to have to secure your systems anyway, why bother trying to make something illegal that actually might have a useful purpose once in a while?
Why portscanning must be illegal. (Score:5)
Portscanning should be considered a crime.
Take a Law Course? (Score:3)
A long time programming friend of mine mentioned that the most useful courses he took outside of the programming course were a business law course, just to cover the basics of things like this, and a business accounting course, just to get his mind wrapped around modelling what bean counters were doing in the first place.
You would think with all of the legal issues running around, technical types could spend time just to get a toe wet, and get some familiarity with the concepts. It seems very much worth it.
Check out the Vinny the Vampire [eplugz.com] comic strip
Port scan is checking doors/windows/air ducts/... (Score:5)
I see port scanning as crawling around someone's house rattling doorknobs, windows, mailboxes, air ducts, rooftop hatches, basement doors, garage doors, electric panel doors, gas valves, water valves, sewer vent lines, outdoor outlets, chimney openings, stove vents. Trying all 256 codes on RF X-10 modules, using a frequency counter/scanner to check for and listen in on radio transmissions, ringing phone lines, ringing doorbells, seeing if you can turn on sprinklers/water faucets, etc.
Would you have no problem with someone doing all that? That's a port scan.
"Ringing a doorbell" is a single probe on port 80. "Ring a telephone" is a single probe on port 23. Don't bullshit yourself.
Re:Port scan is checking doors/windows/air ducts/. (Score:3)
Then you need better glasses.
Your list of metaphorical intrusions and indignities doesn't leave anything to analogize for actual attacks.
You're not going to be able to map the full cycle of casing, analysis, attack, and penetration to the burglary story unless you pace yourself a little.
Remember perspective, it's a wonderful thing.
Good news (Score:3)
Yes those Windows users might not aware as the netbios port scanning is being done automatically. However, they must take responsible for booting up their netbios port scanning OS which annoy their honest Linux neighbours.
Re:this is true (Score:4)
Practical benefits like this one should be MUCH more important than simply protecting 'liberty."
Please don't take this as a flame, but this is the same kind of flawed thinking that leads to things like anti-gun laws.
It is an extremely FALSE assumption that merly outlawing portscans will somehow reduce breaking into systems, DOS attacks, etc. Last time I checked, THOSE activities were already illegal.
To have any HOPE of effectiveness, you'd have to outlaw portscanning utilities. And give that law enough teeth to allow the stormtroopers (police) the ability to "find out who has them".
Portscanners have very PRACTICAL and good purposes you know, such as, me, as a sysadmin can use one to make sure the ports I wanted closed ARE closed... To ban portscans and portscanning means more systems will be left open and vulnerable!
Please think about the implications before so quickly giving up a liberty for the (false) promise of government guaranteed safety.
Here is the best quote on this subject:
"They that can give up essential liberty to obtain a little temporary safety deserve neither liberty nor safety."
-- Benjamin Franklin, Historical Review of Pennsylvania, 1759.
Questions..... (Score:5)
D/\ Gooberguy