On Mon, 28 Jul 2014 21:38:37 +0100
Brian <a...@cityscape.co.uk> wrote:

> On Mon 28 Jul 2014 at 22:00:00 +0200, Slavko wrote:
> 
> > Dňa Mon, 28 Jul 2014 20:51:31 +0100 Brian <a...@cityscape.co.uk>
> > napísal:
> > 
> > > You never really answered my questiom. If you place something in a
> > > public place, a mailserver, for example, why should it be a
> > > criminal offence to look at it. If you did not want it to be seen
> > > you have the solution at hand.
> > 
> > Yes, i provided answer to you. I try it again: If is something in
> > public place, it doesn't mean, that anybody can do anything with it.
> 
> You are stating the obvious.
> 
> I'll try a more technical answer. Remember, you were of the opinion
> that using nmap could be a criminal offence in some countries (which
> you declined to name).
> 
> I will use my preferred email client (telnet) for this test.
> 
>   brian@desktop:~$ telnet mail.o2.co.uk 25
>   Trying 82.132.141.69...
>   Connected to mail.o2.co.uk.
>   Escape character is '^]'.
>   220 mail.o2.co.uk ESMTP Service ready
> 
> 
>   brian@desktop:~$ telnet mail.o2.co.uk 587
>   Trying 82.132.141.69...
>   telnet: Unable to connect to remote host: Connection timed out
> 
> 
> I also used another 40.000 ports.
> 
> Happpier with this?
> 
> Communication is one of the most basic human needs. Have I
> transgressed its boundaries?
> 
> 

Not as far as it goes. I occasionally use telnet to a mail server to
check an email address is valid. That's a legitimate SMTP function to
use anonymously, and many email clients use it to verify an address
while you're composing an email. But if you got a reply on 587 and then
tried guessing user names and passwords, knowing you didn't have an
account there, I think you would be attempting to gain unauthorised
access to a computer system, which is an offence in some countries.

And SMTP and HTTP are protocols normally accessed anonymously, as FTP
can be. Other protocols, such as SSH and RDP are never accessible
anonymously, they always require an account on the server, and it could
be argued that any connection attempts to such ports were 'attempting
to gain...' Also, the use of malformed connection packets can sometimes
gain access to vulnerabilities in servers, and such behaviour would
seem to fall foul of the definition. nmap can certainly be used to
try to identify the OS in use by a server, and perhaps try to see
some details of the network behind the firewall, which again would not
seem to be legitimate things to do. It's not clear cut, but some
behaviours would appear to be legitimate, and some not.

-- 
Joe


--
To UNSUBSCRIBE, email to debian-user-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org
Archive: https://lists.debian.org/20140728230432.01a73...@jretrading.com

Reply via email to