> nope.. not illegal per se...
This answer *sounds* far more definitive than it is. There are
jurisdictions where the local "computer crime" statute refers only to
*damage* (modelled on commercial tort law), and there are
jurisdictions where it is instead modelled on *trespassing* law.
It may very well be a violation of policy on the target network, in
which case their firewall *should* be configured to block it.
Whether it is blocked or not, it may be detected and reported to your
local network's administrators, and if it is also a violation of
local policy you may lose your access privileges.
You must decide whether the risk is worth it.
> > Oh so it isn't a fixed route?
> > If multiple paths how does the packet know which route to take?
Parts of it -- even perhaps all of it -- *might* be fixed, but any
fixed portions will be blocked if a single device goes down. Routers
out in the Internet "cloud" tend to be configured to share
information about what links are up/down, and sometimes also about
traffic loads, and choose where to send packets next based on this
information.
EVEN if the routing is static ("fixed"), it is not unusual to find
that the route that packets are currently taking from A to B is
*different* from how they get from B to A -- sometimes radically so.
If A and B are on two different ISPs that don't currently have a
common peering point, they must traverse some other backbone ISP, and
this choice may be made differently depending on the origin ISP of
the packet....
David Gillett
On 9 Jun 2001, at 2:21, Alvin Oga wrote:
>
> hi ya
>
> nope.. not illegal per se...
>
> scanning for info on their network is usually a precurser
> to hacking....so some folks dont take scannng lightly..
>
> the internet dynamically figures out which is the best way to get
> to the other end of your connection
> ( "ifconfig" cost options )
>
> - sometimes it "stupidly" passing info from west coast
> to east coast and back to west coat... but at least it works...
> c ya
> alvin
>
>
> On Sat, 9 Jun 2001, Zachary Uram wrote:
>
> > On Fri, 8 Jun 2001, Alvin Oga wrote:
> > >
> > > run nmap on those ip# to get more info ... and be ready
> > > for nasty messages from them ....
> >
> > Hi Alvin!
> >
> > Ah so is it illegal to run nmap on a given src address?
> >
> > > next time you run the traceroute ...you might get a different list of
> > > machines .... thats when the fun starts
> >
> > Oh so it isn't a fixed route?
> > If multiple paths how does the packet know which route to take?
> >
> > SDG,
> > Zach
> >
> > [EMAIL PROTECTED]
> > "Blessed are those who have not seen and yet have faith." - John 20:29
> >
>
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
>
-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]