> nope.. not illegal per se...

  This answer *sounds* far more definitive than it is.  There are 
jurisdictions where the local "computer crime" statute refers only to 
*damage* (modelled on commercial tort law), and there are 
jurisdictions where it is instead modelled on *trespassing* law.
  It may very well be a violation of policy on the target network, in 
which case their firewall *should* be configured to block it.  
Whether it is blocked or not, it may be detected and reported to your 
local network's administrators, and if it is also a violation of 
local policy you may lose your access privileges.
  You must decide whether the risk is worth it.

> > Oh so it isn't a fixed route?
> > If multiple paths how does the packet know which route to take?

  Parts of it -- even perhaps all of it -- *might* be fixed, but any 
fixed portions will be blocked if a single device goes down.  Routers 
out in the Internet "cloud" tend to be configured to share 
information about what links are up/down, and sometimes also about 
traffic loads, and choose where to send packets next based on this 
information.
  EVEN if the routing is static ("fixed"), it is not unusual to find 
that the route that packets are currently taking from A to B is 
*different* from how they get from B to A -- sometimes radically so.  
If A and B are on two different ISPs that don't currently have a 
common peering point, they must traverse some other backbone ISP, and 
this choice may be made differently depending on the origin ISP of 
the packet....

David Gillett


On 9 Jun 2001, at 2:21, Alvin Oga wrote:

> 
> hi ya
> 
> nope.. not illegal per se...
> 
> scanning for info on their network is usually a precurser
> to hacking....so some folks dont take scannng lightly..
> 
> the internet dynamically figures out which is the best way to get
> to the other end of your connection
>       ( "ifconfig" cost options )
> 
>       - sometimes it "stupidly" passing info from west coast
>       to east coast and back to west coat... but at least it works...
> c ya
> alvin
> 
> 
> On Sat, 9 Jun 2001, Zachary Uram wrote:
> 
> > On Fri, 8 Jun 2001, Alvin Oga wrote:
> > > 
> > > run nmap on those ip# to get more info ... and be ready
> > > for nasty messages from them ....
> > 
> > Hi Alvin!
> > 
> > Ah so is it illegal to run nmap on a given src address?
> > 
> > > next time you run the traceroute ...you might get a different list of
> > > machines .... thats when the fun starts
> > 
> > Oh so it isn't a fixed route?
> > If multiple paths how does the packet know which route to take?
> > 
> > SDG,
> > Zach
> > 
> > [EMAIL PROTECTED]
> > "Blessed are those who have not seen and yet have faith." - John 20:29
> > 
> 
> -
> [To unsubscribe, send mail to [EMAIL PROTECTED] with
> "unsubscribe firewalls" in the body of the message.]
> 


-
[To unsubscribe, send mail to [EMAIL PROTECTED] with
"unsubscribe firewalls" in the body of the message.]

Reply via email to