> -Original Message-
> From: Jeff Bankston [mailto:[EMAIL PROTECTED]
> Sent: Friday, August 01, 2003 8:04 AM
> To: [EMAIL PROTECTED]
> Subject: Re: [Full-Disclosure] CounterAttack
>
> Phil, I have to echo the other comments, because sometimes
> your return fi
bout it.
-Jeff
- Original Message -
From: "Dolbow, Phil" <[EMAIL PROTECTED]>
Newsgroups: Security.Full-Disclosure
To: "'Andy Wood'" <[EMAIL PROTECTED]>;
<[EMAIL PROTECTED]>
Sent: Thursday, July 31, 2003 8:52 PM
Subject: RE: [Full-Disclosure] CounterAttack
Hello,
Dolbow, Phil wrote:
> If your network is PROBED by another system, where do you draw your
> line?
the same where s/PROBED/ATTACKED - in my opinion a probe is a prelude to
further attacks and therefore I can see no difference. (Sometimes the
difficulty is to decide: Is this a probe or not?
Andy et al..
Being of military (Infantry) origin I am quite prone to want to take
the offensive and fire back at a high rate of fire on a system that
is assaulting mine. I don't however do so as then I become one of the
bad guys, and in my opinion, step over the line.
I am interested though what