[NTLUG:Discuss] OT: What constitutes unauthorized access?

Kelledin kelledin+NTLUG at skarpsey.dyndns.org
Sat Jun 21 15:13:44 CDT 2003


On Saturday 21 June 2003 11:00 am, Richard Geoffrion wrote:
> If a service is started on a port and is accessible without a
> password..and that service is then put on the 'public'
> internet...is that an open invitation for public access?
>
> Does someone have to NOTIFY you of their don't access beyond
> this point boundery?

In many cases, yes.  If I were to allow directory listings on my 
web server and accidentally post, say, pics of my 18+ GF doing 
amateur pr0n, I'm in no position to tell someone, "you shouldn't 
have looked at that!"  She might be angry, granted, but she's in 
a position to be angry with _me_, not the people gaping at the 
pics. ;)

> How does that 'jive' with the idea of unauthorized access to
> my mail server for the expressed purpose of sending spam?? 
> Are spammers trespassing into MY system by sending
> unauthorized spam?  Are spammers terrorists??

I would say the main sticking points here are "reasonable 
measures for protection" and what constitutes "private 
property."  If your neighbor disrobes on her front lawn, it's 
not really "bad" for you to watch (although the Pope might 
disagree).  If she disrobes behind a dumpster in an alleyway, 
it's not illegal to catch a peek (hey, she doesn't own the space 
behind the dumpster), but it's certainly not very nice.  If she 
disrobes in her bedroom with the shades closed, it's definitely 
wrong (and illegal) for you to go peeking through the shades.

It's generally accepted that the Internet (and anything hosted on 
the Internet) isn't really "private property," unless 
restrictions like auth passwords are in place.  IMO it's 
accepted that someone's "C:\" drive is private property, even if 
he stupidly shares it out via SMB/NetBIOS without a 
password--this is because Windows has been known to stupidly 
share it out without the user knowing.  The user would kind of 
surrender the "private property" status by sharing it out via 
HTTP with directory listing permissions, though, due to the 
"reasonable measures" sticking point.

To go further, take the case of portscanning.  Portscanning isn't 
really illegal, because it's just checking what someone else has 
declared or left open.  It's like looking at your neighbor's 
house to see what doors and windows it has, without necessarily 
trying to enter those doors or break through those windows.  
Portscanning is, however, bad netiquette (and thus may be 
against your ISP's acceptable usage policy).  If you use nmap's 
output to find and exploit a security hole, OTOH, then you're 
breaking the law.

Using or abusing open relays is a fine line.  You have to keep in 
mind that at one time, open SMTP relays were the norm, before 
spammers started abusing them.  Now, though, it's so easy not to 
run an open relay, so easy to check if you are, and really so 
unnecessary to run one, that having one open kind of blows your 
case based on the "reasonable measures" bit.  That doesn't make 
it polite for spammers to send spam through an open relay--but 
keep in mind, we hate spammers because of their goals, not the 
means by which they achieve said goals.

-- 
Kelledin
"If a server crashes in a server farm and no one pings it, does 
it still cost four figures to fix?"



More information about the Discuss mailing list