IP spoofing and spamming

Jeremy Porter jerry at fc.net
Wed Oct 29 17:50:41 UTC 1997

In message < at max.ibm.net.il>, Hank Nussbacher wri
>At 07:34 PM 10/28/97 -0600, Karl Denninger wrote:
>>The Internet works because people don't abuse other's resources.  If people
>>abuse my resources, I stop allowing the abuse.  If they threaten to sue, I
>>laugh and tell them to go right ahead.  We write our contracts so that we 
>>can shut off people who spam, even on the first offense.  
>I would be interested in seeing a copy of that contract.  When suits
>(lawyers) get involved, how do you show that a violation has happened?
>Remember, no complaint has come to you and you would have had to sniff his
>line and open his smtp pkts to see he was spamming which would invoke a

We reserve the right to monitor our network for operation issues, and
spoofed IP addressses are a well understood secureity risk, and I would like
to think that everyone monitors and blocks spoofed address whenever they
The ECPA offers some protection from monitoring, but it specifically allows
it for maintaning the systems.  I'm not 100% sure that the ECPA (US only, btw,
so it probably doesn't help you), applies, but I think there is a good 
basis for it applying.

Jeremy Porter, Freeside Communications, Inc.      jerry at fc.net
PO BOX 80315 Austin, Tx 78708  |  1-800-968-8750  |  512-458-9810

More information about the NANOG mailing list