backbone transparent proxy / connection hijacking
Tom Perrine
tep at SDSC.EDU
Fri Jun 26 00:11:38 UTC 1998
>>>>> The moving finger of Karl Denninger, having written:
Karl> Well, I'd love to know where they think they get the authority to do this
Karl> from in the first place.... that is, absent active consent.
Karl> I'd be looking over contracts and talking to counsel if someone tried this
Karl> with transit connections that I was involved in. Hijacking a connection
Karl> without knowledge and consent might even run afoul of some kind of tampering
Karl> or wiretapping statute (read: big trouble).....
Hmmm,
Title 18, Chapter 119 - Wire and Electronic Communications Interception...
Sec 2511
Title 18, Chapter 1030 does not appear to apply.
Standard disclaimers *do*, however apply :-) See .sig for details.
--
Tom E. Perrine (tep at SDSC.EDU) | San Diego Supercomputer Center
http://www.sdsc.edu/~tep/ | Voice: +1.619.534.5000
Been there, done that, erased the evidence, blackmailed the witnesses...
More information about the NANOG
mailing list