backbone transparent proxy / connection hijacking

Tom Perrine tep at SDSC.EDU
Fri Jun 26 00:11:38 UTC 1998


>>>>> The moving finger of Karl Denninger, having written:

    Karl> Well, I'd love to know where they think they get the authority to do this
    Karl> from in the first place.... that is, absent active consent.

    Karl> I'd be looking over contracts and talking to counsel if someone tried this
    Karl> with transit connections that I was involved in.  Hijacking a connection
    Karl> without knowledge and consent might even run afoul of some kind of tampering
    Karl> or wiretapping statute (read: big trouble).....

Hmmm,

Title 18, Chapter 119 - Wire and Electronic Communications Interception...
      Sec 2511

Title 18, Chapter 1030 does not appear to apply.

Standard disclaimers *do*, however apply :-)  See .sig for details.

-- 
Tom E. Perrine (tep at SDSC.EDU) | San Diego Supercomputer Center 
http://www.sdsc.edu/~tep/     | Voice: +1.619.534.5000
Been there, done that, erased the evidence, blackmailed the witnesses...



More information about the NANOG mailing list