Security Basics mailing list archives
RE: application for an employment
From: "Craig Wright" <cwright () bdosyd com au>
Date: Mon, 3 Apr 2006 11:23:49 +1000
Hello Ansgar, You are failing to understand the distinction between illegal and criminal. The fact that you are not able to be charged or that there is not any enforceable action available does not stop an action being illegal. The fact that there is not a penal code associated with an action also does not make it legal. This is a condition associated with enforceability. As for reading up the articles, Ansgar - I have. I have formal training in EU law and International commercial law. You? In the case where a party to the treaty (i.e. a nation) has not ratified the legislation the court has to approach the International court of justice for directions. These directions are binding under the treaty. In reference to; "It does for at least the public facing pages." does not refer to public facing servers. In no way is it valid to argue that the external interface of a VPN concentrator is available for public use. My legal training may be English (and Australian), but the EU treaty is the same. As far as the conditions associated with the ratification of the conventions is concerned it does not matter that you are German, English etc. You are also taking the document as face value without looking to the related data needed to interpret it. You asked what EM is, "EM" is Explanatory Memorandum. From this you will note that "A port scan is not punishable under the Penal Code. For an explanation, please refer to Chapter 4 of this manual" This means that the act is not to be treated as criminal. This does not make the act unactionable as a civil violation or and administrative offence. This is that it is still illegal, but only actionable if there is resultant damage. Again - illegal and criminal are not the same. Trying to treat them as such is wrong. Criminal is a subset of illegal. Illegal is the superset. You also forget that many sites use publicly routed addressing behind a firewall. So attempting to scan these is an attempt to scan a protected device. To conclude, this is not as far as I have been concerned a private conversation. At no point have you stated that it was to me. It is a thread from a list, started on a list. Unless you state it to be private and off the list I will not assume that this is the manner of the communication. In this I have received messages that have been BCC'd to the list from yourself. I do not wish to ascertain your thoughts, so unless you state the conversation to be private and I agree to this, I will assume that it is not. This is not a communication started in a private manner. Regards Craig -----Original Message----- From: Ansgar -59cobalt- Wiechers [mailto:bugtraq () planetcobalt net] Sent: 3 April 2006 10:43 To: Craig Wright Cc: security-basics () securityfocus com Subject: Re: application for an employment On 2006-04-03 Craig Wright wrote:
I don't know why you are taking a private conversation back on-list, but so be it.As I am having the same conversation with multiple people on and off the list it is simpler to have it on the list.
Then I suggest you ask for permission to do so first, because dragging private communication into public is not only offensive but may be considered an actual offense under german jurisdiction (the BGH already decided on this, see Az. I ZR 211/53).
In particular; Article 6: Misuse of devices/possession and misuse of
systems and tools that are suitable for carrying out an action as in
Article 2-5.You obviously fail to understand that for these articles to apply I have to actually do something illegitimate. However, contrary to your
belief using a portscanner to find out what services a host provides,
or even using an open relay to send out mail (as long as it's not spam, but this is covered by other laws), is NOT illegal.Actually, you fail to comprehend that these are being setup as strict liability offenses. This is similar to how a parking ticket is strict liability as a simplistic way of explaining the concept. Just as you do not need to have intent to get a parking ticket - you do not need intent for the A 2.5 issues.
Wrong. Each of the articles 2 through 5 and also article 6 *expressly* state "when committed intentionally". Read it up. And the discussed matter is still not subject to these laws, because all of them require that either the action was illegal to begin with or that at least some actual damage was done. The former is not the case and the latter is not subject to this discussion, no matter how often you try to bring it in.
No. This is exactly the point where you are wrong. I do have the right to access a host without getting explicit permission beforehand, so these laws simply don't apply.EM paragraphs 47-48, 58, 62, 68 and 77
What is "EM" supposed to mean? The european convention on cyber-crime has only 48 articles, and I fail to see what other document you might be referring to by that abbreviation.
also make clear that the use of such tools for the purpose of security
testing authorized by the system owner is not a crime. You are not the
system owner or as a member of the public authorised.
As long as they say nothing about a general prohibit it doesn't matter in which cases they are expressly allowed. That's just examples.
However, what service a host on the Internet is running, does in no way qualify as privacy-related data.Actually it can and generally does -
No. If you really believe so, you are misinterpreting the term privacy as it is used in the BDSG. privacy-related data are data that can be associated with a person (like address, date of birth, license number, medical records, etc.). The term does not generally refer to all data that may be considered private.
just as a system has some public facing pages does not make it all public information.
It does for at least the public facing pages. [ Article 6 snipped ]
Article 5 - transmitting data without right that causes harm. If the port scanner intentionally or not causes a system to reboot for whatever reason, then there is an offence. What you feel, like want - irrelevant.
This is NOT what article 5 says. You may want to make a reality-check: | Article 5 - System interference | | Each Party shall adopt such legislative and other measures as may be | necessary to establish as criminal offences under its domestic law, | when committed intentionally, the serious hindering without right of | the functioning of a computer system by inputting, transmitting, | damaging, deleting, deteriorating, altering or suppressing computer | data. You'll note that contrary to your belief the article actually does say that intent is a required precondition. You'll also note, that the article talks about "serious hindering". Whether a single reboot would qualify as such is arguable. And I already said from the beginning that one in fact may be held liable for causing damage, even if it was done unintentionally. However, this does by no means imply that the action leading to the damage was illegal to begin with. Regards Ansgar Wiechers -- "All vulnerabilities deserve a public fear period prior to patches becoming available." --Jason Coombs on Bugtraq Liability limited by a scheme approved under Professional Standards Legislation in respect of matters arising within those States and Territories of Australia where such legislation exists. DISCLAIMER The information contained in this email and any attachments is confidential. If you are not the intended recipient, you must not use or disclose the information. If you have received this email in error, please inform us promptly by reply email or by telephoning +61 2 9286 5555. Please delete the email and destroy any printed copy. Any views expressed in this message are those of the individual sender. You may not rely on this message as advice unless it has been electronically signed by a Partner of BDO or it is subsequently confirmed by letter or fax signed by a Partner of BDO. BDO accepts no liability for any damage caused by this email or its attachments due to viruses, interference, interception, corruption or unauthorised access. --------------------------------------------------------------------------- EARN A MASTER OF SCIENCE IN INFORMATION ASSURANCE - ONLINE The Norwich University program offers unparalleled Infosec management education and the case study affords you unmatched consulting experience. Tailor your education to your own professional goals with degree customizations including Emergency Management, Business Continuity Planning, Computer Emergency Response Teams, and Digital Investigations. http://www.msia.norwich.edu/secfocus ---------------------------------------------------------------------------
Current thread:
- RE: application for an employment Craig Wright (Apr 03)
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 03)
- Message not available
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 05)
- Message not available
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 03)
- <Possible follow-ups>
- RE: application for an employment David Gillett (Apr 03)
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 03)
- Re: application for an employment Anthony Ettinger (Apr 03)
- Re: RE: application for an employment cwright (Apr 03)
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 03)
- RE: application for an employment David Gillett (Apr 04)
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 04)
- Re: application for an employment D. Bolliger (Apr 05)
- Re: application for an employment Ansgar -59cobalt- Wiechers (Apr 03)