[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: all.net



More ALL.NET spew, hit D now if you don't care.

A user of system, or something triggered the initial email to our
postmaster account here at DHP.  I replied with a rewording of the
message, as seen below.  This resulted in Fred Cohen deciding that I was
part a huge consipiracy to invade his computer system and decided that
CERT needed to get in on the mailings.  Based on the services available
via ALL.NET's web page, I find this quite funny, so I replied to both CERT
and his provider, PSI.  Please be sure to check out the provided URL's 
available at ALL.NET.

My included response to CERT and , including all previous email in quoted 
form.

 -Matt     ([email protected])                         DI-1-9026
 "That which can never be enforced should not be prohibited."
 
-----------------------------------------Cut Here or hit D Now-------------
>From [email protected] Mar 13 11:50:26 1996
Date: Mon, 11 Mar 1996 02:35:24 -0500 (EST)
From: Matt 'Panzer Boy' <[email protected]>
To: [email protected], [email protected]
Cc: [email protected], [email protected]
Subject: Re: [email protected] (fwd)

This administrator at all.net (I assume the whois information is true) is 
making unwarrented threats and accusations.  These threats and warnings 
coming from a site that offers to do port scans on any host via a web 
interface is quite absurd.
References:
 "http://all.net/tests/testsuite.html" For a description of what they do
 "http://all.net/tests/one-time-test.html" To actually try it out

 -Matt     ([email protected])                         DI-1-9026

---------- Forwarded message ----------
Date: Sat, 9 Mar 1996 16:16:33 -0500 (EST)
From: Fred Cohen <[email protected]>
To: [email protected]
Cc: [email protected]
Subject: Re: [email protected] (fwd)

The systems administrator at the following site is apparently a party to
the attmpted entry to our site reported below.  What is the procedure for
contacting federal authorities to investigate attempted breakins to
Federal Interest Computers?

Forwarded message:
> From [email protected] Sat Mar  9 16:11:03 1996
> Date: Sat, 9 Mar 1996 16:11:57 -0500 (EST)
> From: DHP Administrator <[email protected]>
> To: root <[email protected]>
> Subject: Re: [email protected]
> In-Reply-To: <[email protected]>
> Message-Id: <[email protected]>
> Mime-Version: 1.0
> Content-Type: TEXT/PLAIN; charset=US-ASCII
> 
> On Sat, 9 Mar 1996, root wrote:
> > A user at your site has just attempted to telnet into our site without
> > proper authorization.  We consider this inappropriate behavior and would
> > like an explanation of this action as soon as possible. 
> > 
> > This message is generated automatically at the time of the attempted
> > entry and is sent to our administrators and the postmaster at the
> > machine making the attempt.  We have included any information provided
> > by your ident daemon (if in use) on the subject line of this message. 
> > We also do a reverse finger for future reference. 
> > 
> > Fred Cohen - [email protected] - tel:US+216-686-0090
> 
> A user at your site has just attempted to finger into our site without 
> proper authorization.  We consider this inappropriate behavior and would 
> like an explanation of this action as soon as possible.
> 
> Please refrain from such a waste of bandwidth in the future.  Setting 
> alarms off with a telnet is both stupid, and most likely to get people in 
> trouble for no proper reason.
> 
>  -Matt ([email protected])
> 
> 
> 
> 
> 
> 

-> See: Info-Sec Heaven at URL http://all.net/
Management Analytics - 216-686-0090 - PO Box 1480, Hudson, OH 44236





-- 
 -Matt     ([email protected])                         DI-1-9026
 "That which can never be enforced should not be prohibited."