...
首页> 外文期刊>Journal of internet law >Internet Vulnerability Scanning-Is It Lawful?
【24h】

Internet Vulnerability Scanning-Is It Lawful?

机译:互联网漏洞扫描-是否合法?

获取原文
获取原文并翻译 | 示例
   

获取外文期刊封面封底 >>

       

摘要

Applying these rules to the two major vulnerabilities of 2014 suggests where the boundary between lawful and unlawful scanning may fall. The ability of a host to perform NTP amplification can be tested by sending it a single, normal, Network Time Protocol command. Furthermore because NTP runs over the Unreliable Datagram Protocol (UDP), it is not possible to determine whether or not the NTP service is present without sending it a command, so there is no way that a scanner can "know at the time" of sending its first command that it is unauthorized. Provided the scanning packets are not sent at a rate that risks impairing the performance of a system or network, the activity appears unlikely to break the Computer Misuse Act 1990. By contrast the Heartbleed vulnerability affects the Secure Sockets Layer (SSL) protocol. Because this runs over the Transmission Control Protocol (TCP) the presence or absence of the service can be determined without sending an SSL command. If a TCP connection request succeeds then the scanner can use normal SSL commands to determine whether the heartbeat option is supported and, in some cases, whether the system is running a software version likely to be vulnerable. To this point, scanning should be implicitly authorized by the availability of the service and therefore lawful under the Computer Misuse Act. However testing whether the vulnerability actually is present requires an abnormal request so is likely to fall outside the implicit authorization; it may also involve a foreseeable risk of crashing the service.
机译:将这些规则应用于2014年的两个主要漏洞表明,合法扫描和非法扫描之间的界限可能会落在哪里。可以通过向主机发送单个正常的网络时间协议命令来测试主机执行NTP放大的能力。此外,由于NTP运行在不可靠数据报协议(UDP)上,因此如果不发送命令就无法确定NTP服务是否存在,因此扫描程序无法“知道”发送时间它的第一个命令是未经授权的。如果未以可能损害系统或网络性能的速率发送扫描数据包,则该活动似乎不太可能破坏1990年《计算机滥用法案》。相反,Heartbleed漏洞会影响安全套接字层(SSL)协议。因为它运行在传输控制协议(TCP)上,所以无需发送SSL命令就可以确定服务的存在与否。如果TCP连接请求成功,则扫描程序可以使用常规SSL命令来确定是否支持心跳选项,并且在某些情况下,系统是否正在运行可能容易受到攻击的软件版本。为此,应根据服务的可用性暗中授权扫描,因此根据《计算机滥用法》是合法的。但是,测试是否确实存在漏洞需要异常请求,因此很可能不在隐式授权范围内;它还可能会导致服务崩溃的可预见风险。

著录项

  • 来源
    《Journal of internet law》 |2015年第9期|3-6|共4页
  • 作者

    Andrew Cormack;

  • 作者单位

    United Kingdom's National Research and Education Network Previously;

  • 收录信息
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号