Re: [SLUG] Son of a dog...

From: Pete Theisen (petet@acun.com)
Date: Thu Jul 21 2005 - 19:35:54 EDT


Mike Branda wrote:
<snip>
>
> Chuck, if you need log files, I can at least provide iptables DROP
> entries with source IP info. Most of these are probably compromised
> machines and not the hacker directly. If it's not enough (since no ssh
> session ever takes place), we have the resources to set up a honeypot

Hi Mike!

Have the courts been willing to accept honeypot logs as evidence? My
guess is that some judges would look upon it as entrapment. Of course
the bad guy's lawyer will try to get that sort of judge.

What if the honeypot had some small, almost expendable task to do, worth
something but not worth a lot? Then when the guy mucks around with it he
is really, really committing a crime? Just musing . . .

Regards,

Pete
-----------------------------------------------------------------------
This list is provided as an unmoderated internet service by Networked
Knowledge Systems (NKS). Views and opinions expressed in messages
posted are those of the author and do not necessarily reflect the
official policy or position of NKS or any of its employees.



This archive was generated by hypermail 2.1.3 : Fri Aug 01 2014 - 18:13:34 EDT