← Back to context

Comment by jawns

7 months ago

Is there any legal exposure possible?

Like, a legitimate crawler suing you and alleging that you broke something of theirs?

Disclosure: IANAL

The CFAA[1] prohibits:

> knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;

As far as I can tell (again, IANAL) there isn't an exception if you believe said computer is actively attempting to abuse your system[2]. I'm not sure if a zip bomb would constitute intentional damage, but it is at least close enough to the line that I wouldn't feel comfortable risking it.

[1]: https://www.law.cornell.edu/uscode/text/18/1030

[2]: And of course, you might make a mistake and incorrectly serve this to legitimate traffic.

  • I don't believe the client counts as a protected computer because they initiated the connection. Also a protected computer is a very specific definition that involves banking and/or commerce and/or the government.

    • Part B of the definition of "protected computer" says:

      > which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States

      Assuming the server is running in the states, I think that would apply unless the client is in the same state as the server, in which case there is probably similar state law that comes into affect. I don't see anything there that excludes a client, and that makes sense, because otherwise it wouldn't prohibit having a site that tricks people into downloading malware.

      5 replies →

    • A protected computer is "a computer which is protected by this law", which is most American computers, not a special class of American computers. The only reason it's not all American computers is that the US federal government doesn't have full jurisdiction over the US. They wrote the definition of "protected computer" to include all the computers they have jurisdiction over.

      In particular, the interstate commerce clause is very over-reaching. It's been ruled that someone who grew their own crops to feed to their own farm animals sold locally was conducting interstate commerce because they didn't have to buy them from another state.

  • Just put a "by connecting to this service, you agree to and authorize…" at the front of the zipbomb.

    (I'm half-joking, half-crying. It's how everything else works, basically. Why would it not work here? You could even go as far as explicitly calling it a "zipbomb test delivery service". It's not your fault those bots have no understanding what they're connecting to…)

  • So the trick is to disguise it as an accident. Have the zip bomb look like a real HTML file at the beginning, then have zeroes after that, like it got corrupted.

    • well, what does "damage" mean in that law? filling the disk isn't destructive. filling RAM isn't destructive. there's nothing in a zip-bomb approach that is destructive; a reboot or an `rm` (at most) undoes it all. I would say that this doesn't qualify as a destructive operation in any way.

      IANAL

  • There is IMO no legal use case for an external computer system to initiate a connection with my system without prior legal agreement. It all happens on good will and therefore can be terminated at any time.

    • So you can hack any browser that connects to your website because they dont have a legal agreement with you? Dont think that will work as a defense

  • There is IMO no legal use case for an external computer system to initiate a connection with my system without prior legal agreement. It all happens on good will.

Just crossed my mind that perhaps lots of bot traffic is coming from botnets of unaware victims who downloaded a shitty game or similar, orchestrated by a malicious C&C server somewhere else. (There was a post about this type of malware recently.) Now, if you crash the victims machine, it’s complicated at least ethically, if not legally.

  • Though ethically it might be a good thing to shut down their infected computer, instead of keeping it running.

Please, just as a conversational piece, walk me through the potentials you might think there are ?

I'll play the side of the defender and you can play the "bot"/bot deployer.

  • Well creating a bot is not per se illegal, so assuming the maliciousness-detector on the server isn’t perfect, it could serve the zip bomb to a legitimate bot. And I don’t think it’s crazy that serving zip bombs with the stated intent to sabotage the client would be illegal. But I’m not a lawyer, of course.

    • Disclosure, I'm not a lawyer either. This is all hypothetical high level discussion here.

      > it could serve the zip bomb to a legitimate bot.

      Can you define the difference between a legitimate bot, and a non legitimate bot for me ?

      The OP didn't mention it, but if we can assume they have SOME form of robots.txt (safe assumtion given their history), would those bots who ignored the robots be considered legitimate/non-legitimate ?

      Almost final question, and I know we're not lawyers here, but is there any precedent in case law or anywhere, which defines a 'bad bot' in the eyes of the law ?

      Final final question, as a bot, do you believe you have a right or a privilege to scrape a website ?

      1 reply →

  • Mantrapping is a fairly good analogy, and that's very illegal. If the person reading your gas meter gets caught in your mantrap, you're going to prison. You're probably going to prison if somebody burglarizing you gets caught in your mantrap.

    https://en.wikipedia.org/wiki/Mantrap_(snare)

    Of course their computers will live, but if you accidentally take down your own ISP or maybe some third-party service that you use for something, I'd think they would sue you.

  • Anyone can sue anyone for anything and the side with the most money is most likely to prevail.

Though anyone can sue anyone, not doing X is the simplest thing that might avoid being sued for doing X.

But if it matters pay your lawyer and if it doesn’t matter, it doesn’t matter.

>User-agent: *

>Disallow: /zipbomb.html

Legitimate crawlers would skip it this way only scum ignores robots.txt

  • I’m not sure that’s enough, robots.txt isn’t really legally binding so if the zip bomb somehow would be illegal, guarding it behind a robots.txt rule probably wouldn’t make it fine.

    • > robots.txt isn’t really legally binding

      Neither is the HTTP specification. Nothing is stopping you from running a Gopher server on TCP port 80, should you get into trouble if it happens to crash a particular crawler?

      Making a HTTP request on a random server is like uttering a sentence to a random person in a city: some can be helpful, some may tell you to piss off and some might shank you. If you don't like the latter, then maybe don't go around screaming nonsense loudly to strangers in an unmarked area.

      6 replies →

    • Has any similar case been tried? I'd think that a judge learning the intent of robots.txt and disallow rules is fairly likely to be sympathetic. Seems like it could go either way, I mean. (Jury is probably more a crap-shoot.)

    • Who, running a crawler which violates robots.txt, is going to prosecute/sue the server owner?

      The server owner can make an easy case to the jury that it is a booby trap to defend against trespassers.

      3 replies →

    • The law generally rewards good faith attempts, and robots.txt is an established commercial standard.