Not a bad idea.

On 6/16/2015 5:05 PM, Dennis Burgess wrote:
Would not let someone with a -90 even connect :)

Dennis Burgess, CTO, Link Technologies, Inc.
[email protected] - 314-735-0270 - www.linktechs.net

-----Original Message-----
From: Af [mailto:[email protected]] On Behalf Of Adam Moffett
Sent: Tuesday, June 16, 2015 3:49 PM
To: [email protected]
Subject: Re: [AFMUG] vehicle tracking systems and open WiFi hotspot

I have not seen the UA_ hostnames, but wifi hotspots in public places will pick 
up tons of phones and tablets and whoozits that are just passing by.  The only 
action I would take is to be even more aggressive on the lease time.  A 10 
minute lease will not hurt anybody.

On 6/16/2015 4:27 PM, Ken Hohhof wrote:
Fast food franchise at tollway oasis had us set up an open guest
hotspot as a Virtual AP on their Mikrotik, and we see random WiFi
connections and DHCP leases for MAC addresses starting with 00:16:A4
and hostnames starting with UA followed by a bunch of numbers.  The
WiFi signal is always low, around -90.

Doing some research on the web, I think this may be due to vehicle
tracking systems,  I'm not sure if these are vehicles in the parking
lot or whizzing by on the tollroad.  Also not sure if they are from
the vehicle or the intermodal container it is carrying.

I'm not sure it is a big problem, we have the DHCP lease time set to
30 minutes.

Has anyone else run into this, and if so, did you take any action?  I
guess we could block connections from those MAC addresses, or maybe
set a higher signal threshold to connect.  Or maybe we should just let
them check their location or call the mothership or whatever they do.

BTW, don't say this is a DOS attack trying to exhaust the DHCP leases,
they dribble in 1 or at most 2 at a time.  If we had the DHCP leases
set to 30 days, it could be a problem unless we expanded the pool.


Reply via email to