Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion

2006-12-31 Thread Mark Koskenmaki
My experience as well.The mount is wayyy to flimsy.

Equinox has some much heavier duty mounts which I hope to get my hands on in
a week or two.   They would fix that flimsy thing right up and make it quite
solid.

I have seen an example of one that wasn't for the grids, and they are
incredibly solid.



+++
neofast.net - fast internet for North East Oregon and South East Washington
email me at mark at neofast dot net
541-969-8200
Direct commercial inquiries to purchasing at neofast dot net

- Original Message - 
From: Tim Kerns [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Saturday, December 30, 2006 5:48 PM
Subject: Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion


 Mac,
 Have PacWireless made any changes to the mount on the 29db grids... I have
4
 in use and the mount isn't very solid. The grid deflects a lot in the
wind.
 I can watch the signal go up and down as it moves.
 Tim Kerns
 CV-Access, Inc.

 - Original Message - 
 From: Mac Dearman [EMAIL PROTECTED]
 To: 'WISPA General List' wireless@wispa.org
 Sent: Saturday, December 30, 2006 12:53 PM
 Subject: RE: [WISPA] 5.3/5.8 GHz Antenna Suggestion


 I do use their dishes where I have a large enough tower, water tower or a
  roof. I will tell ya though - - the 29dbi grids are mighty fine, much
less
  expensive than a solid dish, wind load is no comparison as well as the
  ease
  of mounting. If you are leasing tower space - - the grid is a no brainer
  unless you have to have the extra db that comes with a dish.
 
  Mac Dearman
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
  Behalf Of Mark Nash - Lists
  Sent: Saturday, December 30, 2006 2:28 PM
  To: WISPA General List
  Subject: Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion
 
  Are we preferring their grids to dishes?
 
  Mark Nash
  Network Engineer
  UnwiredOnline.Net
  350 Holly Street
  Junction City, OR 97448
  http://www.uwol.net
  541-998-
  541-998-5599 fax
  - Original Message - 
  From: Mac Dearman [EMAIL PROTECTED]
  To: 'WISPA General List' wireless@wispa.org
  Sent: Saturday, December 30, 2006 12:18 PM
  Subject: RE: [WISPA] 5.3/5.8 GHz Antenna Suggestion
 
 
  Mark,
 
   I have several 8 mile 5.3GHz links (YMMV) using PacWireless 26dbi
grids,
  MT  CM9's. IMHO you can't go wrong using the PacWireless antennas. I
  have
  built a wireless network that covers 12% of Louisiana utilizing their
  antennas exclusively for my BH. Well - I do have several of the Trango
  dual
  polarity ext's.
 
  Mac Dearman
 
  -Original Message-
  From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
  Behalf Of Mark Nash - Lists
  Sent: Saturday, December 30, 2006 1:12 PM
  To: WISPA General List
  Subject: [WISPA] 5.3/5.8 GHz Antenna Suggestion
 
  I have usually used Trango backhauls, so I have not had to worry about
5
  GHz
 
  antennas and what to choose.  Now I'm going to try a MikroTik backhaul
  with
  a CM9.  Currently, I've got two applications:
 
  1. 2-mile link that I can perhaps use 5.3GHz over.
 
  2. 8-mile link that I'll go 5.8GHz over.
 
  What antennas have you used to accomplish links such as these...
 
  Also, kI have heard that the output power of the CM9 in a MikroTik can
be
  adjusted.  Experience?
 
  Mark Nash
  Network Engineer
  UnwiredOnline.Net
  350 Holly Street
  Junction City, OR 97448
  http://www.uwol.net
  541-998-
  541-998-5599 fax
 
 
 
  -- 
  WISPA Wireless List: wireless@wispa.org
 
  Subscribe/Unsubscribe:
  http://lists.wispa.org/mailman/listinfo/wireless
 
  Archives: http://lists.wispa.org/pipermail/wireless/
 
  -- 
  WISPA Wireless List: wireless@wispa.org
 
  Subscribe/Unsubscribe:
  http://lists.wispa.org/mailman/listinfo/wireless
 
  Archives: http://lists.wispa.org/pipermail/wireless/
 
 
 
 
  -- 
  WISPA Wireless List: wireless@wispa.org
 
  Subscribe/Unsubscribe:
  http://lists.wispa.org/mailman/listinfo/wireless
 
  Archives: http://lists.wispa.org/pipermail/wireless/
 
  -- 
  WISPA Wireless List: wireless@wispa.org
 
  Subscribe/Unsubscribe:
  http://lists.wispa.org/mailman/listinfo/wireless
 
  Archives: http://lists.wispa.org/pipermail/wireless/
 
 

 -- 
 WISPA Wireless List: wireless@wispa.org

 Subscribe/Unsubscribe:
 http://lists.wispa.org/mailman/listinfo/wireless

 Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] TRUCKPC

2006-12-31 Thread Ralph
Because they may have their data in a more timely and reliable fashion than
they get it by using casual access.
When I first got into WiFi, I saw that 80% of detected (broadcasting) access
points were fully open. Within a year, it dropped to 60%.  Now, several
years later it is well below 50%, and out in the more technically savvy
areas (just spent 4 months in Sillycon Valley) it is like 10% or less.
Consumers are finally getting more in tune with security. Or more
accurately, manufacturers are pushing security more heavily now.  A customer
had just better not  ever push that button on the front of a Linksys if they
don't know what they are doing (grin).
 
Remember- I am talking about consumers here- not what we as WISPS set up or
provide to them.
 
Ralph

  _  

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Travis Johnson
Sent: Sunday, December 31, 2006 12:46 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC


Hi,

Why would this company pay for WiFi access when they are now getting all the
access they need for free? It's actually a great idea... have the trucks
scan all the time and once they find an open AP, connect and upload all
their info.

Travis
Microserv

Ralph wrote: 

I was on the way to one of our remote towers today and was on the interstate

next to two US Express trucks.  I turned on a sniffer to see if they also

had access points on them, but there was nothing. I guess they just scan,

looking for free wireless to use.



Being bored with the drive, I was thinking about the TRUCKPC thing a lot and

had an idea to make some code changes to the mobile access point I have in

my vehicle. Its hooked up to a verizon card and I have a roving EVDO to WIFi

hot spot gateway.  ( see  http://ralphfowler.com/stompbox/index.htm ) I

could make a couple of code changes to allow the box to also sniff a bit and

see exactly what these things are doing when they find a free internet

connection.



I was also thinking that we, as an industry, could possibly cut a deal with

Drivertech to allow their customers to have access to our networks.  Of

course there would be a lot more to work out and I'm not the guy for that

job ;-)





Just some Saturday musings...











-Original Message-

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On

Behalf Of Matt Larsen - Lists

Sent: Saturday, December 30, 2006 1:16 AM

To: WISPA General List

Subject: Re: [WISPA] TRUCKPC



AHA



I've been wondering where the hell that TruckPC request has been coming

from!!



Occasionally, I have techs who have left the radius authentication disabled

on an access point and the dhcp logs will start to fill up with requests

from TruckPC.  They were coming from access points all over 

the place and I was a little perplexed.   It is interesting to watch our 

radius logs too.  I have one AP overlooking a little town of 200 people, but

it is right next to an interstate and the radius log from that AP is always

showing logins.  Must be all the trucker laptops whizzing by looking for an

open AP.



I've been toying with the idea of turning on hotspot functionality so that

we can provide transient access, and this is probably a good reason to do

it.



Matt Larsen

[EMAIL PROTECTED]





Ralph wrote:

  

Well, JohnnyO- you might want to also educate these people, then:

http://www.drivertech.com/



Their product, a Truckpc is being installed in many fleet vehicles. 

One fleet that comes to mind is US Express, a long haul package hauling



service

  

http://www.usxpress.com/   The device communicates back to the office via

Satellite, Cellular, or WiFi- whichever is available and cheaper.  

According to the manufacturer, it can hunt down open and unsecured 

access points and do your HIGHLY illegal act of connecting and 

sending its data whenever it can.



I'm not endorsing this behavior, of course, but I wanted to bring it 

to the attention of the list.



How do I know?   My WISP operates hotspot portals that allow casual users



to

  

make use of our mountain and tower-top sectors of WiFi.  These cover 

major portions of several towns.  These towns have a major Interstate 

route passing through them.  I began noticing numerous TRUCKPC leases 

being granted by the DHCP servers in these towns.  I became concerned 

about what they were, so I did a little internet research and ended up 

on the phone with technical support at Drivertech. This is who 

confirmed how these devices operate and who the probable fleet culprit



was.

  

If anyone has portals near major truck routes, check your DHCP logs 

and see if you see the TRUCKPC SSID grabbing leases. You may want to 

either block it or contact these folks and work out a roaming agreement.







Serious part over, joke follows:



This message brought to you by the World's largest free wireless 

internet provider. Look for our SSID wherever you go: Linksys.



Ralph



-Original Message-


[WISPA] Quick-Connect PoE at CPE

2006-12-31 Thread Mark Nash
George, awhile back I got from you a cat5 pigtail that had a quick-connect 
fitting on it.  I think I can use these for my Tranzeo CPEs if I bore out 
the hole in the boot of the CPE.  This could speed up installs  some 
troubleshooting as well, as we can disconnect the customer's PoE cable and 
plug into it directly from the inverter in my truck without taking off the 
boot and risking water problems.


How to you obtain these? and do you put on the pigtail portion of it or do 
they come terminated?


What are others doing for this?

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


[WISPA] What's everyone using for Bandwidth Management?

2006-12-31 Thread stout_jim
I've spent the past week working on getting my bandwidth management system
up and running.  I opted to go with PowerCode's product because it seemed to
be so comprehensive, but the documentation is less than adequate and I spend
a lot of time on the phone with their support staff trying to get some of
the fundamental functions to work.  With that said, I thought it would be
worth finding out what everyone else is using.
 
Thanks in advance, Jim

 

 
-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] What's everyone using for Bandwidth Management?

2006-12-31 Thread Matt Larsen - Lists

StarOS.

Jeremy Davis and I put together a module for Freeside that uploads 
bandwidth rules into a StarOS BW controller automatically.  It has made 
life a lot easier.


Matt Larsen
[EMAIL PROTECTED]


[EMAIL PROTECTED] wrote:

I've spent the past week working on getting my bandwidth management system
up and running.  I opted to go with PowerCode's product because it seemed to
be so comprehensive, but the documentation is less than adequate and I spend
a lot of time on the phone with their support staff trying to get some of
the fundamental functions to work.  With that said, I thought it would be
worth finding out what everyone else is using.
 
Thanks in advance, Jim


 

 
  


--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] TRUCKPC

2006-12-31 Thread Travis Johnson

Hi,

I would agree that the percentage of open AP's has dropped in the past 
few years. However, I still believe it's above 50%.


I just can't see a company that already has an operating, working system 
in place that is basically FREE for them changing to paying ISP's around 
the country for service. Doesn't make sense, other than what they are 
doing is illegal. :)


Travis


Ralph wrote:

Because they may have their data in a more timely and reliable fashion than
they get it by using casual access.
When I first got into WiFi, I saw that 80% of detected (broadcasting) access
points were fully open. Within a year, it dropped to 60%.  Now, several
years later it is well below 50%, and out in the more technically savvy
areas (just spent 4 months in Sillycon Valley) it is like 10% or less.
Consumers are finally getting more in tune with security. Or more
accurately, manufacturers are pushing security more heavily now.  A customer
had just better not  ever push that button on the front of a Linksys if they
don't know what they are doing (grin).
 
Remember- I am talking about consumers here- not what we as WISPS set up or

provide to them.
 
Ralph


  _  


From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Travis Johnson
Sent: Sunday, December 31, 2006 12:46 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC


Hi,

Why would this company pay for WiFi access when they are now getting all the
access they need for free? It's actually a great idea... have the trucks
scan all the time and once they find an open AP, connect and upload all
their info.

Travis
Microserv

Ralph wrote: 


I was on the way to one of our remote towers today and was on the interstate

next to two US Express trucks.  I turned on a sniffer to see if they also

had access points on them, but there was nothing. I guess they just scan,

looking for free wireless to use.



Being bored with the drive, I was thinking about the TRUCKPC thing a lot and

had an idea to make some code changes to the mobile access point I have in

my vehicle. Its hooked up to a verizon card and I have a roving EVDO to WIFi

hot spot gateway.  ( see  http://ralphfowler.com/stompbox/index.htm ) I

could make a couple of code changes to allow the box to also sniff a bit and

see exactly what these things are doing when they find a free internet

connection.



I was also thinking that we, as an industry, could possibly cut a deal with

Drivertech to allow their customers to have access to our networks.  Of

course there would be a lot more to work out and I'm not the guy for that

job ;-)





Just some Saturday musings...











-Original Message-

From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On

Behalf Of Matt Larsen - Lists

Sent: Saturday, December 30, 2006 1:16 AM

To: WISPA General List

Subject: Re: [WISPA] TRUCKPC



AHA



I've been wondering where the hell that TruckPC request has been coming

from!!



Occasionally, I have techs who have left the radius authentication disabled

on an access point and the dhcp logs will start to fill up with requests

from TruckPC.  They were coming from access points all over 

the place and I was a little perplexed.   It is interesting to watch our 


radius logs too.  I have one AP overlooking a little town of 200 people, but

it is right next to an interstate and the radius log from that AP is always

showing logins.  Must be all the trucker laptops whizzing by looking for an

open AP.



I've been toying with the idea of turning on hotspot functionality so that

we can provide transient access, and this is probably a good reason to do

it.



Matt Larsen

[EMAIL PROTECTED]





Ralph wrote:

  


Well, JohnnyO- you might want to also educate these people, then:

http://www.drivertech.com/



Their product, a Truckpc is being installed in many fleet vehicles. 


One fleet that comes to mind is US Express, a long haul package hauling




service

  


http://www.usxpress.com/   The device communicates back to the office via

Satellite, Cellular, or WiFi- whichever is available and cheaper.  

According to the manufacturer, it can hunt down open and unsecured 

access points and do your HIGHLY illegal act of connecting and 


sending its data whenever it can.



I'm not endorsing this behavior, of course, but I wanted to bring it 


to the attention of the list.



How do I know?   My WISP operates hotspot portals that allow casual users




to

  

make use of our mountain and tower-top sectors of WiFi.  These cover 

major portions of several towns.  These towns have a major Interstate 

route passing through them.  I began noticing numerous TRUCKPC leases 

being granted by the DHCP servers in these towns.  I became concerned 

about what they were, so I did a little internet research and ended up 

on the phone with technical support at Drivertech. This is who 


confirmed how these devices operate and who the probable fleet culprit




was.

  

If anyone has 

RE: [WISPA] 5.3/5.8 GHz Antenna Suggestion

2006-12-31 Thread chris cooper
 

Can you share the method you use to link them up so quickly over such a
distance?
 
Thanks
Chris





I have aligned 5.8ghz links up to 73 miles (and even a test link at 137
miles) within 5 minutes start to finish. Is it possible you have another
problem?





 
-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] 5.3/5.8 GHz Antenna Suggestion

2006-12-31 Thread Travis Johnson

Hi,

We use either a GPS at each side, or just bearing coordinates and a 
compass. I have aligned several links at 20+ miles only doing one side 
and then going to the other side and having a perfect signal. :)


And actually the longer the distance the easier it becomes... most 
5.8ghz dishes have around a 4 degree beamwidth... which means at 30 
miles is a much broader area than at 5 miles, thus easier to get inside 
that beam.


We aligned a 137 mile link (just for testing) within 10 minutes. ;)

Travis
Microserv

chris cooper wrote:
 


Can you share the method you use to link them up so quickly over such a
distance?
 
Thanks

Chris





I have aligned 5.8ghz links up to 73 miles (and even a test link at 137
miles) within 5 minutes start to finish. Is it possible you have another
problem?





 
  

--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

2006-12-31 Thread Rick Smith
yeah I can see 10 - 12 of them at any time off one of my towers.
I'm 1/2 mile from a sears garage where they repair those vans...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ralph
Sent: Saturday, December 30, 2006 11:11 PM
To: 'WISPA General List'
Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type 

Hi Matt-

Back in my old Net-Stumbler days (back when you could drive across Atlanta
and see less than 20 Access Points, and 2 were my own), the experimenters
of the day became perplexed by this SSID that kept popping up at random
times.  It was an Access Point named SST-PR-1  The first time I saw it, I
was in my basement and I knew full well what I could normally receive down
there.

There were all kinds of theories:  an AP on a low earth orbit satellite,
something on a passing vehicle, some sort of temporary SSID on a piece of
gear that just showed up right at bootup, etc.   Googling for SST-PR-1 might
actually turn up some of the old discussions about it.

Anyway- I started seeing it a lot in the evenings after they built some
apartments behind me.  I sent my son over there on his bike with a camera to
do some investigating.  He soon found a Sears Service truck (the ones with
the small Globalstar dish on top like you see on many semis) parked in front
of an apartment.  He went back with a laptop and traced the signal to this
van.  So we had it figured out- Sears truck.

A few days later, my son saw the driver coming home for the evening and the
driver gave him the dog and pony show of the truck computer.  It is linked
to Sears parts database via satellite. The SST-PR-1 is the SSID of an
integral access point that allows the driver to use a laptop from inside the
customer's home to check on parts, see service manuals, etc. The SST stands
for Sears Smart Toolbox. 

I once told a friend about it and he set up a laptop to warn him when the
Sears guy entered the neighborhood on his way to fix their refrigerator.  An
early warning system of sorts.

So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!

Ralph

 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Matt Larsen - Lists
Sent: Saturday, December 30, 2006 1:16 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

AHA

I've been wondering where the hell that TruckPC request has been coming
from!!

Occasionally, I have techs who have left the radius authentication disabled
on an access point and the dhcp logs will start to fill up with requests
from TruckPC.  They were coming from access points all over 
the place and I was a little perplexed.   It is interesting to watch our 
radius logs too.  I have one AP overlooking a little town of 200 people, but
it is right next to an interstate and the radius log from that AP is always
showing logins.  Must be all the trucker laptops whizzing by looking for an
open AP.

I've been toying with the idea of turning on hotspot functionality so that
we can provide transient access, and this is probably a good reason to do
it.

Matt Larsen
[EMAIL PROTECTED]


Ralph wrote:
 Well, JohnnyO- you might want to also educate these people, then:
 http://www.drivertech.com/

 Their product, a Truckpc is being installed in many fleet vehicles. 
 One fleet that comes to mind is US Express, a long haul package 
 hauling
service
 http://www.usxpress.com/   The device communicates back to the office via
 Satellite, Cellular, or WiFi- whichever is available and cheaper.  
 According to the manufacturer, it can hunt down open and unsecured 
 access points and do your HIGHLY illegal act of connecting and 
 sending its data whenever it can.

 I'm not endorsing this behavior, of course, but I wanted to bring it 
 to the attention of the list.

 How do I know?   My WISP operates hotspot portals that allow casual users
to
 make use of our mountain and tower-top sectors of WiFi.  These cover 
 major portions of several towns.  These towns have a major Interstate 
 route passing through them.  I began noticing numerous TRUCKPC leases 
 being granted by the DHCP servers in these towns.  I became concerned 
 about what they were, so I did a little internet research and ended up 
 on the phone with technical support at Drivertech. This is who 
 confirmed how these devices operate and who the probable fleet culprit
was.

 If anyone has portals near major truck routes, check your DHCP logs 
 and see if you see the TRUCKPC SSID grabbing leases. You may want to 
 either block it or contact these folks and work out a roaming agreement.



 Serious part over, joke follows:

 This message brought to you by the World's largest free wireless 
 internet provider. Look for our SSID wherever you go: Linksys.

 Ralph

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]
 On Behalf Of JohnnyO
 Sent: Friday, December 29, 2006 5:35 PM
 To: [EMAIL PROTECTED]; 'WISPA General List'
 Subject: RE: [WISPA] 

RE: [WISPA] TRUCKPC

2006-12-31 Thread Rick Smith
unless we ISPs all get together and lock up the wifi world for customers.

I've charged people $50 to go in and secure their stuff.  I could do it
for $20... ;)

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Travis Johnson
Sent: Sunday, December 31, 2006 1:04 PM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

Hi,

I would agree that the percentage of open AP's has dropped in the past few
years. However, I still believe it's above 50%.

I just can't see a company that already has an operating, working system in
place that is basically FREE for them changing to paying ISP's around the
country for service. Doesn't make sense, other than what they are doing is
illegal. :)

Travis


Ralph wrote:
 Because they may have their data in a more timely and reliable fashion 
 than they get it by using casual access.
 When I first got into WiFi, I saw that 80% of detected (broadcasting) 
 access points were fully open. Within a year, it dropped to 60%.  Now, 
 several years later it is well below 50%, and out in the more 
 technically savvy areas (just spent 4 months in Sillycon Valley) it is
like 10% or less.
 Consumers are finally getting more in tune with security. Or more 
 accurately, manufacturers are pushing security more heavily now.  A 
 customer had just better not  ever push that button on the front of a 
 Linksys if they don't know what they are doing (grin).
  
 Remember- I am talking about consumers here- not what we as WISPS set 
 up or provide to them.
  
 Ralph

   _

 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of Travis Johnson
 Sent: Sunday, December 31, 2006 12:46 AM
 To: WISPA General List
 Subject: Re: [WISPA] TRUCKPC


 Hi,

 Why would this company pay for WiFi access when they are now getting 
 all the access they need for free? It's actually a great idea... have 
 the trucks scan all the time and once they find an open AP, connect 
 and upload all their info.

 Travis
 Microserv

 Ralph wrote: 

 I was on the way to one of our remote towers today and was on the 
 interstate

 next to two US Express trucks.  I turned on a sniffer to see if they 
 also

 had access points on them, but there was nothing. I guess they just 
 scan,

 looking for free wireless to use.



 Being bored with the drive, I was thinking about the TRUCKPC thing a 
 lot and

 had an idea to make some code changes to the mobile access point I 
 have in

 my vehicle. Its hooked up to a verizon card and I have a roving EVDO 
 to WIFi

 hot spot gateway.  ( see  http://ralphfowler.com/stompbox/index.htm ) 
 I

 could make a couple of code changes to allow the box to also sniff a 
 bit and

 see exactly what these things are doing when they find a free internet

 connection.



 I was also thinking that we, as an industry, could possibly cut a deal 
 with

 Drivertech to allow their customers to have access to our networks.  
 Of

 course there would be a lot more to work out and I'm not the guy for 
 that

 job ;-)





 Just some Saturday musings...











 -Original Message-

 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On

 Behalf Of Matt Larsen - Lists

 Sent: Saturday, December 30, 2006 1:16 AM

 To: WISPA General List

 Subject: Re: [WISPA] TRUCKPC



 AHA



 I've been wondering where the hell that TruckPC request has been 
 coming

 from!!



 Occasionally, I have techs who have left the radius authentication 
 disabled

 on an access point and the dhcp logs will start to fill up with 
 requests

 from TruckPC.  They were coming from access points all over

 the place and I was a little perplexed.   It is interesting to watch our 

 radius logs too.  I have one AP overlooking a little town of 200 
 people, but

 it is right next to an interstate and the radius log from that AP is 
 always

 showing logins.  Must be all the trucker laptops whizzing by looking 
 for an

 open AP.



 I've been toying with the idea of turning on hotspot functionality so 
 that

 we can provide transient access, and this is probably a good reason to 
 do

 it.



 Matt Larsen

 [EMAIL PROTECTED]





 Ralph wrote:

   

 Well, JohnnyO- you might want to also educate these people, then:

 http://www.drivertech.com/



 Their product, a Truckpc is being installed in many fleet vehicles. 

 One fleet that comes to mind is US Express, a long haul package 
 hauling

 

 service

   

 http://www.usxpress.com/   The device communicates back to the office via

 Satellite, Cellular, or WiFi- whichever is available and cheaper.  

 According to the manufacturer, it can hunt down open and unsecured

 access points and do your HIGHLY illegal act of connecting and

 sending its data whenever it can.



 I'm not endorsing this behavior, of course, but I wanted to bring it

 to the attention of the list.



 How do I know?   My WISP operates hotspot portals that allow casual users

 

 to

   

 make use of our mountain and tower-top sectors of 

Re: [WISPA] recommendation for Client POE integrated radio for 802.11b/g

2006-12-31 Thread Pete Davis
The legality and ethics of using an open access point is questionable, 
but there is a liability issue as well. In most of the areas that I 
cover with my network, there is a strong signal with SSID of NoDial.
Connecting to this will get you a DHCP address even, without a WEP or 
other encryption key.
Until I know that you have connected and moved your mac address to a 
list that authorizes your connection, all of your outbound packets will 
be sent to http://64.123.108.28:80
This brings up a liability issue. If the emergency communication van 
tech wastes 2 hrs trying to get hold of me, get connected to the 
internet, or whatever, and $10M of houses burn down, because they 
couldn't get to the fire department via a hacked VOIP solution, then am 
I gonna get sued?
If they connect to my private home network that I intentionally left 
open, and my custom made uber-hacker passive/aggressive firewall 
unleashes a blackops virus that turns their laptops into bricks. Then what?


I guess, that by JohnnyO's example, if you come into my open door and 
try to visit with my wife, and you step on a rake that gives you a brain 
anurism, I guess that makes me guilty (or not guilty) of manslaughter. I 
lost score in this ballgame.


If the cops are in a pursuit in my neighborhood, and run their squad car 
off the road breaking the radio, and they want to use my home phone to 
call the office, I would let them. Not because I HAVE to, but to be a 
good citizen. If I HAD to, then the 4th amendment just went out the window.


pd



Jack Unger wrote:


Holy brainfade, JohnnyO.

Your comments about highly illegal just went STRAIGHT over my head.

What's illegal about Brian's emergency communications operation? Hams 
have been providing emergency communications services since (literally) 
the sinking of the Titanic.


jack


JohnnyO wrote:


Brian - Ham Operator or not - do you realize that what you're planning
on doing is HIGHLY illegal and has several people over the past 2 yrs in
Federal Prison as we speak ?

Why don't ya'll get a VSAT system that works well for VOIP ? The cost is
only about $60/mo more and you have no restrictions on bandwidth or
stupid filtering like Wild Blue does

JohnnyO

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Brian Webster
Sent: Friday, December 29, 2006 2:56 PM
To: WISPA List
Subject: [WISPA] recommendation for Client POE integrated radio for
802.11b/g

I'm looking for a good client radio to use in an emergency
communications
vehicle. My criteria are, POE, highest gain panel antenna possible,
scan/survey tool built in, web interface, 802.11b at minimum. I'm part
of a
ham radio emergency response group and we have our own comms van. I want
to
have a client radio that we can use on a push up mast to scan around for
an
open access point and grab bandwidth in an emergency on a scene. We
respond
with our county Hazmat team for support and the internet is handy. We
already have a Wild Blue setup and that will work when necessary but I
would
like to be able to use something with lower latency so we can implement
VOIP
at times. I have not studied the 802.11b outdoor client radios in a long
time and thought I would ask opinions here. Price is a consideration but
the
feature set is more important. Id' like to stay away from YDI/Proxim
just
because of their attitude on the phone whenever I have dealt with them.
If
any of you can point me to a link were I can purchase one that would be
great. Have a nice day.


Thank You,
Brian Webster
www.wirelessmapping.com





--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] What's everyone using for Bandwidth Management?

2006-12-31 Thread Dennis Burgess - 2K Wireless
MT

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of [EMAIL PROTECTED]
Sent: Sunday, December 31, 2006 11:54 AM
To: wireless@wispa.org
Subject: [WISPA] What's everyone using for Bandwidth Management?

I've spent the past week working on getting my bandwidth management system
up and running.  I opted to go with PowerCode's product because it seemed to
be so comprehensive, but the documentation is less than adequate and I spend
a lot of time on the phone with their support staff trying to get some of
the fundamental functions to work.  With that said, I thought it would be
worth finding out what everyone else is using.
 
Thanks in advance, Jim

 

 
-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] recommendation for Client POE integrated radio for 802.11b/g

2006-12-31 Thread Rick Smith
ah yes, but then you would've had a cop knock on the front door, 
and ASK your permission to use the phone.   At which point, you
COULD say NO! and shut the door on them.  Or, you could let them
in, and tell them OK! here it is!

BUT...They wouldn't do the equivalent of walking up to your NID, 
plugging a butt set in and just dialing away...

If I, right now, drove up in front of your house, got out of my truck,
walked up to your Network panel that Verizon or the local phone co.
put there as their demarcation point, and plugged my butt set in
and got dial tone and dialed Hawaii to chat with someone at YOUR
expense, I could be found / shot / arrested / sued / what have you.

What's different with WiFi ?  Nothing but the excuses we allow people
to continue to make.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Pete Davis
Sent: Sunday, December 31, 2006 3:11 PM
To: WISPA General List
Subject: Re: [WISPA] recommendation for Client POE integrated radio for
802.11b/g

The legality and ethics of using an open access point is questionable, but
there is a liability issue as well. In most of the areas that I cover with
my network, there is a strong signal with SSID of NoDial.
Connecting to this will get you a DHCP address even, without a WEP or other
encryption key.
Until I know that you have connected and moved your mac address to a list
that authorizes your connection, all of your outbound packets will be sent
to http://64.123.108.28:80 This brings up a liability issue. If the
emergency communication van tech wastes 2 hrs trying to get hold of me, get
connected to the internet, or whatever, and $10M of houses burn down,
because they couldn't get to the fire department via a hacked VOIP solution,
then am I gonna get sued?
If they connect to my private home network that I intentionally left open,
and my custom made uber-hacker passive/aggressive firewall unleashes a
blackops virus that turns their laptops into bricks. Then what?

I guess, that by JohnnyO's example, if you come into my open door and try to
visit with my wife, and you step on a rake that gives you a brain anurism, I
guess that makes me guilty (or not guilty) of manslaughter. I lost score in
this ballgame.

If the cops are in a pursuit in my neighborhood, and run their squad car off
the road breaking the radio, and they want to use my home phone to call the
office, I would let them. Not because I HAVE to, but to be a good citizen.
If I HAD to, then the 4th amendment just went out the window.

pd



Jack Unger wrote:
 
 Holy brainfade, JohnnyO.
 
 Your comments about highly illegal just went STRAIGHT over my head.
 
 What's illegal about Brian's emergency communications operation? Hams 
 have been providing emergency communications services since (literally) 
 the sinking of the Titanic.
 
 jack
 
 
 JohnnyO wrote:
 
 Brian - Ham Operator or not - do you realize that what you're planning
 on doing is HIGHLY illegal and has several people over the past 2 yrs in
 Federal Prison as we speak ?

 Why don't ya'll get a VSAT system that works well for VOIP ? The cost is
 only about $60/mo more and you have no restrictions on bandwidth or
 stupid filtering like Wild Blue does

 JohnnyO

 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
 Behalf Of Brian Webster
 Sent: Friday, December 29, 2006 2:56 PM
 To: WISPA List
 Subject: [WISPA] recommendation for Client POE integrated radio for
 802.11b/g

 I'm looking for a good client radio to use in an emergency
 communications
 vehicle. My criteria are, POE, highest gain panel antenna possible,
 scan/survey tool built in, web interface, 802.11b at minimum. I'm part
 of a
 ham radio emergency response group and we have our own comms van. I want
 to
 have a client radio that we can use on a push up mast to scan around for
 an
 open access point and grab bandwidth in an emergency on a scene. We
 respond
 with our county Hazmat team for support and the internet is handy. We
 already have a Wild Blue setup and that will work when necessary but I
 would
 like to be able to use something with lower latency so we can implement
 VOIP
 at times. I have not studied the 802.11b outdoor client radios in a long
 time and thought I would ask opinions here. Price is a consideration but
 the
 feature set is more important. Id' like to stay away from YDI/Proxim
 just
 because of their attitude on the phone whenever I have dealt with them.
 If
 any of you can point me to a link were I can purchase one that would be
 great. Have a nice day.


 Thank You,
 Brian Webster
 www.wirelessmapping.com

 

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/

-- 
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

2006-12-31 Thread Ralph
If they still operate as before, you shouldn't see them unless you set your
tower as a client/cpe.  I have never seen them do anything with an AP, other
than BE one.  Dis you know that was what the SST-PR-1 was before?


 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Rick Smith
Sent: Sunday, December 31, 2006 2:35 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

yeah I can see 10 - 12 of them at any time off one of my towers.
I'm 1/2 mile from a sears garage where they repair those vans...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ralph
Sent: Saturday, December 30, 2006 11:11 PM
To: 'WISPA General List'
Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type 

Hi Matt-

Back in my old Net-Stumbler days (back when you could drive across Atlanta
and see less than 20 Access Points, and 2 were my own), the experimenters
of the day became perplexed by this SSID that kept popping up at random
times.  It was an Access Point named SST-PR-1  The first time I saw it, I
was in my basement and I knew full well what I could normally receive down
there.

There were all kinds of theories:  an AP on a low earth orbit satellite,
something on a passing vehicle, some sort of temporary SSID on a piece of
gear that just showed up right at bootup, etc.   Googling for SST-PR-1 might
actually turn up some of the old discussions about it.

Anyway- I started seeing it a lot in the evenings after they built some
apartments behind me.  I sent my son over there on his bike with a camera to
do some investigating.  He soon found a Sears Service truck (the ones with
the small Globalstar dish on top like you see on many semis) parked in front
of an apartment.  He went back with a laptop and traced the signal to this
van.  So we had it figured out- Sears truck.

A few days later, my son saw the driver coming home for the evening and the
driver gave him the dog and pony show of the truck computer.  It is linked
to Sears parts database via satellite. The SST-PR-1 is the SSID of an
integral access point that allows the driver to use a laptop from inside the
customer's home to check on parts, see service manuals, etc. The SST stands
for Sears Smart Toolbox. 

I once told a friend about it and he set up a laptop to warn him when the
Sears guy entered the neighborhood on his way to fix their refrigerator.  An
early warning system of sorts.

So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!

Ralph

 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Matt Larsen - Lists
Sent: Saturday, December 30, 2006 1:16 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

AHA

I've been wondering where the hell that TruckPC request has been coming
from!!

Occasionally, I have techs who have left the radius authentication disabled
on an access point and the dhcp logs will start to fill up with requests
from TruckPC.  They were coming from access points all over 
the place and I was a little perplexed.   It is interesting to watch our 
radius logs too.  I have one AP overlooking a little town of 200 people, but
it is right next to an interstate and the radius log from that AP is always
showing logins.  Must be all the trucker laptops whizzing by looking for an
open AP.

I've been toying with the idea of turning on hotspot functionality so that
we can provide transient access, and this is probably a good reason to do
it.

Matt Larsen
[EMAIL PROTECTED]


Ralph wrote:
 Well, JohnnyO- you might want to also educate these people, then:
 http://www.drivertech.com/

 Their product, a Truckpc is being installed in many fleet vehicles. 
 One fleet that comes to mind is US Express, a long haul package 
 hauling
service
 http://www.usxpress.com/   The device communicates back to the office via
 Satellite, Cellular, or WiFi- whichever is available and cheaper.  
 According to the manufacturer, it can hunt down open and unsecured 
 access points and do your HIGHLY illegal act of connecting and 
 sending its data whenever it can.

 I'm not endorsing this behavior, of course, but I wanted to bring it 
 to the attention of the list.

 How do I know?   My WISP operates hotspot portals that allow casual users
to
 make use of our mountain and tower-top sectors of WiFi.  These cover 
 major portions of several towns.  These towns have a major Interstate 
 route passing through them.  I began noticing numerous TRUCKPC leases 
 being granted by the DHCP servers in these towns.  I became concerned 
 about what they were, so I did a little internet research and ended up 
 on the phone with technical support at Drivertech. This is who 
 confirmed how these devices operate and who the probable fleet culprit
was.

 If anyone has portals near major truck routes, check your DHCP logs 
 and see if you see the TRUCKPC SSID grabbing leases. You may want to 
 

RE: [WISPA] TRUCKPC

2006-12-31 Thread Ralph
I don't either. They were just thoughts I was having while driving on a long
trip and seeing their truck.
And you forgot to say HIGHLY illegal: g 

The Sillycon Valley has a pretty high percentage of Technically savvy users
so that probably accounts for the low percentage of unsecured points. Europe
is also leaps ahead of us in user awareness of this. 

Ralph


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Travis Johnson
Sent: Sunday, December 31, 2006 1:04 PM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

Hi,

I would agree that the percentage of open AP's has dropped in the past few
years. However, I still believe it's above 50%.

I just can't see a company that already has an operating, working system in
place that is basically FREE for them changing to paying ISP's around the
country for service. Doesn't make sense, other than what they are doing is
illegal. :)

Travis


Ralph wrote:
 Because they may have their data in a more timely and reliable fashion 
 than they get it by using casual access.
 When I first got into WiFi, I saw that 80% of detected (broadcasting) 
 access points were fully open. Within a year, it dropped to 60%.  Now, 
 several years later it is well below 50%, and out in the more 
 technically savvy areas (just spent 4 months in Sillycon Valley) it is
like 10% or less.
 Consumers are finally getting more in tune with security. Or more 
 accurately, manufacturers are pushing security more heavily now.  A 
 customer had just better not  ever push that button on the front of a 
 Linksys if they don't know what they are doing (grin).
  
 Remember- I am talking about consumers here- not what we as WISPS set 
 up or provide to them.
  
 Ralph

   _

 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of Travis Johnson
 Sent: Sunday, December 31, 2006 12:46 AM
 To: WISPA General List
 Subject: Re: [WISPA] TRUCKPC


 Hi,

 Why would this company pay for WiFi access when they are now getting 
 all the access they need for free? It's actually a great idea... have 
 the trucks scan all the time and once they find an open AP, connect 
 and upload all their info.

 Travis
 Microserv

 Ralph wrote: 

 I was on the way to one of our remote towers today and was on the 
 interstate

 next to two US Express trucks.  I turned on a sniffer to see if they 
 also

 had access points on them, but there was nothing. I guess they just 
 scan,

 looking for free wireless to use.



 Being bored with the drive, I was thinking about the TRUCKPC thing a 
 lot and

 had an idea to make some code changes to the mobile access point I 
 have in

 my vehicle. Its hooked up to a verizon card and I have a roving EVDO 
 to WIFi

 hot spot gateway.  ( see  http://ralphfowler.com/stompbox/index.htm ) 
 I

 could make a couple of code changes to allow the box to also sniff a 
 bit and

 see exactly what these things are doing when they find a free internet

 connection.



 I was also thinking that we, as an industry, could possibly cut a deal 
 with

 Drivertech to allow their customers to have access to our networks.  
 Of

 course there would be a lot more to work out and I'm not the guy for 
 that

 job ;-)





 Just some Saturday musings...











 -Original Message-

 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On

 Behalf Of Matt Larsen - Lists

 Sent: Saturday, December 30, 2006 1:16 AM

 To: WISPA General List

 Subject: Re: [WISPA] TRUCKPC



 AHA



 I've been wondering where the hell that TruckPC request has been 
 coming

 from!!



 Occasionally, I have techs who have left the radius authentication 
 disabled

 on an access point and the dhcp logs will start to fill up with 
 requests

 from TruckPC.  They were coming from access points all over

 the place and I was a little perplexed.   It is interesting to watch our 

 radius logs too.  I have one AP overlooking a little town of 200 
 people, but

 it is right next to an interstate and the radius log from that AP is 
 always

 showing logins.  Must be all the trucker laptops whizzing by looking 
 for an

 open AP.



 I've been toying with the idea of turning on hotspot functionality so 
 that

 we can provide transient access, and this is probably a good reason to 
 do

 it.



 Matt Larsen

 [EMAIL PROTECTED]





 Ralph wrote:

   

 Well, JohnnyO- you might want to also educate these people, then:

 http://www.drivertech.com/



 Their product, a Truckpc is being installed in many fleet vehicles. 

 One fleet that comes to mind is US Express, a long haul package 
 hauling

 

 service

   

 http://www.usxpress.com/   The device communicates back to the office via

 Satellite, Cellular, or WiFi- whichever is available and cheaper.  

 According to the manufacturer, it can hunt down open and unsecured

 access points and do your HIGHLY illegal act of connecting and

 sending its data whenever it can.



 I'm not endorsing this behavior, of course, but I 

RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

2006-12-31 Thread Rick Smith
nod, a scan on the AP shows them...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ralph
Sent: Sunday, December 31, 2006 4:23 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

If they still operate as before, you shouldn't see them unless you set your
tower as a client/cpe.  I have never seen them do anything with an AP, other
than BE one.  Dis you know that was what the SST-PR-1 was before?


 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Rick Smith
Sent: Sunday, December 31, 2006 2:35 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

yeah I can see 10 - 12 of them at any time off one of my towers.
I'm 1/2 mile from a sears garage where they repair those vans...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ralph
Sent: Saturday, December 30, 2006 11:11 PM
To: 'WISPA General List'
Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type 

Hi Matt-

Back in my old Net-Stumbler days (back when you could drive across Atlanta
and see less than 20 Access Points, and 2 were my own), the experimenters
of the day became perplexed by this SSID that kept popping up at random
times.  It was an Access Point named SST-PR-1  The first time I saw it, I
was in my basement and I knew full well what I could normally receive down
there.

There were all kinds of theories:  an AP on a low earth orbit satellite,
something on a passing vehicle, some sort of temporary SSID on a piece of
gear that just showed up right at bootup, etc.   Googling for SST-PR-1 might
actually turn up some of the old discussions about it.

Anyway- I started seeing it a lot in the evenings after they built some
apartments behind me.  I sent my son over there on his bike with a camera to
do some investigating.  He soon found a Sears Service truck (the ones with
the small Globalstar dish on top like you see on many semis) parked in front
of an apartment.  He went back with a laptop and traced the signal to this
van.  So we had it figured out- Sears truck.

A few days later, my son saw the driver coming home for the evening and the
driver gave him the dog and pony show of the truck computer.  It is linked
to Sears parts database via satellite. The SST-PR-1 is the SSID of an
integral access point that allows the driver to use a laptop from inside the
customer's home to check on parts, see service manuals, etc. The SST stands
for Sears Smart Toolbox. 

I once told a friend about it and he set up a laptop to warn him when the
Sears guy entered the neighborhood on his way to fix their refrigerator.  An
early warning system of sorts.

So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!

Ralph

 

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Matt Larsen - Lists
Sent: Saturday, December 30, 2006 1:16 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

AHA

I've been wondering where the hell that TruckPC request has been coming
from!!

Occasionally, I have techs who have left the radius authentication disabled
on an access point and the dhcp logs will start to fill up with requests
from TruckPC.  They were coming from access points all over 
the place and I was a little perplexed.   It is interesting to watch our 
radius logs too.  I have one AP overlooking a little town of 200 people, but
it is right next to an interstate and the radius log from that AP is always
showing logins.  Must be all the trucker laptops whizzing by looking for an
open AP.

I've been toying with the idea of turning on hotspot functionality so that
we can provide transient access, and this is probably a good reason to do
it.

Matt Larsen
[EMAIL PROTECTED]


Ralph wrote:
 Well, JohnnyO- you might want to also educate these people, then:
 http://www.drivertech.com/

 Their product, a Truckpc is being installed in many fleet vehicles. 
 One fleet that comes to mind is US Express, a long haul package 
 hauling
service
 http://www.usxpress.com/   The device communicates back to the office via
 Satellite, Cellular, or WiFi- whichever is available and cheaper.  
 According to the manufacturer, it can hunt down open and unsecured 
 access points and do your HIGHLY illegal act of connecting and 
 sending its data whenever it can.

 I'm not endorsing this behavior, of course, but I wanted to bring it 
 to the attention of the list.

 How do I know?   My WISP operates hotspot portals that allow casual users
to
 make use of our mountain and tower-top sectors of WiFi.  These cover 
 major portions of several towns.  These towns have a major Interstate 
 route passing through them.  I began noticing numerous TRUCKPC leases 
 being granted by the DHCP servers in these towns.  I became concerned 
 about what they were, so I did a little internet research and ended up 
 on the phone 

Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type

2006-12-31 Thread George Rogato

ad hoc mode?

Rick Smith wrote:

nod, a scan on the AP shows them...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ralph
Sent: Sunday, December 31, 2006 4:23 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

If they still operate as before, you shouldn't see them unless you set your
tower as a client/cpe.  I have never seen them do anything with an AP, other
than BE one.  Dis you know that was what the SST-PR-1 was before?


 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Rick Smith
Sent: Sunday, December 31, 2006 2:35 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

yeah I can see 10 - 12 of them at any time off one of my towers.
I'm 1/2 mile from a sears garage where they repair those vans...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Ralph
Sent: Saturday, December 30, 2006 11:11 PM
To: 'WISPA General List'
Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type 


Hi Matt-

Back in my old Net-Stumbler days (back when you could drive across Atlanta
and see less than 20 Access Points, and 2 were my own), the experimenters
of the day became perplexed by this SSID that kept popping up at random
times.  It was an Access Point named SST-PR-1  The first time I saw it, I
was in my basement and I knew full well what I could normally receive down
there.

There were all kinds of theories:  an AP on a low earth orbit satellite,
something on a passing vehicle, some sort of temporary SSID on a piece of
gear that just showed up right at bootup, etc.   Googling for SST-PR-1 might
actually turn up some of the old discussions about it.

Anyway- I started seeing it a lot in the evenings after they built some
apartments behind me.  I sent my son over there on his bike with a camera to
do some investigating.  He soon found a Sears Service truck (the ones with
the small Globalstar dish on top like you see on many semis) parked in front
of an apartment.  He went back with a laptop and traced the signal to this
van.  So we had it figured out- Sears truck.

A few days later, my son saw the driver coming home for the evening and the
driver gave him the dog and pony show of the truck computer.  It is linked
to Sears parts database via satellite. The SST-PR-1 is the SSID of an
integral access point that allows the driver to use a laptop from inside the
customer's home to check on parts, see service manuals, etc. The SST stands
for Sears Smart Toolbox. 


I once told a friend about it and he set up a laptop to warn him when the
Sears guy entered the neighborhood on his way to fix their refrigerator.  An
early warning system of sorts.

So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!

Ralph

 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of Matt Larsen - Lists
Sent: Saturday, December 30, 2006 1:16 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

AHA

I've been wondering where the hell that TruckPC request has been coming
from!!

Occasionally, I have techs who have left the radius authentication disabled
on an access point and the dhcp logs will start to fill up with requests
from TruckPC.  They were coming from access points all over 
the place and I was a little perplexed.   It is interesting to watch our 
radius logs too.  I have one AP overlooking a little town of 200 people, but

it is right next to an interstate and the radius log from that AP is always
showing logins.  Must be all the trucker laptops whizzing by looking for an
open AP.

I've been toying with the idea of turning on hotspot functionality so that
we can provide transient access, and this is probably a good reason to do
it.

Matt Larsen
[EMAIL PROTECTED]


Ralph wrote:

Well, JohnnyO- you might want to also educate these people, then:
http://www.drivertech.com/

Their product, a Truckpc is being installed in many fleet vehicles. 
One fleet that comes to mind is US Express, a long haul package 
hauling

service

http://www.usxpress.com/   The device communicates back to the office via
Satellite, Cellular, or WiFi- whichever is available and cheaper.  
According to the manufacturer, it can hunt down open and unsecured 
access points and do your HIGHLY illegal act of connecting and 
sending its data whenever it can.


I'm not endorsing this behavior, of course, but I wanted to bring it 
to the attention of the list.


How do I know?   My WISP operates hotspot portals that allow casual users

to
make use of our mountain and tower-top sectors of WiFi.  These cover 
major portions of several towns.  These towns have a major Interstate 
route passing through them.  I began noticing numerous TRUCKPC leases 
being granted by the DHCP servers in these towns.  I became concerned 
about what they were, so I did a little internet research 

RE: [WISPA] More Saturday Musings- Another (older) Truck-PC type

2006-12-31 Thread Rick Smith
no, mikrotik in this case, doing a 'scan' on the interface...shows their
ssid's in their trucks...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of George Rogato
Sent: Sunday, December 31, 2006 5:05 PM
To: WISPA General List
Subject: Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type

ad hoc mode?

Rick Smith wrote:
 nod, a scan on the AP shows them...
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of Ralph
 Sent: Sunday, December 31, 2006 4:23 PM
 To: 'WISPA General List'
 Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC 
 type
 
 If they still operate as before, you shouldn't see them unless you set 
 your tower as a client/cpe.  I have never seen them do anything with 
 an AP, other than BE one.  Dis you know that was what the SST-PR-1 was
before?
 
 
  
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of Rick Smith
 Sent: Sunday, December 31, 2006 2:35 PM
 To: 'WISPA General List'
 Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC 
 type
 
 yeah I can see 10 - 12 of them at any time off one of my towers.
 I'm 1/2 mile from a sears garage where they repair those vans...
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of Ralph
 Sent: Saturday, December 30, 2006 11:11 PM
 To: 'WISPA General List'
 Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type
 
 Hi Matt-
 
 Back in my old Net-Stumbler days (back when you could drive across 
 Atlanta and see less than 20 Access Points, and 2 were my own), the
experimenters
 of the day became perplexed by this SSID that kept popping up at 
 random times.  It was an Access Point named SST-PR-1  The first time 
 I saw it, I was in my basement and I knew full well what I could 
 normally receive down there.
 
 There were all kinds of theories:  an AP on a low earth orbit 
 satellite, something on a passing vehicle, some sort of temporary SSID on
a piece of
 gear that just showed up right at bootup, etc.   Googling for SST-PR-1
might
 actually turn up some of the old discussions about it.
 
 Anyway- I started seeing it a lot in the evenings after they built 
 some apartments behind me.  I sent my son over there on his bike with 
 a camera to do some investigating.  He soon found a Sears Service 
 truck (the ones with the small Globalstar dish on top like you see on 
 many semis) parked in front of an apartment.  He went back with a 
 laptop and traced the signal to this van.  So we had it figured out- Sears
truck.
 
 A few days later, my son saw the driver coming home for the evening 
 and the driver gave him the dog and pony show of the truck computer.  
 It is linked to Sears parts database via satellite. The SST-PR-1 is 
 the SSID of an integral access point that allows the driver to use a 
 laptop from inside the customer's home to check on parts, see service 
 manuals, etc. The SST stands for Sears Smart Toolbox.
 
 I once told a friend about it and he set up a laptop to warn him when 
 the Sears guy entered the neighborhood on his way to fix their 
 refrigerator.  An early warning system of sorts.
 
 So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!
 
 Ralph
 
  
 
 -Original Message-
 From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
 On Behalf Of Matt Larsen - Lists
 Sent: Saturday, December 30, 2006 1:16 AM
 To: WISPA General List
 Subject: Re: [WISPA] TRUCKPC
 
 AHA
 
 I've been wondering where the hell that TruckPC request has been 
 coming from!!
 
 Occasionally, I have techs who have left the radius authentication 
 disabled on an access point and the dhcp logs will start to fill up 
 with requests from TruckPC.  They were coming from access points all
over
 the place and I was a little perplexed.   It is interesting to watch our 
 radius logs too.  I have one AP overlooking a little town of 200 
 people, but it is right next to an interstate and the radius log from 
 that AP is always showing logins.  Must be all the trucker laptops 
 whizzing by looking for an open AP.
 
 I've been toying with the idea of turning on hotspot functionality so 
 that we can provide transient access, and this is probably a good 
 reason to do it.
 
 Matt Larsen
 [EMAIL PROTECTED]
 
 
 Ralph wrote:
 Well, JohnnyO- you might want to also educate these people, then:
 http://www.drivertech.com/

 Their product, a Truckpc is being installed in many fleet vehicles. 
 One fleet that comes to mind is US Express, a long haul package 
 hauling
 service
 http://www.usxpress.com/   The device communicates back to the office via
 Satellite, Cellular, or WiFi- whichever is available and cheaper.  
 According to the manufacturer, it can hunt down open and unsecured 
 access points and do your HIGHLY illegal act of connecting and 
 sending its data whenever it can.

 I'm not endorsing this behavior, of course, 

Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type

2006-12-31 Thread George Rogato

Right, but do they have their units in ad hoc mode shouting out that essid?
I see HP setup quite abit and that is in ad hoc mode. Naturally thats an 
HP printer waiting to get set up.


George

Rick Smith wrote:

no, mikrotik in this case, doing a 'scan' on the interface...shows their
ssid's in their trucks...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On
Behalf Of George Rogato
Sent: Sunday, December 31, 2006 5:05 PM
To: WISPA General List
Subject: Re: [WISPA] More Saturday Musings- Another (older) Truck-PC type

ad hoc mode?

Rick Smith wrote:

nod, a scan on the AP shows them...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Ralph

Sent: Sunday, December 31, 2006 4:23 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC 
type


If they still operate as before, you shouldn't see them unless you set 
your tower as a client/cpe.  I have never seen them do anything with 
an AP, other than BE one.  Dis you know that was what the SST-PR-1 was

before?


 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Rick Smith

Sent: Sunday, December 31, 2006 2:35 PM
To: 'WISPA General List'
Subject: RE: [WISPA] More Saturday Musings- Another (older) Truck-PC 
type


yeah I can see 10 - 12 of them at any time off one of my towers.
I'm 1/2 mile from a sears garage where they repair those vans...

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Ralph

Sent: Saturday, December 30, 2006 11:11 PM
To: 'WISPA General List'
Subject: [WISPA] More Saturday Musings- Another (older) Truck-PC type

Hi Matt-

Back in my old Net-Stumbler days (back when you could drive across 
Atlanta and see less than 20 Access Points, and 2 were my own), the

experimenters
of the day became perplexed by this SSID that kept popping up at 
random times.  It was an Access Point named SST-PR-1  The first time 
I saw it, I was in my basement and I knew full well what I could 
normally receive down there.


There were all kinds of theories:  an AP on a low earth orbit 
satellite, something on a passing vehicle, some sort of temporary SSID on

a piece of

gear that just showed up right at bootup, etc.   Googling for SST-PR-1

might

actually turn up some of the old discussions about it.

Anyway- I started seeing it a lot in the evenings after they built 
some apartments behind me.  I sent my son over there on his bike with 
a camera to do some investigating.  He soon found a Sears Service 
truck (the ones with the small Globalstar dish on top like you see on 
many semis) parked in front of an apartment.  He went back with a 
laptop and traced the signal to this van.  So we had it figured out- Sears

truck.
A few days later, my son saw the driver coming home for the evening 
and the driver gave him the dog and pony show of the truck computer.  
It is linked to Sears parts database via satellite. The SST-PR-1 is 
the SSID of an integral access point that allows the driver to use a 
laptop from inside the customer's home to check on parts, see service 
manuals, etc. The SST stands for Sears Smart Toolbox.


I once told a friend about it and he set up a laptop to warn him when 
the Sears guy entered the neighborhood on his way to fix their 
refrigerator.  An early warning system of sorts.


So, the big SST-PR-1 mystery was finally solved by a 12 year old kid!

Ralph

 


-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] 
On Behalf Of Matt Larsen - Lists

Sent: Saturday, December 30, 2006 1:16 AM
To: WISPA General List
Subject: Re: [WISPA] TRUCKPC

AHA

I've been wondering where the hell that TruckPC request has been 
coming from!!


Occasionally, I have techs who have left the radius authentication 
disabled on an access point and the dhcp logs will start to fill up 
with requests from TruckPC.  They were coming from access points all

over
the place and I was a little perplexed.   It is interesting to watch our 
radius logs too.  I have one AP overlooking a little town of 200 
people, but it is right next to an interstate and the radius log from 
that AP is always showing logins.  Must be all the trucker laptops 
whizzing by looking for an open AP.


I've been toying with the idea of turning on hotspot functionality so 
that we can provide transient access, and this is probably a good 
reason to do it.


Matt Larsen
[EMAIL PROTECTED]


Ralph wrote:

Well, JohnnyO- you might want to also educate these people, then:
http://www.drivertech.com/

Their product, a Truckpc is being installed in many fleet vehicles. 
One fleet that comes to mind is US Express, a long haul package 
hauling

service

http://www.usxpress.com/   The device communicates back to the office via
Satellite, Cellular, or WiFi- whichever is available and cheaper.  
According to the manufacturer, it can hunt down open and unsecured 
access points and do 

Re: [WISPA] Quick-Connect PoE at CPE

2006-12-31 Thread George Rogato

Pac Wireless makes them:
http://pacwireless.com/products/RJ45-ECS.shtml

Mark Nash wrote:
George, awhile back I got from you a cat5 pigtail that had a 
quick-connect fitting on it.  I think I can use these for my Tranzeo 
CPEs if I bore out the hole in the boot of the CPE.  This could speed up 
installs  some troubleshooting as well, as we can disconnect the 
customer's PoE cable and plug into it directly from the inverter in my 
truck without taking off the boot and risking water problems.


How to you obtain these? and do you put on the pigtail portion of it or 
do they come terminated?


What are others doing for this?

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax




--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Quick-Connect PoE at CPE

2006-12-31 Thread Mark Nash

Cool...just ordered some from Streakwave $5.95 each.

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax

- Original Message - 
From: George Rogato [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Sunday, December 31, 2006 3:09 PM
Subject: Re: [WISPA] Quick-Connect PoE at CPE



Pac Wireless makes them:
http://pacwireless.com/products/RJ45-ECS.shtml

Mark Nash wrote:
George, awhile back I got from you a cat5 pigtail that had a 
quick-connect fitting on it.  I think I can use these for my Tranzeo CPEs 
if I bore out the hole in the boot of the CPE.  This could speed up 
installs  some troubleshooting as well, as we can disconnect the 
customer's PoE cable and plug into it directly from the inverter in my 
truck without taking off the boot and risking water problems.


How to you obtain these? and do you put on the pigtail portion of it or 
do they come terminated?


What are others doing for this?

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax




--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/




--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Quick-Connect PoE at CPE

2006-12-31 Thread George Rogato

Don't the tranzeo's already come with some kind of external quick connect?


Mark Nash wrote:

Cool...just ordered some from Streakwave $5.95 each.

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax

- Original Message - From: George Rogato [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Sunday, December 31, 2006 3:09 PM
Subject: Re: [WISPA] Quick-Connect PoE at CPE



Pac Wireless makes them:
http://pacwireless.com/products/RJ45-ECS.shtml

Mark Nash wrote:
George, awhile back I got from you a cat5 pigtail that had a 
quick-connect fitting on it.  I think I can use these for my Tranzeo 
CPEs if I bore out the hole in the boot of the CPE.  This could speed 
up installs  some troubleshooting as well, as we can disconnect the 
customer's PoE cable and plug into it directly from the inverter in 
my truck without taking off the boot and risking water problems.


How to you obtain these? and do you put on the pigtail portion of it 
or do they come terminated?


What are others doing for this?

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax




--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/






--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] Quick-Connect PoE at CPE

2006-12-31 Thread Mark Nash
It's not a quick-connect...just a pass-through.  If you want access to the 
RJ45 jack on the CPE, you've got to take the whole weatherproof boot off. 
That makes a big difference as to what I'm wanting to do.


With the quick-connect pigtail, CPEs can be assembled, terminated and 
configured in the shop prior to installation in the field.  When our install 
tech goes out, he will test the CPE with a test cable (running off the 
inverter in the truck) just by aiming the CPE by hand.  The Tranzeo has 5 
signal strength LEDs on the back of it.  If a location is chosen, it still 
needs to wrenched down on a mount for the one installer to be able to do 
further testing.  Prior to having these, the installer would have to either 
put a boot on with the test cable, or risk water damage to the CPE during 
testing.  So WITH these, on-premises testing and installation can occur in a 
weatherproof environment.


Also, it's very handy for an on-site tech to be able to plug into the CPE 
when on a service call.  All testing/realignment/etc can be done without the 
customer being present.


Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax

- Original Message - 
From: George Rogato [EMAIL PROTECTED]

To: WISPA General List wireless@wispa.org
Sent: Sunday, December 31, 2006 3:27 PM
Subject: Re: [WISPA] Quick-Connect PoE at CPE



Don't the tranzeo's already come with some kind of external quick connect?


Mark Nash wrote:

Cool...just ordered some from Streakwave $5.95 each.

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax

- Original Message - From: George Rogato [EMAIL PROTECTED]
To: WISPA General List wireless@wispa.org
Sent: Sunday, December 31, 2006 3:09 PM
Subject: Re: [WISPA] Quick-Connect PoE at CPE



Pac Wireless makes them:
http://pacwireless.com/products/RJ45-ECS.shtml

Mark Nash wrote:
George, awhile back I got from you a cat5 pigtail that had a 
quick-connect fitting on it.  I think I can use these for my Tranzeo 
CPEs if I bore out the hole in the boot of the CPE.  This could speed 
up installs  some troubleshooting as well, as we can disconnect the 
customer's PoE cable and plug into it directly from the inverter in my 
truck without taking off the boot and risking water problems.


How to you obtain these? and do you put on the pigtail portion of it or 
do they come terminated?


What are others doing for this?

Mark Nash
Network Engineer
UnwiredOnline.Net
350 Holly Street
Junction City, OR 97448
http://www.uwol.net
541-998-
541-998-5599 fax




--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/






--
George Rogato

Welcome to WISPA

www.wispa.org

http://signup.wispa.org/
--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/




--
WISPA Wireless List: wireless@wispa.org

Subscribe/Unsubscribe:
http://lists.wispa.org/mailman/listinfo/wireless

Archives: http://lists.wispa.org/pipermail/wireless/


Re: [WISPA] recommendation for Client POE integrated radio for 802.11b/g

2006-12-31 Thread Pete Davis




I suppose that the only real difference is that you can drive up within
a few hundred feet of any house with a unsecured wireless network, and
get online without anyone knowing (or caring most of the time). Its
more like walking up and getting a drink from your water hose in your
yard than JohnnyO's analogy of using your wife. A sip of water from the
hose or 5 minutes on your wireless router neither one significantly
costs anyone. 

While it is technically "stealing" it is hard to suggest that it costs
the paying subscriber has sustained any monetary loss or any cost of
real performance, internet speed, or water pressure. If his files on
his PC were shared on his insecure WLAN, and you drove up and
snooped/altered/deleted them, then it would seem that there is grounds
for vandalism/business interruption, unauthorized information access,
etc, etc. 

If I walk up to your water hose, steal it, cut it, or run several hoses
together and fill my 30,000 gallon pool, or stick it in your window and
flood your house, then there is a problem, and a real issue, and a
crime has been committed, since it legitimately costs you real money to
remedy.

If I drive near your home, get on the internet, check my email, make a
VOIP call, look up a stock price, or whatever, then I don't suspect
anyone will complain, or know that I did it. It also won't cost you
anything. 

If I sit out there for hours downloading copyright violations (P2P) or
cracking your file server, or send 10,000,000 spam messages getting
your IP added to the RBL's, then there is a real issue. 

An emergency communication plan that includes "war driving" to
establish VOIP is akin to a fire department that plans to put out fires
with a series of garden hoses and outside hose bibs instead of
installing real fire hydrants. 

As far as the legality of war driving, I am not sure that MOST war
driving is "catch-able" "convict-able" or "quantify-able" (in the cost
to the customer) or whatever. 
Its also against the law to sample grapes at the grocery store. I don't
do that, but I am sure that people have done that for years. I have
never even heard of anyone getting in trouble for it. (war driving or
grape sampling). I suppose that if you got greedy with either one, you
would get your hand slapped. 

Pete Davis
NoDial.net. 



Rick Smith wrote:

  ah yes, but then you would've had a cop knock on the front door, 
and ASK your permission to use the phone.   At which point, you
COULD say "NO!" and shut the door on them.  Or, you could let them
in, and tell them "OK! here it is!"

BUT...They wouldn't do the equivalent of walking up to your NID, 
plugging a butt set in and just dialing away...

If I, right now, drove up in front of your house, got out of my truck,
walked up to your Network panel that Verizon or the local phone co.
put there as their demarcation point, and plugged my butt set in
and got dial tone and dialed Hawaii to chat with someone at YOUR
expense, I could be found / shot / arrested / sued / what have you.

What's different with WiFi ?  Nothing but the excuses we allow people
to continue to make.

-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] On
Behalf Of Pete Davis
Sent: Sunday, December 31, 2006 3:11 PM
To: WISPA General List
Subject: Re: [WISPA] recommendation for Client POE integrated radio for
802.11b/g

The legality and ethics of using an open access point is questionable, but
there is a liability issue as well. In most of the areas that I cover with
my network, there is a strong signal with SSID of NoDial.
Connecting to this will get you a DHCP address even, without a WEP or other
encryption key.
Until I know that you have connected and moved your mac address to a list
that authorizes your connection, all of your outbound packets will be sent
to http://64.123.108.28:80 This brings up a liability issue. If the
emergency communication van tech wastes 2 hrs trying to get hold of me, get
connected to the internet, or whatever, and $10M of houses burn down,
because they couldn't get to the fire department via a hacked VOIP solution,
then am I gonna get sued?
If they connect to my private home network that I intentionally left open,
and my custom made uber-hacker passive/aggressive firewall unleashes a
blackops virus that turns their laptops into bricks. Then what?

I guess, that by JohnnyO's example, if you come into my open door and try to
visit with my wife, and you step on a rake that gives you a brain anurism, I
guess that makes me guilty (or not guilty) of manslaughter. I lost score in
this ballgame.

If the cops are in a pursuit in my neighborhood, and run their squad car off
the road breaking the radio, and they want to use my home phone to call the
office, I would let them. Not because I HAVE to, but to be a good citizen.
If I HAD to, then the 4th amendment just went out the window.

pd



Jack Unger wrote:
  
  
Holy brainfade, JohnnyO.

Your comments about "highly illegal" just went STRAIGHT over my