Re: Marriott wifi blocking

2014-10-03 Thread Owen DeLong
If the signal that is causing the harmful interference is a radio transmission, then the FCC doesn't differentiate between noise and intelligent harmful interference. If you interfere elsewhere on the wire or without transmitting, you might avoid the part 15 rules about causing harmful interfere

Re: Marriott wifi blocking

2014-10-03 Thread Owen DeLong
The hotel is being fined for blocking/jamming users setting up wifi via mobile technologies and such, not using the hotel's network. Hard for me to imagine how the hotel gets to insert itself into any applicable AUP in that scenario. Owen > On Oct 3, 2014, at 19:25, Hugo Slabbert wrote: >

Re: Marriott wifi blocking

2014-10-03 Thread Jay Hennigan
On 10/3/14, 8:04 PM, Hugo Slabbert wrote: > I'm not clear on whether it runs afoul of FCC regs as it's not RF > interference directly but rather an (ab)use of higher layer control > mechanisms operating on that spectrum, but it probably does run afoul of > most "thou shalt not harm other networks"

Re: Marriott wifi blocking

2014-10-03 Thread Majdi S. Abbas
On Fri, Oct 03, 2014 at 10:57:29PM -0500, Daniel Seagraves wrote: > It?s not just Marriott doing this; A friend of mine went to a convention > near DC and found the venue was doing something like this. I don?t know if > the method was the same, but he reported that any time he connected to his >

Re: Marriott wifi blocking

2014-10-03 Thread Jay Hennigan
On 10/3/14, 7:57 PM, Hugo Slabbert wrote: > But it's not a completely discrete network. It is a subset of the > existing network in the most common example of e.g. a WLAN + NAT device > providing access to additional clients, or at least an adjacent network > attached to the existing one. Okay:

Re: Marriott wifi blocking

2014-10-03 Thread Daniel Seagraves
On Oct 3, 2014, at 10:45 PM, Hugo Slabbert wrote: > Jay, > > Killing hotspots of completely discrete networks "because $$$" is heinous. I > had extended this to e.g.: > It’s not just Marriott doing this; A friend of mine went to a convention near DC and found the venue was doing something

Re: Marriott wifi blocking

2014-10-03 Thread Jay Ashworth
No problem, Hugo. In fact, if you paid for Wired service and plugged your own router in, you would still be creating your own network, and not pretending to be the hotel's network. At the RF layer. So it would not be legal for them to zap that either. Doing so might /violate your agreement f

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
Jay, Thanks; I think I was stretching this a bit far beyond just the Marriott example. Killing hotspots of completely discrete networks "because $$$" is heinous. I had extended this to e.g.: 1. Hotel charges for either wired or wireless access per device and has network policies to that e

Re: Marriott wifi blocking

2014-10-03 Thread Jay Ashworth
Hugo, I still don't think that you have quite made it to the distinction that we are looking for here. In the case of the hotel, we are talking about an access point that connects via 4G to a cellular carrier. An access point that attempts to create its own network for the subscribers devices.

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
On Sat 2014-Oct-04 08:37:32 +0530, Suresh Ramasubramanian wrote: Wifi offered by a carrier citywide, or free wifi signals from a nearby hotel / park / coffee shop.. Perfect example (thanks) of why cutting off network attachment points would be fair game while effectively attacking other WLA

Re: Marriott wifi blocking

2014-10-03 Thread Philip Dorr
http://www.arrl.org/part-15-radio-frequency-devices#Definitions http://www.ecfr.gov/cgi-bin/text-idx?node=pt47.1.15 (m) Harmful interference. Any emission, radiation or induction that endangers the functioning of a radio navigation service or of other safety services or seriously degrades, obstruc

Re: Marriott wifi blocking

2014-10-03 Thread Valdis . Kletnieks
On Fri, 03 Oct 2014 20:31:56 -0500, Larry Sheldon said: > What it is about red-colored APs that is offensive? I have never seen one. It's a color code that indicates it's an RFC3514-compliant device. pgpXeFC2JMDVl.pgp Description: PGP signature

Re: Marriott wifi blocking

2014-10-03 Thread Suresh Ramasubramanian
Wifi offered by a carrier citywide, or free wifi signals from a nearby hotel / park / coffee shop.. On 04-Oct-2014 8:29 am, "Hugo Slabbert" wrote: > attached to the existing one. > Okay: theoretically a guest could > spin up a hotspot and not attach > it to the hotel network at all, but > I'm as

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
On Fri 2014-Oct-03 19:45:57 -0700, Michael Van Norman wrote: On 10/3/14 7:25 PM, "Hugo Slabbert" wrote: On Fri 2014-Oct-03 17:21:08 -0700, Michael Van Norman wrote: IANAL, but I believe they are. State laws may also apply (e.g. California Code - Section 502). In California, it is illega

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
Looks like you cut off, but: Except that this is the difference between what happens at a Marriott and what would happen at a business that was running rogue AP detection. In the business the portable AP would be trying to look like the network that the company operated so as to siphon off leg

Re: Marriott wifi blocking

2014-10-03 Thread Michael Van Norman
One of the reasons I pointed to the California law is that it covers above L1 even if FCC authority does not. The state law also provides for criminal penalties. I do not know if other states have similar laws. /Mike On 10/3/14 7:42 PM, "Hugo Slabbert" wrote: >On Fri 2014-Oct-03 16:49:49 -070

Re: Marriott wifi blocking

2014-10-03 Thread Michael Van Norman
On 10/3/14 7:25 PM, "Hugo Slabbert" wrote: >On Fri 2014-Oct-03 17:21:08 -0700, Michael Van Norman >wrote: > >>IANAL, but I believe they are. State laws may also apply (e.g. >>California >>Code - Section 502). In California, it is illegal to "knowingly and >>without permission disrupts or cause

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
On Fri 2014-Oct-03 16:49:49 -0700, Owen DeLong wrote: On Oct 3, 2014, at 16:12 , Wayne E Bouchard wrote: On Fri, Oct 03, 2014 at 02:23:46PM -0700, Keenan Tims wrote: The question here is what is authorized and what is not. Was this to protect their network from rogues, or protect revenue

Re: Marriott wifi blocking

2014-10-03 Thread Jay Ashworth
Except that this is the difference between what happens at a Marriott and what would happen at a business that was running rogue AP detection. In the business the portable AP would be trying to look like the network that the company operated so as to siphon off legitimate users. In a hotel the p

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
On Fri 2014-Oct-03 17:21:08 -0700, Michael Van Norman wrote: IANAL, but I believe they are. State laws may also apply (e.g. California Code - Section 502). In California, it is illegal to "knowingly and without permission disrupts or causes the disruption of computer services or denies or cau

Re: Marriott wifi blocking

2014-10-03 Thread Larry Sheldon
On 10/3/2014 15:16, Nick Olsen wrote: Not sure the specific implementation. But I've heard of Rouge AP detection done in two ways. Forgive me, I have been out of active large scale network administration for a number of years and have really lost touch. What it is about red-colored APs that

Re: Marriott wifi blocking

2014-10-03 Thread Michael Van Norman
IANAL, but I believe they are. State laws may also apply (e.g. California Code - Section 502). In California, it is illegal to "knowingly and without permission disrupts or causes the disruption of computer services or denies or causes the denial of computer services to an authorized user of a co

Re: Marriott wifi blocking

2014-10-03 Thread Jay Ashworth
- Original Message - > From: "Owen DeLong" > On Oct 3, 2014, at 16:12 , Wayne E Bouchard wrote: > > Would not such an active device be quite appropriate there? > > You may consider it appropriate from a financial or moral perspective, > but it is absolutely wrong under the communicatio

Re: Marriott wifi blocking

2014-10-03 Thread Donald Eastlake
IANAL but no, I think it most certainly does not, at least in the USA, depend on the terms of your *lease* agreement. In particular, I refer you to http://apps.fcc.gov/ecfs/document/view;?id=6518608517 where in the US Federal Communications Commission (FCC) specifically voided terms restricting Wi-

Re: Marriott wifi blocking

2014-10-03 Thread Mike Hale
So does that mean the anti-rogue AP technologies by the various vendors are illegal if used in the US? On Fri, Oct 3, 2014 at 4:54 PM, Jay Ashworth wrote: > - Original Message - >> From: "Ricky Beam" > >> It doesn't. The DEAUTH management frame is not encrypted and carries no >> authenti

Re: Marriott wifi blocking

2014-10-03 Thread Jay Ashworth
- Original Message - > From: "Ricky Beam" > It doesn't. The DEAUTH management frame is not encrypted and carries no > authentication. The 802.11 spec only requires a reason code be > provided. What's the code for E_GREEDY? Cheers, -- jra -- Jay R. Ashworth Baylink

Re: Marriott wifi blocking

2014-10-03 Thread Owen DeLong
On Oct 3, 2014, at 16:12 , Wayne E Bouchard wrote: > On Fri, Oct 03, 2014 at 02:23:46PM -0700, Keenan Tims wrote: >>> The question here is what is authorized and what is not. Was this to >>> protect their network from rogues, or protect revenue from captive >>> customers. >> >> I can't ima

Re: Marriott wifi blocking

2014-10-03 Thread joel jaeggli
On 10/3/14 7:12 PM, Wayne E Bouchard wrote: > On Fri, Oct 03, 2014 at 02:23:46PM -0700, Keenan Tims wrote: >>> The question here is what is authorized and what is not. Was this to >>> protect their network from rogues, or protect revenue from captive >>> customers. >> >> I can't imagine that a

Re: Marriott wifi blocking

2014-10-03 Thread joel jaeggli
On 10/3/14 6:01 PM, John Schiel wrote: > > On 10/03/2014 03:23 PM, Keenan Tims wrote: >>> The question here is what is authorized and what is not. Was this to >>> protect their network from rogues, or protect revenue from captive >>> customers. >> I can't imagine that any 'AP-squashing' packets a

Re: Marriott wifi blocking

2014-10-03 Thread Wayne E Bouchard
On Fri, Oct 03, 2014 at 02:23:46PM -0700, Keenan Tims wrote: > > The question here is what is authorized and what is not. Was this to > > protect their network from rogues, or protect revenue from captive > > customers. > > I can't imagine that any 'AP-squashing' packets are ever authorized,

Re: Marriott wifi blocking

2014-10-03 Thread Michael Van Norman
On 10/3/14 3:44 PM, "Lyle Giese" wrote: > >On 10/03/14 17:34, Michael Van Norman wrote: > My reading of this is that these features are illegal, period. Rogue >AP > detection is one thing, and disabling them via network or > "administrative" (ie. eject the guest) means would be fi

Re: Marriott wifi blocking

2014-10-03 Thread Lyle Giese
On 10/03/14 17:34, Michael Van Norman wrote: My reading of this is that these features are illegal, period. Rogue AP detection is one thing, and disabling them via network or "administrative" (ie. eject the guest) means would be fine, but interfering with the wireless is not acceptable per the F

Re: Marriott wifi blocking

2014-10-03 Thread Michael Van Norman
>>>My reading of this is that these features are illegal, period. Rogue AP >>>detection is one thing, and disabling them via network or >>>"administrative" (ie. eject the guest) means would be fine, but >>>interfering with the wireless is not acceptable per the FCC regulations. >>> >>>Seems like c

Re: Marriott wifi blocking

2014-10-03 Thread Hugo Slabbert
On Fri 2014-Oct-03 16:01:21 -0600, John Schiel wrote: On 10/03/2014 03:23 PM, Keenan Tims wrote: The question here is what is authorized and what is not. Was this to protect their network from rogues, or protect revenue from captive customers. I can't imagine that any 'AP-squashing' packet

Re: Marriott wifi blocking

2014-10-03 Thread John Schiel
On 10/03/2014 03:23 PM, Keenan Tims wrote: The question here is what is authorized and what is not. Was this to protect their network from rogues, or protect revenue from captive customers. I can't imagine that any 'AP-squashing' packets are ever authorized, outside of a lab. The wireless spe

Re: Marriott wifi blocking

2014-10-03 Thread Keenan Tims
> The question here is what is authorized and what is not. Was this to protect > their network from rogues, or protect revenue from captive customers. I can't imagine that any 'AP-squashing' packets are ever authorized, outside of a lab. The wireless spectrum is shared by all, regardless of ph

Re: Marriott wifi blocking

2014-10-03 Thread Ricky Beam
On Fri, 03 Oct 2014 16:16:22 -0400, Nick Olsen wrote: Side question for those smarter than I. How does WPA encryption play into this? Would a client associated to a WPA2 AP take a non-encrypted deauth appearing from the same BSSID? It doesn't. The DEAUTH management frame is not encrypted and

RE: Marriott wifi blocking

2014-10-03 Thread Darin Herteen
Yes, I've tested it quite effectively using WLC 5508 and a AIR-CAP3502I-A-K9 > Date: Fri, 3 Oct 2014 16:15:37 -0400 > From: telmn...@757.org > CC: nanog@nanog.org > Subject: Re: Marriott wifi blocking > > > I'm aware of how the illegal wifi blocking devices wo

RE: Marriott wifi blocking

2014-10-03 Thread Godmere, Shane
-Original Message- From: NANOG [mailto:nanog-boun...@nanog.org] On Behalf Of David Hubbard Sent: Friday, October 03, 2014 3:07 PM To: NANOG Subject: Marriott wifi blocking Saw this article: http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/ The interesting part: 'A federal in

Re: Marriott wifi blocking

2014-10-03 Thread John Kristoff
On Fri, 3 Oct 2014 16:16:22 -0400 "Nick Olsen" wrote: > Not sure the specific implementation. But I've heard of Rouge AP > detection done in two ways. Relation discussion on this topic has come up from time to time. I believe the last time was in a thread that starts here and includes various m

Re: Marriott wifi blocking

2014-10-03 Thread Michael O Holstein
>but how it works is by sending DEAUTH packets with spoofed MAC addresses >"rouge AP" response on Cisco/Aruba works like this. DIY version if you want to try it out .. just download Kali/Backtrack or compile aircrack-ng http://www.aircrack-ng.org/doku.php?id=deauthentication Regards, Michael H

Re: Marriott wifi blocking

2014-10-03 Thread Steven Miano
There are IPS features in nearly all of the 'enterprise' level wireless products now: http://www.cisco.com/c/en/us/products/collateral/wireless/adaptive-wireless-ips-software/data_sheet_c78-501388.html http://www.aerohive.com/solutions/applications/secure.html Doing a search for WIPs - or browsi

Re: Marriott wifi blocking

2014-10-03 Thread Adrian
On Friday 03 October 2014 13:06:55 David Hubbard wrote: ... > I'm aware of how the illegal wifi blocking devices work, but > any idea what legal hardware they were using to effectively > keep their own wifi available but render everyone else's > inaccessible? > From other discussions, they were

Re: Marriott wifi blocking

2014-10-03 Thread Michael O Holstein
legality is questionable insofar as "this device must not cause harmful interference" of PartB but how it works is by sending DEAUTH packets with spoofed MAC addresses "rouge AP" response on Cisco/Aruba works like this. Regards, Michael Holstein Cleveland State University ___

Re: Marriott wifi blocking

2014-10-03 Thread telmnstr
I'm aware of how the illegal wifi blocking devices work, but any idea what legal hardware they were using to effectively keep their own wifi available but render everyone else's inaccessible? Doesn't Cisco and other vendors offer "rouge AP squashing" features? - Ethan O'

re: Marriott wifi blocking

2014-10-03 Thread Nick Olsen
Not sure the specific implementation. But I've heard of Rouge AP detection done in two ways. 1. Associate to the "Rouge" ap. Send a packet, See if it appears on your network, Shut the port off it appeared from. I think this is the cisco way? Not sure. This is automated of course. This method

<    1   2