That's a really good point about the additional implications of an open network for a campus. If you have to quarantine someone and they just move to the open network, it makes it a lot harder get them to address the issue. As to access to subscriptions to copyrighted materials, it is easy enough to filter that out. Providing event based SSID's and passwords is something we do as well in some cases. I can't help you with the trustees. :) Pete
-----Original Message----- From: The EDUCAUSE Wireless Issues Constituent Group Listserv [mailto:[email protected]] On Behalf Of Chuck Anderson Sent: Friday, May 16, 2014 8:19 AM To: [email protected] Subject: Re: [WIRELESS-LAN] requests for open, unauthenticated, no portal WiFi On Fri, May 16, 2014 at 01:30:30AM +0000, Peter P Morrissey wrote: > What is also interesting is that the CALEA recommendations really seem to > focus on giving Law enforcement access, and not necessarily identifying users > in the past. I do wonder why we in .edu's seem to obsess about identifying > people. As has been pointed out, it is wide open in enough restaurants, city > streets and airports. IN addition, I have never heard of a case of someone > getting in trouble for offering open access. If this has ever happened, I > would love to hear the details. We currently have a sponsored-guest type system where a username/password needs to be acquired from one of a hundred or so administrative assistants, helpdesk, or network staff, then emailed/texted/printed and given to the user. This has been deemed too high of a bar for some classes of visitors (trustees) or events (commencement) so we were asked to "create an open network" for those. Apparently it is too hard for trustees to get a password from the same people they get their visitor parking pass from, or for commencement visitors to read a password off a poster hung all around campus. It is hard to say no for those types of use cases, but it undermines our ability to require user/host registration for the rest of the population. If we've suspended a machine from accessing the network due to policy violations or security incidents, how do we prevent them from using the open network? How do we prevent just anyone who isn't part of our community from accessing materials that are only licensed to members of our community (such as library resources like Safari Books Online which "authenticates" by source IP address)? Most airport or city networks that I've seen are behind at least a click-through agreement captive portal. MIT used to have an honor-system based guest access system where they asked you for your name, phone, and email, and then let you on immediately. It remembered your MAC address for 6 months or a year or somthing like that so you didn't have to "register" again for that amount of time. I don't know if they are still doing that, but that seems like a good compromise. The splash-page gives you a branding opportunity and the user some "assurance" that they are connecting to your network and not someone who is spoofing the SSID, especially if you use an SSL captive portal. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/. ********** Participation and subscription information for this EDUCAUSE Constituent Group discussion list can be found at http://www.educause.edu/groups/.
