Hi Matt- Back in my old Net-Stumbler days (back when you could drive across Atlanta and see less than 20 Access Points, and 2 were my own), the "experimenters" of the day became perplexed by this SSID that kept popping up at random times. It was an Access Point named "SST-PR-1" The first time I saw it, I was in my basement and I knew full well what I could normally receive down there.
There were all kinds of theories: an AP on a low earth orbit satellite, something on a passing vehicle, some sort of temporary SSID on a piece of gear that just showed up right at bootup, etc. Googling for SST-PR-1 might actually turn up some of the old discussions about it. Anyway- I started seeing it a lot in the evenings after they built some apartments behind me. I sent my son over there on his bike with a camera to do some investigating. He soon found a Sears Service truck (the ones with the small Globalstar dish on top like you see on many semis) parked in front of an apartment. He went back with a laptop and traced the signal to this van. So we had it figured out- Sears truck. A few days later, my son saw the driver coming home for the evening and the driver gave him the dog and pony show of the truck computer. It is linked to Sears parts database via satellite. The SST-PR-1 is the SSID of an integral access point that allows the driver to use a laptop from inside the customer's home to check on parts, see service manuals, etc. The SST stands for "Sears Smart Toolbox". I once told a friend about it and he set up a laptop to warn him when the Sears guy entered the neighborhood on his way to fix their refrigerator. An "early warning" system of sorts. So, the big SST-PR-1 mystery was finally solved by a 12 year old kid! Ralph -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] On Behalf Of Matt Larsen - Lists Sent: Saturday, December 30, 2006 1:16 AM To: WISPA General List Subject: Re: [WISPA] TRUCKPC AHA!!!! I've been wondering where the hell that TruckPC request has been coming from!!!!!! Occasionally, I have techs who have left the radius authentication disabled on an access point and the dhcp logs will start to fill up with requests from "TruckPC". They were coming from access points all over the place and I was a little perplexed. It is interesting to watch our radius logs too. I have one AP overlooking a little town of 200 people, but it is right next to an interstate and the radius log from that AP is always showing logins. Must be all the trucker laptops whizzing by looking for an open AP. I've been toying with the idea of turning on hotspot functionality so that we can provide transient access, and this is probably a good reason to do it. Matt Larsen [EMAIL PROTECTED] Ralph wrote: > Well, JohnnyO- you might want to also educate these people, then: > http://www.drivertech.com/ > > Their product, a "Truckpc" is being installed in many fleet vehicles. > One fleet that comes to mind is US Express, a long haul package hauling service > http://www.usxpress.com/ The device communicates back to the office via > Satellite, Cellular, or WiFi- whichever is available and cheaper. > According to the manufacturer, it can hunt down open and unsecured > access points and do your "HIGHLY illegal" act of connecting and > sending its data whenever it can. > > I'm not endorsing this behavior, of course, but I wanted to bring it > to the attention of the list. > > How do I know? My WISP operates hotspot portals that allow casual users to > make use of our mountain and tower-top sectors of WiFi. These cover > major portions of several towns. These towns have a major Interstate > route passing through them. I began noticing numerous TRUCKPC leases > being granted by the DHCP servers in these towns. I became concerned > about what they were, so I did a little internet research and ended up > on the phone with technical support at Drivertech. This is who > confirmed how these devices operate and who the probable fleet culprit was. > > If anyone has portals near major truck routes, check your DHCP logs > and see if you see the TRUCKPC SSID grabbing leases. You may want to > either block it or contact these folks and work out a "roaming agreement". > > > > Serious part over, joke follows: > > This message brought to you by the World's largest free wireless > internet provider. Look for our SSID wherever you go: Linksys. > > Ralph > > -----Original Message----- > From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] > On Behalf Of JohnnyO > Sent: Friday, December 29, 2006 5:35 PM > To: [EMAIL PROTECTED]; 'WISPA General List' > Subject: RE: [WISPA] recommendation for Client POE integrated radio > for802.11b/g > > Brian - Ham Operator or not - do you realize that what you're planning > on doing is HIGHLY illegal and has several people over the past 2 yrs > in Federal Prison as we speak ? > > -- WISPA Wireless List: email@example.com Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/ -- WISPA Wireless List: firstname.lastname@example.org Subscribe/Unsubscribe: http://lists.wispa.org/mailman/listinfo/wireless Archives: http://lists.wispa.org/pipermail/wireless/