I got dibs on linksys and NETGEAR1-NETGEAR99 :)
On 01/06/2015 03:16 PM, Scott Piehn wrote:
What would be your take if their AP uses the same SSID as yours.
Assuming Ruckus etc can knock out only that type of AP
---------------------------------------------------------
Scott M Piehn
*From:* Dennis Burgess <mailto:dmburg...@linktechs.net>
*Sent:* Tuesday, January 6, 2015 3:09 PM
*To:* WISPA General List <mailto:wireless@wispa.org>
*Subject:* Re: [WISPA] Rogue Accesspoint Detection
While I understand your reasoning, I would disagree. If you could do
this, for the security of a WISP, we will shut down all Access Points
via Deauth attack that my Access Points can see. Also note, I am not
talking for the FCC, but for what I believe is right, in this case,
you can’t own a location or area of the wifi bands, therefore, you
can’t cause harmful interference, and a deauth attack would be
harmful, and interference.
I can agree that you can detect it and shut it off on a port on your
network, but you should not be able to interfere with other
operations, regardless if it is your property or not. Maybe that’s
not the intent from those actions, but it’s clear that if it’s not on
your network then you can’t do much about it. Now, if they are on
your property, sure you can tell them to turn it off or leave, but
that’s another issue. lol
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net <mailto:den...@linktechs.net> – 314-735-0270 –
www.linktechs.net <http://www.linktechs.net>
*From:*wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org]
*On Behalf Of *Mike Hammett
*Sent:* Tuesday, January 06, 2015 2:02 PM
*To:* WISPA General List
*Subject:* Re: [WISPA] Rogue Accesspoint Detection
There is no mention of a blanket refusal. In the FCC citation, the
fact that they're charging for Internet access is brought up every
time the deauthing activity is.
https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf
https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf
In reading that second one, they also keep bringing up that Marriott
charged for Internet (and a lot at that).
"Specifically, such employees had used this capability to prevent
users from connecting to the Internet via their own personal Wi-Fi
networks when these users did not pose a threat to the security of the
Gaylord Opryland network or its guests."
Sounds like security is a viable defense.
-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
<https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
------------------------------------------------------------------------
*From: *"Dennis Burgess" <dmburg...@linktechs.net
<mailto:dmburg...@linktechs.net>>
*To: *"WISPA General List" <wireless@wispa.org
<mailto:wireless@wispa.org>>
*Sent: *Tuesday, January 6, 2015 11:43:53 AM
*Subject: *Re: [WISPA] Rogue Accesspoint Detection
You cannot do it at all….
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net <mailto:den...@linktechs.net> – 314-735-0270 –
www.linktechs.net <http://www.linktechs.net>
*From:*wireless-boun...@wispa.org <mailto:wireless-boun...@wispa.org>
[mailto:wireless-boun...@wispa.org] *On Behalf Of *Mike Hammett
*Sent:* Tuesday, January 06, 2015 11:06 AM
*To:* WISPA General List
*Subject:* Re: [WISPA] Rogue Accesspoint Detection
You can do it all day long within your own company. Marriott was doing
it to force people to give them money. A company doing it has plenty
of other reasons.
-----
Mike Hammett
Intelligent Computing Solutions
http://www.ics-il.com
<https://www.facebook.com/ICSIL><https://plus.google.com/+IntelligentComputingSolutionsDeKalb><https://www.linkedin.com/company/intelligent-computing-solutions><https://twitter.com/ICSIL>
------------------------------------------------------------------------
*From: *"Dennis Burgess" <dmburg...@linktechs.net
<mailto:dmburg...@linktechs.net>>
*To: *"WISPA General List" <wireless@wispa.org
<mailto:wireless@wispa.org>>
*Sent: *Tuesday, January 6, 2015 10:05:02 AM
*Subject: *Re: [WISPA] Rogue Accesspoint Detection
Note that many of these systems (rather rogue AP prevention) have been
deemed illegal by the FCC, a hotel chain was fined 600k I think due to
it.
Dennis Burgess, CTO, Link Technologies, Inc.
den...@linktechs.net <mailto:den...@linktechs.net> – 314-735-0270 –
www.linktechs.net <http://www.linktechs.net>
*From:*wireless-boun...@wispa.org <mailto:wireless-boun...@wispa.org>
[mailto:wireless-boun...@wispa.org] *On Behalf Of *Scott Piehn
*Sent:* Tuesday, January 06, 2015 9:49 AM
*To:* WISPA General List
*Subject:* [WISPA] Rogue Accesspoint Detection
I have a customer that is being required to get rogue access point
detection. not a one time thing but ongoing detection. What products
have people used.
---------------------------------------------------------
Scott M Piehn
_______________________________________________
Wireless mailing list
Wireless@wispa.org <mailto:Wireless@wispa.org>
http://lists.wispa.org/mailman/listinfo/wireless
_______________________________________________
Wireless mailing list
Wireless@wispa.org <mailto:Wireless@wispa.org>
http://lists.wispa.org/mailman/listinfo/wireless
------------------------------------------------------------------------
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless
------------------------------------------------------------------------
No virus found in this message.
Checked by AVG - www.avg.com <http://www.avg.com>
Version: 2014.0.4794 / Virus Database: 4253/8881 - Release Date: 01/06/15
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless