Hehehe.

 

Dennis Burgess, CTO, Link Technologies, Inc.

[email protected] <mailto:[email protected]>  - 314-735-0270 -
www.linktechs.net <http://www.linktechs.net> 

 

From: [email protected] [mailto:[email protected]] On
Behalf Of Sam Tetherow
Sent: Tuesday, January 06, 2015 3:27 PM
To: WISPA General List
Subject: Re: [WISPA] Rogue Accesspoint Detection

 

I got dibs on linksys and NETGEAR1-NETGEAR99 :)

On 01/06/2015 03:16 PM, Scott Piehn wrote:

        What would be your take if their AP uses the same SSID as yours.
Assuming Ruckus etc can knock out only that type of AP

         

         

        ---------------------------------------------------------
        Scott M Piehn

         

        From: Dennis Burgess <mailto:[email protected]>  

        Sent: Tuesday, January 6, 2015 3:09 PM

        To: WISPA General List <mailto:[email protected]>  

        Subject: Re: [WISPA] Rogue Accesspoint Detection

         

        While I understand your reasoning, I would disagree.   If you
could do this, for the security of a WISP, we will shut down all Access
Points via Deauth attack that my Access Points can see.  Also note, I am
not talking for the FCC, but for what I believe is right, in this case,
you can't own a location or area of the wifi bands, therefore, you can't
cause harmful interference, and a deauth attack would be harmful, and
interference.  

         

        I  can agree that you can detect it and shut it off on a port on
your network, but you should not be able to interfere with other
operations, regardless if it is your property or not.  Maybe that's not
the intent from those actions, but it's clear that if it's not on your
network then you can't do much about it.    Now, if they are on your
property, sure you can tell them to turn it off or leave, but that's
another issue. lol

         

        Dennis Burgess, CTO, Link Technologies, Inc.

        [email protected] - 314-735-0270 - www.linktechs.net

         

        From: [email protected]
[mailto:[email protected]] On Behalf Of Mike Hammett
        Sent: Tuesday, January 06, 2015 2:02 PM
        To: WISPA General List
        Subject: Re: [WISPA] Rogue Accesspoint Detection

         

        There is no mention of a blanket refusal. In the FCC citation,
the fact that they're charging for Internet access is brought up every
time the deauthing activity is.
        
        https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf
        
        https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf
        
        In reading that second one, they also keep bringing up that
Marriott charged for Internet (and a lot at that).
        
        "Specifically, such employees had used this capability to
prevent users from connecting to the Internet via their own personal
Wi-Fi networks when these users did not pose a threat to the security of
the Gaylord Opryland network or its guests."
        
        Sounds like security is a viable defense.

        
        
        -----
        Mike Hammett
        Intelligent Computing Solutions
        http://www.ics-il.com
        
         <https://www.facebook.com/ICSIL>
<https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
<https://www.linkedin.com/company/intelligent-computing-solutions>
<https://twitter.com/ICSIL> 
        
        
        

        
________________________________


        From: "Dennis Burgess" <[email protected]>
        To: "WISPA General List" <[email protected]>
        Sent: Tuesday, January 6, 2015 11:43:53 AM
        Subject: Re: [WISPA] Rogue Accesspoint Detection

        You cannot do it at all....  

         

        Dennis Burgess, CTO, Link Technologies, Inc.

        [email protected] - 314-735-0270 - www.linktechs.net

         

        From: [email protected]
[mailto:[email protected]] On Behalf Of Mike Hammett
        Sent: Tuesday, January 06, 2015 11:06 AM
        To: WISPA General List
        Subject: Re: [WISPA] Rogue Accesspoint Detection

         

        You can do it all day long within your own company. Marriott was
doing it to force people to give them money. A company doing it has
plenty of other reasons.

        
        
        -----
        Mike Hammett
        Intelligent Computing Solutions
        http://www.ics-il.com
        
         <https://www.facebook.com/ICSIL>
<https://plus.google.com/+IntelligentComputingSolutionsDeKalb>
<https://www.linkedin.com/company/intelligent-computing-solutions>
<https://twitter.com/ICSIL> 

        
________________________________


        From: "Dennis Burgess" <[email protected]>
        To: "WISPA General List" <[email protected]>
        Sent: Tuesday, January 6, 2015 10:05:02 AM
        Subject: Re: [WISPA] Rogue Accesspoint Detection

        Note that many of these systems (rather rogue AP prevention)
have been deemed illegal by the FCC, a hotel chain was fined 600k I
think due to it.  

         

        Dennis Burgess, CTO, Link Technologies, Inc.

        [email protected] - 314-735-0270 - www.linktechs.net

         

        From: [email protected]
[mailto:[email protected]] On Behalf Of Scott Piehn
        Sent: Tuesday, January 06, 2015 9:49 AM
        To: WISPA General List
        Subject: [WISPA] Rogue Accesspoint Detection

         

        I have a customer that is being required to get rogue access
point detection.  not a one time thing but ongoing detection.  What
products have people used. 

        
        
        
        ---------------------------------------------------------
        Scott M Piehn

        
        _______________________________________________
        Wireless mailing list
        [email protected]
        http://lists.wispa.org/mailman/listinfo/wireless

         

        
        _______________________________________________
        Wireless mailing list
        [email protected]
        http://lists.wispa.org/mailman/listinfo/wireless

         

        
________________________________


        _______________________________________________
        Wireless mailing list
        [email protected]
        http://lists.wispa.org/mailman/listinfo/wireless

        
________________________________


        No virus found in this message.
        Checked by AVG - www.avg.com
        Version: 2014.0.4794 / Virus Database: 4253/8881 - Release Date:
01/06/15

        
        
        
        

        _______________________________________________
        Wireless mailing list
        [email protected]
        http://lists.wispa.org/mailman/listinfo/wireless

 

_______________________________________________
Wireless mailing list
[email protected]
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to