...but the deauth attack is the best way to capture the handshake!?? How are we supposed to get the WPA key without the handshake??
On Tue, Jan 6, 2015 at 6:47 PM, Sean Heskett <af...@zirkel.us> wrote: > In Colorado and many other states with "make my day" laws you can most > certainly be shot :-/ > > > On Tuesday, January 6, 2015, <l...@mwtcorp.net> wrote: > >> On Tue, 6 Jan 2015 16:27:13 -0600 (CST) >> Mike Hammett <wispawirel...@ics-il.net> wrote: >> > A WISP doesn't own (or lease) everywhere. A company owns or leases >> their corporate space. >> > >> > If a Russian or Chinese spy snuck a MiFi into Lockheed Skunkworks and >> somehow passed their other forms of security, you'd be >> >okay with them chugging away uploading whatever they found? >> > >> >> If I tried to climb over the fence into a secure Lockheed facility I run >> the very real risk of being shot! <humor> Surely your not >> asserting that you have the same right when someone climbs over your back >> fence </humor>. When National Security is asserted the >> rules change. >> >> The FCC has a history of being fairly draconian when they smell "harmful >> interference". (I've always guessed it's personal >> to them because your playing with their toys. ;-) >> It's always a bad idea to expect to reason with a bureaucrat. It's either >> OK or not. It's all in the book. >> If you have a very deep back pocket you can try and get it in front of a >> judge and argue the merits but they >> tend to defer to the regulators. >> >> Larry Ash >> > >> > >> > >> > ----- >> > Mike Hammett >> > Intelligent Computing Solutions >> > http://www.ics-il.com >> > >> > ----- Original Message ----- >> > >> >From: "Dennis Burgess" <dmburg...@linktechs.net> >> > To: "WISPA General List" <wireless@wispa.org> >> > Sent: Tuesday, January 6, 2015 3:09:47 PM >> > Subject: Re: [WISPA] Rogue Accesspoint Detection >> > >> > >> > >> > While I understand your reasoning, I would disagree. If you could do >> this, for the security of a WISP, we will shut down all >> >Access Points via Deauth attack that my Access Points can see. Also >> note, I am not talking for the FCC, but for what I believe is >> >right, in this case, you can’t own a location or area of the wifi bands, >> therefore, you can’t cause harmful interference, and a >> >deauth attack would be harmful, and interference. >> > >> > I can agree that you can detect it and shut it off on a port on your >> network, but you should not be able to interfere with other >> >operations, regardless if it is your property or not. Maybe that’s not >> the intent from those actions, but it’s clear that if it’s >> >not on your network then you can’t do much about it. Now, if they are on >> your property, sure you can tell them to turn it off or >> >leave, but that’s another issue. lol >> > >> > >> > Dennis Burgess, CTO, Link Technologies, Inc. >> > den...@linktechs.net – 314-735-0270 – www.linktechs.net >> > >> > >> > >> >From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On >> Behalf Of Mike Hammett >> > Sent: Tuesday, January 06, 2015 2:02 PM >> > To: WISPA General List >> > Subject: Re: [WISPA] Rogue Accesspoint Detection >> > >> > >> > There is no mention of a blanket refusal. In the FCC citation, the fact >> that they're charging for Internet access is brought up >> >every time the deauthing activity is. >> > >> > https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf >> > >> > https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf >> > >> > In reading that second one, they also keep bringing up that Marriott >> charged for Internet (and a lot at that). >> > >> > "Specifically, such employees had used this capability to prevent users >> from connecting to the Internet via their own personal >> >Wi-Fi networks when these users did not pose a threat to the security of >> the Gaylord Opryland network or its guests." >> > >> > Sounds like security is a viable defense. >> > >> > >> > >> > ----- >> > Mike Hammett >> > Intelligent Computing Solutions >> > http://www.ics-il.com >> > >> > >> > >> > >> > ----- Original Message ----- >> > >> > >> >From: "Dennis Burgess" < dmburg...@linktechs.net > >> > To: "WISPA General List" < wireless@wispa.org > >> > Sent: Tuesday, January 6, 2015 11:43:53 AM >> > Subject: Re: [WISPA] Rogue Accesspoint Detection >> > You cannot do it at all…. >> > >> > >> > Dennis Burgess, CTO, Link Technologies, Inc. >> > den...@linktechs.net – 314-735-0270 – www.linktechs.net >> > >> > >> > >> >From: wireless-boun...@wispa.org [ mailto:wireless-boun...@wispa.org ] >> On Behalf Of Mike Hammett >> > Sent: Tuesday, January 06, 2015 11:06 AM >> > To: WISPA General List >> > Subject: Re: [WISPA] Rogue Accesspoint Detection >> > >> > >> > You can do it all day long within your own company. Marriott was doing >> it to force people to give them money. A company doing it >> >has plenty of other reasons. >> > >> > >> > >> > ----- >> > Mike Hammett >> > Intelligent Computing Solutions >> > http://www.ics-il.com >> > >> > >> > >> > >> > >> >From: "Dennis Burgess" < dmburg...@linktechs.net > >> > To: "WISPA General List" < wireless@wispa.org > >> > Sent: Tuesday, January 6, 2015 10:05:02 AM >> > Subject: Re: [WISPA] Rogue Accesspoint Detection >> > Note that many of these systems (rather rogue AP prevention) have been >> deemed illegal by the FCC, a hotel chain was fined 600k I >> >think due to it. >> > >> > >> > Dennis Burgess, CTO, Link Technologies, Inc. >> > den...@linktechs.net – 314-735-0270 – www.linktechs.net >> > >> > >> > >> >From: wireless-boun...@wispa.org [ mailto:wireless-boun...@wispa.org ] >> On Behalf Of Scott Piehn >> > Sent: Tuesday, January 06, 2015 9:49 AM >> > To: WISPA General List >> > Subject: [WISPA] Rogue Accesspoint Detection >> > >> > >> > >> > >> > I have a customer that is being required to get rogue access point >> detection. not a one time thing but ongoing detection. What >> >products have people used. >> > >> > >> > >> > >> > --------------------------------------------------------- >> > Scott M Piehn >> > >> > _______________________________________________ >> > Wireless mailing list >> > Wireless@wispa.org >> > http://lists.wispa.org/mailman/listinfo/wireless >> > >> > >> > _______________________________________________ >> > Wireless mailing list >> > Wireless@wispa.org >> > http://lists.wispa.org/mailman/listinfo/wireless >> > >> > _______________________________________________ >> > Wireless mailing list >> > Wireless@wispa.org >> > http://lists.wispa.org/mailman/listinfo/wireless >> > >> >> Larry Ash >> Senior Network Engineer >> Mountain West Telephone >> 123 W 1st St. >> Casper, WY 82601 >> Office 307 233-8387 >> _______________________________________________ >> Wireless mailing list >> Wireless@wispa.org >> http://lists.wispa.org/mailman/listinfo/wireless >> > > _______________________________________________ > Wireless mailing list > Wireless@wispa.org > http://lists.wispa.org/mailman/listinfo/wireless > >
_______________________________________________ Wireless mailing list Wireless@wispa.org http://lists.wispa.org/mailman/listinfo/wireless