...but the deauth attack is the best way to capture the handshake!??  How
are we supposed to get the WPA key without the handshake??

On Tue, Jan 6, 2015 at 6:47 PM, Sean Heskett <af...@zirkel.us> wrote:

> In Colorado and many other states with "make my day" laws you can most
> certainly be shot :-/
>
>
> On Tuesday, January 6, 2015, <l...@mwtcorp.net> wrote:
>
>> On Tue, 6 Jan 2015 16:27:13 -0600 (CST)
>>   Mike Hammett <wispawirel...@ics-il.net> wrote:
>> > A WISP doesn't own (or lease) everywhere. A company owns or leases
>> their corporate space.
>> >
>> > If a Russian or Chinese spy snuck a MiFi into Lockheed Skunkworks and
>> somehow passed their other forms of security, you'd be
>> >okay with them chugging away uploading whatever they found?
>> >
>>
>> If I tried to climb over the fence into a secure Lockheed facility I run
>> the very real risk of being shot! <humor> Surely your not
>> asserting that you have the same right when someone climbs over your back
>> fence </humor>. When National Security is asserted the
>> rules change.
>>
>> The FCC has a history of being fairly draconian when they smell "harmful
>> interference". (I've always guessed it's personal
>> to them because your playing with their toys. ;-)
>> It's always a bad idea to expect to reason with a bureaucrat. It's either
>> OK or not. It's all in the book.
>> If you have a very deep back pocket you can try and get it in front of a
>> judge and argue the merits but they
>> tend to defer to the regulators.
>>
>> Larry Ash
>> >
>> >
>> >
>> > -----
>> > Mike Hammett
>> > Intelligent Computing Solutions
>> > http://www.ics-il.com
>> >
>> > ----- Original Message -----
>> >
>> >From: "Dennis Burgess" <dmburg...@linktechs.net>
>> > To: "WISPA General List" <wireless@wispa.org>
>> > Sent: Tuesday, January 6, 2015 3:09:47 PM
>> > Subject: Re: [WISPA] Rogue Accesspoint Detection
>> >
>> >
>> >
>> > While I understand your reasoning, I would disagree. If you could do
>> this, for the security of a WISP, we will shut down all
>> >Access Points via Deauth attack that my Access Points can see. Also
>> note, I am not talking for the FCC, but for what I believe is
>> >right, in this case, you can’t own a location or area of the wifi bands,
>> therefore, you can’t cause harmful interference, and a
>> >deauth attack would be harmful, and interference.
>> >
>> > I can agree that you can detect it and shut it off on a port on your
>> network, but you should not be able to interfere with other
>> >operations, regardless if it is your property or not. Maybe that’s not
>> the intent from those actions, but it’s clear that if it’s
>> >not on your network then you can’t do much about it. Now, if they are on
>> your property, sure you can tell them to turn it off or
>> >leave, but that’s another issue. lol
>> >
>> >
>> > Dennis Burgess, CTO, Link Technologies, Inc.
>> > den...@linktechs.net – 314-735-0270 – www.linktechs.net
>> >
>> >
>> >
>> >From: wireless-boun...@wispa.org [mailto:wireless-boun...@wispa.org] On
>> Behalf Of Mike Hammett
>> > Sent: Tuesday, January 06, 2015 2:02 PM
>> > To: WISPA General List
>> > Subject: Re: [WISPA] Rogue Accesspoint Detection
>> >
>> >
>> > There is no mention of a blanket refusal. In the FCC citation, the fact
>> that they're charging for Internet access is brought up
>> >every time the deauthing activity is.
>> >
>> > https://apps.fcc.gov/edocs_public/attachmatch/DOC-329743A1.pdf
>> >
>> > https://apps.fcc.gov/edocs_public/attachmatch/DA-14-1444A1.pdf
>> >
>> > In reading that second one, they also keep bringing up that Marriott
>> charged for Internet (and a lot at that).
>> >
>> > "Specifically, such employees had used this capability to prevent users
>> from connecting to the Internet via their own personal
>> >Wi-Fi networks when these users did not pose a threat to the security of
>> the Gaylord Opryland network or its guests."
>> >
>> > Sounds like security is a viable defense.
>> >
>> >
>> >
>> > -----
>> > Mike Hammett
>> > Intelligent Computing Solutions
>> > http://www.ics-il.com
>> >
>> >
>> >
>> >
>> > ----- Original Message -----
>> >
>> >
>> >From: "Dennis Burgess" < dmburg...@linktechs.net >
>> > To: "WISPA General List" < wireless@wispa.org >
>> > Sent: Tuesday, January 6, 2015 11:43:53 AM
>> > Subject: Re: [WISPA] Rogue Accesspoint Detection
>> > You cannot do it at all….
>> >
>> >
>> > Dennis Burgess, CTO, Link Technologies, Inc.
>> > den...@linktechs.net – 314-735-0270 – www.linktechs.net
>> >
>> >
>> >
>> >From: wireless-boun...@wispa.org [ mailto:wireless-boun...@wispa.org ]
>> On Behalf Of Mike Hammett
>> > Sent: Tuesday, January 06, 2015 11:06 AM
>> > To: WISPA General List
>> > Subject: Re: [WISPA] Rogue Accesspoint Detection
>> >
>> >
>> > You can do it all day long within your own company. Marriott was doing
>> it to force people to give them money. A company doing it
>> >has plenty of other reasons.
>> >
>> >
>> >
>> > -----
>> > Mike Hammett
>> > Intelligent Computing Solutions
>> > http://www.ics-il.com
>> >
>> >
>> >
>> >
>> >
>> >From: "Dennis Burgess" < dmburg...@linktechs.net >
>> > To: "WISPA General List" < wireless@wispa.org >
>> > Sent: Tuesday, January 6, 2015 10:05:02 AM
>> > Subject: Re: [WISPA] Rogue Accesspoint Detection
>> > Note that many of these systems (rather rogue AP prevention) have been
>> deemed illegal by the FCC, a hotel chain was fined 600k I
>> >think due to it.
>> >
>> >
>> > Dennis Burgess, CTO, Link Technologies, Inc.
>> > den...@linktechs.net – 314-735-0270 – www.linktechs.net
>> >
>> >
>> >
>> >From: wireless-boun...@wispa.org [ mailto:wireless-boun...@wispa.org ]
>> On Behalf Of Scott Piehn
>> > Sent: Tuesday, January 06, 2015 9:49 AM
>> > To: WISPA General List
>> > Subject: [WISPA] Rogue Accesspoint Detection
>> >
>> >
>> >
>> >
>> > I have a customer that is being required to get rogue access point
>> detection. not a one time thing but ongoing detection. What
>> >products have people used.
>> >
>> >
>> >
>> >
>> > ---------------------------------------------------------
>> > Scott M Piehn
>> >
>> > _______________________________________________
>> > Wireless mailing list
>> > Wireless@wispa.org
>> > http://lists.wispa.org/mailman/listinfo/wireless
>> >
>> >
>> > _______________________________________________
>> > Wireless mailing list
>> > Wireless@wispa.org
>> > http://lists.wispa.org/mailman/listinfo/wireless
>> >
>> > _______________________________________________
>> > Wireless mailing list
>> > Wireless@wispa.org
>> > http://lists.wispa.org/mailman/listinfo/wireless
>> >
>>
>> Larry Ash
>> Senior Network Engineer
>> Mountain West Telephone
>> 123 W 1st St.
>> Casper, WY 82601
>> Office 307 233-8387
>> _______________________________________________
>> Wireless mailing list
>> Wireless@wispa.org
>> http://lists.wispa.org/mailman/listinfo/wireless
>>
>
> _______________________________________________
> Wireless mailing list
> Wireless@wispa.org
> http://lists.wispa.org/mailman/listinfo/wireless
>
>
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to