[174867] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Marriott wifi blocking

daemon@ATHENA.MIT.EDU (Mike Hale)
Fri Oct 3 20:15:24 2014

X-Original-To: nanog@nanog.org
In-Reply-To: <32694396.4191.1412380452420.JavaMail.root@benjamin.baylink.com>
Date: Fri, 3 Oct 2014 17:15:14 -0700
From: Mike Hale <eyeronic.design@gmail.com>
To: Jay Ashworth <jra@baylink.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

So does that mean the anti-rogue AP technologies by the various
vendors are illegal if used in the US?

On Fri, Oct 3, 2014 at 4:54 PM, Jay Ashworth <jra@baylink.com> wrote:
> ----- Original Message -----
>> From: "Ricky Beam" <jfbeam@gmail.com>
>
>> It doesn't. The DEAUTH management frame is not encrypted and carries no
>> authentication. The 802.11 spec only requires a reason code be
>> provided.
>
> What's the code for E_GREEDY?
>
> Cheers,
> -- jra
> --
> Jay R. Ashworth                  Baylink                       jra@baylink.com
> Designer                     The Things I Think                       RFC 2100
> Ashworth & Associates       http://www.bcp38.info          2000 Land Rover DII
> St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727 647 1274



-- 
09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

home help back first fref pref prev next nref lref last post