[174870] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Marriott wifi blocking

daemon@ATHENA.MIT.EDU (Michael Van Norman)
Fri Oct 3 20:28:03 2014

X-Original-To: nanog@nanog.org
Date: Fri, 03 Oct 2014 17:21:08 -0700
From: Michael Van Norman <mvn@ucla.edu>
To: Mike Hale <eyeronic.design@gmail.com>, Jay Ashworth <jra@baylink.com>
In-Reply-To: <CAN3um4xONXespfUKxnb1eRcdZpKG2FNZQi6e4S=EnV3HF-UoUw@mail.gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

IANAL, but I believe they are.  State laws may also apply (e.g. California
Code - Section 502).  In California, it is illegal to "knowingly and
without permission disrupts or causes the disruption of computer services
or denies or causes the denial of computer services to an authorized user
of a computer, computer system, or computer network."  Blocking access to
somebody's personal hot spot most likely qualifies.

/Mike


On 10/3/14 5:15 PM, "Mike Hale" <eyeronic.design@gmail.com> wrote:

>So does that mean the anti-rogue AP technologies by the various
>vendors are illegal if used in the US?
>
>On Fri, Oct 3, 2014 at 4:54 PM, Jay Ashworth <jra@baylink.com> wrote:
>> ----- Original Message -----
>>> From: "Ricky Beam" <jfbeam@gmail.com>
>>
>>> It doesn't. The DEAUTH management frame is not encrypted and carries no
>>> authentication. The 802.11 spec only requires a reason code be
>>> provided.
>>
>> What's the code for E_GREEDY?
>>
>> Cheers,
>> -- jra
>> --
>> Jay R. Ashworth                  Baylink
>>jra@baylink.com
>> Designer                     The Things I Think
>>RFC 2100
>> Ashworth & Associates       http://www.bcp38.info          2000 Land
>>Rover DII
>> St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727
>>647 1274
>
>
>
>-- 
>09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0



home help back first fref pref prev next nref lref last post