[174908] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Marriott wifi blocking

daemon@ATHENA.MIT.EDU (Jared Mauch)
Sat Oct 4 15:20:34 2014

X-Original-To: nanog@nanog.org
From: Jared Mauch <jared@puck.nether.net>
In-Reply-To: <CAN3um4xONXespfUKxnb1eRcdZpKG2FNZQi6e4S=EnV3HF-UoUw@mail.gmail.com>
Date: Sat, 4 Oct 2014 15:20:22 -0400
To: Mike Hale <eyeronic.design@gmail.com>
Cc: NANOG <nanog@nanog.org>
Errors-To: nanog-bounces@nanog.org

Sounds likely at least in unlicensed bands=20

Jared Mauch

> On Oct 3, 2014, at 8:15 PM, Mike Hale <eyeronic.design@gmail.com> wrote:
>=20
> So does that mean the anti-rogue AP technologies by the various
> vendors are illegal if used in the US?
>=20
>> On Fri, Oct 3, 2014 at 4:54 PM, Jay Ashworth <jra@baylink.com> wrote:
>> ----- Original Message -----
>>> From: "Ricky Beam" <jfbeam@gmail.com>
>>=20
>>> It doesn't. The DEAUTH management frame is not encrypted and carries no
>>> authentication. The 802.11 spec only requires a reason code be
>>> provided.
>>=20
>> What's the code for E_GREEDY?
>>=20
>> Cheers,
>> -- jra
>> --
>> Jay R. Ashworth                  Baylink                       jra@baylin=
k.com
>> Designer                     The Things I Think                       RFC=
 2100
>> Ashworth & Associates       http://www.bcp38.info          2000 Land Rove=
r DII
>> St Petersburg FL USA      BCP38: Ask For It By Name!           +1 727 647=
 1274
>=20
>=20
>=20
> --=20
> 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0

home help back first fref pref prev next nref lref last post