[174909] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Marriott wifi blocking

daemon@ATHENA.MIT.EDU (Brandon Ross)
Sat Oct 4 15:41:53 2014

X-Original-To: nanog@nanog.org
Date: Sat, 4 Oct 2014 15:39:37 -0400 (EDT)
From: Brandon Ross <bross@pobox.com>
To: Michael Thomas <mike@mtcc.com>
In-Reply-To: <54304758.7070509@mtcc.com>
Cc: nanog@nanog.org
Errors-To: nanog-bounces+nanog.discuss=bloom-picayune.mit.edu@nanog.org

On Sat, 4 Oct 2014, Michael Thomas wrote:

> The problem is that there's really no such thing as a "copycat" if the 
> client doesn't have the means of authenticating the destination. If 
> that's really the requirement, people should start bitching to ieee to 
> get destination auth on ap's instead of blatantly asserting that 
> somebody owns a particular ssid because, well, because.

In the enterprise environment that there's been some insistence from folks 
on this list is a legitimate place to block "rogue" APs, what makes those 
SSIDs, "yours"?  Just because they were used first by the enterprise? 
That doesn't seem to hold water in an unlicensed environment to me at all.

If the Marriott can't do this, I don't think anyone can, legally.

Now, granted, if I'm doing it with the intent to disrupt the corporate 
network or steal data, there's certainly other laws to deal with that, but 
I don't think even that is justification for spoofed deauth.

-- 
Brandon Ross                                      Yahoo & AIM:  BrandonNRoss
+1-404-635-6667                                                ICQ:  2269442
                                                          Skype:  brandonross
Schedule a meeting:  http://www.doodle.com/bross

home help back first fref pref prev next nref lref last post