[86900] in North American Network Operators' Group

home help back first fref pref prev next nref lref last post

Re: Wifi Security

daemon@ATHENA.MIT.EDU (Joel Jaeggli)
Mon Nov 21 14:59:58 2005

Date: Mon, 21 Nov 2005 11:59:28 -0800 (PST)
From: Joel Jaeggli <joelja@darkwing.uoregon.edu>
To: Jim Popovitch <jimpop@yahoo.com>
Cc: Randy Bush <randy@psg.com>,
	Niels Bakker <niels=nanog@bakker.net>, nanog@merit.edu
In-Reply-To: <4382206D.9050902@yahoo.com>
Errors-To: owner-nanog@merit.edu


On Mon, 21 Nov 2005, Jim Popovitch wrote:

>
> Randy Bush wrote:
>>> As others pointed out (to me as well), for a _man in the middle_ attack 
>>> (e.g. impersonating www.paypal.com) it is necessary to play ARP games or 
>>> otherwise insert yourself in the flow of traffic.
>> 
>> not really.  you just need to be there first with a bogus, redirecting,
>> dns response.
>
> I wish I had a nickel (ok, a dollar) for every bogus laptop I've seen in 
> hotels and airports that was setup for "co_presidents_club", "starbucks", 
> "t-mobile" AND "tmobile", "corporate", etc.  I've often wondered if those 
> users were really being malicious, plain stupid, or were carrying around a 
> laptop "owned" by someone else.

They were configured with a specific ssid at one point and are now 
beaconing in adhoc mode becasue they can't find that ssid. Crappy driver 
implentation is that root cause of that.

> Either way, there are PLENTY of systems out 
> there pretending to be something they aren't.  I often try to connect to them 
> and get some data, but most either won't give an IP, or if they do, they 
> don't forward packets or respond with anything worthwhile.

Dumb users in adhoc mode.

> I run a pretty 
> tight system, so perhaps those faux APs are trying to detect other configs 
> (Client for MS/Netware, F/P Sharing, SNMP, WINS, IPX, etc).

No they're just poor clueless users with bad software.

> -Jim P.
>
>

-- 
--------------------------------------------------------------------------
Joel Jaeggli  	       Unix Consulting 	       joelja@darkwing.uoregon.edu
GPG Key Fingerprint:     5C6E 0104 BAF0 40B0 5BD3 C38B F000 35AB B67F 56B2


home help back first fref pref prev next nref lref last post