nanog mailing list archives

Re: Marriott wifi blocking


From: Jay Ashworth <jra () baylink com>
Date: Sun, 05 Oct 2014 16:01:05 -0400

Well now, Florian, there you lead me into deep water. I am inclined to say that that circumstance would fall into the 
category of "things you might have a valid reason to want to do, but which the regulations might prevent you from doing 
even if they are drawn thoughtfully."

Myself, I am inclined to think that you have a right to try to protect your users of your ESSID network from people 
pretending to be it, but that you probably don't have a right to try to protect people who are too stupid to be 
attaching to the right thing. 

And yes, I realize that if a Windows machine for example tries to attach to a network and gets knocked off it might 
move down its list and the user might not notice. If your network is this much of an attack target, make sure your 
building is a Faraday cage, and then you can knock off anything you like.

In the final analysis, what will really happen in a business environment, is likely just that your warning system will 
warn you, and you will walk around with an AirCheck and find the rogue AP and unplug it and beat over the head with it 
whomever set it up.  :-)

On October 5, 2014 3:57:05 PM EDT, Florian Weimer <fw () deneb enyo de> wrote:
* Jay Ashworth:

It is OK for an enterprise wifi system to make this sort of attack
*on rogue APs which are trying to pretend to be part of it (same
ESSID).

What if the ESSID is "Free Internet", or if the network is completely
open?  Does it change things if you have data that shows your
customers can be duped even by networks with a non-colliding ESSID?

-- 
Sent from my Android phone with K-9 Mail. Please excuse my brevity.


Current thread: