Re: Marriott wifi blocking

2014-10-04 Thread Owen DeLong
 Most crimes not committed by government entities have to go through an 
 indictment-trial-conviction sequence before punisihment is administered.
 
 Except in Chicago.

Whereas most crimes committed by government entities go through the same 
process and are then not punished.

Owen



Re: Marriott wifi blocking

2014-10-04 Thread Larry Sheldon

On 10/4/2014 01:37, Owen DeLong wrote:

Most crimes not committed by government entities have to go through
an indictment-trial-conviction sequence before punisihment is
administered.

Except in Chicago.


Whereas most crimes committed by government entities go through the
same process and are then not punished.


I wasn't going to go there--that gets me banned a lot.


But I do think that an related AP at the curb outside is entitled to a 
trial before the death ray is unleashed against it.


--
The unique Characteristics of System Administrators:

The fact that they are infallible; and,

The fact that they learn from their mistakes.


Quis custodiet ipsos custodes


Re: Marriott wifi blocking

2014-10-04 Thread Jay Hennigan
On 10/3/14, 10:03 PM, Larry Sheldon wrote:
 On 10/3/2014 22:26, Hugo Slabbert wrote:
 On Sat 2014-Oct-04 08:37:32 +0530, Suresh Ramasubramanian
 ops.li...@gmail.com wrote:

 Wifi offered by a carrier citywide, or free wifi signals from a nearby
 hotel / park / coffee shop..

 Perfect example (thanks) of why cutting off network attachment points
 would be fair game while effectively attacking other WLANs has
 collateral damage.
 
 Most crimes not committed by government entities have to go through an
 indictment-trial-conviction sequence before punisihment is administered.
 
 Except in Chicago.

And Ferguson.


-- 
--
Jay Hennigan - CCIE #7880 - Network Engineering - j...@impulse.net
Impulse Internet Service  -  http://www.impulse.net/
Your local telephone and internet company - 805 884-6323 - WB6RDV


Re: Marriott wifi blocking

2014-10-04 Thread Bob Evans
 On 10/4/2014 01:37, Owen DeLong wrote:
 Most crimes not committed by government entities have to go through
 an indictment-trial-conviction sequence before punisihment is
 administered.

 Except in Chicago.

 Whereas most crimes committed by government entities go through the
 same process and are then not punished.

 I wasn't going to go there--that gets me banned a lot.


 But I do think that an related AP at the curb outside is entitled to a
 trial before the death ray is unleashed against it.

Some laws that are broken require one to remain in jail until trial
completion, whenever one is found to be a threat to other members of
society. So in a virtual society perhaps virtual cell walls would be
appropriate ?

Bob Evans
CTO



Re: Marriott wifi blocking

2014-10-04 Thread Jay Ashworth
- Original Message -
 From: Majdi S. Abbas m...@latt.net

 I've seen this in a few places, but if anyone encounters similar
 behavior, I suggest the following:
 
 - Document the incident.
 - Identify the make and model of the access point, or
 controller, and be sure to pass along this information to
 the FCC's OET: http://transition.fcc.gov/oet/
 
 Vendors really need to start losing their US device certification
 for devices that include advertised features that violate US law. It
 would put a stop to this sort of thing pretty quickly.

Majdi makes an excellent point, but I want to clarify it, so no one misses
the important subtext:

It is OK for an enterprise wifi system to make this sort of attack *on rogue
APs which are trying to pretend to be part of it (same ESSID).

It is NOT OK for an enterprise wifi system to make this sort of attack
on APs which *are not trying to pretend to be part of it* (we'll call this
The Marriott Attack from now on, right?)

Rogue AP prevention is a *useful* feature in enterprise wifi systems...
but *that isn't what Marriott was doing*.

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274


Re: Marriott wifi blocking

2014-10-04 Thread Michael Thomas

On 10/04/2014 10:23 AM, Jay Ashworth wrote:


Majdi makes an excellent point, but I want to clarify it, so no one misses
the important subtext:

It is OK for an enterprise wifi system to make this sort of attack *on rogue
APs which are trying to pretend to be part of it (same ESSID).

It is NOT OK for an enterprise wifi system to make this sort of attack
on APs which *are not trying to pretend to be part of it* (we'll call this
The Marriott Attack from now on, right?)

Rogue AP prevention is a *useful* feature in enterprise wifi systems...
but *that isn't what Marriott was doing*.



So I work in a small office in a building that has many enterprise 
wifi's I can see
whether I like it or not. What if one of them decided that our wifi was 
rogue and

started trying to stamp it out?

Mike, this seems like it might be a universally bad idea...


Re: Marriott wifi blocking

2014-10-04 Thread SML

On 4 Oct 2014, at 12:35, Michael Thomas wrote:


On 10/04/2014 10:23 AM, Jay Ashworth wrote:
So I work in a small office in a building that has many enterprise 
wifi's I can see
whether I like it or not. What if one of them decided that our wifi 
was rogue and

started trying to stamp it out?


It happens daily. We have 22 offices around the world, each in downtown 
towers. We use Cisco WLCs, and those controllers see constant deauth 
frames coming from people above us, below us, and from the four sides 
around us. It is a real battle. The only thing to do is use lots of APs 
in the office so as to keep the power levels down.


In a couple of cases our office managers personally visited the offices 
of people above, below, and across from us and discussed the problem. It 
helped.



Mike, this seems like it might be a universally bad idea...


It isn't a bad idea, as we need to protect our corporate networks. But 
there are unintended consequences, to be sure.




Re: Marriott wifi blocking

2014-10-04 Thread Owen DeLong

On Oct 4, 2014, at 06:56 , Bob Evans b...@fiberinternetcenter.com wrote:

 On 10/4/2014 01:37, Owen DeLong wrote:
 Most crimes not committed by government entities have to go through
 an indictment-trial-conviction sequence before punisihment is
 administered.
 
 Except in Chicago.
 
 Whereas most crimes committed by government entities go through the
 same process and are then not punished.
 
 I wasn't going to go there--that gets me banned a lot.
 
 
 But I do think that an related AP at the curb outside is entitled to a
 trial before the death ray is unleashed against it.
 
 Some laws that are broken require one to remain in jail until trial
 completion, whenever one is found to be a threat to other members of
 society. So in a virtual society perhaps virtual cell walls would be
 appropriate ?

In a virtual society, nobody's life is endangered. I don't know of any cases 
(under US law) where someone has been held without bail for economic crimes.
Obviously, some societies allow one to be held without bail for almost 
anything, but I don't think that fits the original premise.

Owen



Re: Marriott wifi blocking

2014-10-04 Thread Jay Ashworth
- Original Message -
 From: Chris Marget ch...@marget.com

 You [I] said:
 
  It is OK for an enterprise wifi system to make this sort of attack
  *on rogue APs which are trying to pretend to be part of it (same ESSID).
 
 I'm curious to hear how you'd rationalize containing a copycat AP
 under the current rules.
 
 In fact, I remain fuzzy on when spoofed de-auth frames would *ever* be okay
 when used against unwilling clients within the FCC's jurisdiction given
 their position that spoofed control frames constitute interference under
 part 15 rules.
 
 This thread and similar discussions elsewhere contain assertions that
 enterprise networks need to defend themselves in some circumstances,
 or that containing an AP with a copycat SSID would certainly be okay.
 
 I'm not so sure.
 
 The need to manage our RF space arguments ring hollow to me. I certainly
 understand why someone would *want* to manage the spectrum, but that's
 just not anyone's privilege when using ISM bands. If the need is great
 enough, get some licensed spectrum and manage that.

I wasn't making that argument. 

I was making the if someone tries to pretend to be part of my network,
so that my users will inadvertantly attach to them and possibly leak 
'classified' data, *then that rogue user is making a 1030 attack on my
network*.

 A copycat AP is unquestionably hostile, and likely interfering with users,
 but I'm unconvinced that the hostility triggers a privilege to attack it
 under part 15 rules. In addition to not being allowed to interfere, we also
 have:

You're not attacking it, per se; you are defensively disconnecting from
it *users who are part of your own network*; these are endpoints *you are
administratively allowed to exert control over*, from my viewpoint.

 2. This device must accept any interference received, including
 interference that may cause undesired operation.

 Certificate-based authentication would solve that problem anyway,
 wouldn't it?

Probably.  And yes, any system big enough to do this stuff is likely
big enough to run 1x as well.

 A rogue AP plugged into a wired port is best solved at the wired port,

I'm not sure anyone was actually mooting this.

 Even large private campuses like oil refineries probably wouldn't be in the
 clear doing this sort of thing unless they're able to stop law enforcement,
 delivery drivers, paramedics and firefighters at the gate in order to get
 them to agree to receive spoofed de-auth frames.

Again: you've shifted topics here from enterprise rogue protection (stay off 
*my* ESSID) to Marriott Attack (stay off all ESSIDs that *aren't* mine); 
different thing entirely.

I make a clear distinction (now that it's not 3am :-) between what Marriott
is doing, and what enterprises doing rogue protection are doing, as noted
above.

Still not a lawyer.

Cheers,
-- jra
-- 
Jay R. Ashworth  Baylink   j...@baylink.com
Designer The Things I Think   RFC 2100
Ashworth  Associates   http://www.bcp38.info  2000 Land Rover DII
St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 1274


Re: Marriott wifi blocking

2014-10-04 Thread Chris Marget
On Sat, Oct 4, 2014 at 2:47 PM, Jay Ashworth j...@baylink.com wrote:

 - Original Message -
  From: Chris Marget ch...@marget.com

  You [I] said:
 
   It is OK for an enterprise wifi system to make this sort of attack
   *on rogue APs which are trying to pretend to be part of it (same
ESSID).
 
  I'm curious to hear how you'd rationalize containing a copycat AP
  under the current rules.
 
 snip

  The need to manage our RF space arguments ring hollow to me. I
certainly
  understand why someone would *want* to manage the spectrum, but that's
  just not anyone's privilege when using ISM bands. If the need is great
  enough, get some licensed spectrum and manage that.

 I wasn't making that argument.

Yes, sorry. I presented two arguments. Only the one about copycat SSIDs is
yours.

 I was making the if someone tries to pretend to be part of my network,
 so that my users will inadvertantly attach to them and possibly leak
 'classified' data, *then that rogue user is making a 1030 attack on my
 network*.

  A copycat AP is unquestionably hostile, and likely interfering with
users,
  but I'm unconvinced that the hostility triggers a privilege to attack it
  under part 15 rules. In addition to not being allowed to interfere, we
also
  have:

 You're not attacking it, per se; you are defensively disconnecting from
 it *users who are part of your own network*; these are endpoints *you are
 administratively allowed to exert control over*, from my viewpoint.

Okay, so we're not talking about wholesale containment of the copycat AP,
but rather management of our own client devices which, by definition, we
can't interfere with. Because they're ours.

That approach sounds perfectly reasonable. I wonder, absent certificates,
how one can be certain about the identity of the client, and if such a
narrowly scoped containment mechanism is actually implemented by the
various checkboxes available to enterprise wifi administrators.

 I make a clear distinction (now that it's not 3am :-) between what
Marriott
 is doing, and what enterprises doing rogue protection are doing, as noted
 above.

Is it clear exactly what enterprises going rogue protection are up to?
I've asked several, gotten wildly different answers. Keeping my clients
off copycat APs sounds reasonable. More aggressive action might not be.

Thanks.


Re: Marriott wifi blocking

2014-10-04 Thread Michael Thomas

On 10/04/2014 11:47 AM, Jay Ashworth wrote:


A copycat AP is unquestionably hostile, and likely interfering with users,
but I'm unconvinced that the hostility triggers a privilege to attack it
under part 15 rules. In addition to not being allowed to interfere, we also
have:
You're not attacking it, per se; you are defensively disconnecting from
it *users who are part of your own network*; these are endpoints *you are
administratively allowed to exert control over*, from my viewpoint.



The problem is that there's really no such thing as a copycat if the 
client doesn't
have the means of authenticating the destination. If that's really the 
requirement, people
should start bitching to ieee to get destination auth on ap's instead of 
blatantly asserting

that somebody owns a particular ssid because, well, because.

Mike


Re: Marriott wifi blocking

2014-10-04 Thread Jared Mauch
Sounds likely at least in unlicensed bands 

Jared Mauch

 On Oct 3, 2014, at 8:15 PM, Mike Hale eyeronic.des...@gmail.com wrote:
 
 So does that mean the anti-rogue AP technologies by the various
 vendors are illegal if used in the US?
 
 On Fri, Oct 3, 2014 at 4:54 PM, Jay Ashworth j...@baylink.com wrote:
 - Original Message -
 From: Ricky Beam jfb...@gmail.com
 
 It doesn't. The DEAUTH management frame is not encrypted and carries no
 authentication. The 802.11 spec only requires a reason code be
 provided.
 
 What's the code for E_GREEDY?
 
 Cheers,
 -- jra
 --
 Jay R. Ashworth  Baylink   
 j...@baylink.com
 Designer The Things I Think   RFC 
 2100
 Ashworth  Associates   http://www.bcp38.info  2000 Land Rover 
 DII
 St Petersburg FL USA  BCP38: Ask For It By Name!   +1 727 647 
 1274
 
 
 
 -- 
 09 F9 11 02 9D 74 E3 5B D8 41 56 C5 63 56 88 C0


Re: Marriott wifi blocking

2014-10-04 Thread Brandon Ross

On Sat, 4 Oct 2014, Michael Thomas wrote:

The problem is that there's really no such thing as a copycat if the 
client doesn't have the means of authenticating the destination. If 
that's really the requirement, people should start bitching to ieee to 
get destination auth on ap's instead of blatantly asserting that 
somebody owns a particular ssid because, well, because.


In the enterprise environment that there's been some insistence from folks 
on this list is a legitimate place to block rogue APs, what makes those 
SSIDs, yours?  Just because they were used first by the enterprise? 
That doesn't seem to hold water in an unlicensed environment to me at all.


If the Marriott can't do this, I don't think anyone can, legally.

Now, granted, if I'm doing it with the intent to disrupt the corporate 
network or steal data, there's certainly other laws to deal with that, but 
I don't think even that is justification for spoofed deauth.


--
Brandon Ross  Yahoo  AIM:  BrandonNRoss
+1-404-635-6667ICQ:  2269442
 Skype:  brandonross
Schedule a meeting:  http://www.doodle.com/bross


Re: Marriott wifi blocking

2014-10-04 Thread Owen DeLong

On Oct 4, 2014, at 12:39 , Brandon Ross br...@pobox.com wrote:

 On Sat, 4 Oct 2014, Michael Thomas wrote:
 
 The problem is that there's really no such thing as a copycat if the 
 client doesn't have the means of authenticating the destination. If that's 
 really the requirement, people should start bitching to ieee to get 
 destination auth on ap's instead of blatantly asserting that somebody owns a 
 particular ssid because, well, because.
 
 In the enterprise environment that there's been some insistence from folks on 
 this list is a legitimate place to block rogue APs, what makes those SSIDs, 
 yours?  Just because they were used first by the enterprise? That doesn't 
 seem to hold water in an unlicensed environment to me at all.

Pretty much... Here's why...

If you are using an SSID in an area, anyone else using the same SSID later is 
causing harmful interference to your network. It's a first-come-first-serve 
situation. Just like amateur radio spectrum... If you're using a frequency to 
carry on a conversation with someone, other hams have an obligation not to 
interfere with your conversation (except in an emergency). It's a bit more 
complicated there, because you're obliged to reasonably accommodate others 
wishing to use the frequency, but in the case of SSIDs, there's no such 
requirement.

Now, if I start using SSID XYZ in building 1 and someone else is using it in 
building 3 and the two coverage zones don't overlap, I'm not entitled to extend 
my XYZ SSID into building 3 when I rent space there, because someone else is 
using it in that location first.

I can only extend my XYZ coverage zone so far as there are no competing XYZ 
SSIDs in the locations I'm expanding in to.

 If the Marriott can't do this, I don't think anyone can, legally.

If I set up something on an SSID Marriott is already using, then my bad and 
they have the right to take appropriate defensive action to protect their 
network.

If I stand up a new network using an SSID Marriott isn't already using, then 
they have no right to cause harmful interference to that network.

Sharing the same channels using different SSIDs, while it may degrade 
performance (of both networks) isn't technically what I would call harmful 
interference, nor is it considered such by the FCC. That's just a matter of 
sharing the spectrum as intended in the products certified for that service.

 Now, granted, if I'm doing it with the intent to disrupt the corporate 
 network or steal data, there's certainly other laws to deal with that, but I 
 don't think even that is justification for spoofed deauth.

Depends on whether you were the first one using the SSID in a particular 
location or not.

Sure, this can get ambiguous and difficult to prove, but the reality is that 
most cases are pretty clear cut and it's usually not hard to tell who is the 
interloper on a given SSID.

Owen



Re: Marriott wifi blocking

2014-10-04 Thread Michael Thomas

On 10/04/2014 01:33 PM, Owen DeLong wrote:

On Oct 4, 2014, at 12:39 , Brandon Ross br...@pobox.com wrote:


On Sat, 4 Oct 2014, Michael Thomas wrote:


The problem is that there's really no such thing as a copycat if the client 
doesn't have the means of authenticating the destination. If that's really the 
requirement, people should start bitching to ieee to get destination auth on ap's instead 
of blatantly asserting that somebody owns a particular ssid because, well, because.

In the enterprise environment that there's been some insistence from folks on this list is a 
legitimate place to block rogue APs, what makes those SSIDs, yours?  Just 
because they were used first by the enterprise? That doesn't seem to hold water in an unlicensed 
environment to me at all.

Pretty much... Here's why...

If you are using an SSID in an area, anyone else using the same SSID later is 
causing harmful interference to your network. It's a first-come-first-serve 
situation. Just like amateur radio spectrum... If you're using a frequency to 
carry on a conversation with someone, other hams have an obligation not to 
interfere with your conversation (except in an emergency). It's a bit more 
complicated there, because you're obliged to reasonably accommodate others 
wishing to use the frequency, but in the case of SSIDs, there's no such 
requirement.

Now, if I start using SSID XYZ in building 1 and someone else is using it in 
building 3 and the two coverage zones don't overlap, I'm not entitled to extend 
my XYZ SSID into building 3 when I rent space there, because someone else is 
using it in that location first.

I can only extend my XYZ coverage zone so far as there are no competing XYZ 
SSIDs in the locations I'm expanding in to.


If the Marriott can't do this, I don't think anyone can, legally.

If I set up something on an SSID Marriott is already using, then my bad and 
they have the right to take appropriate defensive action to protect their 
network.



No. Seriously, no. Biggest come, biggest serve doesn't do a damn bit of 
good dealing with the actual problem which is
one of authentication. Think of this with the big I internet without 
TLS. What you're asking for is complete chaos.


Stomping on other AP is an arms race in which nobody wins. If I want to 
guarantee that I only connect to $MEGACORP
AP's, I should be using strong authentication, not AP neutron bombs to 
clear the battlefield.


Mike


Re: Marriott wifi blocking

2014-10-04 Thread Brandon Butterworth
 From: Jay Ashworth j...@baylink.com
 Again: you've shifted topics here from enterprise rogue protection
 (stay off *my* ESSID) to Marriott Attack (stay off all ESSIDs that
 *aren't* mine); different thing entirely.

Don't forget the 3rd stay off this channel go use another used at
large scale events where for the masses to get a workable service a few
have to give up the right to spray their wifi on whichever channel they
wish.

The Marriott may have not been fined had they been doing this rather
than stay off all channels because we wish to charge for them. I've
not seen if they were stopping other SSID on all channels or just the
ones they were using.

brandon


Re: Marriott wifi blocking

2014-10-04 Thread Alistair Mackenzie
You could monitor it with something like airodump-ng and send deauth
packets if its not associated with your own BSSID(s)

On 3 October 2014 21:06, David Hubbard dhubb...@dino.hostasaurus.com
wrote:

 Saw this article:

 http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/

 The interesting part:

 'A federal investigation of the Gaylord Opryland Resort and
 Convention Center in Nashville found that Marriott employees
 had used containment features of a Wi-Fi monitoring system
 at the hotel to prevent people from accessing their own
 personal Wi-Fi networks.'

 I'm aware of how the illegal wifi blocking devices work, but
 any idea what legal hardware they were using to effectively
 keep their own wifi available but render everyone else's
 inaccessible?

 David



Re: Marriott wifi blocking

2014-10-04 Thread Gregory Moberg
I would think this would not sit very well with the providers.  They've
likely installed equip nearby to the hotel  conv.ctr in order to
adequately handle the concentration of devices at that location.  True?

On Fri, Oct 3, 2014 at 4:16 PM, Michael O Holstein 
michael.holst...@csuohio.edu wrote:

 legality is questionable insofar as this device must not cause harmful
 interference of PartB
 but how it works is by sending DEAUTH packets with spoofed MAC addresses
 rouge AP response on Cisco/Aruba works like this.

 Regards,

 Michael Holstein
 Cleveland State University
 
 From: NANOG nanog-boun...@nanog.org on behalf of David Hubbard 
 dhubb...@dino.hostasaurus.com
 Sent: Friday, October 03, 2014 4:06 PM
 To: NANOG
 Subject: Marriott wifi blocking

 Saw this article:

 http://www.cnn.com/2014/10/03/travel/marriott-fcc-wi-fi-fine/

 The interesting part:

 'A federal investigation of the Gaylord Opryland Resort and
 Convention Center in Nashville found that Marriott employees
 had used containment features of a Wi-Fi monitoring system
 at the hotel to prevent people from accessing their own
 personal Wi-Fi networks.'

 I'm aware of how the illegal wifi blocking devices work, but
 any idea what legal hardware they were using to effectively
 keep their own wifi available but render everyone else's
 inaccessible?

 David




-- 
Greg Moberg, Director, NerveCenter Engineering
LogMatrix, Inc |  http://www.logmatrix.com/ | CommunityForum
http://community.logmatrix.com/LogMatrix/ | Blog
http://www.logmatrix.com/Blog
Telephone: +1 (800)892-3646
http://www.logmatrix.com http://www.twitter.com/NerveCenter
http://www.linkedin.com/company/logmatrix?trk=ppro_cprof
https://www.facebook.com/Logmatrix?sk=page_insights
http://www.youtube.com/user/logmatrixchannel


Re: Marriott wifi blocking

2014-10-04 Thread Jimmy Hess
On Sat, Oct 4, 2014 at 12:48 PM, SML s...@lordsargon.com wrote:
 On 4 Oct 2014, at 12:35, Michael Thomas wrote:
 On 10/04/2014 10:23 AM, Jay Ashworth wrote:
 So I work in a small office in a building that has many enterprise
 whether I like it or not. What if one of them decided that our wifi was
 rogue and started trying to stamp it out?
 It happens daily. We have 22 offices around the world, each in downtown
 towers. We use Cisco WLCs, and those controllers see constant deauth frames
 coming from people above us, below us, and from the four sides around us. It
 is a real battle. The only thing to do is use lots of APs in the office so
 as to keep the power levels down.

Well,  based on the Marriott incident,  it seems that what you need to
do is figure out where the Deauths are coming from via direction
finding and  start sending written notices to your neighbors,   and if
the behavior persists --- follow them up with some FCC interference
complaints.

https://esupport.fcc.gov/ccmsforms/form2000.action

--
-JH


Re: Marriott wifi blocking

2014-10-04 Thread Brett Frankenberger
On Sat, Oct 04, 2014 at 01:33:13PM -0700, Owen DeLong wrote:
 
 On Oct 4, 2014, at 12:39 , Brandon Ross br...@pobox.com wrote:
 
  On Sat, 4 Oct 2014, Michael Thomas wrote:
  
  The problem is that there's really no such thing as a copycat if
  the client doesn't have the means of authenticating the
  destination. If that's really the requirement, people should start
  bitching to ieee to get destination auth on ap's instead of
  blatantly asserting that somebody owns a particular ssid because,
  well, because.
  
  In the enterprise environment that there's been some insistence
  from folks on this list is a legitimate place to block rogue APs,
  what makes those SSIDs, yours?  Just because they were used first
  by the enterprise? That doesn't seem to hold water in an unlicensed
  environment to me at all.
 
 Pretty much... Here's why...
 
 If you are using an SSID in an area, anyone else using the same SSID
 later is causing harmful interference to your network. It's a
 first-come-first-serve situation. Just like amateur radio spectrum...
 If you're using a frequency to carry on a conversation with someone,
 other hams have an obligation not to interfere with your conversation
 (except in an emergency). It's a bit more complicated there, because
 you're obliged to reasonably accommodate others wishing to use the
 frequency, but in the case of SSIDs, there's no such requirement.
 
 Now, if I start using SSID XYZ in building 1 and someone else is
 using it in building 3 and the two coverage zones don't overlap, I'm
 not entitled to extend my XYZ SSID into building 3 when I rent space
 there, because someone else is using it in that location first.

So your position is that if I start using Starbuck's SSID in a location
where there is no Starbuck, and they layer move in to that building,
I'm entitled to compel them to not use their SSID?

 I can only extend my XYZ coverage zone so far as there are no
 competing XYZ SSIDs in the locations I'm expanding in to.

Is ther FCC guidance on this, or is this Regulations As Interpreted By
Owen?

 Depends on whether you were the first one using the SSID in a
 particular location or not.
 
 Sure, this can get ambiguous and difficult to prove, but the reality
 is that most cases are pretty clear cut and it's usually not hard to
 tell who is the interloper on a given SSID.

It's usually easy to tell, but I doubt the FCC would find it relevant. 

There's a lot of amateur lawyering ogain on in this thread, in an area
where there's a lot of ambiguity.  We don't even know for sure that
what Marriott did is illegal -- all we know is that the FCC asserted it
was and Mariott decided to settle rather than litigate the matter.  And
that was an extreme case -- Marriott was making transmissions for the
*sole purpose of preventing others from using the spectrum*.

 -- Brett


Re: Equinix Sales

2014-10-04 Thread Justin Wilson
I have a contact.  I ill dig it up.

On 10/3/14, 10:33 AM, Daniel Corbe co...@corbe.net wrote:


Equinix Sales seem impossible to reach.  Should I just give up and go
through a sales agent or can someone from Equinix sales contact me
off-list?





Re: Marriott wifi blocking

2014-10-04 Thread Matthew Petach
On Sat, Oct 4, 2014 at 5:58 PM, Brett Frankenberger rbf+na...@panix.com
wrote:

 ...

 So your position is that if I start using Starbuck's SSID in a location
 where there is no Starbuck, and they layer move in to that building,
 I'm entitled to compel them to not use their SSID?


This would be why commercial entities
often use their trademark identifiers
as part of the SSID.  You can compel
them (briefly) not to use the SSID, until
they sue you for trademark infringement
and serve cease-and-desist orders against
you for unlicensed and unauthorized use
of the Starbucks name.  Totally separate
realm of enforcement, and in many ways
far more effective.

Matt