<<Corrected grammar>>

If not with RF, how do you suppose that an AP would interfere with another
AP? That is what the poster is asking about.....
 
I am curious on how you would crack a WEP key without using RF signal.....
What you are talking about is criminal and you're right, breaking into
secure APs are not under the rules of Part-15. 
 
 
 
 
-------Original Message-------
 
From: Doug Clark
Date: 9/23/2012 9:29:49 PM
To: WISPA General List
Subject: Re: [WISPA] Can they really do this?
 
 
 
 
-------Original Message-------
 
From: Jeromie Reeves
Date: 9/23/2012 5:53:20 PM
To: WISPA General List
Subject: Re: [WISPA] Can they really do this?
 
IANAL but, I am fairly sure P15 only applies to RF, not to the OSI layers.
If the FCC does have control of the OSI layers from a P15 device then people
doing WEP cracking and such are in violation of P15 and that really is a
stretch. 


On Sat, Sep 22, 2012 at 6:19 AM, Doug Clark <d...@txox.com> wrote:

If there is an AP that does that and it is operating in Part15, it would be
directly in violation of the very rules that gave the device its right to
exist!
The major substance of Part-15 reads: This device complies with Part 15 of
the FCC Rules. Operation is subject to the following two conditions: (1)
this device may not cause harmful interference, and (2) this device must
accept any interference received, including interference that may cause
undesired operation.
 
If the poster has actually seen an AP that does what he says it does then it
would be in violation of Part 15 itself and thus an entity could lodge a
formal complaint against the
person or entity that was operating said AP and possibly end up with a $25
000.00 ticket.  YMMV
 
 
 
 
-------Original Message-------
 
From: Greg Ihnen
Date: 9/22/2012 5:34:47 AM
To: WISPA General List
Subject: [WISPA] Can they really do this?
 
There's a current debate raging right now on the NANOG list about the ins
and outs of setting up large temporary networks for things like conventions.



This one post caught my attention. Has anyone heard of a WiFi AP that will
spoof neighboring networks to intentionally interfere with them, not by
occupying/jamming the spectrum in a brute force way, but rather by
impersonating the other network and rejecting new associations?


The quote:



> One of which I forgot to mention. Many of the hotels (I believe all
> Hilton properties at this time) have sold the facilities space for their
> wifi network to another company. They CAN'T negotiate it with you,
> because they don't own it any more. And most of these wifi networks have
> stealth killers enabled, so that they spoof any other wifi zone they see
> and send back reject messages to the clients. So you can't run them side
> by side.



Greg






_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless
 




_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless








_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless
 
 
_______________________________________________
Wireless mailing list
Wireless@wispa.org
http://lists.wispa.org/mailman/listinfo/wireless

Reply via email to