Security Basics mailing list archives

RE: Wireless Security


From: "Herman Frederick Ebeling, Jr." <hfebelingjr () lycos com>
Date: Thu, 13 Oct 2005 13:17:21 -0400


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


- -----Original Message-----
From: xyberpix [mailto:xyberpix () xyberpix com]
Sent: Thursday, 13 October, 2005 03:29
To: hfebelingjr () lycos com
Cc: security-basics () securityfocus com
Subject: Re: Wireless Security


*** PGP SIGNATURE VERIFICATION ***
*** Status:   Unknown Signature
*** Signer:   Unknown Key (0x7964C0C1)
*** Signed:   13-Oct-05 3:29:22 AM
*** Verified: 13-Oct-05 12:22:00 PM
*** BEGIN PGP VERIFIED MESSAGE ***

Hi Herman,

Please see below:


On 12 Oct 2005, at 20:17, Herman Frederick Ebeling, Jr. wrote:


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

I've got a question (actually a few) along these lines.  Let's say
that a person
has a Wi-Fi network setup at home.
And they find out that some of their neighbors have accessed it.

A)    What if any obligation to the neighbors does the person who
initially setup
the Wi-Fi network have?

None at all

====>   I've gotta agree with ya, and so far everyone has had the same answer to
this one.

B)    What happens IF one neighbor goes in and reads/deletes msgs/
files from
another neighbor's computer is the person who
initially setup the Wi-Fi network for their own use liable?

Yes and no, if it was an open network, no WEP(bleh)/WPA, then you may
hard pushed to lay charges.
If it was secured in any way, and you never gave your neighbor the
key/passphrase, then it's illegal for him to join your network.

====>   Whether it's an open or "closed" system it shouldn't really matter.  As a
some others have pointed out, IF someone leaves the door to their home standing
open/unlocked it isn't an invitation to others to just walk in and "look
around."  And I would liken this scenario to the "early days" of cable/DSL where
one neighbors often could see one another's computers.  If one neighbor went
into another neighbors box and deleted files that company that provided the high
speed access is hardly responsible for securing all of their customer's boxes,
correct?  Even if they've setup WEP/WPA IF they've chosen a weak SSID/Passphrase
it would still be possible for someone to gain access to an otherwise "secured"
Wi-Fi network.

C)    Can the person who initially setup the Wi-Fi network legally
go in and look
around his/her neighbors computers?

No, not at all, that's illegal.

====>   I would have to think that IF all they were doing was investigating who
was illegally accessing their network that they would/should be allowed to
access those computers that are attached illegally to find out who the owners
are and where they are located.

D)    What if one the neighbors get a virus, is the person who
initially setup the
Wi-Fi network liable?

No, not at all, unless of course you are charging your neighbor for
access to the wireless, as then their may be some issues, not to sure
though.
But I can't see why you would be liable here.

====>   True, IF one was charging then there might be some liability BUT we are
talking about people who are illegally attaching themselves to someone else's
Wi-Fi network.

E)    What if any expectations to privacy do the unauthorized users
have?


They are unauthorized users, none. It would kinda be like you hacking
a box at microsoft.com, and then sueing them because you got a virus
from their box, it wouldn't happen.
If you were unauthorized to do be on the network, you have no rights.

====>   That is how I see it, IF someone is illegally attaching themselves to
someone's Wi-Fi network then they'd have some "pretty big ones" to sue for an
invasion of privacy.

HTH

xyberpix



Herman

- -----Original Message-----
From: Daryl Davis [mailto:daryl () ultbingo com]
Sent: Tuesday, 04 October, 2005 12:56
To: security-basics () securityfocus com
Subject: Wireless blocking


I believe I have an unauthorized wireless router on my network.  I
have been
unable to physically find it as of yet.

Does anyone know how to find the hidden SSID and then Jam it?

Thank you.

Daryl R Davis
Digital Game Media, Inc.

-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQ01ORx/i52nbE9vTEQJiUgCeOOjX9N6x73SckuWo8IM3fRrF7NoAni3P
b8FzLCft8X2qZYK7BYhdx+E3
=9dp4
-----END PGP SIGNATURE-----




*** END PGP VERIFIED MESSAGE ***


-----BEGIN PGP SIGNATURE-----
Version: PGP 8.0.3

iQA/AwUBQ06NJx/i52nbE9vTEQJREACeMXystjL88L4sGwZW36IlngOhzqcAn3gk
XDwVwCExqUTTSeWmdz4LbVLs
=G8Y2
-----END PGP SIGNATURE-----



Current thread: