Security Basics mailing list archives
RE: Wireless Security
From: "Herman Frederick Ebeling, Jr." <hfebelingjr () lycos com>
Date: Thu, 13 Oct 2005 13:17:21 -0400
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 - -----Original Message----- From: xyberpix [mailto:xyberpix () xyberpix com] Sent: Thursday, 13 October, 2005 03:29 To: hfebelingjr () lycos com Cc: security-basics () securityfocus com Subject: Re: Wireless Security *** PGP SIGNATURE VERIFICATION *** *** Status: Unknown Signature *** Signer: Unknown Key (0x7964C0C1) *** Signed: 13-Oct-05 3:29:22 AM *** Verified: 13-Oct-05 12:22:00 PM *** BEGIN PGP VERIFIED MESSAGE *** Hi Herman, Please see below: On 12 Oct 2005, at 20:17, Herman Frederick Ebeling, Jr. wrote:
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 I've got a question (actually a few) along these lines. Let's say that a person has a Wi-Fi network setup at home. And they find out that some of their neighbors have accessed it. A) What if any obligation to the neighbors does the person who initially setup the Wi-Fi network have?
None at all ====> I've gotta agree with ya, and so far everyone has had the same answer to this one.
B) What happens IF one neighbor goes in and reads/deletes msgs/ files from another neighbor's computer is the person who initially setup the Wi-Fi network for their own use liable?
Yes and no, if it was an open network, no WEP(bleh)/WPA, then you may hard pushed to lay charges. If it was secured in any way, and you never gave your neighbor the key/passphrase, then it's illegal for him to join your network. ====> Whether it's an open or "closed" system it shouldn't really matter. As a some others have pointed out, IF someone leaves the door to their home standing open/unlocked it isn't an invitation to others to just walk in and "look around." And I would liken this scenario to the "early days" of cable/DSL where one neighbors often could see one another's computers. If one neighbor went into another neighbors box and deleted files that company that provided the high speed access is hardly responsible for securing all of their customer's boxes, correct? Even if they've setup WEP/WPA IF they've chosen a weak SSID/Passphrase it would still be possible for someone to gain access to an otherwise "secured" Wi-Fi network.
C) Can the person who initially setup the Wi-Fi network legally go in and look around his/her neighbors computers?
No, not at all, that's illegal. ====> I would have to think that IF all they were doing was investigating who was illegally accessing their network that they would/should be allowed to access those computers that are attached illegally to find out who the owners are and where they are located.
D) What if one the neighbors get a virus, is the person who initially setup the Wi-Fi network liable?
No, not at all, unless of course you are charging your neighbor for access to the wireless, as then their may be some issues, not to sure though. But I can't see why you would be liable here. ====> True, IF one was charging then there might be some liability BUT we are talking about people who are illegally attaching themselves to someone else's Wi-Fi network.
E) What if any expectations to privacy do the unauthorized users have?
They are unauthorized users, none. It would kinda be like you hacking a box at microsoft.com, and then sueing them because you got a virus from their box, it wouldn't happen. If you were unauthorized to do be on the network, you have no rights. ====> That is how I see it, IF someone is illegally attaching themselves to someone's Wi-Fi network then they'd have some "pretty big ones" to sue for an invasion of privacy. HTH xyberpix
Herman - -----Original Message----- From: Daryl Davis [mailto:daryl () ultbingo com] Sent: Tuesday, 04 October, 2005 12:56 To: security-basics () securityfocus com Subject: Wireless blocking I believe I have an unauthorized wireless router on my network. I have been unable to physically find it as of yet. Does anyone know how to find the hidden SSID and then Jam it? Thank you. Daryl R Davis Digital Game Media, Inc. -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 iQA/AwUBQ01ORx/i52nbE9vTEQJiUgCeOOjX9N6x73SckuWo8IM3fRrF7NoAni3P b8FzLCft8X2qZYK7BYhdx+E3 =9dp4 -----END PGP SIGNATURE-----
*** END PGP VERIFIED MESSAGE *** -----BEGIN PGP SIGNATURE----- Version: PGP 8.0.3 iQA/AwUBQ06NJx/i52nbE9vTEQJREACeMXystjL88L4sGwZW36IlngOhzqcAn3gk XDwVwCExqUTTSeWmdz4LbVLs =G8Y2 -----END PGP SIGNATURE-----
Current thread:
- RE: Hard drives v. CF/Smart media/etc., (continued)
- RE: Hard drives v. CF/Smart media/etc. Herman Frederick Ebeling, Jr. (Oct 18)
- Re: Hard drives v. CF/Smart media/etc. Raoul Armfield (Oct 21)
- Re: Hard drives v. CF/Smart media/etc. Micheal Espinola Jr (Oct 21)
- Re: Hard drives v. CF/Smart media/etc. FocusHacks (Oct 24)
- RE: Hard drives v. CF/Smart media/etc. Alexander Klimov (Oct 21)
- Re: Hard drives v. CF/Smart media/etc. crazy frog crazy frog (Oct 21)
- Re: Hard drives v. CF/Smart media/etc. Alloishus BeauMains (Oct 24)
- Re: Hard drives v. CF/Smart media/etc. Micheal Espinola Jr (Oct 18)
- Re: Hard drives v. CF/Smart media/etc. Steven Meyer (Oct 18)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 13)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 14)
- RE: Wireless Security David Gillett (Oct 14)
- RE: Wireless Security Herman Frederick Ebeling, Jr. (Oct 14)
