[AusNOG] Wifi Security and Interception
Richard Pruss
ric at cisco.com
Wed Jun 9 13:20:19 EST 2010
On 09/06/2010, at 12:17 PM, Bevan Slattery wrote:
> And that is it's BAD (and
> possibly illegal) to INTERCEPT (and record) a COMMUNICATION (not talking
> about ethernet/Wifi/L2 but a communication under the TIA) regardless of
> bearer if you are NOT the INTENDED RECIPIENT. Period.
Way out of my narrow area of expertise here but it's an interesting thread,
I have a few fumbling basic question here. How much of network Ethernet/WiFi/L2/L3/l4-L7 do you feel is covered by the TIA?
And for networking if covered I then I wonder how broad you feel the things in CAPs are?
If INTENDED RECIPIENT does not include anything that can get and one expects to forward/drop on the message, allot of things
networks regularly do become implicated and possibly "BAD".
Does a Logging ACL on a port in the network qualify Intercept and Record? DNS Relay Logs?
Is recording SSID broadcast addresses not a violation of that definition, the SSID was not meant for you so you should not record it...
The MAC's? Flow records? ARP message on a Open AP.
How did you draw those lines for Intent with Intercept and Communication?
Could that definition for instance be so broad it makes Netflow record export inside a corporate encrypted wifi network illegal?
I am communicating with a news server in London BBC, and my bearer
Corporate IT in this case as I am on the corporate network this morning, could record the flow details.
Corporate IT may have many good reasons to do so, like ensuring I am using the network appropriately,
checking my end-point has not been compromised etc
Corporate IT may not be the "Intended Recipient" I am sending these packets to the BBC....
- Ric
More information about the AusNOG
mailing list