Re: OT: unathorized network user.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Jan 24, 2008 3:02 PM, Bazooka Joe <fastfish@xxxxxxxxx> wrote:
> All this talk of locking networks down is odd for an open source
> community.  (Business networks are different)
>
> I run dd-wrt running nocat auth w/ 5 wds nodes placed around the
> block. At any given time i have a half dozen people who I don't know
> doing I don't know what on my network.
>
> I don't block p2p, smtp .... anything.  I even have my printer on the
> network w/ instructions on how to print to it.
>
> Am I personally at risk? Yes. But I think it is a small price to pay
> to cultivate an open community where information isn't kept from
> others.
>
> -bazooka

Scenario #1

I connect via your wireless AP and download child porn.  The IP
captured resolves back to your ISP, and ultimately to you.  The police
show up at your door, arrest you, and seize your equipment to conduct
a forensic analysis of it.  You get labeled as a pedophile pending
this being cleared up.  Your equipment is gone for at least 6-12 mths
(minimum backlog for many forensic units).  At the end of the day no
evidence is found on your system so no charge is pursued.

Scenario #2

I connect via your wireless AP and use it to send out spam.  Your ISP
cuts off your service for violation of terms of service.  You tell
them it wasn't you, you run an open wireless AP.  They discontinue
your service for breach of terms of service (sharing your connection).

Scenario #3

I connect via your wireless AP and send a threatening email to
someone.  The police come knocking at your door (same as scenario 1).

Scenario #4

I connect via your wireless AP and launch a denial of service attack
against the Department of Defense.  Police arrive at your door (same
as scenario 1).

Scenario #5

I connect via your wireless AP and lure a child.  Police show up at
your door (same as scenario 1).

I'm sure people can come up with all kinds of other nasty scenarios.

Running an open access point is a very, very bad idea for many reasons.

Jacques B.

-- 
fedora-list mailing list
fedora-list@xxxxxxxxxx
To unsubscribe: https://www.redhat.com/mailman/listinfo/fedora-list
[Index of Archives]     [Older Fedora Users]     [Fedora Announce]     [Fedora Package Announce]     [EPEL Announce]     [Fedora Magazine]     [Fedora News]     [Fedora Summer Coding]     [Fedora Laptop]     [Fedora Cloud]     [Fedora Advisory Board]     [Fedora Education]     [Fedora Security]     [Fedora Scitech]     [Fedora Robotics]     [Fedora Maintainers]     [Fedora Infrastructure]     [Fedora Websites]     [Anaconda Devel]     [Fedora Devel Java]     [Fedora Legacy]     [Fedora Desktop]     [Fedora Fonts]     [ATA RAID]     [Fedora Marketing]     [Fedora Management Tools]     [Fedora Mentors]     [SSH]     [Fedora Package Review]     [Fedora R Devel]     [Fedora PHP Devel]     [Kickstart]     [Fedora Music]     [Fedora Packaging]     [Centos]     [Fedora SELinux]     [Fedora Legal]     [Fedora Kernel]     [Fedora OCaml]     [Coolkey]     [Virtualization Tools]     [ET Management Tools]     [Yum Users]     [Tux]     [Yosemite News]     [Gnome Users]     [KDE Users]     [Fedora Art]     [Fedora Docs]     [Asterisk PBX]     [Fedora Sparc]     [Fedora Universal Network Connector]     [Libvirt Users]     [Fedora ARM]

  Powered by Linux